


default search action
49th COMPSAC 2025: Toronto, ON, Canada
- Hossain Shahriar, Kazi Shafiul Alam, Hiroyuki Ohsaki, Stelvio Cimato, Miriam A. M. Capretz, Shamem Ahmed, Sheikh Iqbal Ahamed, AKM Jahangir Alam Majumder, Munirul Haque, Tomoki Yoshihisa, Alfredo Cuzzocrea, Michiharu Takemoto, Nazmus Sakib, Marwa Elsayed:

49th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2025, Toronto, ON, Canada, July 8-11, 2025. IEEE 2025, ISBN 979-8-3315-7434-5 - João Nunes, Thamer Horbylon Nascimento

, Juliana Paula Felix, Fabrízzio Soares:
Real-Time Hand Gesture Recognition for Touchless Video Control Using MediaPipe and Random Forest. 1776-1781 - Shiori Oomoto, Miki Enoki, Masato Oguchi:

Optimization of Prompt Segmentation for Improving Event Recommendation Accuracy Using Generative Artificial Intelligence. 295-300 - Nick Cliffel, Rajiv Ramnath:

Optimizing Sports Predictions Using Model Selection: A Case Study in Reproducible Data-Science. 283-288 - Yuto Kakihara, Shota Inoue, Hiroyuki Ohsaki:

From Fine to Coarse: Analyzing Degree Distribution in Graph Coarsening. 1-10 - Nuno Pombo:

Empowering Educators for the Future: Leveraging Futuristic Thinking and Emerging Technologies. 147-152 - Yuqi Wang, Chunli Xie, Wenbin Zhang, Xin Qiu:

FRCS-LLM: A Framework for Refining Code Summarization in Large Language Models via Pre-trained Models. 1244-1253 - Ke Li

, Cameron Baird, Dan Lin:
VocalTrust: Preventing Impostors to Enhance Trustworthiness of Voice Authentication. 1077-1088 - Joan Tejera, Swapna S. Gokhale, Elizabeth S. Gromisch:

Trustworthiness Features of Commercially Available Mobile Health (mHealth) Applications. 1928-1933 - Edin Jelacic, Cristina Seceleanu, Peter Backeman, Ning Xiong, Tiberiu Seceleanu, Axel Jantsch:

A Conformal Prediction-Based Framework for CPU Load Forecasting: A Black-Box Approach. 361-370 - Mirza Rehenuma Tabassum, Sadaf Mustafiz:

Addressing Context Awareness Requirements of IoT Systems: A Model-Driven Approach. 1462-1473 - George O. M. Yee:

Designs for Reducing Data Breach Impact. 2289-2294 - Clare E. Laney, Andrew Barovic, Armin Moin:

Automated Duplicate Bug Report Detection in Large Open Bug Repositories. 450-458 - Swapnil Yasasvi, Nilanjan Sinhababu, Suman Kumar Chakraborty, Shuvo Bardhan:

Vendor PulseGen: Generative Vendor Risk Management Platform. 1498-1501 - Zhiyao Wang, Xiujing Guo, Tatsuhiro Tsuchiya:

Graph-Centric Approaches for Coverage Optimization in Software Requirement Testing. 1270-1280 - Sulalitha Bowala, Md. Erfanul Hoque, Hina Shaheen, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Alex Paseka:

On the Superiority of Data-Driven Combined Forecasts Based on Deep Learning Models. 391-400 - Ankit Shetgaonkar, Dipen Pradhan, Lakshit Arora, Sanjay Surendranath Girija, Aman Raj, Shashank Kapoor:

Mitigating Clinician Information Overload: Generative AI for Integrated EHR and RPM Data Analysis. 2032-2039 - Joy Dip Das, Ruppa K. Thulasiram, Sulalitha Bowala, Avanthi Saumyamala, Aerambamoorthy Thavaneswaran:

Hybrid LSTM/GRU and Support Vector Regression Models for Stock Index Prediction. 1917-1922 - Manavjit Singh Dhindsa, Kshirasagar Naik, Pin-Han Ho, Marzia Zaman, Chung-Horng Lung, Srinivas Sampalli, Thambirajah Ravichandran:

Vi-Net: A Hybrid Semantic Segmentation Approach for Enhanced Wildfire Spread Prediction. 312-317 - Chongchong Yang, Wenhao Zhu, Zhiqiang Yang, Chaoqian Liu, Jianfeng Hong:

Chain-of-Summary: An Efficient Multi-Clustering Framework for Hierarchical Abstraction. 673-682 - Corentin Artaud, Rafael Pina, Varuna De Silva, Xiyu Shi:

Investigating Transferability in Multi-Agent Reinforcement Learning. 1583-1588 - Kosei Shimoda, Daisuke Kotani, Yasuo Okabe:

Impact Evaluation of Attacks on Data Flows in Systems With Heterogeneous Redundant Resources. 2184-2191 - Louis Nisiotis, Charalampos Nikolaou, Nikita Markov, Aimilios Hadjiliasi:

Developing a Cyber-Physical-Social Metaverse System for Interactive Cultural Heritage Experiences. 654-663 - Nimrod Busany, Ethan Hadar, Hananel Hadad, Gil Rosenblum, Zofia Maszlanka, Okhaide Akhigbe, Daniel Amyot:

Automating Business Intelligence Requirements with Generative AI and Semantic Search. 1891-1898 - Daxin Peng, Jianqiang Li, Liang Qu, Jing Huang, Xi Xu, Jianyu Liu, Zhenbin Xie, Qing Xiao, Xueyan Zhang, Junyu Zhao, Qixin Chen, Wenyi Liang:

Metal Artifact Reduction Methods Using Deep Generative Models for Cultural Relics X-ray CT Images. 707-712 - Sirui Lv, Jianqiang Li, Yinuo Ouyang, Hongzhi Qi, Yinan Jiang, Qing Zhao:

A Contrastive Learning and Region-Guided Approach for Long Clinical Text Classification. 2094-2099 - Olga Manakina, Chung-Horng Lung:

Designing Reusable LLM-Enhanced Assignments: A Quality-Oriented Framework for Software Engineering Education. 2212-2217 - Ramin Ranjbarzadeh, Shokofeh Anari, Martin Cunneen, Malika Bendechache:

Lightweight Deep Learning with Virtual Reality Visualization for Offline Tumor Segmentation in Rural Environments. 1577-1582 - Eduardo Amorim, Thamer H. Nascimento

, Ana Valdo, Juliana Paula Felix, Luciana Cardoso, Renan V. Aranha, Fabrízzio Soares:
Enhancing Chemistry Education: Evaluating Methods for Classifying Hand-Drawn Molecules and Generating 3D Visualizations. 105-110 - Tommaso Caiazzi, Stefano Iannucci, Valerio Marini, Diego Pennino

, Maurizio Pizzonia, Riccardo Torlone:
A Novel Architecture for Cyber-Resilient Self-Protecting Systems Based on Blockchain. 1-8 - Md. Asif Tanvir, Fahim Ahmed Irfan, Razib Iqbal:

SEAD: Sensor Event-Based Anomaly Detection for Smart Home Automation. 1492-1497 - Amir Eskandari, Aman Anand, Drishti Sharma, Farhana H. Zulkernine:

SDA-GRIN for Adaptive Spatial-Temporal Multivariate Time Series Imputation. 1801-1806 - Trevor Hanz, Mohammad Ali, Zarif Sadman, Apan Qasem:

Autotuning CNN Workloads on the Edge: A Hybrid Approach with Cross-Domain Embeddings. 421-430 - Lucas Hartman, Ethan Pigou, Nicholas Strzelczyk, Santiago Gomez-Rosero

, Miriam A. M. Capretz:
Robust Smartphone Screen Integration with Deep Learning for Virtual Reality Pass-through. 1437-1443 - Aishi Huang:

Ethical Dimensions of Artificial Intelligence in Personalized Medicine: Navigating Challenges and Shaping Future Policies. 895-900 - Isaac Ampratwum, Amiya Nayak:

Graph Neural Network-Based Internet Traffic Prediction in 6G Networks with Genetic Algorithm Hyperparameter Optimization. 743-748 - Naoki Matsumoto, Tomoya Kawanishi, Kenji Ohira, Masahiro Kozuka:

yak: WebAssembly-based Data Analysis Platform with Data Providers Driven Analysis Control. 1116-1125 - Gaspard Damoiseau-Malraux, Satoru Kobayashi, Kensuke Fukuda:

Automatically pinpointing original logging functions from log messages for network troubleshooting. 778-787 - Kéthlyn Campos Silva, Felipe Sá, Deborah S. A. Fernandes, Marcio G. C. Fernandes, Fabrízzio Soares:

A Deep Reinforcement Learning Approach for Portfolio Optimization of Brazilian Assets Using Fundamental and Sentiment Indicators. 1879-1884 - Silvio Vidal de Miranda, Welington Galvão, Gabriel Vieira, Fabrízzio Soares:

Comparative Study of Depth Anything Model V2 and LiDAR sensors for Depth Map Estimation in Forest Environment. 1651-1656 - Igor Bogdanov, James Green:

Infant Care Video Dataset for Classification of Interventions Using Transformers. 2130-2135 - Quentin Kembellec, Karima Boutalbi, Olivier Le Van

:
A Novel Assistant for Question-Answering from Training Video Sessions Using RAG. 683-688 - Avanthi Saumyamala, Sulalitha Bowala, Md. Erfanul Hoque, Aerambamoorthy Thavaneswaran, Alex Paseka, Ruppa K. Thulasiram:

Novel Data Driven High Dimensional Volatility Networks and Dynamic Price Networks. 1807-1812 - Carlos Gerardo Valeriano, Abouzar Estebsari, Lorenzo Bottaccioli, Edoardo Patti, Daniele Salvatore Schiera

, Luca Barbierato
:
Design and Evaluation of Vertical Scalability Strategies for Deploying Large-scale Co-simulations. 2046-2052 - Simone Albero, Tommaso Caiazzi, Stefano Iannucci, Paolo Merialdo, Riccardo Torlone:

Leveraging Semi-Supervised Learning to Reduce Labeled Data Requirements in Intrusion Detection. 262-267 - Fatma Refaat Ahmed, Nabeel Al-Yateem, Sahel Mohammad Hajian, Meera Essam, Noura Mohamad, Alounoud Almarzooqi, Heba Khalil, Muhammad Arsyad Subu, Jacqueline Maria Dias, Mini Sara Abraham, Mohannad AbuRuz, Heba Mustafa, Ahmed Rajeh Saifan:

Digital Disruption: Investigating the Effects of Nighttime Technology Use on Researchers' Sleep Quality and Psychological Wellbeing. 1980-1983 - Riddhiman Adib, Md Mobasshir Arshed Naved, Chih-Hao Fang, Md. Osman Gani, Ananth Grama, Paul M. Griffin, Uzma Hasan, Sheikh Iqbal Ahamed, Mohammad Adibuzzaman:

CKH: Causal Knowledge Hierarchy for Estimating Structural Causal Models from Data and Priors. 256-261 - Takeshi Ogawa, Hajime Shimada, Hirokazu Hasegawa, Yukiko Yamaguchi:

Privacy-Aware Traffic Log Anonymization Method for Realizing Both Malicious Activity Detection and Privacy. 2192-2197 - Shalini Jayanetti, Sulalitha Bowala, Sumeet Kalia, Aerambamoorthy Thavaneswaran, Md. Erfanul Hoque, Razvan G. Romanescu:

Statistical and Deep Learning Approaches for Risk Assessment and Volatility Forecasting in Renewable Energy Investments. 340-349 - Burcu Ergun, Tugkan Tuglular, Fevzi Belli:

Avoidance of Feature Configuration Faults in Software Product Lines. 1427-1436 - Eunice Ledres, Hannes Bauser, Shahram Latifi:

Analyzing Deep Convective Cloud Properties for Philippines' Monsoon Heavy Precipitation Using Self-Organizing Maps. 471-476 - Khalid Hasan

, Jamil Saquer, Mukulika Ghosh:
Advancing Mental Disorder Detection: A Comparative Evaluation of Transformer and LSTM Architectures on Social Media. 193-202 - Sanjay Surendranath Girija, Lakshit Arora, Shashank Kapoor, Dipen Pradhan, Aman Raj, Ankit Shetgaonkar:

Optimizing LLMs for Resource-Constrained Environments: A Survey of Model Compression Techniques. 1657-1664 - Omar Ramadan

, Ruoyao Xiao, Dianxiang Xu, Weifeng Xu:
Reconstructing Judicial Digital Forensic Evidence Graphs from Legal Documents Using Large Language Models. 1204-1213 - Thamer Horbylon Nascimento

, Leonardo Silva, Camila Horbylon, Diego Siqueira, Juliana Paula Felix, Renan V. Aranha, Fabrízzio Soares:
Machine Translation of Comics with Visual Reconstruction for Linguistic Accessibility. 2076-2081 - Tom Komar, Philip James:

Internet-of-Things traffic sensor real-time messaging and stream analytics. 1539-1540 - Rajesh Anant Sawant, Ashutosh Sudhir Kumbhar, Aditya Patil, Girish Subhash Nalawade, Jahnavi Gona, Srividya Bansal:

KG-ITP: A Knowledge Graph for Intelligent Travel Planning. 381-390 - Imane Lahyouli, Asad Harnekar, Corinne Lagorre, Yasin Mamatjan:

A Multimodal Framework Integrating Clinical Data and Facial Recognition for Enhanced Stroke Prediction. 2118-2123 - Diego Cruz de Aquino, Everton L. G. Alves:

Zimic: Bridging the Gaps in API Mocking for Typescript Projects. 1406-1415 - Chi Fuk So, Wai Kin Lo:

Enhancing Educational Inclusivity through Interactive AI for Sign Language Interpretation. 1532-1533 - Nikesh Prajapati, Bimal Karki, Saroj Gopali, Akbar Siami Namin:

IoT Malware Network Traffic Detection using Deep Learning and GraphSAGE Models. 1841-1846 - Abdul Barek, Md Bajlur Rashid, Md. Mostafizur Rahman, A. B. M. Kamrul Riad, Guillermo Francia III, Hossain Shahriar, Sheikh Iqbal Ahamed:

Vulnerability to Stability: Scalable Large Language Model in Queue-Based Web Service. 995-1000 - Alireza Norouziazad, Fatemeh Esmaeildoost, Behrouz Homam, Razieh Salahandish:

Grey Wolf Optimizer Enhances Adaptive Atrous Spatial Pyramid Pooling for Efficient Multi-Scale Feature Selection in Medical Image Segmentation. 1571-1576 - Alvin Chin, Justin Chan, Joshua Garcia, Aria Barve, Kevin Leicht, Philip S. Yu:

Improving Social Connections Through Mobile Social Networks. 1770-1775 - Shweta Ware, Kritim K. Rijal, Laura E. Knouse:

SmartADHDMonitor: A Novel Approach to Automatic ADHD Monitoring Through Smartphone App Usage Data. 854-865 - Marina Marchisio Conte, Giulia Boetti, Fabio Roman

, Enrico Spinello, Nikolaos V. Karadimas, Linko Nikolov, Jaroslaw Zelkowski, Andrada Livia Cirneanu:
Empowering Mathematics education in security and defence: technological tools and methodological strategies for motivation enhancement. 131-140 - Francisco Raimundo Albuquerque Parente, Daniel Alexi Braga Fonseca, Sergio Massami Sakai, Edson Jose Bonon, Flavia Martinho Ferreira Rocha, Rafael Tamborim Zansavio, Rodrigo Kenji Yaly Aoki, Fuad Mousse Abinader Junior, Eduardo Melão:

eHealth Mobile Specialist Practice Enabled by Open RAN in Remote Regions of Brazil. 1958-1963 - Zhihao Ying, Dave Towey

, Yifan Zhang
:
Evaluation of the Code Generated By Large Language Models: The State of the Art. 440-449 - Xueyong Tan, Jing Liu:

GRCEM: Generating Optimal Software Rejuvenation Strategies for Cloud-Edge Collaborative Systems Based on MADRL. 1360-1369 - Bara' Nazzal, Manar H. Alalfi, James R. Cordy:

KASTroid: A Static Taint Analysis Framework for Kotlin-Based Android Applications. 2295-2300 - Houssem Chemingui:

Reimagining Business Processes with Large Language Models. 1291-1296 - Youssef Amer, Ehsan Ul Haque, Zhelun Rong, Mohammad Maifi Hasan Khan:

Understandability of the Technology and Benefit May Not Be Enough to Nudge Users: An Exploratory Study in the Context of FIDO2 Adoption Behavior. 607-618 - Aazaade Faraji, Nuno Pombo:

Reimagining Technical Education: Enhancing X-Ops Learning with Speculative and Experiential Pedagogies. 111-120 - Hiroaki Aoyama, Daisuke Kotani, Yasuo Okabe:

Operational Planning of a Home Energy Management System Using Regional Weekly Weather Forecasts to Mitigate Surplus Electricity. 1795-1800 - Naoya Ando, Kazuki Takiguchi, Kenichi Kourai:

Secure Privacy Control inside Clouds with AMD SEV and Nested Virtualization. 83-88 - Hongjun Liu, Changwei Song, Jiaqi Qiang, Jianqiang Li, Hui Pan, Lin Lu, Xiao Long, Qing Zhao, Jiuzuo Huang, Shi Chen:

Comparative Analysis of Pre-trained Deep Learning Models and DINOv2 for Cushing's Syndrome Diagnosis in Facial Analysis. 324-329 - Kazuki Tanabe, Motoki Takenaka, Harunobu Yoshida, Tatsuya Fujiwara, Teruhisa Tajima:

ConPath: A Coordinator for Optimized Network Paths and Automated Traffic Handling. 1541-1546 - Suman Chakraborty, Owais Shaikh

, Shuvo Bardhan:
Extending the Attack Graph Model: Integrating Reconnaissance Stages. 1518-1521 - Manon Renault, Hamoud Younes, Hugo Tessier, Ronan Le Roy, Bastien Pasdeloup, Mathieu Léonardon:

Event Classification of Accelerometer Data for Industrial Package Monitoring with Embedded Deep Learning. 1671-1676 - Yicheng Sun

, Hi Kuen Yu
, Jacky Keung
, Yuchen Cao, Yihan Liao
:
StuLAC: An Adaptive LLM-Driven Framework for Scalable Student Feedback Analysis in Software-Driven Educational Systems. 121-130 - Seiju Gima, Ryozo Kiyohara, Nobuhiro Kobayashi:

Proposal for a Simulation Environment for Reproducing Diverse Combined Attacks in Autonomous Driving Systems. 1782-1788 - Salim Saay

, Sean O'Brien, Amandeep Singh
, Amalia de Götzen
, Viktoria Voronova, Tiziana Margaria:
Diagrams as Visual Knowledge Communication Tools in Interdisciplinary Postgraduate Education. 1694-1699 - Zain Ul Abideen, Junxia Guo:

Intent Based E2E Automated Test Case Generation for Web Applications Using LLM. 1281-1290 - Lakshit Arora, Sanjay Surendranath Girija, Shashank Kapoor, Aman Raj, Dipen Pradhan, Ankit Shetgaonkar:

Explainable Artificial Intelligence Techniques for Software Development Lifecycle: A Phase-specific Survey. 2281-2288 - Sadia Afrin, Marwa A. Elsayed

, Nur Zincir-Heywood:
SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial Attacks. 459-464 - Haowei Liu, Yanxiang Tong, Shunhui Ji, Pengcheng Zhang:

Smart Contract Reentrancy Vulnerability Localization Using Explainable Graph Neural Networks. 1126-1135 - Ikram Darif, Manel Abdellatif, Ghizlane El-Boussaidi:

On the Migration of Legacy Systems to an Event-Driven Architecture: A Survey. 1260-1269 - Hatem Feki, Manel Abdellatif, Mohammed Sayagh:

An Empirical Study on Hugging Face Trends, Topics and Challenges on Stack Overflow. 1297-1307 - Chen Xie, Mingsheng Jiao, Xiaodong Gu, Beijun Shen:

Empowering AI to Generate Better AI Code: Guided Generation of Deep Learning Projects with LLMs. 1394-1399 - Stephen Ryan:

Barriers to the Adoption of Visual Knowledge Management Tools: Challenges at the Intersection of Technology, People, and Process. 1683-1687 - Muhammad Abusaqer

, Jamil Saquer:
A Comparative Analysis of Transformer and Traditional ML Models for Cyberbullying Detection on Twitter (now X). 1607-1612 - Victor Luiz Grechi, André Luíz de Oliveira, Barbara Gallina, Leonardo Montecchi, Rosana T. Vaccare Braga:

Integrating Attack-Fault Trees in the ODE Metamodel to Support Safety and Security Co-Analysis in the Automotive Domain. 63-72 - Lorenzo Giannuzzo, Marco Massano, Daniele Salvatore Schiera

, Francesco Demetrio Minuto
, Davide Papurello
, Francesco Meneghetti, Andrea Lanzini
:
Benchmarking Genetic Algorithms for Short-Term Battery Energy Storage Systems Optimization. 2053-2059 - Maurice Ngouen, Mohammad Ashiqur Rahman

, Alexander Perez-Pons
, Nagarajan Prabakar
:
SGPQ-IoT: Securely Generating Post-Quantum Keys for IoT Devices Using a Quantum Computer. 1108-1115 - Zeinab Sadeghi Chevinli

, Hamidreza Fereidouni
, Michel Kadoch:
Efficient Task Scheduling Using a Hybrid Q-NEH and CS-GW Approach in Fog Computing. 1444-1451 - Soheil Khatibi, Maliheh Marzani, Ruslan Masinjila, Vinicius Prado da Fonseca, Thiago Eustaquio Alves de Oliveira:

Tactile Texture Recognition On Uneven Surfaces Using Self-Attention Based Neural Networks. 543-551 - Sajan Poudel, Abhishek Yadav, Niraj Pandey, Shahid Noor:

Advancing DeFi: A Novel Approach to Accessible and Efficient Decentralized Finance. 505-510 - Rachel Jarvi, James Miele, Hieu Nguyen, Swapna S. Gokhale:

Distinguishing Between Science and Action in Climate Discourse on Reddit. 600-606 - Yihan Zhang, Zhihao Ying, Yifan Zhang, Qian Zhang, Dave Towey:

Exploring the Black-Box: Testing Image Synthesis Systems through Metamorphic Exploration. 2256-2261 - Elizabeth S. Gromisch, Alex D. Manasoiu, Lindsay O. Neto, Aaron P. Turner, Dawn M. Ehde, Thomas Agresta, Heather M. DelMastro, Jodie K. Haselkorn, Swapna S. Gokhale:

Prototype Development and Initial Usability Testing of Managing My MS My Way. 2088-2093 - Ehsan Ul Haque, Mohammad Maifi Hasan Khan:

Understanding the Association of Update Characteristics, Trust, and Cognitive Dissonance with Intention to Update: A Study in the Context of Microsoft Windows. 559-570 - Jenish Modi, A B. M. Bodrul Alam, Muhammad Asaduzzaman:

An Analysis of Task Offloading Approaches in Edge-Cloud Continuum. 1547-1552 - Shunhui Ji, Yu Shi, Changrong Huang, Letian Cheng, Pengcheng Zhang:

MVGText: Momentum and Variance Guided Hard-Label Text Test Case Generation. 1350-1359 - Wanju Kim, Youjeong Noh, Seoksu Lee, Eun-Sun Cho:

Lightweight Classifier for Obfuscation Methods for IoT Devices. 1021-1026 - Yifei Wang

, Jacky Keung
, Haohan Xu, Yuchen Cao, Zhenyu Mao
:
Multi-Strategy Enhanced COA for Path Planning in Autonomous Navigation. 50-55 - Alireza Khaleghi, Hamed Moradi:

Design & Simulation of a Classical Controller to Improve the Performance of a Planar Stick-Slip Micro-Robot. 21-26 - Rajith Anjali, Soki Sakurai:

Testing Intent-Based Test Case Prioritization and Selection using Derived Attributes. 2262-2268 - Md Bajlur Rashid, Abdul Barek, Md. Mostafizur Rahman, Sharmin Yeasmin, Hossain Shahriar, Sheikh Iqbal Ahamed:

Secure iOS mHealth Apps Development: An IDE-Embedded Framework for HIPAA-Aware Coding. 1101-1107 - Jiping Cui, Ali Keivanmarz, Hamid Sharifzadeh:

Traffic Signal Phasing Optimisation using Enhanced Q-network (EDQN). 511-516 - Alice Barana, Alberto Conte, Valeria Fradiante, Marina Marchisio Conte, Sergio Rabellino:

Serious game for higher Mathematics education: evaluation of the learning tool. 2370-2379 - Ping Him Lam

, Francis Cheung, Henry C. B. Chan, Minjuan Wang
:
Metaverse-enabled Learning Using a 6C Model-based Framework. 2352-2359 - Md. Abdur Rahman, Hossain Shahriar, Guillermo Francia, Fan Wu, Alfredo Cuzzocrea, Muhammad Rahman, Md. Jobair Hossain Faruk, Sheikh Iqbal Ahamed:

Fine-tuned Large Language Models (LLMs): Improved Prompt Injection Attacks Detection. 1033-1039 - David Cordero, Yijun Zhao, Priscilla Diaz, Gary M. Weiss:

Unveiling Bias: Analyzing Race and Gender Disparities in AI-Generated Imagery. 318-323 - Carlos D. Q. Lima, Everton L. G. Alves, Wilkerson de L. Andrade, Felipe Torres:

Exploring the Use of LLMs to Reduce the Discarding of MBT Test Cases. 1308-1317 - Vu Tuong Vy Le, Ali Keivanmarz, Hamid Sharifzadeh:

A Two-stage Faster R-CNN Approach for Road Surface Damage Detection. 552-558 - Fozle Rabbi Shafi, M. Anwar Hossain, Salimur Choudhury:

Personalized Mental Health Assistance with Large Language Models. 815-823 - Yujia Qi, Shijia Gu, Wenxian Ma, Nan Wang, Qian Wang:

DeepSem: Multilayer Semantic Image Retrieval for High-Accuracy Multimodal RAG in Industrial Applications. 1388-1393 - Salim Saay

, Tiziana Margaria:
Flipped-classroom Based Teaching Method for Data Structures and Algorithms. 141-146 - Camila T. Ramalho, Alessandro Garcia, Juliana Alves Pereira, Wesley K. G. Assunção, Daniel Coutinho, Caio Barbosa, Carlos Lucena, Rodrigo Ito:

On the Use of GPT to Reveal Common Questions in Developers' Discussions. 1677-1682 - Zhen-Yang Guo, Shuo-Han Chen, Andrew Garland, Wei-Hao Chen, Yu-Pei Liang, Chuan-Ming Liu:

Facilitating the Merging Process of Pull Requests in Automated-Testing Robot Framework. 2313-2318 - Aasish Kumar Sharma, Sanjeeb Prashad Pandey, Julian Martin Kunkel:

Performance Analysis of Convolutional Neural Network By Applying Unconstrained Binary Quadratic Programming. 483-488 - Felipe Honorato Mendes, Giordana de Farias F. B. Bucci, Ana Luísa de Bastos Chagas, Juliana Paula Felix, Fabrízzio Soares:

Assistive Technologies for Teaching Programming to Visually Impaired Learners: A Systematic Review. 2082-2087 - Yifan Zhang

, Tsong Yueh Chen, Rubing Huang, Matthew Pike, Dave Towey
, Zhihao Ying, Zhi Quan Zhou:
Comparative Analysis of Styles in LLM-Generated Code for LeetCode Problems: A Preliminary Study. 1625-1630 - Raj Patel, Hamid R. Sharifzadeh, Maryam Erfanian, Ian McLoughlin, Jacqueline E. Allen:

Analysis and Reconstruction of Laryngectomised Speech using GAN Models. 2106-2111 - Saud Hussain, Faheem Akhtar, Jianqiang Li, Zahid Hussain Khand, Baolin Zhu, Lijun Zhao, Hongzhi Qi:

Interpretable Model for Brain Tumor Segmentation and Patient Survival Data. 2124-2129 - Panagiotis Monachelis, Emily Maitland, Kalypso Iordanou, Charalampos Z. Patrikakis, Evren Yalaz, Pericles Papadopoulos:

Social Media as a Lens for Understanding Public Trust in Science. 203-211 - Matthew Lee, William Flinchbaugh, Eric C. Larson, Mitchell A. Thornton:

Effects of Redundant LiDAR Sensors on Object Hiding Attacks in Autonomous Driving Systems. 39-49 - Áurea Valéria Pereira Silva, Plínio de Sá Leitão Júnior, Juliana Paula Felix:

A Comparative Study of Data Balancing Techniques for Predicting Metastases in Colorectal Cancer Using the SEER Database. 2142-2147 - Ahmed Rajeh Saifan, Saymaa Bassam Yousef AlAkash, Hekmat Yousef Al-Akash, Muhammad Arsyad Subu, Nabeel Al-Yateem, Fatma Refaat Ahmed:

Tele-ICU Nursing in Saudi Arabia: Challenges and Opportunities. 1964-1967 - Yuying Li, Yishan Li, Yan Wang, Jing Liu, Zhuopeng Wang:

CFS-BAS-BP: Traffic Accident Risk Factor Recognition Model based on Combinatorial Feature Selection and Bionic Neural Network. 277-282 - Jeel Piyushkumar Khatiwala

, Daniel Addai, Weifeng Xu:
Evaluating the Reliability of Digital Forensic Evidence Discovered by Large Language Model: A Case Study. 1067-1076 - Suman Chakraborty, Saumyajeet Das, Shuvo Bardhan:

Vulnerability Weightage and Prioritization Model: Derived from Real Data and Community Insights. 1506-1509 - Yuta Ono, Hiroshi Nakamura, Hideki Takase:

Exploring the Possibility of TypiClust for Low-Budget Federated Active Learning. 648-653 - Aasish Kumar Sharma, Christian Boehme, Patrick Gelß, Ramin Yahyapour, Julian M. Kunkel:

Workflow-Driven Modeling for the Compute Continuum: An Optimization Approach to Automated System and Workload Scheduling. 2170-2177 - Kazuma Yokoo, Tohru Kondo, Hidenobu Watanabe, Kaori Maeda, Reiji Aibara:

A Proposal of Policy Routing per End-Host in IPv6 Site Multi-homing using NPTv6. 1559-1564 - Ishrak Jahan Ratul, Zhishan Guo, Kecheng Yang:

Cascading IDK Classifiers to Accelerate Object Recognition While Preserving Accuracy. 1522-1525 - Yasmeen Rawajfih, Ross Arnold:

Towards Emergent Agility: Advancing Software Process Engineering. 1338-1343 - Jaya Keshava Chandra Kotha, Jean-Luc Gaudiot:

A Data-Driven Approach Using Hardware Performance Counters to Detect Micro-Architectural Attacks. 2301-2306 - Md Shahriar Kabir, Sana Alamgeer, Minakshi Debnath, Anne H. H. Ngu:

TransConv-DDPM: Enhanced Diffusion Model for Generating Time-Series Data in Healthcare. 866-875 - Po-Lun Wang, Tseng-Yi Chen:

GraLoc: Preserving Graph Locality to Minimize Read and Write Amplification on Flash Memory. 56-62 - Nayef H. Alshammari:

Message-Passing Based Communication via Asynchronous Execution (Shunts). 2237-2244 - Mosarrat Rumman, Emon Roy, Anushka Zaman, Jeremy S. Bradbury:

A Contrastive Learning Approach to Bug Severity Classification with Large Language Model Embeddings. 1376-1381 - Shahriar Ahmed Zisan, Mohammad Nooruddin, Apan Qasem:

A Multi-Tiered Autotuner for Portable Heterogeneous-Compute Interfaces. 73-82 - Abrar Zuhaer Tariq, Faisal Ahmed, Azad Khandoker, Mahfujur Rahman:

An AI-IoT Framework for Handwritten and Multilingual Prescription Interpretation with Timely Medication Reminder Support. 1938-1943 - Wenxiu Cheng, Jianqiang Li, Xi Xu, Qixin Chen, Junyu Zhao, Boyan Wang, Linna Zhao, Haoran Peng, Li Li, Yo-Ping Huang:

A Meta-Learning Network Guided by Domain Knowledge of Fundus Images for the Diagnosis of High Myopia. 800-805 - Zerui Wang, Yan Liu:

Spatio-temporal Explanation for Adversarial-Aware Cloud Vision AI Services. 2406-2407 - Jianan Dong, Guisheng Fan, Yueming Yu, Yuguo Liang, Yujie Ye, Huiqun Yu, Wentao Chen:

VFProber: A Vulnerability-Fixing Identification Framework Based on Code Changes and Semantic Adjustment. 1174-1183 - Harini Narayanan:

Quantifying creativity in AI-generated podcasts. 1613-1618 - Nilesh Chakraborty, Mohammad Zulkernine:

Is Your PIN Safe Against Advanced Human-Centric Shoulder Surfing? 2307-2312 - Jianqiang Li, Yueqi Chang, Yinuo Ouyang, Xiaoyan Gao, Zihan Ding, Hongzhi Qi:

Semantic Enhanced Relational Graph Attention Network for Chinese Medical Named Entity Recognition. 465-470 - Aasish Kumar Sharma, Julian M. Kunkel:

Grapheon RL: A Graph Neural Network and Reinforcement Learning Framework for Constraint and Data-Aware Workflow Mapping and Scheduling in Heterogeneous HPC Systems. 489-494 - Robin Hapka, Anika Christmann, Rolf Ernst:

A Novel Timing Model for Neural Networks in Safety-critical Systems. 9-20 - Eric Xu, Chimezie Onwuegbuchulem, Sarfraz Shaikh, Lin Deng

:
Leveraging Large Language Models for Generating Training Datasets for Text Extraction from Thumbnails. 1089-1094 - Jin Xu, Huiqun Yu, Guisheng Fan, Shengwei Liu, Hengrun Zhang, Liqiong Chen:

Affinity and Interference-Aware Service Deployment for Energy Efficiency in Cloud Data Centers: A Deep Reinforcement Learning Approach. 759-768 - Amir Eskandari, Tahosina Monir, Farhana H. Zulkernine, Michele Morningstar, Jordan Poppenk, Björn Herrmann:

Towards a Voice-Adaptive LLM-Based Conversation Bot for Enhanced User Interaction. 1984-1989 - Han Zhou, Yu Luo, Mengtao Zhang, Dianxiang Xu:

C2RustTV: An LLM-based Framework for C to Rust Translation and Validation. 1254-1259 - Atsushi Naito, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:

A Time-constrained Verifiable Architecture-based Self-adaptive Software Programming Framework. 2154-2163 - Karla Schäfer, Martin Steinebach:

AI-Generated Text Detection Using RoBERTa: A Generalizability and Explainability Analysis. 701-706 - Shokofeh Anari, Ramin Ranjbarzadeh, Martin Cunneen, Malika Bendechache:

Privacy-Preserving Federated Learning for Human Intention Modeling in Pediatric Cerebral Palsy Using Extended Reality. 1-6 - Jiahao Cai, Vidhi Kokel, Farhana H. Zulkernine, John A. Queenan, David Barber:

Automatic Diagnosis of Hip and Knee Osteoarthritis from Medical Text Records. 806-814 - Hayato Tomisu, Shota Morita, Naoto Kai, Tomoki Yoshihisa:

Narrative-Aware Cycling Route Design Using Generative AI. 1526-1527 - Kimya Khakzad Shahandashti, Mohammad Mahdi Mohajer, Alvine Boaye Belle, Song Wang, Hadi Hemmati Lassonde:

Program Slicing in the Era of Large Language Models. 1224-1233 - Mordechai Guri:

SmartAttack: Ultrasonic Air-Gap Attack via Smartwatches. 932-942 - Van Cu Pham

, Tao Xin, Marios Sioutis, Yasuo Tan:
ELWA Testbed-as-a-Service: An ECHONET Lite Web API Testbed with Heterogeneous IoT Devices. 1758-1763 - Marcus Freire, Marcos Silva, Álvaro Oliveira, Alessandra Jesus, Igor Teles, Andreas Graubach, Hérsio Iwamoto, Eduardo Santana de Almeida, Frederico Durao, Maycon Peixoto, Gustavo Figueiredo, Cássio V. S. Prazeres, Ivan Machado, Bruno Santos, Rodrigo Souza, Rubisley Lemes:

Evaluating YOLOv8 for On-Device Person Detection: Performance and Efficiency on Android Smartphones. 719-728 - Ursula Das, Kshirasagar Naik, Pin-Han Ho, Marzia Zaman, Chung-Horng Lung, Srinivas Sampalli, Thambirajah Ravichandran:

Predicting Wildfire Burned Areas Using Graph Neural Networks. 330-339 - Al Ounoud Al Marzouqi, Fatma Refaat Ahmed, Syed Aziz Ur Rehman, Richard Mottershead, Heba Hesham Hijazi, Wegdan Bani-Issa, Alfan Alketbi, Fatma Hegazy, Ramsha Asghar Kamal, Lara Badwan Hajeer, Shadin Abunahleh:

Exploring knowledge and awareness of Artificial Intelligence among students in the College of Health Sciences. 1968-1973 - Alberto Butera, Julia Staszczak, Patrick Mikalef, Valentina Gatteschi:

Blockchain-Based Source-to-Source News Verification. 1734-1739 - Tyler Nicewarner, Ali A. Allami, Dan Lin:

Stealth Friend Locator: Server Blinded Private Location Sharing. 1001-1014 - Javad Rahimipour Anaraki, Lei Guo:

BOOST: Batch Ordering for Training Deep Forecasting Models. 268-276 - Henrique P. B. Diniz, Fabrício A. Silva, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz Aylon:

Real Estate Fund Forecasting: Insights from Machine Learning and Time Series Models. 1911-1916 - Fabrízzio Soares, Isabela Figueiredo Vaz, Cristiane Bastos Rocha Ferreira:

Solfeggio Training for the Blind: An Approach with Ableton Live Software. 2060-2065 - Bipin Chhetri, Akbar Siami Namin:

The Application of Transformer-Based Models for Predicting Consequences of Cyber Attacks. 523-532 - Germano B. dos Santos, Fabrício A. Silva, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz Aylon:

Semantic Motif-Based Analysis of Post-Pandemic Mobility Adaptation in Brazil Using Mobile Phone Data. 1867-1872 - Fei Zuo, Junghwan Rhee, Yung Ryn Choe, Chenglong Fu, Xianshan Qu:

Few-Shot Learning-Based Cyber Incident Detection with Augmented Context Intelligence. 961-969 - Chian Min Gan, Chee Kiat Seow, Sye Loong Keoh, Dezhong Yao, Yigang Cen, Yiyu Cai, Nisha Jain, Qi Cao:

ConfMan Web 3.0: Decentralized Academic Conference Management System with Rust and Web 3.0. 1746-1751 - Md. Abdur Rahman, Abdul Barek, ABM Kamrul Islam Riad, Md. Mostafizur Rahman, Md Bajlur Rashid, Md Raihan Mia, Hossain Shahriar, Guillermo Francia III, Fan Wu, Alfredo Cuzzocrea, Sheikh Iqbal Ahamed:

Embedding with Large Language Models for Classification of HIPAA Safeguard Compliance Rules. 1040-1046 - Rizka Reza Pahlevi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:

An Enhanced Event-Based Dynamic Authentication Protocol Leveraging Arbiter PUF for IoT Devices. 2178-2183 - Xiaoyu Guo, Shinobu Saito, Jianjun Zhao:

QuanUML: Towards A Modeling Language for Model-Driven Quantum Software Development. 1344-1349 - Jubayer Hossain

, Mehedi Hasan Nabil
, Farhan Labib Jahin
, Md Yeasin Ali, Hossain Shahriar, Md Sadek Ferdous:
Decentralized Access Control using Hyperledger Fabric. 1154-1163 - Suparno Roy Chowdhury, Ayush Desai, Mrunal Kapure, Mustakim Shikalgar, Ramchander Venugopal, Srividya Bansal:

Enhanced tracking and reporting of missing persons using Knowledge Graph and Ontology Engineering. 619-627 - Dejan S. Milojicic, Phil Laplante:

The Technology Megatrends Predictions Retrospective and Outlook. 2360-2369 - Andrew Barovic, Armin Moin:

TinyML for Speech Recognition. 1631-1636 - Abrar Kazi, M. Anwar Hossain, Mohammad Zulkernine:

Novel Norms for Pruning Convolutional Neural Networks. 1601-1606 - Suman Bharti, Dan Chia-Tien Lo, Hossain Shahriar:

Quantum Knowledge Graph: Leveraging QNLP for Semantic Relationship Modeling. 1514-1517 - ABM Kamrul Islam Riad, Salma Ahmed, Maliha Zaman Nizum, Abdul Barek, Md Bajlur Rashid, Md. Mostafizur Rahman, Guillermo Francia III, Hossain Shahriar:

Privacy-Preserving Self-Supervised Learning for Secure Image Processing: A BYOL-Based Framework for MNIST and Chest X-ray Data. 1136-1145 - Leelanga Seneviratne, Asara Senaratne

:
Data Atomization: A Framework for On-Demand Association and Access Control of Sensitive Data. 2275-2280 - Shivam Sharma, Shahram Latifi, Pushkin Kachroo:

Harnessing Market Memory: Adaptive Reinforcement Learning with Fractional Brownian Motion for Portfolio Optimization. 350-360 - Mohamed Alla Eddine Bahi, Maria Mendez Real, Erwan Nogues, Maxime Pelcat:

AudioGap: An AirGapped Covert Channel Exploiting the Frequency Diversity of Audio IC Electromagnetic Leakage. 989-994 - Alfredo Cuzzocrea:

Big Data Privacy in Multidimensional Domains: Models, Issues, Paradigms. 165-172 - Melika Sepidband, Hamed Taherkhani, Song Wang, Hadi Hemmati:

Enhancing LLM-Based Code Generation with Complexity Metrics: A Feedback-Driven Approach. 1416-1426 - Silvio Meneguzzo, Alfredo Favenza, Claudio Schifanella, Alessandro Mozzato, Stefano Leto

:
Design and Evaluation of a Sub-8 Second Decentralised Marketplace for Energy Data. 1722-1727 - Haipeng Liu, Wenhao Zhu, Jianfeng Hong:

GCCTNet: Enhancing Network Traffic Prediction through Decomposition and Hybrid Modeling. 664-672 - Haruto Nakai, Michiharu Takemoto:

MONDAY: A Unified Semantic Communication Profile with Dynamic Role Integration in Pub/Sub Systems. 1530-1531 - Md Mosharaf Hossan, Rifat Ara Tasnim, Farjana Z. Eishita:

Can You Keep Calm?: Adaptive Gameplay using Heart Rate as a Controller. 2230-2236 - Ernestine Lerisha J, Santhosh M. R. S, Perumalraja Rengaraju, Chung-Horng Lung, Yang Cao:

Automation of Medical Insurance Post-Claims using OCR and RAG Models. 2026-2031 - Jie Yin, Yutaka Ishikawa, Atsuko Takefusa:

A Lightweight Monitoring and Anomaly Detection Framework for IoT Devices. 1184-1193 - Jonathan Dupuis, James Green:

An Amodal Segmentation Pipeline for Critical Infrastructure Asset Imaging. 1700-1707 - Raphaël Khoury, Kobra Khanmohammadi, Justin Vallé, Abdelwahab Hamou-Lhadj:

Mining Five Years of Actively Exploited Vulnerabilities. 921-931 - Zhongwang Wei, Qing Zhao, Wenxiu Cheng, Xinghao Cao, Jianqiang Li, Yo-Ping Huang, Hongzhi Qi:

Dual-Stream Diabetic Retinopathy Grading via Quality Assessment and Multi-Instance Learning. 2148-2153 - Naveen Kumar Vadlamudi, Wendy Osborn:

Batch Processing Algorithms for NewSQL-based Big Data Systems. 301-306 - Sharuka Promodya Thirimanne, Elim Yoseph Lemango, Giulio Antoniol, Maleknaz Nayebi:

One Documentation Does Not Fit All : Case study of TensorFlow Documentation. 1234-1243 - Lemayian Joel Poncha, Hachem Bensalem, Ghyslain Gagnon, Kaiwen Zhang, Pascal Giard:

EVMx: An FPGA-Based Smart Contract Processing Unit. 1708-1713 - Erich Malan, Claudia De Vizia, Marco Castangia, Valentino Peluso, Andrea Calimera, Enrico Macii:

Privacy-Preserving Federated Learning for Household Characteristic Identification. 2040-2045 - Katelyn Pryor, Thorleif Coleman, Syed Zuhair Hossain, Eric Tootil, Shameem Ahmed:

Examining Large Language Models Within Autism-Related Contexts: A Systematic Review of Bias and (Mis) Representation. 876-886 - Dmitriy Bogush, Daniel Koronthály, Kevin Hubbard, Moushumi Sharmin, Shameem Ahmed:

"There's Competition Even Among the Parents of Neurodiverse Children" - Understanding the Dynamics of Social Support Groups for Parents of Autistic Children. 571-580 - Yantao Zhou, Jianqiang Li, Xiaoyan Gao, Hongzhi Qi:

Serialised Pulmonary Lesion Segmentation with Spatiotemporal Transformer. 232-237 - Barbara Steffen, Tiziana Margaria:

Constant Change: Leveraging Digitalization for an Organization's Evolutionary Fitness. 1688-1693 - Afroza Nowshin

, Sumaiya Tasnim, Samia Tasnim:
Physics-Informed Data Denoising for Enhanced IoT-based Water Quality Monitoring. 1480-1485 - Narunori Ebara, Saki Hatta, Yuta Ukon, Hiroyuki Uzawa, Shoko Ohteru, Shuhei Yoshida, Ken Nakamura:

Resource Allocation Considering the Impact of Characteristics and Parallel Processing of Heterogeneous Computational Resources in Disaggregated Computing. 477-482 - Giordana de Farias F. B. Bucci, Juliana Paula Felix, Rogerio Salvini, Hugo A. D. Nascimento, Fabrízzio Soares:

Encoder-Only Transformer for Detecting Multiple Neurodegenerative Diseases from Gait Analysis. 907-912 - Jason Quantrill, Noura Khajehnouri, Manar H. Alalfi:

oHIT - A framework for openHAB Interaction Threats Identification in IoT Systems. 1047-1056 - Korbinian Pfab

, Marcel Rothering:
Towards Improved Research Methodologies for Industrial AI: A case study of false call reduction. 689-694 - Reinaldo De Souza Júnior, Plinio Sa Leitao-Junior, Thamer Horbylon Nascimento

:
An analysis of test case coverage balancing for fault localization. 2250-2255 - Sunna Imtiaz Ahmad, Adriel Silva de Araújo, Vinicius Crisosthemos Teixeira, Carlos Falcão de Azevedo Gomes, Vinicius Dutra, Quinn Roederer, R. Scott Conley, Dalvan Griebler, Márcio Sarroglia Pinho, Hakan Turkkahraman:

A Novel AI-driven Automated Orthodontic Model Analysis to Improve Classification of Orthodontic Extraction Cases. 1853-1860 - Rajesh Yalavaguli Seetharamarao, Suman Chakraborty, Shuvo Bardhan:

Strengthening Cyber Resilience of Small Businesses in BFSI: A CIA-Driven Strategy for Investment and Risk Management. 1510-1513 - Xiaotong Wang, Huiqun Yu, Guisheng Fan, Yuguo Liang, Wentao Chen, Jingyi Liu:

License Compatibility Detection for OpenJavaWorks Open-Source Projects Based on Code Similarity. 1214-1223 - Jahanzeb Shahid, Stelvio Cimato:

A State Channel Based Approach to Address Scalability of Healthcare Data Sharing. 1861-1866 - Sumit Chhetri, Hamid Sharifzadeh, Ali Keivanmarz, Soheil Varastehpour:

Visualising Vein Pattern using Conditional Transformer-based GAN for Forensic Investigations. 1990-1995 - Shahrzad Sayyafzadeh, Simon Foo, Shonda Bernadin, Hongmei Chi:

SynExpression: A Diffusion-Based Framework for Controllable Facial Expression Synthesis and Emotion Detection Using Facial Segmentation Pose Maps. 401-410 - Cai-Feng Lin, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu, Tzu-Hsien Tsai:

A Grouping Algorithm for Training Tree-Shaped Models on Multiple GPUs with High Efficiency. 1595-1600 - Adrian Heffelman, Wilson Zuber

, Mitrasree Deb, Aishwarya Manjunath, Hanze Aggabao, Hamza Magsi, Maya Galley, Mirza Tairin, Moushumi Sharmin:
The Good, the Bad, and the Potential of AI-based Systems in Computing Education. 2337-2343 - Fahim Ahmed Irfan, Razib Iqbal, Dawn Eckstein, Molly Strickland:

CoRe: A Comparative Study of Transformer Models for Context Recognition in Smart Classrooms. 153-158 - Samer Y. Khamaiseh, Steven Chiacchira, Anas Alsobeh, Aibak Aljadayah:

MuAE: A Mutation Testing Framework for Evaluating Autoencoders. 1015-1020 - Masud Rabbani, Nafi Us Sabbir Sabith, Sheikh Iqbal Ahamed:

A Survey on Non-Invasive Computing: Neurological-Hematological Framework for Early Infection and Stroke Detection with Future Directions. 824-833 - Mikael Ebrahimi Salari, Eduard Paul Enoiu, Alessio Bucaioni, Wasif Afzal, Cristina Seceleanu:

PyLC+: A Scalable Python Framework for Automated Translation and Testing of Industrial PLC Programs. 628-639 - Wanglong Chen, Xiali Li:

CL-KAN: A Novel Hybrid Approach for Spatiotemporal Traffic Predictions. 1820-1827 - Xirui Yang

, Hideaki Goto, Takuo Suganuma:
Route Selection Optimization for Multi-hop RADIUS Proxies in WLAN Roaming Systems. 1553-1558 - Gabriel T. P. Coimbra, Fabrício A. Silva, Thais R. M. Braga Silva:

Churn Prediction in Digital Banking: Deep Learning Approaches with Minimal Data. 1847-1852 - Oihane Gómez-Carmona, Diego Casado-Mansilla, Diego López-de-Ipiña, Javier García-Zubía:

Efficient Interactive Cascade Learning for User-Aware Personalization in Edge Activity Recognition. 2002-2007 - Salatiel A. A. Jordão, Carine S. Santos, Maria J. P. Dantas:

Multilingual and Informal Web Datasets for Robust Language Modeling. 1534-1535 - Alireza Tavakkoli Barzoki, Kostas Kontogiannis:

Predicting Bug Inducing Commits Using Commit-State Transition Analysis. 1318-1327 - Devis Bianchini, Massimiliano Garda

, Michele Melchiori, Anisa Rula:
LLM-driven Data Service Discovery in the Internet of Production. 517-522 - Yi Chen, Mahmoud M. Abouzeid, Feng-Jian Wang:

Enhancing the Detection of Anomalous Concurrent Artifact Operations in a Structured Workflow. 970-978 - Colm Brandon, Mashal Khan, Tiziana Margaria:

FLORA: Federated Learning for Optimized Resource Allocation in Cinco de Bio. 2404-2405 - Avanthi Saumyamala, Sulalitha Bowala, Aerambamoorthy Thavaneswaran, You Liang, Alex Paseka, Ruppa K. Thulasiram:

Superiority of RMT Filtered Data-Driven Covariance Matrix for Portfolio Optimization and Resilient Networks. 1885-1890 - Chaofan Wang, Guanjie Qiu, Xiaodong Gu, Beijun Shen:

ApiRAT: Integrating Multi-source API Knowledge for Enhanced Code Translation with LLMs. 1400-1405 - Parama Sridevi, Paramita Basak Upama, Masud Rabbani, Sheikh Iqbal Ahamed:

Performance Comparison of Quantum and Classical Machine Learning Models for Chronic Kidney Disease Prediction. 788-793 - Euan Walker, Oluwaseun Bamgboye, Sarah Thomson, Xiaodong Liu:

Evaluating the Application and Performance of Regression Models in Predicting Cycling Power Output. 431-439 - Ali Shiri

, Mikaeil Mayeli-Feridani, Samira Keivanpour:
A Hybrid Lightweight LLM Chatbot for Sustainable Cryptocurrency Investment Decisions: Optimizing Small Models for Domain-Specific Performance. 1740-1745 - Hyunkyoung Oh, Li Yang, Tala Abu Zahra, Shiyu Tian, Min Sook Park, Jake Luo, Sheikh Iqbal Ahamed, Evelyn Chan, Jeff Whittle:

Voice-Activated Self-Monitoring Application (VoiS): User Acceptance and Satisfaction in the Field. 1873-1878 - Jingcheng Yuan, Kiyofumi Tanaka, Toshiaki Aoki:

Performance Evaluation of Multi-Head Logging in Flash File Systems. 1764-1769 - Yong Zhang

, Henry C. B. Chan, Rufeng Duan, Haifeng Yu, Xuede Wang, Haonan Lin:
ArtArchitect: Adaptive Depth Correction and Outpainting for Realistic World Generation. 495-504 - Sanaz Adel Alipour, Jeannette Janssen, Rita Orji, Nur Zincir-Heywood:

Lightweight Early-Warning Bot Detection on X (Twitter): Temporal Patterns and Entropy Insights. 250-255 - Quoc-Huy Vo, Ha Dao, Kensuke Fukuda:

Harnessing the Power of LLMs for Code Smell Detection in Terraform Infrastructure as Code. 533-542 - Md. Mostafizur Rahman, Md Bajlur Rashid, Abdul Barek, ABM Kamrul Islam Riad, Md. Abdur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu, Guillermo Francia III, Md. Jobair Hossain Faruk, Sharaban Tahora:

White-box Fuzzing in the Wild: A Chaos Engineering Module for DevOps Security Education. 2387-2393 - Sören Jorczik, Steffen Bondorf:

Breaking of Cyclic Dependencies by Scheduling for Scalable and Accurate Network Calculus Analysis. 737-742 - Sevval Simsek, Howell Xia, Jonah Gluck, David Sastre Medina, David Starobinski:

Fixing Invalid CVE-CWE Mappings in Threat Databases. 950-960 - Avanthi Saumyamala, You Liang, Aerambamoorthy Thavaneswaran, Alex Paseka, Sulalitha Bowala, Ruppa K. Thulasiram:

Superiority of the Neural Network Models for Multivariate Price and Volatility Forecasting. 244-249 - Yuan Li, Yanchi Liu, Yijun Zhao:

A-CLAPS: Automatic Correction of Language and Pronunciation Errors in Slide-based Presentations. 1502-1505 - Yu Liu, Jonathan D. Hirst, Jianfeng Ren, Bencan Tang

, Dave Towey
:
Chemically-aware Attention-based Multi-modal Fusion Framework for Molecular Representation Learning. 1828-1833 - Han Wang, Jianqiang Li, Qing Zhao, Zhonglong Chen, Changwei Song, Jing Tang, Yuning Huang, Wei Zhai, Yongsheng Tong, Guanghui Fu:

Deep Learning-Based Feature Fusion for Emotion Analysis and Suicide Risk Differentiation in Chinese Psychological Support Hotlines. 238-243 - Carine Lucena Rech, Vinicius Chrisosthemos Teixeira, Humberto Holmer Fiori, Márcio Sarroglia Pinho:

Development of a Respiratory Motion Video Based Monitor for Noninvasive Mechanical Ventilation Synchronization in Premature Infants. 845-853 - Robert Canady, Chandreyee Bhowmick, Xenofon D. Koutsoukos:

Decentralized Learning using Hashgraph Consensus. 1027-1032 - Aman Raj, Ankit Shetgaonkar, Lakshit Arora

, Dipen Pradhan, Sanjay Surendranath Girija, Shashank Kapoor:
AI and Generative AI Transforming Disaster Management: A Survey of Damage Assessment and Response Techniques. 1834-1840 - Muran Yu, Jie Wang, Yirong Chen, Micheal D. Lepech, Ying Liu, Kincho H. Law:

Ontology-based Adaptive Knowledge System (OAKS): Adaptive and Consistent Knowledge Acquisition through LLMs for Diverse User Backgrounds. 593-599 - Kazuma Aoyama, Shota Inoue, Hiroyuki Ohsaki:

Coarse Walk: Multilayer Random Walk with Coarsened Graph. 371-380 - Padmapriya Velupillai Meikandan, Paramita Basak Upama, Amity Ali, Masud Rabbani, Sheikh Iqbal Ahamed:

Digital Health Using Data Science. 2344-2351 - Ying Zhang, Xi Xu, Yinuo Ouyang, Linxuan Feng, Zhe Han, Jianqiang Li, Jian Yin, Jijiang Yang:

A Systematic Review of the Applications of Speech Processing Technology in Neurological Diseases. 2100-2105 - Mingqian Xiao, Yufeng Zhang, Zhenbang Chen:

LSFuzz: Learning Adaptive Seed Selection Strategies for Fuzzing. 1370-1375 - Huyan Gong, Dongcheng Li, W. Eric Wong, Hui Li:

A Survey of Adversarial Methods in Autonomous Driving. 27-38 - Damandeep Kaur, Andrew Pauls, Glaucio H. S. Carvalho:

Towards Explainable AI in Continuous Smartphone Authentication: Leveraging CNN, BiLSTM, and Attention Techniques. 1486-1491 - Thu Nguyen, Sadaf Faizi, Simranjit Singh, Ismail El Sayad:

A Late Fusion Approach Using CSNNs for Multi-Modal Toxicity Detection in Online Media. 307-311 - João Marcos A. M. Ramos, Fabrício A. Silva, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz Aylon:

Customer Lifetime Value Estimation Using Transactional Data. 1589-1594 - Minakshi Debnath, Sana Alamgeer, Anne H. H. Ngu:

Improving Time-Series Forecasting with Statistical and AI-Driven Feature Optimization. 901-906 - Honghe Zhou, Weifeng Xu, Josh Dehlinger, Suranjan Chakraborty, Lin Deng

:
Forensic Intelligence Graphs: An LLM Approach to Digital Evidence Extraction and Relationship Analysis. 1996-2001 - Sorel Reisman:

Three Quarters of a Century of Computing, and I was There. 2327-2336 - Momoko Shiraishi, Takahiro Shinagawa:

Hardware Authenticator Binding: A Secure Alternative to Passkeys. 1095-1100 - Natalija Vlajic, Melina Najimi, Milos Stojadinovic:

Novel Color Coded MITRE ATT&CK Inspired Attack Tree Modeling: Application in ICSs. 2319-2326 - Suqing Liu, Lisa Zhang, Oscar Karnalim, Michael Liut

:
Summarizing Computer Science Teaching Assistant Feedback with Large Language Models. 159-164 - Marufa Kamal, Kishor Datta Gupta, Masrura Tasnim, Md. Mahfuzur Rahman, Mohd Ariful Haque, Roy George:

Physical Fuzzy Rule Based Unsupervised News Article Clustering. 1619-1624 - Yijun Lu, Hironori Washizaki, Naoyasu Ubayashi, Nobukazu Yoshioka, Jiong Dong, Yuyin Ma, Jati H. Husen

:
An Empirical Study of VR Software Quality Based on Developer Forums and ISO/IEC 25010. 2204-2211 - Muhammad Taha Ramzan

, Stelvio Cimato:
Blockchain in the Quantum Era: Surveying Security Challenges and Post-Quantum Cryptography. 2218-2223 - Taiyo Hirayama, Han Nay Aung, Hiroyuki Ohsaki:

Understanding and Mitigating Vulnerabilities of Random Walks against Adversarial Attacks. 979-988 - Louis Closson, Christophe Cérin, Didier Donsez:

Deep Transfer Learning in Smart Building and Links with Edge Computing. 289-294 - Sarfraz Shaikh, Weifeng Xu:

Quantifying Completeness of Reconstructed Scenarios: A Case Study on Echo Show. 1474-1479 - Louis Nisiotis, Aimilios Hadjiliasi, Nicholas Napp:

Enhancing Public Safety with Digital Twins for Indoor Air Quality Monitoring by Non-Experts. 183-192 - Shashank Kapoor, Sanjay Surendranath Girija, Lakshit Arora

, Dipen Pradhan, Ankit Shetgaonkar, Aman Raj:
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey. 1643-1650 - Rito Tsuboi, Ryozo Kiyohara:

Actual Traffic Congestion Reduction Method Using V2R on One-Lane Roads. 1789-1794 - Sumaiya Farzana Mishu, Maliha Zaman Nijhum, A. B. M. Kamrul Riad, Md Arabin Talukdar, Hossain Shahriar:

Statistical Analysis of Food, Exercise, and HbA1c in Non-Diabetics. 1944-1949 - Yu-Ta Liu, Shuo-Han Chen:

High-Performance Address Translation for Solid-State Drives via Asymmetry Decomposition. 89-94 - Raymond Chung, Keith Ng, C. D. Shum:

A Goal-Oriented Chatbot for Engaging the Elderly Through Family Photo Conversations. 2020-2025 - Mbithe Nzomo, Deshendran Moodley:

Integrating Knowledge Graphs and Bayesian Networks: A Hybrid Approach for Explainable Disease Risk Prediction. 834-844 - Kaique Carvalho, Thamer Horbylon Nascimento

, Camila Horbylon, Heder Santos, João Primo, Juliana Paula Felix, Marcos Alves Vieira, Fabrízzio Soares:
Letter Explorers: Investigating Mobile-Assisted Writing in Preschool Education. 2198-2203 - Mohammad Ali, Zarif Sadman, Apan Qasem:

Improving Energy Efficiency of Irregular Workloads with Transformers and Tabular Data Diffusion. 2408-2409 - Muhammad Arsyad Subu, Richard Mottershead, Anggun Janu Harmaji, Fatma Refaat Ahmed, Fitria Handayani, Jacqueline Maria Dias, Syamsulhuda Budi Musthofa, Mini Sara Abraham, Syed Azizur Rahman, Nabeel Al-Yateem, Janisha Kavumpurath

:
Technology Utilization in Nursing Care Plans Documentation Record: A Scoping Review. 1974-1979 - Abdul Mutakabbir

, Chung-Horng Lung, Marzia Zaman, Kshirasagar Naik, Richard Purcell, Srinivas Sampalli, Thambirajah Ravichandran:
Vegetation Land Cover and Forest Fires in Canada: An Analytical Data Visualization. 411-420 - Nicholas Strzelczyk, Santiago Gomez-Rosero, Amanda O. Timotheo, Leonardo de M. Honório, Miriam A. M. Capretz:

Synthetic Fouling Image Data Generation for Heat Exchanger Predictive Maintenance. 1813-1819 - Larisse Amorim, Ivandeclei Mendes da Costa, Leticia Alves, Eduardo Figueiredo:

Bad Smell Detection using Google Gemini. 1637-1642 - Joshua Ebere Chukwuere:

Driving factors for the adoption of blockchain: A focus on startup entrepreneurship. 1536-1538 - Cenab Batu Bora, Julia Silva Weber, Nur Zincir-Heywood:

Network Identity Management: Application, Action and Device Aware Monitoring. 2269-2274 - Juin Yang Lam, Changyu Li

, Dave Towey
, Lynne Chen, Levi Dean
, Filippo Gilardi
, Omar Zahran, Jianing Wang, Ke Liu, Chenyu Yan:
Virtual Production: Global Collaboration and Challenges. 2380-2386 - K. M. Sajjadul Islam, Ravi Teja Karri, Srujan Vegesna, Jiawei Wu, Praveen Madiraju:

Contextual Embedding-based Clustering to Identify Topics for Healthcare Service Improvement. 794-799 - Guilherme M. Vital, Deborah S. A. Fernandes, Marcio G. C. Fernandes, Fabrízzio Soares:

A Vision on Sentiment Analysis and other AI Applications on Investments Portfolio Optimization. 1899-1904 - Hyeongchang Jeon, Seoksu Lee, Eun-Sun Cho:

An Enhanced Opaque Predicate Detection Method with Synthesis and Recursive Matching. 1194-1203 - Hideaki Goto:

Offline Attribute Sharing Methods for Authentication Traffic Reduction and Functionality Enhancement of Wireless LAN Roaming Systems. 2224-2229 - Elena Troubitsyna:

Towards Supporting Modelling of Fault Tolerant Behaviour Using Behaviour Trees. 1528-1529 - Joy Dip Das, Avanthi Saumyamala, Sulalitha Bowala, Ruppa K. Thulasiram, Aerambamoorthy Thavaneswaran:

Adapting Hybridization of Deep Learning Algorithms for High-Frequency Datasets. 640-647 - David Perry, Mohammad Zakaria Haider, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman

, Hossain Shahriar:
Physics-Informed Learning-based Attack Analytics for Electric Vehicle Charging Management Systems. 1146-1153 - Gabriel Moterani, Wenjun Randy Lin:

Breaking the Linear Barrier: A Multi-Modal LLM-Based System for Navigating Complex Web Content. 2066-2075 - Sean O'Brien, Colm Brandon, Daniel Busch, Marco Krumrey, Daniel Sami Mitwalli, Amandeep Singh

, Sebastian Teumert, Tiziana Margaria:
Specialized Training in LCNC and AI: from the Pedagogical Concept to the Experience. 2394-2403 - Tran Ngoc Bao Huynh, Haowen Xu, Brian Almaguer, Jun Dai, Xiaoyan Sun:

Towards Development of Ready-to-Use Hands-on Labs with Portable Operating Environments for Digital Forensics Education. 95-104 - Shigenori Ohashi:

Multiparty Selective Disclosure using Attribute-Based Encryption. 943-949 - Afonso Ueslei Da Fonseca, Juliana Paula Felix, Emilia Alves Nogueira, Bruno M. Rocha, Gabriel da Silva Vieira, Deborah S. A. Fernandes, Fabrízzio Soares:

A Practical AI-Based Approach for Optimized Diagnosis of Tuberculosis on Chest X-ray. 2136-2141 - Sayeda Farzana Aktar, Mason Dennis Drake, Calvin Berndt, Iftekhar Anam, Roger O. Smith:

A Mobile Application-Based Solution for Identifying Accessibility Challenges in Various Physical Classroom Designs at a U.S. Midwestern University. 887-894 - Alaa Salah Mushtaha:

Federated Learning in Healthcare: Improving Patient Outcomes and Securing Sensitive Health Data. 1950-1957 - Emanuele Antonio Napoli, Lorenzo Gangemi, Silvio Meneguzzo, Noemi Romani, Valentina Gatteschi:

Making Smart Contracts Easier To Understand. 1752-1757 - Bodrul Alam, Faria Khandaker, Yuvraj Singh Palh:

Improving QoS for VM Allocation in Multi-Cloud Environment. 2164-2169 - Isaac Ampratwum, Amiya Nayak:

Radio link failure prediction in 5G networks using graph neural networks. 729-736 - Aasish Kumar Sharma, Dimitar Kyosev, Julian M. Kunkel:

Ethical AI: Towards Defining a Collective Evaluation Framework. 1665-1670 - Eli Graves, Adrian Heffelman, Lars Olt, Noah Bomben, Yasmine N. Elglaly, Shameem Ahmed, Moushumi Sharmin:

Beyond One-Size-Fits-All: GPT-Enabled Personalization of Academic Content for Neurodiverse Students. 581-592 - Yujie Ye, Huiqun Yu, Guisheng Fan, Yuguo Liang, Jianan Dong, Wentao Chen:

JIT-Align: A Semantic Alignment-Based Ranking Framework for Just-In-Time Defect Prediction. 1328-1337 - Amina Al-Marzouqi, Syed Azizur Rahman

, Said A. Salloum, Nabeel Al-Yateem:
Heart Attack Risk Prediction Using Spiking Neural Networks with Poisson-Based Temporal Encoding. 1934-1937 - Ryo Nakashima, Takahiro Shinagawa:

vRM: Verifying Reference Monitors via Exhaustive Access Pattern Generation. 1057-1066 - Han Nay Aung, Hiroyuki Ohsaki:

Sprint Walk: Local Random Walks with Partial Non-Local Information. 222-231 - Samad Alias Nyein Chan, Manar H. Alalfi:

SmartTinkerer: Bridging Smart Home Testing Gaps with LLM, Digital Twin & Reinforcement Learning. 1452-1461 - Jamil Ur Reza, Yasin Mamatjan:

AI Agents for Clinical Data Assessment: Enhancing Decision-Making with Human-AI Collaboration. 2112-2117 - Michaela Masková, Václav Smídl:

Towards AI Analyst: Querying Costly Features for Fraud and Money Laundering Detection. 1905-1910 - Elmira Onagh, Alireza Davoodi, Maleknaz Nayebi:

The Impact of Foundational Models on Patient-Centric e-Health Systems. 2014-2019 - Yixuan Zhang, Liang Fang, Junhai Yang, Zifu Li, Fenghua Li:

BitInfer: An Automated Field Semantic Inference Method Based on Genetic Algorithm. 769-777 - Zhengyuan Wei:

AugOracle: In-Capability Raw Input Validation for Deep Learning Models in Deployment. 695-700 - Wenhui Xia, Yanxiang Tong, Ben Wang, Pengcheng Zhang:

LLMs-Driven Vulnerability Detection Combining LogicASG Reasoning with In-Context Learning. 1164-1173 - Yerkezhan Sartayeva, Henry C. B. Chan:

Towards More Accurate Mobile Direction Finding with UWB. 749-758 - Christian Coduri, Stelvio Cimato:

A Framework for Secure Sharing of Medical Images Based on Visual Cryptography. 2008-2013 - Silvio Meneguzzo, Nicolò Bertozzi, Marco Sacchet

, Lucio Rocco Inglese, Alfredo Favenza:
A Blockchain-Powered Digital Twin Architecture for Consumer-Centric Energy Systems. 1728-1733 - Riddhiman Adib, Md. Osman Gani, Sheikh Iqbal Ahamed, Mohammad Adibuzzaman:

Causal Discovery on the Effect of Antipsychotic Drugs on Delirium Patients in the ICU using Large Observational EHR Dataset. 173-182 - Yicheng Sun

, Jacky Keung
, Hi Kuen Yu
, Shuo Liu
, Yihan Liao
, Jingyu Zhang
:
Beyond Log Parsers: A Scalable AI-Driven Framework for Efficient Log Anomaly Detection in Software Engineering. 1382-1387 - Silvio Meneguzzo, Rachele Pierri:

A Game-Theoretic Incentive Model for DAO Governance. 1714-1721 - Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:

CSA-SACS: A Framework for Comparative Security Assessment in Smart Aging Care Systems. 913-920 - Fathurrahman Yahyasatrio

, Tamer Elboghdadly
, Shikun Zhou
, Nasreen Anjum:
Automatic Contrail Detection Using Integrated Satellite Observation, Meteorological Indicators, and Air Traffic Data in the United Kingdom. 2245-2249 - Mehwish Wahid Khan, Muhammad Shahzad, Iqra Akram, Ghufran Ahmed, Shahid Hussain, Muhammad Abdul Basit Ur Rahim:

Clustering Effect on Cancer Molecular Subtype Classification. 2410-2414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














