Abstract is missing.
- Preventing Neural Network Weight Stealing via Network ObfuscationKálmán Szentannai, Jalal Al-Afandi, András Horváth. 1-11 [doi]
- Applications of Z-Numbers and Neural Networks in EngineeringRaheleh Jafari, Sina Razvarz, Alexander E. Gegov. 12-25 [doi]
- 5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G SpectrumJan Sher Khan, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell 0001, William J. Buchanan. 26-36 [doi]
- Adaptive Blending Units: Trainable Activation Functions for Deep Neural NetworksLeon René Sütfeld, Flemming Brieger, Holger Finger, Sonja Füllhase, Gordon Pipa. 37-50 [doi]
- Application of Neural Networks to Characterization of Chemical SensorsMahmoud Zaki Iskandarani. 51-60 [doi]
- Application of Machine Learning in Deception DetectionOwolafe Otasowie. 61-76 [doi]
- A New Approach to Estimate the Discharge Coefficient in Sharp-Crested Rectangular Side Orifices Using Gene Expression ProgrammingHossein Bonakdari, Bahram Gharabaghi, Isa Ebtehaj, Ali Sharifi. 77-96 [doi]
- DiaTTroD: A Logical Agent Diagnostic Test for Tropical DiseasesSandra Mae W. Famador, Tardi Tjahjadi. 97-115 [doi]
- A Weighted Combination Method of Multiple K-Nearest Neighbor Classifiers for EEG-Based Cognitive Task ClassificationAbduljalil Mohamed, Amer Mohamed, Yasir Mustafa. 116-131 [doi]
- Detection and Localization of Breast Tumor in 2D Using Microwave ImagingAbdelfettah Miraoui, Lotfi Merad Sidi, Mohamed Meriah. 132-141 [doi]
- Regression Analysis of Brain Biomechanics Under Uniaxial DeformationO. AbuOmar, F. Patterson, R. K. Prabhu. 142-149 [doi]
- Exudate-Based Classification for Detection of Severity of Diabetic Macula EdemaNandana Prabhu, Deepak Bhoir, Nita Shanbhag, Uma Rao. 150-160 [doi]
- Analysis and Detection of Brain Tumor Using U-Net-Based Deep LearningVibhu Garg, Madhur Bansal, A. Sanjana, Mayank Dave. 161-173 [doi]
- Implementation of Deep Neural Networks in Facial Emotion Perception in Patients Suffering from Depressive Disorder: Promising Tool in the Diagnostic Process and Treatment EvaluationKrzysztof Michalik, Katarzyna Kucharska. 174-184 [doi]
- Invisibility and Fidelity Vector Map Watermarking Based on Linear Cellular Automata TransformSaleh Al-Ardhi, Vijey Thayananthan, Abdullah Basuhail. 185-197 [doi]
- Implementing Variable Power Transmission Patterns for Authentication PurposesHosam Alamleh, Ali Abdullah S. AlQahtani, Dalia Alamleh. 198-203 [doi]
- SADDLE: Secure Aerial Data Delivery with Lightweight EncryptionAnthony Demeri, William Diehl, Ahmad Salman. 204-223 [doi]
- Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical DevicesRobert Heras, Alexander Perez-Pons. 224-243 [doi]
- Enhanced Security Using Elasticsearch and Machine LearningOvidiu Negoita, Mihai Carabas. 244-254 [doi]
- Memory Incentive Provenance (MIP) to Secure the Wireless Sensor Data StreamMohammad Amanul Islam. 255-277 [doi]
- Tightly Close It, Robustly Secure It: Key-Based Lightweight Process for Propping up Encryption TechniquesMuhammed Jassem Al-Muhammed, Ahmad Al-Daraiseh, Raed Abu Zitar. 278-301 [doi]
- Statistical Analysis to Optimize the Generation of Cryptographic Keys from Physical Unclonable FunctionsBertrand Cambou, Mohammad Mohammadi, Christopher Philabaum, Duane Booher. 302-321 [doi]
- Towards an Intelligent Intrusion Detection System: A Proposed FrameworkRaghda Fawzey Hriez, Ali Hadi, Jalal Omer Atoum. 322-335 [doi]
- LockChain Technology as One Source of Truth for Cyber, Information Security and PrivacyYuri Bobbert, Nese Ozkanli. 336-347 [doi]
- Introduction of a Hybrid Monitor for Cyber-Physical SystemsJ. Ceasar Aguma, Bruce McMillin, Amelia Regan. 348-360 [doi]
- Software Implementation of a SRAM PUF-Based Password ManagerSareh Assiri, Bertrand Cambou, Duane Booher, Mohammad Mohammadinodoushan. 361-379 [doi]
- Contactless Palm Vein Authentication Security Technique for Better Adoption of e-Commerce in Developing CountriesSunday Alabi, Martin White, Natalia Beloff. 380-390 [doi]
- LightGBM Algorithm for Malware DetectionMouhammd Al-Kasassbeh, Mohammad Ali Abbadi, Ahmed M. Al-Bustanji. 391-403 [doi]
- Exploiting Linearity in White-Box AES with Differential Computation AnalysisJakub Klemsa, Martin Novotný. 404-419 [doi]
- Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology ConstructionMeng Huang, Tao Li, Hui Zhao 0007, XiaoJie Liu, Zhan Gao. 420-430 [doi]
- Windows 10 Hibernation File ForensicsAhmad Ghafarian, Deniz Keskin. 431-445 [doi]
- Behavior and Biometrics Based Masquerade Detection Mobile ApplicationPranieth Chandrasekara, Hasini Abeywardana, Sammani Rajapaksha, Sanjeevan Parameshwaran, Kavinga Yapa Abeywardana. 446-458 [doi]
- Spoofed/Unintentional Fingerprint Detection Using Behavioral Biometric FeaturesAmmar S. Salman, Odai S. Salman. 459-470 [doi]
- Enabling Paratransit and TNC Services with Blockchain Based Smart ContractsAmari N. Lewis, Amelia C. Regan. 471-481 [doi]
- A Review of Cyber Security Issues in Hospitality IndustryNeda Shabani, Arslan Munir. 482-493 [doi]
- Extended Protocol Using Keyless Encryption Based on MemristorsYuxuan Zhu, Bertrand Cambou, David Hély, Sareh Assiri. 494-510 [doi]
- Recommendations for Effective Security Assurance of Software-Dependent SystemsJason Jaskolka. 511-531 [doi]
- On Generating Cancelable Biometric Templates Using Visual Secret SharingManisha, Nitin Kumar. 532-544 [doi]
- An Integrated Safe and Secure Approach for Authentication and Secret Key Establishment in Automotive Cyber-Physical SystemsNaresh Kumar Giri, Arslan Munir, Joonho Kong. 545-559 [doi]
- How Many Clusters? An Entropic Approach to Hierarchical Cluster AnalysisSergei Koltcov, Vera Ignatenko, Sergei Pashakhin. 560-569 [doi]
- Analysis of Structural Liveness and Boundedness in Weighted Free-Choice Net Based on Circuit Flow ValuesYojiro Harie, Katsumi Wasaki. 570-580 [doi]
- Classification of a Pedestrian's Behaviour Using Dual Deep Neural NetworksJames Spooner, Madeline Cheah, Vasile Palade, Stratis Kanarachos, Alireza Daneshkhah. 581-597 [doi]
- Towards Porting Astrophysics Visual Analytics Services in the European Open Science CloudEva Sciacca, Fabio Vitello, Ugo Becciani, Cristobal Bordiu, Filomena Bufano, Antonio Calanducci, Alessandro Costa, Mario Raciti, Simone Riggi. 598-606 [doi]
- Computer Graphics-Based Analysis of Anterior Cruciate Ligament in a Partially Replaced KneeAhmed Imran. 607-612 [doi]
- An Assessment Algorithm for Evaluating Students Satisfaction in e-Learning Environments: A Case StudyM. Caramihai, Irina Severin, Ana Maria Bogatu. 613-621 [doi]
- The Use of New Technologies in the Organization of the Educational ProcessYevgenia A. Daineko, N. T. Duzbayev, K. B. Kozhaly, Madina T. Ipalakova, Zh. M. Bekaulova, N. Zh. Nalgozhina, R. N. Sharshova. 622-627 [doi]
- Design and Implementation of Cryptocurrency Price Prediction SystemMilena Karova, Ivaylo Penev, Daniel Marinov. 628-643 [doi]
- Strategic Behavior Discovery of Multi-agent Systems Based on Deep Learning TechniqueBoris Morose, Sabina Aledort, Gal Zaidman. 644-651 [doi]
- Development of Prediction Methods for Taxi Order Service on the Basis of Intellectual Data AnalysisN. A. Andriyanov. 652-664 [doi]
- Discourse Analysis on Learning Theories and AIRosemary Papa, Karen Moran Jackson, Ric Brown, David Jackson. 665-672 [doi]
- False Asymptotic Instability Behavior at Iterated Functions with Lyapunov Stability in Nonlinear Time SeriesCharles Roberto Telles. 673-693 [doi]
- The Influence of Methodological Tools on the Diagnosed Level of Intellectual Competence in Older AdolescentsSipovskaya Yana Ivanovna. 694-701 [doi]
- The Automated Solar Activity Prediction System (ASAP) Update Based on Optimization of a Machine Learning ApproachAli K. Abed, Rami Qahwaji. 702-717 [doi]