Abstract is missing.
- Characterization of Execution Time Variability in FPGA-Based AI-AcceleratorsMaximilian Kirschner, Federico Nicolás Peccia, Felix Thömmes, Victor Pazmino Betancourt, Oliver Bringmann 0001, Jürgen Becker 0001. 1-8 [doi]
- On the Viability of Federated Deep Autoencoder for Botnet Threat DetectionBelsabel Teklemariam, Saron Bokretsion, Safa Otoum, Bassem Ouni. 1-6 [doi]
- Adaptive Hierarchy Based Non-Cooperative Satellite Network Topology DetectionYujin Xiao, Yongli Zhao, Yinji Jing. 1-6 [doi]
- Message from the Executive General ChairMoayad Aloqaily. 1 [doi]
- Online Demand Peak Shaving with Machine-Learned Advice in Cyber-Physical Energy SystemsMinxi Fengl, Wei Li 0058, Boyu Qin, Albert Y. Zomaya. 1-8 [doi]
- Differential Privacy Protection Based on Federated Learning in Mobile CrowdsensingQi Liu, Yingjie Wang, Weitao Zhao, Xuqiang Qiu. 1-6 [doi]
- Optimal Task Offloading in Edge Cloud EnvironmentTao Huang, Fengmei Chen, Guohua Ji, Feng Jiao, Wei Jing, Zhidan Yuan. 7-13 [doi]
- Information-Centric Networking (ICN) Based Disaster Recovery and Business Continuity (DRBC) of BangladeshKawser A. Mazumder, Eslam G. AbdAllah. 14-19 [doi]
- FOCUS: Fatigue-Reducing IOCs Through Prioritization and ScoringVinay Sachidananda, Bryson Teo, Ruitao Feng, Kwok-Yan Lam, Yang Li. 20-27 [doi]
- Combining Reverse Temporal Attention Mechanism and Dynamic Similarity Analysis for Disease PredictionXiaowen Zhang, Yuxia Lei, Guangshun Li, Shi Wang, Huifeng Li. 28-35 [doi]
- Occupancy Prediction in Multi-Occupant IoT Environments Leveraging Federated LearningIrfanullah Khan, Flávia Coimbra Delicato, Emilio Greco, Massimo Guarascio 0001, Antonio Guerrieri, Giandomenico Spezzano. 36-43 [doi]
- Learning-Driven Zero Trust in Distributed Computing Continuum SystemsIlir Murturi, Praveen Kumar Donta, Victor Casamayor-Pujol, Andrea Morichetta 0002, Schahram Dustdar. 44-49 [doi]
- An Improved Deep Learning-Based Approach to Urban Weather Radar Echo ExtrapolationJiawei Sun, ZhiYun Yang, Qi Liu, Yonghong Zhang, Xiaodong Liu 0002. 50-55 [doi]
- Smart Home Integration and Data Sharing with ActivityPub and UPODTao Zhou, Yunhao Ni, Xinzhe Gao, Hong Chen. 56-62 [doi]
- Analysis and Prediction of Drivers' Braking Behavior with Different Experience at Right-Angled TurnsJian Wang, Yishui Zhu, Abdelhamid Hadili, Ruxia Tian, Luyang Wang. 63-68 [doi]
- Experimental Evaluation and Expansion Suggestion of Digital Signatures Available on OP-TEEEwerton R. Andrade, Cristiano Coimbra Goes, João Bezerra Da R. Neto, César Augusto De S. Pastorini, Janislley Oliveira de Sousa. 69-76 [doi]
- Determining Important Features in Multidimensional Health Data for Individualized Precision HealthcareRuichen Cong, Jianlun Wu, Shoji Nishimura, Atsushi Ogihara, Qun Jin. 77-83 [doi]
- Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital ForensicsAfnan Asasfeh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Wathiq Mansoor, Taher M. Ghazal. 84-88 [doi]
- Research on Sustainable Design Evaluation of Smart Education Based on the Internet of ThingsZehang Li, Zijn Qiao, Haochuan Tian, Bowen Sun, Shuaiqi Meng. 89-94 [doi]
- A High Capacity Combined Carrier Steganography Without Embedding ImageYangwen Zhang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Maolin Xiong. 95-100 [doi]
- Immersive Cybersecurity Teaching/Training Using Gamification on the Metaverse: A Hands-On Case StudyJamal N. Al-Karaki, Awni Itradat, Selam Mekonen. 101-108 [doi]
- Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber SecurityQian Liu, Xiaobei Dong, Zhixiong Chen, Ximeng Liu, Li Xu. 109-115 [doi]
- An Autonomic Architecture for Multi-Agent Self-Maintaining Robotic SystemsK. Dillon Lewis, Christopher Rouff, Ali Tekeoglu. 116-122 [doi]
- Research on Influence Maximization Algorithm Based on Temporal Social NetworkJiangjing Wang, Hui Fang, ShengQing Li, Jiulei Jiang. 123-129 [doi]
- Genetic Optimization Techniques for Enhancing Web Attacks Classification in Machine LearningAmeera S. Jaradat, Ahmad Nasayreh, Qais Al-Na'amneh, Hasan Gharaibeh, Rabia Emhamed Al Mamlook. 130-136 [doi]
- Unveiling Uncertainty: Supporting Learners Through NLP-Driven Confusion IdentificationGaganpreet Jhajj, M. Ali Akber Dewan, Fuhua Lin. 137-142 [doi]
- Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid SystemLei Xiong, Qichao Xu, Dongfeng Fang, Hui Zeng. 143-148 [doi]
- Infant Vomit Detection Using ShuffleNetV2Chuan-Yu Chang, Xin-hui Lin, Hui-Huang Hsu. 149-154 [doi]
- A Comparative Analysis of Image Steganography Techniques in Spatial and Transform DomainsDina Shehada, Ahmed Bouridane. 155-160 [doi]
- Template Matching Based Cash Register for Disabled WorkersMichael Sarpong, Cristian Simoni, Brandon Samaroo, Camilo Rodriguez 0003, Daniel Samaniego, Wafa Elmannai, Yi Wang 0030. 161-167 [doi]
- An Edge AI Study for Human Action Recognition on Industry 4.0 Using Weightless Neural NetworksLuiz Felipe Ribeiro Correia, Claudio Miceli de Farias, Flávia Coimbra Delicato. 168-174 [doi]
- Towards Scalable Process Mining PipelinesBelal Mohamed, Mohamed ElHelw, Ahmed Awad 0001. 175-182 [doi]
- Uninstall, Noob! Views on Rampant Toxicity in Online GamingHeba Saleous, Marton Gergely. 183-190 [doi]
- Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint ModificationZhihao Dai, Ligang He, Shuang-Hua Yang, Matthew Leeke. 191-199 [doi]
- Adversarial Patch Attacks Against Aerial Imagery Object Detectors Based on Interpretable GuidanceFengyi Liu, Zhichao Lian. 200-207 [doi]
- A Design of Smart Glasses-Based Gesture Recognition and Translation System for Sign LanguagesChu Zhang, Kiminori Sato, Bo Wu 0007. 208-213 [doi]
- Evaluation on Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple PathsJunichi Funasaka, Noriaki Hiraoka. 214-219 [doi]
- A Novel Fast Video Fragment Matching Algorithm for Copyright ProtectionYan Chen, Zhongliao Yang, Chen Dong 0002, Hui Lin, Zhenyi Chen. 220-227 [doi]
- A Lightweight Encryption Method For Privacy-Preserving in Process MiningMohsen Kazemian, Markus Helfert. 228-233 [doi]
- Traffic Matrix Prediction Based on Cross Aggregate GNNJing Tao, Ken Cao, Teng Liu. 234-239 [doi]
- Deep Reinforcement Learning-Based On-Off Analog Beamforming Coordination for Downlink MISO NetworksHang Zhou, Xiaoyan Wang 0003, Masahiro Umehira, Yusheng Ji. 240-245 [doi]
- A Deep Learning Solution for Arabic Words Sign Language Recognition in the Context of SentencesTamer Shanableh. 246-251 [doi]
- LiDAR-based Building Damage Detection in Edge-Cloud ContinuumSambit Kumar Mishra, Mohana Lasya Sanisetty, Apsareena Zulekha Shaik, Sai Likitha Thotakura, Sai Likhita Aluru, Deepak Puthal. 252-257 [doi]
- Twinflie: A Digital Twin UAV Orchestrator and SimulatorFrancesco Cristoforo Conti, Corrado Santoro, Federico Fausto Santoro. 258-263 [doi]
- Safeguarding Devices and Edge Computing: A Responsive Anti-Scam ApproachChalee Vorakulpipat, Montida Pattaranantakul, Soontorn Sirapaisan, Soontaree Songserm. 264-268 [doi]
- An Edge-Cloud Infrastructure for Weed Detection in Precision AgricultureAshish Kaushal, Osama Almurshed, Areej Alabbas, Nitin Auluck, Omer F. Rana. 269-276 [doi]
- Joint Task Decomposition and Allocation in Tactile Internet FiWi Enhanced Mobile NetworksAmin Ebrahimzadeh, Martin Maier 0001, Roch H. Glitho. 277-283 [doi]
- Resilience of Industrial Control Systems Using Signal Temporal Logic And Autotuning MechanismChidi Agbo, Hoda Mehrpouyan. 284-293 [doi]
- Edge Based Skin Cancer Decision Support System Using Machine Learning AlgorithmsAnum Nawaz, Muhammad Irfan 0008, Hafza Ayesha Siddiqa, Tomi Westerlund. 292-297 [doi]
- VM Migration Support for Secure Out-of-Band VNC with Shadow DevicesTomoya Unoki, Kenichi Kourai. 298-305 [doi]
- A Study on the Structure of a Local and Causal Framework Underlying the Fundamental Equation of Online User DynamicsYuya Sugai, Chisa Takano, Masaki Aida. 306-311 [doi]
- Enhancing Trust and Reliability in AI and ML: Assessing Blockchain's Potential to Ensure Data Integrity and SecurityAiasha Siddika, Liang Zhao. 312-316 [doi]
- Adversarial Machine Learning Architecture in AI-Driven Power SystemsDowens Nicolas, Henry Figueroa, Yi Wang 0030, Wafa Elmannai, George C. Giakos. 317-322 [doi]
- Data Analytics for Dependable Transportation Systems in a Smart CityNhu Minh Ngoc Pham, Yixi Wu, Carson K. Leung, Mohammadafaz V. Munshi, Vrushil Kiritkumar Patel. 323-332 [doi]
- Secure and Energy-Efficient ECG Signal Monitoring in the IoT Healthcare using Compressive SensingBharat Lal, Miguel Heredia Conde, Pasquale Corsonello, Raffaele Gravina. 333-339 [doi]
- A Hypergraph Framework Based on Neighborhood and Category Association Relationships for Session-Based RecommendationDengfeng Liu, Yitong Wang, Fei Cai. 340-347 [doi]
- Spectrum Sharing and Consensus Performance of Vehicular Networks based on Deep Multi-User Reinforcement LearningMuhammad Muzamil Aslam, Ali Tufail, Zahoor Ahmed, Kassim Kalinaki, Muhammad Nasir, Rosyzie Anna Awg Haji Mohd Apong. 348-354 [doi]
- A Novel Feature Vector for AI-Assisted Windows Malware DetectionLe Qi Yau, Yik Ting Lam, Ashwin Lokesh, Prannaya Gupta, Justin Lim, Ishneet Sukhvinder Singh, Jia Yi Loo, Mao V. Ngo, Sin G. Teo, Tram Truong Huu. 355-361 [doi]
- Privacy-Preserving Trainer Recruitment in Model Marketplace of Federated LearningYanghe Pan, Zhou Su, Yuntao Wang 0004. 362-366 [doi]
- IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent HealthcareYinan Yao, Decheng Qiu, Bolun Li, Chen Dong 0002, Li Xu, Xiaodong Guo, Changping Lai. 367-374 [doi]
- EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge ComputingJaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif. 375-382 [doi]
- Research on the Interface Design of a Situational Awareness-Based Spinal Endoscopic Surgery RobotYirui Wang 0009, Jinyun Cao, Yixuan Wang, Yawei Hao, Jianming Yang, Saisai Li, Jiayi Tan, Bowen Sun. 383-388 [doi]
- CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable BlockchainLinlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo, Yuling Chen. 389-394 [doi]
- IoT Data Confidentiality Self-ManagementAbdelhamid Garah, Nader Mbarek, Sergey Kirgizov. 395-400 [doi]
- Perturbation Theory of Online User Dynamics with Respect to Change in Social Network StructuresYu Usui, Kazuki Nakajima, Chisa Takano, Masaki Aida. 401-407 [doi]
- Review of Fundamental, Security, and Privacy in MetaverseNadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Fatma Taher, Taher M. Ghazal. 408-414 [doi]
- Communication-Efficient Federated Learning with Sparsity and QuantizationZhong Long, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yancheng Sun. 415-421 [doi]
- Mobile Technology as a Catalyst for Enhancing EFL Speaking Skills in Social Language Learning ContextsRustam Shadiev, Mirzaali Fayziev, Gulmira Abildinova, Jiawen Liu, Fahriye Altinay, Roza Zhussupova, Nurassyl Kerimbayev, Aynur Jumadillaeva, Elena Gaevskaia, Narzikul Shadiev. 422-427 [doi]
- Automatic Medical Report Generation via Latent Space Conditioning and TransformersCarlo Adornetto, Antonella Guzzo, Andrea Vasile. 428-435 [doi]
- Traffic Flow Prediction Based on Dynamic Graph Feature LearningJiwei Pan, Benxiong Huang, Lai Tu. 436-443 [doi]
- ML-Based Dynamic Scaling and Traffic Forecasting for 5G O-RANKhalid Ali, Manar Jammal. 444-451 [doi]
- MSflood: A Multi-Sources Segmentation For Remote Sensing Flood ImagesMarwa Chendeb El Rai, Muna Darweesh, Aicha Bea Far. 452-455 [doi]
- A Secure and Scalable Peer-to-Peer Federated Learning Approach for Handling Veracity in Big DataMaria Iqbal, Asadullah Tariq, Mohamed Adel Serhani. 456-462 [doi]
- Recommendation Algorithm Based on Social Information and Global Average Matrix DecompositionWanliang Wang, Jiulei Jiang, ShengQing Li. 463-470 [doi]
- Intrusion Detection System for IoT Based on Complex Networks and Machine LearningMortada Termos, Zakariya Ghalmane, Mohamed-el-Amine Brahmia, Ahmad Fadlallah, Ali Jaber, Mourad Zghal. 471-477 [doi]
- Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support SystemsAleksandra Ursula Charlotte Hamel, Bogdan-Cristian Zarcu, András-Gergely Csenteri, Tamara Pfliegler, Sajjad Khan, Davor Svetinovic. 478-485 [doi]
- A Hierarchical Detection Method for Steady State Peripheral Visual Evoked PotentialXi Zhao, Ting Zhou, Celimuge Wu, Tianheng Xu, Zhenyu Wang, Honglin Hu. 486-491 [doi]
- A Multiple Indicator Credit Ranking Scheme Based on Notary MechanismLang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Pengyu Chen. 492-498 [doi]
- Wearable Sensors Based Human Core Body Temperature Computing MethodLinbo Jiang, Yinuo Wang, Ye Li, Bo Tao, Fangmin Sun, John Speakman. 499-504 [doi]
- Assessing the Importance of Key Terms in UN SDGs Through Citizens LabsEmily Kouzaridi, Harris Partaourides, Nicolas Tsapatsoulis, Constantinos Djouvas. 505-511 [doi]
- Enhancing Quality of Experience by Monitoring End-User Streaming BehaviorReza Shokri Kalan. 511-514 [doi]
- New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber SecurityQian Liu, Yan Chen, Zhixiong Chen, Ximeng Liu, Hui Lin. 515-522 [doi]
- Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing ArchitectureHong Hanh Doan, Audri Adhyas Paul, Harald Zeindlinger, Yiheng Zhang, Sajjad Khan, Davor Svetinovic. 523-530 [doi]
- Federated Learning for Medical Images Analysis: A Meta SurveyAsaf Raza, Antonella Guzzo, Giancarlo Fortino. 531-536 [doi]
- Design of Household Robotic Arm System to sort Recyclable Resources based on Deep LearningYuning Guo, Hiroyuki Kameda, Bo Wu 0007. 537-542 [doi]
- Adversarial Attack Method Based on Dual- frequency Domain TransformationMaolin Xiong, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang. 543-548 [doi]
- Hybrid Multi-Strategy Improvements for The Aquila OptimizerYinzhao Zhang, Wei Sun, Jun Hou 0002, Qianmu Li. 549-556 [doi]
- Robust Object Detection Based on a Comparative Learning PerspectiveHao Yang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang. 557-563 [doi]
- Commodity Personalized Recommendation Algorithm Based on the Knowledge GraphKai Yuan Yang, Jun Yang, Zhi-Xin Sun. 564-569 [doi]
- Beyond Traditional Simulators: Adopting Videogames for Autonomous Vehicle TestingAbderrahmane Maaradji, Naila Bouchemal, Idir Smadhi, Ahmed Bouhraoua, Amayas Ghanine. 570-575 [doi]
- Heterogeneous Induction Motor Current Dataset Fusion for Efficient Generalised MCSA-Based Fault ClassificationAyman Elhalwagy, Tatiana Kalganova. 576-581 [doi]
- A Blockchain of Blockchains Structure Based on Asset Trading SchemeSiyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Yuxiang Yang. 582-588 [doi]
- A Space-Saving Based MLCS AlgorithmBotian Jiang, Chunyang Wang, Yuanyuan Fu, Hai-lin Liu, Ping Guo, Yuping Wang. 589-594 [doi]
- Fully Decentralized Client Selection for Energy-Efficient Federated LearningElia Guerra, Marco Miozzo, Paolo Dini. 595-601 [doi]
- Towards Smart Education in the Industry 5.0 Era: A Mini Review on the Application of Federated LearningSweta Bhattacharya, Pratik S. Vyas, Supriya Yarradoddi, Bhulakshmi Dasari, Sumathy S, Rajesh Kaluri, Srinivas Koppu, David J. Brown 0001, Mufti Mahmud, Thippa Reddy Gadekallu. 602-608 [doi]
- Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical ThingsMohammed M. Alani, Atefeh Mashatan, Ali Miri. 609-614 [doi]
- A Novel Feature Extraction Technique for ECG Arrhythmia Classification Using MLMohammad Mominur Rahman, Ashhadul Islam, Skander Charni, Halima Bensmail, Thomas Hilbel, Samir Brahim Belhaouari. 615-621 [doi]
- Absolute Positioning Method Based on Tunnel Wall Image Similarity MatchingJun Guo, Xiao Yang, Jie Lan, LiGuo Tong, Wei Jiang. 622-627 [doi]
- Towards Cybersecurity Risk Assessment Automation: an Ontological ApproachNicolò Maunero, Fabio De Rosa, Paolo Prinetto. 628-635 [doi]
- Energy Aware Federated Learning with Application of Activity RecognitionDipanwita Thakur, Antonella Guzzo, Giancarlo Fortino. 636-642 [doi]
- Fault-Tolerant Data Aggregation with Error-Checking for Smart GridsCongcong Wang, Chen Wang, Jian Shen 0001, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan. 643-650 [doi]
- Graph Neural Networks in Emergency Management: A Case Study on Fire Call AssignmentStefano Izzo, Marzia Canzaniello, Martina Savoia, Fabio Giampaolo, Francesco Piccialli. 651-658 [doi]
- Dual Watermarking Based on DCT with Human Visual Characteristics for Authentication and Copyright ProtectionFerda Ernawan, Wong Shu Jie, Suraya Abu Bakar. 659-664 [doi]
- Deep Learning for Network Traffic Prediction: An OverviewMengyi Fu, Pan Wang, Zixuan Wang, Zeyi Li. 665-671 [doi]
- Software-Defined Intrusion Detection System for DDoS Attacks in IoT Edge NetworksBurcu Bolat-Akça, Elif Bozkaya. 672-677 [doi]
- Blockchain-Enabled SAGIN Communication for Disaster Prediction and ManagementTagnon Privael Okoumassoun, Ismaeel Al Ridhawi, Ali Abbas, Ibrahim Al-Oqily. 678-683 [doi]
- Phishing Detection Using Deep Learning and Machine Learning Algorithms: Comparative AnalysisBetiel Tesfom, Feven Belay, Snit Daniel, Reem Salem, Safa Otoum. 684-689 [doi]
- User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUNBeáta Stingelová, Clemens Thaddäus Thrakl, Laura Wronska, Sandra Jedrej-Szymankiewicz, Sajjad Khan, Davor Svetinovic. 690-697 [doi]
- A Multi-Channel Composite Recommendation Method in Federated LearningShi Chen, Qianmu Li, Qi Wang, Xinjian Zhao, Hao Ge, Nianzhe Li. 698-705 [doi]
- Analyzing the Effects of Driving Experience on Backing Maneuvers Based on Data Collected by Eye-Tracking DevicesQirun Wang, Kiminori Sato, Bo Wu 0007. 706-710 [doi]
- Enhancing Security in 6G Vehicular Networks: Leveraging VLC and MMW Integration and Cooperative Relaying TechniqueSelma Yahia, Valeria Loscrì, Prakriti Saxena. 711-716 [doi]
- Cybersecurity Challenges of Multi-Domain Traffic Management and Aerospace Cyber-Physical SystemsKathiravan Thangavel, Alessandro Gardi, Roberto Sabatini. 717-721 [doi]
- Proactive Caching with DRL in Cloud-Edge Assisted Cyber-Physical-Social SystemsYue Hu, Ning Cao 0003, Yinqiu Liu, Xiaoming He. 722-729 [doi]
- Federated Learning Based Satellite-Marine Integrated Training for Marine Edge IntelligenceJierui Jin, Jie Zhang 0053, Xiaolong Xu 0001, Ke Meng, Xiaokang Zhou, Lianyong Qi, Xuyun Zhang, Wanchun Dou. 730-737 [doi]
- A Privacy Preserving Service-Oriented Approach for Data Anonymization Through Deep LearningFabio Giampaolo, Stefano Izzo, Edoardo Prezioso, Diletta Chiaro, Salvatore Cuomo, Valerio Bellandi, Francesco Piccialli. 738-746 [doi]
- A High-Level Information Fusion Framework Using Indirect Sensing for Internet of Bio-Nano ThingsClaudio M. de Farias, Felipe M. De Farias, Flávia Coimbra Delicato. 747-750 [doi]
- Adaptive Sequence Learning: Contextual Multi-armed Bandit ApproachDanny Nguyen, Leo Howard, Hongxin Yan, Fuhua Lin. 751-756 [doi]
- Simulated Model for Preventing IoT Fake Clients over the Smart Cities EnvironmentMahmoud AlJamal, Ala Mughaid, Rabee Alqura'n, Muder Almiani, Shadi AlZu'bi. 757-761 [doi]
- Handling Non-IID Data in Federated Learning: An Experimental Evaluation Towards Unified MetricsMarc Haller, Christian Lenz, Robin Nachtigall, Feras M. Awaysheh, Sadi Alawadi. 762-770 [doi]
- Photoplethysmography-Based Emotion Recognition in Response to High Dynamic Range VideosMajid Riaz, Raffaele Gravina. 771-778 [doi]
- Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart ContractsUsman Tahir, Fiza Siyal, Michele Ianni, Antonella Guzzo, Giancarlo Fortino. 779-783 [doi]
- Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat AnalysisMarija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic. 784-791 [doi]
- Multi-Horizon Visitor Forecasting for a Shopping Mall with Limited Historical Data Under Covid -19 PandemicTakashi Michikata, Shunya Taniguchi, Toma Ishii, Chisaki Hori, Lifeng Lin, Hangli Ge, Noboru Koshizuka. 792-798 [doi]
- BGFormer: Deep Bayersian Gabor Filtering Guided Transformer for Medical Image DenoisingYue He, Rui Zhang, Zhichao Jiang, Hu Zhu. 799-805 [doi]
- Python Open-Source Code Traceability Model Based on Graph Neural NetworksRuizhi Wang, Yanping Xu, Yifan Wu. 806-813 [doi]
- Cybersecurity Risks and Threats in Avionics and Autonomous SystemsYibing Xie, Alessandro Gardi, Roberto Sabatini. 814-819 [doi]
- Consensus and Phase Synchronization of Multi-agent Systems using Adaptive ModelsMuhammad Majid Gulzar, Muhammad Munaward, Adnan Shakoor, Huma Tahreem. 820-824 [doi]
- Design and Implementation of a UPOD for Decentralized IoT Data Platform Based on the ActivityPub ProtocolYunhao Ni, Tao Zhou, Xinzhe Gao, Hong Chen. 825-830 [doi]
- Text Summarization Generation Based on Improved Transformer ModelJingsong Lin, Xiaodong Guo, Chen Dong 0002, Chenxi Lyu, Li Xu, Zhenyi Chen. 831-836 [doi]
- On the Identification of Influential Topics in the Social Sciences Using Citation AnalysisHarris Partaourides, Emily Kouzaridi, Nicolas Tsapatsoulis, Constantinos Djouvas. 845-851 [doi]
- Feature Selection on Anonymized DatasetsMina Alishahi, Vahideh Moghtadaiee. 852-859 [doi]
- Black-box Speech Adversarial Attack with Genetic Algorithm and Generic Attack IdeasYu Jiang, Luopu Liang, Qianmu Li. 860-867 [doi]
- Fault Detection and Mitigation in Vehicle PlatooningNajeebuddin Ahmed, Hassan Naser, Amir Ameli. 868-873 [doi]
- AE-TGN: Attribute-Empowered Temporal Graph Networks for Dynamic Graph Link PredictionChonghao Chen, Aimin Luo, Yang Huang. 874-877 [doi]
- Monitoring Application Behaviours to Detect Android MalwareAman Pratap Singh, Rohit Negi, Anand Handa, Sandeep K. Shukla. 878-885 [doi]
- Shapley Value-Based Node Assessment in Unreliable Complex Networks: Initial Research ProgressWenxi Cai, Tatsuhiro Tsuchiya. 886-890 [doi]
- Efficient Scheduling for Multi-Job Federated Learning Systems with Client SharingBoqian Fu, Fahao Chen, Peng Li 0017, Zhou Su. 891-898 [doi]
- Stabilizing Technology for Online User Dynamics by Controlling One-Way Weights of LinksChisa Takano, Hiroyasu Obata, Masaki Aida. 899-904 [doi]
- Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML TechniquesCarmelo Felicetti, Antonino Rullo, Domenico Saccà. 905-910 [doi]
- DDoS Attack Forecasting Using TransformersZain Ahmed Alrahmani, Khaled Elleithy. 911-915 [doi]
- Deep Learning-Based Detection of CSRF Vulnerabilities in Web ApplicationsGiuseppe Beltrano, Claudia Greco, Michele Ianni, Giancarlo Fortino. 916-920 [doi]
- A Real-Time Load Forecasting Approach Based on Graph Convolution Neural Network in a Distributed IoT Energy SystemLi Pan, Jixiang Gan, Qi Liu, Yonghong Zhang, Xiaodong Liu 0002. 921-926 [doi]
- A Prediction Model of Drug-Drug Interactions Based on Graph Neural Networks and Subgraph Attention MechanismsLang Wang, Jiulei Jiang, ShengQing Li. 927-933 [doi]
- A Medical Image Fusion Method Based on Detail Enhancement DecompositionRui Zhang, Yue He, Lina Dai, Hu Zhu. 934-941 [doi]
- Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5Yaojie Ke, Yinan Yao, Zhengye Xie, Hepeng Xie, Hui Lin, Chen Dong 0002. 942-949 [doi]
- Efficient Vertical Mining of Frequent Quantitative PatternsThomas J. Czubryt, Connor C. J. Hryhoruk, Carson K. Leung, Adam G. M. Pazdor. 950-955 [doi]
- File Fragment Analysis Using Machine LearningRazaq Jinad, A. B. M. Rezbaul Islam, Narasimha Shashidhar. 956-962 [doi]
- Improvement and Evaluation of VBA-Based Cell Retrieval AlgorithmsHaoran Yang, Xingzhi Chen, Xu Cui, Ruiqiang Ma, Gang Wang. 963-968 [doi]
- Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and CompatibleJing Tao, Jianghua Peng, Tian Liu, Yangfan Li, Ruifeng Tian, Chengpeng Wu. 969-974 [doi]
- Enhancing Malware Detection Using "Genetic Markers" and Machine LearningJaehyun Lim, Quang Duy Tran, Fabio Di Troia. 975-977 [doi]
- Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural NetworksYunxin Liu, Yuliang Chen, Hongtao Zhang, Qingguo Zhou, Xiaokang Zhou. 978-984 [doi]
- Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics EnhancementsElena Becker, Maanak Gupta, Feras M. Awaysheh. 991-998 [doi]
- Singing Voice Conversion Between Popular Music and Chinese Opera Based on VITSZhengwei Peng, Jieyu Wu, Yue Li. 999-1003 [doi]
- Particle Swarm Optimization Tuned PID Control of Hybrid Renewable Energy Based Multi-Area Power SystemMuhammad Majid Gulzar, Muhammad Shahab, Adnan Shakoor. 1004-1009 [doi]
- A Smart Cane with Fall Detection System for People with Visual ImpairmentsObed Appiah, Wafa Elmannai. 1010-1015 [doi]
- A Multilevel Learning Model for Predicting CPU Utilization in Cloud Data CentersMustafa Daraghmeh, Anjali Agarwal, Yaser Jararweh. 1016-1023 [doi]
- PrivDroid: Android Security Code Smells Tool for Privilege Escalation PreventionMohammed El Amin Tebib, Pascal André, Mariem Graa, Oum-El-Kheir Aktouf. 1024-1031 [doi]
- Study of MobileNets Model in Federated LearningVipul Singh Negi, Suchismita Chinara. 1040-1044 [doi]
- Digital Twinning of PV Modules for Smart Systems - A Comparison Between Commercial and Open-Source Simulation ModelsAlì Aghazadeh Ardebili, Antonella Longo, Antonio Ficarella. 1045-1050 [doi]
- Using VR to Present a Mobile MRI Unit in Confined Physical Space: Reporting Results of a Field-Deployment at a Radiology ExhibitionSlawomir Konrad Tadeja, Kacper Godula, Thomas Bohné, Magdalena Wozniak. 1051-1057 [doi]
- Influences of Mental Stress Level on Individual Identification using Wearable BiosensorsAo Guo, Walid Brahim, Jianhua Ma. 1058-1063 [doi]
- LIDarknet: Experimenting the Power of Ensemble Learning in the Classification of Network TrafficNabil Marzoug, Khidhr Halab, Younes Mamma, Fadoua Khennou, Othmane El Meslouhi. 1064-1071 [doi]
- FL-SERENADE: Federated Learning for SEmi-supeRvisEd Network Anomaly DEtection. A Case StudyVeronika Bekbulatova, Andrea Morichetta 0002, Schahram Dustdar. 1072-1079 [doi]
- A Theoretical Framework for Supporting Clustering Validation via Non-Negative-Matrix-Factorization Trace Sequences Over Probabilistic SpacesAlfredo Cuzzocrea, Pau Figuera, Mojtaba Hajian, Pablo García Bringas. 1080-1087 [doi]
- Secrecy Capacity Evaluation for Vehicular Network Based on VLCNancy A. Arafa, Saied M. Abd El-atty, Diana W. Dawoud, Mohamed S. Arafa. 1088-1093 [doi]
- Research on User-Side Service Ownership Determination Technology of Power Systems Based on the Hybrid ModelYang Yu, Yuan-yuan Ma. 1094-1100 [doi]
- Predicting Student Dropout in Online Learning Platforms Using Deep Learning TechniquesAisha Almaazmi, Shadi Atalla, Hamzah Ali Alkhazaleh, Wathiq Mansoor, Amjad Gawanmeh. 1107-1114 [doi]
- Dynamic Type Misuse Detection and Analysis for Python-Based Edge Device ApplicationsMingcheng Liu, Zhifei Chen. 1115-1121 [doi]
- MERGE: Multi-Entity Relational Reasoning Based Explanation in Visual Question AnsweringMengzhu Pan, Qianmu Li, Tian Qiu. 1122-1129 [doi]
- An Architecture for Predictive Resource Allocation in Cloud Capacity Management Using Neural NetworksJanete Amaral, Alberto Sampaio Lima, José Neuman de Souza, José Antão Beltrão Moura. 1130-1136 [doi]
- An Intrusion Detection System Empowered by Deep Learning AlgorithmsWeiye Tang, Daren Li, Wuyue Fan, Tianhao Liu, Man Chen, Omar Dib. 1137-1142 [doi]
- Intelligent Control System for Line Follower Robot: From Theory to Implementation on the Mechatronics FieldWilson Pavón, Justin Campaña, Paolo Santamaria, Christian Iza, Ricardo Zapata. 1143-1148 [doi]
- A Generative Adversarial Model for Weather Radar Echo Extrapolation based on Cycle Generation StructureJianhao Ma, Qi Liu 0001, Yonghong Zhang, Xiaodong Liu 0002. 1149-1154 [doi]
- Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical TrendsRahaf Adam Alnuaimi, Moatsum Alawida. 1155-1162 [doi]
- Design and Implementation of Biological Inspired Algorithm Coupled with Sliding Mode Controller for Autonomous Cruise Control SystemMuhammad Majid Gulzar, Muhammad Mughees Ahmed, Adnan Shakoor, Huma Tahreem. 1163-1168 [doi]