{"id":"https://openalex.org/W4410644253","doi":"https://doi.org/10.1145/3737295","title":"From ML to LLM: Evaluating the Robustness of Phishing Web Page Detection Models against Adversarial Attacks","display_name":"From ML to LLM: Evaluating the Robustness of Phishing Web Page Detection Models against Adversarial Attacks","publication_year":2025,"publication_date":"2025-05-23","ids":{"openalex":"https://openalex.org/W4410644253","doi":"https://doi.org/10.1145/3737295"},"language":"en","primary_location":{"id":"doi:10.1145/3737295","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3737295","pdf_url":null,"source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1145/3737295","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106423311","display_name":"Aditya Kulkarni","orcid":"https://orcid.org/0000-0003-1314-6634"},"institutions":[{"id":"https://openalex.org/I4210152718","display_name":"Indian Institute of Technology Dharwad","ror":"https://ror.org/0509djg30","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152718"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aditya Kulkarni","raw_affiliation_strings":["Indian Institute of Technology Dharwad, Dharwad, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Dharwad, Dharwad, India","institution_ids":["https://openalex.org/I4210152718"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021323754","display_name":"Vivek Balachandran","orcid":"https://orcid.org/0000-0003-4847-7150"},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vivek Balachandran","raw_affiliation_strings":["InfoComm Technology, Singapore Institute of Technology, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"InfoComm Technology, Singapore Institute of Technology, Singapore, Singapore","institution_ids":["https://openalex.org/I168639165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012540529","display_name":"Dinil Mon Divakaran","orcid":"https://orcid.org/0000-0001-8706-432X"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dinil Mon Divakaran","raw_affiliation_strings":["Institute for Infocomm Research (IR), A*STAR, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research (IR), A*STAR, Singapore, Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039200449","display_name":"Tamal Das","orcid":"https://orcid.org/0000-0003-0455-2067"},"institutions":[{"id":"https://openalex.org/I4210152718","display_name":"Indian Institute of Technology Dharwad","ror":"https://ror.org/0509djg30","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152718"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Tamal Das","raw_affiliation_strings":["Indian Institute of Technology Dharwad, Dharwad, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Dharwad, Dharwad, India","institution_ids":["https://openalex.org/I4210152718"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5106423311"],"corresponding_institution_ids":["https://openalex.org/I4210152718"],"apc_list":null,"apc_paid":null,"fwci":21.4687,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.99177872,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"6","issue":"2","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7955323457717896},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7954007387161255},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7796353101730347},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6094807982444763},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.419941782951355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.270435631275177},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25170302391052246},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1559084951877594},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.07446452975273132}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7955323457717896},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7954007387161255},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7796353101730347},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6094807982444763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.419941782951355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.270435631275177},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25170302391052246},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1559084951877594},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.07446452975273132},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3737295","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3737295","pdf_url":null,"source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/29643152","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"doi:10.1145/3737295","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3737295","pdf_url":null,"source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1984487609","https://openalex.org/W1989957782","https://openalex.org/W2139565456","https://openalex.org/W2140379305","https://openalex.org/W2142995284","https://openalex.org/W2243397390","https://openalex.org/W2514087538","https://openalex.org/W2517538529","https://openalex.org/W2613718673","https://openalex.org/W2752929869","https://openalex.org/W2806379428","https://openalex.org/W2899992227","https://openalex.org/W2908175961","https://openalex.org/W2944669302","https://openalex.org/W2997947223","https://openalex.org/W3007514548","https://openalex.org/W3022503663","https://openalex.org/W3106934761","https://openalex.org/W4285172164","https://openalex.org/W4287777457","https://openalex.org/W4311413020","https://openalex.org/W4313196990","https://openalex.org/W4378977274","https://openalex.org/W4389628379","https://openalex.org/W4393278007","https://openalex.org/W4393969292","https://openalex.org/W4405440129","https://openalex.org/W4409671106"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W4391093354","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260"],"abstract_inverted_index":{"Phishing":[0],"attacks":[1,144],"attempt":[2],"to":[3,26,41,149,160,177],"deceive":[4,187],"users":[5],"into":[6,96],"stealing":[7],"sensitive":[8],"information,":[9],"posing":[10],"a":[11,64,83,121,130,174],"significant":[12,122],"cybersecurity":[13],"threat.":[14],"Advances":[15],"in":[16,72,124],"Machine":[17],"Learning":[18,22],"(ML)":[19],"and":[20,69,111,119],"Deep":[21],"(DL)":[23],"have":[24],"led":[25],"the":[27,102,154,164],"development":[28],"of":[29,58,67,104,156,194],"numerous":[30],"phishing":[31,49,60,73,88,94,116,136,157,183,196],"web":[32,50,61,89,98,117,184,197],"page":[33],"detection":[34,126,158,169,203],"solutions,":[35],"but":[36,145,205],"these":[37,77,142,195],"models":[38,159,204],"remain":[39],"vulnerable":[40],"adversarial":[42,48,87,115,143,161,182],"attacks.":[43],"Evaluating":[44],"their":[45,125],"robustness":[46,103,140],"against":[47,141],"pages":[51,62,90,118,185,198],"is":[52,147],"essential.":[53],"Existing":[54],"tools":[55],"contain":[56],"datasets":[57],"pre-designed":[59],"for":[63,166],"limited":[65],"number":[66],"brands":[68],"lack":[70],"diversity":[71],"features.":[74],"To":[75],"address":[76],"challenges,":[78],"we":[79,172],"develop":[80],"PhishOracle":[81,113,180],",":[82],"tool":[84],"that":[85,192],"generates":[86],"by":[91],"embedding":[92],"diverse":[93],"features":[95],"legitimate":[97],"pages.":[99],"We":[100],"evaluate":[101,178],"three":[105],"existing":[106,202],"task-specific":[107],"models\u2014Stack":[108],"model,":[109],"VisualPhishNet,":[110],"Phishpedia\u2014against":[112],"-generated":[114,181],"observe":[120],"drop":[123],"rates.":[127],"In":[128],"contrast,":[129],"Multimodal":[131],"Large":[132],"Language":[133],"Model":[134],"(MLLM)-based":[135],"detector":[137],"demonstrates":[138],"stronger":[139],"still":[146],"prone":[148],"evasion.":[150],"Our":[151],"findings":[152],"highlight":[153],"vulnerability":[155],"attacks,":[162],"emphasizing":[163],"need":[165],"more":[167],"robust":[168],"approaches.":[170],"Furthermore,":[171],"conduct":[173],"user":[175],"study":[176],"whether":[179],"can":[186],"users.":[188,207],"The":[189],"results":[190],"show":[191],"many":[193],"evade":[199],"not":[200],"only":[201],"also":[206]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
