{"id":"https://openalex.org/W4400106697","doi":"https://doi.org/10.1145/3660512.3665523","title":"Combating Phishing in the Age of Fake News: A Novel Approach with Text-to-Text Transfer Transformer","display_name":"Combating Phishing in the Age of Fake News: A Novel Approach with Text-to-Text Transfer Transformer","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400106697","doi":"https://doi.org/10.1145/3660512.3665523"},"language":"en","primary_location":{"id":"doi:10.1145/3660512.3665523","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3660512.3665523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099658811","display_name":"Yifeng Ma","orcid":"https://orcid.org/0000-0002-7675-9131"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Yifeng Ma","raw_affiliation_strings":["The University of Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"The University of Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016115576","display_name":"Gillian Dobbie","orcid":"https://orcid.org/0000-0001-7245-0367"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Gillian Dobbie","raw_affiliation_strings":["The University of Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"The University of Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079990663","display_name":"Nalin Arachchilage","orcid":"https://orcid.org/0000-0001-9192-0993"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Nalin Asanka Gamagedara Arachchilage","raw_affiliation_strings":["The University of Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"The University of Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5099658811"],"corresponding_institution_ids":["https://openalex.org/I154130895"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13055557,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7924062013626099},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5924054980278015},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5717953443527222},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4527686834335327},{"id":"https://openalex.org/keywords/fake-news","display_name":"Fake news","score":0.427432656288147},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34481459856033325},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15853747725486755},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1278895139694214},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.08728083968162537}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7924062013626099},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5924054980278015},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5717953443527222},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4527686834335327},{"id":"https://openalex.org/C2779756789","wikidata":"https://www.wikidata.org/wiki/Q28549308","display_name":"Fake news","level":2,"score":0.427432656288147},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34481459856033325},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15853747725486755},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1278895139694214},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.08728083968162537},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3660512.3665523","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3660512.3665523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1893133781","https://openalex.org/W2028223155","https://openalex.org/W2029591949","https://openalex.org/W2099034239","https://openalex.org/W2133665775","https://openalex.org/W2153518124","https://openalex.org/W2166731089","https://openalex.org/W2193428859","https://openalex.org/W2335888457","https://openalex.org/W2543536327","https://openalex.org/W2772792254","https://openalex.org/W2782171552","https://openalex.org/W2890718808","https://openalex.org/W3035894350","https://openalex.org/W3094117827","https://openalex.org/W3160353358","https://openalex.org/W3208145316","https://openalex.org/W3211054674","https://openalex.org/W4213287278","https://openalex.org/W4225708279","https://openalex.org/W4240256779","https://openalex.org/W4280559096","https://openalex.org/W4285247275","https://openalex.org/W4285820921","https://openalex.org/W4297996631","https://openalex.org/W4304091773","https://openalex.org/W4366826981","https://openalex.org/W4379647795","https://openalex.org/W4380027994","https://openalex.org/W4385169439"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362","https://openalex.org/W4396966040"],"abstract_inverted_index":{"In":[0],"the":[1,20,33,66,75,88,96,130,139,166,174,184,233],"digital":[2],"landscape,":[3],"where":[4],"fake":[5,38,79,135,248],"news":[6],"proliferates":[7],"across":[8],"online":[9],"platforms,":[10],"it":[11],"not":[12,188],"only":[13,189,223],"distorts":[14],"public":[15],"discourse":[16],"but":[17,205],"also":[18,206],"paves":[19],"way":[21],"for":[22],"sophisticated":[23],"cyber":[24,244],"threats,":[25],"particularly":[26],"phishing":[27,71,97,113,153,186,240],"attacks.":[28],"These":[29,230],"attacks":[30],"often":[31],"exploit":[32],"credibility":[34],"crisis":[35],"created":[36],"by":[37,70,109,134,220],"news,":[39,80],"tricking":[40],"individuals":[41],"with":[42,210],"emails":[43],"that":[44,73,115,155],"mimic":[45,157],"legitimate":[46,122,158,203],"offers,":[47],"such":[48],"as":[49,216,228],"significant":[50],"discounts,":[51],"thereby":[52],"luring":[53],"them":[54],"into":[55],"clicking":[56],"on":[57,104],"malicious":[58],"links":[59],"designed":[60],"to":[61,94,121,148,202],"steal":[62],"personal":[63],"information.":[64],"Addressing":[65],"nuanced":[67],"challenge":[68],"posed":[69],"tactics":[72],"leverage":[74],"deceptive":[76],"power":[77],"of":[78,112,168,195,212,235],"this":[81],"paper":[82],"introduces":[83],"a":[84,105,124,198,224,247],"novel":[85],"approach:":[86],"utilizing":[87],"Text-to-Text":[89],"Transfer":[90],"Transformer":[91],"(T5)":[92],"model":[93],"improve":[95],"detection":[98,169,208,241],"system.":[99],"Our":[100,171],"research":[101],"zeroes":[102],"in":[103,129,238,246],"critical":[106],"vulnerability":[107],"exploited":[108],"cybercriminals\u2014the":[110],"use":[111],"URLs":[114,154,187,214],"are":[116],"visually":[117],"and":[118,151,164,179,222,242],"contextually":[119],"similar":[120],"ones,":[123],"tactic":[125],"made":[126],"more":[127],"effective":[128],"disinformation-rich":[131],"environment":[132],"fostered":[133],"news.":[136],"By":[137],"employing":[138],"T5":[140],"model\u2019s":[141],"advanced":[142],"text":[143],"processing":[144],"capabilities,":[145],"we":[146],"aim":[147],"both":[149],"generate":[150],"identify":[152],"closely":[156],"sites,":[159],"thus":[160],"enriching":[161],"anti-phishing":[162],"databases":[163],"boosting":[165],"efficacy":[167],"tools.":[170],"evaluations":[172],"using":[173],"Structural":[175],"Similarity":[176],"Index":[177],"(SSIM)":[178],"VirusTotal":[180],"reveal":[181],"compelling":[182],"results:":[183],"generated":[185],"achieve":[190],"an":[191],"average":[192],"SSIM":[193],"score":[194],"90%,":[196],"indicating":[197],"strong":[199],"visual":[200],"resemblance":[201],"URLs,":[204],"evade":[207],"effectively,":[209],"96.8%":[211],"these":[213],"marked":[215],"\"harmless\"":[217],"or":[218],"\"undetected\"":[219],"VirusTotal,":[221],"minimal":[225],"fraction":[226],"flagged":[227],"\"malicious\".":[229],"findings":[231],"highlight":[232],"robustness":[234],"our":[236],"approach":[237],"enhancing":[239],"combating":[243],"threats":[245],"news-infused":[249],"environment.":[250]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
