Abstract is missing.
- From Fine to Coarse: Analyzing Degree Distribution in Graph CoarseningYuto Kakihara, Shota Inoue, Hiroyuki Ohsaki. 1-10 [doi]
- A Novel Architecture for Cyber-Resilient Self-Protecting Systems Based on BlockchainTommaso Caiazzi, Stefano Iannucci, Valerio Marini, Diego Pennino, Maurizio Pizzonia, Riccardo Torlone. 1-8 [doi]
- Privacy-Preserving Federated Learning for Human Intention Modeling in Pediatric Cerebral Palsy Using Extended RealityShokofeh Anari, Ramin Ranjbarzadeh, Martin Cunneen, Malika Bendechache. 1-6 [doi]
- A Novel Timing Model for Neural Networks in Safety-critical SystemsRobin Hapka, Anika Christmann, Rolf Ernst. 9-20 [doi]
- Design & Simulation of a Classical Controller to Improve the Performance of a Planar Stick-Slip Micro-RobotAlireza Khaleghi, Hamed Moradi. 21-26 [doi]
- A Survey of Adversarial Methods in Autonomous DrivingHuyan Gong, Dongcheng Li 0001, W. Eric Wong, Hui Li. 27-38 [doi]
- Effects of Redundant LiDAR Sensors on Object Hiding Attacks in Autonomous Driving SystemsMatthew Lee 0017, William Flinchbaugh, Eric C. Larson, Mitchell A. Thornton. 39-49 [doi]
- Multi-Strategy Enhanced COA for Path Planning in Autonomous NavigationYifei Wang, Jacky Keung, Haohan Xu, Yuchen Cao, Zhenyu Mao. 50-55 [doi]
- GraLoc: Preserving Graph Locality to Minimize Read and Write Amplification on Flash MemoryPo-Lun Wang, Tseng-Yi Chen. 56-62 [doi]
- Integrating Attack-Fault Trees in the ODE Metamodel to Support Safety and Security Co-Analysis in the Automotive DomainVictor Luiz Grechi, André Luíz de Oliveira, Barbara Gallina, Leonardo Montecchi, Rosana T. Vaccare Braga. 63-72 [doi]
- A Multi-Tiered Autotuner for Portable Heterogeneous-Compute InterfacesShahriar Ahmed Zisan, Mohammad Nooruddin, Apan Qasem. 73-82 [doi]
- Secure Privacy Control inside Clouds with AMD SEV and Nested VirtualizationNaoya Ando, Kazuki Takiguchi, Kenichi Kourai. 83-88 [doi]
- High-Performance Address Translation for Solid-State Drives via Asymmetry DecompositionYu-Ta Liu, Shuo-Han Chen. 89-94 [doi]
- Towards Development of Ready-to-Use Hands-on Labs with Portable Operating Environments for Digital Forensics EducationTran Ngoc Bao Huynh, Haowen Xu, Brian Almaguer, Jun Dai, Xiaoyan Sun 0003. 95-104 [doi]
- Enhancing Chemistry Education: Evaluating Methods for Classifying Hand-Drawn Molecules and Generating 3D VisualizationsEduardo Amorim, Thamer H. Nascimento, Ana Valdo, Juliana Paula Felix, Luciana Cardoso, Renan V. Aranha, Fabrízzio Soares. 105-110 [doi]
- Reimagining Technical Education: Enhancing X-Ops Learning with Speculative and Experiential PedagogiesAazaade Faraji, Nuno Pombo. 111-120 [doi]
- StuLAC: An Adaptive LLM-Driven Framework for Scalable Student Feedback Analysis in Software-Driven Educational SystemsYicheng Sun, Hi Kuen Yu, Jacky Keung, Yuchen Cao, Yihan Liao. 121-130 [doi]
- Empowering Mathematics education in security and defence: technological tools and methodological strategies for motivation enhancementMarina Marchisio Conte, Giulia Boetti, Fabio Roman, Enrico Spinello, Nikolaos V. Karadimas, Linko Nikolov, Jaroslaw Zelkowski, Andrada Livia Cirneanu. 131-140 [doi]
- Flipped-classroom Based Teaching Method for Data Structures and AlgorithmsSalim Saay, Tiziana Margaria. 141-146 [doi]
- Empowering Educators for the Future: Leveraging Futuristic Thinking and Emerging TechnologiesNuno Pombo. 147-152 [doi]
- CoRe: A Comparative Study of Transformer Models for Context Recognition in Smart ClassroomsFahim Ahmed Irfan, Razib Iqbal, Dawn Eckstein, Molly Strickland. 153-158 [doi]
- Summarizing Computer Science Teaching Assistant Feedback with Large Language ModelsSuqing Liu, Lisa Zhang, Oscar Karnalim, Michael Liut. 159-164 [doi]
- Big Data Privacy in Multidimensional Domains: Models, Issues, ParadigmsAlfredo Cuzzocrea. 165-172 [doi]
- Causal Discovery on the Effect of Antipsychotic Drugs on Delirium Patients in the ICU using Large Observational EHR DatasetRiddhiman Adib, Md. Osman Gani, Sheikh Iqbal Ahamed, Mohammad Adibuzzaman. 173-182 [doi]
- Enhancing Public Safety with Digital Twins for Indoor Air Quality Monitoring by Non-ExpertsLouis Nisiotis, Aimilios Hadjiliasi, Nicholas Napp. 183-192 [doi]
- Advancing Mental Disorder Detection: A Comparative Evaluation of Transformer and LSTM Architectures on Social MediaKhalid Hasan, Jamil Saquer, Mukulika Ghosh. 193-202 [doi]
- Social Media as a Lens for Understanding Public Trust in SciencePanagiotis Monachelis, Emily Maitland, Kalypso Iordanou, Charalampos Z. Patrikakis, Evren Yalaz, Pericles Papadopoulos. 203-211 [doi]
- Sprint Walk: Local Random Walks with Partial Non-Local InformationHan Nay Aung, Hiroyuki Ohsaki. 222-231 [doi]
- Serialised Pulmonary Lesion Segmentation with Spatiotemporal TransformerYantao Zhou, Jianqiang Li 0002, Xiaoyan Gao, Hongzhi Qi. 232-237 [doi]
- Deep Learning-Based Feature Fusion for Emotion Analysis and Suicide Risk Differentiation in Chinese Psychological Support HotlinesHan Wang 0059, Jianqiang Li 0002, Qing Zhao 0005, Zhonglong Chen, Changwei Song, Jing Tang, Yuning Huang, Wei Zhai, Yongsheng Tong, Guanghui Fu. 238-243 [doi]
- Superiority of the Neural Network Models for Multivariate Price and Volatility ForecastingAvanthi Saumyamala, You Liang, Aerambamoorthy Thavaneswaran, Alex Paseka, Sulalitha Bowala, Ruppa K. Thulasiram. 244-249 [doi]
- Lightweight Early-Warning Bot Detection on X (Twitter): Temporal Patterns and Entropy InsightsSanaz Adel Alipour, Jeannette Janssen, Rita Orji, Nur Zincir-Heywood. 250-255 [doi]
- CKH: Causal Knowledge Hierarchy for Estimating Structural Causal Models from Data and PriorsRiddhiman Adib, Md Mobasshir Arshed Naved, Chih-Hao Fang, Md. Osman Gani, Ananth Grama, Paul M. Griffin, Uzma Hasan, Sheikh Iqbal Ahamed, Mohammad Adibuzzaman. 256-261 [doi]
- Leveraging Semi-Supervised Learning to Reduce Labeled Data Requirements in Intrusion DetectionSimone Albero, Tommaso Caiazzi, Stefano Iannucci, Paolo Merialdo, Riccardo Torlone. 262-267 [doi]
- BOOST: Batch Ordering for Training Deep Forecasting ModelsJavad Rahimipour Anaraki, Lei Guo. 268-276 [doi]
- CFS-BAS-BP: Traffic Accident Risk Factor Recognition Model based on Combinatorial Feature Selection and Bionic Neural NetworkYuying Li, Yishan Li, Yan Wang, Jing Liu, Zhuopeng Wang. 277-282 [doi]
- Optimizing Sports Predictions Using Model Selection: A Case Study in Reproducible Data-ScienceNick Cliffel, Rajiv Ramnath. 283-288 [doi]
- Deep Transfer Learning in Smart Building and Links with Edge ComputingLouis Closson, Christophe Cérin, Didier Donsez. 289-294 [doi]
- Optimization of Prompt Segmentation for Improving Event Recommendation Accuracy Using Generative Artificial IntelligenceShiori Oomoto, Miki Enoki, Masato Oguchi. 295-300 [doi]
- Batch Processing Algorithms for NewSQL-based Big Data SystemsNaveen Kumar Vadlamudi, Wendy Osborn. 301-306 [doi]
- A Late Fusion Approach Using CSNNs for Multi-Modal Toxicity Detection in Online MediaThu Nguyen, Sadaf Faizi, Simranjit Singh, Ismail El Sayad. 307-311 [doi]
- Vi-Net: A Hybrid Semantic Segmentation Approach for Enhanced Wildfire Spread PredictionManavjit Singh Dhindsa, Kshirasagar Naik, Pin-Han Ho, Marzia Zaman, Chung-Horng Lung, Srinivas Sampalli, Thambirajah Ravichandran. 312-317 [doi]
- Unveiling Bias: Analyzing Race and Gender Disparities in AI-Generated ImageryDavid Cordero, Yijun Zhao, Priscilla Diaz, Gary M. Weiss. 318-323 [doi]
- Comparative Analysis of Pre-trained Deep Learning Models and DINOv2 for Cushing's Syndrome Diagnosis in Facial AnalysisHongjun Liu, Changwei Song, Jiaqi Qiang, Jianqiang Li 0002, Hui Pan 0003, Lin Lu, Xiao Long, Qing Zhao 0005, Jiuzuo Huang, Shi Chen 0002. 324-329 [doi]
- Predicting Wildfire Burned Areas Using Graph Neural NetworksUrsula Das, Kshirasagar Naik, Pin-Han Ho, Marzia Zaman, Chung-Horng Lung, Srinivas Sampalli, Thambirajah Ravichandran. 330-339 [doi]
- Statistical and Deep Learning Approaches for Risk Assessment and Volatility Forecasting in Renewable Energy InvestmentsShalini Jayanetti, Sulalitha Bowala, Sumeet Kalia, Aerambamoorthy Thavaneswaran, Md. Erfanul Hoque, Razvan G. Romanescu. 340-349 [doi]
- Harnessing Market Memory: Adaptive Reinforcement Learning with Fractional Brownian Motion for Portfolio OptimizationShivam Sharma, Shahram Latifi, Pushkin Kachroo. 350-360 [doi]
- A Conformal Prediction-Based Framework for CPU Load Forecasting: A Black-Box ApproachEdin Jelacic, Cristina Seceleanu, Peter Backeman, Ning Xiong 0001, Tiberiu Seceleanu, Axel Jantsch. 361-370 [doi]
- Coarse Walk: Multilayer Random Walk with Coarsened GraphKazuma Aoyama, Shota Inoue, Hiroyuki Ohsaki. 371-380 [doi]
- KG-ITP: A Knowledge Graph for Intelligent Travel PlanningRajesh Anant Sawant, Ashutosh Sudhir Kumbhar, Aditya Patil, Girish Subhash Nalawade, Jahnavi Gona, Srividya Bansal 0001. 381-390 [doi]
- On the Superiority of Data-Driven Combined Forecasts Based on Deep Learning ModelsSulalitha Bowala, Md. Erfanul Hoque, Hina Shaheen, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Alex Paseka. 391-400 [doi]
- SynExpression: A Diffusion-Based Framework for Controllable Facial Expression Synthesis and Emotion Detection Using Facial Segmentation Pose MapsShahrzad Sayyafzadeh, Simon Foo, Shonda Bernadin, Hongmei Chi. 401-410 [doi]
- Vegetation Land Cover and Forest Fires in Canada: An Analytical Data VisualizationAbdul Mutakabbir, Chung-Horng Lung, Marzia Zaman, Kshirasagar Naik, Richard Purcell, Srinivas Sampalli, Thambirajah Ravichandran. 411-420 [doi]
- Autotuning CNN Workloads on the Edge: A Hybrid Approach with Cross-Domain EmbeddingsTrevor Hanz, Mohammad Ali, Zarif Sadman, Apan Qasem. 421-430 [doi]
- Evaluating the Application and Performance of Regression Models in Predicting Cycling Power OutputEuan Walker, Oluwaseun Bamgboye, Sarah Thomson, Xiaodong Liu 0002. 431-439 [doi]
- Evaluation of the Code Generated By Large Language Models: The State of the ArtZhihao Ying, Dave Towey, Yifan Zhang. 440-449 [doi]
- Automated Duplicate Bug Report Detection in Large Open Bug RepositoriesClare E. Laney, Andrew Barovic, Armin Moin. 450-458 [doi]
- SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial AttacksSadia Afrin, Marwa A. Elsayed, Nur Zincir-Heywood. 459-464 [doi]
- Semantic Enhanced Relational Graph Attention Network for Chinese Medical Named Entity RecognitionJianQiang Li, Yueqi Chang, Yinuo Ouyang, Xiaoyan Gao, Zihan Ding, Hongzhi Qi. 465-470 [doi]
- Analyzing Deep Convective Cloud Properties for Philippines' Monsoon Heavy Precipitation Using Self-Organizing MapsEunice Ledres, Hannes Bauser, Shahram Latifi. 471-476 [doi]
- Resource Allocation Considering the Impact of Characteristics and Parallel Processing of Heterogeneous Computational Resources in Disaggregated ComputingNarunori Ebara, Saki Hatta, Yuta Ukon, Hiroyuki Uzawa, Shoko Ohteru, Shuhei Yoshida, Ken Nakamura. 477-482 [doi]
- Performance Analysis of Convolutional Neural Network By Applying Unconstrained Binary Quadratic ProgrammingAasish Kumar Sharma, Sanjeeb Prashad Pandey, Julian Martin Kunkel. 483-488 [doi]
- Grapheon RL: A Graph Neural Network and Reinforcement Learning Framework for Constraint and Data-Aware Workflow Mapping and Scheduling in Heterogeneous HPC SystemsAasish Kumar Sharma, Julian M. Kunkel. 489-494 [doi]
- ArtArchitect: Adaptive Depth Correction and Outpainting for Realistic World GenerationYong Zhang, Henry C. B. Chan, Rufeng Duan, Haifeng Yu, Xuede Wang, Haonan Lin. 495-504 [doi]
- Advancing DeFi: A Novel Approach to Accessible and Efficient Decentralized FinanceSajan Poudel, Abhishek Yadav, Niraj Pandey, Shahid Noor. 505-510 [doi]
- Traffic Signal Phasing Optimisation using Enhanced Q-network (EDQN)Jiping Cui, Ali Keivanmarz, Hamid Sharifzadeh. 511-516 [doi]
- LLM-driven Data Service Discovery in the Internet of ProductionDevis Bianchini, Massimiliano Garda, Michele Melchiori, Anisa Rula. 517-522 [doi]
- The Application of Transformer-Based Models for Predicting Consequences of Cyber AttacksBipin Chhetri, Akbar Siami Namin. 523-532 [doi]
- Harnessing the Power of LLMs for Code Smell Detection in Terraform Infrastructure as CodeQuoc-Huy Vo, Ha Dao, Kensuke Fukuda. 533-542 [doi]
- Tactile Texture Recognition On Uneven Surfaces Using Self-Attention Based Neural NetworksSoheil Khatibi, Maliheh Marzani, Ruslan Masinjila, Vinicius Prado da Fonseca, Thiago Eustaquio Alves de Oliveira. 543-551 [doi]
- A Two-stage Faster R-CNN Approach for Road Surface Damage DetectionVu Tuong Vy Le, Ali Keivanmarz, Hamid Sharifzadeh. 552-558 [doi]
- Understanding the Association of Update Characteristics, Trust, and Cognitive Dissonance with Intention to Update: A Study in the Context of Microsoft WindowsEhsan Ul Haque, Mohammad Maifi Hasan Khan. 559-570 [doi]
- "There's Competition Even Among the Parents of Neurodiverse Children" - Understanding the Dynamics of Social Support Groups for Parents of Autistic ChildrenDmitriy Bogush, Daniel Koronthály, Kevin Hubbard, Moushumi Sharmin, Shameem Ahmed. 571-580 [doi]
- Beyond One-Size-Fits-All: GPT-Enabled Personalization of Academic Content for Neurodiverse StudentsEli Graves, Adrian Heffelman, Lars Olt, Noah Bomben, Yasmine N. Elglaly, Shameem Ahmed, Moushumi Sharmin. 581-592 [doi]
- Ontology-based Adaptive Knowledge System (OAKS): Adaptive and Consistent Knowledge Acquisition through LLMs for Diverse User BackgroundsMuran Yu, Jie Wang 0006, Yirong Chen, Micheal D. Lepech, Ying Liu 0039, Kincho H. Law. 593-599 [doi]
- Distinguishing Between Science and Action in Climate Discourse on RedditRachel Jarvi, James Miele, Hieu Nguyen 0008, Swapna S. Gokhale. 600-606 [doi]
- Understandability of the Technology and Benefit May Not Be Enough to Nudge Users: An Exploratory Study in the Context of FIDO2 Adoption BehaviorYoussef Amer, Ehsan Ul Haque, Zhelun Rong, Mohammad Maifi Hasan Khan. 607-618 [doi]
- Enhanced tracking and reporting of missing persons using Knowledge Graph and Ontology EngineeringSuparno Roy Chowdhury, Ayush Desai, Mrunal Kapure, Mustakim Shikalgar, Ramchander Venugopal, Srividya Bansal 0001. 619-627 [doi]
- PyLC+: A Scalable Python Framework for Automated Translation and Testing of Industrial PLC ProgramsMikael Ebrahimi Salari, Eduard Paul Enoiu, Alessio Bucaioni, Wasif Afzal, Cristina Seceleanu. 628-639 [doi]
- Adapting Hybridization of Deep Learning Algorithms for High-Frequency DatasetsJoy Dip Das, Avanthi Saumyamala, Sulalitha Bowala, Ruppa K. Thulasiram, Aerambamoorthy Thavaneswaran. 640-647 [doi]
- Exploring the Possibility of TypiClust for Low-Budget Federated Active LearningYuta Ono, Hiroshi Nakamura, Hideki Takase. 648-653 [doi]
- Developing a Cyber-Physical-Social Metaverse System for Interactive Cultural Heritage ExperiencesLouis Nisiotis, Charalampos Nikolaou, Nikita Markov, Aimilios Hadjiliasi. 654-663 [doi]
- GCCTNet: Enhancing Network Traffic Prediction through Decomposition and Hybrid ModelingHaipeng Liu, Wenhao Zhu, Jianfeng Hong. 664-672 [doi]
- Chain-of-Summary: An Efficient Multi-Clustering Framework for Hierarchical AbstractionChongchong Yang, Wenhao Zhu, Zhiqiang Yang, Chaoqian Liu, Jianfeng Hong. 673-682 [doi]
- A Novel Assistant for Question-Answering from Training Video Sessions Using RAGQuentin Kembellec, Karima Boutalbi, Olivier Le Van. 683-688 [doi]
- Towards Improved Research Methodologies for Industrial AI: A case study of false call reductionKorbinian Pfab, Marcel Rothering. 689-694 [doi]
- AugOracle: In-Capability Raw Input Validation for Deep Learning Models in DeploymentZhengyuan Wei. 695-700 [doi]
- AI-Generated Text Detection Using RoBERTa: A Generalizability and Explainability AnalysisKarla Schäfer, Martin Steinebach. 701-706 [doi]
- Metal Artifact Reduction Methods Using Deep Generative Models for Cultural Relics X-ray CT ImagesDaxin Peng, Jianqiang Li 0002, Liang Qu, Jing Huang, Xi Xu, Jianyu Liu, Zhenbin Xie, Qing Xiao, Xueyan Zhang, Junyu Zhao, Qixin Chen, Wenyi Liang. 707-712 [doi]
- Evaluating YOLOv8 for On-Device Person Detection: Performance and Efficiency on Android SmartphonesMarcus Freire, Marcos Silva, Álvaro Oliveira, Alessandra Jesus, Igor Teles, Andreas Graubach, Hérsio Iwamoto, Eduardo Almeida, Frederico Durao, Maycon Peixoto, Gustavo Figueiredo, Cássio V. S. Prazeres, Ivan Machado 0001, Bruno Santos, Rodrigo Souza, Rubisley Lemes. 719-728 [doi]
- Radio link failure prediction in 5G networks using graph neural networksIsaac Ampratwum, Amiya Nayak. 729-736 [doi]
- Breaking of Cyclic Dependencies by Scheduling for Scalable and Accurate Network Calculus AnalysisSören Jorczik, Steffen Bondorf. 737-742 [doi]
- Graph Neural Network-Based Internet Traffic Prediction in 6G Networks with Genetic Algorithm Hyperparameter OptimizationIsaac Ampratwum, Amiya Nayak. 743-748 [doi]
- Towards More Accurate Mobile Direction Finding with UWBYerkezhan Sartayeva, Henry C. B. Chan. 749-758 [doi]
- Affinity and Interference-Aware Service Deployment for Energy Efficiency in Cloud Data Centers: A Deep Reinforcement Learning ApproachJin Xu, Huiqun Yu, Guisheng Fan, Shengwei Liu, Hengrun Zhang 0004, Liqiong Chen. 759-768 [doi]
- BitInfer: An Automated Field Semantic Inference Method Based on Genetic AlgorithmYixuan Zhang, Liang Fang, Junhai Yang, Zifu Li, FengHua Li. 769-777 [doi]
- Automatically pinpointing original logging functions from log messages for network troubleshootingGaspard Damoiseau-Malraux, Satoru Kobayashi, Kensuke Fukuda. 778-787 [doi]
- Performance Comparison of Quantum and Classical Machine Learning Models for Chronic Kidney Disease PredictionParama Sridevi, Paramita Basak Upama, Masud Rabbani, Sheikh Iqbal Ahamed. 788-793 [doi]
- Contextual Embedding-based Clustering to Identify Topics for Healthcare Service ImprovementK. M. Sajjadul Islam, Ravi Teja Karri, Srujan Vegesna, Jiawei Wu, Praveen Madiraju. 794-799 [doi]
- A Meta-Learning Network Guided by Domain Knowledge of Fundus Images for the Diagnosis of High MyopiaWenxiu Cheng, Jianqiang Li 0002, Xi Xu, Qixin Chen, Junyu Zhao, Boyan Wang, Linna Zhao, Haoran Peng, Li Li 0079, Yo-Ping Huang. 800-805 [doi]
- Automatic Diagnosis of Hip and Knee Osteoarthritis from Medical Text RecordsJiahao Cai, Vidhi Kokel, Farhana H. Zulkernine, John A. Queenan, David Barber. 806-814 [doi]
- Personalized Mental Health Assistance with Large Language ModelsFozle Rabbi Shafi, M. Anwar Hossain 0005, Salimur Choudhury. 815-823 [doi]
- A Survey on Non-Invasive Computing: Neurological-Hematological Framework for Early Infection and Stroke Detection with Future DirectionsMasud Rabbani, Nafi Us Sabbir Sabith, Sheikh Iqbal Ahamed. 824-833 [doi]
- Integrating Knowledge Graphs and Bayesian Networks: A Hybrid Approach for Explainable Disease Risk PredictionMbithe Nzomo, Deshendran Moodley. 834-844 [doi]
- Development of a Respiratory Motion Video Based Monitor for Noninvasive Mechanical Ventilation Synchronization in Premature InfantsCarine Lucena Rech, Vinicius Chrisosthemos Teixeira, Humberto Holmer Fiori, Márcio Sarroglia Pinho. 845-853 [doi]
- SmartADHDMonitor: A Novel Approach to Automatic ADHD Monitoring Through Smartphone App Usage DataShweta Ware, Kritim Rijal, Laura E. Knouse. 854-865 [doi]
- TransConv-DDPM: Enhanced Diffusion Model for Generating Time-Series Data in HealthcareMd Shahriar Kabir, Sana Alamgeer, Minakshi Debnath, Anne H. H. Ngu. 866-875 [doi]
- Examining Large Language Models Within Autism-Related Contexts: A Systematic Review of Bias and (Mis) RepresentationKatelyn Pryor, Thorleif Coleman, Syed Zuhair Hossain, Eric Tootil, Shameem Ahmed. 876-886 [doi]
- A Mobile Application-Based Solution for Identifying Accessibility Challenges in Various Physical Classroom Designs at a U.S. Midwestern UniversitySayeda Farzana Aktar, Mason Dennis Drake, Calvin Berndt, Iftekhar Anam, Roger O. Smith. 887-894 [doi]
- Ethical Dimensions of Artificial Intelligence in Personalized Medicine: Navigating Challenges and Shaping Future PoliciesAishi Huang. 895-900 [doi]
- Improving Time-Series Forecasting with Statistical and AI-Driven Feature OptimizationMinakshi Debnath, Sana Alamgeer, Anne H. H. Ngu. 901-906 [doi]
- Encoder-Only Transformer for Detecting Multiple Neurodegenerative Diseases from Gait AnalysisGiordana de Farias F. B. Bucci, Juliana Paula Felix, Rogerio Salvini 0001, Hugo A. D. Nascimento, Fabrízzio Soares. 907-912 [doi]
- CSA-SACS: A Framework for Comparative Security Assessment in Smart Aging Care SystemsNilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine. 913-920 [doi]
- Mining Five Years of Actively Exploited VulnerabilitiesRaphaël Khoury, Kobra Khanmohammadi, Justin Vallé, Abdelwahab Hamou-Lhadj. 921-931 [doi]
- SmartAttack: Ultrasonic Air-Gap Attack via SmartwatchesMordechai Guri. 932-942 [doi]
- Multiparty Selective Disclosure using Attribute-Based EncryptionShigenori Ohashi. 943-949 [doi]
- Fixing Invalid CVE-CWE Mappings in Threat DatabasesSevval Simsek, Howell Xia, Jonah Gluck, David Sastre Medina, David Starobinski. 950-960 [doi]
- Few-Shot Learning-Based Cyber Incident Detection with Augmented Context IntelligenceFei Zuo, Junghwan Rhee, Yung Ryn Choe, Chenglong Fu 0002, Xianshan Qu. 961-969 [doi]
- Enhancing the Detection of Anomalous Concurrent Artifact Operations in a Structured WorkflowYi Chen, Mahmoud M. Abouzeid, Feng-Jian Wang. 970-978 [doi]
- Understanding and Mitigating Vulnerabilities of Random Walks against Adversarial AttacksTaiyo Hirayama, Han Nay Aung, Hiroyuki Ohsaki. 979-988 [doi]
- AudioGap: An AirGapped Covert Channel Exploiting the Frequency Diversity of Audio IC Electromagnetic LeakageMohamed Alla Eddine Bahi, Maria Mendez Real, Erwan Nogues, Maxime Pelcat. 989-994 [doi]
- Vulnerability to Stability: Scalable Large Language Model in Queue-Based Web ServiceAbdul Barek, Md Bajlur Rashid, Md. Mostafizur Rahman, A. B. M. Kamrul Riad, Guillermo Francia III, Hossain Shahriar, Sheikh Iqbal Ahamed. 995-1000 [doi]
- Stealth Friend Locator: Server Blinded Private Location SharingTyler Nicewarner, Ali A. Allami, Dan Lin 0001. 1001-1014 [doi]
- MuAE: A Mutation Testing Framework for Evaluating AutoencodersSamer Y. Khamaiseh, Steven Chiacchira, Anas Alsobeh, Aibak Aljadayah. 1015-1020 [doi]
- Lightweight Classifier for Obfuscation Methods for IoT DevicesWanju Kim, Youjeong Noh, Seoksu Lee, Eun-Sun Cho. 1021-1026 [doi]
- Decentralized Learning using Hashgraph ConsensusRobert Canady, Chandreyee Bhowmick, Xenofon D. Koutsoukos. 1027-1032 [doi]
- Fine-tuned Large Language Models (LLMs): Improved Prompt Injection Attacks DetectionMd. Abdur Rahman 0003, Hossain Shahriar, Guillermo Francia, Fan Wu 0013, Alfredo Cuzzocrea, Muhammad Rahman 0006, Md. Jobair Hossain Faruk, Sheikh Iqbal Ahamed. 1033-1039 [doi]
- Embedding with Large Language Models for Classification of HIPAA Safeguard Compliance RulesMd. Abdur Rahman 0003, Abdul Barek, ABM Kamrul Islam Riad, Md. Mostafizur Rahman, Md Bajlur Rashid, Md Raihan Mia, Hossain Shahriar, Guillermo Francia III, Fan Wu 0013, Alfredo Cuzzocrea, Sheikh Iqbal Ahamed. 1040-1046 [doi]
- oHIT - A framework for openHAB Interaction Threats Identification in IoT SystemsJason Quantrill, Noura Khajehnouri, Manar H. Alalfi. 1047-1056 [doi]
- vRM: Verifying Reference Monitors via Exhaustive Access Pattern GenerationRyo Nakashima, Takahiro Shinagawa. 1057-1066 [doi]
- Evaluating the Reliability of Digital Forensic Evidence Discovered by Large Language Model: A Case StudyJeel Piyushkumar Khatiwala, Daniel Addai, Weifeng Xu. 1067-1076 [doi]
- VocalTrust: Preventing Impostors to Enhance Trustworthiness of Voice AuthenticationKe Li, Cameron Baird, Dan Lin 0001. 1077-1088 [doi]
- Leveraging Large Language Models for Generating Training Datasets for Text Extraction from ThumbnailsEric Xu, Chimezie Onwuegbuchulem, Sarfraz Shaikh, Lin Deng 0001. 1089-1094 [doi]
- Hardware Authenticator Binding: A Secure Alternative to PasskeysMomoko Shiraishi, Takahiro Shinagawa. 1095-1100 [doi]
- Secure iOS mHealth Apps Development: An IDE-Embedded Framework for HIPAA-Aware CodingMd Bajlur Rashid, Abdul Barek, Md. Mostafizur Rahman, Sharmin Yeasmin, Hossain Shahriar, Sheikh Iqbal Ahamed. 1101-1107 [doi]
- SGPQ-IoT: Securely Generating Post-Quantum Keys for IoT Devices Using a Quantum ComputerMaurice Ngouen, Mohammad Ashiqur Rahman, Alexander Perez-Pons, Nagarajan Prabakar. 1108-1115 [doi]
- yak: WebAssembly-based Data Analysis Platform with Data Providers Driven Analysis ControlNaoki Matsumoto, Tomoya Kawanishi, Kenji Ohira, Masahiro Kozuka. 1116-1125 [doi]
- Smart Contract Reentrancy Vulnerability Localization Using Explainable Graph Neural NetworksHaowei Liu, Yanxiang Tong, Shunhui Ji, Pengcheng Zhang. 1126-1135 [doi]
- Privacy-Preserving Self-Supervised Learning for Secure Image Processing: A BYOL-Based Framework for MNIST and Chest X-ray DataABM Kamrul Islam Riad, Salma Ahmed, Maliha Zaman Nizum, Abdul Barek, Md Bajlur Rashid, Md. Mostafizur Rahman, Guillermo Francia III, Hossain Shahriar. 1136-1145 [doi]
- Physics-Informed Learning-based Attack Analytics for Electric Vehicle Charging Management SystemsDavid Perry, Mohammad Zakaria Haider, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Hossain Shahriar. 1146-1153 [doi]
- Decentralized Access Control using Hyperledger FabricJubayer Hossain, Mehedi Hasan Nabil, Farhan Labib Jahin, Md Yeasin Ali, Hossain Shahriar, Md Sadek Ferdous. 1154-1163 [doi]
- LLMs-Driven Vulnerability Detection Combining LogicASG Reasoning with In-Context LearningWenhui Xia, Yanxiang Tong, Ben Wang, Pengcheng Zhang. 1164-1173 [doi]
- VFProber: A Vulnerability-Fixing Identification Framework Based on Code Changes and Semantic AdjustmentJianan Dong, Guisheng Fan, Yueming Yu, Yuguo Liang, Yujie Ye, Huiqun Yu, Wentao Chen. 1174-1183 [doi]
- A Lightweight Monitoring and Anomaly Detection Framework for IoT DevicesJie Yin, Yutaka Ishikawa, Atsuko Takefusa. 1184-1193 [doi]
- An Enhanced Opaque Predicate Detection Method with Synthesis and Recursive MatchingHyeongchang Jeon, Seoksu Lee, Eun-Sun Cho. 1194-1203 [doi]
- Reconstructing Judicial Digital Forensic Evidence Graphs from Legal Documents Using Large Language ModelsOmar Ramadan, Ruoyao Xiao, Dianxiang Xu, Weifeng Xu. 1204-1213 [doi]
- License Compatibility Detection for OpenJavaWorks Open-Source Projects Based on Code SimilarityXiaotong Wang, Huiqun Yu, Guisheng Fan, Yuguo Liang, Wentao Chen, Jingyi Liu. 1214-1223 [doi]
- Program Slicing in the Era of Large Language ModelsKimya Khakzad Shahandashti, Mohammad Mahdi Mohajer, Alvine Boaye Belle, Song Wang 0009, Hadi Hemmati Lassonde. 1224-1233 [doi]
- One Documentation Does Not Fit All : Case study of TensorFlow DocumentationSharuka Promodya Thirimanne, Elim Yoseph Lemango, Giulio Antoniol, Maleknaz Nayebi. 1234-1243 [doi]
- FRCS-LLM: A Framework for Refining Code Summarization in Large Language Models via Pre-trained ModelsYuqi Wang, Chunli Xie, Wenbin Zhang, Xin Qiu. 1244-1253 [doi]
- C2RustTV: An LLM-based Framework for C to Rust Translation and ValidationHan Zhou, Yu Luo, Mengtao Zhang, Dianxiang Xu. 1254-1259 [doi]
- On the Migration of Legacy Systems to an Event-Driven Architecture: A SurveyIkram Darif, Manel Abdellatif, Ghizlane El-Boussaidi. 1260-1269 [doi]
- Graph-Centric Approaches for Coverage Optimization in Software Requirement TestingZhiyao Wang, Xiujing Guo, Tatsuhiro Tsuchiya. 1270-1280 [doi]
- Intent Based E2E Automated Test Case Generation for Web Applications Using LLMZain Ul Abideen 0008, Junxia Guo. 1281-1290 [doi]
- Reimagining Business Processes with Large Language ModelsHoussem Chemingui. 1291-1296 [doi]
- An Empirical Study on Hugging Face Trends, Topics and Challenges on Stack OverflowHatem Feki, Manel Abdellatif, Mohammed Sayagh. 1297-1307 [doi]
- Exploring the Use of LLMs to Reduce the Discarding of MBT Test CasesCarlos D. Q. Lima, Everton L. G. Alves, Wilkerson de L. Andrade, Felipe Torres. 1308-1317 [doi]
- Predicting Bug Inducing Commits Using Commit-State Transition AnalysisAlireza Tavakkoli Barzoki, Kostas Kontogiannis. 1318-1327 [doi]
- JIT-Align: A Semantic Alignment-Based Ranking Framework for Just-In-Time Defect PredictionYujie Ye, Huiqun Yu, Guisheng Fan, Yuguo Liang, Jianan Dong, Wentao Chen. 1328-1337 [doi]
- Towards Emergent Agility: Advancing Software Process EngineeringYasmeen Rawajfih, Ross Arnold. 1338-1343 [doi]
- QuanUML: Towards A Modeling Language for Model-Driven Quantum Software DevelopmentXiaoyu Guo, Shinobu Saito, Jianjun Zhao 0001. 1344-1349 [doi]
- MVGText: Momentum and Variance Guided Hard-Label Text Test Case GenerationShunhui Ji, Yu Shi, Changrong Huang, Letian Cheng, Pengcheng Zhang 0001. 1350-1359 [doi]
- GRCEM: Generating Optimal Software Rejuvenation Strategies for Cloud-Edge Collaborative Systems Based on MADRLXueyong Tan, Jing Liu. 1360-1369 [doi]
- LSFuzz: Learning Adaptive Seed Selection Strategies for FuzzingMingqian Xiao, Yufeng Zhang, Zhenbang Chen. 1370-1375 [doi]
- A Contrastive Learning Approach to Bug Severity Classification with Large Language Model EmbeddingsMosarrat Rumman, Emon Roy, Anushka Zaman, Jeremy S. Bradbury. 1376-1381 [doi]
- Beyond Log Parsers: A Scalable AI-Driven Framework for Efficient Log Anomaly Detection in Software EngineeringYicheng Sun, Jacky Keung, Hi Kuen Yu, Shuo Liu, Yihan Liao, Jingyu Zhang. 1382-1387 [doi]
- DeepSem: Multilayer Semantic Image Retrieval for High-Accuracy Multimodal RAG in Industrial ApplicationsYujia Qi, Shijia Gu, Wenxian Ma, Nan Wang, Qian Wang. 1388-1393 [doi]
- Empowering AI to Generate Better AI Code: Guided Generation of Deep Learning Projects with LLMsChen Xie, Mingsheng Jiao, Xiaodong Gu 0002, Beijun Shen. 1394-1399 [doi]
- ApiRAT: Integrating Multi-source API Knowledge for Enhanced Code Translation with LLMsChaofan Wang, Guanjie Qiu, Xiaodong Gu 0002, Beijun Shen. 1400-1405 [doi]
- Zimic: Bridging the Gaps in API Mocking for Typescript ProjectsDiego Cruz de Aquino, Everton L. G. Alves. 1406-1415 [doi]
- Enhancing LLM-Based Code Generation with Complexity Metrics: A Feedback-Driven ApproachMelika Sepidband, Hamed Taherkhani, Song Wang 0009, Hadi Hemmati. 1416-1426 [doi]
- Avoidance of Feature Configuration Faults in Software Product LinesBurcu Ergun, Tugkan Tuglular, Fevzi Belli. 1427-1436 [doi]
- Robust Smartphone Screen Integration with Deep Learning for Virtual Reality Pass-throughLucas Hartman, Ethan Pigou, Nicholas Strzelczyk, Santiago Gomez-Rosero, Miriam A. M. Capretz. 1437-1443 [doi]
- Efficient Task Scheduling Using a Hybrid Q-NEH and CS-GW Approach in Fog ComputingZeinab Sadeghi Chevinli, Hamidreza Fereidouni, Michel Kadoch. 1444-1451 [doi]
- SmartTinkerer: Bridging Smart Home Testing Gaps with LLM, Digital Twin & Reinforcement LearningSamad Alias Nyein Chan, Manar H. Alalfi. 1452-1461 [doi]
- Addressing Context Awareness Requirements of IoT Systems: A Model-Driven ApproachMirza Rehenuma Tabassum, Sadaf Mustafiz. 1462-1473 [doi]
- Quantifying Completeness of Reconstructed Scenarios: A Case Study on Echo ShowSarfraz Shaikh, Weifeng Xu. 1474-1479 [doi]
- Physics-Informed Data Denoising for Enhanced IoT-based Water Quality MonitoringAfroza Nowshin, Sumaiya Tasnim, Samia Tasnim. 1480-1485 [doi]
- Towards Explainable AI in Continuous Smartphone Authentication: Leveraging CNN, BiLSTM, and Attention TechniquesDamandeep Kaur, Andrew Pauls, Glaucio H. S. Carvalho. 1486-1491 [doi]
- SEAD: Sensor Event-Based Anomaly Detection for Smart Home AutomationMd. Asif Tanvir, Fahim Ahmed Irfan, Razib Iqbal. 1492-1497 [doi]
- Vendor PulseGen: Generative Vendor Risk Management PlatformSwapnil Yasasvi, Nilanjan Sinhababu, Suman Kumar Chakraborty, Shuvo Bardhan. 1498-1501 [doi]
- A-CLAPS: Automatic Correction of Language and Pronunciation Errors in Slide-based PresentationsYuan Li, Yanchi Liu, Yijun Zhao. 1502-1505 [doi]
- Vulnerability Weightage and Prioritization Model: Derived from Real Data and Community InsightsSuman Chakraborty, Saumyajeet Das, Shuvo Bardhan. 1506-1509 [doi]
- Strengthening Cyber Resilience of Small Businesses in BFSI: A CIA-Driven Strategy for Investment and Risk ManagementRajesh Yalavaguli Seetharamarao, Suman Chakraborty, Shuvo Bardhan. 1510-1513 [doi]
- Quantum Knowledge Graph: Leveraging QNLP for Semantic Relationship ModelingSuman Bharti, Dan Chia-Tien Lo, Hossain Shahriar. 1514-1517 [doi]
- Extending the Attack Graph Model: Integrating Reconnaissance StagesSuman Chakraborty, Owais Shaikh, Shuvo Bardhan. 1518-1521 [doi]
- Cascading IDK Classifiers to Accelerate Object Recognition While Preserving AccuracyIshrak Jahan Ratul, Zhishan Guo, Kecheng Yang 0001. 1522-1525 [doi]
- Narrative-Aware Cycling Route Design Using Generative AIHayato Tomisu, Shota Morita, Naoto Kai, Tomoki Yoshihisa. 1526-1527 [doi]
- Towards Supporting Modelling of Fault Tolerant Behaviour Using Behaviour TreesElena Troubitsyna. 1528-1529 [doi]
- MONDAY: A Unified Semantic Communication Profile with Dynamic Role Integration in Pub/Sub SystemsHaruto Nakai, Michiharu Takemoto. 1530-1531 [doi]
- Enhancing Educational Inclusivity through Interactive AI for Sign Language InterpretationChi Fuk So, Wai Kin Lo. 1532-1533 [doi]
- Multilingual and Informal Web Datasets for Robust Language ModelingSalatiel A. A. Jordão, Carine S. Santos, Maria J. P. Dantas. 1534-1535 [doi]
- Driving factors for the adoption of blockchain: A focus on startup entrepreneurshipJoshua Ebere Chukwuere. 1536-1538 [doi]
- Internet-of-Things traffic sensor real-time messaging and stream analyticsTom Komar, Philip James 0002. 1539-1540 [doi]
- ConPath: A Coordinator for Optimized Network Paths and Automated Traffic HandlingKazuki Tanabe, Motoki Takenaka, Harunobu Yoshida, Tatsuya Fujiwara, Teruhisa Tajima. 1541-1546 [doi]
- An Analysis of Task Offloading Approaches in Edge-Cloud ContinuumJenish Modi, A B. M. Bodrul Alam, Muhammad Asaduzzaman. 1547-1552 [doi]
- Route Selection Optimization for Multi-hop RADIUS Proxies in WLAN Roaming SystemsXirui Yang, Hideaki Goto, Takuo Suganuma. 1553-1558 [doi]
- A Proposal of Policy Routing per End-Host in IPv6 Site Multi-homing using NPTv6Kazuma Yokoo, Tohru Kondo, Hidenobu Watanabe, Kaori Maeda, Reiji Aibara. 1559-1564 [doi]
- Grey Wolf Optimizer Enhances Adaptive Atrous Spatial Pyramid Pooling for Efficient Multi-Scale Feature Selection in Medical Image SegmentationAlireza Norouziazad, Fatemeh Esmaeildoost, Behrouz Homam, Razieh Salahandish. 1571-1576 [doi]
- Lightweight Deep Learning with Virtual Reality Visualization for Offline Tumor Segmentation in Rural EnvironmentsRamin Ranjbarzadeh, Shokofeh Anari, Martin Cunneen, Malika Bendechache. 1577-1582 [doi]
- Investigating Transferability in Multi-Agent Reinforcement LearningCorentin Artaud, Rafael Pina, Varuna De Silva, Xiyu Shi. 1583-1588 [doi]
- Customer Lifetime Value Estimation Using Transactional DataJoão Marcos A. M. Ramos, Fabrício A. Silva, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz Aylon. 1589-1594 [doi]
- A Grouping Algorithm for Training Tree-Shaped Models on Multiple GPUs with High EfficiencyCai-Feng Lin, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu, Tzu-Hsien Tsai. 1595-1600 [doi]
- Novel Norms for Pruning Convolutional Neural NetworksAbrar Kazi, M. Anwar Hossain 0005, Mohammad Zulkernine. 1601-1606 [doi]
- A Comparative Analysis of Transformer and Traditional ML Models for Cyberbullying Detection on Twitter (now X)Muhammad Abusaqer, Jamil Saquer. 1607-1612 [doi]
- Quantifying creativity in AI-generated podcastsHarini Narayanan. 1613-1618 [doi]
- Physical Fuzzy Rule Based Unsupervised News Article ClusteringMarufa Kamal, Kishor Datta Gupta, Masrura Tasnim, Md. Mahfuzur Rahman, Mohd Ariful Haque, Roy George. 1619-1624 [doi]
- Comparative Analysis of Styles in LLM-Generated Code for LeetCode Problems: A Preliminary StudyYifan Zhang, Tsong Yueh Chen, Rubing Huang, Matthew Pike, Dave Towey, Zhihao Ying, Zhi Quan Zhou 0001. 1625-1630 [doi]
- TinyML for Speech RecognitionAndrew Barovic, Armin Moin. 1631-1636 [doi]
- Bad Smell Detection using Google GeminiLarisse Amorim, Ivandeclei Mendes da Costa, Leticia Alves, Eduardo Figueiredo 0001. 1637-1642 [doi]
- Adversarial Attacks in Multimodal Systems: A Practitioner's SurveyShashank Kapoor, Sanjay Surendranath Girija, Lakshit Arora, Dipen Pradhan, Ankit Shetgaonkar, Aman Raj. 1643-1650 [doi]
- Comparative Study of Depth Anything Model V2 and LiDAR sensors for Depth Map Estimation in Forest EnvironmentSilvio Vidal de Miranda, Welington Galvão, Gabriel Vieira, Fabrízzio Soares. 1651-1656 [doi]
- Optimizing LLMs for Resource-Constrained Environments: A Survey of Model Compression TechniquesSanjay Surendranath Girija, Lakshit Arora, Shashank Kapoor, Dipen Pradhan, Aman Raj, Ankit Shetgaonkar. 1657-1664 [doi]
- Ethical AI: Towards Defining a Collective Evaluation FrameworkAasish Kumar Sharma, Dimitar Kyosev, Julian M. Kunkel. 1665-1670 [doi]
- Event Classification of Accelerometer Data for Industrial Package Monitoring with Embedded Deep LearningManon Renault, Hamoud Younes, Hugo Tessier, Ronan Le Roy, Bastien Pasdeloup, Mathieu Léonardon. 1671-1676 [doi]
- On the Use of GPT to Reveal Common Questions in Developers' DiscussionsCamila T. Ramalho, Alessandro Garcia 0001, Juliana Alves Pereira, Wesley K. G. Assunção, Daniel Coutinho, Caio Barbosa, Carlos Lucena, Rodrigo Ito. 1677-1682 [doi]
- Barriers to the Adoption of Visual Knowledge Management Tools: Challenges at the Intersection of Technology, People, and ProcessStephen Ryan. 1683-1687 [doi]
- Constant Change: Leveraging Digitalization for an Organization's Evolutionary FitnessBarbara Steffen, Tiziana Margaria. 1688-1693 [doi]
- Diagrams as Visual Knowledge Communication Tools in Interdisciplinary Postgraduate EducationSalim Saay, Sean O'Brien, Amandeep Singh, Amalia de Götzen, Viktoria Voronova, Tiziana Margaria. 1694-1699 [doi]
- An Amodal Segmentation Pipeline for Critical Infrastructure Asset ImagingJonathan Dupuis, James Green. 1700-1707 [doi]
- EVMx: An FPGA-Based Smart Contract Processing UnitLemayian Joel Poncha, Hachem Bensalem, Ghyslain Gagnon, Kaiwen Zhang 0001, Pascal Giard. 1708-1713 [doi]
- A Game-Theoretic Incentive Model for DAO GovernanceSilvio Meneguzzo, Rachele Pierri. 1714-1721 [doi]
- Design and Evaluation of a Sub-8 Second Decentralised Marketplace for Energy DataSilvio Meneguzzo, Alfredo Favenza, Claudio Schifanella, Alessandro Mozzato, Stefano Leto. 1722-1727 [doi]
- A Blockchain-Powered Digital Twin Architecture for Consumer-Centric Energy SystemsSilvio Meneguzzo, Nicolò Bertozzi, Marco Sacchet, Lucio Rocco Inglese, Alfredo Favenza. 1728-1733 [doi]
- Blockchain-Based Source-to-Source News VerificationAlberto Butera, Julia Staszczak, Patrick Mikalef, Valentina Gatteschi. 1734-1739 [doi]
- A Hybrid Lightweight LLM Chatbot for Sustainable Cryptocurrency Investment Decisions: Optimizing Small Models for Domain-Specific PerformanceAli Shiri, Mikaeil Mayeli Feridani, Samira Keivanpour. 1740-1745 [doi]
- ConfMan Web 3.0: Decentralized Academic Conference Management System with Rust and Web 3.0Chian Min Gan, Chee Kiat Seow, Sye Loong Keoh, Dezhong Yao 0002, Yigang Cen, Yiyu Cai, Nisha Jain, Qi Cao 0002. 1746-1751 [doi]
- Making Smart Contracts Easier To UnderstandEmanuele Antonio Napoli, Lorenzo Gangemi, Silvio Meneguzzo, Noemi Romani, Valentina Gatteschi. 1752-1757 [doi]
- ELWA Testbed-as-a-Service: An ECHONET Lite Web API Testbed with Heterogeneous IoT DevicesVan Cu Pham, Tao Xin, Marios Sioutis, Yasuo Tan. 1758-1763 [doi]
- Performance Evaluation of Multi-Head Logging in Flash File SystemsJingcheng Yuan, Kiyofumi Tanaka, Toshiaki Aoki. 1764-1769 [doi]
- Improving Social Connections Through Mobile Social NetworksAlvin Chin, Justin Chan, Joshua Garcia, Aria Barve, Kevin Leicht, Philip S. Yu. 1770-1775 [doi]
- Real-Time Hand Gesture Recognition for Touchless Video Control Using MediaPipe and Random ForestJoão Nunes, Thamer Horbylon Nascimento, Juliana Paula Felix, Fabrízzio Soares. 1776-1781 [doi]
- Proposal for a Simulation Environment for Reproducing Diverse Combined Attacks in Autonomous Driving SystemsSeiju Gima, Ryozo Kiyohara, Nobuhiro Kobayashi. 1782-1788 [doi]
- Actual Traffic Congestion Reduction Method Using V2R on One-Lane RoadsRito Tsuboi, Ryozo Kiyohara. 1789-1794 [doi]
- Operational Planning of a Home Energy Management System Using Regional Weekly Weather Forecasts to Mitigate Surplus ElectricityHiroaki Aoyama, Daisuke Kotani, Yasuo Okabe. 1795-1800 [doi]
- SDA-GRIN for Adaptive Spatial-Temporal Multivariate Time Series ImputationAmir Eskandari, Aman Anand, Drishti Sharma, Farhana H. Zulkernine. 1801-1806 [doi]
- Novel Data Driven High Dimensional Volatility Networks and Dynamic Price NetworksAvanthi Saumyamala, Sulalitha Bowala, Md. Erfanul Hoque, Aerambamoorthy Thavaneswaran, Alex Paseka, Ruppa K. Thulasiram. 1807-1812 [doi]
- Synthetic Fouling Image Data Generation for Heat Exchanger Predictive MaintenanceNicholas Strzelczyk, Santiago Gomez-Rosero, Amanda O. Timotheo, Leonardo de M. Honório, Miriam A. M. Capretz. 1813-1819 [doi]
- CL-KAN: A Novel Hybrid Approach for Spatiotemporal Traffic PredictionsWanglong Chen, Xiali Li. 1820-1827 [doi]
- Chemically-aware Attention-based Multi-modal Fusion Framework for Molecular Representation LearningYu Liu, Jonathan D. Hirst, Jianfeng Ren, Bencan Tang, Dave Towey. 1828-1833 [doi]
- AI and Generative AI Transforming Disaster Management: A Survey of Damage Assessment and Response TechniquesAman Raj, Ankit Shetgaonkar, Lakshit Arora, Dipen Pradhan, Sanjay Surendranath Girija, Shashank Kapoor. 1834-1840 [doi]
- IoT Malware Network Traffic Detection using Deep Learning and GraphSAGE ModelsNikesh Prajapati, Bimal Karki, Saroj Gopali, Akbar Siami Namin. 1841-1846 [doi]
- Churn Prediction in Digital Banking: Deep Learning Approaches with Minimal DataGabriel T. P. Coimbra, Fabrício A. Silva, Thais R. M. Braga Silva. 1847-1852 [doi]
- A Novel AI-driven Automated Orthodontic Model Analysis to Improve Classification of Orthodontic Extraction CasesSunna Imtiaz Ahmad, Adriel Silva de Araújo, Vinicius Crisosthemos Teixeira, Carlos Falcão de Azevedo Gomes, Vinicius Dutra, Quinn Roederer, R. Scott Conley, Dalvan Griebler, Márcio Sarroglia Pinho, Hakan Turkkahraman. 1853-1860 [doi]
- A State Channel Based Approach to Address Scalability of Healthcare Data SharingJahanzeb Shahid, Stelvio Cimato. 1861-1866 [doi]
- Semantic Motif-Based Analysis of Post-Pandemic Mobility Adaptation in Brazil Using Mobile Phone DataGermano B. dos Santos, Fabrício A. Silva, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz Aylon. 1867-1872 [doi]
- Voice-Activated Self-Monitoring Application (VoiS): User Acceptance and Satisfaction in the FieldHyunkyoung Oh, Li Yang, Tala Abu Zahra, Shiyu Tian, Min Sook Park, Jake Luo, Sheikh Iqbal Ahamed, Evelyn Chan, Jeff Whittle. 1873-1878 [doi]
- A Deep Reinforcement Learning Approach for Portfolio Optimization of Brazilian Assets Using Fundamental and Sentiment IndicatorsKéthlyn Campos Silva, Felipe Sá, Deborah S. A. Fernandes, Marcio G. C. Fernandes, Fabrízzio Soares. 1879-1884 [doi]
- Superiority of RMT Filtered Data-Driven Covariance Matrix for Portfolio Optimization and Resilient NetworksAvanthi Saumyamala, Sulalitha Bowala, Aerambamoorthy Thavaneswaran, You Liang, Alex Paseka, Ruppa K. Thulasiram. 1885-1890 [doi]
- Automating Business Intelligence Requirements with Generative AI and Semantic SearchNimrod Busany, Ethan Hadar, Hananel Hadad, Gil Rosenblum, Zofia Maszlanka, Okhaide Akhigbe, Daniel Amyot. 1891-1898 [doi]
- A Vision on Sentiment Analysis and other AI Applications on Investments Portfolio OptimizationGuilherme M. Vital, Deborah S. A. Fernandes, Marcio G. C. Fernandes, Fabrízzio Soares. 1899-1904 [doi]
- Towards AI Analyst: Querying Costly Features for Fraud and Money Laundering DetectionMichaela Masková, Václav Smídl. 1905-1910 [doi]
- Real Estate Fund Forecasting: Insights from Machine Learning and Time Series ModelsHenrique P. B. Diniz, Fabrício A. Silva, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz Aylon. 1911-1916 [doi]
- Hybrid LSTM/GRU and Support Vector Regression Models for Stock Index PredictionJoy Dip Das, Ruppa K. Thulasiram, Sulalitha Bowala, Avanthi Saumyamala, Aerambamoorthy Thavaneswaran. 1917-1922 [doi]
- Trustworthiness Features of Commercially Available Mobile Health (mHealth) ApplicationsJoan Tejera, Swapna S. Gokhale, Elizabeth S. Gromisch. 1928-1933 [doi]
- Heart Attack Risk Prediction Using Spiking Neural Networks with Poisson-Based Temporal EncodingAmina Al-Marzouqi, Syed Azizur Rahman, Said A. Salloum, Nabeel Al-Yateem. 1934-1937 [doi]
- An AI-IoT Framework for Handwritten and Multilingual Prescription Interpretation with Timely Medication Reminder SupportAbrar Zuhaer Tariq, Faisal Ahmed, Azad Khandoker, Mahfujur Rahman. 1938-1943 [doi]
- Statistical Analysis of Food, Exercise, and HbA1c in Non-DiabeticsSumaiya Farzana Mishu, Maliha Zaman Nijhum, A. B. M. Kamrul Riad, Md Arabin Talukdar, Hossain Shahriar. 1944-1949 [doi]
- Federated Learning in Healthcare: Improving Patient Outcomes and Securing Sensitive Health DataAlaa Salah Mushtaha. 1950-1957 [doi]
- eHealth Mobile Specialist Practice Enabled by Open RAN in Remote Regions of BrazilFrancisco Raimundo Albuquerque Parente, Daniel Alexi Braga Fonseca, Sergio Massami Sakai, Edson Jose Bonon, Flavia Martinho Ferreira Rocha, Rafael Tamborim Zansavio, Rodrigo Kenji Yaly Aoki, Fuad Mousse Abinader Junior, Eduardo Melão. 1958-1963 [doi]
- Tele-ICU Nursing in Saudi Arabia: Challenges and OpportunitiesAhmed Rajeh Saifan, Saymaa Bassam Yousef AlAkash, Hekmat Yousef Al-Akash, Muhammad Arsyad Subu, Nabeel Al-Yateem, Fatma Refaat Ahmed. 1964-1967 [doi]
- Exploring knowledge and awareness of Artificial Intelligence among students in the College of Health SciencesAl Ounoud Al Marzouqi, Fatma Refaat Ahmed, Syed Aziz Ur Rehman, Richard Mottershead, Heba Hesham Hijazi, Wegdan Bani-Issa, Alfan Alketbi, Fatma Hegazy, Ramsha Asghar Kamal, Lara Badwan Hajeer, Shadin Abunahleh. 1968-1973 [doi]
- Technology Utilization in Nursing Care Plans Documentation Record: A Scoping ReviewMuhammad Arsyad Subu, Richard Mottershead, Anggun Janu Harmaji, Fatma Refaat Ahmed, Fitria Handayani, Jacqueline Maria Dias, Syamsulhuda Budi Musthofa, Mini Sara Abraham, Syed Azizur Rahman, Nabeel Al-Yateem, Janisha Kavumpurath. 1974-1979 [doi]
- Digital Disruption: Investigating the Effects of Nighttime Technology Use on Researchers' Sleep Quality and Psychological WellbeingFatma Refaat Ahmed, Nabeel Al-Yateem, Sahel Mohammad Hajian, Meera Essam, Noura Mohamad, Alounoud Almarzooqi, Heba Khalil, Muhammad Arsyad Subu, Jacqueline Maria Dias, Mini Sara Abraham, Mohannad AbuRuz, Heba Mustafa, Ahmed Rajeh Saifan. 1980-1983 [doi]
- Towards a Voice-Adaptive LLM-Based Conversation Bot for Enhanced User InteractionAmir Eskandari, Tahosina Monir, Farhana H. Zulkernine, Michele Morningstar, Jordan Poppenk, Björn Herrmann. 1984-1989 [doi]
- Visualising Vein Pattern using Conditional Transformer-based GAN for Forensic InvestigationsSumit Chhetri, Hamid Sharifzadeh, Ali Keivanmarz, Soheil Varastehpour. 1990-1995 [doi]
- Forensic Intelligence Graphs: An LLM Approach to Digital Evidence Extraction and Relationship AnalysisHonghe Zhou, Weifeng Xu, Josh Dehlinger, Suranjan Chakraborty, Lin Deng 0001. 1996-2001 [doi]
- Efficient Interactive Cascade Learning for User-Aware Personalization in Edge Activity RecognitionOihane Gómez-Carmona, Diego Casado Mansilla, Diego López-de-Ipiña, Javier García Zubía. 2002-2007 [doi]
- A Framework for Secure Sharing of Medical Images Based on Visual CryptographyChristian Coduri, Stelvio Cimato. 2008-2013 [doi]
- The Impact of Foundational Models on Patient-Centric e-Health SystemsElmira Onagh, Alireza Davoodi, Maleknaz Nayebi. 2014-2019 [doi]
- A Goal-Oriented Chatbot for Engaging the Elderly Through Family Photo ConversationsRaymond Chung, Keith Ng, C. D. Shum. 2020-2025 [doi]
- Automation of Medical Insurance Post-Claims using OCR and RAG ModelsErnestine Lerisha J, Santhosh M. R. S, Perumalraja Rengaraju, Chung-Horng Lung, Yang Cao. 2026-2031 [doi]
- Mitigating Clinician Information Overload: Generative AI for Integrated EHR and RPM Data AnalysisAnkit Shetgaonkar, Dipen Pradhan, Lakshit Arora, Sanjay Surendranath Girija, Aman Raj, Shashank Kapoor. 2032-2039 [doi]
- Privacy-Preserving Federated Learning for Household Characteristic IdentificationErich Malan, Claudia De Vizia, Marco Castangia, Valentino Peluso, Andrea Calimera, Enrico Macii. 2040-2045 [doi]
- Design and Evaluation of Vertical Scalability Strategies for Deploying Large-scale Co-simulationsCarlos Gerardo Valeriano, Abouzar Estebsari, Lorenzo Bottaccioli, Edoardo Patti, Daniele Salvatore Schiera, Luca Barbierato. 2046-2052 [doi]
- Benchmarking Genetic Algorithms for Short-Term Battery Energy Storage Systems OptimizationLorenzo Giannuzzo, Marco Massano, Daniele Salvatore Schiera, Francesco Demetrio Minuto, Davide Papurello, Francesco Meneghetti, Andrea Lanzini. 2053-2059 [doi]
- Solfeggio Training for the Blind: An Approach with Ableton Live SoftwareFabrízzio Soares, Isabela Figueiredo Vaz, Cristiane Bastos Rocha Ferreira. 2060-2065 [doi]
- Breaking the Linear Barrier: A Multi-Modal LLM-Based System for Navigating Complex Web ContentGabriel Moterani, Wenjun Randy Lin. 2066-2075 [doi]
- Machine Translation of Comics with Visual Reconstruction for Linguistic AccessibilityThamer Horbylon Nascimento, Leonardo Silva, Camila Horbylon, Diego Siqueira, Juliana Paula Felix, Renan V. Aranha, Fabrízzio Soares. 2076-2081 [doi]
- Assistive Technologies for Teaching Programming to Visually Impaired Learners: A Systematic ReviewFelipe Honorato Mendes, Giordana de Farias F. B. Bucci, Ana Luísa de Bastos Chagas, Juliana Paula Felix, Fabrízzio Soares. 2082-2087 [doi]
- Prototype Development and Initial Usability Testing of Managing My MS My WayElizabeth S. Gromisch, Alex D. Manasoiu, Lindsay O. Neto, Aaron P. Turner, Dawn M. Ehde, Thomas Agresta, Heather M. DelMastro, Jodie K. Haselkorn, Swapna S. Gokhale. 2088-2093 [doi]
- A Contrastive Learning and Region-Guided Approach for Long Clinical Text ClassificationSirui Lv, JianQiang Li, Yinuo Ouyang, Hongzhi Qi, Yinan Jiang, Qing Zhao. 2094-2099 [doi]
- A Systematic Review of the Applications of Speech Processing Technology in Neurological DiseasesYing Zhang, Xi Xu, Yinuo Ouyang, Linxuan Feng, Zhe Han, Jianqiang Li 0002, Jian Yin 0033, Jijiang Yang. 2100-2105 [doi]
- Analysis and Reconstruction of Laryngectomised Speech using GAN ModelsRaj Patel, Hamid R. Sharifzadeh, Maryam Erfanian, Ian McLoughlin 0001, Jacqueline E. Allen. 2106-2111 [doi]
- AI Agents for Clinical Data Assessment: Enhancing Decision-Making with Human-AI CollaborationJamil Ur Reza, Yasin Mamatjan. 2112-2117 [doi]
- A Multimodal Framework Integrating Clinical Data and Facial Recognition for Enhanced Stroke PredictionImane Lahyouli, Asad Harnekar, Corinne Lagorre, Yasin Mamatjan. 2118-2123 [doi]
- Interpretable Model for Brain Tumor Segmentation and Patient Survival DataSaud Hussain, Faheem Akhtar, Jianqiang Li 0002, Zahid Hussain Khand, Baolin Zhu, Lijun Zhao, Hongzhi Qi. 2124-2129 [doi]
- Infant Care Video Dataset for Classification of Interventions Using TransformersIgor Bogdanov, James Green. 2130-2135 [doi]
- A Practical AI-Based Approach for Optimized Diagnosis of Tuberculosis on Chest X-rayAfonso Ueslei Da Fonseca, Juliana Paula Felix, Emilia Alves Nogueira, Bruno M. Rocha, Gabriel da Silva Vieira, Deborah S. A. Fernandes, Fabrízzio Soares. 2136-2141 [doi]
- A Comparative Study of Data Balancing Techniques for Predicting Metastases in Colorectal Cancer Using the SEER DatabaseÁurea Valéria Pereira Silva, Plínio de Sá Leitão Júnior, Juliana Paula Felix. 2142-2147 [doi]
- Dual-Stream Diabetic Retinopathy Grading via Quality Assessment and Multi-Instance LearningZhongwang Wei, Qing Zhao, Wenxiu Cheng, Xinghao Cao, JianQiang Li, Yo-Ping Huang, Hongzhi Qi. 2148-2153 [doi]
- A Time-constrained Verifiable Architecture-based Self-adaptive Software Programming FrameworkAtsushi Naito, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. 2154-2163 [doi]
- Improving QoS for VM Allocation in Multi-Cloud EnvironmentBodrul Alam, Faria Khandaker, Yuvraj Singh Palh. 2164-2169 [doi]
- Workflow-Driven Modeling for the Compute Continuum: An Optimization Approach to Automated System and Workload SchedulingAasish Kumar Sharma, Christian Boehme, Patrick Gelß, Ramin Yahyapour, Julian M. Kunkel. 2170-2177 [doi]
- An Enhanced Event-Based Dynamic Authentication Protocol Leveraging Arbiter PUF for IoT DevicesRizka Reza Pahlevi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 2178-2183 [doi]
- Impact Evaluation of Attacks on Data Flows in Systems With Heterogeneous Redundant ResourcesKosei Shimoda, Daisuke Kotani, Yasuo Okabe. 2184-2191 [doi]
- Privacy-Aware Traffic Log Anonymization Method for Realizing Both Malicious Activity Detection and PrivacyTakeshi Ogawa, Hajime Shimada, Hirokazu Hasegawa, Yukiko Yamaguchi. 2192-2197 [doi]
- Letter Explorers: Investigating Mobile-Assisted Writing in Preschool EducationKaique Carvalho, Thamer Horbylon Nascimento, Camila Horbylon, Heder Santos, João Primo, Juliana Paula Felix, Marcos Alves Vieira, Fabrízzio Soares. 2198-2203 [doi]
- An Empirical Study of VR Software Quality Based on Developer Forums and ISO/IEC 25010Yijun Lu, Hironori Washizaki, Naoyasu Ubayashi, Nobukazu Yoshioka, Jiong Dong, Yuyin Ma, Jati H. Husen. 2204-2211 [doi]
- Designing Reusable LLM-Enhanced Assignments: A Quality-Oriented Framework for Software Engineering EducationOlga Manakina, Chung-Horng Lung. 2212-2217 [doi]
- Blockchain in the Quantum Era: Surveying Security Challenges and Post-Quantum CryptographyMuhammad Taha Ramzan, Stelvio Cimato. 2218-2223 [doi]
- Offline Attribute Sharing Methods for Authentication Traffic Reduction and Functionality Enhancement of Wireless LAN Roaming SystemsHideaki Goto. 2224-2229 [doi]
- Can You Keep Calm?: Adaptive Gameplay using Heart Rate as a ControllerMd Mosharaf Hossan, Rifat Ara Tasnim, Farjana Z. Eishita. 2230-2236 [doi]
- Message-Passing Based Communication via Asynchronous Execution (Shunts)Nayef H. Alshammari. 2237-2244 [doi]
- Automatic Contrail Detection Using Integrated Satellite Observation, Meteorological Indicators, and Air Traffic Data in the United KingdomFathurrahman Yahyasatrio, Tamer Elboghdadly, Shikun Zhou, Nasreen Anjum. 2245-2249 [doi]
- An analysis of test case coverage balancing for fault localizationReinaldo De Souza Júnior, Plinio Sa Leitao-Junior, Thamer Horbylon Nascimento. 2250-2255 [doi]
- Exploring the Black-Box: Testing Image Synthesis Systems through Metamorphic ExplorationYihan Zhang, Zhihao Ying, Yifan Zhang, Qian Zhang, Dave Towey. 2256-2261 [doi]
- Testing Intent-Based Test Case Prioritization and Selection using Derived AttributesRajith Anjali, Soki Sakurai. 2262-2268 [doi]
- Network Identity Management: Application, Action and Device Aware MonitoringCenab Batu Bora, Julia Silva Weber, Nur Zincir-Heywood. 2269-2274 [doi]
- Data Atomization: A Framework for On-Demand Association and Access Control of Sensitive DataLeelanga Seneviratne, Asara Senaratne. 2275-2280 [doi]
- Explainable Artificial Intelligence Techniques for Software Development Lifecycle: A Phase-specific SurveyLakshit Arora, Sanjay Surendranath Girija, Shashank Kapoor, Aman Raj, Dipen Pradhan, Ankit Shetgaonkar. 2281-2288 [doi]
- Designs for Reducing Data Breach ImpactGeorge O. M. Yee. 2289-2294 [doi]
- KASTroid: A Static Taint Analysis Framework for Kotlin-Based Android ApplicationsBara' Nazzal, Manar H. Alalfi, James R. Cordy. 2295-2300 [doi]
- A Data-Driven Approach Using Hardware Performance Counters to Detect Micro-Architectural AttacksJaya Keshava Chandra Kotha, Jean-Luc Gaudiot. 2301-2306 [doi]
- Is Your PIN Safe Against Advanced Human-Centric Shoulder Surfing?Nilesh Chakraborty, Mohammad Zulkernine. 2307-2312 [doi]
- Facilitating the Merging Process of Pull Requests in Automated-Testing Robot FrameworkZhen-Yang Guo, Shuo-Han Chen, Andrew Garland, Wei-Hao Chen, Yu-Pei Liang, Chuan-Ming Liu. 2313-2318 [doi]
- Novel Color Coded MITRE ATT&CK Inspired Attack Tree Modeling: Application in ICSsNatalija Vlajic, Melina Najimi, Milos Stojadinovic. 2319-2326 [doi]
- Three Quarters of a Century of Computing, and I was ThereSorel Reisman. 2327-2336 [doi]
- The Good, the Bad, and the Potential of AI-based Systems in Computing EducationAdrian Heffelman, Wilson Zuber, Mitrasree Deb, Aishwarya Manjunath, Hanze Aggabao, Hamza Magsi, Maya Galley, Mirza Tairin, Moushumi Sharmin. 2337-2343 [doi]
- Digital Health Using Data SciencePadmapriya Velupillai Meikandan, Paramita Basak Upama, Amity Ali, Masud Rabbani, Sheikh Iqbal Ahamed. 2344-2351 [doi]
- Metaverse-enabled Learning Using a 6C Model-based FrameworkPing Him Lam, Francis Cheung, Henry C. B. Chan, Minjuan Wang. 2352-2359 [doi]
- The Technology Megatrends Predictions Retrospective and OutlookDejan S. Milojicic, Phil Laplante. 2360-2369 [doi]
- Serious game for higher Mathematics education: evaluation of the learning toolAlice Barana, Alberto Conte, Valeria Fradiante, Marina Marchisio Conte, Sergio Rabellino. 2370-2379 [doi]
- Virtual Production: Global Collaboration and ChallengesJuin Yang Lam, Changyu Li, Dave Towey, Lynne Chen, Levi Dean, Filippo Gilardi, Omar Zahran, Jianing Wang, Ke Liu, Chenyu Yan. 2380-2386 [doi]
- White-box Fuzzing in the Wild: A Chaos Engineering Module for DevOps Security EducationMd. Mostafizur Rahman, Md Bajlur Rashid, Abdul Barek, ABM Kamrul Islam Riad, Md. Abdur Rahman 0003, Hossain Shahriar, Akond Rahman, Fan Wu 0013, Guillermo Francia III, Md. Jobair Hossain Faruk, Sharaban Tahora. 2387-2393 [doi]
- Specialized Training in LCNC and AI: from the Pedagogical Concept to the ExperienceSean O'Brien, Colm Brandon, Daniel Busch, Marco Krumrey, Daniel Sami Mitwalli, Amandeep Singh, Sebastian Teumert, Tiziana Margaria. 2394-2403 [doi]
- FLORA: Federated Learning for Optimized Resource Allocation in Cinco de BioColm Brandon, Mashal Khan, Tiziana Margaria. 2404-2405 [doi]
- Spatio-temporal Explanation for Adversarial-Aware Cloud Vision AI ServicesZerui Wang, Yan Liu 0001. 2406-2407 [doi]
- Improving Energy Efficiency of Irregular Workloads with Transformers and Tabular Data DiffusionMohammad Ali, Zarif Sadman, Apan Qasem. 2408-2409 [doi]
- Clustering Effect on Cancer Molecular Subtype ClassificationMehwish Wahid Khan, Muhammad Shahzad, Iqra Akram, Ghufran Ahmed, Shahid Hussain 0001, Muhammad Abdul Basit Ur Rahim. 2410-2414 [doi]