{"id":"https://openalex.org/W4395703516","doi":"https://doi.org/10.1145/3603287.3651193","title":"Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model","display_name":"Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model","publication_year":2024,"publication_date":"2024-04-18","ids":{"openalex":"https://openalex.org/W4395703516","doi":"https://doi.org/10.1145/3603287.3651193"},"language":"en","primary_location":{"id":"doi:10.1145/3603287.3651193","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603287.3651193","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Southeast Conference on ZZZ","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015182224","display_name":"Sultan Asiri","orcid":"https://orcid.org/0000-0002-7405-7646"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sultan Asiri","raw_affiliation_strings":["The University of Alabama, Tuscaloosa, Alabama, USA"],"raw_orcid":"https://orcid.org/0000-0002-7405-7646","affiliations":[{"raw_affiliation_string":"The University of Alabama, Tuscaloosa, Alabama, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046618429","display_name":"Yang Xiao","orcid":"https://orcid.org/0000-0001-8549-6794"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yang Xiao","raw_affiliation_strings":["The University of Alabama, Tuscaloosa, Alabama, USA"],"raw_orcid":"https://orcid.org/0000-0001-8549-6794","affiliations":[{"raw_affiliation_string":"The University of Alabama, Tuscaloosa, Alabama, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101498344","display_name":"Saleh Alzahrani","orcid":"https://orcid.org/0000-0001-8380-2487"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saleh Alzahrani","raw_affiliation_strings":["The University of Alabama, Tuscaloosa, Alabama, USA"],"raw_orcid":"https://orcid.org/0000-0001-8380-2487","affiliations":[{"raw_affiliation_string":"The University of Alabama, Tuscaloosa, Alabama, USA","institution_ids":["https://openalex.org/I17301866"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015182224"],"corresponding_institution_ids":["https://openalex.org/I17301866"],"apc_list":null,"apc_paid":null,"fwci":2.984,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.92023047,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"77","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7194244265556335},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6139736771583557},{"id":"https://openalex.org/keywords/human-in-the-loop","display_name":"Human-in-the-loop","score":0.5873380899429321},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5771535038948059},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5248168706893921},{"id":"https://openalex.org/keywords/loop","display_name":"Loop (graph theory)","score":0.4944136142730713},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3671204745769501},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21033942699432373},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14244914054870605}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7194244265556335},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6139736771583557},{"id":"https://openalex.org/C2780626000","wikidata":"https://www.wikidata.org/wiki/Q5936775","display_name":"Human-in-the-loop","level":2,"score":0.5873380899429321},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5771535038948059},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5248168706893921},{"id":"https://openalex.org/C184670325","wikidata":"https://www.wikidata.org/wiki/Q512604","display_name":"Loop (graph theory)","level":2,"score":0.4944136142730713},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3671204745769501},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21033942699432373},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14244914054870605},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603287.3651193","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603287.3651193","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Southeast Conference on ZZZ","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W119778216","https://openalex.org/W2083940415","https://openalex.org/W2745351283","https://openalex.org/W2779627157","https://openalex.org/W3113075730","https://openalex.org/W3118329104","https://openalex.org/W4213136755","https://openalex.org/W4214484423","https://openalex.org/W4319996419","https://openalex.org/W4389994206"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W4367173559","https://openalex.org/W4380075502","https://openalex.org/W3202085196"],"abstract_inverted_index":{"Phishing":[0],"attacks":[1,4,28,44,79],"are":[2],"cyber":[3],"that":[5,102,132],"deceive":[6],"victims":[7],"into":[8,238],"revealing":[9],"sensitive":[10],"information":[11],"or":[12],"downloading":[13],"malware.":[14],"They":[15],"serve":[16],"as":[17,77,144],"a":[18,100,113,126],"gateway":[19],"to":[20,46,54,74,92,136],"various":[21],"malware":[22],"attacks,":[23],"including":[24],"ransomware":[25],"attacks.":[26,94],"These":[27],"cause":[29],"millions":[30],"of":[31,42,170,206,228,231],"dollars":[32],"in":[33],"losses":[34],"for":[35,72,99,153,167],"individuals":[36],"and":[37,155,199,220],"organizations":[38],"annually.":[39],"The":[40,173,204],"frequency":[41],"phishing":[43,93],"continues":[45],"rise,":[47],"with":[48,180],"attackers":[49],"constantly":[50],"developing":[51],"new":[52,151,165,182],"techniques":[53],"bypass":[55],"detection":[56,86,114],"systems.":[57],"One":[58],"example":[59],"is":[60,176,210],"hidden":[61],"malicious":[62],"links":[63],"within":[64],"seemingly":[65],"legitimate":[66],"web":[67],"pages,":[68],"making":[69],"them":[70],"difficult":[71],"humans":[73],"detect,":[75],"such":[76],"browser-in-the-browser":[78],"(BiTB).":[80],"Therefore,":[81,95],"relying":[82],"solely":[83],"on":[84,212],"fixed":[85],"systems":[87],"can":[88,103],"make":[89],"one":[90],"vulnerable":[91],"the":[96,138,171,181,185,193,196,201,213,235,239],"critical":[97],"need":[98],"system":[101,115,131],"continuously":[104],"improve":[105],"over":[106],"time":[107],"arises.":[108],"This":[109],"paper":[110],"proposes":[111],"enhancing":[112],"by":[116],"incorporating":[117],"human":[118,134],"feedback.":[119],"To":[120],"achieve":[121],"this,":[122],"we":[123,163],"have":[124],"designed":[125],"human-in-the-loop":[127],"deep":[128],"learning":[129],"active":[130],"uses":[133],"feedback":[135],"enhance":[137],"model's":[139],"performance.":[140],"We":[141,148,190],"use":[142],"PhishTransformer":[143],"our":[145,159],"initial":[146,174],"model.":[147,172,242],"then":[149,191],"gathered":[150],"data":[152,166,198],"testing":[154],"accessed":[156],"it":[157],"through":[158],"browser":[160],"extension.":[161],"Subsequently,":[162],"collect":[164],"each":[168,188,207],"version":[169,209],"model":[175,186,194,208,224,237],"retrained":[177],"three":[178],"times":[179],"data,":[183],"saving":[184],"after":[187],"iteration.":[189],"retest":[192],"using":[195],"test":[197],"train":[200],"next":[202],"version.":[203],"evaluation":[205],"based":[211],"following":[214],"metrics:":[215],"accuracy,":[216],"loss,":[217],"precision,":[218],"recall,":[219],"F1":[221],"score.":[222],"Our":[223],"shows":[225],"an":[226],"improvement":[227],"around":[229],"5%":[230],"all":[232],"metrics":[233],"from":[234],"base":[236],"Version":[240],"3":[241]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
