Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Addressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection

Full metadata record
DC FieldValueLanguage
dc.contributor.authorBacanin, Nebojsa-
dc.contributor.authorZivkovic, Miodrag-
dc.contributor.authorAntonijevic, Milos-
dc.contributor.authorVenkatachalam, K.-
dc.contributor.authorLee, Jinseok-
dc.contributor.authorNam, Yunyoung-
dc.contributor.authorMarjanovic, Marina-
dc.contributor.authorStrumberger, Ivana-
dc.contributor.authorAbouhawwash, Mohamed-
dc.date.accessioned2023-12-14T06:01:37Z-
dc.date.available2023-12-14T06:01:37Z-
dc.date.issued2023-12-
dc.identifier.issn2199-4536-
dc.identifier.issn2198-6053-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/25315-
dc.description.abstractFeature selection and hyper-parameters optimization (tuning) are two of the most important and challenging tasks in machine learning. To achieve satisfying performance, every machine learning model has to be adjusted for a specific problem, as the efficient universal approach does not exist. In addition, most of the data sets contain irrelevant and redundant features that can even have a negative influence on the model's performance. Machine learning can be applied almost everywhere; however, due to the high risks involved with the growing number of malicious, phishing websites on the world wide web, feature selection and tuning are in this research addressed for this particular problem. Notwithstanding that many metaheuristics have been devised for both feature selection and machine learning tuning challenges, there is still much space for improvements. Therefore, the research exhibited in this manuscript tries to improve phishing website detection by tuning extreme learning model that utilizes the most relevant subset of phishing websites data sets features. To accomplish this goal, a novel diversity-oriented social network search algorithm has been developed and incorporated into a two-level cooperative framework. The proposed algorithm has been compared to six other cutting-edge metaheuristics algorithms, that were also implemented in the framework and tested under the same experimental conditions. All metaheuristics have been employed in level 1 of the devised framework to perform the feature selection task. The best-obtained subset of features has then been used as the input to the framework level 2, where all algorithms perform tuning of extreme learning machine. Tuning is referring to the number of neurons in the hidden layers and weights and biases initialization. For evaluation purposes, three phishing websites data sets of different sizes and the number of classes, retrieved from UCI and Kaggle repositories, were employed and all methods are compared in terms of classification error, separately for layers 1 and 2 over several independent runs, and detailed metrics of the final outcomes (output of layer 2), including precision, recall, f1 score, receiver operating characteristics and precision-recall area under the curves. Furthermore, an additional experiment is also conducted, where only layer 2 of the proposed framework is used, to establish metaheuristics performance for extreme machine learning tuning with all features, which represents a large-scale NP-hard global optimization challenge. Finally, according to the results of statistical tests, final research findings suggest that the proposed diversity-oriented social network search metaheuristics on average obtains better achievements than competitors for both challenges and all data sets. Finally, the SHapley Additive exPlanations analysis of the best-performing model was applied to determine the most influential features.-
dc.format.extent36-
dc.language영어-
dc.language.isoENG-
dc.publisherTIERGARTENSTRASSE 17, HEIDELBERG, GERMANY, D-69121-
dc.titleAddressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection-
dc.typeArticle-
dc.publisher.location독일-
dc.identifier.doi10.1007/s40747-023-01118-z-
dc.identifier.scopusid2-s2.0-85163322467-
dc.identifier.wosid001017653700001-
dc.identifier.bibliographicCitationCOMPLEX & INTELLIGENT SYSTEMS, v.9, no.6, pp 7269 - 7304-
dc.citation.titleCOMPLEX & INTELLIGENT SYSTEMS-
dc.citation.volume9-
dc.citation.number6-
dc.citation.startPage7269-
dc.citation.endPage7304-
dc.type.docTypeArticle; Early Access-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordPlusWHALE OPTIMIZATION ALGORITHM-
dc.subject.keywordPlusINTELLIGENCE-
dc.subject.keywordPlusEVOLUTIONARY-
dc.subject.keywordPlusTESTS-
dc.subject.keywordPlusAI-
dc.subject.keywordAuthorExtreme learning machine-
dc.subject.keywordAuthorFeature selection-
dc.subject.keywordAuthorMetaheuristics optimization-
dc.subject.keywordAuthorSocial network search-
dc.subject.keywordAuthorHyper-parameters optimization-
dc.subject.keywordAuthorDiversification-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Nam, Yun young photo

Nam, Yun young
College of Engineering (Department of Computer Science and Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE