Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Merge-based syntax is mediated by distinct neurocognitive mechanisms in 84,000 individuals with language deficits across nine languages. [PDF]
Murphy E +3 more
europepmc +1 more source
Accurate Extraction of Bug Fix Pattern Occurrences using Abstract Syntax Tree Analysis
Matías Martínez +2 more
openalex +1 more source
LLM-based program analysis for source codes, abstract syntax trees and WebAssembly instructions [PDF]
Liangjun Deng +7 more
openalex +1 more source
Typical source code (SC) metrics are useful in identifying and predicting the used design patterns in typical Java and Kotlin projects. However, typical SC metrics–based prediction tends to be less accurate. This research presents a novel idea of detecting various design patterns in a code with the help of large language model (LLM)–based features ...
Sirojiddin Komolov +3 more
wiley +1 more source
SBOM generation based on code-level external component trees. [PDF]
Kong X, Zhuo H, Miao X, Huang W, Du J.
europepmc +1 more source
Research on the method of simplifying GNU compiler collection abstract syntax tree
Feng Gao, Hai-tao WU
openalex +2 more sources
A Program Similarity Evaluation using Keyword Extraction on Abstract Syntax Tree [PDF]
Young‐Chul Kim, Jae-Young Choi
openalex +1 more source
HDR‐SA: A Hybrid Deep Learning and RoBERTa‐Based Framework for Sentiment and Aspect Analysis
The ability to comprehend complex viewpoints in text is critical for sentiment analysis (SA), particularly at the aspect level, yet existing models struggle with accurately identifying sentiment polarities and aspect‐specific expressions due to their reliance on large, manually annotated, domain‐specific datasets.
Laxmi Pamulaparthy +2 more
wiley +1 more source
Optimization for threat classification of various data types-based on ML model and LLM. [PDF]
Hong C, Oh T.
europepmc +1 more source

