Abstract is missing.
- Feel the Wave: Using Waveguides as a Tactile Communication Interface for Deafblind PeopleLucie Pantera, Thomas Hebert, Ayoub Ben Dhiab, Charles Hudin, Sabrina A. Panëels. 3-10 [doi]
- Road Accessibility Mapping through Smartphone-Based SensingMarija Nenadic, Claudio Enrico Palazzi, Andrea Zanella. 11-18 [doi]
- Enhancing Brazilian Portuguese Augmentative and Alternative Communication with Card Prediction and Colourful SemanticsJayr Pereira, Francisco Rodrigues, Jaylton Alencar Pereira, Cleber Zanchettin, Robson N. Fidalgo. 19-26 [doi]
- Supporting Accessibility Auditing and HTML Validation using Large Language ModelsBarry Bassi, Giovanni Delnevo, Mirko Franco, Ombretta Gaggi, Salvatore Gatto, Silvia Mirri, Kelvin Olaiya. 27-31 [doi]
- Affordably Fine-tuned LLMs Provide Better Answers to Course-specific MCQsBianca Raimondi, Saverio Giallorenzo, Maurizio Gabbrielli. 32-39 [doi]
- Fine-Tuning GPT-3.5-Turbo for Automatic Feedback GenerationElisabetta Mazzullo, Okan Bulut, Cole Walsh, Gill Sitarenios, Alexander Macintosh. 40-47 [doi]
- Assessing the Real-World Impact of Disagreement Between Human Graders and LLMsSebastian Speiser. 48-53 [doi]
- Beyond Text-to-Text: An Overview of Multimodal and Generative Artificial Intelligence for Education Using Topic ModelingVille Heilala, Roberto Araya, Raija Hämäläinen. 54-63 [doi]
- Knowledge Distillation in RNN-Attention Models for Early Prediction of Student PerformanceSukrit Leelaluk, Cheng Tang 0001, Valdemar Svábenský, Atsushi Shimada. 64-73 [doi]
- The Use of Generative Artificial Intelligence for Upper Secondary Mathematics Education Through the Lens of Technology AcceptanceMika Setälä, Ville Heilala, Pieta Sikström, Tommi Kärkkäinen. 74-82 [doi]
- UKTA: Unified Korean Text AnalyzerSeokho Ahn, Junhyung Park, Ganghee Go, Chulhui Kim, Jiho Jung, Myung Sun Shin, Do-Guk Kim, Young-Duk Seo. 83-92 [doi]
- Measuring (meta)emotion, (meta)motivation, and (meta)cognition using digital trace data: A systematic review of K-12 self-regulated learningKaja Toomla, Xiaojing Weng, Eve Kikas, Elina Malleus-Kotsegarov, Kati Aus, Roger Azevedo, Danial Hooshyar. 91-100 [doi]
- Quantitative Assessment of Explainability in Machine Learning Models : A Study on the OULA DatasetSachini Gunasekara, Mirka Saarela. 101-103 [doi]
- AI-Enhanced Learning: Comparing Outcomes in Introductory and Advanced Programming CoursesSine Zambach. 104-105 [doi]
- Generative AI in Rural High Schools: Challenges and OpportunitiesShira Michel. 106-108 [doi]
- Student Research Abstract: A CSP-based approach to the generation of case studies for clinical guidelinesErica Raina. 109-113 [doi]
- Privacy-Preserving Data Obfuscation for Credit ScoringVittorio Prodomo, Roberto Gonzalez, Marco Gramaglia, Simon Pietro Romano. 114-121 [doi]
- Deep Generative Calibration on Stochastic Volatility Models with Applications in FX Barrier OptionsYanqing Ma, Carmine Ventre, Renzo Tiranti, Aiming Chen. 122-130 [doi]
- Self-explanatory and Retrieval-augmented LLMs for Financial Sentiment AnalysisFilippo Pallucchini, Xulang Zhang, Rui Mao 0010, Erik Cambria. 131-137 [doi]
- Bioinspired evolutionary metaheuristic based on COVID spread for discovering numerical association rulesCristina Herruzo-Lodeiro, Francesc Rodríguez-Díaz, Alicia Troncoso, María Martínez-Ballesteros. 138-144 [doi]
- A Genetic Algorithm with Convex Combination Crossover for Software Team Formation: Integrating Technical and Collaboration SkillsFelipe Cunha, Mirko Barbosa Perkusich, Danyllo Albuquerque, Kyller Costa Gorgônio, Hyggo Oliveira de Almeida, Angelo Perkusich. 146-153 [doi]
- [email protected]: Evolutionary Computation Meets Programmable Cryptography on BlockchainGoshgar Can Ismayilov. 154-156 [doi]
- Energy consumption of evolutionary algorithms implemented in low-level languagesJuan Julián Merelo, Mario García Valdez, Gustavo Romero López. 157-160 [doi]
- RepAs: Iterative Refinement for Predicting Polyadenylation Site UsageEleni Giovanoudi, Dimitrios Rafailidis. 161-168 [doi]
- Tree-based biclustering of genomic time seriesJesús S. Aguilar-Ruiz, Raúl Giráldez, Roberto Ruiz. 169-175 [doi]
- MHCRule - Rule-based Model for Interpretable MHC Class I Binding PredictionPiyush Borole, Ajitha Rajan. 176-185 [doi]
- Efficient Medical Image Segmentation Using Probabilistic KNN Label DownsamplingShahzad Ali, Muhammad Salman Khan, Yu Rim Lee, Soo-young Park, Won Young Tak, Soon Ki Jung. 186-193 [doi]
- GSHAPA: Gene Set Analysis for Single-Cell RNAseq Using Random Forest and SHAP ValuesSara Khademioureh, Irina Dinu, Sergio Peignier. 194-200 [doi]
- Elastic Vertical Memory Management for Container-based Stateful Applications in KubernetesTaeshin Kang, HeonChang Yu. 201-208 [doi]
- CADiA: A CPU Cache Allocation System for Distributed Parallel ApplicationsArmel Jeatsa, Boris Teabe. 209-216 [doi]
- A Design Framework for Cloud-HPC Integration in MLOpsNiila Siilasjoki, Mikko Raatikainen, Jukka K. Nurminen. 217-224 [doi]
- FOA-Energy: A Multi-objective Energy-Aware Scheduling Policy for Serverless-based Edge-Cloud ContinuumAnderson Andrei Da Silva, Yiannis Georgiou, Michael Mercier, Grégory Mounié, Denis Trystram. 225-232 [doi]
- Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control PlaneTomoyuki Ehira, Daisuke Kotani, Yasuo Okabe. 233-240 [doi]
- Automated Cybersecurity Risk Assessment and Visualization Framework for Resilient Cloud IT Asset ManagementJoonho Seo, Jinmyeong Shin, Geon-Woo Yoon, Jae Seok Kim, Yoon Ho Choi. 241-242 [doi]
- Xook-Flow: an abstract communication channel model for the data exchange in computing continuumCatherine Alessandra Torres Charles, Dante D. Sánchez-Gallegos, Diana Carrizales-Espinoza, Jesús Carretero 0001, José Luis González Compeán. 243-244 [doi]
- Leveraging BRSKI to Protect the Hardware Supply Chain of Operational Technology: Opportunities and ChallengesMichael P. Heinl, Adrian Reuter, Sebastian N. Peters, Markus Bever. 245-254 [doi]
- Harnessing Sub-blocks Erase of NAND flash for Secure Deletion Performance Enhancement on CPSChen-Jui Tu, Chun-Yi Kuo, Shuo-Han Chen. 255-262 [doi]
- WMN-CDA: Contrastive Domain Adaptation for Wireless Mesh Network ConfigurationAitian Ma, Mo Sha 0001. 263-270 [doi]
- Relay Memory Analysis via Constraint Satisfaction Modeling for Malware Detection in the Electrical Power GridIrma Rrushi, John Olijnyk, Kawthar Badran, Julian L. Rrushi. 271-278 [doi]
- Rabbitail: A Tail Latency-Aware Scheduler for Deep Learning Recommendation Systems with Hierarchical Embedding StorageHu Wan 0001, Yun Huang 0005, Shuhan Bai, Xuan Sun 0003, Tei-Wei Kuo, Chun Jason Xue. 279-287 [doi]
- A2SC: Adaptive Speed and Sensorless Control System for Motor Controllers based on Deep-RLJae Seok Kim, Joonho Seo, Minho Jang, Yoon Ho Choi. 288-291 [doi]
- Exploiting Fuzzy Controllers for Adapting Messaging SystemsMatheus Alves Almeida, Nelson Souto Rosa. 292-299 [doi]
- Towards Adaptive Transactional Consistency for Georeplicated DatastoresRui Braga, José Pereira 0001, Fábio Coelho. 300-307 [doi]
- Modelling Dependable Systems with Modular Rewritable Stochastic Petri NetsLorenzo Capra. 308-315 [doi]
- PreMatch: A Prediction-based Scheduler for Dataflow Asynchronous Processing on the Computing ContinuumNarges Mehran, Zahra Najafabadi Samani, Samira Afzal, Radu Prodan, Frank Pallas, Peter Dorfinger. 316-324 [doi]
- A Decentralized Strategy for Unweighted Minimum Vertex CoverMatteo Mordacchini, Emanuele Carlini, Patrizio Dazzi. 325-328 [doi]
- Detection of Read-Write Issues in Hyperledger Fabric Smart ContractsLuca Olivieri, Luca Negrini 0001, Vincenzo Arceri, Pietro Ferrara 0001, Agostino Cortesi. 329-337 [doi]
- Static Detection of Untrusted Cross-Contract Invocations in Go Smart ContractsLuca Olivieri, Luca Negrini 0001, Vincenzo Arceri, Pietro Ferrara 0001, Agostino Cortesi, Fausto Spoto. 338-347 [doi]
- Towards Solidity Smart Contract Efficiency Optimization through Code MiningAvik Banerjee, Michael Sober, Stefan Schulte 0002. 348-357 [doi]
- Automated Market Makers: Toward More Profitable Liquidity Provisioning StrategiesThanos Drossos, Daniel Kirste, Niclas Kannengießer, Ali Sunyaev. 358-365 [doi]
- Beyond the Blockchain Address: Zero-Knowledge Address AbstractionSanghyeon Park, Jeonghyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, Mingi Kim, Hyun Ki Cho, Soo-Mook Moon. 366-374 [doi]
- Attacking Anonymity Set in Tornado Cash via Wallet FingerprintsMartina Soleti, Ankit Gangwal, Mauro Conti. 376-385 [doi]
- Decentralized Finance Withdrawal DelaysJan Gorzny. 386-388 [doi]
- Controlling VC disclosure with Terms of Use and ABAC in SSIStefano Bistarelli, Chiara Luchini, Francesco Santini 0001. 389-390 [doi]
- Student Research Abstract: Subculture-Driven Speculation: Meme pump dot fun metric on the Solana BlockchainFrancisco Cordoba Otalora. 391-395 [doi]
- SkipLSM: Fast Retrieval of Hot Key-Value Pairs on LSM TreeJongsung Lee 0001, Sam Son, Jonghyun Bae, Yunho Jin, Tae Jun Ham, Jae W. Lee. 396-405 [doi]
- MAPLe: A B+-tree with Multi-Access Parallel Leaves to Improve Access Concurrency and LocalityLuna Wang, Shuaihua Zhao, Song Jiang. 406-414 [doi]
- A Novel Traffic Flow Prediction Model based on a Direct Spatio-Temporal GraphJiwon Son, Dong-hyuk Seo, Junho Song, Kyungsik Han, Namhyuk Kim, Sang-Wook Kim. 415-424 [doi]
- Partition Strategies for Vertex-Centric Historical Graph SystemsAlexandros Spitalas, Georgios Tsolas, Kostas Tsichlas. 425-431 [doi]
- Triangle Counting in Large Historical GraphsKonstantinos Christopoulos, Evaggelos Daskalakis, Agorakis Bompotas, Konstantinos Tsichlas. 432-439 [doi]
- ASML-REG: Automated Machine Learning for Data Stream RegressionNilesh Verma, Albert Bifet, Bernhard Pfahringer, Maroua Bahri. 440-447 [doi]
- Efficient Instance Selection in Tree-Based Models for Data Streams ClassificationAldo Marcelo Paim, João Gama 0001, Bruno Veloso, Fabrício Enembreck, Rita P. Ribeiro. 448-455 [doi]
- Sanity Checks in Smart Home Sensor StreamsRania Taleb, Sylvain Hallé, Roger Villemaire, Sébastien Gaboury, Hubert Kenfack Ngankam. 456-464 [doi]
- Online Learning from Capricious Data streams with Flexible Hoeffding TreeRuirui Zhao, Jianbin Sun, João Gama 0001, Jiang Jiang 0001. 465-469 [doi]
- MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter MapsJan Pennekamp, Joseph Leisten, Paul Weiler, Markus Dahlmanns, Marcel Fey, Christian Brecher, Sandra Geisler, Klaus Wehrle. 470-479 [doi]
- SHIELD: Assessing Security-by-Design in Federated Data Spaces Using Attack GraphsAlessandro Palma, Nikolaos Papadakis, Georgios Bouloukakis, Joaquín García-Alfaro, Mattia Sospetti, Kostas Magoutis. 480-489 [doi]
- Bringing the Digital Product Passport to Life: Requirements Analysis for a Carbon Footprint Tracking System using Knowledge Graphs and Data SpacesAnastasiia Belova, Artem Revenko, Viola Gallina, Daniel Bachlechner, Sulayman K. Sowe. 490-497 [doi]
- Context-driven Edge-based Data Sharing for Industrial IoT Data SpacesAn Ngoc Lam, Phu Hong Nguyen, Xiang Ma. 498-505 [doi]
- Unlinkable Data Sharing with Dynamic Access ControlKevin Röbert, Dominik Kaaser, Mathias Fischer 0001. 506-508 [doi]
- From Theory to Practice: Demonstrators of FAIR Data Spaces Across Different SectorsNikolaus Glombiewski, Zeyd Boukhers, Christian Beilschmidt, Johannes Drönner, Michael Mattig, Artur Piet, Robert Pietrzynski, Mehrshad Jaberansary, Macedo Maia, Sebastian Beyvers, Yeliz Üçer Yediel, Muhammad Hamza Akhtar, Heiner Oberkampf, Jonathan Hartman, Bernhard Seeger, Christoph Lange 0002. 509-513 [doi]
- A Scalable Approach for Memory Optimization in AUTOSAR Schedule TablesMuhammad Tanveer Ali Ahmad, Jesús Pestana, Michael Krisper, Marcel Baunach. 514-523 [doi]
- Exploiting Omega Network and Inexact Accumulative Parallel Counter to Enhance Energy Efficiency in Stochastic ComputingDonghui Lee, Yongtae Kim. 524-531 [doi]
- Optimizing Compute Core Assignment for Dynamic Batch Inference in AI Inference AcceleratorZe-Wei Liou, Ding-Yong Hong. 532-540 [doi]
- Efficient Scheduling of Weakly-Hard Real-Time Tasks with Sufficient Schedulability ConditionVictor Gabriel Moyano, Zain Alabedin Haj Hammadeh, Selma Saidi, Daniel Lüdtke. 541-550 [doi]
- SeismicSense: Phase Picking of Seismic Events with Embedded Machine LearningTayyaba Zainab, Laura Harms, Jens Karstens, Olaf Landsiedel. 551-559 [doi]
- Probabilistic Timing Estimates in Scenarios Under Testing ConstraintsSergi Vilardell, Francesco Rossi, Gabriele Giordana, Isabel Serra, Enrico Mezzetti, Jaume Abella 0001, Francisco J. Cazorla. 560-569 [doi]
- Software-Hardware Binding for Protection of Sensitive Data in Embedded SoftwareBernhard Fischer, Daniel Dorfmeister, Flavio Ferrarotti, Manuel Penz, Michael Kargl, Martina Zeinzinger, Florian Eibensteiner. 570-577 [doi]
- asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-ArithmeticHongjoo Jin, Jiwon Lee, Taehun Kim, Mu Yeol Sung, Dong-Hoon Lee. 578-587 [doi]
- On the Time Predictability of AXI4Roger Pujol, Jaume Abella 0001, Mohamed Hassan 0002, Francisco J. Cazorla. 588-589 [doi]
- Can Less Accurate Be More Accurate? Surpassing Exact Multiplier with Approximate Design on NISQ Quantum ComputersSungyoun Hwang, Hyoju Seo, Yongtae Kim. 590-591 [doi]
- State of Obfuscation: A Longitudinal Study of Code Obfuscation Practices in Google Play StoreAkila Niroshan, Suranga Seneviratne, Aruna Seneviratne. 592-596 [doi]
- Features Leverage in Graph Models for Mineral Prospectivity MappingThi Hai Yen Vu, Thi-Bich-Hanh Dao, Vincent Nguyen, Christel Vrain, Hugo Breuillard. 597-604 [doi]
- MorphoLayerTrace (MLT): A Modified Automated Radio-Echo Sounding Englacial Layer-tracing Algorithm for Englacial Layer Annotation in Ice Penetrating Radar DataBayu Adhi Tama, Sanjay Purushotham, Vandana P. Janeja. 605-612 [doi]
- Mapillary Street Vegetation Scoring: End-to-End ProcessNegin Zarbakhsh, Srikanta Sannigrahi, Anh-Vu Vo, Gavin McArdle. 613-621 [doi]
- Supervised Ensemble-based Causal DAG SelectionCorrado Mio, Jianyi Lin, Ernesto Damiani, Gabriele Gianini. 622-629 [doi]
- Contrasting Global and Local Representations for Human Activity Recognition using Graph Neural NetworksAndrés Tello, Victoria Degeler. 630-637 [doi]
- Enhancing 3D Face Analysis Using Graph Convolutional Networks with Kernel-Attentive FiltersFrancesco Agnelli, Omar Ghezzi, Giorgio Blandano, Jacopo Burger, Giuseppe Facchi, Lia Schmid. 638-644 [doi]
- One-mode Projection of Bipartite Graphs for Text Classification using Graph Neural NetworksNícolas Roque dos Santos, Diego Minatel, Alan Demétrius Baria Valejo, Alneu de Andrade Lopes. 645-647 [doi]
- An Attention-based Dual Stream Network for Efficient Electricity Price ForecastingNamgyu Jung, Taimoor Khan, PanKoo Kim, Chang Choi. 648-654 [doi]
- Knowledge Distillation for Reduced Footprint Semantic Segmentation with the U-NetCiro Rosa, Nina Hirata. 655-662 [doi]
- Visualizing Streaming Data in Industrial Scale IoT SystemsAntero Taivalsaari, Tommi Mikkonen. 663-670 [doi]
- Energy-Aware Vision Model Partitioning for Edge AIDewant Katare, Mengying Zhou, Yang Chen 0001, Marijn Janssen, Aaron Yi Ding. 671-678 [doi]
- Incentivizing Crowdsensing in IoT through Micropayments: A Simulation StudyLuca Serena, Pietro Manzoni, Moreno Marzolla, Gabriele D'Angelo, Stefano Ferretti. 679-686 [doi]
- Advanced Knowledge Transfer: Refined Feature Distillation for Zero-Shot Quantization in Edge ComputingInpyo Hong, Youngwan Jo, Hyojeong Lee, Sunghyun Ahn, Sanghyun Park 0003. 687-694 [doi]
- Efficient PUF-Based IoT Authentication Framework without Fuzzy ExtractorFranco Cirillo, Christian Esposito 0001. 695-704 [doi]
- EdgeMiner: Distributed Process Mining at the Data SourcesJulia Andersen, Patrick Rathje, Christian Imenkamp, Agnes Koschmider, Olaf Landsiedel. 705-713 [doi]
- Paprika: Replica Placement for Multi-Region Edge Publish-Subscribe SystemsXavier Pacheco, Pedro Vieira, Hervé Paulino. 714-721 [doi]
- LonelyTracker: An IoT Solution with Multimodal Data and Split Computing for Secure Loneliness DetectionTarannum Ara, Bivas Mitra. 722-729 [doi]
- An Early Exit Deep Neural Network for Fast Inference Intrusion DetectionJoão A. Simioni, Eduardo Kugler Viegas, Altair O. Santin, Pedro Horchulhack. 730-737 [doi]
- Optimized Model Selection for Wind Farm Power Forecasting using Dynamic Time WarpingTaehyoung Kim, Jiman Hong. 738-745 [doi]
- A Software-Defined Overlay Networking Middleware for a Simplified Deployment of Distributed Application at the EdgeHeiko Bornholdt, Kevin Röbert, Stefan Schulte 0001, Janick Edinger, Mathias Fischer 0001. 746-748 [doi]
- A Lightweight and Accurate Localization Model for Anatomical Landmark in Medical Imaging Using Depth-Wise Separable ConvolutionSuhyeon Kim, Haill An, Jaejun Park, Younhyun Jung. 749-750 [doi]
- Finger Vein Spoof GANs: Issues in Presentation Attack Detector TrainingAndreas Vorderleitner, Andreas Uhl. 751-758 [doi]
- GAN or DM? In-depth Analysis and Evaluation of AI-generated Face Data for Generalizable Deepfake DetectionHyeongjun Choi, Simon S. Woo. 759-766 [doi]
- X3A: Efficient Multimodal Deepfake Detection with Score-Level FusionChan Park, Bohyun Moon, Minsun Jeon, Jee-weon Jung, Simon S. Woo. 767-774 [doi]
- HCN-TA: Hierarchical Capsule Network with Temporal Attention for a Generalizable Approach to Audio Deepfake DetectionTaiba Majid Wani, Madleen Uecker, Farooq Ahmad Wani, Irene Amerini. 775-777 [doi]
- BERT-based User Attribute Mapping Framework in Heterogeneous SystemsJahoon Koo, Yujun Kim, Young-Gab Kim. 778-786 [doi]
- Enhancing Interoperability in Controlled Environment Agriculture Systems Using Plant Electrical SignalsYeongyu Lee, Hongseok Oh 0001, Moon-Sun Yeom, Myung-Min Oh, Kyungchang Jeong, Jaemin Jeong, Euijong Lee. 787-794 [doi]
- Topic-Aware Knowledge Graph with Large Language Models for Interoperability in Recommender SystemsMinhye Jeon, Seokho Ahn, Young-Duk Seo. 795-802 [doi]
- Pursuing Interoperability in Digital Twins: An Analysis of the Current Research LandscapeEmylle Varela, Thaís Batista, Everton Cavalcante, André Almeida 0002. 803-810 [doi]
- Decentralized Bridge Between Polkadot and CosmosKristián Kostál, Dusan Morhác, Juraj Mecir. 811-814 [doi]
- ST-CBS: Spatio-Temporal Conflict Based Search in Continuous Space for Multi-Agent PathfindingJoonyeol Sim, Seonghyeon Lim, Changjoo Nam. 815-822 [doi]
- Lightweight Decentralized Neural Network-Based Strategies for Multi-Robot PatrollingJames C. Ward, Ryan McConville, Edmund R. Hunt. 823-831 [doi]
- A Semantic Mapping Framework for Service RobotsLucyanno Frota, Rui P. Rocha. 832-839 [doi]
- MARTES: Multi-Agent Reinforcement learning Training Environment for SchedulingMario Andreu Villar, Karen Yadira Lliguin León, Jordi Arjona Aroca, Arántzazu López-Larrainzar Salazar, Gerardo Minella, José Manuel Bernabéu Aubán. 840-849 [doi]
- Communication Isolation For Multi-Robot Systems Using ROS2Lucas Naury, Adam Gouguet, Guillaume Lozenguez, Luc Fabresse. 850-858 [doi]
- Learning Visual Servoing for Nonholonomic Mobile Robots with Uncalibrated CamerasJen-Wei Wang, Daniel Nikovski. 859-861 [doi]
- Exploration and Active Recognition Strategy using Meta-MDPAlvin Gandois, Abdel-Illah Mouaddib, Simon Le Gloannec, Ayman Alfalou. 862-865 [doi]
- Soilcast: a Multitask Encoder-Decoder AI Model for Precision AgriculturePaolo Grazieschi, Massimo Vecchio, Miguel Pincheira, Fabio Antonelli. 866-873 [doi]
- Fusing Expert Knowledge and Internet of Things Data for Digital Twin Models: Addressing Uncertainty in Expert StatementsMichelle Jungmann, Sanja Lazarova-Molnar. 874-881 [doi]
- Deep Reinforcement Learning of Simulated Students Multimodal Mobility Behavior: Application to the City of ToulouseAbdelfatah Kermali, Kamaldeep Singh Oberoi, Zeineb El Khalfi, Yohan Dupuis. 882-888 [doi]
- A DIF-Driven Threshold Tuning Method for Improving Group FairnessDiego Minatel, Antonio Rafael Sabino Parmezan, Nícolas Roque dos Santos, Mariana Curi, Alneu de Andrade Lopes. 890-898 [doi]
- A Retrieval-Augmented Framework For Meeting Insight ExtractionSartaj Bhuvaji, Prachitee Chouhan, Madhuroopa Irukulla, Jay Singhvi, Wan D. Bae, Shayma Alkobaisi. 899-906 [doi]
- Deciphering Social Behaviour: a Novel Biological Approach For Social Users ClassificationEdoardo Allegrini, Edoardo Di Paolo, Marinella Petrocchi, Angelo Spognardi. 907-914 [doi]
- Integrating Access Control with Retrieval-Augmented Generation: A Proof of Concept for Managing Sensitive Patient ProfilesBingxiang Chen, John Tackman, Manu Setälä, Timo Poranen, Zheying Zhang. 915-919 [doi]
- The Rephrased Reality: Analysing Sentiment Shifts in LLM-Rephrased TextFrederico Leite Richardson, Aline Villavicencio, Ronaldo Menezes. 920-927 [doi]
- JobSet: Synthetic Job Advertisements Dataset for Labour Market IntelligenceSamuele Colombo, Simone D'Amico, Lorenzo Malandri, Fabio Mercorio, Andrea Seveso. 928-935 [doi]
- A Comparison of the Effects of Model Adaptation Techniques on Large Language Models for Non-Linguistic and Linguistic TasksKhoa Nguyen, Sadia Jahan, Rocky Slavin. 936-944 [doi]
- Mixture of Modular Experts: Distilling Knowledge from a Multilingual Teacher into Specialized Modular Language ModelsMohammed Al-Maamari, Mehdi Ben Amor, Jelena Mitrovic, Michael Granitzer. 945-852 [doi]
- RAGCol: RAG-Based Automatic Video Colorization Through Text Caption Generation and Knowledge EnrichmentRory Ward, Dhairya Dalal, Paul Buitelaar, John G. Breslin. 953-962 [doi]
- Early Detection of Online Grooming with Language ModelsDohyeon Kim, Taehoon Kim, Jihoon Yang. 963-970 [doi]
- AI-Powered Comment Triage for Efficient Collaboration and Feedback ManagementVamsi Krishna Pasam, Sravani Pati, Carlos Toxtli Hernandez. 971-979 [doi]
- Improving Natural Product Knowledge Extraction from Academic Literature with Enhanced PDF Text Extraction and Large Language ModelsPaulo Viviurka Do Carmo, Marcos Paulo Silva Gôlo, Jonas Gwozdz, Edgard Marx, Ricardo Marcondes Marcacini. 980-987 [doi]
- FALCON: A multi-label graph-based dataset for fallacy classification in the COVID-19 infodemicMariana Chaves, Elena Cabrio, Serena Villata. 988-995 [doi]
- Moderating Large Scale Online Deliberative Processes with Large Language Models (LLMs): Enhancing Collective Decision-MakingIbukun David Babatunde, Obiabuchi Martin Nnanna, Mark Klein 0001. 996-1003 [doi]
- Curriculum Demonstration Selection for In-Context LearningDuc Anh Vu 0002, Cong-Duy Nguyen, Xiaobao Wu, Nhat M. Hoang, Mingzhe Du, Thong Nguyen 0003, Anh Tuan Luu. 1004-1006 [doi]
- Assessing Argument-based Natural Language Explanations in Medical TextBenjamin Molinet, Elena Cabrio, Serena Villata. 1007-1008 [doi]
- Cognitive Biases in Large Language Models: A Survey and Mitigation ExperimentsYasuaki Sumita, Koh Takeuchi 0001, Hisashi Kashima. 1009-1011 [doi]
- ChatGPT, what is a 'Glasanwalt'? - Linguistic strategies in a large language model's interpretation of novel compoundsAnnelen Brunner, Anna Pohle. 1012-1013 [doi]
- Tailoring Adaptive-Zero-Shot Retrieval and Probabilistic Modelling for Psychometric DataFederico Ravenda, Seyed Ali Bahrainian, Noriko Kando, Antonietta Mira, Andrea Raballo, Fabio Crestani. 1014-1018 [doi]
- Beyond Optimal: Interactive Identification of Better-than-optimal RepairsFrancesco Kriegel. 1019-1026 [doi]
- Reasoning with Plausibility in Incomplete Argumentation FrameworksJean-Guy Mailly. 1027-1034 [doi]
- Solution Counts of Some Prominent Quantified Boolean Formulas FamiliesAndreas Plank, Martina Seidl, Manuel Kauers. 1035-1042 [doi]
- FERAT: A New Expansion-Based Certification Framework for Quantified Boolean FormulasMarcel Simader, Adrian Rebola-Pardo, Martina Seidl. 1043-1050 [doi]
- Dynamic Programming Algorithms for Probabilistic Bipolar Argumentation FrameworksAndrei Popescu, Johannes Peter Wallner. 1051-1052 [doi]
- Sampling Frequent and Diversified Patterns Through CompressionFrançois Camelin, Samir Loudni, Gilles Pesant, Charlotte Truchet. 1053-1054 [doi]
- Speed-up of Data Analysis with Kernel Trick in Encrypted DomainJoon Soo Yoo, Baek Kyung Song, Tae Min Ahn, Ji-Won Heo, Ji Won Yoon. 1055-1064 [doi]
- Supervised Contrastive Learning with Importance-based CutOut for Few-shot Image ClassificationSeokhee Jo, Jungmin So. 1065-1073 [doi]
- GANDALF: A LLM-based approach to map bark beetle outbreaks in semantic stories of Sentinel-2 imagesVincenzo Pasquadibisceglie, Vito Recchia, Annalisa Appice, Donato Malerba, Giuseppe Fiameni. 1074-1081 [doi]
- Explainable Time Series Prediction of Tyre Energy in Formula One Race StrategyJamie Todd, Junqi Jiang, Aaron Russo, Steffen Winkler, Stuart Sale, Joseph McMillan, Antonio Rago 0001. 1082-1089 [doi]
- Explainable Reinforcement Learning for Formula One Race StrategyDevin Thomas, Junqi Jiang, Avinash Kori, Aaron Russo, Steffen Winkler, Stuart Sale, Joseph McMillan, Francesco Belardinelli, Antonio Rago 0001. 1090-1097 [doi]
- Univariate vs multivariate prediction for containerised applications auto-scaling: a comparative studyWellison R. M. Santos, Adalberto R. Sampaio, Nelson S. Rosa, George D. C. Cavalcanti. 1098-1105 [doi]
- Advancing Chronic Disease Prediction with Your First-Visit: Ensemble and Deep Learning ApproachesYaejin Lee, Junyeop Cha, Eunil Park. 1106-1113 [doi]
- DDSNet: A Lightweight Dense Depthwise Separable Network for Tumor Classificationan Huang, Junggab Son, Zuobin Xiong. 1114-1121 [doi]
- Bounded Editing: Multi-Object Image Manipulation with Region-Specific ControlMin-Gyu Kang, Keon Kim, Yong Suk Choi. 1122-1129 [doi]
- FEFM: Feature Extraction and Fusion Module for Enhanced Time Series Anomaly DetectionSeong Hyun Jeon, Keon Kim, Yong Suk Choi. 1130-1137 [doi]
- High-Fidelity Face Age Transformation via Hierarchical Encoding and Contrastive LearningHakjun Moon, Dayeon Woo, Simon S. Woo. 1138-1145 [doi]
- Unsupervised Training Framework for 3D Point Cloud Object Detection ModelMin-Jyun Wu, Hsiang-Jui Lin, Shih-Hao Hung, Chi-Sheng Shih 0001. 1146-1155 [doi]
- A Hybrid Self-Correcting Approach for Embedding Ontology-based Knowledge GraphsElisa Mariani, Nacéra Seghouani, Yue Ma. 1156-1163 [doi]
- Spatial Information Integration in Small Language Models for Document Layout Generation and ClassificationPablo Melendez Abarca, Clemens Havas. 1164-1171 [doi]
- Unlearn and Protect: Selective Identity Removal in Diffusion Models for Privacy PreservationMuhammad Shaheryar, Jong Taek Lee, Soon Ki Jung. 1172-1179 [doi]
- TAECE : T2I-Adapter with Enhanced Color Expression for Improving Conditional Text-to-Image Generation CapabilitiesHyein Seo, Yuna Jeong, Yong Suk Choi. 1180-1187 [doi]
- Collaborative filtering through weighted similarities of user and item embeddingsPedro R. Pires, Rafael T. Sereicikas, Gregório F. Azevedo, Tiago A. Almeida 0001. 1188-1195 [doi]
- Network-based instance hardness measures for classification problemsGustavo P. Torquette, Márcio P. Basgalupp, Teresa Bernarda Ludermir, Ana Carolina Lorena. 1196-1203 [doi]
- Data Balancing for Mitigating Sampling Bias in Machine LearningRonaldo Inocêncio Júnior, Márcio P. Basgalupp, Teresa Bernarda Ludermir, Ana Carolina Lorena. 1204-1212 [doi]
- MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented GenerationMarco Simoni, Andrea Saracino, Vinod P 0001, Mauro Conti. 1213-1222 [doi]
- PULLM: A Multimodal Framework for Enhanced 3D Point Cloud Upsampling Using Large Language ModelsZhiyong Zhang, Ruyu Liu, Xiufeng Liu, Yunrui Zhu, Yanyan Yang 0002, Chaochao Wang, Jianhua Zhang 0002. 1223-1230 [doi]
- Hierarchical Contrastive Learning with Multiple Augmentations for Sequential RecommendationDongjun Lee, Donggeun Ko, Jaekwang Kim. 1231-1239 [doi]
- Hybrid Flow Shop Scheduling through Reinforcement Learning: A systematic literature reviewVictor Ulisses Pugliese, Oseias Ferreira, Fabio A. Faria. 1240-1249 [doi]
- Neighbor-Based Decentralized Training Strategies for Multi-Agent Reinforcement LearningNicolò Malucelli, Davide Domini, Gianluca Aguzzi, Mirko Viroli. 1250-1257 [doi]
- SC-Block++: A Blocking Algorithm Based on Adaptive Flood RegularizationArthur Ning, Flavius Frasincar, Tarmo Robal. 1258-1266 [doi]
- Comparative Study of Lexical and Semantic Approaches in Closed-domain Product SearchFrancisco Igor de Lima Mendes, Melquisedeque Carvalho Silva, André Luiz Firmino Alves, Eniedson Fabiano Pereira da Silva Júnior, Mateus Queiroz Cunha, Cláudio de Souza Baptista. 1267-1274 [doi]
- Towards Robust Facial Recognition: Gabor Filter-Based Feature Extraction for NIR-VIS Heterogeneous Face RecognitionJoão V. R. de Andrade, Agostinho Freire, Guilherme Carvalho Pereira, Cristian Millán-Arias, Bruno J. T. Fernandes, Carmelo J. A. Bastos Filho, Jorge Tortato, Luiz Da Rocha, Alexandre M. A. Maciel. 1275-1281 [doi]
- MELA: Multi-Event Localization Answering Framework for Video Question AnsweringJimyeong Han, Sangpil Kim, Hogun Park. 1282-1289 [doi]
- Debiasing Classifiers by Amplifying Bias with Latent Diffusion and Large Language ModelsDonggeun Ko, Dongjun Lee, Namjun Park, Wonkyeong Shim, Jaekwang Kim. 1290-1292 [doi]
- From RAG to QA-RAG: Integrating Generative AI for Pharmaceutical Regulatory Compliance ProcessJaewoong Kim, Minseok Hur, Moohong Min. 1293-1295 [doi]
- Mamba-PKD: A Framework for Efficient and Scalable Model Compression in Image ClassificationJosé Medina, Amnir Hadachi, Paul Honeine, Abdelaziz Bensrhair. 1296-1298 [doi]
- On exploiting LLMs and Statistical Methods for testing Contractual Clarity in Legal ContractsBiagio Boi, Ilaria Amelia Caggiano, Christian Esposito 0001, Lucilla Gatt. 1299-1300 [doi]
- Information Flow in Deep Learning Classification NetworksDebanjali Banerjee, Chee-Hung Henry Chu. 1301-1302 [doi]
- PacECG-Net: A Multi-modal Approach Integrating LLMs and ECG for LVSD Classification in Pacemaker PatientsWonkyeong Shim, Namjun Park, Donggeun Ko, San Kim, Hyebin Gwag, Youngjun Park, Seungjung Park, Jaekwang Kim. 1303-1305 [doi]
- Student Research Abstract: Dynamic Adversarial Soil Modeling: A GAN-Confident Learning Approach for Precision AgricultureVasu Jindal. 1306-1308 [doi]
- Enhanced Cross-Task Learning Architecture for Boosted Decision TreesJayram Bhat Palamadai. 1309-1311 [doi]
- Student Research Abstract: Evaluating Dialogue Summarization Using LLMsAlison Wang. 1312-1314 [doi]
- What's in an Embedding? Harnessing Deep Learning to Fuse Multi-Sensor Embeddings for Room IdentificationGabriel A. Morales, Rocky Slavin. 1315-1324 [doi]
- Transparent Smartphone Memory ExpansionGyusun Lee, Jinyong Park, Jae W. Lee, Jinkyu Jeong. 1325-1334 [doi]
- On the Difficulty of NOT being Unique: Fingerprinting Users from Wi-Fi Data in Mobile DevicesMariana Cunha, Ricardo Mendes, Yves-Alexandre de Montjoye, João P. Vilela. 1335-1344 [doi]
- Improving Kademlia Lookup Privacy through Query ObfuscationErik Daniel, Guillaume Michel, Florian Tschorsch. 1345-1352 [doi]
- Multiple Policy Approach for Efficient Resource Allocation in SDM-EONsRamon A. Oliveira, Denis Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira. 1353-1360 [doi]
- Deep Reinforcement Learning for Context-Aware Online Service Function Chain Deployment and Migration over 6G NetworksSolomon Fikadie Wassie, Antonio Di Maio, Torsten Braun. 1361-1370 [doi]
- Data-Driven Orchestration for Distributed RAN Intelligent Controller Placement in 6G NetworksElham Hasheminezhad, Antonio Di Maio, Torsten Braun. 1371-1373 [doi]
- lwFSCK: Light-weight Filesystem CheckJuWon Kim, Dongeon Kim, Seung Won Yoo, Myeongin Cheon, Joontaek Oh, Youjip Won. 1374-1382 [doi]
- Efficient Kernel Source Code Management for BMC OptimizationKyungeun Oh, Jeonghwan Oh, Hangyeol Kim, SeongMo An, Junyoung Heo, Jiman Hong. 1383-1390 [doi]
- CRAZNS: A Case for Conventional Namespace Support for RAID with ZNS SSDsHangyul Kim, Inho Song, Sam H. Noh. 1391-1398 [doi]
- Multicriteria File-Level Placement Policy for HPC StorageHocine Mahni, Stéphane Rubini, Sebastien Gougeaud, Philippe Deniel, Jalil Boukhobza. 1399-1406 [doi]
- Scalable Orchestration Design for Mixed-Critical Task Scheduling in SDI-based Mobility SystemsKi Cheol Park, Jae-Hoon An, Young-Hwan Kim, Hangyeol Kim Kim. 1407-1411 [doi]
- Breadth-first Cycle Collection Reference Counting: Theory and a Rust Smart Pointer ImplementationSaverio Giallorenzo, Francesco Goretti. 1412-1420 [doi]
- A Platform-Independent Software-Intensive Workflow Modeling Language And An Open-Source Visual Programming Tool: A Bottom-Up Approach Using Ontology Integration Of Industrial Workflow EnginesYong-Jun Shin, Wilfrid Utz. 1421-1430 [doi]
- A Mechanized Formalization of an FRP Language with EffectsJordan Ischard, Frédéric Dabrowski, Jules Chouquet, Frédéric Loulergue. 1431-1439 [doi]
- Creating Scala-Embedded Domain-Specific LanguagesMark Grechanik. 1440-1443 [doi]
- Advancing Quantum Software Engineering: A Vision of Hybrid Full-Stack Iterative ModelArif Ali Khan, Davide Taibi 0001, Cécile M. Perrault, Muhammad Azeem Akbar. 1444-1448 [doi]
- NISQ Quantum Algorithm for K-Means ClusteringDuong Bui, Kimmo Halunen. 1449-1456 [doi]
- Q-Edge: Leveraging Quantum Computing for Enhanced Software Engineering in Vehicular NetworksAdriano H. O. Maia, Marcus Freire, Thiago Mello, Roberto Rodrigues Filho, Eduardo Almeida, Cássio V. S. Prazeres, Gustavo Bittencourt Figueiredo, Maycon Peixoto. 1457-1467 [doi]
- C2|Q>: Unifying Classical and Quantum ProgrammingBoshuai Ye. 1468-1472 [doi]
- SimRE: A Requirements Similarity Tool for Software Product LinesMaría Isabel Limaylla Lunarejo, Nelly Condori-Fernández, Miguel Rodríguez Luaces. 1473-1480 [doi]
- Enhancing Device-Goal-Norm Modeling for Ambient Assisted Living with Large Language ModelsLuca Sabatucci, Massimo Cossentino, Claudia Di Napoli, Angelo Susi. 1481-1488 [doi]
- UTL: A Unified Language for Requirements TemplatesIkram Darif, Ghizlane El-Boussaidi, Sègla Kpodjedo, Andrés Paz. 1489-1506 [doi]
- NFR4SUSTAIN: Catalog of Requirements for Software SustainabilityAbimael Santos, Quelita A. D. S. Ribeiro, Moniky Ribeiro, Jaelson Castro, Maria Lencastre 0001. 1507-1508 [doi]
- Requirements Traceability: A Systematic Literature ReviewTshepho Koboyatshwene, Yirsaw Ayalew. 1509-1513 [doi]
- PCTL Model Checking for Temporal RL Policy Safety ExplanationsDennis Gross, Helge Spieker. 1514-1521 [doi]
- Identity-Focused Inference and Extraction Attacks on Diffusion ModelsJayneel Vora, Nader Bouacida, Aditya Krishnan 0003, Prabhu RV Shankar, Prasant Mohapatra. 1522-1530 [doi]
- TSPTE: Text sentiment-aware privacy protection method based on truncated exponentYue Qiu. 1531-1538 [doi]
- N-Pixels: a Novel Grey-Box Adversarial Attack for Fooling Convolutional Neural NetworksSalvatore Della Torca, Valentina Casola, Simone Izzo. 1539-1547 [doi]
- D-semble: Efficient Diversity-Guided Search for Resilient ML EnsemblesAbraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. 1548-1559 [doi]
- Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical InfrastructuresAlessandro Brighente, Mauro Conti, Savio Sciancalepore, Harshul Vaishnav. 1560-1569 [doi]
- Enhancing Room Occupancy Inference from Sparse PIR Sensor Data Using Transformer ModelsYu Sheng, Ali Ozbakir, Clara Maathuis, Deniz Iren, Stefano Bromuri. 1570-1579 [doi]
- BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying BehaviorMenno Bezema, Alessandro Brighente, Mauro Conti, Luca Cosuti. 1580-1589 [doi]
- Leveraging Contrastive Learning and Spatial Encoding for Prediction in Traffic Networks with Expanding InfrastructureYou Xu, Marwan Hassani. 1590-1599 [doi]
- Refining Urban Microscopic Traffic Simulations Accuracy Using a Customized Random Walk Model for Dynamic Stochastic Route ChoiceKaveh Khoshkhah, Mozhgan Pourmoradnasseri, Behzad Bamdad Mehrabani, Sadok Ben Yahia, Amnir Hadachi. 1600-1608 [doi]
- Dynamic Pricing for Electric Vehicle ChargingArun Kumar Kalakanti, Shrisha Rao 0001. 1609-1611 [doi]
- Automating Data Quality Monitoring for Environmental Air Quality SystemSultan Altarrazi, Tomasz Szydlo, Devki Nandan Jha, Rajiv Ranjan 0001. 1612-1616 [doi]
- A Machine Learning-Based Approach For Detecting Malicious PyPI PackagesHaya Samaana, Diego Elias Costa, Emad Shihab, Ahmad Abdellatif. 1617-1626 [doi]
- Leveraging Search-Based and Pre-Trained Code Language Models for Automated Program RepairOebele Lijzenga, Iman Hemati Moghadam, Vadim Zaytsev. 1627-1636 [doi]
- My Code Is Less Secure with Gen AI: Surveying Developers' Perceptions of the Impact of Code Generation Tools on SecurityArina Kudriavtseva, Nisar Ahmad Hotak, Olga Gadyatskaya. 1637-1646 [doi]
- Supporting Software Engineers in IT Security and Privacy through Automated Knowledge DiscoveryMarco Ehl, Amir Shayan Ahmadian, Katharina Großer, Duaa Adel Ali Elsofi, Marc Herrmann, Alexander Specht, Kurt Schneider, Jan Jürjens. 1647-1656 [doi]
- A Two-stage Approach for Structurally-similar Cross-language Code-pair DetectionFeng Dai, Shigeru Chiba. 1657-1665 [doi]
- MedTiny Code Generation for Enhancing RegLang Smart Contract ReliabilityXiaokun Luan, Yihao Zhang, Meng Sun 0002. 1666-1673 [doi]
- VeriFogOps: Automated Deployment Tool Selection and CI/CD Pipeline Generation for Verifying Fog Systems at Deployment TimeHiba Awad, Thomas Ledoux, Hugo Bruneliere, Jonathan Rivalan. 1674-1691 [doi]
- Towards Enforcing Structural OCL Constraints using Constraint ProgrammingMatthew Coyle, Théo Le Calvar, Samir Loudni, Massimo Tisi. 1692-1701 [doi]
- Migrating Monolithic Web Applications to Microservice Architectures Considering Dependencies on Databases and ViewsSi-Hyun Kim, Jaewon Oh. 1702-1711 [doi]
- Claim vs. Capability: A Comparative Analysis of the SBOM Generation Tools for Rust ProjectsMd. Fazle Rabbi, Arifa Islam Champa, Minhaz Fahim Zibran. 1712-1720 [doi]
- LLM-guided Predicate Discovery and Data Augmentation for Learning Likely Program InvariantsYuan Xia, Aabha Shailesh Pingle, Deepayan Sur, Jyotirmoy Deshmukh, Mukund Raghothaman, Srivatsan Ravi. 1721-1729 [doi]
- Quality trade-offs in ML-enabled systems: a multiple-case studyVladislav Indykov, Rebekka Wohlrab, Daniel Strüber 0001. 1730-1737 [doi]
- A self-managing IoT-Edge-Cloud architecture for improved robustness in environmental monitoringAndrea Bombarda, Giuseppe Ruscica, Patrizia Scandurra. 1738-1745 [doi]
- Measuring the Impact of Fuzzing Activity in Networking SoftwareLeon Fernandez, Gunnar Karlsson. 1746-1751 [doi]
- An AI-augmented Framework for Automated and Intelligent Process MonitoringMinh Khoi Nguyen, Hanh Nhi Tran, Ileana Ober, Razan Abualsaud. 1752-1753 [doi]
- Mobile App Quality Assessment: Leveraging LLM-Driven Data Augmentation for Enhanced User Reviews AnalysisBassam Alsanousi, Stephanie Ludi, Hyunsook Do. 1754-1756 [doi]
- Detecting Co-change Using Categorized Commit DataMívian M. Ferreira, Diego Gonçalves, Mariza Andrade da Silva Bigonha, Kecia Aline M. Ferreira, Yuri Carvalhais. 1757-1758 [doi]
- Looseness for Choreography-based Software Architectures on BlockchainFlavio Corradini, Alessandro Marcelletti, Andrea Morichetta 0001, Andrea Polini, Barbara Re 0001, Francesco Tiezzi 0001. 1759-1761 [doi]
- U Can Touch This! Microarchitectural Timing Attacks via Machine ClearsBilly Bob Brumley. 1762-1771 [doi]
- MemBERT: Foundation model for memory forensicsChristofer Fellicious, Mehdi Ben Amor, Johannes Garstenauer, Jelena Mitrovic, Hans P. Reiser, Michael Granitzer. 1772-1779 [doi]
- Swiss Cheese CAPTCHA: A Novel Multi-barrier Mechanism for Bot DetectionAnkit Gangwal, P. Sahithi Reddy, C. y. k. Sagar. 1780-1789 [doi]
- Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power GridDustin Kern, Christoph Krauß, Matthias Hollick. 1790-1799 [doi]
- Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial NetworksViet Ha The, Dustin Kern, Phat Nguyen Tan, Christoph Krauß. 1800-1809 [doi]
- Strengthening Application Security through Integrity Protection of System Call UsageChih-Kai Hsu, Yung-Chi Tseng, Shih-wei Li, Yi-Hui Lin, Wei-Cheng Tian, Lap-Chung Lam, Yu-Chen Liu. 1810-1819 [doi]
- Stealth Extension Exfiltration (SEE) Attacks: Stealing User Data without Permissions via Browser ExtensionsChaejin Lim, Beomjin Jin, Hyoungshick Kim. 1820-1828 [doi]
- Detecting Cache-based Side-Channel Attacks by Leveraging Mesh Interconnect Traffic MonitoringXingchao Bian, Hyungmin Cho. 1829-1838 [doi]
- Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security StandardTimm Lauser, Maximilian Müller, Ingmar Baumgart, Christoph Krauß. 1839-1848 [doi]
- GUARD: Generic API De-obfuscation and Obfuscated Malware Unpacking with sIATSeonJin Hwang, Assem Utaliyeva, Hye Ju Lee, Dongwoon Yoo, Yoon Ho Choi. 1849-1856 [doi]
- Clogging DoS Resilient Bootstrapping of Efficient V2V ValidationZhichao Zhou, Hongyu Jin 0001, Panos Papadimitratos. 1857-1866 [doi]
- Formally Verifying Robustness and Generalisation of Network Intrusion Detection ModelsRobert Flood, Marco Casadio, David Aspinall 0001, Ekaterina Komendantskaya. 1867-1876 [doi]
- Detection of Device Triggerable Vulnerabilities in Android Companion Apps through Interactive TriagingAditya Vardhan Padala, Saurabh Bagchi, Aravind Kumar Machiry. 1877-1885 [doi]
- Towards a Comprehensive Evaluation of Voltage-Based Fingerprinting for the CAN BusAshton McEntarffer, Linxi Zhang, Yu-Wei Liu, Mert D. Pesé. 1886-1893 [doi]
- Automatic Functions Annotations through Concrete Procedural Debugging and ELF LibificationJonathan Brossard. 1894-1898 [doi]
- Enhancing User Experience with Topic-Based Message Retrieval in TelegramAmir Hossein Mohsen Nezhad Baravati, Martina Viganò, Carlo Alberto Bono, Barbara Pernici. 1899-1906 [doi]
- HARIN: A Novel Metric for Hierarchical Topic Model AssessmentHarin Seo, Hwanseong Joo, Byungchul Tak, Young-Kyoon Suh. 1907-1916 [doi]
- A News Recommendation Framework Utilizing ChatGPT: Estimating Target Audience and News CategoriesYoshiyuki Maekawa, Shuichiro Haruta, Yuma Dose, Takahiro Hara. 1917-1926 [doi]
- Language Flavors in the Lusophone World: A BERT-Based Social Media Study of Portuguese in Brazil, Portugal, and MozambiqueAnnie Amorim, Gabriel Assis, Laura Ribeiro, Daniel de Oliveira 0001, Aline Paes. 1927-1934 [doi]
- Robustly Optimized Multimedia Local and Global Context Analysis at Multi-modal BalanceJunho Yoon, Kiho Lim, Chang Choi. 1935-1940 [doi]
- Enhancing user reliability using a contextual-based approach on heterogeneous graphSimone D'Amico, Giancarlo Sperlì, Anna Velyka. 1941-1942 [doi]
- A Circular Construction Product Ontology for End-of-Life Decision-MakingKwabena Adu-Duodu, Stanly Wilson, Yinhao Li, Aanuoluwapo Oladimeji, Talea Huraysi, Masoud Barati, Charith Perera, Ellis Solaiman, Omer F. Rana, Rajiv Ranjan 0001, Tejal Shah. 1943-1952 [doi]
- LogBabylon: A Unified Framework for Cross-Log File Integration and AnalysisYang Lu 0010, Rabimba Karanjai, Dana Alsagheer, Keshav Kasichainula, Lei Xu 0012, Weidong Shi, Shou-Hsuan Stephen Huang. 1953-1960 [doi]
- Taxonomy Expansion through Collaborative LLM MappingSimone D'Amico, Alessia De Santo, Mario Mezzanzanica, Fabio Mercorio. 1961-1968 [doi]
- SkiLLMo: Normalized ESCO Skill Extraction through Transformer ModelsLorenzo Malandri, Fabio Mercorio, Antonio Serino. 1969-1978 [doi]
- LogSage: Log Summarization Assistant with Guided EnhancementYang Lu. 1979-1981 [doi]
- BiCoq : Bigraphs Formalisation with CoqCécile Marcon, Cyril Allignol, Célia Picard, Blair Archibald, Michele Sevegnani, Xavier Thirioux. 1982-1989 [doi]
- Weakest Safe Context Synthesis by Symbolic Game Semantics and Logical AbductionAleksandar S. Dimovski. 1990-1997 [doi]
- Verifying Timed Properties of Programs in IoT nodes using Parametric Time Petri NetsÉtienne André, Jean-Luc Béchennec, Sudipta Chattopadhyay 0001, Sébastien Faucou, Didier Lime, Dylan Marinho, Olivier H. Roux, Jun Sun 0001. 1998-2006 [doi]
- Formal Modeling and Verification of Low-Level AUTOSAR OS Specifications: Towards Portability and CorrectnessVignesh Manjunath, Tobias Scheipel, Marcel Baunach. 2007-2016 [doi]
- HyPoPE: A Hybrid Proof of Participation and Efficiency Protocol for Secure IoT Blockchain NetworksAditya Aryaman Das, Gautam Srivastava. 2017-2023 [doi]
- Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat DetectionTanish Patel, Rutvij H. Jhaveri, Dhavalkumar Thakker, Sandeep Verma, Palash Ingle. 2024-2031 [doi]
- Balancing the Scales: Using GANs and Class Balance for Superior Malware DetectionAttaullah Bolzano Buriro, Flaminia Venice Luccio, Muhammad Azfar Bolzano Yaqub. 2032-2039 [doi]
- Towards Efficient Mobility Management in 5G-Advanced: A Predictive Model for Network Slice AvailabilityMuhammad Ashar Tariq, Mahnoor Ajmal, Malik Muhammad Saad 0001, Ayesha Siddiqa, Seri Park, Dongkyun Kim. 2040-2047 [doi]
- Predicting Battery Levels of Sensor Nodes Using Reinforcement Learning in Harsh Underground Mining EnvironmentsManish Yadav, Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong. 2048-2057 [doi]
- Securing MQTT using Pseudo Random Number GenerationAnantha Raman Srikanthan, Gautam Srivastava. 2058-2061 [doi]
- An Adversarial Model with Diffusion for Robust Recommendation against Shilling AttackThi-Hanh Le, Padipat Sitkrongwong, Panagiotis Andriotis, Quang-Thuy Ha, Atsuhiro Takasu. 2061-2068 [doi]
- An Unsupervised Approach for Aspect-Based Sentiment Classification Using Attentional Neural ModelsLuca Zampierin, Flavius Frasincar. 2069-2077 [doi]