IEEE CyberSciTech/ DASC/ PICom/ CDBCom 2023

14-17 Nov, 2023 - Hybrid Conference

Full Program

UAE Time (GMT+4)

Tuesday, November 14th 2023

Session Time Track Session ID Room Chair Code Paper
10:45 am-
11:45 am
CyberSciTech Cyber1 Hall B Amjad Gawanmeh 342 Optimal task offloading in edge cloud environment
Tao Huang, Fengmei Chen, Guohua Ji, Feng Jiao, Wei Jing and Zhidan Yuan
7973 Efficient Scheduling for Multi-Job Federated Learning Systems with Client Sharing
Boqian Fu, Fahao Chen, Peng Li and Zhou Su
9593 Dynamic Type Misuse Detection and Analysis for Python-Based Edge Device Applications
Mingcheng Liu and Zhifei Chen
DASC DASC1 CS 7 Ismaeel Al Ridhawi 3634 EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing
Jaouhara Bouamama, Yahya Benkaouz and Mohammed Ouzzif
6103 Blockchain-Enabled SAGIN Communication for Disaster Prediction and Management
Tagnon Privael Okoumassoun, Ismaeel Al Ridhawi, Ali Abbas and Ibrahim Al-Oqily
7733 Feature Selection on Anonymized Datasets
Mina Sheikhalishahi and Vahideh Moghtadaiee
CBDCom CBDCom1 CS 6 Feras Awaysheh 2027 Towards Scalable Process Mining Pipelines
Belal Mohammed, Ahmed Awad and Mohamed Elhelw
7219 Multi-Horizon Visitor Forecasting for a Shopping Mall with Limited Historical Data under Covid-19
Takashi Michikata, Shunya Taniguchi, Toma Ishii, Chisaki Hori, Lifeng Lin, Ge Hangli and Noboru Koshizuk
8972 A Multilevel Learning Model for Predicting CPU Utilization in Cloud Data Centers
Mustafa Daraghmeh, Anjali Agarwal and Yaser Jararweh
PiCom PiCom1 CS 5 Nicolas Tsapatsoulis 1767 Infant Vomit Detection Using ShuffleNetV2
Chuan-Yu Chang, Xin-Hui Lin and Hui-Huang Hsu
5916 Energy Aware Federated Learning with Application of Activity Recognition
Dipanwita Thakur, Antonella Guzzo and Giancarlo Fortino
7137 Photoplethysmography based Emotion Recognition in Response to High Dynamic Range Videos
Majid Riaz and Raffaele Gravina
11:45 am-
12:45 pm
CyberSciTech Cyber2 Hall B Diana Dawoud 9610 MERGE: Multi-entity Relational Reasoning Based Explanation in Visual Question Answering
Jiawei Sun, Zhiyun Yang, Qi Liu, Yonghong Zhang and Xiaodong Liu
4104 Traffic Flow Prediction based on Dynamic Graph Feature Learning
Jiwei Pan, Benxion Huang and Lai Tu
5976 Graph Neural Networks in Emergency Management: A Case Study on Fire Call Assignment
Stefano Izzo, Marzia Canzaniello, Martina Savoia, Fabio Giampaolo and Francesco Piccialli
DASC DASC2 CS 7 Antonio Guerrieri 4162 ML-based dynamic scaling and traffic forecasting for 5G O-RAN
Khalid Ali and Manar Jammal
1416 An Autonomic Architecture for Multi-Agent Self-Maintaining Robotic Systems
K. Dillon Lewis, Christopher Rouff and Ali Tekeoglu
2671 Resilience of Industrial Control Systems using Signal Temporal Logic And Autotuning Mechanism
Chidi Agbo and Hoda Mehrpouyan
CyberSciTech Cyber3 CS 6 Amjad Gawanmeh 1573 Genetic Optimization Techniques for Enhancing Web Attacks Classification in Machine Learning
Ameera Jaradat, Ahmad Nasayreh, Qais Al-Na'Amneh, Hasan Gharaibeh and Rabia Al Mamlook
3980 Communication-efficient Federated Learning with Sparsity and Quantization
Zhong Long, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan and Yancheng Sun
2466 Deep Reinforcement Learning-Based On-off Analog Beamforming Coordination for Downlink MISO Networks
Hang Zhou, Xiaoyan Wang, Masahiro Umehira and Yusheng Ji
PiCom PiCom2 CS 5 Wei Li 1858 An Edge AI study for human action recognition on Industry 4.0 using Weightless Neural Networks
Luiz Ribeiro, Cláudio Farias and Flavia Delicato
940 Learning-driven Zero Trust in Distributed Computing Continuum Systems
Ilir Murturi, Praveen Kumar Donta, Víctor Casamayor Pujol, Andrea Morichetta and Schahram Dustdar
2626 An Edge-Cloud Infrastructure for Weed Detection in Precision Agriculture
Ashish Kaushal, Osama Almurshed, Areej Alabbas, Nitin Auluck and Omer Rana
2:00 pm-
3:15 pm
CyberSciTech Cyber4 CS 7 Heba Saleous 7309 BGFormer: Deep Bayersian Gabor filtering Guided Transformer for Medical Image Denoising
Yue He, Rui Zhang, Zhichao Jiang and Hu Zhu
1344 A High Capacity Combined Carrier Steganography Without Embedding Image
Yangwen Zhang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan and Maolin Xiong
2056 Uninstall, Noob! Views on Rampant Toxicity in Online Gaming
Heba Saleous and Marton Gergely
CyberSciTech Cyber5 CS 5 Amjad Gawanmeh 9479 Adaptive Hierarchy Based Non-cooperative Satellite Network Topology Detection
Yujin Xiao, Yongli Zhao and Yinji Jing
8213 A Medical Image Fusion Method Based on Detail Enhancement Decomposition
Rui Zhang, Yue He, Lina Dai and Hu Zhu
7878 AE-TGN: Attribute-Empowered Temporal Graph Networks for Dynamic Graph Link prediction
Chonghao Chen, Aimin Luo and Yang Huang
PiCom PiCom3 Hall B Claudio Miceli 9162 Digital twinning of PV modules for smart systems: A comparison between commercial and open-source simulation models
Ali Aghazadeh Ardebili, Antonella Longo and Antonio Ficarella
5717 Fully decentralized Client Selection for Energy-Efficient Federated Learning
Elia Guerra, Marco Miozzo and Paolo Dini
4686 Enhancing Quality of Experience by Monitoring End-User Streaming Behavior
Reza Shokri Kalan
9714 An intrusion detection system empowered by deep learning algorithms
Weiye Tang, Daren Li, Wuyue Fan, Tianhao Liu, Man Chen and Omar Dib
3:45 pm-
5:00 pm
CyberSciTech Cyber6 Hall B Hussam Al Hamadi 7472 Cybersecurity Risks and Threats in Avionics and Autonomous Systems
Yibing Xie, Alessandro Gardi and Roberto Sabatini
1405 Some classes of cryptographic power functions and permutation polynomials with low (-1)-differential uniformity in cyber security
Qian Liu, Xiaobei Dong, Zhixiong Chen, Ximeng Liu and Li Xu
4778 New cryptographic bent functions from permutations and linear translator in cyber security
Qian Liu, Yan Chen, Zhixiong Chen, Ximeng Liu and Hui Lin
CyberSciTech Cyber7 CS 7 Diana Dawoud 8649 Improvement and Evaluation of VBA-based Cell Retrieval Algorithms
Haoran Yang, Xingzhi Chen, Xu Cui, Ruiqiang Ma and Gang Wang
5422 Robust Object Detection Based on a Comparative Learning Perspective
Hao Yang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan and Yangwen Zhang
8800 Enhancing Malware Detection Using “Genetic Markers” and Machine Learning
Jaehyun Lim, Duy Tran and Fabio Di Troia

Wednesday, November 15th 2023

Session Time Track Session ID Room Code Paper
10:45 am-
11:45 am
CyberSciTech Cyber8 Hall B Amjad Gawanmeh 5645 A Space-Saving Based MLCS Algorithm
Botian Jiang, Chunyang Wang, Yuanyuan Fu, Hailin Liu, Ping Guo and Yuping Wang
5499 Commodity personalized recommendation algorithm based on the knowledge graph
Kai Yuan Yang, Jun Yang and Zhi Xin Sun
5314 Hybrid Multi-Strategy Improvements for The Aquila Optimizer
Yinzhao Zhang, Wei Sun, Jun Hou and Qianmu Li
DASC DASC3 CS 7 Ouns Bouachir 4077 Automatic Medical Report Generation via Latent Space Conditioning and Transformers
Carlo Adornetto, Antonella Guzzo and Andrea Vasile
2353 A lightweight Encryption Method For Privacy-Preserving in Process Mining
Mohsen Kazemian and Markus Helfert
2086 Revealing Ongoing Sensor Attacks in Industrial Control System via Setpoint Modification
Zhihao Dai, Ligang He, Shuang-Hua Yang and Matthew Leeke
CyberSciTech Cyber9 CS 6 Hussam Al Hamadi 2861 VM Migration Support for Secure Out-of-band VNC with Shadow Devices
Tomoya Unoki and Kenichi Kourai
5227 Adversarial Attack Method Based on Dual-frequency Domain Transformation
Maolin Xiong, Yuling Chen, Hui Dou, Yun Lou, Chaoyue Tan and Yangwen Zhang
1244 Exploring Cyber Investigators: An In-Depth Examination of The Field of Digital Forensics
Afnan Asasfeh, Nidal A. Al-Dmour, Hussam Al Hamadi, Wathiq Mansoor and Taher M. Ghaza
DASC DASC4 CS 5 Safa Otoum 5895 Towards Cybersecurity Risk Assessment Automation: an Ontological Approach
Nicolò Maunero, Fabio De Rosa and Paolo Prinetto
6107 Phishing Detection Using Deep Learning and Machine Learning Algorithms: Comparative Analysis
Betiel Tesfom, Feven Belay, Snit Daniel, Reem Salem and Safa Otoum
1229 Experimental evaluation and expansion suggestion of Digital Signatures available on OP-TEE
Ewerton Andrade, Cristiano Coimbra Goes, João Bezerra Da Rocha Neto, César Augusto De Souza Pastorini and Janislley Oliveira de Sousa
11:45 am-
12:45 pm
CyberSciTech Cyber10 Hall B Menatalla Abououf 4560 Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support Systems
Aleksandra Ursula Charlotte Hamel, Bogdan-Cristian Zarcu, András-Gergely Csenteri, Tamara Pfliegler, Sajjad Khan and Davor Svetinovic
7196 Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-depth Threat Analysis
Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan and Davor Svetinovic
5643 A Blockchain of Blockchains Structure Based on Asset Trading Scheme
Siyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo and Yuxiang Yang
DASC DASC5 CS 7 Ammar Abasi 3852 IoT Data Confidentiality Self-Management
Abdelhamid Garah, Nader Mbarek and Sergey Kirgizov
3927 Review of Fundamental, Security, and Privacy in Metaverse
Hussam Al Hamadi, Nadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Fatma Taher and Taher M. Ghazal
9922 Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical Trends
Rahaf Alnuaimi and Moatsum Alawida
CBDCom CBDCom2 CS 6 Feras Awaysheh 8481 Efficient vertical mining of frequent quantitative patterns
Carson Leung
9985 Design and Implementation of Biological Inspired Algorithm Coupled with Sliding Mode Controller for Autonomous Cruise Control System
Muhammad Majid Gulzar, Muhammad Mughees Ahmed, Adnan Shakoor, Huma Tahreem
7017 Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment
Mahmoud Aljamal, Ala Mughaid, Rabee Alqura'N, Muder Almiani and Shadi Alzubi
PiCom PiCom4 CS 5 Flavia Delicato 736 Occupancy Prediction in Multi-Occupant IoT Environments leveraging Federated Learning
Irfanullah Khan, Flavia Delicato, Emilio Greco, Massimo Guarascio, Antonio Guerrieri and Giandomenico Spezzano
2657 Joint Task Decomposition and Allocation in Tactile Internet FiWi Enhanced Mobile Networks
Amin Ebrahimzadeh, Martin Maier and Roch Glitho
6885 A High-level Information Fusion framework using indirect sensing for Internet of Bio-Nano Things
Claudio de Farias, Felipe de Farias and Flavia Delicato
3:30 pm-
4:45 pm
CyberSciTech Cyber11 CS 5 Muna Darweesh 3812 CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain
Linlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo and Yuling Chen
6609 Cybersecurity Challenges of Multi-Domain Traffic Management and Aerospace Cyber-Physical Systems
Kathiravan Thangavel, Alessandro Gardi and Roberto Sabatini
1376 Immersive Cybersecurity Teaching/Training Using Gamification on the Metaverse: A Hands-On Case Study
Jamal Al-Karaki, Awni Itradat and Selam Zeray
6803 Federated Learning Based Satellite-Marine Integrated Training for Marine Edge Intelligence
Jierui Jin, Jie Zhang, Xiaolong Xu, Ke Meng, Xiaokang Zhou, Lianyong Qi, Xuyun Zhang and Wanchun Dou
DASC DASC6 CS 7 Muhammad Asad 3445 Spectrum Sharing and Consensus Performance of Vehicular Networks based on Deep Multi-User Reinforcement Learning
Muhammad Muzamil Aslam, Ali Tufail, Zahoor Ahmed, Kassim Kalinaki, Muhammad Nasir and Rosyzie Anna Awg Haji Mohd Apong
7658 Characterization of Execution Time Variability in FPGA-based AI-Accelerators
Maximilian Kirschner, Federico Peccia, Felix Thömmes, Victor Pazmino Betancourt, Oliver Bringmann and Jürgen Becker
6008 Dual Watermarking based on DCT with Human Visual Characteristics for Authentication and Copyright Protection
Ferda Ernawan, Wong Shu Jie and Suraya Abu Bakar
8979 PrivDroid: Android Security Code Smells Tool for Privilege Escalation Prevention
Mohammed El Amin Tebib, Pascal Andre, Mariem Graa and Oum-El-Kheir Aktouf
PiCom PiCom5 Hall B Rafaele Gravina 8994 Online Demand Peak Shaving with Machine-learned Advice in Cyber-Physical Energy Systems
Minxi Feng, Wei Li, Boyu Qin and Albert Zomaya
5805 A Novel Feature Extraction Technique for ECG Arrhythmia Classification Using ML
Mohammad Mominur Rahman, Samir Brahim Belhaouari, Ashhadul Islam, Skander Charni, Halima Bensmail and Thomas Hilbel
2533 A Digital Twin UAV Orchestrator and Simulator
Federico Fausto Santoro, Corrado Santoro and Francesco Cristoforo Conti

Thursday, November 16th 2023

Session Time Track Session ID Room Chair Code Paper
10:30 am-
11:30 am
CyberSciTech Cyber12 Hall B Diana Dawoud 3437 A Hypergraph Framework based on Neighborhood and Category Association Relationships for Session-based Recommendation
Dengfeng Liu, Yitong Wang and Fei Cai
4565 A Hierarchical Detection Method for Steady State Peripheral Visual Evoked Potential
Xi Zhao, Ting Zhou, Celimuge Wu, Tianheng Xu, Zhenyu Wang and Honglin Hu
4608 A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism
Lang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo and Pengyu Chen
DASC DASC7 CS 7 Ammar Abasi 4825 Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture
Hong Hanh Doan, Audri Adhyas Paul, Harald Zeindlinger, Yiheng Zhang, Sajjad Khan and Davor Svetinovic
6109 User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN
Beáta Stingelová, Clemens Thaddäus Thrakl, Laura Wrońska, Sandra Jedrej-Szymankiewicz, Sajjad Khan and Davor Svetinovic
7857 Fault Detection and Mitigation in Vehicle Platooning
Hassan Naser, Najeebuddin Ahmed and Amir Ameli
PiCom PiCom6 CS 5 Illir Murturi 2521 A Deep Learning Solution for Arabic Words Sign Language Recognition in the Context of Sentence
Tamer Shanableh
4676 Assessing the importance of key terms in UN SDGs through Citizens Labs
Emily Kouzaridi, Harris Partaourides, Nicolas Tsapatsoulis and Constantinos Djouvas
7697 On the identification of Influential Topics in the Social Sciences using Citation Analysis
Harris Partaourides, Emily Kouzaridi, Nicolas Tsapatsoulis and Constantinos Djouvas
11:45 am-
12:45 pm
CyberSciTech Cyber13 Hall B Hussam Al Hamadi 9519 Predicting Student Dropout in Online Learning Platforms using Deep Learning Techniques
Aisha Almaazmi, Hamzah Ali Alkhazaleh, Shadi Atalla, Wathiq Mansoor and Amjad Gawanmeh
9261 Influences of Mental Stress Level on Individual Identification using Wearable Biosensors
Ao Guo, Walid Brahim and Jianhua Ma
5841 Absolute positioning method based on tunnel wall image similarity matching
Lan Jie
CyberSciTech Cyber14 CS 7 Diana Dawoud 7761 Black-box Speech Adversarial Attack with Genetic Algorithm and Generic Attack Ideas
Yu Jiang, Luopu Liang and Qianmu Li
6849 A Privacy Preserving Service-Oriented Approach for Data Anonymization through Deep Learning
Fabio Giampaolo, Stefano Izzo, Edoardo Prezioso, Diletta Chiaro, Salvatore Cuomo, Valerio Bellandi and Francesco Piccialli
8804 Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks
Yunxin Liu, Yuliang Chen, Hongtao Zhang, Qingguo Zhou and Xiaokang Zhou
3:30 pm-
4:45 pm
Cyber-WS IoT-Life Hall B Yishui Zhu/
Hong Chen
4927 Design of Household Robotic Arm System to sort Recyclable Resources based on Deep Learning
Yuning Guo, Bo Wu and Hiroyuki Kameda
1130 Analysis and Prediction of Drivers’ Braking Behavior with Different Experience at Right-Angled Turns
Jian Wang, Yishui Zhu, Abdelhamid Hadili, Ruxia Tian and Luyang Wang
7584 Design and Implementation of a UPOD for Decentralized IoT Data Platform Based on the ActivityPub Protocol
Yunhao Ni, Tao Zhou, Xinzhe Gao and Hong Chen
3661 Research on the Interface Design of a Situational Awareness-Based Spinal Endoscopic Surgery Robot
Yirui Wang, Jinyun Cao, Yixuan Wang, Yawei Hao, Jianming Yang, Saisai Li, Jiayi Tan and Bowen Sun
1068 Smart Home Integration and Data Sharing with ActivityPub and UPOD
Tao Zhou, Yunhao Ni, Xinzhe Gao, and Hong Chen
1286 Research on Sustainable Design Evaluation of Smart Education Based on the Internet of Things
Zehang Li, Zijin Qiao, Haochuan Tian, Bowen Sun and Shuaiqi Meng

Friday, November 17th 2023

Session Time Track Session ID Room Chair Code Paper
10:00 am-
11:15 am
Cyber-WS Cyber-IoT+
ALSS-6G
CS 5 Diana Dawoud 1736 Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System
Lei Xiong, Qichao Xu, Dongfeng Fang and Hui Zeng
2418 Traffic Matrix Prediction Based on Cross Aggregate GNN
Jing Tao, Ken Cao and Teng Liu
8677 Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible
Jing Tao, Jianghua Peng, Tian Liu, Yangfan Li, Ruifeng Tian and Chengpeng Wu
6529 Enhancing Security in 6G Vehicular Networks: Leveraging VLC and MMW Integration and Cooperative Relaying Technique
Selma Yahia, Valeria Loscri and Prakriti Saxena
9429 Secrecy Capacity Evaluation for Vehicular Network Based on VLC
Nancy A. Arafa, Saied M. Abd El-Atty, Diana Dawoud and Mohamed S. Arafa
DASC-WS Advances in Smart Connected Systems CS 7 Junichi Funasaka 2964 Adversarial Machine Learning Architecture in AI-Driven Power Systems
Dowens Nicolas, Henry Figueroa, Yi Wang, Wafa Elmannai and George Giakos
3224 Data analytics for dependable transportation systems in a smart city
Carson Leung
5544 Heterogeneous Induction Motor Current Dataset Fusion for Efficient Generalised MCSA-based Fault Classification
Ayman Elhalwagy and Tatiana Kalganova
8830 Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements
Elena Becker, Maanak Gupta and Feras Awaysheh
Cyber-WS CSC&CEA CS 6 Dina Shehada 8826 Differential Privacy Protection based on Federated Learning in Mobile Crowdsensing
Qi Liu and Yingjie Wang
1824 A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains
Dina Shehada and Ahmed Bouridane
2568 Safeguarding Devices and Edge Computing: A Responsive Anti Scam Approach
Chalee Vorakulpipat, Soontorn Sirapaisan, Montida Pattaranantakul and Soontaree Songserm
3558 Privacy-Preserving Trainer Recruitment in Model Marketplace of Federated Learning
Yanghe Pan, Zhou Su and Yuntao Wang
DASC-WS ADSN Hall B Yi Wang 2258 Evaluation on Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple Paths
Junichi Funasaka and Noriaki Hiraoka
2869 A Study on the Structure of a Local and Causal Framework Underlying the Fundamental Equation of Online User Dynamics
Yuya Sugai, Chisa Takano and Masaki Aida
3905 Perturbation Theory of Online User Dynamics with Respect to Change in Social Network Structures
Yu Usui, Kazuki Nakajima, Chisa Takano and Masaki Aida
7963 Shapley Value-based node assessment in unreliable complex networks: Initial research progress
Wenxi Cai and Tatsuhiro Tsuchiya
8018 Stabilizing Technology for Online User Dynamics by Controlling One-Way Weights of Links
A Chisa Takano, Hiroyasu Obata and Masaki Aida
11:45 am-
1:00 pm
PiCom-WS DML4EFC+
AIBD4IoMT
Hall B Deepak Puthal 2527 LiDAR–based Building Damage Detection in Edge–Cloud Continuum
Sambit Kumar Mishra, Mohana Lasya Sanisetty, Apsareena Zulekha Shaik, Sai Likitha Thotakura, Sai Likhita Aluru and Deepak Puthal
2814 Edge Based Skin Cancer Decision Support system using Machine Learning Algorithms
Anum Nawaz, Muhammad Irfan, Hafza Ayesha Siddiqa and Tomi Westerlund
4830 Federated Learning for Medical Images Analysis: A Meta Survey
Asaf Raza, Antonella Guzzo and Giancarlo Fortino
9158 Study of MobileNets Model in Federated Learning
Vipul Negi and Suchismita Chinara
9305 FL-SERENADE: Federated Learning for SEmi-supeRvisEd Network Anomaly DEtection. A case study
Veronika Bekbulatova, Andrea Morichetta and Schahram Dustdar
DASC-WS CP3SP +
EDCSTA +
AIFate +
+ ACL+
Geosciences and
Remote Sensing
for Sustainable
Earth and Cities
CS 5 Fuhua (Oscar) Lin 289 On the Viability of Federated Deep Autoencoder for Botnet Threat Detection
Safa Otoum, Belsabel Teklemariam, Saron Bokretsion and Bassem Ouni
434 Information-Centric Networking (ICN) Based Disaster Recovery and Business Continuity (DRBC) of Bangladesh
Kawser Mazumder and Eslam Abdallah
5751 Towards Smart Education in the Industry 5.0 Era: A Mini Review on the Application of Federated Learning
Sweta Bhattacharya, Pratik Vyas, Supriya Yarradoddi, Bhulakshmi Dasari, Sumathy S, Thippa Reddy G, Rajesh Kaluri, Srinivas Koppu, David Brown and Mufti Mahmud
4231 MSflood: A Multi-Sources Segmentation For Remote Sensing Flood Images
Marwa Chendeb El Rai, Muna Darweesh and Aicha Beya Far
6991 Adaptive Sequence Learning: Contextual Multi-armed Bandit Approach
Danny Nguyen, Leo Howard, Hongxin Yan and Fuhua Lin
DASC-WS IoT&Security CS 7 Antonella Guzzo 3233 Secure and Energy-Efficient ECG Signal Monitoring in the IoT Healthcare using Compressive Sensing
Bharat Lal, Miguel Heredia Conde, Pasquale Corsonello and Raffaele Gravina
5774 Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things
Mohammed M. Alani, Atefeh Mashatan and Ali Miri
8019 Security of IoT devices with PUF-based ID tags: preventing hardware substitution by combining SRAM cells pattern signature and ML techniques
Carmelo Felicetti, Domenico Saccà and Antonino Rullo
8073 Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications
Giuseppe Beltrano, Claudia Greco, Michele Ianni and Giancarlo Fortino