An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Article Properties
Cite
Nowroozi, Ehsan, et al. “An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework”. IEEE Transactions on Network and Service Management, vol. 20, no. 2, 2023, pp. 1332-44, https://doi.org/10.1109/tnsm.2022.3225217.
Nowroozi, E., Mohammadi, M., & Conti, M. (2023). An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. IEEE Transactions on Network and Service Management, 20(2), 1332-1344. https://doi.org/10.1109/tnsm.2022.3225217
Nowroozi, Ehsan, Mohammadreza Mohammadi, and Mauro Conti. “An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework”. IEEE Transactions on Network and Service Management 20, no. 2 (2023): 1332-44. https://doi.org/10.1109/tnsm.2022.3225217.
Nowroozi E, Mohammadi M, Conti M. An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. IEEE Transactions on Network and Service Management. 2023;20(2):1332-44.
Refrences
Title Journal Journal Categories Citations Publication Date
An antiphishing strategy based on visual similarity assessment IEEE Internet Computing
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2006
Building a dynamic reputation system for DNS 2010
Feature importance guided attack: A model agnostic adversarial attack 2021
Malicious URL detection using machine learning: A survey 2017
Attacking visual language grounding with adversarial examples: A case study on neural image captioning 2017
Citations
Title Journal Journal Categories Citations Publication Date
An Automatic Detection System for Fake Japanese Shopping Sites Using fastText and LightGBM IEEE Access
  • Technology: Electrical engineering. Electronics. Nuclear engineering
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
2023
The K Critical Path Sets to Protect in Interdiction Networks Under Limited Defensive Resources IEEE Transactions on Network and Service Management 2023
Citations Analysis
The category Technology: Electrical engineering. Electronics. Nuclear engineering 1 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled An Automatic Detection System for Fake Japanese Shopping Sites Using fastText and LightGBM and was published in 2023. The most recent citation comes from a 2023 study titled An Automatic Detection System for Fake Japanese Shopping Sites Using fastText and LightGBM. This article reached its peak citation in 2023, with 2 citations. It has been cited in 2 different journals, 50% of which are open access. Among related journals, the IEEE Access cited this research the most, with 1 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year