{"id":"https://openalex.org/W2538775858","doi":"https://doi.org/10.1145/2976749.2989050","title":"POSTER","display_name":"POSTER","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2538775858","doi":"https://doi.org/10.1145/2976749.2989050","mag":"2538775858"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2989050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056640553","display_name":"Omid Asudeh","orcid":null},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Omid Asudeh","raw_affiliation_strings":["University of Texas at Arlington, Arlington, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035719182","display_name":"Matthew Wright","orcid":"https://orcid.org/0000-0002-8489-6347"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mathew Wright","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056640553"],"corresponding_institution_ids":["https://openalex.org/I189196454"],"apc_list":null,"apc_paid":null,"fwci":1.9972,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.91001127,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1790","last_page":"1792"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/suspect","display_name":"Suspect","score":0.8355667591094971},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7770600318908691},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6068657636642456},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5865961313247681},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.39839228987693787},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35558784008026123},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3317109942436218}],"concepts":[{"id":"https://openalex.org/C2778223634","wikidata":"https://www.wikidata.org/wiki/Q224952","display_name":"Suspect","level":2,"score":0.8355667591094971},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7770600318908691},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6068657636642456},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5865961313247681},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.39839228987693787},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35558784008026123},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3317109942436218},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2989050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2100486461","https://openalex.org/W2107925163","https://openalex.org/W2122374500","https://openalex.org/W2124386111","https://openalex.org/W2161969291"],"related_works":["https://openalex.org/W3197016913","https://openalex.org/W2389153751","https://openalex.org/W4386728183","https://openalex.org/W2185015567","https://openalex.org/W2394191954","https://openalex.org/W2113933481","https://openalex.org/W4292622136","https://openalex.org/W4388421173","https://openalex.org/W2160300499","https://openalex.org/W4307134568"],"abstract_inverted_index":{"Most":[0],"phishing":[1],"pages":[2,38],"try":[3],"to":[4,61,97,107,112],"convince":[5],"users":[6],"that":[7],"they":[8,21],"are":[9,22,51],"legitimate":[10],"sites":[11],"by":[12],"imitating":[13],"visual":[14,72],"signals":[15],"like":[16],"logos":[17],"from":[18],"the":[19,33,36,44,79,84,114,125,139],"websites":[20,87],"targeting.":[23],"Visual":[24],"similarity":[25,73],"detection":[26],"methods":[27],"look":[28],"for":[29,55,71],"these":[30],"imitations":[31],"between":[32],"screen-shots":[34],"of":[35,43,78,86,138,151],"suspect":[37],"and":[39,94],"an":[40],"image":[41],"database":[42],"most":[45],"targeted":[46],"websites.":[47],"Existing":[48],"approaches,":[49],"however,":[50],"either":[52],"too":[53],"slow":[54],"real-time":[56],"use":[57,103],"or":[58,110],"not":[59,111],"robust":[60],"manipulation.":[62],"In":[63,119,128],"this":[64,120],"work,":[65],"we":[66,122],"design":[67],"a":[68],"multi-phase":[69],"framework":[70,80],"detection.":[74],"The":[75],"first":[76,126],"phase":[77],"should":[81],"rule":[82],"out":[83,134],"bulk":[85],"quickly,":[88],"but":[89],"without":[90],"introducing":[91],"false":[92,144],"negatives":[93,145],"with":[95,142,146],"resistance":[96],"attacker":[98],"manipulations.":[99],"Later":[100],"phases":[101],"can":[102],"more":[104,135],"heavyweight":[105],"operations":[106],"decide":[108],"whether":[109],"warn":[113],"user":[115],"about":[116],"possible":[117],"phishing.":[118],"abstract,":[121],"focus":[123],"on":[124],"phase.":[127],"experiments,":[129],"our":[130],"proposed":[131],"method":[132],"rules":[133],"than":[136,148],"half":[137],"test":[140],"cases":[141],"zero":[143],"less":[147],"5":[149],"ms":[150],"processing":[152],"time":[153],"per":[154],"page.":[155]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-10-28T00:00:00"}
