Abstract is missing.
- IEEE COMPSAC 2023 - Resilient Computing and Computing for Resilience in a Sustainable Cyber-Physical World: Summary and Future Research DirectionsAlfredo Cuzzocrea, Moushumi Sharmin, Yuuichi Teranishi, Dave Towey. [doi]
- When graphs meet game theory: a scalable approach for robotic car racingAhmet Tikna, Marco Roveri, Daniele Fontanelli, Luigi Palopoli 0002. 1-8 [doi]
- Robotic Gel Dispensing based on Visual Servoing for Fiber ThreadingHouari Bettahar, Vieira Arthur, Quan Zhou 0001. 9-17 [doi]
- Efficient Diverse Redundant DNNs for Autonomous DrivingMartí Caro, Jordi Fornt, Jaume Abella 0001. 18-27 [doi]
- The Anatomy of Software Changes and Bugs in Autonomous Operating SystemKaterina Goseva-Popstojanova, Denny Hood, Johann Schumann, Noble Nkwocha. 28-38 [doi]
- Robust 6D Pose Estimation for Texture-varying Objects in Autonomous SystemMasaya Fujiwaka, Kousuke Nogami. 39-44 [doi]
- Towards Environment-Dependent Model Switching for Performance and Accuracy Conscious Object Detection in Day- and Nighttime Urban Traffic EnvironmentsKevin Schmidt, Sabolc Jut. 45-50 [doi]
- Adaptive Expected Reactive algorithm for Heterogeneous Patrolling Systems based on Target UncertaintyNiccolò De Bona, Luca Santoro, Davide Brunelli, Daniele Fontanelli. 51-56 [doi]
- Program Balancing in Compilation for Buffered Hybrid Dataflow ProcessorsAnoop Bhagyanath, Klaus Schneider 0001. 57-66 [doi]
- FACEE: Framework for Automating CNN Explainability EvaluationAhmad Rezaei, Johannes Nau, Johannes Richter, Detlef Streitferdt, Jörg Schambach. 67-78 [doi]
- Efficient hard real-time implementation of CNNs on multi-core architecturesJonas Peeck, Robin Hapka, Rolf Ernst. 79-90 [doi]
- Memory-virtualizing and -devirtualizing VM Migration with Private Virtual MemoryYuji Muraoka, Kenichi Kourai. 91-96 [doi]
- L2 Cache Access Pattern Analysis using Static Profiling of an ApplicationTheodora Adufu, Yoonhee Kim. 97-102 [doi]
- Multilevel modeling for the analysis and prediction of school dropout: a systematic reviewMyke Morais de Oliveira, Ellen Francine Barbosa. 103-112 [doi]
- Orientative teaching with Open Educational Resources: the role of teachers in students' transition from high school to universityAlice Barana, Marina Marchisio, Matteo Sacchet. 113-121 [doi]
- OPTES: A Tool for Behavior-based Student Programming Progress EstimationYuqian Zhuang, Liang Wang 0006, Mingya Zhang, Shan Lin, Hao Hu, XianPing Tao. 122-131 [doi]
- Early Prediction of Student Performance with LSTM-Based Deep Neural NetworkHan Wan, Mengying Li, Zihao Zhong, Xiaoyan Luo. 132-141 [doi]
- Personalizing Student Graduation Paths Using Expressed Student InterestsNicolas Dobbins, Ali R. Hurson, Sahra Sedigh Sarvestani. 142-143 [doi]
- Hybrid/Online Teaching: A Survey and Key IssuesYue Jiang, Hoi Yan Lin, Long Fai Cheung, Henry C. B. Chan, Ping Li 0026. 152-157 [doi]
- Requirements for an international educational collaboration system architecture, a case study: Coláiste Nano Nagle School in Limerick, Ireland, and Irshad High School in Kabul, AfghanistanSalim Saay, Alex Norta. 158-163 [doi]
- LogKT: Hybrid Log Anomaly Detection Method for Cloud Data CenterXuedong Ou, Jing Liu. 164-173 [doi]
- DAC-PPYOLOE+: A Lightweight Real-time Detection Model for Early Apple Leaf Pests and Diseases under Complex BackgroundBin Liu, Xiaoyu Bai, Xinyue Su, Chenxi Song, Zhuohan Yao, Xing Wei, Haixi Zhang. 174-182 [doi]
- Context-aware, Composable Anomaly Detection in Large-scale Mobile NetworksNgoc Nhu Trang Nguyen, Hong-Linh Truong 0001. 183-192 [doi]
- Failure Prediction in 2D Document Information Extraction with Calibrated Confidence ScoresJuhani Kivimäki, Aleksey Lebedev, Jukka K. Nurminen. 193-202 [doi]
- A Hybrid Intrusion Detection System Based on Feature Selection and Voting ClassifierRong Liu, Zemao Chen, Jiayi Liu. 203-212 [doi]
- Towards course of disease based epidemiological modelling: motivation and computational optimizationYu-Heng Wu, Torbjörn E. M. Nordling. 213-222 [doi]
- Adversarial Human Context Recognition: Evasion Attacks and DefensesAbdulaziz AlAjaji, Walter Gerych, Kavin Chandrasekaran, Luke Buquicchio, Emmanuel Agu, Elke A. Rundensteiner. 223-232 [doi]
- Signal Processing Based Method for Real-Time Anomaly Detection in High-Performance ComputingArunavo Dey, Tanzima Z. Islam, Chase Phelps, Christopher Kelly. 233-240 [doi]
- ContrastNER: Contrastive-based Prompt Tuning for Few-shot NERAmirhossein Layegh, Amir Hossein Payberah, Ahmet Soylu, Dumitru Roman, Mihhail Matskin. 241-249 [doi]
- Application Recommendation based on Metagraphs: Combining Behavioral and Published InformationJinyi Wang, Tong Li, Hongyu Gao. 250-259 [doi]
- Human Activity Dataset of Top Frequent Elderly Emergencies for Monitoring Applications using KinectRaoudha Nouisser, Salma Kammoun Jarraya, Mohamed Hammami. 260-267 [doi]
- Generating Host-Based Data from Network Traces for Intrusion DetectionPatrick Day, Stefano Iannucci, Ioana Banicescu. 268-273 [doi]
- Discrepancy Scaling for Fast Unsupervised Anomaly LocalizationJuha Mylläri, Jukka K. Nurminen. 274-279 [doi]
- Historical Redundant Process Data Recovery based on Genetic AlgorithmYing-Feng Hsu. 280-285 [doi]
- Anomaly Localization in Audio via Feature Pyramid MatchingJorma Valjakka, Juha Mylläri, Lalli Myllyaho, Juhani Kivimäki, Jukka K. Nurminen. 286-291 [doi]
- GX-HUI: Global Explanations of AI Models based on High-Utility ItemsetsDavide Napolitano, Luca Cagliero. 292-297 [doi]
- Examining Feasibility and Efficacy of Traditional Stream Clustering Algorithms on Complex Human Activity Recognition DataMartin Woo, Farhana H. Zulkernine, Hanady M. Abdulsalam. 298-303 [doi]
- Improved Deep Embedded K-Means Clustering with Implicit Orthogonal Space TransformationXinrui Liu, Wenzheng Liu, Yuxiang Li, Xiaoyong Tang, Tan Deng, Ronghui Cao. 304-309 [doi]
- An Analysis of Grading Patterns in Undergraduate University CoursesGary M. Weiss, Luisa A. L. Rosa, Hyun Jeong, Daniel D. Leeds. 310-315 [doi]
- Performance Evaluation of Transformer-based NLP Models on Fake News Detection DatasetsRaveen Narendra Babu, Chung-Horng Lung, Marzia Zaman. 316-321 [doi]
- DA-Parser: A Pre-trained Domain-aware Parsing Framework for Heterogeneous Log AnalysisShimin Tao, Yilun Liu, Weibin Meng, Jingyu Wang, Yanqing Zhao, Chang Su 0001, Weinan Tian, Min Zhang, Hao Yang 0006, Xun Chen. 322-327 [doi]
- PrefixCDD: Effective Online Concept Drift Detection over Event Streams using Prefix TreesJesús Huete, Abdulhakim Ali Qahtan, Marwan Hassani. 328-333 [doi]
- NP-Free: A Real-Time Normalization-free and Parameter-tuning-free Representation Approach for Open-ended Time SeriesMing-Chang Lee, Jia-Chun Lin, Volker Stolz. 334-339 [doi]
- A Real-Time Text Analysis SystemChi Mai Nguyen, Phat Trien Thai, Duy Khang Lam, Van Tuan Nguyen. 340-345 [doi]
- Spatio-Temporal Agnostic Deep Learning Modeling of Forest Fire Prediction Using Weather DataAbdul Mutakabbir, Chung-Horng Lung, Samuel A. Ajila, Marzia Zaman, Kshirasagar Naik, Richard Purcell, Srinivas Sampalli. 346-351 [doi]
- Automatic Parallelization of Cellular Automata for Heterogeneous PlatformsChase Phelps, Tanzima Z. Islam. 352-361 [doi]
- An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoTCui Zhang, Hui Yang, Jun Li, Yunhua He, Jie Zhang 0006, Qiuyan Yao, Chao Li. 362-369 [doi]
- Reflections Removal Produced by Multiple Transparent and Reflective Glass Objects in TLS MeasurementsWanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai. 370-379 [doi]
- Neural optimization for quantum architectures: graph embedding problems with Distance Encoder NetworksChiara Vercellino, Giacomo Vitali, Paolo Viviani 0001, Alberto Scionti, Andrea Scarabosio, Olivier Terzo, Edoardo Giusto, Bartolomeo Montrucchio. 380-389 [doi]
- A phased game algorithm combining deep reinforcement learning and UCT for Tibetan Jiu chessXiali Li, Yandong Chen, Yanyin Zhang, Bo Liu, Licheng Wu. 390-395 [doi]
- Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical IndustryChenghan Wang, Shanshan Wang, Chuan Zhao, Wenyue Wang, Bin Hu, Youmian Wang, Lin Wang, Zhenxiang Chen. 396-405 [doi]
- Limiting the Spread of Misinformation on Multiplex Social NetworksYumi Fujita, Sho Tsugawa. 406-411 [doi]
- AGAA: An Android GUI Accessibility Adapter for Low Vision UsersYifang Xu, Zhuopeng Li, Huaxiao Liu, Yuzhou Liu. 412-421 [doi]
- Is Twitter a News Source or a Social Platform: A Case Study of Covid-19 Vaccine ConversationsAditi Dubey, Likhitadevi Athina, Swapna S. Gokhale. 422-427 [doi]
- Machine Learning Based Method for Auditing Personnel Expenses in Public ExpenditurePedro Henrique Teixeira, Nádia Félix F. da Silva, Rogerio Salvini. 428-437 [doi]
- Data Interoperating Architecture (DIA): Decoupling Data and Applications to Give Back Your Data OwnershipJiuqi Wei, Ying Li, Yufan Fu, Youyi Zhang, Xiaodong Li. 438-447 [doi]
- Multi-Agent Reinforcement Learning in Dynamic Industrial ContextHongyi Zhang, JingYa Li, Zhiqiang Tyler Qi, Anders Aronsson, Jan Bosch, Helena Holmström Olsson. 448-457 [doi]
- MIRec: Neural News Recommendation with Multi-Interest and Popularity-Aware ModelingYuxin Zhang, Gaode Chen, Lei Wang, Xiaobo Guo, Liyue Ren. 458-465 [doi]
- Knowledge Graph Generation for Unstructured Data Using Data Processing PipelineSushmi Thushara Sukumar, Chung-Horng Lung, Marzia Zaman. 466-471 [doi]
- Moving Towards an Accessible Approach to Music Therapy for Autistic People: A Systematic ReviewSamantha Dobesh, Jamey Albert, Shameem Ahmed, Moushumi Sharmin. 472-480 [doi]
- Learning analytics to monitor and predict student learning processes in problem solving activities during an online trainingCecilia Fissore, Francesco Floris, Marina Marchisio, Sergio Rabellino. 481-489 [doi]
- Public Bicycle Flow Forecasting using Spatial and Temporal Graph Neural NetworkXiang-Li Lu, Hwai-jung Hsu, William Cheng-Chung Chu. 490-499 [doi]
- Assessing and Improving the Quality of Generated Tests in the Context of Maintenance TasksWesley B. R. Herculano, Everton L. G. Alves, Melina Mongiovi. 500-501 [doi]
- Deep Reinforcement Learning Based Rendering Service Placement for Cloud Gaming in Mobile Edge Computing SystemsYongqiang Gao, Zhihan Li. 502-511 [doi]
- Positioning Vectors for Mobile Ad-Hoc PositioningYerkezhan Sartayeva, Yunfei Liu, Yik Him Ho, Henry C. B. Chan. 512-517 [doi]
- SRv6 Network Debugging Support System Assigning Identifiers to SRHShuichiro Shimatani, Hiroki Kashiwazaki, Nobukazu Iguchi. 518-525 [doi]
- Latency analysis of JP and Root DNS servers from packet capture dataKazunori Fujiwara, Shuji Sannomiya, Akira Sato, Kenichi Yoshida. 526-531 [doi]
- Fetal ECG Signal Processing for Fetal Monitoring Based on BSS and EMDIonut Manea, Dragos-Daniel Taralunga. 532-538 [doi]
- Post-stroke Exercise Assessment using Hybrid Quantum Neural NetworkMd Abdullah Al Hafiz Khan, Manohar Murikipudi, Abm. Adnan Azmee. 539-548 [doi]
- Comprehensive Analysis of Dieting Apps: Effectiveness, Design, and Frequency UsageAllison Hsu, Ying-Feng Hsu. 549-557 [doi]
- Transformer-based Automatic Mapping of Clinical Notes to Specific Clinical ConceptsJay Ganesh, Ajay Bansal. 558-563 [doi]
- OB-GYN Telehealth Access and Utilization During COVID-19: Racial and Sociodemographic DisparitiesMohammad Yousef Alkhawaldeh, Muhammad Arsyad Subu, Nabeel Al-Yateem, Syed Azizur Rahman, Fatma Refaat Ahmed, Jacqueline Maria Dias, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Ahmed Hossain. 564-568 [doi]
- Usability differences of telehealth technologies by Multi-linguistic and Multi-cultural users in UAEFatma Refaat Ahmed, Ragad Ghassan Zabin, Rawan Saad Abukoush, Abdullah Ahmad Alnahoum, Mohammad Yousef Alkhawaldeh, Nabeel Al-Yateem, Muhammad Arsyad Subu, Amina Alboloshi, Amina Al-Marzouqi, Alkhansa Ahmad Alawad, Syed Azizur Rahman, Ahmed Hossain. 569-573 [doi]
- Reconstructing Android User Behavior through Timestamped State ModelsHonghe Zhou, Phuong Dinh Nguyen, Lin Deng, Weifeng Xu, Josh Dehlinger, Suranjan Chakraborty. 574-585 [doi]
- Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code ObfuscationLeo Song, Steven H. H. Ding. 586-594 [doi]
- A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs PermissionsJianyi Zhang, Leixin Yang, Yuyang Han, Zixiao Xiang, Xiali Hei. 595-606 [doi]
- SILK: Constraint-guided Hybrid FuzzingJunhao Li, Yujian Zhang. 607-616 [doi]
- Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural NetworksSamer Y. Khamaiseh, Derek Bagagem, Abdullah S. Al-Alaj, Mathew Mancino, Hakem Alomari, Ahmed AlEroud. 617-626 [doi]
- Privacy Protection Federated Learning Framework Based on Blockchain and Committee Consensus in IoT DevicesShuxin Zhang, Jinghua Zhu. 627-636 [doi]
- AirKeyLogger: Hardwareless Air-Gap Keylogging AttackMordechai Guri. 637-647 [doi]
- A Linux Audit and MQTT-based Security Monitoring FrameworkJie Yin, Yutaka Ishikawa, Atsuko Takefusa. 648-657 [doi]
- MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance AnalysisWeihan Ou, Steven H. H. Ding. 658-666 [doi]
- Detecting and Preventing ROP Attacks using Machine Learning on ARMGebrehiwet B. Welearegai, Chenpo Hu, Christian Hammer 0001. 667-677 [doi]
- IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated LearningAdebayo Omotosho, Yaman Qendah, Christian Hammer. 678-688 [doi]
- Preserving Privacy of Neuromorphic Hardware From PCIe Congestion Side-Channel AttackAnup Das. 689-698 [doi]
- CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge GraphXiangfei Xu, Tianyuan Hu, Bixin Li, Li Liao. 699-704 [doi]
- Research on Malicious Account Detection Mechanism of Ethereum Based on Community DiscoveryMin Li, Bo Cui, Wenhan Hou, Ru Li. 705-710 [doi]
- Reputation-Based Trust Assessment of Transacting Service ComponentsKonstantinos Tsiounis, Kostas Kontogiannis. 711-716 [doi]
- Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File ContentsKeisuke Hamajima, Daisuke Kotani, Yasuo Okabe. 717-722 [doi]
- Toward Face Biometric De-identification using Adversarial ExamplesMahdi Ghafourian, Julian Fiérrez, Luis F. Gomez, Rubén Vera-Rodríguez, Aythami Morales, Zohra Rezgui, Raymond N. J. Veldhuis. 723-728 [doi]
- RL-KDA: A K-degree Anonymity Algorithm Based on Reinforcement LearningXuebin Ma, Nan Xiang, Yulan Gao. 729-734 [doi]
- FL-PTD: A Privacy Preserving Defense Strategy Against Poisoning Attacks in Federated LearningGeMing Xia, Jian Chen, Xinyi Huang, Chaodong Yu, Zhong Zhang. 735-740 [doi]
- A Decentralized Authorization and Security Framework for Distributed Research WorkflowsRichard Cardone, Smruti Padhy, Steve Black, Joe Stubbs, Sean B. Cleveland. 741-746 [doi]
- Modeling and Verifying Privacy-Preserving Authentication Scheme for VANET Using CSPNing Qin, Hongyan Mao, Yiwen Liu, Kai Chen. 747-752 [doi]
- Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious TrafficLong Chen, Qiaojuan Wang, Yanqing Song, Jianguo Chen. 753-758 [doi]
- Improved Bayesian network differential privacy data-releasing method based on junction treeXuebin Ma, Xuejian Qi, Yulei Meng, Tao Yang. 759-764 [doi]
- Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural NetworksMst. Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea. 765-776 [doi]
- An Ontology-Centric Approach for Network Security Situation AwarenessYixuan Wang, Bo Zhao, Weidong Li, Lingzi Zhu. 777-787 [doi]
- A Full-fledged Commit Message Quality Checker Based on Machine LearningDavid Faragó, Michael Färber, Christian Petrov. 788-799 [doi]
- Identifying Coincidental Correct Test Cases with Multiple Features Extraction for Fault LocalizationYonghao Wu, Shuaihua Tian, Zezhong Yang, Zheng Li 0002, Yong Liu, Xiang Chen. 800-809 [doi]
- Sound Predictive Fuzzing for Multi-threaded ProgramsYuqi Guo, Zheheng Liang, Shihao Zhu, Jinqiu Wang, Zijiang Yang, Wuqiang Shen, Jinbo Zhang, Yan Cai 0001. 810-819 [doi]
- MePof: A Modular and End-to-End Profile-Guided Optimization Framework for Android KernelsKeyuan Zong, Baojian Hua, Yang Wang 0015, Shuang Hu, Zhizhong Pan. 820-829 [doi]
- Prediction of Bug Inducing Commits Using Metrics Trend AnalysisParul Parul, Kostas Kontogiannis, Chris Brealey. 830-839 [doi]
- Revisiting "code smell severity classification using machine learning techniques"Wenhua Hu, Lei Liu, Peixin Yang, Kuan Zou, Jiajun Li, Guancheng Lin, Jianwen Xiang. 840-849 [doi]
- EDP-BGCNN: Effective Defect Prediction via BERT-based Graph Convolutional Neural NetworkHao Shen, Xiaolin Ju, Xiang Chen 0005, Guang Yang. 850-859 [doi]
- SMT-Based Verification of NGAC PoliciesVladislav Dubrovenski, Erzhuo Chen, Dianxiang Xu. 860-869 [doi]
- SGS: Mutant Reduction for Higher-order Mutation-based Fault LocalizationLuxi Fan, Zheng Li 0002, Hengyuan Liu, Doyle Paul, Haifeng Wang, Xiang Chen 0005, Yong Liu. 870-875 [doi]
- Investigating Code Generation Performance of ChatGPT with Crowdsourcing Social DataYunhe Feng, Sreecharan Vanam, Manasa Cherukupally, Weijian Zheng, Meikang Qiu, Haihua Chen. 876-885 [doi]
- A Self-attention Agent of Reinforcement Learning in Continuous Integration TestingBangfu Liu, Zheng Li 0002, Ruilian Zhao, Ying Shang. 886-891 [doi]
- TBCUP: A Transformer-based Code Comments Updating ApproachShifan Liu, Zhanqi Cui, Xiang Chen, Jun Yang, Li Li, Liwei Zheng. 892-897 [doi]
- An Approach to Generating Diverse Personas for Children and the Elderly for Software DevelopmentTanjila Kanij, Xiaojiao Du, John C. Grundy, Anuradha Madugalla, Devi Karolita. 898-903 [doi]
- Towards a Service-based Adaptable Data Layer for Cloud WorkflowsYuandou Wang, Nikita Janse, Riccardo Bianchi, Spiros Koulouzis, Zhiming Zhao. 904-911 [doi]
- Exploring Metamorphic Testing for Fake-News Detection Software: A Case StudyLin Miao, Dave Towey, Yingrui Ma, Tsong Yueh Chen, Zhi Quan Zhou. 912-923 [doi]
- Toward a Labeled Dataset of IoT Malware FeaturesStian Hagbø Olsen, T. J. OConnor. 924-933 [doi]
- Secure Feedback to Edge Servers in Distributed Machine Learning Using Rich ClientsSaki Takano, Akihiro Nakao, Saneyasu Yamaguchi, Masato Oguchi. 934-939 [doi]
- Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image ClassificationHayato Sato, Hiroshi Inamura, Shigemi Ishida, Yoshitaka Nakamura. 940-945 [doi]
- Securing the Transportation of Tomorrow: Enabling Self-Healing Intelligent TransportationElanor Jackson, Sahra Sedigh Sarvestani. 946-949 [doi]
- Modeling MultiPath TCP for Control Parameter TuningHan Nay Aung, Keita Goto, Hiroyuki Ohsaki. 950-953 [doi]
- Survivability Model of Networks using Attack Graphs and Markov ChainsShuvo Bardhan. 954-957 [doi]
- Reinforcement Learning Approaches for Racing and Object Avoidance on AWS DeepRacerJacob McCalip, Mandil Pradhan, Kecheng Yang. 958-961 [doi]
- A Metaverse Object Management Method Based on Visible Areas Using Geographical Overlay NetworksNobuki Aoki, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi. 962-965 [doi]
- Graph Attention Network Reinforcement Learning Based Computation Offloading in Multi-Access Edge ComputingYuxuan Liu, GeMing Xia, Jian Chen, Danlei Zhang. 966-969 [doi]
- Performance Evaluation of MQTT Communication with Heterogeneous TrafficRyohei Banno. 970-971 [doi]
- Evaluation of the Performance Impact of SPM Allocation on a Novel Scratchpad MemoryEssa Imhmed, Edgar Eduardo Ceh-Varela, Jonathan E. Cook, Caleb Parten. 972-973 [doi]
- Blockchain-Oriented Software Testing: A Preliminary Literature ReviewSandeep Reddivari, James Orr, Reyansh Reddy. 974-975 [doi]
- Modeling Time-Varying User Attitudes in Social MediaEtienne Gael Tajeuna, Ahmed F. M. Fahmy, Mohamed Bouguessa. 976-977 [doi]
- Telehealth in Cardiovascular Diseases: Reflections on Its Usability in the Jordanian ContextAhmad Rajeh Saifan, Mohannad Eid AbuRuz, Nabeel Al-Yateem, Syed Azizur Rahman, Muhammad Arsyad Subu, Heba Hesham Hijazi, Fatma Refaat Ahmed, Jacqueline Maria Dias, Amina Al-Marzouqi, Mohammad Yousef Alkhawaldeh, Mohamad Qasim Alshabi, Ahmed Hossain. 978-980 [doi]
- A Preliminary Study on Random Walk based Similar Contents DiscoveryRyo Nakamura. 981-982 [doi]
- Uncovering Water Research with Natural Language ProcessingEdgar Eduardo Ceh-Varela, Essa Imhmed. 983-984 [doi]
- A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT SystemsYong Jin, Masahiko Tomoishi. 985-986 [doi]
- New Technique for Stock Trend Analysis - Volume-weighted Squared Moving Average Convergence & DivergenceSze Chit Au, Jacky Wai Keung. 987-988 [doi]
- A Machine Learning based Traceability Links Classification: A Preliminary InvestigationHika Workneh, Sandeep Reddivari. 989-990 [doi]
- AI-Assisted Security: A Step towards Reimagining Software Development for a Safer FutureYong Shi 0002, Nazmus Sakib, Hossain Shahriar, Dan Lo 0001, Hongmei Chi, Kai Qian. 991-992 [doi]
- Virtual Learning and Pervasiveness of Depression Among University Students in the UAEHeba Hesham Hijazi, Reem Mohd Alotaibi, Zenah Maher Alzaben, Amina Al-Marzouqi, Nabeel Al-Yateem, Muhammad Arsyad Subu, Fatma Refaat Ahmed, Mohammad Al-Shabi, Mohammad Yousef Alkhawaldeh, Syed Azizur Rahman, Ahmed Hossain. 993-995 [doi]
- Deep Learning based Security Enhancement of Wireless ConnectivitySeonghan Ryu. 996-997 [doi]
- Improvement of TCP Performance based on Characteristics of Private LoRa InterfaceJumpei Sakamoto, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Goshi Sato, Kenichi Takizawa. 998-999 [doi]
- Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative ServersNariyoshi Yamai, Yong Jin, Toshio Murakami, Rei Nakagawa. 1000-1001 [doi]
- VA4SM: A Visual Analytics Tool for Software MaintenanceSandeep Reddivari, Kaihua Liu, Reyansh Reddy. 1002-1003 [doi]
- Extracting Common and Variable Code using the LCS Algorithm for Migration to SPLETaeyoung Kim, Jihyun Lee, Sungwon Kang. 1004-1005 [doi]
- ∗Renju Akashi, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Myung Lee. 1006-1007 [doi]
- Simple measurement of customer-oriented QCD for improving business agilityKumi Jinzenji, Akio Jin. 1008-1009 [doi]
- Authentic Learning Approach for Artificial Intelligence Systems Security and PrivacyMst. Shapna Akter, Hossain Shahriar, Dan Lo 0001, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu 0013. 1010-1012 [doi]
- Defeasible-PROV: Conflict Resolution in Smart Building DevicesAbdullah Al Farooq, Zac Taylor, Kyle Ruona, Thomas Moyer. 1013-1014 [doi]
- Deep Learning for Regional Subsidence Crisis Prediction in Smart Grid InfrastructureZhaoran Wang, Xiangyu Bai, Yu Han. 1015-1016 [doi]
- A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow DataNorihiro Okui, Yusuke Akimoto, Ayumu Kubota, Takuya Yoshida. 1017-1018 [doi]
- Semantically Enabled Content Convergence System for Large Scale RDF Big DataYongju Lee, Hongzhou Duan, Yuxiang Sun. 1019-1020 [doi]
- Optimized Paillier Homomorphic Encryption in Federated Learning for Speech Emotion RecognitionSamaneh Mohammadi, Sima Sinaei, Ali Balador, Francesco Flammini. 1021-1022 [doi]
- Comparative analysis of neural networks techniques to forecast Airfare PricesAlessandro Aliberti, Yao Xin, Alessio Viticchié, Enrico Macii, Edoardo Patti. 1023-1029 [doi]
- An AI Framework for Modelling and Evaluating Attribution Methods in Enhanced Machine Learning InterpretabilityAlfredo Cuzzocrea, Qudrat E. Alahy Ratul, Islam Belmerabet, Edoardo Serra. 1030-1036 [doi]
- Understanding Rural women's Experience in STEM and Non-STEM field in BangladeshMst. Shapna Akter, Nova Ahmed, Hossain Shahriar. 1037-1046 [doi]
- Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and UglySharaban Tahora, Bilash Saha, Nazmus Sakib, Hossain Shahriar, Hisham Haddad. 1047-1056 [doi]
- Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and ProtectionMst Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu 0013. 1057-1063 [doi]
- A Survey of Conversational Agents and Their Applications for Self-Management of Chronic ConditionsMin Sook Park, Paramita Basak Upama, Adib Ahmed Anik, Sheikh Iqbal Ahamed, Jake Luo, Shiyu Tian, Masud Rabbani, Hyungkyoung Oh. 1064-1075 [doi]
- Predicting and Classifying Heart Rates Using Instantaneous Video DataParamita Basak Upama, Masud Rabbani, Kazi Shafiul Alam, Lin He 0008, Shiyu Tian, Mohammad Syam, Iysa Iqbal, Anushka Kolli, Hansika Kolli, Syeda Shefa, Bipasha Sobhani, Sheikh Iqbal Ahamed. 1076-1083 [doi]
- Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural NetworksMst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea. 1084-1092 [doi]
- Dynamic Analysis for Detection of Self-Destructive Smart ContractsZulfiqar Ali Khan, Akbar Siami Namin. 1093-1100 [doi]
- BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based SystemsTatsuya Sato, Taku Shimosawa, Nariyoshi Yamai. 1101-1106 [doi]
- On the Potential of Modern TCP Congestion Control Algorithms in Information-Centric NetworkingHan Nay Aung, Hiroyuki Ohsaki. 1107-1112 [doi]
- A Resource Estimation Method in Multi-Cloud Environment with a Model Based on a Repairable-Item Inventory SystemNaoki Okuda, Kaori Maeda, Chisa Takano, Hideyuki Ichihara. 1113-1120 [doi]
- Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS ServersToshio Murakami, Kenta Shimabukuro, Nao Sato, Rei Nakagawa, Yong Jin, Nariyoshi Yamai. 1121-1126 [doi]
- Security Operation Support by Estimating Cyber Attacks Without Traffic DecryptionShohei Hiruta, Itaru Hosomi, Hirokazu Hasegawa, Hiroki Takakura. 1127-1132 [doi]
- Resource Allocation Methods among Server Clusters in a Resource Permeating Distributed Computing Platform for 5G NetworksDaisuke Sasaki, Hiroki Kashiwazaki, Mitsuhiro Osaki, Kazuma Nishiuchi, Ikuo Nakagawa, Shunsuke Kikuchi, Yutaka Kikuchi, Shintaro Hosoai, Hideki Takase. 1133-1140 [doi]
- The EcoIndex metric, reviewed from the perspective of Data Science techniquesChristophe Cérin, Denis Trystram, Tarek Menouer. 1141-1146 [doi]
- An asynchronous federated learning focusing on updated models for decentralized systems with a practical frameworkYusuke Kanamori, Yusuke Yamasaki, Shintaro Hosoai, Hiroshi Nakamura, Hideki Takase. 1147-1154 [doi]
- New Problems in Active Sampling for Mobile Robotic Online LearningXiuxian Guan, Junming Wang, Zekai Sun, Zongyuan Zhang, Tianyang Duan, Shengliang Deng, Fangming Liu, Heming Cui. 1155-1160 [doi]
- Hybrid Intelligence for Stock Market Analysis and PredictionYuet-Yu Chan, Ka Chun Tang, Ka Kiu Mok, Henry C. B. Chan, Kenny Sing Hing Tang. 1161-1166 [doi]
- Measuring Bias in AI Models: An Statistical Approach Introducing N-SigmaDaniel DeAlcala, Ignacio Serna, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia. 1167-1172 [doi]
- On the Effectiveness of Features for Predicting User Churn in Reddit CommunitiesMasayoshi Matsumoto, Sho Tsugawa. 1173-1178 [doi]
- Gait Recognition using Deep Residual Networks and Conditional Generative Adversarial NetworksEntesar B. Talal, Zakariya A. Oraibi, Ali Wali. 1179-1185 [doi]
- Toward a Method Engineering Framework for Project Management and Machine LearningMurat Pasa Uysal. 1186-1190 [doi]
- Integrating Multiple Visual Attention Mechanisms in Deep Neural NetworksFernando Martinez, Yijun Zhao. 1191-1196 [doi]
- Social Media, Market Sentiment and Meme StocksYijun Zhao, Zefan Du, Shengjian Xu, Yu Cheng, Jiachen Mu, Michael Ning. 1197-1202 [doi]
- Dealing with Explainability Requirements for Machine Learning SystemsTong Li, Lu Han. 1203-1208 [doi]
- Has the Social Robot Been Hacked? An Emotion Detection System with Distance-Range Parameters for Feature SelectionSubhash Rajapaksha, Debbie Perouli. 1209-1214 [doi]
- A Comparative Analysis of Graph Neural Networks for Fake News DetectionAhmed A. Harby, Farhana H. Zulkernine. 1215-1222 [doi]
- Linking Team-level and Organization-level Governance in Machine Learning Operations through Explainable AI and Responsible AI ConnectorElie Neghawi, Zerui Wang, Jun Huang, Yan Liu. 1223-1230 [doi]
- CNN-based perceptual hashing scheme for image groups suitable for security systemsSugawara Yusei, Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Kaito Hosono, Hirotsugu Kinoshita. 1231-1236 [doi]
- Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of ThingsJay Dave, Nikumani Choudhury, Utkarsh Tiwari, Samyu Kamtam, Kudapa Sai Rohith. 1237-1242 [doi]
- Machine Learning-based Adaptive Access Control Mechanism for Private Blockchain StorageSultan Almansoori, Mohamed Alzaabi, Mohammed Alrayssi, Deepak Puthal, Joy Dutta, Aamna Al Shehhi. 1243-1248 [doi]
- A Process Reduction Method for Spatial Information in Real-Time AR Snow Visualization SystemsYasuaki Kobayashi, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi. 1249-1254 [doi]
- A Policy-Based Path Selection Mechanism in QUIC Multipath ExtensionMasahiro Kozuka, Yasuo Okabe. 1255-1259 [doi]
- Standing Human Detection Method Using 2D-LiDARsTakuya Watanabe, Yoshiaki Terashima, Ryozo Kiyohara. 1260-1265 [doi]
- A Message Reduction Method Based on Geographical Information in Initiative-Evacuation Induction Using Social GraphsSora Okamoto, Tomoya Kawakami. 1266-1271 [doi]
- Leveraging Temporality of Data to Improve Failure Predictions for Solid State Drives in Data CentersChandranil Chakraborttii, Jonas Boettner. 1272-1278 [doi]
- A GA-Based Safe Route Recommendation Method Based on Driver CharacteristicsHayato Fukatsu, Tomoya Kawakami, Yoshimi Kawamoto. 1279-1284 [doi]
- Zero Trust Security Framework for IoT ActuatorsNobuhiro Kobayashi. 1285-1292 [doi]
- Towards Examining The Security Cost of Inexpensive Smart Home IoT DevicesT. J. OConnor, Dylan Jessee, Daniel Campos. 1293-1298 [doi]
- LINE Metaverse for elderly peopleToru Kobayashi, Atsushi Isozaki, Kazuki Fukae, Kenichi Arai, Daiki Togawa, Masahide Nakamura. 1299-1302 [doi]
- The Application of the BERT Transformer Model for Phishing Email ClassificationDenish Omondi Otieno, Akbar Siami Namin, Keith S. Jones. 1303-1310 [doi]
- A Survey on Blockchain-Based Federated Learning and Data PrivacyBipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbashi, Akbar Siami Namin. 1311-1318 [doi]
- Machine Learning for Text Anomaly Detection: A Systematic ReviewKarima Boutalbi, Faiza Loukil, Hervé Verjus, David Telisson, Kavé Salamatian. 1319-1324 [doi]
- Evolution of Big Data Models from Hierarchical Models to Knowledge GraphsAnifat M. Olawoyin, Carson K. Leung, Alfredo Cuzzocrea. 1325-1330 [doi]
- Privacy Preservation of Big Spatio-Temporal Co-occurrence DataAnifat M. Olawoyin, Carson K. Leung, Alfredo Cuzzocrea. 1331-1336 [doi]
- Towards Graph-based Cloud Cost Modelling and OptimisationAkif Quddus Khan, Nikolay Nikolov, Mihhail Matskin, Radu Prodan, Christoph Bussler, Dumitru Roman, Ahmet Soylu. 1337-1342 [doi]
- Resilient Portfolio Optimization using Traditional and Data-Driven Models for Cryptocurrencies and StocksJoydip Das, Sulalitha Bowala, Ruppa K. Thulasiram, Aerambamoorthy Thavaneswaran. 1343-1348 [doi]
- Fuzzy Option Pricing for Jump Diffusion Model using Neuro Volatility ModelsMd. Erfanul Hoque, Sulalitha Bowala, Alex Paseka, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram. 1349-1354 [doi]
- A Novel Fading-Memory Filter Multiple Trading Strategy with Data-Driven Innovation VolatilityYou Liang, Aerambamoorthy Thavaneswaran, Alex Paseka, Sulalitha Bowala, Juan Liyau. 1355-1362 [doi]
- Comparison of Trading Strategies: Dual Momentum vs Pairs TradingJapjeet Singh, Ruppa K. Thulasiram, Aerambamoorthy Thavaneswaran, Alex Paseka. 1363-1369 [doi]
- Approx-SMOTE Federated Learning Credit Card Fraud Detection SystemJiacheng Wang, Wenzheng Liu, Yifei Kou, Dicheng Xiao, Xiaofeng Wang, Xiaoyong Tang. 1370-1375 [doi]
- Examining the Relationship Between Stress Levels and Cybersecurity Practices Among Hospital Employees in Three Countries: Ghana, Norway, and IndonesiaMuhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani, Peter Nimbe. 1376-1382 [doi]
- Review of Machine Learning Advancements for Single-Cell AnalysisNida Nasir, Mohammad Al-Shabi, Nabeel Al-Yateem, Syed Azizur Rahman, Muhammad Arsyad Subu, Heba Hesham Hijazi, Fatma Refaat Ahmed, Jacqueline Maria Dias, Amina Al-Marzouqi, Mohammad Yousef Alkhawaldeh, Ahmad Rajeh Saifan, Mohannad Eid AbuRuz. 1383-1387 [doi]
- Sentence Level Analysis for Detecting Mental Health Causes Using Social Media PostsAbm Adnan Azmee, Manohar Murikipudi, Md Abdullah Al Hafiz Khan, Yong Pei. 1388-1393 [doi]
- Using robotic technology in intensive care units: A qualitative exploration of nurses' perspective in IndonesiaSuhartini Ismail, Muhammad Arsyad Subu, Nabeel Al-Yateem, Mohammad Yousef Alkhawaldeh, Fatma Refaat Ahmed, Jacqueline Maria Dias, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Syed Azizur Rahman. 1394-1397 [doi]
- Detection of Behavioral Health Cases from Sensitive Police Officer NarrativesMartin Brown, Md Abdullah Al Hafiz Khan, Dominic Thomas, Yong Pei, Monica Nandan. 1398-1403 [doi]
- Positive Perception of Self-Medication Practice and Cyberchondria Behavior Among Adults in BangladeshAhmed Hossain, Md. Aminul Islam, Anika Tasneem Chowdhury, Syed Azizur Rahman, Alounoud Salman, Jacqueline Maria Dias, Muhammad Arsyad Subu, Mohammad Yousef Alkhawaldeh, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Nabeel Al-Yateem. 1404-1407 [doi]
- Smartphone Addiction and Mental Health Wellbeing Among Indonesian AdolescentsMuhammad Arsyad Subu, Mohammad Yousef Alkhawaldeh, Fatma Refaat Ahmed, Nabeel Al-Yateem, Jacqueline Maria Dias, Syed Azizur Rahman, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Ahmed Hossain. 1408-1411 [doi]
- BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly CareBilash Saha, Md Saiful Islam, A. B. M. Kamrul Riad, Sharaban Tahora, Hossain Shahriar, Sweta Sneha. 1412-1417 [doi]
- Telehealth for obstetrics and gynecology outpatinets: Improving patients' experiences during the COVID-19 pandemicMohammad Yousef Alkhawaldeh, Muhammad Arsyad Subu, Nabeel Al-Yateem, Syed Azizur Rahman, Fatma Refaat Ahmed, Jacqueline Maria Dias, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Ahmed Hossain. 1418-1422 [doi]
- Cardiovascular Health Management Compliance with Health Insurance Portability and Accountability ActMasrura Tasnim, Arleen Joy Patinga, Hossain Shahriar, Sweta Sneha. 1423-1428 [doi]
- Challenges of Artificial Intelligence in MedicineNida Nasir, Mohammad Al-Shabi, Nabeel Al-Yateem, Syed Azizur Rahman, Muhammad Arsyad Subu, Heba Hesham Hijazi, Fatma Refaat Ahmed, Jacqueline Maria Dias, Amina Al-Marzouqi, Mohammad Yousef Alkhawaldeh, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan. 1429-1433 [doi]
- An expert system for automatic cyber risk assessment and its AI-based improvementsGabriele Gatti, Cataldo Basile, Guido Perboli. 1434-1440 [doi]
- Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE ProblemYuri Lucas Direbieski, Hiroki Tanioka, Kenji Matsuura, Hironori Takeuchi, Masahiko Sano, Tetsushi Ueta. 1441-1446 [doi]
- Towards data generation to alleviate privacy concerns for cybersecurity applicationsDhiraj Ganji, Chandranil Chakraborttii. 1447-1452 [doi]
- Optimized NLP Models for Digital Twins in MetaverseValeria Lukaj, Alessio Catalfamo, Maria Fazio, Antonio Celesti, Massimo Villari. 1453-1458 [doi]
- The Graph-Massivizer Approach Toward a European Sustainable Data Center Digital TwinMartin Molan, Junaid Ahmed Khan, Andrea Bartolini, Roberta Turra, Giorgio Pedrazzi, Michael Cochez, Alexandru Iosup, Dumitru Roman, Joze M. Rozanec, Ana Lucia Varbanescu, Radu Prodan. 1459-1464 [doi]
- Hanfu AR: Digital Twins of Traditional Chinese Costumes for Augmented Reality Try-On SystemsYukun Fu, Yue Li. 1465-1470 [doi]
- An Improved Data Management Approach for IoT-Enabled Smart Healthcare: Integrating Semantic Web and Reinforcement LearningAytug Turkmen, Özgü Can. 1471-1475 [doi]
- Aphluentia: Supporting Communication for People with Fluent AphasiaSamuel S. Silva, Cátia Azevedo, Ana Rita Valente, Ana Patrícia Rocha, Marisa Lousada, Luciana Albuquerque, António J. S. Teixeira. 1476-1481 [doi]
- A System for Selective Disclosure of Information about a Patient with Intractable DiseaseErika Sugita, Ryosuke Abe, Shigeya Suzuki, Keisuke Uehara, Osamu Nakamura. 1482-1487 [doi]
- Exploring the Potential of Energy Data Marketplaces: an Approach based on the Ocean ProtocolSilvio Meneguzzo, Alfredo Favenza, Valentina Gatteschi, Claudio Schifanella. 1488-1494 [doi]
- LSTM for Grid Power Forecasting in Short-Term from Wave Energy ConvertersRafael Natalio Fontana Crespo, Alessandro Aliberti, Lorenzo Bottaccioli, Enrico Macii, Giorgio Fighera, Edoardo Patti. 1495-1500 [doi]
- An Electric Vehicle Simulator for Realistic Battery Signals Generation from Data-sheet and Real-world DataRaimondo Gallo, Alessandro Aliberti, Edoardo Patti, Gianluca Bussolo, Marco Zampolli, Rémi Jacques Philibert Jaboeuf, Paolo Tosco. 1501-1506 [doi]
- Study on Assessment Methods of Developmental Coordination Disorder in ChildrenWen-Bo Cui, Wenai Song, Zi-Tong Pei, Yi Lei, Qing Wang, Yan-Jie Chen, Ji-Jiang Yang. 1507-1512 [doi]
- A Strategy for Aided Diagnosis of Obstructive Sleep Apnea in Children Based on Graph Neural NetworkYi Lei, Han Qin, Xiaodan Li, Qing Wang 0003, Lin Zang, Jun Tai, Ji-Jiang Yang. 1513-1518 [doi]
- CMTN: A Convolutional Multi-Level Transformer to Identify Suicidal Behaviors Using Clinical NotesManohar Murikipudi, Abm. Adnan Azmee, Md Abdullah Al Hafiz Khan, Yong Pei. 1519-1524 [doi]
- Evaluation of the Relevance of Adverse Drug Reactions Based on ERNIE-DPCNNHongliang Liu, ZhiYu Chen, Miao Yu, Wenbo Cui, Lin Zang, Wei Ren, Yongfang Hou. 1525-1529 [doi]
- Mental Health Analysis During Pandemic: A Survey of Detection and TreatmentParamita Basak Upama, Maria Valero, Hossain Shahriar, Mohammad Syam, Sheikh Iqbal Ahamed. 1530-1538 [doi]
- Computational cost of CT Radiomics workflow: a case study on COVID-19Giulia Varriano, Valeria Sorgente, Francesco Mercaldo, Antonella Santone, Luca Brunese. 1539-1544 [doi]
- Quantum Machine Learning in Disease Detection and Prediction: a survey of applications and future possibilitiesParamita Basak Upama, Anushka Kolli, Hansika Kolli, Subarna Alam, Mohammad Syam, Hossain Shahriar, Sheikh Iqbal Ahamed. 1545-1551 [doi]
- Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and ClusteringKei Oshio, Satoshi Takada, Tianxiang He, Chansu Han, Akira Tanaka, Takeshi Takahashi 0001, Jun'ichi Takeuchi. 1552-1557 [doi]
- Psychological Study on Judgment and Sharing of Online DisinformationHaruka Nakajima Suzuki, Midori Inaba. 1558-1563 [doi]
- M2LADS: A System for Generating MultiModal Learning Analytics DashboardsÁlvaro Becerra, Roberto Daza, Ruth Cobos, Aythami Morales, Mutlu Cukurova, Julian Fiérrez. 1564-1569 [doi]
- Curating History Datasets and Training Materials as OER: An ExperienceCiara Breathnach, Rachel Murphy, Alexander Schieweck, Enda O'Shea, Stuart Clancy, Tiziana Margaria. 1570-1575 [doi]
- Experiences from the first delivery of a new immersive software engineering course: mathematical foundations and data analyticsFlorenc Demrozi, Marina Marchisio, Tiziana Margaria, Matteo Sacchet. 1576-1581 [doi]
- Coevolution Index: A Metric for Tracking Evolutionary CouplingHüseyin Yapici, Hasan Sözer. 1582-1587 [doi]
- A Test Case Prioritization Based on Genetic Algorithm With Ant Colony and Reinforcement Learning ImprovementYu Yang, Lu Wang, Na Cha, Hua Li. 1588-1593 [doi]
- Towards Improving Accessibility of Web Auditing with Google LighthouseThomas McGill, Oluwaseun Bamgboye, Xiaodong Liu 0002, Chathuranga Sampath Kalutharage. 1594-1599 [doi]
- Business Process Representation Analysis in the RPA ContextVirginia Niculescu, Cristina-Claudia Osman, Camelia Chisalita-Cretu, Adrian Sterca. 1600-1606 [doi]
- Locating Procedural Steps in Source CodeShinpei Hayashi, Teppei Kato, Motoshi Saeki. 1607-1612 [doi]
- Classifying Packages for Building Linux DistributionsQi Jing, Lian Yu, Lei Zhang, Jie Meng, Zheng Liu, Haolin Xue. 1613-1618 [doi]
- Towards Better Online Communication for Future Software Development in IndustryMasanari Kondo, Shinobu Saito, Yukako Iimura, Eunjong Choi, Osamu Mizuno, Yasutaka Kamei, Naoyasu Ubayashi. 1619-1624 [doi]
- A Catalog for Historical Soundscapes RequirementsJoão Araújo 0001, Armanda Rodrigues, Inês Menezes. 1625-1632 [doi]
- A Preliminary Critical Review of the Impact of Three Popular Development Practices on Source Code MaintainabilityDaniel Knight, Stephen Torri, Tanmay Bhowmik. 1633-1637 [doi]
- Determining the Relative Importance of Features for Influencing Software Product Similarity MatchingMike Mannion, Hermann Kaindl. 1638-1645 [doi]
- Commit Classification Into Software Maintenance Activities: A Systematic Literature ReviewTjasa Hericko, Bostjan Sumak. 1646-1651 [doi]
- Transparency-based reconnaissance for APT attacksAlessio Rugo, Claudio Agostino Ardagna. 1652-1657 [doi]
- API-based features representation fusion for malware classificationYassine Belkhouche. 1658-1662 [doi]
- Cryptographic Requirements of Verifiable Credentials for Digital Identification DocumentsMaximilian Richter, Magdalena Bertram, Jasper Seidensticker, Marian Margraf. 1663-1668 [doi]
- PAD-Phys: Exploiting Physiology for Presentation Attack Detection in Face BiometricsLuis F. Gomez, Julian Fiérrez, Aythami Morales, Mahdi Ghafourian, Rubén Tolosana, Imanol Solano, Alejandro Garcia, Francisco Zamora-Martínez. 1669-1674 [doi]
- Motive Metrics: A Jira Plug-In for Personality, Motivation and Performance Trackingan Cao, Jie Xiang Fan, Akash Saggar, Kunj Dave, Sharan Sharabinth, Jiten Verma, Dulaji Hidellaarachchi, John C. Grundy. 1675-1682 [doi]
- Mobile Application-Based Solution for Building Accessibility Assessment for Comprehensive and Personalized AssessmentSayeda Farzana Aktar, Mason Dennis Drake, Kazi Shafiul Alam, Laryn Michele O'Donnell, Shiyu Tian, Roger O. Smith, Sheikh Iqbal Ahamed. 1683-1690 [doi]
- Towards the Formal Analysis of UML Activity Diagrams in a Calculus of Context-aware AmbientsFrançois Siewe. 1691-1696 [doi]
- A Rigorous Iterative Analysis Approach for Capturing the Safety Requirements of Self-Driving Vehicle SystemsFahad Alotaibi, Thai Son Hoang, Michael J. Butler. 1697-1702 [doi]
- Monitoring the Energy Consumption of Docker ContainersMehul Warade, Kevin Lee, Chathurika Ranaweera, Jean-Guy Schneider. 1703-1710 [doi]
- A User Behaviour-Based Video Segmentation Strategy for High-Concurrency EnvironmentDanning Shen, Wenhao Zhu, Yujie Ding, Chenyun Liu. 1711-1716 [doi]
- An Empathetic Approach to Human-Centric Requirements Engineering Using Virtual RealityNicholas Chong, Emmanuel Chu, Adrian Nadonza, Sienna Marie Rodriguez, Sothearith Tith, Jin Shan, John C. Grundy, Yi Wang, Ben Cheng, Thuong Hoang. 1717-1724 [doi]
- Identification of the Optimal Meal Detection Strategy for Adults, Adolescents, and Children with Type 1 Diabetes: an in Silico ValidationFederico D'Antoni, Martina Bertazzoni, Luca Vollero, Mario Merone. 1725-1730 [doi]
- Feature-Level Cross-Attentional PPG and Motion Signal Fusion for Heart Rate EstimationPanagiotis Kasnesis, Lazaros Toumanidis, Alessio Burrello, Christos Chatzigeorgiou, Charalampos Z. Patrikakis. 1731-1736 [doi]
- Development and Evaluation of IoT System Consisting of ROS-based Robot, Edge and CloudReina Sasaki, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi. 1737-1744 [doi]
- The effect of COVID-19 on the economic systems: evidence from the Italian caseMaria Elena Bruni, Giacomo Masali, Guido Perboli. 1745-1749 [doi]
- Improving Long-Term Traffic Prediction with Online Search Log DataItsuki Matsunaga, Yuto Kosugi, Hangli Ge, Takashi Michikata, Noboru Koshizuka. 1750-1755 [doi]
- Decentralizing Electric Vehicle Supply Chains: Value Proposition and System DesignMaria Elena Bruni, Vittorio Capocasale, Marco Costantino, Stefano Musso, Guido Perboli. 1756-1761 [doi]
- Machine Learning to Forecast Rainfall IntensityMaria Elena Bruni, Valeria Lazzaroli, Guido Perboli, Chiara Vandoni. 1762-1767 [doi]
- Detecting Hidden Failures of DBMS: A Comprehensive Metamorphic Relation Output Patterns ApproachMatthew Siu-Hin Tang, T. H. Tse, Zhi Quan Zhou. 1768-1773 [doi]
- Metamorphic Testing of an Automated Parking System: An Experience ReportDave Towey, Zepei Luo, Ziqi Zheng, Peijian Zhou, Junbo Yang, Puttipatt Ingkasit, Changyang Lao, Matthew Pike, Yifan Zhang. 1774-1779 [doi]
- Automated Metamorphic-Relation Generation with ChatGPT: An Experience ReportYifan Zhang, Dave Towey, Matthew Pike. 1780-1785 [doi]
- Using Obfuscators to Test Compilers: A Metamorphic ExperienceInjae Cho, Dave Towey, Pushpendu Kar. 1786-1791 [doi]
- Improving Fault Localization by Complex-Fault Oriented Higher-Order Mutant GenerationZexing Chang, Yong Liu, Shumei Wu, Paul Doyle, Haifeng Wang, Xiang Chen 0005. 1792-1797 [doi]
- A Standard Baseline for Software Defect Prediction: Using Machine Learning and Explainable AINitin Sai Bommi, Atul Negi. 1798-1803 [doi]
- Enhancing the Formal Verification of Train Control Systems based on DecompositionTengfei Li 0002, Junfeng Sun, Xinjun Lv, Xiang Chen, Jing Liu 0012, Haiying Sun. 1804-1809 [doi]
- A Quantum Generative Adversarial Network-based Intrusion Detection SystemMd. Abdur Rahman, Hossain Shahriar, Victor Clincy, Md Faruque Hossain, Muhammad Asadur Rahman. 1810-1815 [doi]
- Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory FrameworksNafisa Anjum, Nazmus Sakib, Juan Rodriguez Cardenas, Corey Brookins, Ava Norouzinia, Asia Shavers, Miranda-Dominguez, Marie Nassif, Hossain Shahriar. 1816-1821 [doi]
- HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth AppsBilash Saha, Sharaban Tahora, Abdul Barek, Hossain Shahriar. 1822-1827 [doi]
- Evaluating ChatGPT for Smart Contracts Vulnerability CorrectionEmanuele Antonio Napoli, Valentina Gatteschi. 1828-1833 [doi]
- Security Risk and Attacks in AI: A Survey of Security and PrivacyMd Mostafizur Rahman, Aiasha Siddika Arshi, Md. Golam Moula Mehedi Hasan, Sumayia Farzana Mishu, Hossain Shahriar, Fan Wu 0013. 1834-1839 [doi]
- A Plugin for Kotlin based Android Apps to Detect Security Breaches through DataflowMd Arabin Islam Talukder, Sumaiya Farzana Mishu, Hossain Shahriar, ABM Kamrul Islam Riad, Fan Wu 0013, Akond Rahman. 1840-1845 [doi]
- Self-learning for Annotating Website Privacy Policies at ScaleShufan Ming, Haohan Wang. 1846-1851 [doi]
- A Proposal for a Continuum-aware Programming Model: From Workflows to Services Autonomously Interacting in the Compute ContinuumMarco Aldinucci, Robert Birke, Antonio Brogi, Emanuele Carlini, Massimo Coppola, Marco Danelutto, Patrizio Dazzi, Luca Ferrucci, Stefano Forti 0002, Hanna Kavalionak, Gabriele Mencagli, Matteo Mordacchini, Marcelo Pasin, Federica Paganelli, Massimo Torquati. 1852-1857 [doi]
- Porting the Variant Calling Pipeline for NGS data in cloud-HPC environmentAlberto Mulone, Sherine Awad, Davide Chiarugi, Marco Aldinucci. 1858-1863 [doi]
- Towards formal model for location aware workflowsDoriana Medic, Marco Aldinucci. 1864-1869 [doi]
- WfCommons: Data Collection and Runtime Experiments using Multiple Workflow SystemsHenri Casanova, Kyle Berney, Serge Chastel, Rafael Ferreira da Silva. 1870-1875 [doi]
- Evaluation of Classification Algorithms Framework Domain-Specific Language: the case of finance-accounting domainSofia Meacham. 1876-1877 [doi]
- Let's Block Encrypted Malicious SitesMotoyuki Ohmori. 1878-1883 [doi]
- Towards Unlocking Sustainability Potentials - Adoption and Diffusion of Digital InnovationBarbara Steffen. 1884-1889 [doi]
- BC4ECO - Using Visual Tools for a Shared Understanding and Pedagogical Approach across an Interdisciplinary ConsortiumAndy Peruccon, Roisin Lyons, Amalia de Götzen, Tiziana Margaria, Luca Simeone. 1890-1895 [doi]
- Connecting Data Providers with Data Consumers: the 5GMETA Data Monetisation FrameworkMichela Apruzzese, Natalia Selini Hadjidimitriou, Elisa Pautasso, Matteo Falbo. 1896-1901 [doi]
- Identifying 5G technology enablers in the maritime sector using survey and Twitter dataNatalia Selini Hadjidimitriou, Giulia Renzi, Michela Apruzzese, Guido Perboli, Stefano Musso. 1897-1902 [doi]
- Study on Performance Bottleneck of Flow-Level Information-Centric Network SimulatorShota Inoue, Han Nay Aung, Keita Goto, Soma Yamamoto, Hiroyuki Ohsaki. 1908-1911 [doi]