1 code implementation • 17 Jun 2023 • Akshat Gupta, Laxman Singh Tomar, Ridhima Garg
Nevertheless, the problem with both methods is that they require paired sequences of real and fake domain strings to work with, which is often not the case in the real world, as the attacker only sends the illegitimate or homoglyph domain to the vulnerable user.
Ranked #1 on Binary Classification on Glyphnet Dataset