Swarm Intelligence Approaches for Parameter Setting of Deep Learning Neural Network: Case Study on Phishing Websites Classification
暂无分享,去创建一个
[1] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[2] T. L. McCluskey,et al. A dynamic self-structuring neural network model to combat phishing , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[3] Yoram Singer,et al. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization , 2011, J. Mach. Learn. Res..
[4] R. Weisberg. A-N-D , 2011 .
[5] Daisuke Miyamoto,et al. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites , 2008, ICONIP.
[6] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[7] T. L. McCluskey,et al. Predicting phishing websites based on self-structuring neural network , 2013, Neural Computing and Applications.
[8] Yurong Liu,et al. A survey of deep neural network architectures and their applications , 2017, Neurocomputing.
[9] Travis E. Oliphant,et al. Guide to NumPy , 2015 .
[10] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[11] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[12] Konstantin Berlin,et al. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys , 2017, ArXiv.
[13] Andrew H. Sung,et al. Rule-Based Phishing Attack Detection , 2011 .
[14] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[15] Fadi A. Thabtah,et al. Phishing detection based Associative Classification data mining , 2014, Expert Syst. Appl..
[16] T. L. McCluskey,et al. An assessment of features related to phishing websites using an automated technique , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[17] Ilango Krishnamurthi,et al. A comprehensive and efficacious architecture for detecting phishing webpages , 2014, Comput. Secur..
[18] Iztok Fister,et al. Artificial neural network regression as a local search heuristic for ensemble strategies in differential evolution , 2015, Nonlinear Dynamics.
[19] Waleed Ali,et al. Phishing Website Detection based on Supervised Machine Learning with Wrapper Features Selection , 2017 .
[20] Sohail Asghar,et al. A Hybrid Model to Detect Phishing-Sites Using Supervised Learning Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[21] A. Azzouz. 2011 , 2020, City.
[22] Kenneth O. Stanley,et al. Revising the evolutionary computation abstraction: minimal criteria novelty search , 2010, GECCO '10.
[23] Martin J. Wainwright,et al. Randomized smoothing for (parallel) stochastic optimization , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[24] T. L. McCluskey,et al. Tutorial and critical analysis of phishing websites methods , 2015, Comput. Sci. Rev..
[25] Li Cheng,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010 .
[26] Fadi Thabtah,et al. Predicting Phishing Websites using Neural Network trained with Back-Propagation , 2013 .
[27] Iztok Fister,et al. A hybrid bat algorithm , 2013, ArXiv.
[28] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[29] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[30] Paul M. Salmon,et al. Taking the Bait: A Systems Analysis of Phishing Attacks , 2015 .
[31] Xin-She Yang,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.