Abstract is missing.
- Detection of Anomalies in Multivariate Time Series Using Ensemble TechniquesAnastasios Iliopoulos, John Violos, Christos Diou, Iraklis Varlamis. 1-8 [doi]
- Bridging the European Earth-Observation and AI Communities for Data-Intensive InnovationAntonis Troumpoukis, Iraklis A. Klampanos, Despina-Athanasia Pantazi, Eleni Tsalapati, Mohanad Albughdadi, Mihai Alexe, Vasileios Baousis, Omar Barrilero, Bryce Billière, Alexandra Bojor, Pedro Branco, Lorenzo Bruzzone, Andreina Chietera, Philippe Fournand, Richard Hall, David Hassan, Michele Lazzarini, Adrian Luna, Dharmen Punjani, George Stamoulis, Giulio Weikmann, Marcin Ziólkowski, Xenia Ziouvelou, Manolis Koubarakis, Vangelis Karkaletsis. 9-16 [doi]
- Data-Driven Analysis of EV Energy Prediction and Planning of EV Charging InfrastructureArul Palaniappan, Purnima Bhukya, Sai Kiran Chitti, Jerry Gao 0002. 17-24 [doi]
- Finding BERT Errors Using Activation VectorsVedashree P. Bhandare, William Andreopoulos. 25-32 [doi]
- Detection of Fake Generated Scientific AbstractsPanagiotis C. Theocharopoulos, Panagiotis Anagnostou, Anastasia Tsoukala, Spiros V. Georgakopoulos, Sotiris K. Tasoulis, Vassilis P. Plagianakos. 33-39 [doi]
- Job Tailored Resume Content GenerationSumedh S. Kale, William Andreopoulos. 40-47 [doi]
- Data Compression and Decompression of Handwritten Digital-Ink Using Sparse Gaussian ProcessJinya Yano, Hiroyuki Fujioka. 48-52 [doi]
- Performance Comparison of Vector Based Forwarding and Depth Based Routing in Underwater Wireless Sensor NetworksElis Kulla, Donald Elmazi, Keita Matsuo. 53-57 [doi]
- Bird Species Identification from Audio DataChing-Seh Wu, Sasanka Kosuru, Samaikya Tippareddy. 58-62 [doi]
- Illicit item detection in X-ray images for security applicationsGeorgios Batsis, Ioannis Mademlis, Georgios Th. Papadopoulos. 63-70 [doi]
- Enhancing Disaster Response with Automated Text Information Extraction from Social Media ImagesHafiz Budi Firmansyah, Jose Luis Fernandez-Marquez, Jesús Cerquides, Valerio Lorini, Carlo A. Bono, Barbara Pernici. 71-78 [doi]
- Role of Liver Registration in Hepatocellular Carcinoma Treatment PlanningSarada Prasad Dakua, Snigdha Mohanty, Subhashree Mishra, Sudhansu Sekhar Singh, Julien Abinahed, Abdulla Al-Ansari. 79-86 [doi]
- ML-based Approaches for Wireless NLOS Localization: Input Representations and Uncertainty EstimationRafayel Darbinyan, Hrant Khachatrian, Rafayel Mkrtchyan, Theofanis P. Raptis. 87-94 [doi]
- Attribute-based access control rules supported by biclique patternsAbner Perez-Haro, Arturo Diaz-Perez. 95-102 [doi]
- Stress Centrality in Heterogeneous Multilayer Networks: Heuristics-Based DetectionKiran Mukunda, Anamitra Roy, Abhishek Santra, Sharma Chakravarthy. 103-110 [doi]
- Safe Route Recommendation based on Crime Risk Prediction with Urban and Crime DataDaye Kim, Juwon Baek, Jihu Yang, Hyun Roh, Heewon Jeong, Bryanna Ruiz, Minji Lee, Eric T. Matson. 111-118 [doi]
- Graph deep learning hashtag recommender for reelsSriya Balineni, William Andreopoulos. 119-126 [doi]
- CNN Feature Map Augmentation for Single-Source Domain GeneralizationAristotelis Ballas, Christos Diou. 127-131 [doi]
- Fact-Checking In Complex Networks : A hybrid textual-social based approachOthman El Houfi, Dimitris Kotzinos. 132-136 [doi]
- ECG classification using Deep CNN and Gramian Angular FieldYoussef Elmir, Yassine Himeur, Abbes Amira. 137-141 [doi]
- Thick Data Analytics for Identifying Eye Conditions using Siamese Lookalike Neural NetworJinan Fiaidhi, Sabah Mohammed. 142-146 [doi]
- Perceiving the Ukraine-Russia Conflict: Topic Modeling and Clustering on Twitter DataPhilip Chang, Ying-Tzu Yu, Abraham Sanders, Thilanka Munasinghe. 147-148 [doi]
- Innovative and Successful Real-Time Automatization for Production in Oil and Gas IndustryVictoria Dubié, Juan Manuel Perdigón, Leonardo Parra, Alexander Rodriguez. 149-150 [doi]
- Hybrid Deep Learning for Efficient Detection of Recalled ProductsHyo-Jae Yoo, Kwan-Hee Yoo. 151-152 [doi]
- Centralized or Decentralized? A Principal Agent Game of Network FormationJing Fu, Frank Page, Jean-Pierre Zigrand. 153-154 [doi]
- Soft Body Pose-Invariant Evasion Attacks against Deep Learning Human DetectionChen Li, Weisi Guo. 155-156 [doi]
- Visualizing Attractive Factors in Buddhist Statue Images Using Grad-CAMHirofumi Shimoe, Hiroyuki Fujioka. 157-158 [doi]
- A Model with Priority Queue with Heterogeneous Customers concerning Service TimeKaoru Fujioka, Yuna Tanaka. 159-160 [doi]
- Cross Data Analysis Platform based on Big Data ParadigmMohamed Zemmouri, Fatma Zohra Laalam, Yassine Himeur, Adel Oulefki, Okba Kazar, Chahrazad Toumi, Wathiq Mansoor, Shadi Attala, Abderrahmen Belhadi, Nadjib Mesbahi. 161-162 [doi]
- Personalized Tweet Recommendation Using Users' Image PreferencesShashwat Avinash Kadam, William Andreopoulos. 163-164 [doi]
- APNet: Attention Mechanism with Point Sampling Loss Network for Remote Sensing Images Semantic SegmentationXuan Zhang, Yushun Fan, Jia Zhang 0001. 165-172 [doi]
- SparkACO: A Spark-Based Ant Colony Optimization for Path Planning of Large-Scale Complex Road NetworksQibu Xiang, Shuxiang Xu, Yushun Fan, Jia Zhang 0001. 173-180 [doi]
- Reinforcement Learning with Neural Network-based Deterministic Game Tree ApproximationKevin Prakash, Genya Ishigaki. 181-185 [doi]
- Accident Prediction on E-Bikes Using Computer VisionRohith Puvvala Subramanyam, Abhay Naik, Mahima Agumbe Suresh. 186-190 [doi]
- Discrete Text Summarization (DeTS): A Novel Method Grounded in Natural Language Inference and Grammatical Sequence ScoringAbbas Golestani, Kristen Robinson, Melissa McMahan, Joe Meyer. 191-196 [doi]
- Towards Massive Log Anomaly Detection Based on an Enhanced Multi-dimensional Time-domain LSTMYue Wang, Chengze Zhang, Jianjun Yu. 197-204 [doi]
- Privacy and Anonymity For Multilayer Networks: A ReflectionAbhishek Santra, Kiran Mukunda, Sharma Chakravarthy. 205-209 [doi]
- Problem-Oriented Translational Health Informatics for Evidence Based Medicine and Privacy EnhancingSabah Mohammed, Jinan Fiaidhi. 210-214 [doi]
- Privacy and Trust in IoT Ecosystems with Big Data: A Survey of Perspectives and ChallengesTuan Minh Nguyen, Xuan-Son Vu. 215-222 [doi]
- Cybersecurity and Privacy Attacks Detection in IoT Networks with Improved Data Engineering and Machine Learning MethodsDonald Elmazi, Dimitrios A. Karras, Abdulsalam Alkholidi, Klea Çapari. 223-228 [doi]
- Grandma Karl is 27 years old - research agenda for pseudonymization of research dataElena Volodina, Simon Dobnik, Therese Lindström Tiedemann, Xuan-Son Vu. 229-233 [doi]
- MLN-Visualizer: Interactive Visualization of Graphs and Multilayer Network Analysis ResultsViraj Sabhaya, Amey Shinde, Abhishek Santra, Sharma Chakravarthy. 234-235 [doi]
- Digital Twin-Driven Degradation Modeling Method for Control Moment Gyroscope Health ManagementRunhao Cui, Xucong Huang, Peng Zhang, Diyin Tang. 236-241 [doi]
- Data-driven delivery model for distributing daily necessities to residents in a specific emergency areaCong Lu, Yong Wang. 242-246 [doi]
- A Review of Rotation Mechanical Fault Diagnosis Research Based on Deep Domain AdaptationShun Zhang, Gang Xie 0001, Juan Tian, Hui Shi, Xiaohong Zhang, Xiaoyin Nie, Xinlin Xie. 247-248 [doi]