Attacking logo-based phishing website detectors with adversarial perturbations.
Jehyun LeeZhe XinMelanie Ng Pei SeeKanav SabharwalGiovanni ApruzzeseDinil Mon DivakaranPublished in: CoRR (2023)
Keyphrases
- website
- object detection
- spam filtering
- web content
- countermeasures
- web pages
- website design
- multi agent
- identity theft
- negative selection algorithm
- fraud detection
- phishing emails
- web usage mining
- information security
- web navigation
- interest point detectors
- potential customers
- log files
- personal information
- wrapper feature selection