Abstract is missing.
- Detection of Fake News Through Heterogeneous Graph InteractionsRaed Alharbi, Tre' R. Jeter, My T. Thai. 3-16 [doi]
- Edge-Based Bird Species Recognition via Active LearningHicham Bellafkir, Markus Vogelbacher, Daniel Schneider 0011, Markus Mühling, Nikolaus Korfhage, Bernd Freisleben. 17-34 [doi]
- A Peer to Peer Federated Graph Neural Network for Threat IntelligenceMouad Bouharoun, Bilal Taghdouti, Mohammed Erradi. 35-40 [doi]
- A Formal Analysis of Karn's AlgorithmMax von Hippel, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck. 43-61 [doi]
- Comparing Causal Convergence Consistency ModelsSidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea. 62-77 [doi]
- Encrypted Search: Not Enough to Ensure PrivacyAchraf Nia, Hossam Tarouchi, Mohammed Erradi. 81-89 [doi]
- Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDNAdnane Mzibri, Rédouane Benaini, Mouad Ben Mamoun. 90-95 [doi]
- Beyond Locks and Keys: Structural Equation Modeling Based Framework to Explore Security Breaches Through the Lens of Crime TheoriesNarjisse Nejjari, Karim Zkik, Houda Benbrahim, Mounir Ghogho. 96-101 [doi]
- Consensus on an Unknown Torus with Dense Byzantine FaultsJoseph Oglio, Kendric Hood, Gokarna Sharma, Mikhail Nesterenko. 105-121 [doi]
- Approximation Algorithms for Drone Delivery Scheduling ProblemSaswata Jana, Partha Sarathi Mandal 0001. 125-140 [doi]
- Pebble Guided Treasure Hunt in PlaneAdri Bhattacharya, Barun Gorain, Partha Sarathi Mandal 0001. 141-156 [doi]
- Distance-2-Dispersion: Dispersion with Further ConstraintsTanvir Kaur, Kaushik Mondal 0001. 157-173 [doi]