Abstract is missing.
- Multi-Target Deblurred Monitoring Method Combining Millimeter Wave Radar and CameraQianshun Zou, Bing Sun 0002, Yiheng Zhou, Yunfei Xi. 1-5 [doi]
- An Efficient Provably Secure Identity-Based Authentication Technique for TMIS Under a Smart City EnvironmentChandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Agbotiname Lucky Imoize. 1-7 [doi]
- Emer: Reputation-Based Event Consumer for Event-Driven Decentralized SystemsYepeng Ding, LingFeng Zhang, Junwei Yu, Hiroyuki Sato, Tohru Kondo, Kouji Nishimura. 1-8 [doi]
- Penetration Testing Operating Systems: Exploiting VulnerabilitiesEvan Gardner, Gurmeet Singh, Weihao Qu. 1-9 [doi]
- Autonomous Ping Pong Ball CollectorAltaaf Ahmed Jahankeer, Gary Deng, Abdullah Aslam, Arjen Arumalingam. 1-7 [doi]
- Route Planning Algorithm Based on Irradiation Requirements for Laser-Guided Airborne Ground WeaponsHaoyu Yuan, Tingting Li, Chenguang Wang. 1-8 [doi]
- Fuzzy Logic-Based Preliminary Risk Assessment for a Supervised Federated Learning Solution in Predicting Student ResultsZsolt Csaba Johanyák, Edit Laufer, Levente Kovács. 1-8 [doi]
- A Correlation Approach for SOPs Detection Combining OFDMLi Zha, Hai Zhang, Cancan Tao, Shibo Qu. 1-8 [doi]
- Blockchain-Assisted Secure and Trusted Ticketing System for Outsourced Premier LeagueSapan Anupkumar Shah, Shanika Soni, Mohammad S. Obaidat, Nilesh Kumar Jadav, Jigna J. Hathaliya, Sudeep Tanwar, Nagendar Yamsani. 1-6 [doi]
- AutoCaps-Zero: Searching for Hardware-Efficient Squash Function in Capsule NetworksJieui Kang, Sooyoung Kwon, HyoJin Kim, Jaehyeong Sim. 1-8 [doi]
- Silhouette-Based Selectivity Analysis of a Staircase-Modulated Electronic NoseZhiyuan Wu, Fengchun Tian, James Anthony Covington, Hantao Li, Li Hu, Yue Liu. 1-8 [doi]
- Boundary Scenario Generation Method of the Intelligence System Based on Adaptive Poisson Disk SamplingXirui Wang, Hui Lu, Shiqi Wang, Zhu Zheng. 1-8 [doi]
- Shape Prior Enhanced Unet Model for Medical Image SegmentationSong Fang, Jiamin Wang, Zirun Zhao, Chaopeng Wei, Xudong Zhang, Jiaxin Wang, Mohammad S. Obaidat, Xiaokun Wang. 1-9 [doi]
- Mitigating Broadcast Propagation in Redundant BMA Networks Using Layer 3 UplinksBoma ThankGod-Ibulubo, Harpreet Singh, Cosmas Ifeanyi Nwakanma, Edwin Allotey-Acquaye. 1-8 [doi]
- OCW: Enhancing Few-Shot Learning with Optimized Class-Weighting MethodsJieui Kang, Subean Lee, Eunseo Kim, Soeun Choi, Jaehyeong Sim. 1-8 [doi]
- DNN-Based Speech Enhancement on MicrocontrollersZahra Kokhazad, Charalampos Bournas, Dimitrios Gkountelos, Georgios Keramidas. 1-7 [doi]
- Exploring the Landscape: A Systematic Review of Artificial Intelligence Techniques in CybersecurityMd Kamruzzaman, Md Khokan Bhuyan, Rakibul Hasan, Syeda Farjana Farabi, Sadia Islam Nilima, Md Azhad Hossain. 1-6 [doi]
- GemmaWithLoRA: A New Approach to Click Fraud DetectionBingzhou Dai, Lei Wang, Xiaoyong Zhao, Yu Guo 0001, Mohammad S. Obaidat. 1-8 [doi]
- A Perfect Secrecy Communication Scheme Based on Strictly Typical Artificial Noise and Cascaded Secure CodesRen Duan, Meng Ma, Chaohai Du. 1-5 [doi]
- Machine Learning-Based Security Mechanism for Detecting Phishing AttacksPragya Bhatt, Mohammad S. Obaidat, Gagan Dangwal, Ashok Kumar Das, Mohammad Wazid, Balqies Sadoun. 1-6 [doi]
- A Transfer Learning-Based Intelligent Judiciary System for Public SafetyLakshin Pathak, Mili Virani, Mohammad S. Obaidat, Prachita Patel, Jigna J. Hathaliya, Nilesh Kumar Jadav, Sudeep Tanwar, Nagendar Yamsani. 1-6 [doi]
- Healthcare Data Analytics Based on Machine LearningVeska Gancheva. 1-6 [doi]
- Application-Independent DVFS Method Based on OS Metrics Monitoring for Cloud ServersHirofumi Noguchi, Masashi Kaneko. 1-6 [doi]
- Mobility-Aware Vehicle Selection Strategy for Federated Learning in the Internet of VehiclesXing Chang, Mohammad S. Obaidat, Xiaoping Xue, Jingxiao Ma, Xiaowen Duan. 1-6 [doi]
- Enhancing Electronic Health Record Systems with Serverless Blockchain IntegrationAbhijay Rana, Kevin Lu, Rudransh Singh. 1-5 [doi]
- Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMTDeepika Gautam, Garima Thakur, Mohammad S. Obaidat, Kuei-Fang Hsiao, Pankaj Kumar 0006. 1-8 [doi]
- M- VMT-PC: Metaverse-Enabled Virtual Medical Training and Patient Care Framework Underlying 5GAparna Kumari, Mohammad S. Obaidat, Shikhar Panchal, Nikhil Raval, Prasun Kumar, Dileep Kumar Yadav. 1-7 [doi]
- FedHZone: Federated Learning Based Hazardous Zone Detection Using Internet of Drone ThingsPayel Biswas, Debashis De, Mohammad S. Obaidat, Arnab Hazra, Balqies Sadoun. 1-6 [doi]
- Controllability of Symmetric Double Layer NetworksJinLong Wang, Qiang Zhang. 1-7 [doi]