Session Time |
Track |
Session ID |
Room |
Chair |
Code |
Paper |
10:45 am- 11:45 am |
CyberSciTech |
Cyber1 |
Hall B |
Amjad Gawanmeh |
342 |
Optimal task offloading in edge cloud environment
Tao Huang, Fengmei Chen, Guohua Ji, Feng Jiao, Wei Jing and Zhidan Yuan |
7973 |
Efficient Scheduling for Multi-Job Federated Learning Systems with Client Sharing
Boqian Fu, Fahao Chen, Peng Li and Zhou Su |
9593 |
Dynamic Type Misuse Detection and Analysis for Python-Based Edge Device Applications
Mingcheng Liu and Zhifei Chen |
DASC |
DASC1 |
CS 7 |
Ismaeel Al Ridhawi |
3634 |
EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing
Jaouhara Bouamama, Yahya Benkaouz and Mohammed Ouzzif |
6103 |
Blockchain-Enabled SAGIN Communication for Disaster Prediction and Management
Tagnon Privael Okoumassoun, Ismaeel Al Ridhawi, Ali Abbas and Ibrahim Al-Oqily |
7733 |
Feature Selection on Anonymized Datasets
Mina Sheikhalishahi and Vahideh Moghtadaiee |
CBDCom |
CBDCom1 |
CS 6 |
Feras Awaysheh |
2027 |
Towards Scalable Process Mining Pipelines
Belal Mohammed, Ahmed Awad and Mohamed Elhelw |
7219 |
Multi-Horizon Visitor Forecasting for a Shopping Mall with Limited Historical Data under Covid-19
Takashi Michikata, Shunya Taniguchi, Toma Ishii, Chisaki Hori, Lifeng Lin, Ge Hangli and Noboru Koshizuk |
8972 |
A Multilevel Learning Model for Predicting CPU Utilization in Cloud Data Centers
Mustafa Daraghmeh, Anjali Agarwal and Yaser Jararweh |
PiCom |
PiCom1 |
CS 5 |
Nicolas Tsapatsoulis |
1767 |
Infant Vomit Detection Using ShuffleNetV2
Chuan-Yu Chang, Xin-Hui Lin and Hui-Huang Hsu |
5916 |
Energy Aware Federated Learning with Application of Activity Recognition
Dipanwita Thakur, Antonella Guzzo and Giancarlo Fortino |
7137 |
Photoplethysmography based Emotion Recognition in Response to High Dynamic Range Videos
Majid Riaz and Raffaele Gravina |
11:45 am- 12:45 pm |
CyberSciTech |
Cyber2 |
Hall B |
Diana Dawoud |
9610 |
MERGE: Multi-entity Relational Reasoning Based Explanation in Visual Question Answering
Jiawei Sun, Zhiyun Yang, Qi Liu, Yonghong Zhang and Xiaodong Liu |
4104 |
Traffic Flow Prediction based on Dynamic Graph Feature Learning
Jiwei Pan, Benxion Huang and Lai Tu |
5976 |
Graph Neural Networks in Emergency Management: A Case Study on Fire Call Assignment
Stefano Izzo, Marzia Canzaniello, Martina Savoia, Fabio Giampaolo and Francesco Piccialli |
DASC |
DASC2 |
CS 7 |
Antonio Guerrieri |
4162 |
ML-based dynamic scaling and traffic forecasting for 5G O-RAN
Khalid Ali and Manar Jammal |
1416 |
An Autonomic Architecture for Multi-Agent Self-Maintaining Robotic Systems
K. Dillon Lewis, Christopher Rouff and Ali Tekeoglu |
2671 |
Resilience of Industrial Control Systems using Signal Temporal Logic And Autotuning Mechanism
Chidi Agbo and Hoda Mehrpouyan |
CyberSciTech |
Cyber3 |
CS 6 |
Amjad Gawanmeh |
1573 |
Genetic Optimization Techniques for Enhancing Web Attacks Classification in Machine Learning
Ameera Jaradat, Ahmad Nasayreh, Qais Al-Na'Amneh, Hasan Gharaibeh and Rabia Al Mamlook |
3980 |
Communication-efficient Federated Learning with Sparsity and Quantization
Zhong Long, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan and Yancheng Sun |
2466 |
Deep Reinforcement Learning-Based On-off Analog Beamforming Coordination for Downlink MISO Networks
Hang Zhou, Xiaoyan Wang, Masahiro Umehira and Yusheng Ji |
PiCom |
PiCom2 |
CS 5 |
Wei Li |
1858 |
An Edge AI study for human action recognition on Industry 4.0 using Weightless Neural Networks
Luiz Ribeiro, Cláudio Farias and Flavia Delicato |
940 |
Learning-driven Zero Trust in Distributed Computing Continuum Systems
Ilir Murturi, Praveen Kumar Donta, Víctor Casamayor Pujol, Andrea Morichetta and Schahram Dustdar |
2626 |
An Edge-Cloud Infrastructure for Weed Detection in Precision Agriculture
Ashish Kaushal, Osama Almurshed, Areej Alabbas, Nitin Auluck and Omer Rana |
2:00 pm- 3:15 pm |
CyberSciTech |
Cyber4 |
CS 7 |
Heba Saleous |
7309 |
BGFormer: Deep Bayersian Gabor filtering Guided Transformer for Medical Image Denoising
Yue He, Rui Zhang, Zhichao Jiang and Hu Zhu |
1344 |
A High Capacity Combined Carrier Steganography Without Embedding Image
Yangwen Zhang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan and Maolin Xiong |
2056 |
Uninstall, Noob! Views on Rampant Toxicity in Online Gaming
Heba Saleous and Marton Gergely |
CyberSciTech |
Cyber5 |
CS 5 |
Amjad Gawanmeh |
9479 |
Adaptive Hierarchy Based Non-cooperative Satellite Network Topology Detection
Yujin Xiao, Yongli Zhao and Yinji Jing |
8213 |
A Medical Image Fusion Method Based on Detail Enhancement Decomposition
Rui Zhang, Yue He, Lina Dai and Hu Zhu |
7878 |
AE-TGN: Attribute-Empowered Temporal Graph Networks for Dynamic Graph Link prediction
Chonghao Chen, Aimin Luo and Yang Huang |
PiCom |
PiCom3 |
Hall B |
Claudio Miceli |
9162 |
Digital twinning of PV modules for smart systems: A comparison between commercial and open-source simulation models
Ali Aghazadeh Ardebili, Antonella Longo and Antonio Ficarella |
5717 |
Fully decentralized Client Selection for Energy-Efficient Federated Learning
Elia Guerra, Marco Miozzo and Paolo Dini |
4686 |
Enhancing Quality of Experience by Monitoring End-User Streaming Behavior
Reza Shokri Kalan |
9714 |
An intrusion detection system empowered by deep learning algorithms
Weiye Tang, Daren Li, Wuyue Fan, Tianhao Liu, Man Chen and Omar Dib |
3:45 pm- 5:00 pm |
CyberSciTech |
Cyber6 |
Hall B |
Hussam Al Hamadi |
7472 |
Cybersecurity Risks and Threats in Avionics and Autonomous Systems
Yibing Xie, Alessandro Gardi and Roberto Sabatini |
1405 |
Some classes of cryptographic power functions and permutation polynomials with low (-1)-differential uniformity in cyber security
Qian Liu, Xiaobei Dong, Zhixiong Chen, Ximeng Liu and Li Xu |
4778 |
New cryptographic bent functions from permutations and linear translator in cyber security
Qian Liu, Yan Chen, Zhixiong Chen, Ximeng Liu and Hui Lin |
CyberSciTech |
Cyber7 |
CS 7 |
Diana Dawoud |
8649 |
Improvement and Evaluation of VBA-based Cell Retrieval Algorithms
Haoran Yang, Xingzhi Chen, Xu Cui, Ruiqiang Ma and Gang Wang |
5422 |
Robust Object Detection Based on a Comparative Learning Perspective
Hao Yang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan and Yangwen Zhang |
8800 |
Enhancing Malware Detection Using “Genetic Markers” and Machine Learning
Jaehyun Lim, Duy Tran and Fabio Di Troia |
Session Time |
Track |
Session ID |
Room |
Code |
Paper |
10:45 am- 11:45 am |
CyberSciTech |
Cyber8 |
Hall B |
Amjad Gawanmeh |
5645 |
A Space-Saving Based MLCS Algorithm
Botian Jiang, Chunyang Wang, Yuanyuan Fu, Hailin Liu, Ping Guo and Yuping Wang |
5499 |
Commodity personalized recommendation algorithm based on the knowledge graph
Kai Yuan Yang, Jun Yang and Zhi Xin Sun |
5314 |
Hybrid Multi-Strategy Improvements for The Aquila Optimizer
Yinzhao Zhang, Wei Sun, Jun Hou and Qianmu Li |
DASC |
DASC3 |
CS 7 |
Ouns Bouachir |
4077 |
Automatic Medical Report Generation via Latent Space Conditioning and Transformers
Carlo Adornetto, Antonella Guzzo and Andrea Vasile |
2353 |
A lightweight Encryption Method For Privacy-Preserving in Process Mining
Mohsen Kazemian and Markus Helfert |
2086 |
Revealing Ongoing Sensor Attacks in Industrial Control System via Setpoint Modification
Zhihao Dai, Ligang He, Shuang-Hua Yang and Matthew Leeke |
CyberSciTech |
Cyber9 |
CS 6 |
Hussam Al Hamadi |
2861 |
VM Migration Support for Secure Out-of-band VNC with Shadow Devices
Tomoya Unoki and Kenichi Kourai |
5227 |
Adversarial Attack Method Based on Dual-frequency Domain Transformation
Maolin Xiong, Yuling Chen, Hui Dou, Yun Lou, Chaoyue Tan and Yangwen Zhang |
1244 |
Exploring Cyber Investigators: An In-Depth Examination of The Field of Digital Forensics
Afnan Asasfeh, Nidal A. Al-Dmour, Hussam Al Hamadi, Wathiq Mansoor and Taher M. Ghaza |
DASC |
DASC4 |
CS 5 |
Safa Otoum |
5895 |
Towards Cybersecurity Risk Assessment Automation: an Ontological Approach
Nicolò Maunero, Fabio De Rosa and Paolo Prinetto |
6107 |
Phishing Detection Using Deep Learning and Machine Learning Algorithms: Comparative Analysis
Betiel Tesfom, Feven Belay, Snit Daniel, Reem Salem and Safa Otoum |
1229 |
Experimental evaluation and expansion suggestion of Digital Signatures available on OP-TEE
Ewerton Andrade, Cristiano Coimbra Goes, João Bezerra Da Rocha Neto, César Augusto De Souza Pastorini and Janislley Oliveira de Sousa |
11:45 am- 12:45 pm |
CyberSciTech |
Cyber10 |
Hall B |
Menatalla Abououf |
4560 |
Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support Systems
Aleksandra Ursula Charlotte Hamel, Bogdan-Cristian Zarcu, András-Gergely Csenteri, Tamara Pfliegler, Sajjad Khan and Davor Svetinovic |
7196 |
Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-depth Threat Analysis
Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan and Davor Svetinovic |
5643 |
A Blockchain of Blockchains Structure Based on Asset Trading Scheme
Siyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo and Yuxiang Yang |
DASC |
DASC5 |
CS 7 |
Ammar Abasi |
3852 |
IoT Data Confidentiality Self-Management
Abdelhamid Garah, Nader Mbarek and Sergey Kirgizov |
3927 |
Review of Fundamental, Security, and Privacy in Metaverse
Hussam Al Hamadi, Nadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Fatma Taher and Taher M. Ghazal |
9922 |
Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical Trends
Rahaf Alnuaimi and Moatsum Alawida |
CBDCom |
CBDCom2 |
CS 6 |
Feras Awaysheh |
8481 |
Efficient vertical mining of frequent quantitative patterns
Carson Leung |
9985 |
Design and Implementation of Biological Inspired Algorithm Coupled with Sliding Mode Controller for Autonomous Cruise Control System
Muhammad Majid Gulzar, Muhammad Mughees Ahmed, Adnan Shakoor, Huma Tahreem |
7017 |
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment
Mahmoud Aljamal, Ala Mughaid, Rabee Alqura'N, Muder Almiani and Shadi Alzubi |
PiCom |
PiCom4 |
CS 5 |
Flavia Delicato |
736 |
Occupancy Prediction in Multi-Occupant IoT Environments leveraging Federated Learning
Irfanullah Khan, Flavia Delicato, Emilio Greco, Massimo Guarascio, Antonio Guerrieri and Giandomenico Spezzano |
2657 |
Joint Task Decomposition and Allocation in Tactile Internet FiWi Enhanced Mobile Networks
Amin Ebrahimzadeh, Martin Maier and Roch Glitho |
6885 |
A High-level Information Fusion framework using indirect sensing for Internet of Bio-Nano Things
Claudio de Farias, Felipe de Farias and Flavia Delicato |
3:30 pm- 4:45 pm |
CyberSciTech |
Cyber11 |
CS 5 |
Muna Darweesh |
3812 |
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain
Linlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo and Yuling Chen |
6609 |
Cybersecurity Challenges of Multi-Domain Traffic Management and Aerospace Cyber-Physical Systems
Kathiravan Thangavel, Alessandro Gardi and Roberto Sabatini |
1376 |
Immersive Cybersecurity Teaching/Training Using Gamification on the Metaverse: A Hands-On Case Study
Jamal Al-Karaki, Awni Itradat and Selam Zeray |
6803 |
Federated Learning Based Satellite-Marine Integrated Training for Marine Edge Intelligence
Jierui Jin, Jie Zhang, Xiaolong Xu, Ke Meng, Xiaokang Zhou, Lianyong Qi, Xuyun Zhang and Wanchun Dou |
DASC |
DASC6 |
CS 7 |
Muhammad Asad |
3445 |
Spectrum Sharing and Consensus Performance of Vehicular Networks based on Deep Multi-User Reinforcement Learning
Muhammad Muzamil Aslam, Ali Tufail, Zahoor Ahmed, Kassim Kalinaki, Muhammad Nasir and Rosyzie Anna Awg Haji Mohd Apong |
7658 |
Characterization of Execution Time Variability in FPGA-based AI-Accelerators
Maximilian Kirschner, Federico Peccia, Felix Thömmes, Victor Pazmino Betancourt, Oliver Bringmann and Jürgen Becker |
6008 |
Dual Watermarking based on DCT with Human Visual Characteristics for Authentication and Copyright Protection
Ferda Ernawan, Wong Shu Jie and Suraya Abu Bakar |
8979 |
PrivDroid: Android Security Code Smells Tool for Privilege Escalation Prevention
Mohammed El Amin Tebib, Pascal Andre, Mariem Graa and Oum-El-Kheir Aktouf |
PiCom |
PiCom5 |
Hall B |
Rafaele Gravina |
8994 |
Online Demand Peak Shaving with Machine-learned Advice in Cyber-Physical Energy Systems
Minxi Feng, Wei Li, Boyu Qin and Albert Zomaya |
5805 |
A Novel Feature Extraction Technique for ECG Arrhythmia Classification Using ML
Mohammad Mominur Rahman, Samir Brahim Belhaouari, Ashhadul Islam, Skander Charni, Halima Bensmail and Thomas Hilbel |
2533 |
A Digital Twin UAV Orchestrator and Simulator
Federico Fausto Santoro, Corrado Santoro and Francesco Cristoforo Conti |
Session Time |
Track |
Session ID |
Room |
Chair |
Code |
Paper |
10:30 am- 11:30 am |
CyberSciTech |
Cyber12 |
Hall B |
Diana Dawoud |
3437 |
A Hypergraph Framework based on Neighborhood and Category Association Relationships for Session-based Recommendation
Dengfeng Liu, Yitong Wang and Fei Cai |
4565 |
A Hierarchical Detection Method for Steady State Peripheral Visual Evoked Potential
Xi Zhao, Ting Zhou, Celimuge Wu, Tianheng Xu, Zhenyu Wang and Honglin Hu |
4608 |
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism
Lang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo and Pengyu Chen |
DASC |
DASC7 |
CS 7 |
Ammar Abasi |
4825 |
Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture
Hong Hanh Doan, Audri Adhyas Paul, Harald Zeindlinger, Yiheng Zhang, Sajjad Khan and Davor Svetinovic |
6109 |
User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN
Beáta Stingelová, Clemens Thaddäus Thrakl, Laura Wrońska, Sandra Jedrej-Szymankiewicz, Sajjad Khan and Davor Svetinovic |
7857 |
Fault Detection and Mitigation in Vehicle Platooning
Hassan Naser, Najeebuddin Ahmed and Amir Ameli |
PiCom |
PiCom6 |
CS 5 |
Illir Murturi |
2521 |
A Deep Learning Solution for Arabic Words Sign Language Recognition in the Context of Sentence
Tamer Shanableh |
4676 |
Assessing the importance of key terms in UN SDGs through Citizens Labs
Emily Kouzaridi, Harris Partaourides, Nicolas Tsapatsoulis and Constantinos Djouvas |
7697 |
On the identification of Influential Topics in the Social Sciences using Citation Analysis
Harris Partaourides, Emily Kouzaridi, Nicolas Tsapatsoulis and Constantinos Djouvas |
11:45 am- 12:45 pm |
CyberSciTech |
Cyber13 |
Hall B |
Hussam Al Hamadi |
9519 |
Predicting Student Dropout in Online Learning Platforms using Deep Learning Techniques
Aisha Almaazmi, Hamzah Ali Alkhazaleh, Shadi Atalla, Wathiq Mansoor and Amjad Gawanmeh |
9261 |
Influences of Mental Stress Level on Individual Identification using Wearable Biosensors
Ao Guo, Walid Brahim and Jianhua Ma |
5841 |
Absolute positioning method based on tunnel wall image similarity matching
Lan Jie |
CyberSciTech |
Cyber14 |
CS 7 |
Diana Dawoud |
7761 |
Black-box Speech Adversarial Attack with Genetic Algorithm and Generic Attack Ideas
Yu Jiang, Luopu Liang and Qianmu Li |
6849 |
A Privacy Preserving Service-Oriented Approach for Data Anonymization through Deep Learning
Fabio Giampaolo, Stefano Izzo, Edoardo Prezioso, Diletta Chiaro, Salvatore Cuomo, Valerio Bellandi and Francesco Piccialli |
8804 |
Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks
Yunxin Liu, Yuliang Chen, Hongtao Zhang, Qingguo Zhou and Xiaokang Zhou |
3:30 pm- 4:45 pm |
Cyber-WS |
IoT-Life |
Hall B |
Yishui Zhu/ Hong Chen |
4927 |
Design of Household Robotic Arm System to sort Recyclable Resources based on Deep Learning
Yuning Guo, Bo Wu and Hiroyuki Kameda |
1130 |
Analysis and Prediction of Drivers’ Braking Behavior with Different Experience at Right-Angled Turns
Jian Wang, Yishui Zhu, Abdelhamid Hadili, Ruxia Tian and Luyang Wang |
7584 |
Design and Implementation of a UPOD for Decentralized IoT Data Platform Based on the ActivityPub Protocol
Yunhao Ni, Tao Zhou, Xinzhe Gao and Hong Chen |
3661 |
Research on the Interface Design of a Situational Awareness-Based Spinal Endoscopic Surgery Robot
Yirui Wang, Jinyun Cao, Yixuan Wang, Yawei Hao, Jianming Yang, Saisai Li, Jiayi Tan and Bowen Sun |
1068 |
Smart Home Integration and Data Sharing with ActivityPub and UPOD
Tao Zhou, Yunhao Ni, Xinzhe Gao, and Hong Chen |
1286 |
Research on Sustainable Design Evaluation of Smart Education Based on the Internet of Things
Zehang Li, Zijin Qiao, Haochuan Tian, Bowen Sun and Shuaiqi Meng |
Session Time |
Track |
Session ID |
Room |
Chair |
Code |
Paper |
10:00 am- 11:15 am |
Cyber-WS |
Cyber-IoT+ ALSS-6G |
CS 5 |
Diana Dawoud |
1736 |
Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System
Lei Xiong, Qichao Xu, Dongfeng Fang and Hui Zeng |
2418 |
Traffic Matrix Prediction Based on Cross Aggregate GNN
Jing Tao, Ken Cao and Teng Liu |
8677 |
Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible
Jing Tao, Jianghua Peng, Tian Liu, Yangfan Li, Ruifeng Tian and Chengpeng Wu |
6529 |
Enhancing Security in 6G Vehicular Networks: Leveraging VLC and MMW Integration and Cooperative Relaying Technique
Selma Yahia, Valeria Loscri and Prakriti Saxena |
9429 |
Secrecy Capacity Evaluation for Vehicular Network Based on VLC
Nancy A. Arafa, Saied M. Abd El-Atty, Diana Dawoud and Mohamed S. Arafa |
DASC-WS |
Advances in Smart Connected Systems |
CS 7 |
Junichi Funasaka |
2964 |
Adversarial Machine Learning Architecture in AI-Driven Power Systems
Dowens Nicolas, Henry Figueroa, Yi Wang, Wafa Elmannai and George Giakos |
3224 |
Data analytics for dependable transportation systems in a smart city
Carson Leung |
5544 |
Heterogeneous Induction Motor Current Dataset Fusion for Efficient Generalised MCSA-based Fault Classification
Ayman Elhalwagy and Tatiana Kalganova |
8830 |
Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements
Elena Becker, Maanak Gupta and Feras Awaysheh |
Cyber-WS |
CSC&CEA |
CS 6 |
Dina Shehada |
8826 |
Differential Privacy Protection based on Federated Learning in Mobile Crowdsensing
Qi Liu and Yingjie Wang |
1824 |
A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains
Dina Shehada and Ahmed Bouridane |
2568 |
Safeguarding Devices and Edge Computing: A Responsive Anti Scam Approach
Chalee Vorakulpipat, Soontorn Sirapaisan, Montida Pattaranantakul and Soontaree Songserm |
3558 |
Privacy-Preserving Trainer Recruitment in Model Marketplace of Federated Learning
Yanghe Pan, Zhou Su and Yuntao Wang |
DASC-WS |
ADSN |
Hall B |
Yi Wang |
2258 |
Evaluation on Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple Paths
Junichi Funasaka and Noriaki Hiraoka |
2869 |
A Study on the Structure of a Local and Causal Framework Underlying the Fundamental Equation of Online User Dynamics
Yuya Sugai, Chisa Takano and Masaki Aida |
3905 |
Perturbation Theory of Online User Dynamics with Respect to Change in Social Network Structures
Yu Usui, Kazuki Nakajima, Chisa Takano and Masaki Aida |
7963 |
Shapley Value-based node assessment in unreliable complex networks: Initial research progress
Wenxi Cai and Tatsuhiro Tsuchiya |
8018 |
Stabilizing Technology for Online User Dynamics by Controlling One-Way Weights of Links
A Chisa Takano, Hiroyasu Obata and Masaki Aida |
11:45 am- 1:00 pm |
PiCom-WS |
DML4EFC+ AIBD4IoMT |
Hall B |
Deepak Puthal |
2527 |
LiDAR–based Building Damage Detection in Edge–Cloud Continuum
Sambit Kumar Mishra, Mohana Lasya Sanisetty, Apsareena Zulekha Shaik, Sai Likitha Thotakura, Sai Likhita Aluru and Deepak Puthal |
2814 |
Edge Based Skin Cancer Decision Support system using Machine Learning Algorithms
Anum Nawaz, Muhammad Irfan, Hafza Ayesha Siddiqa and Tomi Westerlund |
4830 |
Federated Learning for Medical Images Analysis: A Meta Survey
Asaf Raza, Antonella Guzzo and Giancarlo Fortino |
9158 |
Study of MobileNets Model in Federated Learning
Vipul Negi and Suchismita Chinara |
9305 |
FL-SERENADE: Federated Learning for SEmi-supeRvisEd Network Anomaly DEtection. A case study
Veronika Bekbulatova, Andrea Morichetta and Schahram Dustdar |
DASC-WS |
CP3SP + EDCSTA + AIFate + + ACL+ Geosciences and Remote Sensing for Sustainable Earth and Cities |
CS 5 |
Fuhua (Oscar) Lin |
289 |
On the Viability of Federated Deep Autoencoder for Botnet Threat Detection
Safa Otoum, Belsabel Teklemariam, Saron Bokretsion and Bassem Ouni |
434 |
Information-Centric Networking (ICN) Based Disaster Recovery and Business Continuity (DRBC) of Bangladesh
Kawser Mazumder and Eslam Abdallah |
5751 |
Towards Smart Education in the Industry 5.0 Era: A Mini Review on the Application of Federated Learning
Sweta Bhattacharya, Pratik Vyas, Supriya Yarradoddi, Bhulakshmi Dasari, Sumathy S, Thippa Reddy G, Rajesh Kaluri, Srinivas Koppu, David Brown and Mufti Mahmud |
4231 |
MSflood: A Multi-Sources Segmentation For Remote Sensing Flood Images
Marwa Chendeb El Rai, Muna Darweesh and Aicha Beya Far |
6991 |
Adaptive Sequence Learning: Contextual Multi-armed Bandit Approach
Danny Nguyen, Leo Howard, Hongxin Yan and Fuhua Lin |
DASC-WS |
IoT&Security |
CS 7 |
Antonella Guzzo |
3233 |
Secure and Energy-Efficient ECG Signal Monitoring in the IoT Healthcare using Compressive Sensing
Bharat Lal, Miguel Heredia Conde, Pasquale Corsonello and Raffaele Gravina |
5774 |
Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things
Mohammed M. Alani, Atefeh Mashatan and Ali Miri |
8019 |
Security of IoT devices with PUF-based ID tags: preventing hardware substitution by combining SRAM cells pattern signature and ML techniques
Carmelo Felicetti, Domenico Saccà and Antonino Rullo |
8073 |
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications
Giuseppe Beltrano, Claudia Greco, Michele Ianni and Giancarlo Fortino |