Abstract is missing.
- Repudiation For Good: Privacy-Preserving Prompt Deniability Through Embedding-Based ApproximationEiman Mohammed, Shawqi Al-Maliki, Mohamed M. Abdallah 0001, Ala I. Al-Fuqaha. [doi]
- From High to Low: A Numerical Experiment to Analyse Contour Detection at Resolution Loss in Images of Damaged Glass PlatesSabrina Pietzsch, Sebastian Wollny, Paul Grimm. [doi]
- Scaling AI for Embryo Transition Detection: Benchmarking Spatio-Temporal Deep ModelsAissa Benfettoume Souda, Mohammed El Amine Bechar, Souaad Hamza-Cherif, Jean-Marie Guyader, Marwa Elbouz, Frederic Morel, Aurore Perrin, Nesma Settouti. [doi]
- Evolutionary Train-Test Split for Hierarchical Monte Carlo EnsembleZiauddin Ursani, Dmytro Antypov, Katie Atkinson, Matthew S. Dyer, Matthew J. Rosseinsky, Sven Schewe, Ahsan Ahmad Ursani, Andrij Vasylenko. [doi]
- Toward Agentic IAM: A Probabilistic Authorization Framework for Least Privilege AI WorkflowsJaouaher Zouari. [doi]
- Towards a Framework for Personal and Domestic CybersecurityÁngel Suarez-Bárcena, Antonio Santos-Olmo, Eduardo Fernández-Medina. [doi]
- Dual-Modality UAV Detection and Classification under Low-Visibility: A Synth-Real RGB-IR Dataset and Benchmark for Aerial SurveillanceHatoun Alshoail, Sarah Alruwais, Juri Alqorashi, Najah Alsubaie. [doi]
- A Multi-Layer Phishing Defense Framework for Trusted Cloud EnvironmentsAlias Davis, Samah Abdelsalam, Mustafa Ghaleb, Mohammed S. M. Gismalla, E. I. Eltahir, Mosab Hamdan. [doi]
- How to evaluate NoSQL Database Paradigms for Knowledge Graph ProcessingRosario Napoli, Antonio Celesti, Massimo Villari, Maria Fazio. [doi]
- Optimizing Video Analytics Inference Pipelines: A Case StudySaeid Ghafouri, Yuming Ding, Katerine Díaz-Chito, Jesús Martínez del Rincón, Niamh O'Connell, Hans Vandierendonck. [doi]
- Privacy-Preserving Machine Learning for Encrypted Traffic Classification in Secure Cloud ServicesSultan Almuhammadi, Nahad Alnahari, Rana Ba-amer. [doi]
- Development and Comparative Evaluation of Three Artificial Intelligence Models (NLP, LLM, JEPA) for Predicting Triage in Emergency Departments: A 7-Month Retrospective Proof-of-Concept: Triage Intelligent A l'Entréé des Urgences (TIAEU)Edouard Lansiaux, Ramy Azzouz, Emmanuel Chazard, Amélie Vromant, Eric Wiel. [doi]
- System Requirements for Decentralised Collaborative Machine Learning in Industry 4.0Sylwia Olbrych, Hans Aoyang Zhou, Anas Abdelrazeq, Robert H. Schmitt. [doi]
- Balancing Compression and Prediction: A Hybrid Autoencoder-LSTM Framework for Cloud WorkloadsLidia Kidane, Paul Townend, Thijs Metsch, Erik Elmroth. [doi]
- Edge-Driven Water Quality Monitoring and Prediction: A Spatio-Temporal GNN-based IoT Approach for Environmental SensingLia Anggraini, Elisha Elikem Kofi Senoo, Israel Rodrigues Soares, Thanda Shwe, Israel Mendonça, Masayoshi Aritsugi. [doi]
- Cloud-Based Phishing Awareness Analyzer for Automated User Training and AssessmentMohammad Alwanain, Abdullah M. Alnajim, Ibraheem Al-Hejri, Hassen Hamouda, Sheroz Khan, Abdul Wahid Khan. [doi]
- Design and Development of a Predictive Security Threat Management System Leveraging CWEs, CVEs, and CAPECsJoaquín Sierra-Granados, José L. Ruiz-Catalán, David Garcia Rosado, Manuel A. Serrano. [doi]
- Comparative Analysis of Motif-Based Anomaly Detection for Humidity Monitoring in Digital Twin SystemsIonica-Larisa Puiu, Daniela Zaharie, Teodor Florin Fortis. [doi]
- Single-Round Zero-Knowledge Proof for the Square-Root Problem in Cloud SystemsSultan Almuhammadi. [doi]
- An Empirical Study on Estimating Energy Consumption From Software TracesPhuong Nguyen, Adel Noureddine, CongDuc Pham. [doi]
- Gaia: Hybrid Hardware Acceleration for Serverless AI in the 3D Compute ContinuumMaximilian Reisecker, Cynthia Marcelino, Thomas W. Pusztai, Stefan Nastic. [doi]
- Early detection of backdoor attacks in federated learning via ecosystemic symmetry breakingCarlos Mario Braga Ortuño, Manuel A. Serrano, Eduardo Fernández-Medina. [doi]
- Dual-Space Augmentation and Sampling for Training Language Models on Limited and Imbalanced Surgical ReportsAshok Choudhary, Frank Lee, Cornelius A. Thiels, Hojjat Salehinejad. [doi]
- Zero Trust Architecture for Ransomware Defense in Virtualized EnvironmentAtharva Dhumal, Mustafa Ghaleb, Samah Abdelsalam, Arghir-Nicolae Moldovan, Mosab Hamdan. [doi]
- Reflect, Reason, Rephrase (R³-Detox): An In-Context Learning Approach to Text DetoxificationGuillermo Villate-Castillo, Javier Del Ser, Borja Sanz 0001. [doi]
- Building a Datasets for Character Product Detection from SNSMaho Funada, Reiya Sato, Yoshitaka Sakurai. [doi]
- Optimizing Code Embeddings and ML Classifiers for Python Source code Vulnerability DetectionTalaya Farasat, Joachim Posegga. [doi]
- Towards Efficient and Privacy-Preserving Cloud ComputingHeba Aljabrine, Md. Mahfuzur Rahman. [doi]
- Optimal Warehouse Distribution Center Placement using Evolutionary AlgorithmsCorrado Mio, Abdulla Alfalasi, Siddhartha Shakya. [doi]
- Verifiability and Privacy in Federated Learning through Context-Hiding Multi-Key Homomorphic AuthenticatorsSimone Bottoni, Giulio Zizzo, Stefano Braghin, Alberto Trombetta. [doi]
- BullyHCL: Unsupervised Heterogeneous Graph Contrastive Learning Framework for Session-based Cyberbullying DetectionMunkhbuyan Buyankhishig, Thanda Shwe, Israel Mendonça, Masayoshi Aritsugi. [doi]