Main Article Content
Abstract
Phishing attacks are still the main and most severe vulnerability to cyber security through deceptive URLs for sensitive user information. Therefore, this paper proposes a framework based on deep learning techniques for phishing and legitimate URLs as an alternative to the currently employed blacklist-based detection approaches that have proven rather limited. The architecture includes one custom Convolutional Neural Network (CNN) and three Transfer Learning Architectures, ResNet50, InceptionV3, and VGG16 using representations of features based on URLs. All models under consideration shall be trained with Adam Optimizer and Binary Cross-Entropy loss function so that a fair comparison can be made under unified experimental set-up conditions. The set is broken down as 70% training, 10% validation, and 20% testing. Experimental results provide clear evidence that transfer learning models perform much better than the baseline CNN. The InceptionV3 model posted a validation accuracy of 100% leading the pack, followed by VGG16 at 98.96%. ResNet50 could muster only 97.92%. The proposed CNN model has also achieved quite competitive performance with a validation accuracy above 97%. Therefore, these results are explicit in confirming the effectiveness, robustness, and generalization capability of deep learning architectures toward the problem of phishing URL detection. This proposed framework will go a long way in ensuring web security is beefed up as it creates a barrier against all evolving cyber threats.
Keywords
Article Details
Copyright (c) 2025 Hind Abdulkareem Abdalrazaq (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
- J. Kline, E. Oakes, and P. Barford, ‘‘A URL-based analysis of WWW structure and dynamics,’’ in Proc. Netw. Traffic Meas. Anal. Conf. (TMA), Jun. 2019, p.800.doi:https://doi.org/10.23919/TMA.2019.8784665
- P. Flach and M. Kull, ‘‘Precision-recall-gain curves: PR analysis done right,’’ in Proc. Adv. Neural Inf. Process. Syst., 2015, pp. 838–846.
- R. S. Rao and A. R. Pais, ‘‘Detection of phishing websites using an efficient feature-based machine learning framework,’’ Neural Comput. Appl., vol. 31, no. 8, pp. 3851–3873, Aug. 2019.doi:https://doi.org/ 10.17577/IJERTV9IS050888
- H. Shahriar and S. Nimmagadda, ‘‘Network intrusion detection for TCP/IP packets with machine learning techniques,’’ in Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Cham, Switzerland: Springer, 2020, pp. 231–247.doi: https://doi.org/10.1007/978-3-030-57024-8_10
- T. Nathezhtha, D. Sangeetha, and V. Vaidehi, ‘‘WC-PAD: Web crawling based phishing attack detection,’’ in Proc. Int. Carnahan Conf. Secur. Technol. (ICCST), Oct. 2019, pp. 1–6. (2020). Accessed:Jan.2020.doi:https://doi.org/10.1109/ccst.2019.8888416
- S. Bell and P. Komisarczuk, ‘‘An analysis of phishing blacklists: Google safe browsing, OpenPhish, and PhishTank,’’ in Proc. Australas. Comput. Sci. Week Multiconf. (ACSW), Melbourne, VIC, Australia. New York, NY, USA: Association for Computing Machinery, 2020, pp. 1–11, Art. no. 3, doi: https://doi.org/10.1145/3373017.3373020
- G. Diksha and J. A. Kumar, ‘‘Mobile phishing attacks and defence mechanisms: State of art and open research challenges,’’ Comput. Secur., vol. 73, pp. 519–544, Mar. 2018.doi: https://doi.org/10.1016/j.cose.2017.12.006
- V. Shahrivari, M. M. Darabi, and M. Izadi, ‘‘Phishing detection using machine learning techniques,’’ 2020, arXiv:2009.11116.doi: https://doi.org/10.52783/pst.1643
- S. Wang, S. Khan, C. Xu, S. Nazir, and A. Hafeez, ‘‘Deep learning-based efficient model development for phishing detection using random forest and BLSTM classifiers,’’ Complexity, vol. 2020, pp. 1–7, Sep.2020.doi: https://doi.org/10.1155/2020/8694796
- G. Sonowal and K. S. Kuppusamy, ‘‘PhiDMA—A phishing detection model with multi-filter approach,’’ J. King Saud Univ., Comput. Inf. Sci., vol. 32, no. 1, pp. 99–112, Jan. 2020.doi: https://doi.org/10.1016/j.jksuci.2017.07.005
- M. Babagoli, M. P. Aghababa, and V. Solouk, ‘‘Heuristic nonlinear regression strategy for detecting phishing websites,’’ Soft Comput., vol. 23, no. 12, pp. 4315-4327,Jun.2.doi: https://doi.org/10.1007/s00500-018-3084-2
- R. S. Rao and A. R. Pais, ‘‘Detection of phishing websites using an efficient feature-based machine learning framework,’’ Neural Comput. Appl., vol. 31, no. 8, pp. 3851–3873, Aug. 2019.doi: https://doi.org/10.1007/s00521-017-3305-0
- Y. Feng, Q. Wang, D. Wu, Z. Luo, X. Chen, T. Zhang, and W. Gao, ‘‘Machine learning aided phase field method for fracture mechanics,’’ Int. J. Eng. Sci., vol. 169, Dec. 2021, Art. no. 103587.doi: https://doi.org/10.1016/j.ijengsci.2021.103587
- A. Karim, M. Shahroz, K. Mustofa, S. B. Belhaouari and S. R. K. Joga, "Phishing Detection System Through Hybrid Machine Learning Based on URL," in IEEE Access, vol. 11, pp. 36805-36822, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3252366
- M. M. Yadollahi, F. Shoeleh, E. Serkani, A. Madani and H. Gharaee, "An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features," 2019 5th International Conference on Web Research (ICWR), Tehran, Iran, 2019, pp. 281-286, doi: https://doi.org/10.1109/ICWR.2019.8765265
- Y. Mourtaji, M. Bouhorma, D. Alghazzawi, G. Aldabbagh, and A. Alghamdi, “Hybrid rule-based solution for phishing URL detection using convolutional neural network,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 8241104,pp. 1–14, Sep. 2021, doi: https://doi.org/10.1155/2021/8241104
- S. Das Gupta, K. T. Shahriar, H. Alqahtani, “Modeling hybrid feature-based phishing websites detection using machine learning techniques,”Annals of Data Science, vol. 11, pp. 217–242, 2024,doi: https://doi.org/10.1007/s40745-022-00379-8
- M. W. Shaukat, R. Amin, M. M. A. Muslam, A. H. Alshehri and J. Xie, “A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning,” Sensors, vol. 23, no. 19, Art. no. 8070, 2023, doi: https://doi.org/10.3390/s23198070
- J. S. Tharani and N. A. G. Arachchilage, “Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach,” Security and Privacy, vol. 3, no. 5, e120, Jul. 2020, doi: https://doi.org/10.1002/spy2.120
- M. W. Shaukat, R. Amin, M. M. A. Muslam, A. H. Alshehri, and J. Xie, “A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning,” Sensors, vol. 23, no. 19, Art. no. 8070, 2023, doi: https://doi.org/10.3390/s23198070
- A. Almalaq, S. Albadran, and M. A. Mohamed, “Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems,” Mathematics, vol. 10, no. 15, Art. no. 2574, 2022, doi: https://doi.org/10.3390/math10152574
- S. Jalil, M. Usman, and A. Fong, “Highly accurate phishing URL detection based on machine learning,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 9233–9251, 2023, doi: https://doi.org/10.1007/s12652-022-04426-3
- O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Systems with Applications, vol. 117, pp. 345–357, 2019, doi: https://doi.org/10.1016/j.eswa.2018.09.029
- A. Prasad and S. Chandra, "PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning," Computers & Security, vol. 136, Art. no. 103545, Jan. 2024, doi: https://doi.org/10.1016/j.cose.2023.103545.
- A. Rawla, S. Singh, M. Daniyal, and P. Dubey, "Detection of Phishing Attacks in PhiUSIIL Dataset using Deep Learning," Procedia Computer Science, vol. 259, pp. 543–552, 2025, doi: https://doi.org/10.1016/j.procs.2025.04.003
- V. Vajrobol, V. Vajratiya, B. B. Gupta, and A. Gaurav, "Mutual information based logistic regression for phishing URL detection," Cyber Security and Applications, vol. 2, Art. no. 100044, 2024, doi: https://doi.org/10.1016/j.csa.2024.100044
- A. Sumayli, "Development of advanced machine learning models for optimization of methyl ester biofuel production from papaya oil: Gaussian process regression (GPR), multilayer perceptron (MLP), and K-nearest neighbor (KNN) regression models," Arabian Journal of Chemistry, vol. 16, Art. no. 104833, Jul. 2023, doi: https://doi.org/10.1016/j.arabjc.2023.104833
- M. Grandini, E. Bagli, and G. Visani, "Metrics for Multi-Class Classification: an Overview," arXiv preprint arXiv:2008.05756, Aug. 2020.https://doi.org/10.48550/arXiv.2008.05756.
- J. Qi, J. Du, S. M. Siniscalchi, X. Ma, and C. H. Lee, “On Mean Absolute Error for Deep Neural Network Based Vector-to-Vector Regression,” IEEE Signal Processing Letters, vol. 27, no. c, pp. 1485–1489, 2020,doi:https://doi.org/10.1109/LSP.2020.3016837
- O. Rainio, J. Teuho, and R. Klén, "Evaluation metrics and statistical tests for machine learning," Scientific Reports, vol. 14, Art. no. 6086, 2024, doi: https://doi.org/10.1038/s41598-024-56706-x
- S. Subbiah, K. S. M. Anbananthen, S. Thangaraj, S. Kannan and D. Chelliah, "Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm," in Journal of Communications and Networks, vol. 24, no. 2, pp. 264-273, April 2022, doi: https://doi.org/10.23919/JCN.2022.000002
- G. Alfian, M. Syafrudin, I. Fahrurrozi, N. L. Fitriyani, F. T. D. Atmaji, T. Widodo, N. Bahiyah, F. Benes, and J. Rhee, "Predicting Breast Cancer from Risk Factors Using SVM and Extra-Trees-Based Feature Selection Method," Computers, vol. 11, no. 9, Art. no. 136, 2022, doi: https://doi.org/10.3390/computers11090136
- L. Alzubaidi, J. Zhang, A. J. Humaidi, et al., "Review of deep learning: concepts, CNN architectures, challenges, applications, future directions," Journal of Big Data, vol. 8, Art. no. 53, 2021, doi: https://doi.org/10.1186/s40537-021-00444-8
- R. Ribani and M. Marengoni, "A Survey of Transfer Learning for Convolutional Neural Networks," 2019 32nd SIBGRAPI Conference on Graphics, Patterns and Images Tutorials (SIBGRAPI-T), Rio de Janeiro, Brazil, 2019, pp. 47-57, doi:https://doi.org/10.48550/arXiv.2008.0575610.1109/SIBGRAPI-T.2019.00010
- A. Kaya, A. S. Keceli, C. Catal, H. Y. Yalic, H. Temucin, and B. Tekinerdogan, "Analysis of transfer learning for deep neural network based plant classification models," Computers and Electronics in Agriculture, vol. 158, pp. 20–29, Mar. 2019, doi: https://doi.org/10.1016/j.compag.2019.01.041
- A. Deshpande, V. V. Estrela, and P. Patavardhan, "The DCT-CNN-ResNet50 architecture to classify brain tumors with super-resolution, convolutional neural network, and the ResNet50," Neuroscience Informatics, vol. 1, no. 4, Art. no. 100013, Dec. 2021, doi: https://doi.org/10.1016/j.neuri.2021.100013.
- A. Minarno, L. Aripa, Y. Azhar, and Y. Munarko, "Classification of Malaria Cell Image using Inception-V3 Architecture," Journal of Informatics and Visualization, vol. 7, no. 2, 2023, doi: https://doi.org/10.30630/joiv.7.2.1301
- Z.-P. Jiang, Y.-Y. Liu, Z.-E. Shao, and K.-W. Huang, "An Improved VGG16 Model for Pneumonia Image Classification," Applied Sciences, vol. 11, no. 23, Art. no. 11185, 2021, doi: https://doi.org/10.3390/app112311185
- B. Kim, Y. Natarajan, S. D. Munisamy, A. Rajendran, K. R. S. Preethaa, D.-E. Lee, and G. Wadhwa, "Deep Learning Activation Layer-Based Wall Quality Recognition Using Conv2D ResNet Exponential Transfer Learning Model," Mathematics, vol. 10, no. 23, Art. no. 4602, 2022, doi: https://doi.org/10.3390/math10234602
- Y. Bai, "RELU-Function and Derived Function Review," SHS Web of Conferences, vol. 144, Art. no. 02006,2022,doi:https://doi.org/10.1051/shsconf/202214402006
- A. Zafar, M. Aamir, N. M. Nawi, A. Arshad, S. Riaz, A. Alruban, A. K. Dutta, and S. Almotairi, "A Comparison of Pooling Methods for Convolutional Neural Networks," Applied Sciences, vol. 12, no. 17, Art. no. 8643, 2022, doi: https://doi.org/10.3390/app12178643
- H. Pratiwi, A. P. Windarto, S. Susliansyah, R. R. Aria, S. Susilowati, L. K. Rahayu, Y. Fitriani, A. Merdekawati, and I. R. Rahadjeng, "Sigmoid Activation Function in Selecting the Best Model of Artificial Neural Networks," Journal of Physics: Conference Series, vol. 1471, Art. no. 012010, 2020, doi:https://doi.org/10.1088/17426596/1471/1/012010
References
J. Kline, E. Oakes, and P. Barford, ‘‘A URL-based analysis of WWW structure and dynamics,’’ in Proc. Netw. Traffic Meas. Anal. Conf. (TMA), Jun. 2019, p.800.doi:https://doi.org/10.23919/TMA.2019.8784665
P. Flach and M. Kull, ‘‘Precision-recall-gain curves: PR analysis done right,’’ in Proc. Adv. Neural Inf. Process. Syst., 2015, pp. 838–846.
R. S. Rao and A. R. Pais, ‘‘Detection of phishing websites using an efficient feature-based machine learning framework,’’ Neural Comput. Appl., vol. 31, no. 8, pp. 3851–3873, Aug. 2019.doi:https://doi.org/ 10.17577/IJERTV9IS050888
H. Shahriar and S. Nimmagadda, ‘‘Network intrusion detection for TCP/IP packets with machine learning techniques,’’ in Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Cham, Switzerland: Springer, 2020, pp. 231–247.doi: https://doi.org/10.1007/978-3-030-57024-8_10
T. Nathezhtha, D. Sangeetha, and V. Vaidehi, ‘‘WC-PAD: Web crawling based phishing attack detection,’’ in Proc. Int. Carnahan Conf. Secur. Technol. (ICCST), Oct. 2019, pp. 1–6. (2020). Accessed:Jan.2020.doi:https://doi.org/10.1109/ccst.2019.8888416
S. Bell and P. Komisarczuk, ‘‘An analysis of phishing blacklists: Google safe browsing, OpenPhish, and PhishTank,’’ in Proc. Australas. Comput. Sci. Week Multiconf. (ACSW), Melbourne, VIC, Australia. New York, NY, USA: Association for Computing Machinery, 2020, pp. 1–11, Art. no. 3, doi: https://doi.org/10.1145/3373017.3373020
G. Diksha and J. A. Kumar, ‘‘Mobile phishing attacks and defence mechanisms: State of art and open research challenges,’’ Comput. Secur., vol. 73, pp. 519–544, Mar. 2018.doi: https://doi.org/10.1016/j.cose.2017.12.006
V. Shahrivari, M. M. Darabi, and M. Izadi, ‘‘Phishing detection using machine learning techniques,’’ 2020, arXiv:2009.11116.doi: https://doi.org/10.52783/pst.1643
S. Wang, S. Khan, C. Xu, S. Nazir, and A. Hafeez, ‘‘Deep learning-based efficient model development for phishing detection using random forest and BLSTM classifiers,’’ Complexity, vol. 2020, pp. 1–7, Sep.2020.doi: https://doi.org/10.1155/2020/8694796
G. Sonowal and K. S. Kuppusamy, ‘‘PhiDMA—A phishing detection model with multi-filter approach,’’ J. King Saud Univ., Comput. Inf. Sci., vol. 32, no. 1, pp. 99–112, Jan. 2020.doi: https://doi.org/10.1016/j.jksuci.2017.07.005
M. Babagoli, M. P. Aghababa, and V. Solouk, ‘‘Heuristic nonlinear regression strategy for detecting phishing websites,’’ Soft Comput., vol. 23, no. 12, pp. 4315-4327,Jun.2.doi: https://doi.org/10.1007/s00500-018-3084-2
R. S. Rao and A. R. Pais, ‘‘Detection of phishing websites using an efficient feature-based machine learning framework,’’ Neural Comput. Appl., vol. 31, no. 8, pp. 3851–3873, Aug. 2019.doi: https://doi.org/10.1007/s00521-017-3305-0
Y. Feng, Q. Wang, D. Wu, Z. Luo, X. Chen, T. Zhang, and W. Gao, ‘‘Machine learning aided phase field method for fracture mechanics,’’ Int. J. Eng. Sci., vol. 169, Dec. 2021, Art. no. 103587.doi: https://doi.org/10.1016/j.ijengsci.2021.103587
A. Karim, M. Shahroz, K. Mustofa, S. B. Belhaouari and S. R. K. Joga, "Phishing Detection System Through Hybrid Machine Learning Based on URL," in IEEE Access, vol. 11, pp. 36805-36822, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3252366
M. M. Yadollahi, F. Shoeleh, E. Serkani, A. Madani and H. Gharaee, "An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features," 2019 5th International Conference on Web Research (ICWR), Tehran, Iran, 2019, pp. 281-286, doi: https://doi.org/10.1109/ICWR.2019.8765265
Y. Mourtaji, M. Bouhorma, D. Alghazzawi, G. Aldabbagh, and A. Alghamdi, “Hybrid rule-based solution for phishing URL detection using convolutional neural network,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 8241104,pp. 1–14, Sep. 2021, doi: https://doi.org/10.1155/2021/8241104
S. Das Gupta, K. T. Shahriar, H. Alqahtani, “Modeling hybrid feature-based phishing websites detection using machine learning techniques,”Annals of Data Science, vol. 11, pp. 217–242, 2024,doi: https://doi.org/10.1007/s40745-022-00379-8
M. W. Shaukat, R. Amin, M. M. A. Muslam, A. H. Alshehri and J. Xie, “A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning,” Sensors, vol. 23, no. 19, Art. no. 8070, 2023, doi: https://doi.org/10.3390/s23198070
J. S. Tharani and N. A. G. Arachchilage, “Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach,” Security and Privacy, vol. 3, no. 5, e120, Jul. 2020, doi: https://doi.org/10.1002/spy2.120
M. W. Shaukat, R. Amin, M. M. A. Muslam, A. H. Alshehri, and J. Xie, “A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning,” Sensors, vol. 23, no. 19, Art. no. 8070, 2023, doi: https://doi.org/10.3390/s23198070
A. Almalaq, S. Albadran, and M. A. Mohamed, “Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems,” Mathematics, vol. 10, no. 15, Art. no. 2574, 2022, doi: https://doi.org/10.3390/math10152574
S. Jalil, M. Usman, and A. Fong, “Highly accurate phishing URL detection based on machine learning,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 9233–9251, 2023, doi: https://doi.org/10.1007/s12652-022-04426-3
O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Systems with Applications, vol. 117, pp. 345–357, 2019, doi: https://doi.org/10.1016/j.eswa.2018.09.029
A. Prasad and S. Chandra, "PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning," Computers & Security, vol. 136, Art. no. 103545, Jan. 2024, doi: https://doi.org/10.1016/j.cose.2023.103545.
A. Rawla, S. Singh, M. Daniyal, and P. Dubey, "Detection of Phishing Attacks in PhiUSIIL Dataset using Deep Learning," Procedia Computer Science, vol. 259, pp. 543–552, 2025, doi: https://doi.org/10.1016/j.procs.2025.04.003
V. Vajrobol, V. Vajratiya, B. B. Gupta, and A. Gaurav, "Mutual information based logistic regression for phishing URL detection," Cyber Security and Applications, vol. 2, Art. no. 100044, 2024, doi: https://doi.org/10.1016/j.csa.2024.100044
A. Sumayli, "Development of advanced machine learning models for optimization of methyl ester biofuel production from papaya oil: Gaussian process regression (GPR), multilayer perceptron (MLP), and K-nearest neighbor (KNN) regression models," Arabian Journal of Chemistry, vol. 16, Art. no. 104833, Jul. 2023, doi: https://doi.org/10.1016/j.arabjc.2023.104833
M. Grandini, E. Bagli, and G. Visani, "Metrics for Multi-Class Classification: an Overview," arXiv preprint arXiv:2008.05756, Aug. 2020.https://doi.org/10.48550/arXiv.2008.05756.
J. Qi, J. Du, S. M. Siniscalchi, X. Ma, and C. H. Lee, “On Mean Absolute Error for Deep Neural Network Based Vector-to-Vector Regression,” IEEE Signal Processing Letters, vol. 27, no. c, pp. 1485–1489, 2020,doi:https://doi.org/10.1109/LSP.2020.3016837
O. Rainio, J. Teuho, and R. Klén, "Evaluation metrics and statistical tests for machine learning," Scientific Reports, vol. 14, Art. no. 6086, 2024, doi: https://doi.org/10.1038/s41598-024-56706-x
S. Subbiah, K. S. M. Anbananthen, S. Thangaraj, S. Kannan and D. Chelliah, "Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm," in Journal of Communications and Networks, vol. 24, no. 2, pp. 264-273, April 2022, doi: https://doi.org/10.23919/JCN.2022.000002
G. Alfian, M. Syafrudin, I. Fahrurrozi, N. L. Fitriyani, F. T. D. Atmaji, T. Widodo, N. Bahiyah, F. Benes, and J. Rhee, "Predicting Breast Cancer from Risk Factors Using SVM and Extra-Trees-Based Feature Selection Method," Computers, vol. 11, no. 9, Art. no. 136, 2022, doi: https://doi.org/10.3390/computers11090136
L. Alzubaidi, J. Zhang, A. J. Humaidi, et al., "Review of deep learning: concepts, CNN architectures, challenges, applications, future directions," Journal of Big Data, vol. 8, Art. no. 53, 2021, doi: https://doi.org/10.1186/s40537-021-00444-8
R. Ribani and M. Marengoni, "A Survey of Transfer Learning for Convolutional Neural Networks," 2019 32nd SIBGRAPI Conference on Graphics, Patterns and Images Tutorials (SIBGRAPI-T), Rio de Janeiro, Brazil, 2019, pp. 47-57, doi:https://doi.org/10.48550/arXiv.2008.0575610.1109/SIBGRAPI-T.2019.00010
A. Kaya, A. S. Keceli, C. Catal, H. Y. Yalic, H. Temucin, and B. Tekinerdogan, "Analysis of transfer learning for deep neural network based plant classification models," Computers and Electronics in Agriculture, vol. 158, pp. 20–29, Mar. 2019, doi: https://doi.org/10.1016/j.compag.2019.01.041
A. Deshpande, V. V. Estrela, and P. Patavardhan, "The DCT-CNN-ResNet50 architecture to classify brain tumors with super-resolution, convolutional neural network, and the ResNet50," Neuroscience Informatics, vol. 1, no. 4, Art. no. 100013, Dec. 2021, doi: https://doi.org/10.1016/j.neuri.2021.100013.
A. Minarno, L. Aripa, Y. Azhar, and Y. Munarko, "Classification of Malaria Cell Image using Inception-V3 Architecture," Journal of Informatics and Visualization, vol. 7, no. 2, 2023, doi: https://doi.org/10.30630/joiv.7.2.1301
Z.-P. Jiang, Y.-Y. Liu, Z.-E. Shao, and K.-W. Huang, "An Improved VGG16 Model for Pneumonia Image Classification," Applied Sciences, vol. 11, no. 23, Art. no. 11185, 2021, doi: https://doi.org/10.3390/app112311185
B. Kim, Y. Natarajan, S. D. Munisamy, A. Rajendran, K. R. S. Preethaa, D.-E. Lee, and G. Wadhwa, "Deep Learning Activation Layer-Based Wall Quality Recognition Using Conv2D ResNet Exponential Transfer Learning Model," Mathematics, vol. 10, no. 23, Art. no. 4602, 2022, doi: https://doi.org/10.3390/math10234602
Y. Bai, "RELU-Function and Derived Function Review," SHS Web of Conferences, vol. 144, Art. no. 02006,2022,doi:https://doi.org/10.1051/shsconf/202214402006
A. Zafar, M. Aamir, N. M. Nawi, A. Arshad, S. Riaz, A. Alruban, A. K. Dutta, and S. Almotairi, "A Comparison of Pooling Methods for Convolutional Neural Networks," Applied Sciences, vol. 12, no. 17, Art. no. 8643, 2022, doi: https://doi.org/10.3390/app12178643
H. Pratiwi, A. P. Windarto, S. Susliansyah, R. R. Aria, S. Susilowati, L. K. Rahayu, Y. Fitriani, A. Merdekawati, and I. R. Rahadjeng, "Sigmoid Activation Function in Selecting the Best Model of Artificial Neural Networks," Journal of Physics: Conference Series, vol. 1471, Art. no. 012010, 2020, doi:https://doi.org/10.1088/17426596/1471/1/012010
