{"id":"https://openalex.org/W2978733081","doi":"https://doi.org/10.1109/ijcnn.2019.8852416","title":"NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples","display_name":"NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2978733081","doi":"https://doi.org/10.1109/ijcnn.2019.8852416","mag":"2978733081"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2019.8852416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8852416","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039094834","display_name":"Jing Ya","orcid":"https://orcid.org/0009-0003-6646-3278"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Ya","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103214505","display_name":"Tingwen Liu","orcid":"https://orcid.org/0000-0003-0487-0751"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tingwen Liu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411732","display_name":"Panpan Zhang","orcid":"https://orcid.org/0000-0001-9852-546X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Panpan Zhang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110292528","display_name":"Jinqiao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinqiao Shi","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100675165","display_name":"Li Guo","orcid":"https://orcid.org/0000-0002-9723-3294"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Guo","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040254783","display_name":"Zhaojun Gu","orcid":"https://orcid.org/0000-0002-1972-0951"},"institutions":[{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"education","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaojun Gu","raw_affiliation_strings":["Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China, Tianjin, China","institution_ids":["https://openalex.org/I28813325"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5039094834"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.0174,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83381661,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.944426417350769},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8230544328689575},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7567425966262817},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.679889976978302},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5551497936248779},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.5529013872146606},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4675413966178894},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4586375653743744},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45704561471939087},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4563676714897156},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4097791016101837},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37538039684295654},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14213210344314575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14103245735168457},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07835802435874939}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.944426417350769},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8230544328689575},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7567425966262817},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.679889976978302},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5551497936248779},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.5529013872146606},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4675413966178894},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4586375653743744},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45704561471939087},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4563676714897156},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4097791016101837},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37538039684295654},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14213210344314575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14103245735168457},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07835802435874939},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn.2019.8852416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8852416","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.44999998807907104,"display_name":"Decent work and economic growth"},{"id":"https://metadata.un.org/sdg/1","score":0.4399999976158142,"display_name":"No poverty"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W113692204","https://openalex.org/W580247353","https://openalex.org/W1566256432","https://openalex.org/W1954903228","https://openalex.org/W1973990666","https://openalex.org/W1989957782","https://openalex.org/W1993851562","https://openalex.org/W2012481173","https://openalex.org/W2016306175","https://openalex.org/W2023973750","https://openalex.org/W2040750298","https://openalex.org/W2054203538","https://openalex.org/W2095705004","https://openalex.org/W2129490689","https://openalex.org/W2146729596","https://openalex.org/W2158698691","https://openalex.org/W2190286163","https://openalex.org/W2580641941","https://openalex.org/W2586064251","https://openalex.org/W2592440977","https://openalex.org/W2598727995","https://openalex.org/W2625935159","https://openalex.org/W2756719406","https://openalex.org/W2787538540","https://openalex.org/W2886313391","https://openalex.org/W3105878265","https://openalex.org/W4302282827","https://openalex.org/W6732691979","https://openalex.org/W6734770194"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W4253977752","https://openalex.org/W2942879794","https://openalex.org/W2964829536","https://openalex.org/W2904586340","https://openalex.org/W3120595989"],"abstract_inverted_index":{"Spoofed":[0],"URLs":[1,54,61,125],"are":[2],"associated":[3],"with":[4,62,73,84],"various":[5],"cyber":[6],"crimes":[7],"such":[8,33],"as":[9],"phishing":[10],"and":[11,24,39,58,75,80,127,132],"ransomware":[12],"etc.":[13],"Most":[14],"existing":[15],"detection":[16,72,83],"approaches":[17],"design":[18],"a":[19,36,67,92,129],"set":[20],"of":[21,100,112],"hand-crafted":[22],"features":[23,34,77],"feed":[25],"them":[26],"to":[27,95,108],"machine":[28],"learning":[29],"classifiers.":[30],"However,":[31],"designing":[32],"is":[35],"time":[37],"consuming":[38],"labor":[40],"intensive":[41],"process.":[42],"This":[43],"paper":[44],"proposes":[45],"an":[46],"approach":[47],"named":[48],"NeuralAS":[49,69,120],"(Neural":[50],"Anti-Spoofing)":[51],"by":[52],"segmenting":[53],"into":[55],"word":[56],"sequences":[57],"detecting":[59],"spoofed":[60,124],"recurrent":[63],"neural":[64],"networks.":[65],"As":[66],"result,":[68],"can":[70,105],"perform":[71],"high-abstract":[74],"poor-interpretable":[76],"learned":[78],"automatically,":[79],"achieve":[81],"accurate":[82],"contextual":[85],"information":[86],"in":[87],"sequences.":[88],"We":[89],"also":[90],"propose":[91],"novel":[93],"method":[94],"construct":[96],"indistinguishable":[97],"data":[98,138],"sets":[99],"strong":[101,136],"similar":[102,137],"samples,":[103],"which":[104],"be":[106],"used":[107],"evaluate":[109],"the":[110],"robustness":[111,133],"different":[113],"approaches.":[114],"Extensive":[115],"experimental":[116],"results":[117],"show":[118],"that":[119],"works":[121],"well":[122],"on":[123,135],"detection,":[126],"has":[128],"significant":[130],"effectiveness":[131],"even":[134],"sets.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
