Abstract is missing.
- DataAgent: Evaluating Large Language Models' Ability to Answer Zero-Shot, Natural Language QueriesManit Mishra, Abderrahman Braham, Charles Marsom, Bryan Chung, Gavin Griffin, Dakshesh Sidnerlikar, Chatanya Sarin, Arjun Rajaram. 1-5 [doi]
- Sentiment Analysis of Financial News Data using TF-IDF and Machine Learning AlgorithmsGideon Popoola, Khadijat-Kuburat Abdullah, Gerard Shu Fuhnwi, Janet Agbaje. 1-6 [doi]
- Leveraging Advanced Visual Recognition Classifier For Pneumonia PredictionMaulin Raval, Aobo Jin, Yun Wan, Hardik A. Gohel. 1-8 [doi]
- A Holistic Review on Detection of Malicious Browser Extensions and Links using Deep LearningK. Rama Abirami, Tiago Zonta, Mithileysh Sathiyanarayanan. 1-6 [doi]
- Addressing Data Imbalance in Plant Disease Recognition through Contrastive LearningBryan Chung. 1-6 [doi]
- Improving Network Intrusion Detection Performance : An Empirical Evaluation Using Extreme Gradient Boosting (XGBoost) with Recursive Feature EliminationGerard Shu Fuhnwi, Matthew Revelle, Clemente Izurieta. 1-8 [doi]
- Identifying Race and Gender Bias in Stable Diffusion AI Image GenerationAadi Chauhan, Taran Anand, Tanisha Jauhari, Arjav Shah, Rudransh Singh, Arjun Rajaram, Rithvik Vanga. 1-6 [doi]
- Link-based Anomaly Detection with Sysmon and Graph Neural NetworksCharlie Grimshaw, Brian Lachine, Taylor Perkins, Emilie Coote. 1-6 [doi]
- YSAF: Yolo with Spatial Attention and FFT to Detect Face Spoofing AttacksRathinaraja Jeyaraj, Barathi Subramanian, Karnam Yogesh, Aobo Jin, Hardik A. Gohel. 1-6 [doi]
- Federated Learning Based Smart Horticulture and Smart Storage of Fruits Using E-Nose, and Blockchain: A Proposed ModelShakhmaran Seilov, Bishwajeet Pandey, Akniyet Nurzhaubayev, Dias Abildinov, Assem Konyrkhanova, Bibinur Zhursinbek. 1-5 [doi]
- Navigating Data Privacy and Analytics: The Role of Large Language Models in Masking conversational data in data platformsMandar Khoje. 1-5 [doi]
- Video key concept extraction using Convolution Neural NetworkTanvir H. Sardar, Ruhul Amin Hazarika, Bishwajeet Pandey, Guru Prasad M. S, Sk Mahmudul Hassan, Radhakrishna Dodmane, Hardik A. Gohel. 1-6 [doi]
- Simulations and Advancements in MRI-Guided Power-Driven Ferric Tools for Wireless Therapeutic InterventionsWenhui Chu, Aobo Jin, Hardik A. Gohel. 1-10 [doi]
- AI-Based Cybersecurity Policies and ProceduresShadi Jawhar, Jeremy R. Miller, Zeina Bitar. 1-5 [doi]
- Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User InputsTrishla Shah, Raghav V. Sampangi, Angela A. Siegel. 1-8 [doi]
- Mobile Application Security Risk Score: A sensitive user input-based approachTrishla Shah, Raghav V. Sampangi, Angela A. Siegel. 1-10 [doi]
- AI-Driven Customized Cyber Security Training and AwarenessShadi Jawhar, Jeremy R. Miller, Zeina Bitar. 1-5 [doi]
- zkFDL: An efficient and privacy-preserving decentralized federated learning with zero knowledge proofMojtaba Ahmadi, Reza Nourmohammadi. 1-10 [doi]
- The Application of the Fifth Discipline Strategies in the Learning City ConceptChipo Mutongi, Billy Rigava. 1-7 [doi]
- Deep Reinforcement Learning-based Malicious URL Detection with Feature SelectionAntonio Maci, Nicola Tamma, Antonio Coscia. 1-7 [doi]
- Secure federated learning applied to medical imaging with fully homomorphic encryptionXavier Lessage, Leandro Collier, Charles-Henry Bertrand Van Ouytsel, Axel Legay, Saïd Mahmoudi, Philippe Massonet. 1-12 [doi]
- A Novel Deep Learning Method for Segmenting the Left Ventricle in Cardiac Cine MRIWenhui Chu, Aobo Jin, Hardik A. Gohel. 1-9 [doi]
- Prescriptive Analytics-based Robust Decision-Making Model for Cyber Disaster Risk ReductionJoseph Ponnoly, John Puthenveetil, Patricia D'Urso. 1-5 [doi]
- CANAL - Cyber Activity News Alerting Language Model : Empirical Approach vs. Expensive LLMsUrjitkumar Patel, Fang-Chun Yeh, Chinmay Gondhalekar. 1-12 [doi]
- Toward robust systems against sensor-based adversarial examples based on the criticalities of sensorsAde Kurniawan, Yuichi Ohsita, Masayuki Murata 0001. 1-5 [doi]
- A Secure Open-Source Intelligence Framework For Cyberbullying InvestigationSylvia Worlali Azumah, Victor Adewopo, Zag ElSayed, Nelly Elsayed, Murat Ozer. 1-8 [doi]
- Robotics in Healthcare: The African PerspectiveChipo Mutongi, Billy Rigava. 1-10 [doi]
- Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment Analysis on Label-Free News HeadlinesAhamadali Jamali, Shahin Alipour, Audrey Rah. 1-5 [doi]
- Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven CybersecurityPriyan Malarvizhi Kumar, Kavya Vedantham, Jeeva Selvaraj, Balasubramanian Prabhu Kavin. 1-6 [doi]