Abstract is missing.
- Drone Detection: Countering Optical Evasion Strategies Using Deep LearningShaibal Das, Mostafa M. Fouda. 1-5 [doi]
- Analyzing A/B Testing Results in Digital MarketingHabibur Rahman, Md Tanvir Chowdhury, Monjurul Islam Sumon, Fatiha Mahbub Mim, Mohammad Rifat Ahmmad Rashid, Raihan Ul Islam, Mahamudul Hasan. 1-5 [doi]
- Social Impact of Healthcare Privatization: An AnalysisA. N. K. Zaman, Prosenjit Chatterjee, Tapas Vashi. 1-5 [doi]
- Deep Learning Approaches for Detecting Adversarial Cyberbullying and Hate Speech in Social NetworksSylvia Worlali Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer, Amanda La Guardia. 1-10 [doi]
- Interrupted time series analysis of clickbait on worldwide news websites, 2016-2023Chris Brogly, Austin McCutcheon. 1-4 [doi]
- French regional languages identification using custom dataset and Naive Bayes modelStephane Maillard, Mohammad Safayet Khan. 1-5 [doi]
- Advancements in Brain Tumor Detection: Utilizing Xception Enhanced Tumor Identifier NetworkSandeep Shiraskar, Dominick Rizk. 1-5 [doi]
- A Survey on the Landscape of Machine Learning Solutions for Detecting Phishing AttacksShijon Das, Mohamed I. Ibrahem, Mostafa M. Fouda. 1-7 [doi]
- Enhanced IoT Data Security with Robust AES-CBC Encryption AlgorithmMohamed A. Torad, Mohamed Abdulhamid ElKassas, Ahmed F. Ashour, Mostafa M. Fouda, Eslam Samy EL-Mokadem. 1-6 [doi]
- Detection of DoS and DDoS Attacks Using Machine Learning and Blockchain in IoMT NetworksAtul Agrawal, Pashupati Baniya, Esraa Mohammed Alazzawi, Nitin Rakesh, Bharat Bhushan, Akhtar Jamil. 1-5 [doi]
- A Lightweight AI Model for Anomaly Detection in Wireless NetworksThomas J. Kopcho, Mostafa M. Fouda, Cameron J. Krome. 1-6 [doi]
- Hybrid Deep Learning/Machine Learning Model for Retinal Diseases Classifications Using OCT ImagesVasavi Krishna Chintamaneni, Sai Kiran Debbadi, Sri Srujani Kandula, Rasha S. Gargees. 1-5 [doi]
- Hybrid Modeling for Condition Monitoring in Digital Twin SystemsBrett Sicard, S. Andrew Gadsden. 1-5 [doi]
- Comparative Analysis of Tree Classifiers to Mitigate Fraud in Electronic Loan ApplicationFoster Yeboah, Jones Yeboah, George Yeboah, Kofi Bampoh, Owusu Nyarko-Boateng. 1-4 [doi]
- Deep Enough? On the Effectiveness of Deep Learning in Phishing Email DetectionArifa I. Champa, Md. Fazle Rabbi, Mostafa M. Fouda, Minhaz F. Zibran. 1-7 [doi]
- Efficient Deep Learning Approach for Arthritis PredictionKasem Khalil, Samiul Islam Niloy, Tamador Mohaidat, Md Rahat Kader Khan, Magdy A. Bayoumi. 1-5 [doi]
- Novel Saliency Analysis for the Forward-Forward AlgorithmMitra Bakhshi. 1-5 [doi]
- Automated Phenotyping of Herbaceous Biomass Using U-Net Architecture for μ-CT Images SegmentationAntora Dev, Yomna Mohamed, Ahmed Hamed, Yidong Xia, Robert Seifert, Mostafa M. Fouda. 1-6 [doi]
- Curvature-Based Piecewise Linear Approximation Method of GELU Activation Function in Neural NetworksTamador Mohaidat, Md Rahat Kader Khan, Kasem Khalil. 1-5 [doi]
- Real-Time American Sign Language Recognition Using Machine LearningJason Eckardt-Taing, Yasser Alginahi. 1-5 [doi]
- Deep Learning-based Techniques for Intrusion Detection SystemsNafay Rizwani, Akhtar Jamil, Alaa Ali Hameed. 1-9 [doi]
- Exploring Advanced Techniques for Identifying Electricity Theft in Smart Grid SystemsHussien AbdelRaouf, Mohamed I. Ibrahem. 1-6 [doi]
- Seeing Isn't Always Believing: Unveiling the Financial Risks of Fraudulent Images on Personal Finances in Online ShoppingEnkeleda Lulaj, Desi Tahiraj, Alaa Ali Hameed, Donjeta Lulaj. 1-10 [doi]
- RF-Based Lightweight Machine Learning for Comprehensive Drone Activity ClassificationMohammed A. Alqodah, Mahdia Tahsin, Mohammad H. Omari, Mustafa M. Matalgah, David Harrison. 1-5 [doi]
- A Light-Weight Image to Description Model Using Knowledge DistillationEisha Rehan, Shahwaiz Memon, Muhsin Raza, M. Asif Naeem, Fazeel Nadeem Bhatti. 1-7 [doi]
- Optimizing Resource Utilization and Power Efficiency in FPGA-Accelerated YOLOv8 Object Detection Using Vivado High-Level Synthesis (HLS) ToolEssel Emmanuel, Fred Lacy, Yasser Ismail. 1-4 [doi]
- Smart Home Automation System controlling Through Computer VisionMd Sabbir Hossain, Ummay Khadiza Rumpa, Shatabdi Sharma, Mamunur Rashid, Habibur Rahman, Sazzadul Islam Shovon. 1-5 [doi]
- Scaling Visual Creativity: Benchmarking stable-diffusion-3 on AWS CloudYash Jani. 1-7 [doi]
- Resource Efficient Deep Learning Architectures for Histopathology-Based Colorectal Cancer DetectionMd. Bipul Hossain, Mohamed Shaban. 1-5 [doi]
- Reinforcement Learning for Autonomous Agents via Deep Q Networks (DQN) within ViZDoom environmentEnoch Solomon. 1-5 [doi]
- Alzheimer's Disease Stage Classification using Blood DataAsif Rasheed, Zubair Md. Fadlullah, Mostafa M. Fouda. 1-5 [doi]
- Efficient Health Class Recommendations for Kaiser Permanente Members: A Scalable Embedding-Based ApproachMohammad Amir Sharif, Phuong Hoang, Justin Huang, Wenshan Wang, David Molina, Ajay Kumar, Suhai Liu, Faizan Javed. 1-5 [doi]
- End-to-End Secure Video Streaming Using Homomorphic Encryption TechniquesMahmoud Darwich, Kasem Khalil, Magdy A. Bayoumi. 1-6 [doi]
- A Review of Spectrum Sharing in 6G for IoT EnvironmentAndleeb Khan, Parma Nand, Bharat Bhushan, Esraa Mohammed Alazzawi, Akhtar Jamil. 1-6 [doi]
- A Review of Blockchain based Decentralised Authentication Solutions and their improvement through MetamaskAndleeb Khan, Parma Nand, Bharat Bhushan, Alaa Ali Hameed, Akhtar Jamil. 1-5 [doi]
- Unraveling Model Inversion Attacks: A Survey of Machine Learning VulnerabilitiesTanzim Mostafa, Mohamed I. Ibrahem, Mostafa M. Fouda. 1-8 [doi]
- Secure Energy Transactions in Smart Grids Using Blockchain and Machine LearningMohamad Zafar Iqbal Badar, Mohammed Majid M. Al Khalidy. 1-10 [doi]
- Enhancing Network Intrusion Detection System Using NDAE With XgboostYakubu Joseph Itodo, Isaac Kofi Nti. 1-9 [doi]
- Demand Response in Smart Grids: Challenges, Solutions, and Security ImplicationsHussien AbdelRaouf, Ryker Gogolkiewicz, Nathaniel Kim, Nicholas McCaughan, Joel Alanes, Ali Nadhaif, Mostafa M. Fouda, Mohamed I. Ibrahem. 1-6 [doi]
- An Efficient Multi-threaded Collaborative Filtering Approach in Recommendation SystemMahamudul Hasan. 1-6 [doi]
- Comparative Analysis of AlexNet, GoogLeNet, VGG19, ResNet50, and ResNet101 for Improved Plant Disease Detection Through Convolutional Neural NetworksAtoshe Islam Sumaya, Shamim Forhad, Md Al Rafi, Hamdadur Rahman, Muhibul Haque Bhuyan, Qazi Tareq. 1-6 [doi]
- A Thematic Analysis and Detection of Fraudulent Online RatingsSivani Chava, Isaac Kofi Nti, Murat Ozer. 1-6 [doi]
- Risks, Causes, and Mitigations of Widespread Deployments of Large Language Models (LLMs): A SurveyMd. Nazmus Sakib, Md Athikul Islam, Royal Pathak, Md Mashrur Arifin. 1-7 [doi]
- Future-Proofing Computer Behavior: A Framework for Predictive Analytics and Seamless Device IntegrationMichael Arthur Mills, Tala Talei Khoei. 1-5 [doi]
- Predicting Acute Myocardial Infarction Using Machine Learning AlgorithmsMd Rahat Kader Khan, Tamador Mohaidat, Kasem Khalil. 1-5 [doi]
- Secure and Efficient Face Recognition via Supervised Federated LearningEnoch Solomon, Abraham Woubie, Eyael Solomon Emiru, Ahmed F. Abdelzaher. 1-5 [doi]
- The Use of Blockchain to Enhance Transparency and Accountability in SRE WorkflowsAyisha Tabbassum, Vinod Goje, Pradeep Chintale, Shaik Abdul Kareem. 1-6 [doi]
- Vectorizing Judicial Texts: A Novel Approach for Analysing POCSO Judgments using Text Embeddings and TransformersShekhar Shukla, Vartul Shrivastava. 1-5 [doi]
- Early Detection of Heart Disease Using Machine Learning Algorithm: Performance Analysis and Model ComparisonOdunayo Gabriel Adepoju, Kevin Jin, Kemi Akanbi, Saheed Popoola. 1-5 [doi]
- Adaptive Multi-Path Video Streaming Using AI-Driven Edge Computing for Enhanced Quality of Experience (QoE)Mahmoud Darwich, Kasem Khalil, Magdy A. Bayoumi. 1-6 [doi]
- Comparative Analysis of Hate Speech Detection Using Various Vectorization and Classification TechniquesSophia Tali, Daniel Noguera, Rasha S. Gargees. 1-5 [doi]
- Wheat Field Fire Smoke Detection from UAV Images using CNN-CBAMAhmed Alsalem, Mohamed Zohdy. 1-8 [doi]
- Exploring the Challenges and Solutions for Securing Smart CitiesMd Tanvir Chowdhury, Habibur Rahman, Md Safayet Islam, Monjurul Islam Sumon, Abu Talha, Abin Roy, Md Moinul Hassan, Md Rabiul Hasan Rabin. 1-5 [doi]
- Prediction of Freezing of Gait for Patients with Parkinson's Disease Using Deep LearningMohamed Shaban. 1-4 [doi]
- Hybrid Four Vector Intelligent Optimizer with SaDE for Solving Robot Gripper Optimization ProblemHussam N. Fakhouri, Faten Hamad. 1-6 [doi]
- Uncovering User Concerns and Preferences in Static Analysis Tools: a Topic Modeling ApproachJones Yeboah, Saheed Popoola. 1-6 [doi]
- Predictive Quality Defects Combining Design of Experiments and Machine Learning: A Case Study on Shrinkage in Injection MoldingFaouzi Tayalati, Ikhlass Boukrouh, Abdellah Azmani, Monir Azmani. 1-5 [doi]
- Automatic Pull Request Description Generation Using LLMs: A T5 Model ApproachMd. Nazmus Sakib, Md Athikul Islam, Md Mashrur Arifin. 1-5 [doi]
- An Ensemble Weighted User-Based Collaborative Filtering Recommender SystemMahamudul Hasan, Rambabu Nalagandla. 1-6 [doi]
- Enhancing Security in Smart Cities: A Blockchain and AI Integrated FrameworkSheenam Naaz, Suraiya Parveen, Ihtiram Raza Khan, Safdar Tanweer. 1-5 [doi]
- An Efficient Deep Learning-based Model for Detecting and Tracking Multiple ObjectsDhanush Adithya Balamurugan, Tala Talaei Khoei, Aditi Singh. 1-6 [doi]
- Real-Time Drivers' Drowsiness Detection: A Deep Learning ApproachANK Zaman, Prosenjit Chatterjee, Rajat Sharma. 1-5 [doi]
- Analyzing User Sentiments Towards Static Analysis Tools: A Study Using User ReviewsJones Yeboah, Saheed Popoola. 1-7 [doi]
- Thyro-AI: Harnessing Machine Learning for Thyroid PredictionNaga Sri Harsha Sankabathula, Isaac Kofi Nti, Murat Ozer. 1-6 [doi]
- Unifying Sky and Chain: A Perspective on Blockchain's Role in UAV SwarmsAbhishek Phadke, Chandra N. Sekharan, Karthik Kumar Vasudeva, Dulal Kar. 1-9 [doi]
- Embedded Intelligence Algorithms to Improve Performance in Software-Defined Networks (SDN)Ghassan A. Abed. 1-6 [doi]
- Limited Resources Usage of Deep-Learning-Based IoT Devices in HealthcareXian Gao, Peixiong He, Yi Zhou 0009, Xiao Qin 0001. 1-6 [doi]
- Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks DetectionMd Abdur Rahman, Hossain Shahriar, Fan Wu 0013, Alfredo Cuzzocrea. 1-7 [doi]
- Deceptive Approach for Internet of Things Security with Machine LearningVolviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua. 1-5 [doi]
- Integrating Genetic Algorithms and Analytic Hierarchy Process for Customer Retention Optimization in E-CommerceIkhlass Boukrouh, Faouzi Tayalati, Abdellah Azmani. 1-5 [doi]
- Analyzing the Impact of Security Measures on Wi-Fi Quality of ServiceThomas J. Kopcho, Mostafa M. Fouda, Cameron J. Krome, Anna T. Quach, Israel G. Olaveson. 1-5 [doi]
- Privacy Preservation Techniques in Smart Grids: Balancing Security and Utility in IoT-Driven EnvironmentsHussien AbdelRaouf, Michael Long, Paul Tran, Luna Baral, Zuha Khan, Mohamed Mahmoud 0001, Mostafa M. Fouda, Mohamed I. Ibrahem. 1-6 [doi]
- Harnessing IT Best Practices: IoT for Continuous Monitoring and Control in AgricultureSiddique Abubakr Muntaka, Murat Ozer, Emmanuel Kojo Gyamfi, Faiza Hussein, Mohammed Nadhir Muntaka, Insanatu Muntaka. 1-5 [doi]
- Console Log Explainer: A Framework for Generating Automated Explanations using LLMShakib Sadat Shanto, Rahul Paul, Zishan Ahmed, Ahmed Shakib Reza, Kazi Mejbaul Islam, Saumya Shovan Roy. 1-5 [doi]