BitBypass: A New Direction in Jailbreaking Aligned Large Language Models with Bitstream Camouflage Authors: Kalyan Nakka, Nitesh Saxena | Published: 2025-06-03 Disabling Safety Mechanisms of LLMDetection Rate of Phishing AttacksPrompt Injection 2025.06.03 2025.06.05 Literature Database
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations Authors: Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, David Mohaisen | Published: 2025-04-24 Detection Rate of Phishing AttacksCertified RobustnessAdversarial Example Detection 2025.04.24 2025.05.27 Literature Database
“Are Adversarial Phishing Webpages a Threat in Reality?” Understanding the Users’ Perception of Adversarial Webpages Authors: Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang | Published: 2024-04-03 Phishing AttackDetection Rate of Phishing AttacksPhishing Detection 2024.04.03 2025.05.27 Literature Database
“Do Users fall for Real Adversarial Phishing?” Investigating the Human response to Evasive Webpages Authors: Ajka Draganovic, Savino Dambra, Javier Aldana Iuit, Kevin Roundy, Giovanni Apruzzese | Published: 2023-11-28 Detection Rate of Phishing AttacksUser Authentication SystemExpert Opinion Collection Process 2023.11.28 2025.05.28 Literature Database
From Chatbots to PhishBots? — Preventing Phishing scams created using ChatGPT, Google Bard and Claude Authors: Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh | Published: 2023-10-29 | Updated: 2024-03-10 Dataset GenerationDetection Rate of Phishing AttacksPrompt Injection 2023.10.29 2025.05.28 Literature Database
Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing Authors: Marc Schmitt, Ivan Flechais | Published: 2023-10-15 Detection Rate of Phishing AttacksMalicious Content GenerationAdvanced Targeting 2023.10.15 2025.05.28 Literature Database
PhishClone: Measuring the Efficacy of Cloning Evasion Attacks Authors: Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere | Published: 2022-09-04 Website Cloning TechnologyDetection Rate of Phishing AttacksPrompt Injection 2022.09.04 2025.05.28 Literature Database
Profiler: Profile-Based Model to Detect Phishing Emails Authors: Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal | Published: 2022-08-18 Phishing AttackDetection Rate of Phishing AttacksMachine Learning Technology 2022.08.18 2025.05.28 Literature Database
Detecting Phishing Sites — An Overview Authors: P. Kalaharsha, B. M. Mehtre | Published: 2021-03-23 | Updated: 2021-04-06 URL-based DetectionPhishingDetection Rate of Phishing Attacks 2021.03.23 2025.05.28 Literature Database