Abstract is missing.
- A Survey on Post-Quantum Cryptography for 5G/6G CommunicationsRongjie Zhou, Huaqun Guo, Francis E. C. Teo, Spiridon Bakiras. 1-6 [doi]
- An Efficient Multi-Blockchain Approach Towards Secure Platoon ManagementDanial Ritzuan Junaidi, Maode Ma, Rong Su 0001. 1-6 [doi]
- A SIEM and Multiple Analysis Software Integrated Malware Detection ApproachDaiyu Sim, Huaqun Guo, Luying Zhou. 1-7 [doi]
- Impact Analysis of Contamination and Sensor Placement in Water Distribution Network in Kochi, IndiaNibi Kulangara Velayudhan, Aryadevi Remanidevi Devidas, Maneesha Vinodini Ramesh, Durgapu Sathvik, Janvi P, Kolluru Durga Naga Venkata Sreeja, Shyju P. Thadathil. 1-7 [doi]
- EV-FuseMODNet: Moving Object Detection Using the Fusion of Event Camera and Frame CameraHaixin Sun, Song-Ming Chen, Minh Quan Dao, Vincent Frémont. 1-6 [doi]
- Energy Conservation Strategies for Increased Sustainability and Energy Efficiency in Urban FarmingAndrew Keong Ng, Jing Zhi Chin, R. Mahkeswaran. 1-6 [doi]
- VishingDefender: An Advanced Vishing Defence System Against Vishing AttacksWaafi Abdullah Bin Adam, Ivriah Yue Xuan Tan, Chung Shing Lai, Nurtiara Tania Rahim, Benjamin Yu Bin Tham, Huaqun Guo. 1-8 [doi]
- Unifying Web Security Assessments with MALA: A Modular ApproachZeus Sze Hao Chan, Hon Ngee Teo, Jing Hao Lim, Leslie Zhen Yong Tan, Huaqun Guo. 1-7 [doi]
- Cycling Simulation in Virtual Reality for Autonomous Vehicle Traffic ScenariosAdriel Yeo, Benjamin Wei Jie Kwok, Zi Feng Wong, Guo-Xun Koh, Ryan W. Tan, Krystal Yamin, Yeni Liew, Derwin H. Yan, Jeannie S. Lee. 1-6 [doi]
- VulnGen: Vulnerable Virtual Machine GeneratorWei Herng Ang, Huaqun Guo, Eyasu Getahun Chekole. 1-8 [doi]
- Blind Estimation of a Scrambler in Long-Code Direct Sequence Spread Spectrum SystemsDongyeong Kim, Yooncheol Choi, Dongweon Yoon. 1-6 [doi]
- Application of Machine Learning for Link Adaptation in VANETsEtienne Alain Feukeu, Mbuyu Sumbwanyambe. 1-5 [doi]
- A Literature-Based Comprehensive Model for Factors Affecting Firm Productivity in the Service SectorHamdi A. Bashir, Sarah Abdul-kadir Hamid, Salah Haridy, Mohammad Shamsuzzaman, Udechukwu Ojiako. 1-7 [doi]
- Active SLAM Utility Function Exploiting Path EntropyMuhammad Farhan Ahmed, Vincent Frémont, Isabelle Fantoni. 1-7 [doi]
- AfterImage: Evading Traditional Indicator of Compromise (IOC) BlockingDavis Yang Zheng, Ken Kwok Sheng Tong, Mario Tow Ann Lim, Wei Jie Chan, Weihan Goh. 1-6 [doi]
- Mitigating Catastrophic Forgetting in Continual Learning-Based Image ClassificationSwarali Borde. 1-16 [doi]
- A Framework for Understanding the Weaponisation of the InternetIan McLoughlin. 1-7 [doi]
- Collaborative Navigation Strategies Based on Vehicles Features in Connected EnvironmentsCharlotte Beaune, Elwan Héry, Vincent Frémont, Antonio Sgorbissa, Carmine Recchiuto. 1-7 [doi]
- ASAP: Application Security Assessment ProtocolVivek Balachandran, Ryan Fraser Kirwan, Peter Loh, Mohamed Riaz Ebrahim, Ravishanker Kusuma. 1-4 [doi]
- Factor Analysis-Based Method for Clustering Taxi ZonesHamdi A. Bashir, Salah Haridy, Mohammad Shamsuzzaman, Sarah Abdul-kadir Hamid. 1-5 [doi]
- Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset CollectorAditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirrnare, Vivek Balachandran, Tamal Das. 1-7 [doi]
- A Dynamic Object Removal and Reconstruction Algorithm for Point CloudsSarat Chandra Nagavarapu, Anuj Abraham, Nithish Muthuchamy Selvaraj, Justin Dauwels. 1-8 [doi]
- Mobility Assistance for the Visually Impaired in Unstructured EnvironmentAnwesha Chakravarty, Ayesha Choudhary. 1-8 [doi]
- Cyber Range Revolution: Transforming the Future of Cybersecurity TrainingTerence Charles Ong, Benjamin Premkumar, Huaqun Guo. 1-6 [doi]
- Linking Mobility Traces of the Same User Across Different DatasetsDylan Zhang, Homin Park, Shili Xiang. 1-8 [doi]
- Self-supervised Deep Learning Based End-to-End Face Verification Method using Siamese NetworkEnoch Solomon, Abraham Woubie, Eyael Solomon Emiru. 1-6 [doi]
- Concept About Shared Digital Twin of EV Batteries to Improve the Data Exchange in the Context of Battery TransportMax Plotnikov, Arkadius Schier. 1-6 [doi]
- Water-Puddle Segmentation Using Deep Learning in Unstructured EnvironmentsAditya Kumar, Ayesha Choudhary. 1-6 [doi]
- Perception Pipeline of Autonomous Mobile Robots Using 3D Point Cloud ClassificationAbdul Hady Bin Zaydie, Malcolm Yoke-Hean Low, Weidong Lin 0001. 1-7 [doi]
- Unveiling Latent Spaces with Variational AutoencodersShyam Shanckin, Mayank, Anshuman Singh, Rahul Patwadi. 1-5 [doi]