default search action
DASC/PiCom/CBDCom/CyberSciTech 2023: Abu Dhabi, United Arab Emirates
- IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023. IEEE 2023, ISBN 979-8-3503-0460-2
- Qi Liu, Yingjie Wang, Weitao Zhao, Xuqiang Qiu:
Differential Privacy Protection Based on Federated Learning in Mobile Crowdsensing. 1-6 - Maximilian Kirschner, Federico Nicolás Peccia, Felix Thömmes, Victor Pazmino Betancourt, Oliver Bringmann, Jürgen Becker:
Characterization of Execution Time Variability in FPGA-Based AI-Accelerators. 1-8 - Belsabel Teklemariam, Saron Bokretsion, Safa Otoum, Bassem Ouni:
On the Viability of Federated Deep Autoencoder for Botnet Threat Detection. 1-6 - Yujin Xiao, Yongli Zhao, Yinji Jing:
Adaptive Hierarchy Based Non-Cooperative Satellite Network Topology Detection. 1-6 - Minxi Fengl, Wei Li, Boyu Qin, Albert Y. Zomaya:
Online Demand Peak Shaving with Machine-Learned Advice in Cyber-Physical Energy Systems. 1-8 - Moayad Aloqaily:
Message from the Executive General Chair. 1 - Tao Huang, Fengmei Chen, Guohua Ji, Feng Jiao, Wei Jing, Zhidan Yuan:
Optimal Task Offloading in Edge Cloud Environment. 7-13 - Kawser A. Mazumder, Eslam G. AbdAllah:
Information-Centric Networking (ICN) Based Disaster Recovery and Business Continuity (DRBC) of Bangladesh. 14-19 - Vinay Sachidananda, Bryson Teo, Ruitao Feng, Kwok-Yan Lam, Yang Li:
FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring. 20-27 - Xiaowen Zhang, Yuxia Lei, Guangshun Li, Shi Wang, Huifeng Li:
Combining Reverse Temporal Attention Mechanism and Dynamic Similarity Analysis for Disease Prediction. 28-35 - Irfanullah Khan, Flávia Coimbra Delicato, Emilio Greco, Massimo Guarascio, Antonio Guerrieri, Giandomenico Spezzano:
Occupancy Prediction in Multi-Occupant IoT Environments Leveraging Federated Learning. 36-43 - Ilir Murturi, Praveen Kumar Donta, Victor Casamayor-Pujol, Andrea Morichetta, Schahram Dustdar:
Learning-Driven Zero Trust in Distributed Computing Continuum Systems. 44-49 - Jiawei Sun, Zhiyun Yang, Qi Liu, Yonghong Zhang, Xiaodong Liu:
An Improved Deep Learning-Based Approach to Urban Weather Radar Echo Extrapolation. 50-55 - Tao Zhou, Yunhao Ni, Xinzhe Gao, Hong Chen:
Smart Home Integration and Data Sharing with ActivityPub and UPOD. 56-62 - Jian Wang, Yishui Zhu, Abdelhamid Hadili, Ruxia Tian, Luyang Wang:
Analysis and Prediction of Drivers' Braking Behavior with Different Experience at Right-Angled Turns. 63-68 - Ewerton R. Andrade, Cristiano Coimbra Goes, João Bezerra Da R. Neto, César Augusto De S. Pastorini, Janislley Oliveira de Sousa:
Experimental Evaluation and Expansion Suggestion of Digital Signatures Available on OP-TEE. 69-76 - Ruichen Cong, Jianlun Wu, Shoji Nishimura, Atsushi Ogihara, Qun Jin:
Determining Important Features in Multidimensional Health Data for Individualized Precision Healthcare. 77-83 - Afnan Asasfeh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Wathiq Mansoor, Taher M. Ghazal:
Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics. 84-88 - Zehang Li, Zijn Qiao, Haochuan Tian, Bowen Sun, Shuaiqi Meng:
Research on Sustainable Design Evaluation of Smart Education Based on the Internet of Things. 89-94 - Yangwen Zhang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Maolin Xiong:
A High Capacity Combined Carrier Steganography Without Embedding Image. 95-100 - Jamal N. Al-Karaki, Awni Itradat, Selam Mekonen:
Immersive Cybersecurity Teaching/Training Using Gamification on the Metaverse: A Hands-On Case Study. 101-108 - Qian Liu, Xiaobei Dong, Zhixiong Chen, Ximeng Liu, Li Xu:
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security. 109-115 - K. Dillon Lewis, Christopher Rouff, Ali Tekeoglu:
An Autonomic Architecture for Multi-Agent Self-Maintaining Robotic Systems. 116-122 - Jiangjing Wang, Hui Fang, Shengqing Li, Jiulei Jiang:
Research on Influence Maximization Algorithm Based on Temporal Social Network. 123-129 - Ameera Saleh Jaradat, Ahmad Nasayreh, Qais Al-Na'amneh, Hasan Gharaibeh, Rabia Emhamed Al Mamlook:
Genetic Optimization Techniques for Enhancing Web Attacks Classification in Machine Learning. 130-136 - Gaganpreet Jhajj, M. Ali Akber Dewan, Fuhua Oscar Lin:
Unveiling Uncertainty: Supporting Learners Through NLP-Driven Confusion Identification. 137-142 - Lei Xiong, Qichao Xu, Dongfeng Fang, Hui Zeng:
Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System. 143-148 - Chuan-Yu Chang, Xin-Hui Lin, Hui-Huang Hsu:
Infant Vomit Detection Using ShuffleNetV2. 149-154 - Dina Shehada, Ahmed Bouridane:
A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains. 155-160 - Michael Sarpong, Cristian Simoni, Brandon Samaroo, Camilo Rodriguez, Daniel Samaniego, Wafa Elmannai, Yi Wang:
Template Matching Based Cash Register for Disabled Workers. 161-167 - Luiz Felipe Ribeiro Correia, Claudio Miceli de Farias, Flávia Coimbra Delicato:
An Edge AI Study for Human Action Recognition on Industry 4.0 Using Weightless Neural Networks. 168-174 - Belal Mohamed, Mohamed ElHelw, Ahmed Awad:
Towards Scalable Process Mining Pipelines. 175-182 - Heba Saleous, Marton Gergely:
Uninstall, Noob! Views on Rampant Toxicity in Online Gaming. 183-190 - Zhihao Dai, Ligang He, Shuang-Hua Yang, Matthew Leeke:
Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification. 191-199 - Fengyi Liu, Zhichao Lian:
Adversarial Patch Attacks Against Aerial Imagery Object Detectors Based on Interpretable Guidance. 200-207 - Chu Zhang, Kiminori Sato, Bo Wu:
A Design of Smart Glasses-Based Gesture Recognition and Translation System for Sign Languages. 208-213 - Junichi Funasaka, Noriaki Hiraoka:
Evaluation on Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple Paths. 214-219 - Yan Chen, Zhongliao Yang, Chen Dong, Hui Lin, Zhenyi Chen:
A Novel Fast Video Fragment Matching Algorithm for Copyright Protection. 220-227 - Mohsen Kazemian, Markus Helfert:
A Lightweight Encryption Method For Privacy-Preserving in Process Mining. 228-233 - Jing Tao, Ken Cao, Teng Liu:
Traffic Matrix Prediction Based on Cross Aggregate GNN. 234-239 - Hang Zhou, Xiaoyan Wang, Masahiro Umehira, Yusheng Ji:
Deep Reinforcement Learning-Based On-Off Analog Beamforming Coordination for Downlink MISO Networks. 240-245 - Tamer Shanableh:
A Deep Learning Solution for Arabic Words Sign Language Recognition in the Context of Sentences. 246-251 - Sambit Kumar Mishra, Mohana Lasya Sanisetty, Apsareena Zulekha Shaik, Sai Likitha Thotakura, Sai Likhita Aluru, Deepak Puthal:
LiDAR-based Building Damage Detection in Edge-Cloud Continuum. 252-257 - Francesco Cristoforo Conti, Corrado Santoro, Federico Fausto Santoro:
Twinflie: A Digital Twin UAV Orchestrator and Simulator. 258-263 - Chalee Vorakulpipat, Montida Pattaranantakul, Soontorn Sirapaisan, Soontaree Songserm:
Safeguarding Devices and Edge Computing: A Responsive Anti-Scam Approach. 264-268 - Ashish Kaushal, Osama Almurshed, Areej Alabbas, Nitin Auluck, Omer F. Rana:
An Edge-Cloud Infrastructure for Weed Detection in Precision Agriculture. 269-276 - Amin Ebrahimzadeh, Martin Maier, Roch H. Glitho:
Joint Task Decomposition and Allocation in Tactile Internet FiWi Enhanced Mobile Networks. 277-283 - Chidi Agbo, Hoda Mehrpouyan:
Resilience of Industrial Control Systems Using Signal Temporal Logic And Autotuning Mechanism. 284-293 - Anum Nawaz, Muhammad Irfan, Hafza Ayesha Siddiqa, Tomi Westerlund:
Edge Based Skin Cancer Decision Support System Using Machine Learning Algorithms. 292-297 - Tomoya Unoki, Kenichi Kourai:
VM Migration Support for Secure Out-of-Band VNC with Shadow Devices. 298-305 - Yuya Sugai, Chisa Takano, Masaki Aida:
A Study on the Structure of a Local and Causal Framework Underlying the Fundamental Equation of Online User Dynamics. 306-311 - Aiasha Siddika, Liang Zhao:
Enhancing Trust and Reliability in AI and ML: Assessing Blockchain's Potential to Ensure Data Integrity and Security. 312-316 - Dowens Nicolas, Henry Figueroa, Yi Wang, Wafa Elmannai, George C. Giakos:
Adversarial Machine Learning Architecture in AI-Driven Power Systems. 317-322 - Nhu Minh Ngoc Pham, Yixi Wu, Carson K. Leung, Mohammadafaz V. Munshi, Vrushil Kiritkumar Patel:
Data Analytics for Dependable Transportation Systems in a Smart City. 323-332 - Bharat Lal, Miguel Heredia Conde, Pasquale Corsonello, Raffaele Gravina:
Secure and Energy-Efficient ECG Signal Monitoring in the IoT Healthcare using Compressive Sensing. 333-339 - Dengfeng Liu, Yitong Wang, Fei Cai:
A Hypergraph Framework Based on Neighborhood and Category Association Relationships for Session-Based Recommendation. 340-347 - Muhammad Muzamil Aslam, Ali Tufail, Zahoor Ahmed, Kassim Kalinaki, Muhammad Nasir, Rosyzie Anna Awg Haji Mohd Apong:
Spectrum Sharing and Consensus Performance of Vehicular Networks based on Deep Multi-User Reinforcement Learning. 348-354 - Le Qi Yau, Yik Ting Lam, Ashwin Lokesh, Prannaya Gupta, Justin Lim, Ishneet Sukhvinder Singh, Jia Yi Loo, Mao V. Ngo, Sin G. Teo, Tram Truong-Huu:
A Novel Feature Vector for AI-Assisted Windows Malware Detection. 355-361 - Yanghe Pan, Zhou Su, Yuntao Wang:
Privacy-Preserving Trainer Recruitment in Model Marketplace of Federated Learning. 362-366 - Yinan Yao, Decheng Qiu, Bolun Li, Chen Dong, Li Xu, Xiaodong Guo, Changping Lai:
IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare. 367-374 - Jaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif:
EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing. 375-382 - Yirui Wang, Jinyun Cao, Yixuan Wang, Yawei Hao, Jianming Yang, Saisai Li, Jiayi Tan, Bowen Sun:
Research on the Interface Design of a Situational Awareness-Based Spinal Endoscopic Surgery Robot. 383-388 - Linlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo, Yuling Chen:
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain. 389-394 - Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov:
IoT Data Confidentiality Self-Management. 395-400 - Yu Usui, Kazuki Nakajima, Chisa Takano, Masaki Aida:
Perturbation Theory of Online User Dynamics with Respect to Change in Social Network Structures. 401-407 - Nadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Fatma Taher, Taher M. Ghazal:
Review of Fundamental, Security, and Privacy in Metaverse. 408-414 - Zhong Long, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yancheng Sun:
Communication-Efficient Federated Learning with Sparsity and Quantization. 415-421 - Rustam Shadiev, Mirzaali Fayziev, Gulmira Abildinova, Jiawen Liu, Fahriye Altinay, Roza Zhussupova, Nurassyl Kerimbayev, Aynur Jumadillaeva, Elena Gaevskaia, Narzikul Shadiev:
Mobile Technology as a Catalyst for Enhancing EFL Speaking Skills in Social Language Learning Contexts. 422-427 - Carlo Adornetto, Antonella Guzzo, Andrea Vasile:
Automatic Medical Report Generation via Latent Space Conditioning and Transformers. 428-435 - Jiwei Pan, Benxiong Huang, Lai Tu:
Traffic Flow Prediction Based on Dynamic Graph Feature Learning. 436-443 - Khalid Ali, Manar Jammal:
ML-Based Dynamic Scaling and Traffic Forecasting for 5G O-RAN. 444-451 - Marwa Chendeb El Rai, Muna Darweesh, Aïcha Beya Far:
MSflood: A Multi-Sources Segmentation For Remote Sensing Flood Images. 452-455 - Maria Iqbal, Asadullah Tariq, Mohamed Adel Serhani:
A Secure and Scalable Peer-to-Peer Federated Learning Approach for Handling Veracity in Big Data. 456-462 - Wanliang Wang, Jiulei Jiang, Shengqing Li:
Recommendation Algorithm Based on Social Information and Global Average Matrix Decomposition. 463-470 - Mortada Termos, Zakariya Ghalmane, Mohamed-el-Amine Brahmia, Ahmad Fadlallah, Ali Jaber, Mourad Zghal:
Intrusion Detection System for IoT Based on Complex Networks and Machine Learning. 471-477 - Aleksandra Ursula Charlotte Hamel, Bogdan-Cristian Zarcu, András-Gergely Csenteri, Tamara Pfliegler, Sajjad Khan, Davor Svetinovic:
Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support Systems. 478-485 - Xi Zhao, Ting Zhou, Celimuge Wu, Tianheng Xu, Zhenyu Wang, Honglin Hu:
A Hierarchical Detection Method for Steady State Peripheral Visual Evoked Potential. 486-491 - Lang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Pengyu Chen:
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism. 492-498 - Linbo Jiang, Yinuo Wang, Ye Li, Bo Tao, Fangmin Sun, John Speakman:
Wearable Sensors Based Human Core Body Temperature Computing Method. 499-504 - Emily Kouzaridi, Harris Partaourides, Nicolas Tsapatsoulis, Constantinos Djouvas:
Assessing the Importance of Key Terms in UN SDGs Through Citizens Labs. 505-511 - Reza Shokri Kalan:
Enhancing Quality of Experience by Monitoring End-User Streaming Behavior. 511-514 - Qian Liu, Yan Chen, Zhixiong Chen, Ximeng Liu, Hui Lin:
New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security. 515-522 - Hong Hanh Doan, Audri Adhyas Paul, Harald Zeindlinger, Yiheng Zhang, Sajjad Khan, Davor Svetinovic:
Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture. 523-530 - Asaf Raza, Antonella Guzzo, Giancarlo Fortino:
Federated Learning for Medical Images Analysis: A Meta Survey. 531-536 - Yuning Guo, Hiroyuki Kameda, Bo Wu:
Design of Household Robotic Arm System to sort Recyclable Resources based on Deep Learning. 537-542 - Maolin Xiong, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Adversarial Attack Method Based on Dual- frequency Domain Transformation. 543-548 - Yinzhao Zhang, Wei Sun, Jun Hou, Qianmu Li:
Hybrid Multi-Strategy Improvements for The Aquila Optimizer. 549-556 - Hao Yang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Robust Object Detection Based on a Comparative Learning Perspective. 557-563 - Kai Yuan Yang, Jun Yang, Zhixin Sun:
Commodity Personalized Recommendation Algorithm Based on the Knowledge Graph. 564-569 - Abderrahmane Maaradji, Naila Bouchemal, Idir Smadhi, Ahmed Bouhraoua, Amayas Ghanine:
Beyond Traditional Simulators: Adopting Videogames for Autonomous Vehicle Testing. 570-575 - Ayman Elhalwagy, Tatiana Kalganova:
Heterogeneous Induction Motor Current Dataset Fusion for Efficient Generalised MCSA-Based Fault Classification. 576-581 - Siyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Yuxiang Yang:
A Blockchain of Blockchains Structure Based on Asset Trading Scheme. 582-588 - Botian Jiang, Chunyang Wang, Yuanyuan Fu, Hai-Lin Liu, Ping Guo, Yuping Wang:
A Space-Saving Based MLCS Algorithm. 589-594 - Elia Guerra, Marco Miozzo, Paolo Dini:
Fully Decentralized Client Selection for Energy-Efficient Federated Learning. 595-601 - Sweta Bhattacharya, Pratik S. Vyas, Supriya Yarradoddi, Bhulakshmi Dasari, Sumathy S, Rajesh Kaluri, Srinivas Koppu, David J. Brown, Mufti Mahmud, Thippa Reddy Gadekallu:
Towards Smart Education in the Industry 5.0 Era: A Mini Review on the Application of Federated Learning. 602-608 - Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things. 609-614 - Mohammad Mominur Rahman, Ashhadul Islam, Skander Charni, Halima Bensmail, Thomas Hilbel, Samir Brahim Belhaouari:
A Novel Feature Extraction Technique for ECG Arrhythmia Classification Using ML. 615-621 - Jun Guo, Xiao Yang, Jie Lan, LiGuo Tong, Wei Jiang:
Absolute Positioning Method Based on Tunnel Wall Image Similarity Matching. 622-627 - Nicolò Maunero, Fabio De Rosa, Paolo Prinetto:
Towards Cybersecurity Risk Assessment Automation: an Ontological Approach. 628-635 - Dipanwita Thakur, Antonella Guzzo, Giancarlo Fortino:
Energy Aware Federated Learning with Application of Activity Recognition. 636-642 - Congcong Wang, Chen Wang, Jian Shen, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan:
Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids. 643-650 - Stefano Izzo, Marzia Canzaniello, Martina Savoia, Fabio Giampaolo, Francesco Piccialli:
Graph Neural Networks in Emergency Management: A Case Study on Fire Call Assignment. 651-658 - Ferda Ernawan, Wong Shu Jie, Suraya Abu Bakar:
Dual Watermarking Based on DCT with Human Visual Characteristics for Authentication and Copyright Protection. 659-664 - Mengyi Fu, Pan Wang, Zixuan Wang, Zeyi Li:
Deep Learning for Network Traffic Prediction: An Overview. 665-671 - Burcu Bolat-Akça, Elif Bozkaya:
Software-Defined Intrusion Detection System for DDoS Attacks in IoT Edge Networks. 672-677 - Tagnon Privael Okoumassoun, Ismaeel Al Ridhawi, Ali Abbas, Ibrahim Al-Oqily:
Blockchain-Enabled SAGIN Communication for Disaster Prediction and Management. 678-683 - Betiel Tesfom, Feven Belay, Snit Daniel, Reem Salem, Safa Otoum:
Phishing Detection Using Deep Learning and Machine Learning Algorithms: Comparative Analysis. 684-689 - Beáta Stingelová, Clemens Thaddäus Thrakl, Laura Wronska, Sandra Jedrej-Szymankiewicz, Sajjad Khan, Davor Svetinovic:
User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN. 690-697 - Shi Chen, Qianmu Li, Qi Wang, Xinjian Zhao, Hao Ge, Nianzhe Li:
A Multi-Channel Composite Recommendation Method in Federated Learning. 698-705 - Qirun Wang, Kiminori Sato, Bo Wu:
Analyzing the Effects of Driving Experience on Backing Maneuvers Based on Data Collected by Eye-Tracking Devices. 706-710 - Selma Yahia, Valeria Loscrì, Prakriti Saxena:
Enhancing Security in 6G Vehicular Networks: Leveraging VLC and MMW Integration and Cooperative Relaying Technique. 711-716 - Kathiravan Thangavel, Alessandro Gardi, Roberto Sabatini:
Cybersecurity Challenges of Multi-Domain Traffic Management and Aerospace Cyber-Physical Systems. 717-721 - Yue Hu, Ning Cao, Yinqiu Liu, Xiaoming He:
Proactive Caching with DRL in Cloud-Edge Assisted Cyber-Physical-Social Systems. 722-729 - Jierui Jin, Jie Zhang, Xiaolong Xu, Ke Meng, Xiaokang Zhou, Lianyong Qi, Xuyun Zhang, Wanchun Dou:
Federated Learning Based Satellite-Marine Integrated Training for Marine Edge Intelligence. 730-737 - Fabio Giampaolo, Stefano Izzo, Edoardo Prezioso, Diletta Chiaro, Salvatore Cuomo, Valerio Bellandi, Francesco Piccialli:
A Privacy Preserving Service-Oriented Approach for Data Anonymization Through Deep Learning. 738-746 - Claudio M. de Farias, Felipe M. De Farias, Flávia Coimbra Delicato:
A High-Level Information Fusion Framework Using Indirect Sensing for Internet of Bio-Nano Things. 747-750 - Danny Nguyen, Leo Howard, Hongxin Yan, Fuhua Lin:
Adaptive Sequence Learning: Contextual Multi-armed Bandit Approach. 751-756 - Mahmoud AlJamal, Ala Mughaid, Rabee Alqura'n, Muder Almiani, Shadi AlZu'bi:
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment. 757-761 - Marc Haller, Christian Lenz, Robin Nachtigall, Feras M. Awaysheh, Sadi Alawadi:
Handling Non-IID Data in Federated Learning: An Experimental Evaluation Towards Unified Metrics. 762-770 - Majid Riaz, Raffaele Gravina:
Photoplethysmography-Based Emotion Recognition in Response to High Dynamic Range Videos. 771-778 - Usman Tahir, Fiza Siyal, Michele Ianni, Antonella Guzzo, Giancarlo Fortino:
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts. 779-783 - Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic:
Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis. 784-791 - Takashi Michikata, Shunya Taniguchi, Toma Ishii, Chisaki Hori, Lifeng Lin, Hangli Ge, Noboru Koshizuka:
Multi-Horizon Visitor Forecasting for a Shopping Mall with Limited Historical Data Under Covid -19 Pandemic. 792-798 - Yue He, Rui Zhang, Zhichao Jiang, Hu Zhu:
BGFormer: Deep Bayersian Gabor Filtering Guided Transformer for Medical Image Denoising. 799-805 - Ruizhi Wang, Yanping Xu, Yifan Wu:
Python Open-Source Code Traceability Model Based on Graph Neural Networks. 806-813 - Yibing Xie, Alessandro Gardi, Roberto Sabatini:
Cybersecurity Risks and Threats in Avionics and Autonomous Systems. 814-819 - Muhammad Majid Gulzar, Muhammad Munaward, Adnan Shakoor, Huma Tahreem:
Consensus and Phase Synchronization of Multi-agent Systems using Adaptive Models. 820-824 - Yunhao Ni, Tao Zhou, Xinzhe Gao, Hong Chen:
Design and Implementation of a UPOD for Decentralized IoT Data Platform Based on the ActivityPub Protocol. 825-830 - Jingsong Lin, Xiaodong Guo, Chen Dong, Chenxi Lyu, Li Xu, Zhenyi Chen:
Text Summarization Generation Based on Improved Transformer Model. 831-836 - Harris Partaourides, Emily Kouzaridi, Nicolas Tsapatsoulis, Constantinos Djouvas:
On the Identification of Influential Topics in the Social Sciences Using Citation Analysis. 845-851 - Mina Alishahi, Vahideh Moghtadaiee:
Feature Selection on Anonymized Datasets. 852-859 - Yu Jiang, Luopu Liang, Qianmu Li:
Black-box Speech Adversarial Attack with Genetic Algorithm and Generic Attack Ideas. 860-867 - Najeebuddin Ahmed, Hassan Naser, Amir Ameli:
Fault Detection and Mitigation in Vehicle Platooning. 868-873 - Chonghao Chen, Aimin Luo, Yang Huang:
AE-TGN: Attribute-Empowered Temporal Graph Networks for Dynamic Graph Link Prediction. 874-877 - Aman Pratap Singh, Rohit Negi, Anand Handa, Sandeep K. Shukla:
Monitoring Application Behaviours to Detect Android Malware. 878-885 - Wenxi Cai, Tatsuhiro Tsuchiya:
Shapley Value-Based Node Assessment in Unreliable Complex Networks: Initial Research Progress. 886-890 - Boqian Fu, Fahao Chen, Peng Li, Zhou Su:
Efficient Scheduling for Multi-Job Federated Learning Systems with Client Sharing. 891-898 - Chisa Takano, Hiroyasu Obata, Masaki Aida:
Stabilizing Technology for Online User Dynamics by Controlling One-Way Weights of Links. 899-904 - Carmelo Felicetti, Antonino Rullo, Domenico Saccà:
Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques. 905-910 - Zain Ahmed Alrahmani, Khaled Elleithy:
DDoS Attack Forecasting Using Transformers. 911-915 - Giuseppe Beltrano, Claudia Greco, Michele Ianni, Giancarlo Fortino:
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. 916-920 - Li Pan, Jixiang Gan, Qi Liu, Yonghong Zhang, Xiaodong Liu:
A Real-Time Load Forecasting Approach Based on Graph Convolution Neural Network in a Distributed IoT Energy System. 921-926 - Lang Wang, Jiulei Jiang, Shengqing Li:
A Prediction Model of Drug-Drug Interactions Based on Graph Neural Networks and Subgraph Attention Mechanisms. 927-933 - Rui Zhang, Yue He, Lina Dai, Hu Zhu:
A Medical Image Fusion Method Based on Detail Enhancement Decomposition. 934-941 - Yaojie Ke, Yinan Yao, Zhengye Xie, Hepeng Xie, Hui Lin, Chen Dong:
Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5. 942-949 - Thomas J. Czubryt, Connor C. J. Hryhoruk, Carson K. Leung, Adam G. M. Pazdor:
Efficient Vertical Mining of Frequent Quantitative Patterns. 950-955 - Razaq Jinad, A. B. M. Rezbaul Islam, Narasimha Shashidhar:
File Fragment Analysis Using Machine Learning. 956-962 - Haoran Yang, Xingzhi Chen, Xu Cui, Ruiqiang Ma, Gang Wang:
Improvement and Evaluation of VBA-Based Cell Retrieval Algorithms. 963-968 - Jing Tao, Jianghua Peng, Tian Liu, Yangfan Li, Ruifeng Tian, Chengpeng Wu:
Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible. 969-974 - Jaehyun Lim, Quang Duy Tran, Fabio Di Troia:
Enhancing Malware Detection Using "Genetic Markers" and Machine Learning. 975-977 - Yunxin Liu, Yuliang Chen, Hongtao Zhang, Qingguo Zhou, Xiaokang Zhou:
Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks. 978-984 - Elena Becker, Maanak Gupta, Feras M. Awaysheh:
Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements. 991-998 - Zhengwei Peng, Jieyu Wu, Yue Li:
Singing Voice Conversion Between Popular Music and Chinese Opera Based on VITS. 999-1003 - Muhammad Majid Gulzar, Muhammad Shahab, Adnan Shakoor:
Particle Swarm Optimization Tuned PID Control of Hybrid Renewable Energy Based Multi-Area Power System. 1004-1009 - Obed Appiah, Wafa Elmannai:
A Smart Cane with Fall Detection System for People with Visual Impairments. 1010-1015 - Mustafa Daraghmeh, Anjali Agarwal, Yaser Jararweh:
A Multilevel Learning Model for Predicting CPU Utilization in Cloud Data Centers. 1016-1023 - Mohammed El Amin Tebib, Pascal André, Mariem Graa, Oum-El-Kheir Aktouf:
PrivDroid: Android Security Code Smells Tool for Privilege Escalation Prevention. 1024-1031 - Vipul Singh Negi, Suchismita Chinara:
Study of MobileNets Model in Federated Learning. 1040-1044 - Alì Aghazadeh Ardebili, Antonella Longo, Antonio Ficarella:
Digital Twinning of PV Modules for Smart Systems - A Comparison Between Commercial and Open-Source Simulation Models. 1045-1050 - Slawomir Konrad Tadeja, Kacper Godula, Thomas Bohné, Magdalena Wozniak:
Using VR to Present a Mobile MRI Unit in Confined Physical Space: Reporting Results of a Field-Deployment at a Radiology Exhibition. 1051-1057 - Ao Guo, Walid Brahim, Jianhua Ma:
Influences of Mental Stress Level on Individual Identification using Wearable Biosensors. 1058-1063 - Nabil Marzoug, Khidhr Halab, Younes Mamma, Fadoua Khennou, Othmane El Meslouhi:
LIDarknet: Experimenting the Power of Ensemble Learning in the Classification of Network Traffic. 1064-1071 - Veronika Bekbulatova, Andrea Morichetta, Schahram Dustdar:
FL-SERENADE: Federated Learning for SEmi-supeRvisEd Network Anomaly DEtection. A Case Study. 1072-1079 - Alfredo Cuzzocrea, Pau Figuera, Mojtaba Hajian, Pablo García Bringas:
A Theoretical Framework for Supporting Clustering Validation via Non-Negative-Matrix-Factorization Trace Sequences Over Probabilistic Spaces. 1080-1087 - Nancy A. Arafa, Saied M. Abd El-atty, Diana W. Dawoud, Mohamed S. Arafa:
Secrecy Capacity Evaluation for Vehicular Network Based on VLC. 1088-1093 - Yang Yu, Yuan Yuan Ma:
Research on User-Side Service Ownership Determination Technology of Power Systems Based on the Hybrid Model. 1094-1100 - Aisha Almaazmi, Shadi Atalla, Hamzah Ali Alkhazaleh, Wathiq Mansoor, Amjad Gawanmeh:
Predicting Student Dropout in Online Learning Platforms Using Deep Learning Techniques. 1107-1114 - Mingcheng Liu, Zhifei Chen:
Dynamic Type Misuse Detection and Analysis for Python-Based Edge Device Applications. 1115-1121 - Mengzhu Pan, Qianmu Li, Tian Qiu:
MERGE: Multi-Entity Relational Reasoning Based Explanation in Visual Question Answering. 1122-1129 - Janete Amaral, Alberto Sampaio Lima, José Neuman de Souza, José Antão Beltrão Moura:
An Architecture for Predictive Resource Allocation in Cloud Capacity Management Using Neural Networks. 1130-1136 - Weiye Tang, Daren Li, Wuyue Fan, Tianhao Liu, Man Chen, Omar Dib:
An Intrusion Detection System Empowered by Deep Learning Algorithms. 1137-1142 - Wilson Pavón, Justin Campaña, Paolo Santamaria, Christian Iza, Ricardo Zapata:
Intelligent Control System for Line Follower Robot: From Theory to Implementation on the Mechatronics Field. 1143-1148 - Jianhao Ma, Qi Liu, Yonghong Zhang, Xiaodong Liu:
A Generative Adversarial Model for Weather Radar Echo Extrapolation based on Cycle Generation Structure. 1149-1154 - Rahaf Adam Alnuaimi, Moatsum Alawida:
Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical Trends. 1155-1162 - Muhammad Majid Gulzar, Muhammad Mughees Ahmed, Adnan Shakoor, Huma Tahreem:
Design and Implementation of Biological Inspired Algorithm Coupled with Sliding Mode Controller for Autonomous Cruise Control System. 1163-1168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.