Abstract is missing.
- Optimizing Route Efficiency in Formula One (F1) Vehicles Using Reinforcement Learning AlgorithmsSanam Narejo, Muhammad Taimoor Khan, Muhammad Zakir Shaikh, Lubna Luxmi Dhirani, Bhawani Shankar Chowdhry. 1-8 [doi]
- Enhancing Trust Factor Identification in E-Commerce: The Role of Text Segmentation and Factor Extraction with Transformer ModelsBandar F. Alkhalil, Yu Zhuang, Khalid T. Mursi, Ahmad O. Aseeri. 1-8 [doi]
- Lightweight security Mechanism for IoT Applications using Substitution-BoxFozia Hanif, Rehan Shams, Urooj Waheed. 1-6 [doi]
- Transforming Program Control Flow Data into Space-Filling Curves for Data AnalysisSebastian De La Cruz, Alexander Perez-Pons. 1-9 [doi]
- Securing Cloud AI Workloads: Protecting Generative AI Models from Adversarial AttacksAdvait Patel, Pravin Pandey, Hariharan Ragothaman, Ramasankar Molleti, Ajay Tanikonda. 1-7 [doi]
- Evaluating Text-Image Alignment using Gecko2KAakarsh Etar, Jayesh Soni, Himanshu Upadhyay. 1-6 [doi]
- Evaluating a Malware Benchmark Dataset Using Neural Network Models and Shapley-Based ExplainabilityHelen Qin, ShiYu Sun, Xiaohong Yuan. 1-8 [doi]
- Automated Detection of Malignant Lesions in the Ovary Using Deep Learning Models and XAIMd. Hasin Sarwar Ifty, Nisharga Nirjan, Labib Islam, M. A. Diganta, Reeyad Ahmed Ornate, Anika Tasnim, Md. Saiful Islam. 1-8 [doi]
- Advanced Facial Emotion Classification with 135 Classes for Enhanced Cybersecurity ApplicationsGregory Powers, Aobo Jin, Abdul Basit Tonmoy, Haowei Cao, Hardik A. Gohel, Qixin Deng. 1-8 [doi]
- Electronic Vehicle Charging and the Security Challenges of Renewable Energy Integration: An Optimization FrameworkBryan Anderson, Gahangir Hossain. 1-6 [doi]
- Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algorithm with Integrated EncryptionAbdullah Al Siam, Md. Maruf Hassan, Touhid Bhuiyan. 1-6 [doi]
- Addressing Vulnerabilities in AI-Image Detection: Challenges and Proposed SolutionsJustin Jiang. 1-9 [doi]
- Explaining Cyber Risks in Transportaion 5.0: A Data Driven ApproachBinod Tandan, Prashant Vajpayee, Gahangir Hossain. 1-8 [doi]
- Comparative Analysis of Federated Learning, Deep Learning, and Traditional Machine Learning Techniques for IoT Malware DetectionRami Darwish, Kaushik Roy. 1-10 [doi]
- Machine Learning Techniques for Predicting the Increase in Municipal Solid Waste Generation in Lima, PerúSandra-Evelia Garcia-Sandoval, Ciro Rodriguez Rodriguez. 1-9 [doi]
- A Novel Federated Learning Framework for Healthcare Applications Using Wearable DevicesRajesh Natarajan, Sujatha Krishna, Christodoss Prasanna Ranjith. 1-6 [doi]
- Quantifying the Risk of Out-of-Gas Conditions in Ethereum Smart ContractsMaryam Massoud Ahmed, Michael Lim, Xiaorui Liu, Shen-Shyang Ho, Nikolay Ivanov. 1-8 [doi]
- Design and Analysis of Microstrip Patch Antenna Using Metamaterial for Biomedical ApplicationsAnshul Shrivastava, Rajesh Kumar, Kurmendra. 1-4 [doi]
- "SQLSynthGen: Generating Synthetic Data for Healthcare Databases"Rohit Singh Raja. 1-11 [doi]
- Out-of-Distribution Detection for Neurosymbolic Autonomous Cyber AgentsAnkita Samaddar, Nicholas Potteiger, Xenofon D. Koutsoukos. 1-9 [doi]
- Homomorphic Encryption in Federated Medical Image ClassificationManuel Lengl, Simon Schumann, Stefan Röhrl, Oliver Hayden, Klaus Diepold. 1-6 [doi]
- Optimizing Cybersecurity Recruitment with Graph-Based AlgorithmsJesudhas Yogarajah, Gahangir Hossain. 1-7 [doi]
- Using Large Language Models to Mitigate Human-Induced Bias in SMS Spam: An Empirical ApproachGerard Shu Fuhnwi, Matthew Revelle, Bradley M. Whitaker, Clemente Izurieta. 1-7 [doi]
- Credit Card Fraud Detection Using KNC, SVC, and Decision Tree Machine Learning AlgorithmsPushpanjali Pandey, K. K. Garg. 1-3 [doi]
- SecureMedZK - A Blockchain-based Approach with Zero-Knowledge Rollups for Secure EHRDarshika Ravindra Pongallu, Shreyas Setlur Arun, Rohit Verma. 1-9 [doi]
- "Promoting Health through Transformative Innovation Policies and Emerging Technologies"Rohit Singh Raja. 1-16 [doi]
- Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous VehiclesAhmad Mohammadi, Vahid Hemmati, Reza Ahmari, Frederick Owusu-Ambrose, Mahmoud Nabil Mahmoud, Abdollah Homaifar. 1-9 [doi]
- A Comprehensive Security Orchestration, Automation, and Response System (SOAR) for Connected and Autonomous Vehicles (CAVs)Magani Niyomdi, Jared Oluoch. 1-14 [doi]
- Future-Proofed Intrusion Detection for Internet of Things with Machine LearningTaiwo Adeyemi, Felix Ngobigha, Adnane Ez-Zizi. 1-6 [doi]
- MAGICIAN: Malware classification Approach through Generation Image using a Conditional and wassersteIn generative Adversarial Network variantsStefano Galantucci, Andrea Iannacone, Giuseppe Pirlo, Lucia Sarcinella, Alessandro Stamerra. 1-7 [doi]
- Building Unique Interactive, Gamified Practical Exams for Cybersecurity StudentsRashad Aliyev, Ziyafat Amirov, Alakbar Aliyev. 1-4 [doi]
- A Metric for Measuring Distances Between Attack Trees in CybersecurityRohit Singh Raja. 1-16 [doi]
- Silent Speech Interfaces: Non-Invasive Neuromuscular Signal Processing for Assistive CommunicationSallar Khan, Khawaja Usman Ali, Ali Raza Ali Qadri, Maisam Rizvi. 1-6 [doi]
- Differential Privacy with DP-SGD and PATE for Intrusion Detection: A Comparative StudyDaniel Machooka, Xiaohong Yuan, Kaushik Roy, Guenvere Chen. 1-7 [doi]
- Quantifying Classification Metrics in Black Box Membership Inference AttacksNeil Dixit. 1-6 [doi]
- Artificial Intelligence for Cybersecurity: A State of the ArtAbdullah Al Siam, Md. Maruf Hassan, Touhid Bhuiyan. 1-7 [doi]
- "A Multi-Level NLP Framework for Medical Concept Mapping in Healthcare AI Systems"Rohit Singh Raja. 1-3 [doi]
- Transforming the cybersecurity space of healthcare IoT devices using Deep LearningPriyan Malarvizhi Kumar, Balasubramanian Prabhu Kavin, Abhignya Jagathpally, Tayyaba Shahwar. 1-6 [doi]
- Proactive AI-Driven Cybersecurity for Endangered Language Preservation: Safeguarding the Suba Linguistic CorpusHesborn Ondiba. 1-5 [doi]
- Applying Communication Privacy Management Theory to Youth Privacy Management in AI ContextsMolly Campbell, Sandhya Joshi, Ankur Barthwal, Austin Shouli, Ajay Kumar Shrestha. 1-10 [doi]
- Understanding the Threat of Political DeepfakesKashifah Afroz, Swetha Chittam, Kaushik Roy 0003. 1-6 [doi]
- Air Pollutant (CO) Forecasting: A Hybrid Approach Using Gooseneck Barnacle Optimization and Artificial Neural NetworksMarzia Ahmed, Ahmad Johari Mohamad, Md. Maruf Hassan, Touhid Bhuiyan. 1-6 [doi]
- C/C++ Vulnerability Data Set Generation Framework using a Parser and LLMMinh Dao Nguyen, Martin C. Carlisle. 1-11 [doi]
- "Time-Varying In-Hospital Mortality Prediction with Apache Spark"Rohit Singh Raja. 1-6 [doi]
- Prediction of False Data Injection Attacks in Smart Grid using AdaBoost, Deep Learning, and KNNBishwajeet Pandey, Nurkhat Zhakiyev, Madhu Sharma Gaur, Fariza Tumenbayeva, Sanjeev Kumar, Pushpanjali Pandey. 1-4 [doi]
- A Framework of Dynamic Analysis of WannaCryMichael Cardoso, George Cardoso, Na Li. 1-11 [doi]
- Machine Learning Based Critical Velocity Predictions in Slurry FlowsRavi Chandra Mathi, Aparna Aravelli. 1-6 [doi]
- AI2DS: Advanced Deep Autoencoder-Driven Method for Intelligent Network Intrusion Detection SystemsMd. Habibur Rahman, Leo Martinez, Avdesh Mishra, Mais Nijim, Ayush Goyal, David Hicks. 1-6 [doi]
- Low Field MRI Image SynthesisKun Wang, Aobo Jin, Hongchun Guo, Yun Wan, Qixin Deng, Wenhui Chu, Maulin Raval, Hardik A. Gohel. 1-7 [doi]
- Artificial Bee Colony Optimization Techniques' Utilization for Intrusion Detection Systems' AnalysisEmre Tokgoz. 1-16 [doi]
- Evaluation of Cybersecurity awareness level: A Case Study of Students of Sir Syed University of Engineering and TechnologyFozia Hanif, Rehan Shams. 1-5 [doi]
- Model Inversion Attacks and Prevention Tactics Using the HPCC Systems PlatformAndrew Bala Abhilash Polisetty, Nandini Shankara Murthy, Yong Shi, Hugo Watanuki, Flavio Villanustre, Robert Foreman. 1-5 [doi]
- Optimizing Intrusion Detection with Hybrid Deep Learning Models and Data Balancing TechniquesMd. Nasif Sarwar, Md. Shohel Arman, Touhid Bhuiyan, Fatama Binta Rafiq. 1-6 [doi]
- FocalCA: A Hybrid-Convolutional-Attention Encoder for Intrusion Detection on UNSW-NB15 Achieving High Accuracy Without Data BalancingAmin Amiri, Alireza Ghaffarnia, Shahnewaz Karim Sakib, Dalei Wu, Yu Liang. 1-8 [doi]
- AI-Driven Experiences: Exploring Consumer Purchase Intentions in a Social ContextShiu-Wan Hung, Jyun-Hao Jian, Che-Wei Chang, Jing-Ya Huang. 1-7 [doi]
- Rethinking the Place of African Kitchen Hut as a Hub for Business Management, Marketing, Education, Health and Strategies in the Age of Artificial IntelligenceChipo Mutongi, Billy Rigava, Tinashe Muchuri, Mufaro Rindai Chiwanza. 1-10 [doi]
- Mapping Cyber Threats in IoT-Driven MSPs: An Explainable Machine Learning Approach for Remote Work SecurityJames Johnstone, Adewale Akinfaderin. 1-9 [doi]
- Boosting Stock Predictions with Sentiment Analysis and Deep Learning ModelsSarbagya Ratna Shakya, Edgar Eduardo Ceh-Varela, Soneya Shakya, Caleb Parten, Zhaoxian Zhou. 1-6 [doi]
- Generative AI for Automated Security Operations in Cloud ComputingAdvait Patel, Pravin Pandey, Hariharan Ragothaman, Ramasankar Molleti, Diwakar Reddy Peddinti. 1-7 [doi]
- Quantum Long Sort-Term Memory-based Identification of Distributed Denial of Service AttacksSarvapriya Tripathi, Himanshu Upadhyay, Jayesh Soni. 1-8 [doi]
- AdaPhish: AI-Powered Adaptive Defense and Education Resource Against Deceptive EmailsRei Meguro, Ng S. T. Chong. 1-7 [doi]
- Cyber attack prediction on IoT and IIOT devices using ensemble based predictive analytic modelPriyan Malarvizhi Kumar, Tayyaba Shahwar, C. Gokulnath, Jeeva Selvaraj. 1-7 [doi]
- Low Area Design and Implementation of Lightweight Encryption Algorithm on FPGA for IoT DevicesKeshav Kumar, Dr Chinnaiyan Ramasubramanian, Bishwajeet Pandey. 1-4 [doi]
- Comparative Analysis of Password Alternatives for Enterprise Authentication: A Case StudyRahul Cherekar. 1-8 [doi]
- Secure and Efficient Fraud Detection Using Federated Learning and Distributed Search DatabasesMilavkumar Shah, Parth Shah, Swapnil Patil. 1-6 [doi]
- AI Agents for Cloud Reliability: Autonomous Threat Detection and Mitigation Aligned with Site Reliability Engineering PrinciplesMourya Chigurupati, Rajesh Kumar Malviya, Arvind Reddy Toorpu, Karanveer Anand. 1-4 [doi]