Abstract is missing.
- Towards a Taxonomy of AI Risks in the Health DomainDelaram Golpayegani, Joshua Hovsha, Leon W. S. Rossmaier, Rana Saniei, Jana Misic. 1-8 [doi]
- Measuring Reproduciblity of Machine Learning Methods for Medical DiagnosisHana Ahmed, Roselyne Tchoua, Jay F. Lofstead. 9-16 [doi]
- Data-driven Assessment of Dementia Caregivers' Burden: One size does not fit allHilda Goins, Mohd Anwar. 17-21 [doi]
- Enhanced Plastic Recycling using RGB+Depth Fusion with MassFaster and MassMask R-CNNDillam Jossue Diaz Romero, Isiah Zaplana, Simon Van den Eynde, Wouter Sterkens, Toon Goedemé, Jef Peeters. 22-29 [doi]
- Effectiveness of Deep Learning for Erasing Satellite Streaks in Astronomical PhotosAkshata Tiwari. 30-31 [doi]
- A Hybrid Approach for Automatic Feedback Generation in Natural Language ProgrammingYue Zhan, Michael S. Hsiao. 32-39 [doi]
- Generating Natural Language Explanations for Black-Box PredictionsTejaswani Verma, Christoph Lingenfelder, Dietrich Klakow. 40-46 [doi]
- Neural Network Modeling of HIV Acute and Chronic Phases With and Without Antiretroviral InterventionCharlotte Lew. 47-54 [doi]
- Learning Programming in Social Media: An NLP-powered Reddit StudyYang Liu, Mohd Anwar. 55-58 [doi]
- Leveraging Differences in Entropy for Password Generating ModelsMichael Williamson, Taehyung Wang. 59-62 [doi]
- Extensions to Generalized Annotated Logic and an Equivalent Neural ArchitecturePaulo Shakarian, Gerardo I. Simari. 63-70 [doi]
- Inclusion and Exclusion Criteria for Automating Adherence to Scope of Conference Calls for PapersAdam Craig, Carl Taswell. 71-74 [doi]
- A Language Model identifies population-level features of the T cell Receptor via self-supervised learningRomi Goldner Kabeli, Sol Efroni. 75-78 [doi]
- Multimodal Recommender System in the Prediction of Disease ComorbidityAashish Cheruvu. 79-82 [doi]
- A language processing-free unified spam detection framework using byte histograms and deep learningYassine Belkhouche. 83-86 [doi]
- Twitter Bot Detection using Social Network AnalysisThi Bui, Katerina Potika. 87-88 [doi]
- Rapid Betweenness Centrality Estimates for Transportation Networks using Capsule NetworksAbdul Matin, Samuel Armstrong, Saptashwa Mitra, Shrideep Pallickara, Sangmi Lee Pallickara. 89-96 [doi]
- Tuning Small Datasets for a Custom Apple Sorting System based on Deep LearningMinori Endo, Pauline N. Kawamoto. 97-100 [doi]
- Characterizing Coding Style of Phishing Websites Using Machine Learning TechniquesMay Almousa, Ruben Furst, Mohd Anwar. 101-105 [doi]
- Learning to Evolve Procedural Content in Games Using Cultural AlgorithmsSarah Saad, Thomas Palazzolo, Chencheng Zhang, Robert G. Reynolds, Ashley Lemke, John O'Shea, Cailen O'Shea. 106-115 [doi]
- Establishing Transparency in Artificial Intelligence SystemsLars Quakulinski, Adamantios Koumpis, Oya Deniz Beyan. 116-121 [doi]
- Contextualizing Lung Nodule Malignancy Predictions with Easy vs. Hard Image ClassificationEdward Xu, Thiruvarangan Ramaraj, Roselyne Tchoua, Jacob Furst 0001, Daniela Raicu. 122-127 [doi]
- Making Machine Learning Datasets and Models FAIR for HPC: A Methodology and Case StudyPei-Hung Lin, Chunhua Liao, Winson Chen, Tristan Vanderbruggen, Murali Emani, Hailu Xu. 128-134 [doi]
- Classifying Imbalanced Data with AUM LossJoseph R. Barr, Toby Dylan Hocking, Garinn Morton, Tyler Thatcher, Peter Shaw 0001. 135-141 [doi]
- Graph Embedding: A Methodological SurveyJoseph R. Barr, Peter Shaw 0001, Faisal N. Abu-Khzam, Tyler Thatcher, Toby Dylan Hocking. 142-148 [doi]
- Interpretable linear models for predicting security vulnerabilities in source codeToby Dylan Hocking, Joseph R. Barr, Tyler Thatcher. 149-155 [doi]
- Cyber Threat Intelligence and Machine LearningJon C. Haass. 156-159 [doi]