Phishing Website Detection via a Transfer Learning based XGBoost Meta-learner with SMOTE-Tomek
DOI:
https://doi.org/10.59247/jfsc.v3i3.325Keywords:
Phishing Website, SMOTE-Tomek, Data Balancing, Memetic Algorithm, Tree-based EnsemblesAbstract
The widespread proliferation of smartphones has advanced portability, data access ease, mobility, and other merits; it has also birthed adversarial targeting of network resources that seek to compromise unsuspecting user devices. Increased susceptibility was traced to user's personality, which renders them repeatedly vulnerable to exploits. Our study posits a stacked learning model to classify malicious lures used by adversaries on phishing websites. Our hybrid fuses 3-base learners (i.e. Genetic Algorithm, Random Forest, Modular Net) with its output sent as input to the XGBoost. The imbalanced dataset was resolved via SMOTE-Tomek with predictors selected using a relief rank feature selection. Our hybrid yields F1 0.995, Accuracy 1.000, Recall 0.998, Precision 1.000, MCC 1.000, and Specificity 1.000 – to accurately classify all 3,316 cases of its held-out test dataset. Results affirm that it outperformed benchmark ensembles. The study shows that our proposed model, as explored on the UCI Phishing Website dataset, effectively classified phishing (cues and lures) contents on websites.
References
F. O. Aghware et al., “Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection,” Journal of Computing Theories and Applications, vol. 1, no. 4, pp. 407–420, 2024, https://doi.org/10.62411/jcta.10323.
D. A. Obasuyi et al., “NiCuSBlockIoT: Sensor-based Cargo Assets Management and Traceability Blockchain Support for Nigerian Custom Services,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 15, no. 2, pp. 45–64, 2024, https://doi.org/10.22624/AIMS/CISDI/V15N2P4.
H. Alamleh, A. A. S. Alqahtani, and B. Al Smadi, “Secure Mobile Payment Architecture Enabling Multi-factor Authentication,” 2023 Systems and Information Engineering Design Symposium, SIEDS 2023, pp. 19–24, 2023, https://doi.org/10.1109/SIEDS58326.2023.10137778.
A. A. Ojugo et al., “Forging a learner-centric blended-learning framework via an adaptive content-based architecture,” Science in Information Technology Letters, vol. 4, no. 1, pp. 40–53, 2023, https://doi.org/10.31763/sitech.v4i1.1186.
L. De Kimpe, M. Walrave, W. Hardyns, L. Pauwels, and K. Ponnet, “You’ve got mail! Explaining individual differences in becoming a phishing target,” Telematics and Informatics, vol. 35, no. 5, pp. 1277–1287, 2018, https://doi.org/10.1016/j.tele.2018.02.009.
P. O. Ejeh et al., “Counterfeit Drugs Detection in the Nigeria Pharma-Chain via Enhanced Blockchain-based Mobile Authentication Service,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 12, no. 2, pp. 25–44, 2024, https://doi.org/10.22624/aims/maths/v12n2p3.
B. O. Malasowe, M. I. Akazue, E. A. Okpako, F. O. Aghware, A. A. Ojugo, and D. V. Ojie, “Adaptive Learner-CBT with Secured Fault-Tolerant and Resumption Capability for Nigerian Universities,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 8, pp. 135–142, 2023, https://doi.org/10.14569/IJACSA.2023.0140816.
Ifoko, A.M. et al., “StreamBoostE: A Hybrid Boosting-Collaborative Filter Scheme for Adaptive User-Item Recommender for Streaming Services,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 10, no. 2, pp. 89–106, 2024, https://doi.org/10.22624/aims/v10n2p8.
E. A. Otorokpo et al., “DaBO-BoostE: Enhanced Data Balancing via Oversampling Technique for a Boosting Ensemble in Card-Fraud Detection,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 12, no. 2, pp. 45–66, 2024, https://doi.org/10.22624/aims/maths/v12n2p4.
Ifoko, A.M. et al., “CoDuBoTeSS: A Pilot Study to Eradicate Counterfeit Drugs via a Blockchain Tracer Support System on the Nigerian Frontier,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 10, no. 2, pp. 53–74, 2024, https://doi.org/10.22624/aims/bij/v10n1p6.
A. Ibor, E. Edim, and A. Ojugo, “Secure Health Information System with Blockchain Technology,” Journal of the Nigerian Society of Physical Sciences, vol. 5, no. 2, p. 992, 2023, https://doi.org/10.46481/jnsps.2023.992.
G. Sasikala et al., “An Innovative Sensing Machine Learning Technique to Detect Credit Card Frauds in Wireless Communications,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–12, 2022, https://doi.org/10.1155/2022/2439205.
M. D. Okpor et al., “Unmasking effects of feature selection and SMOTE-Tomek in tree-based random forest for scorch occurrence detection,” Bulletin of Electrical Engineering and Informatics, vol. 14, no. 3, pp. 2393–2403, 2025, https://doi.org/10.11591/eei.v14i3.8901.
P. Onoma et al., “Attrition rate prediction using a frequency-recency-monetization-based smoteen-boosted approach,” International Journal of Advanced Computing and Intelligent System, vol. 3, no. 1, pp. 1–11, 2025, https://msis-press.com/paper/ijacis/3/1/20.
A. A. Ojugo and A. O. Eboka, “Comparative Evaluation for High Intelligent Performance Adaptive Model for Spam Phishing Detection,” Digital Technologies, vol. 3, no. 1, pp. 9–15, 2018, https://doi.org/10.12691/dt-3-1-2.
O. Okolo, B. Y. Baha, and M. D. Philemon, “Using Causal Graph Model variable selection for BERT models Prediction of Patient Survival in a Clinical Text Discharge Dataset,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 4, pp. 455–473, 2025, https://doi.org/10.62411/faith.3048-3719-61.
C. Li, N. Ding, H. Dong, and Y. Zhai, “Application of Credit Card Fraud Detection Based on CS-SVM,” International Journal of Machine Learning and Computing, vol. 11, no. 1, pp. 34–39, 2021, https://doi.org/10.18178/ijmlc.2021.11.1.1011.
A. O. Eboka et al., “Pilot study on deploying a wireless sensor-based virtual-key access and lock system for home and industrial frontiers,” International Journal of Informatics and Communication Technology, vol. 14, no. 1, pp. 287–297, 2025, https://doi.org/10.11591/ijict.v14i1.pp287-297.
D. Huang, Y. Lin, Z. Weng, and J. Xiong, “Decision Analysis and Prediction Based on Credit Card Fraud Data,” in ACM International Conference Proceeding Series, pp. 20–26, 2021, https://doi.org/10.1145/3478301.3478305.
I. A. Anderson and W. Wood, “Habits and the electronic herd: The psychology behind social media’s successes and failures,” Consumer Psychology Review, vol. 4, no. 1, pp. 83–99, 2021, https://doi.org/10.1002/arcp.1063.
A. Razaque et al., “Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms,” Applied Sciences (Switzerland), vol. 13, no. 1, p. 57, 2023, https://doi.org/10.3390/app13010057.
V. O. Geteloma et al., “Enhanced data augmentation for predicting consumer churn rate with monetization and retention strategies: a pilot study,” Applied Engineering and Technology, vol. 3, no. 1, pp. 35–51, 2024, https://doi.org/10.31763/aet.v3i1.1408.
V. O. Geteloma et al., “AQuamoAS: unmasking a wireless sensor-based ensemble for air quality monitor and alert system,” Applied Engineering and Technology, vol. 3, no. 2, pp. 70–85, 2024, https://doi.org/10.31763/aet.v3i2.1409.
S. Adamu, A. Iorliam, and Ö. Asilkan, “Exploring Explainability in Multi-Category Electronic Markets: A Comparison of Machine Learning and Deep Learning Approaches,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 4, pp. 440–454, 2025, https://doi.org/10.62411/faith.3048-3719-58.
S. Alnemari and M. Alshammari, “Detecting Phishing Domains Using Machine Learning,” Applied Sciences (Switzerland), vol. 13, no. 8, p. 4649, 2023, https://doi.org/10.3390/app13084649.
M. Ahmed, K. Ansar, C. B. Muckley, A. Khan, A. Anjum, and M. Talha, “A semantic rule based digital fraud detection,” PeerJ Computer Science, vol. 7, pp. 1–21, 2021, https://doi.org/10.7717/PEERJ-CS.649.
D. R. I. M. Setiadi, A. Susanto, K. Nugroho, A. R. Muslikh, A. A. Ojugo, and H. S. Gan, “Rice Yield Forecasting Using Hybrid Quantum Deep Learning Model,” Computers, vol. 13, no. 8, pp. 1–18, 2024, https://doi.org/10.3390/computers13080191.
M. A. Haque et al., “Cybersecurity in Universities: An Evaluation Model,” SN Computer Science, vol. 4, no. 5, 2023, https://doi.org/10.1007/s42979-023-01984-x.
A. A. Ojugo, C. O. Obruche, and A. O. Eboka, “Quest For Convergence Solution Using Hybrid Genetic Algorithm Trained Neural Network Model For Metamorphic Malware Detection,” ARRUS Journal of Engineering and Technology, vol. 2, no. 1, pp. 12–23, 2021, https://doi.org/10.35877/jetech613.
T. Muralidharan and N. Nissim, “Improving malicious email detection through novel designated deep-learning architectures utilizing entire email,” Neural Networks, vol. 157, pp. 257-279, 2023, https://doi.org/10.1016/j.neunet.2022.09.002.
S. F. Tan and G. C. Chung, “An Evaluation Study of User Authentication in the Malaysian FinTech Industry With uAuth Security Analytics Framework,” Journal of Cases on Information Technology, vol. 25, no. 1, pp. 1–27, 2023, https://doi.org/10.4018/JCIT.318703.
M. D. Okpor et al., “Pilot Study on Enhanced Detection of Cues over Malicious Sites Using Data Balancing on the Random Forest Ensemble,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 109–123, 2024, https://doi.org/10.62411/faith.2024-14.
A. A. Ojugo et al., “CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 163–173, 2023, https://doi.org/10.33633/jcta.v1i2.9355.
M. I. Akazue et al., “FiMoDeAL: pilot study on shortest path heuristics in wireless sensor network for fire detection and alert ensemble,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 5, pp. 3534–3543, 2024, https://doi.org/10.11591/eei.v13i5.8084.
V. Umarani, A. Julian, and J. Deepa, “Sentiment Analysis using various Machine Learning and Deep Learning Techniques,” Journal of the Nigerian Society of Physical Sciences, vol. 3, no. 4, pp. 385–394, 2021, doi: https://doi.org/10.46481/jnsps.2021.308.
J. Agboi et al., “Lung Cancer Detection using a Hybridized Contrast-based Xception Model on Image Data: A Pilot Study,” MSIS - international Journal of Advanced Computing and Intelligent System, vol. 4, no. 1, pp. 1–11, 2025, https://msis-press.com/paper/ijacis/4/1/21.
S. K. Shandilya, "Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data: The Future Ahead," in Journal of Web Engineering, vol. 21, no. 4, pp. 1371-1376, 2022, https://doi.org/10.13052/jwe1540-9589.21416.
M. I. Akazue, I. A. Debekeme, A. E. Edje, C. Asuai, and U. J. Osame, “UNMASKING FRAUDSTERS: Ensemble Features Selection to Enhance Random Forest Fraud Detection,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 201–211, 2023, https://doi.org/10.33633/jcta.v1i2.9462.
A. A. Ojugoa et al., “Evidence of Students’ Academic Performance at the Federal College of Education Asaba Nigeria: Mining Education Data,” Knowledge Engineering and Data Science, vol. 6, no. 2, p. 145, 2023, https://doi.org/10.17977/um018v6i22023p145-156.
L. R. Zuama, D. R. I. M. Setiadi, A. Susanto, S. Santosa, H.-S. Gan, and A. A. Ojugo, “High-Performance Face Spoofing Detection using Feature Fusion of FaceNet and Tuned DenseNet201,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 4, pp. 385–400, 2025, https://doi.org/10.62411/faith.3048-3719-62.
A. A. Ojugo and O. Nwankwo, “Spectral-Cluster Solution For Credit-Card Fraud Detection Using A Genetic Algorithm Trained Modular Deep Learning Neural Network,” JINAV: Journal of Information and Visualization, vol. 2, no. 1, pp. 15–24, 2021, https://doi.org/10.35877/454ri.jinav274.
J. Yao, C. Wang, C. Hu, and X. Huang, “Chinese Spam Detection Using a Hybrid BiGRU-CNN Network with Joint Textual and Phonetic Embedding,” Electronics (Switzerland), vol. 11, no. 15, p. 2418, 2022, https://doi.org/10.3390/electronics11152418.
A. Ojugo and A. O. Eboka, “An Empirical Evaluation On Comparative Machine Learning Techniques For Detection of The Distributed Denial of Service (DDoS) Attacks,” Journal of Applied Science, Engineering, Technology, and Education, vol. 2, no. 1, pp. 18–27, 2020, https://doi.org/10.35877/454ri.asci2192.
M. I. Akazue et al., “Handling Transactional Data Features via Associative Rule Mining for Mobile Online Shopping Platforms,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 3, pp. 530–538, 2024, https://doi.org/10.14569/IJACSA.2024.0150354.
R. E. Ako et al., “Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost,” Journal of Computing Theories and Applications, vol. 2, no. 1, pp. 86–101, 2024, https://doi.org/10.62411/jcta.10562.
P. A. Onoma et al., “Investigating an Anomaly-based Intrusion Detection via Tree-based Adaptive Boosting Ensemble,” Journal of Fuzzy Systems and Control, vol. 3, no. 1, pp. 90–97, 2025, https://doi.org/10.59247/jfsc.v3i1.279.
P. A. Onoma et al., “Voice-based Dynamic Time Warping Recognition Scheme for Enhanced Database Access Security,” Journal of Fuzzy Systems and Control, vol. 3, no. 1, pp. 81–89, 2025, https://doi.org/10.59247/jfsc.v3i1.293.
J. Raphel and P. Vinod, “Heterogeneous opcode space for metamorphic malware detection,” Arabian Journal for Science and Engineering, vol. 42, no. 2, pp. 537-558, 2017, https://doi.org/10.1007/s13369-016-2264-6.
D. R. I. Moses Setiadi et al., “Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps: An Ultra-Wide Range Dynamics for Image Encryption,” Computers, Materials and Continua, vol. 83, no. 2, pp. 2161–2188, 2025, https://doi.org/10.32604/cmc.2025.063729.
A. P. Binitie et al., “Stacked Learning Anomaly Detection Scheme with Data Augmentation for Spatiotemporal Traffic Flow,” Journal of Fuzzy Systems and Control, vol. 2, no. 3, pp. 203–214, 2024, https://doi.org/10.59247/jfsc.v2i3.267.
A. Adimabua Ojugo, “Dependable Community-Cloud Framework for Smartphones,” American Journal of Networks and Communications, vol. 4, no. 4, p. 95, 2015, https://doi.org/10.11648/j.ajnc.20150404.13.
S. Srivatsan, S. K. Bamrah, and K. S. Gayathri, “Determining the Severity of Dementia Using Ensemble Learning,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13773 LNCS, pp. 117–135, 2022, https://doi.org/10.1007/978-3-031-24094-2_8.
A. O. Eboka et al., “Resolving Data Imbalance Using a Bi-Directional Long-Short Term Memory for Enhanced Diabetes Mellitus Detection,” Journal of Future Artificial Intelligence and Technologies, vol. 2, no. 1, pp. 95–109, 2025, https://doi.org/10.62411/faith.3048-3719-73.
B. O. Malasowe, F. O. Aghware, M. D. Okpor, E. B. Edim, R. E. Ako, and A. A. Ojugo, “Techniques and Best Practices for Handling Cybersecurity Risks in Educational Technology Environment (EdTech),” NIPES - Journal of Science and Technology Research, vol. 6, no. 2, pp. 293–311, 2024, https://doi.org/10.5281/zenodo.12617068.
A. A. Ojugo and A. O. Eboka, “Extending Campus Network Via Intranet and IP-Telephony for Better Performance and Service Delivery: Meeting Organizational Goals,” Journal of Applied Science, Engineering, Technology, and Education, vol. 1, no. 2, pp. 94–104, 2019, https://doi.org/10.35877/454ri.asci12100.
M. S. Ataa, E. E. Sanad, and R. A. El-khoribi, “Intrusion detection in software defined network using deep learning approaches,” Scientific Reports, vol. 14, no. 1, pp. 1–15, 2024, https://doi.org/10.1038/s41598-024-79001-1.
B. O. Malasowe, A. E. Okpako, M. D. Okpor, P. O. Ejeh, A. A. Ojugo, and R. E. Ako, “FePARM: The Frequency-Patterned Associative Rule Mining Framework on Consumer Purchasing-Pattern for Online Shops,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 15, no. 2, pp. 15–28, 2024, https://doi.org/10.22624/aims/cisdi/v15n2p2-1.
R. E. Yoro and A. A. Ojugo, “Quest for Prevalence Rate of Hepatitis-B Virus Infection in the Nigeria: Comparative Study of Supervised Versus Unsupervised Models,” American Journal of Modeling and Optimization, vol. 7, no. 2, pp. 42–48, 2019, https://doi.org/10.12691/ajmo-7-2-2.
A. N. Safriandono, D. R. I. M. Setiadi, A. Dahlan, F. Z. Rahmanti, I. S. Wibisono, and A. A. Ojugo, “Analyzing Quantum Feature Engineering and Balancing Strategies Effect on Liver Disease Classification,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 1, pp. 51–63, 2024, https://doi.org/10.62411/faith.2024-12.
N. Ben Yahia, M. Dhiaeddine Kandara, and N. Bellamine BenSaoud, “Integrating Models and Fusing Data in a Deep Ensemble Learning Method for Predicting Epidemic Diseases Outbreak,” Big Data Research, vol. 27, 2022, https://doi.org/10.1016/j.bdr.2021.100286.
C. C. Odiakaose et al., “Hypertension Detection via Tree-Based Stack Ensemble with SMOTE-Tomek Data Balance and XGBoost Meta-Learner,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 3, pp. 269–283, 2024, https://doi.org/10.62411/faith.3048-3719-43.
R. J. Urbanowicz, M. Meeker, W. La Cava, R. S. Olson, and J. H. Moore, “Relief-based feature selection: Introduction and review,” Journal of Biomedical Informatics, vol. 85, pp. 189–203, Sep. 2018, doi: https://doi.org/10.1016/j.jbi.2018.07.014.
R. E. Ako et al., “Pilot Study on Fibromyalgia Disorder Detection via XGBoosted Stacked-Learning with SMOTE-Tomek Data
Balancing Approach,” NIPES - Journal of Science and Technology Research, vol. 7, no. 1, pp. 12–22, 2025, https://doi.org/10.37933/nipes/7.1.2025.2.
N. Islam et al., “Towards Machine Learning Based Intrusion Detection in IoT Networks,” Computers, Materials and Continua, vol. 69, no. 2, pp. 1801–1821, 2021, https://doi.org/10.32604/cmc.2021.018466.
E. V. Ugbotu et al., “Transfer Learning Using a CNN Fused Random Forest for SMS Spam Detection with Semantic Normalization of Text Corpus,” NIPES - Journal of Science and Technology Research, vol. 7, no. 2, pp. 371–382, 2025, https://doi.org/10.37933/nipes/7.2.2025.29.
D. R. I. M. Setiadi et al., “Integrating Hybrid Statistical and Unsupervised LSTM-Guided Feature Extraction for Breast Cancer Detection,” Journal of Computing Theories and Applications, vol. 2, no. 4, pp. 536–552, 2025, https://doi.org/10.62411/jcta.12698.
C. C. Odiakaose et al., “Investigating Data Balancing Effects for Enhanced Behavioural Risk Detection in Cervical Cancer Using BiGRU: A Pilot Study,” NIPES - Journal of Science and Technology Research, vol. 7, no. 2, pp. 319–329, 2025, https://doi.org/10.37933/nipes/7.2.2025.24.
T. C. Aghaunor et al., “Enhanced Scorch Occurrence Prediction in Foam Production via a Fusion SMOTE-Tomek Balanced Deep Learning Scheme,” NIPES - Journal of Science and Technology Research, vol. 7, no. 2, pp. 330–339, 2025, https://doi.org/10.37933/nipes/7.2.2025.25.
O. Sinayobye, R. Musabe, A. Uwitonze, and A. Ngenzi, “A Credit Card Fraud Detection Model Using Machine Learning Methods with a Hybrid of Undersampling and Oversampling for Handling Imbalanced Datasets for High Scores,” in Communications in Computer and Information Science, 2023, vol. 1818 CCIS, pp. 142–155, 2023, https://doi.org/10.1007/978-3-031-34222-6_12.
A. A. Ojugo, P. O. Ejeh, C. C. Odiakaose, A. O. Eboka, and F. U. Emordi, “Predicting rainfall runoff in Southern Nigeria using a fused hybrid deep learning ensemble,” International Journal of Informatics and Communication Technology, vol. 13, no. 1, pp. 108–115, 2024, https://doi.org/10.11591/ijict.v13i1.pp108-115.
F. O. Aghware et al., “Effects of Data Balancing in Diabetes Mellitus Detection: A Comparative XGBoost and Random Forest Learning Approach,” NIPES - Journal of Science and Technology Research, vol. 7, no. 1, pp. 1–11, 2025, https://doi.org/10.37933/nipes/7.1.2025.1.
A. A. Ojugo and D. O. Otakore, “Redesigning Academic Website for Better Visibility and Footprint: A Case of the Federal University of Petroleum Resources Effurun Website,” Network and Communication Technologies, vol. 3, no. 1, p. 33, 2018, https://doi.org/10.5539/nct.v3n1p33.
M. D. Okpor et al., “Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles,” Journal of Fuzzy Systems and Control, vol. 2, no. 2, pp. 117–128, 2024, https://doi.org/10.59247/jfsc.v2i2.213.
A. Jolicoeur-Martineau, J. J. Li, and C. M. T. Greenwood, “Statistical modeling of GxE,” Prenatal Stress and Child Development, vol. 58, no. 11, pp. 433–466, 2021, https://doi.org/10.1007/978-3-030-60159-1_15.
H. Said, B. B. S. Tawfik, and M. A. Makhlouf, “A Deep Learning Approach for Sentiment Classification of COVID-19 Vaccination Tweets,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 4, pp. 530–538, 2023, https://doi.org/10.14569/IJACSA.2023.0140458.
N. R. Pratama, D. R. I. M. Setiadi, I. Harkespan, and A. A. Ojugo, “Feature Fusion with Albumentation for Enhancing Monkeypox Detection Using Deep Learning Models,” Journal of Computer Theory and Applications, vol. 2, no. 3, pp. 427–440, 2025, https://doi.org/10.62411/jcta.12255.
A. A. Ojugo and D. A. Oyemade, “Predicting Diffusion Dynamics Of The Coronavirus In Nigeria Through Ties-Strength Threshold
On A Cascading SI-Graph,” Technology Reports of Kansai University, vol. 62, no. 08, pp. 126–132, 2020, https://doi.org/TRKU-13-08-2020-10998.
D. R. I. M. Setiadi, K. Nugroho, A. R. Muslikh, S. W. Iriananda, and A. A. Ojugo, “Integrating SMOTE-Tomek and Fusion Learning with XGBoost Meta-Learner for Robust Diabetes Recognition,” Journal of Future Artificial Intelligence Technology, vol. 1, no. 1, pp. 23–38, 2024, https://doi.org/10.62411/faith.2024-11.
C. C. Odiakaose, et al., “Hybrid Genetic Algorithm Trained Bayesian Ensemble for Short Messages Spam Detection,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 12, no. 1, pp. 37–52, 2024, https://doi.org/10.22624/aims/maths/v12n1p4.
C. Odiakaose et al., “DeLEMPaD: Pilot Study on a Deep Learning Ensemble for Energy Market Prediction of Price Volatility and Direction. Computing, Information Systems,” 2024-www.isteams.net/cisdijournal.net CISDI Journal Reference Format Christopher Odiakaose, vol. 15, no. 1, pp. 47–62, 2024, https://doi.org/10.22624/AIMS/CISDI/V15N1P4.
A. A. Ojugo, E. Ben Iwhiwhu, O. Kekeje, M. O. Yerokun, and I. J. B. Iyawa, “Malware Propagation on Social Time Varying Networks: A Comparative Study of Machine Learning Frameworks,” International Journal of Modern Education and Computer Science, vol. 6, no. 8, pp. 25–33, 2014, https://doi.org/10.5815/ijmecs.2014.08.04.
F. U. Emordi, et al., “TiSPHiMME: Time Series Profile Hidden Markov Ensemble in Resolving Item Location on Shelf Placement in Basket Analysis,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 12, no. 1, pp. 33–48, 2024, https://doi.org/10.22624/aims/digital/v11n4p3.
B. F. Alkhalil, Y. Zhuang, K. T. Mursi and A. O. Aseeri, "Game-Theory-Based Analysis of Key Factors Influencing Saudi Consumer Trust in E-commerce," 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1-7, 2024, https://doi.org/10.1109/HORA61326.2024.10550488.
N. Rtayli and N. Enneya, “Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization,” Journal of Information Security and Applications, vol. 55, p. 102596, 2020, https://doi.org/10.1016/j.jisa.2020.102596.
F. Omoruwou, A. A. Ojugo, and S. E. Ilodigwe, “Strategic Feature Selection for Enhanced Scorch Prediction in Flexible Polyurethane Form Manufacturing,” Journal of Computing Theories and Applications, vol. 1, no. 3, pp. 346–357, 2024, https://doi.org/10.62411/jcta.9539.
A. R. Muslikh, D. R. I. M. Setiadi, and A. A. Ojugo, “Rice Disease Recognition Using Transfer Learning Xception Convolutional Neural Network,” Jurnal Teknik Informatika (Jutif), vol. 4, no. 6, pp. 1535–1540, 2023, https://doi.org/10.52436/1.jutif.2023.4.6.1529.
P. Kumari and S. Mittal, "Fraud Detection System for Financial System Using Machine Learning Techniques: A Review," 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1-6, 2024, https://doi.org/10.1109/ICRITO61523.2024.10522197.
A. A. Ojugo and C. O. Obruche, “Empirical Evaluation for Intelligent Predictive Models in Prediction of Potential Cancer Problematic Cases In Nigeria,” ARRUS Journal of Mathematics and Applied Science, vol. 1, no. 2, pp. 110–120, 2021, https://doi.org/10.35877/mathscience614.
S. N. Okofu et al., “Pilot Study on Consumer Preference, Intentions and Trust on Purchasing-Pattern for Online Virtual Shops,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 7, pp. 804–811, 2024, https://doi.org/10.14569/IJACSA.2024.0150780.
A. A. Ojugo et al., “Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 50–60, 2023, https://doi.org/10.33633/jcta.v1i2.9259.
S. Ju et al., “Optimal county-level crop yield prediction using MODIS-based variables and weather data: A comparative study on machine learning models,” Agricultural and Forest Meteorology, vol. 307, p. 108530, 2021, https://doi.org/10.1016/j.agrformet.2021.108530.
Y. Abakarim, M. Lahby, and A. Attioui, “An efficient real time model for credit card fraud detection based on deep learning,” in ACM International Conference Proceeding Series, pp. 1–7, 2018, https://doi.org/10.1145/3289402.3289530.
A. Ghasemieh, A. Lloyed, P. Bahrami, P. Vajar, and R. Kashef, “A novel machine learning model with Stacking Ensemble Learner for predicting emergency readmission of heart-disease patients,” Decision Analytics Journal, vol. 7, p. 100242, 2023, https://doi.org/10.1016/j.dajour.2023.100242.
C. L. Kumar et al., “Metaparameter optimized hybrid deep learning model for next generation cybersecurity in software defined networking environment,” Scientific Reports, vol. 15, no. 1, 2025, https://doi.org/10.1038/s41598-025-96153-w.
M. D. Okpor et al., “Pilot study on enhanced detection of cues over malicious sites using data balancing on the random forest ensemble,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 109-123, 2024, https://doi.org/10.62411/faith.2024-14.
K. Muhamada, D. R. I. M. Setiadi, U. Sudibyo, B. Widjajanto, and A. A. Ojugo, “Exploring Machine Learning and Deep Learning Techniques for Occluded Face Recognition: A Comprehensive Survey and Comparative Analysis,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 160–173, 2024, https://doi.org/10.62411/faith.2024-30.
S. Pavithra and K. Venkata Vikas, "Detecting Unbalanced Network Traffic Intrusions With Deep Learning," in IEEE Access, vol. 12, pp. 74096-74107, 2024, https://doi.org/10.1109/ACCESS.2024.3405187.
D. Sun, M. Liu, M. Li, Z. Shi, P. Liu, and X. Wang, “DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network,” in Proceedings of the 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2021, May 2021, pp. 335–341, 2021, https://doi.org/10.1109/CSCWD49262.2021.9437887.
A. A. Ojugo, P. O. Ejeh, O. C. Christopher, A. O. Eboka, and F. U. Emordi, “Improved distribution and food safety for beef processing and management using a blockchain-tracer support framework,” International Journal of Informatics and Communication Technology, vol. 12, no. 3, pp. 205–213, 2023, https://doi.org/10.11591/ijict.v12i3.pp205-213.
R. E. Yoro et al., “Adaptive DDoS detection mode in software-defined SIP-VoIP using transfer learning with boosted meta-learner,” Plos One, vol. 20, no. 6, p. e0326571, 2025, https://doi.org/10.1371/journal.pone.0326571.
L. K. Y. Loh et al., “An ensembling architecture incorporating machine learning models and genetic algorithm optimization for forex trading,” FinTech, vol. 1, no. 2, pp. 100-124, 2022, https://doi.org/10.3390/fintech1020008.
L. Lakshmi, M. P. Reddy, C. Santhaiah, and U. J. Reddy, “Smart Phishing Detection in Web Pages using Supervised Deep Learning Classification and Optimization Technique ADAM,” Wireless Personal Communications, vol. 118, no. 4, pp. 3549–3564, 2021, https://doi.org/10.1007/s11277-021-08196-7.
D. R. I. M. Setiadi, S. Widiono, A. N. Safriandono, and S. Budi, “Phishing Website Detection Using Bidirectional Gated Recurrent Unit Model and Feature Selection,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 75–83, 2024, https://doi.org/10.62411/faith.2024-15.
Y. A. Alsariera, A. V. Elijah, and A. O. Balogun, “Phishing Website Detection: Forest by Penalizing Attributes Algorithm and Its Enhanced Variations,” Arabian Journal for Science and Engineering, vol. 45, no. 12, pp. 10459–10470, 2020, https://doi.org/10.1007/s13369-020-04802-1.
F. O. Aghware, R. E. Yoro, P. O. Ejeh, C. C. Odiakaose, F. U. Emordi, and A. A. Ojugo, “DeLClustE: Protecting Users from Credit-Card Fraud Transaction via the Deep-Learning Cluster Ensemble,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 6, pp. 94–100, 2023, https://doi.org/10.14569/IJACSA.2023.0140610.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Joy Agboi, Frances Uche Emordi, Christopher Chukwufunaya Odiakaose, Rebecca Okeoghene Idama, Evans Fubara Jumbo, Amanda Enaodona Oweimieotu, Peace Oguguo Ezzeh, Andrew Okonji Eboka, Anne Odoh, Eferhire Valentine Ugbotu, Paul Avwerosuoghene Onoma, Arnold Adimabua Ojugo, Tabitha Chukwudi Aghaunor, Amaka Patience Binitie, Christopher Chukwudi Onochie, Patrick Ogholuwarami Ejeh, Blessing Uche Nwozor

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.