Session Time |
Session ID |
Link |
Chair |
Code |
Paper |
10:00 am- 12:00 pm |
Session1 |
Zoom Link |
Ammar Abasi |
8497 |
File Fragment Analysis using Machine Learning
Razaq Jinad, Abm Rezbaul Islam and Narasimha Shashidhar |
1237 |
Determining Important Features in Multidimensional Health Data for Individualized Precision Healthcare
Ruichen Cong, Jianlun Wu, Shoji Nishimura, Atsushi Ogihara and Qun Jin |
6235 |
A Multi-Channel Composite Recommendation Method in Federated Learning
Shi Chen, Qianmu Li, Qi Wang, Xinjian Zhao, Hao Ge and Nianzhe Li |
9291 |
LIDarknet: Experimenting the Power of Ensemble Learning in the Classification of Network traffic
Nabil Marzoug, Khidhr Halab, Younes Mamma, Fadoua Khennou and Othmane El Meslouhi |
7945 |
Monitoring Application Behaviors to Detect Android Malware
Aman Pratap Singh, Rohit Negi, Anand Handa and Sandeep K. Shukla |
9227 |
Using VR to Present a Mobile MRI Unit in Confined Physical Space: Reporting Results of a Field-Deployment at a Radiology Exhibition
Slawomir Tadeja, Kacper Godula, Thomas Bohné and Magdalena Woźniak |
9757 |
Intelligent Control System for Line Follower Robot: From Theory to implementation on the mechatronics field
Wilson Pavón, Ricardo Zapata, Justin Campaña, Matias Iza and Paolo Santamaria |
633 |
Combining Reverse Temporal Attention Mechanism and Dynamic Similarity Analysis for Disease Prediction
Xiaowen Zhang, Yuxia Lei, Guangshun Li, Shi Wang and Huifeng Li |
2:00 pm- 4:00 pm |
Session2 |
Zoom Link |
Neveen Hijazi |
2120 |
Adversarial patch attacks against aerial imagery object detectors based on interpretable guidance
Fengyi Liu and Zhichao Lian |
8219 |
Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5
Yaojie Ke, Yinan Yao, Zhengye Xie, Hepeng Xie, Hui Lin and Chen Dong |
9464 |
Research on user-side service ownership determination technology of power systems based on the hybrid model
Yang Yu and Yuan Yuan Ma |
1062 |
An Improved Deep Learning-Based Approach to Urban Weather Radar Echo Extrapolation
Jiawei Sun, Zhiyun Yang, Qi Liu, Yonghong Zhang, Xiaodong Liu |
9909 |
A Generative Adversarial Model for Weather Radar Echo Extrapolation based on Cycle Generation Structure
Jianhao Ma, Qi Liu, Yonghong Zhang and Xiaodong Liu |
2284 |
A Novel Fast Video Fragment Matching Algorithm for Copyright Protection
Yan Chen, Zhongliao Yang, Chen Dong, Hui Lin and Zhenyi Chen |
3588 |
IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare
Yinan Yao, Decheng Qiu, Bolun Li, Chen Dong, Li Xu, Xiaodong Guo and Changping Lai |
Session Time |
Session ID |
Link |
Chair |
Code |
Paper |
10:00 am- 12:00 pm |
Session3 |
Zoom Link |
Muhammad Asad |
7621 |
Text Summarization Generation Based on Improved Transformer Model
Jingsong Lin, Xiaodong Guo, Chen Dong, Chenxi Lyu, Li Xu and Zhenyi Chen |
6709 |
Proactive Caching with DRL in Cloud-Edge assisted Cyber-Physical-Social Systems
Yue Hu, Ning Cao, Yinqiu Liu and Xiaoming He |
6030 |
Deep Learning for Network Traffic Prediction: An Overview
Mengyi Fu, Pan Wang, Zixuan Wang and Zeyi Li |
4438 |
Intrusion Detection System for IoT based on Complex Networks and Machine Learning
Mortada Termos, Zakariya Ghalmane, Mohamed-El-Amine Brahmia, Ahmad Fadlallah, Ali Jaber and Mourad Zghal |
579 |
FOCUS: Fatigue-reducing IOCs through Prioritization and Scoring
Vinay Sachidananda, Bryson Teo, Ruitao Feng, Kwok-Yan Lam and Yang Liu |
3485 |
A Novel Feature Vector for AI-assisted Windows Malware Detection
Le Qi Yau, Yik Ting Lam, Ashwin Lokesh, Prannaya Gupta, Justin Lim, Ishneet Sukhvinder Singh, Jia-Yi Loo, Mao V. Ngo, Sin G. Teo and Tram Truong-Huu |
4269 |
A Secure and Scalable Peer-to-Peer Federated Learning Approach for Handling Veracity in Big Data
Hafiza Maria Iqbal, Asadullah Tariq and Mohamed Adel Serhani |
8924 |
Particle Swarm Optimization tuned PID Control of Hybrid Renewable Energy based Multi-area Power System
Muhammad Majid Gulzar, Muhammad Shahab, Adnan Shakoor |
2:00 pm- 4:00 pm |
Session4 |
Zoom Link |
Ammar Abasi |
6049 |
Software-Defined Intrusion Detection System for DDoS Attacks in IoT Edge Networks
Burcu Bolat-Akça and Elif Bozkaya |
5519 |
Beyond Traditional Simulators: Adopting Videogames for Autonomous Vehicle Testing
Abderrahmane Maaradji, Naila Bouchemal, Idir Smadhi, Ahmed Bouhraoua, and Amayas Ghanine |
8109 |
A Real-time Load Forecasting Approach Based on Graph Convolution Neural Network in a Distributed IoT Energy System
Li Pan, Jixiang Gan, Qi Liu, Yonghong Zhang and Xiaodong Liu |
7477 |
Consensus and Phase Synchronization of Multi-agent Systems using Adaptive Models
Muhammad Majid Gulzar, Muhammad Munawar, Adnan Shakoor, Huma Tahreem. |
9391 |
A Theoretical Framework for Supporting Clustering Validation via Non-Negative-Matrix-Factorization Trace Sequences over Probabilistic Spaces
Alfredo Cuzzocrea, Pau Figuera, Mojtaba Hajian and Pablo Garcıa Bringas |
4675 |
Wearable Sensors Based Human Core Body Temperature Computing Meth`
Linbo Jiang, Yinuo Wang, Fangmin Sun, Ye Li, Bo Tao and John Speakman |
7135 |
Handling Non-IID data in Federated Learning: Prospects of data skew detection
Marc Haller, Christian Lenz, Robin Nachtigall, Feras Awaysheh and Sadi Alawadi |
9615 |
An Architecture for Predictive Resource Allocation in Cloud Capacity Management Using Neural Networks
Janete P. do Amaral, Alberto Sampaio Lima, José Neuman de Souza and José Antão B. Moura |
Session Time |
Session ID |
Link |
Chair |
Code |
Paper |
10:00 am- 12:00 pm |
Session5 |
Zoom Link |
Neveen Hijazi |
4017 |
Mobile Technology as a Catalyst for Enhancing EFL Speaking Skills in Social Language Learning Contexts
Rustam Shadiev, Jiawen Liu, Nurassyl Kerimbayev, Narzikul Shadiev, Mirzaali Fayziev, Fahrİye Altinay, Aynur Jumadillaeva, Gulmira Abildinova, Roza Zhussupova and Elena Gaevskaia |
1426 |
Research on influence maximization algorithm based on temporal social network
Jiangjing Wang, Hui Fang, Shengqing Li and Jiulei Jiang |
4329 |
Recommendation Algorithm Based on Social Information and Global Average Matrix Decomposition
Wanliang Wang, Jiulei Jiang and Shengqing Li |
1645 |
Unveiling Uncertainty: Supporting Learners Through NLP-Driven Confusion Identification
Gaganpreet Jhajj, M. Ali Akber Dewan and Fuhua Lin |
8203 |
A Prediction Model of Drug-drug Interactions Based on Graph Neural Networks and Subgraph Attention Mechanisms
Lang Wang, Jiulei Jiang and Shengqing Li |
6309 |
Analyzing the Effects of Driving Experience on Backing Maneuvers Based on Data Collected by Eye-Tracking Devices
Qirun Wang, Kiminori Sato and Bo Wu |
2204 |
A Design of Smart Glasses-based Gesture Recognition and Translation System for Sign Languages
Chu Zhang, Bo Wu and Kiminori Sato |
8677 |
Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible
Jing Tao, Jianghua Peng, Tian Liu, Yangfan Li, Ruifeng Tian and Chengpeng Wu |
2:00 pm- 4:00 pm |
Session6 |
Zoom Link |
Muhammad Asad |
7353 |
Python open-source code traceability model based on graph neural networks
Ruizhi Wang, Yanping Xu and Yifan Wu |
5922 |
Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids
Congcong Wang, Chen Wang, Jian Shen, Pandi Vijayakumar and Md Zakirul Alam Bhuiyan |
2952 |
Enhancing Trust and Reliability in AI and ML: Assessing Blockchain’s Potential to Ensure Data Integrity and Security
Aiasha Siddika and Liang Zhao |
7139 |
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts
Usman Tahir, Fiza Siyal, Michele Ianni, Antonella Guzzo and Giancarlo Fortino |
1843 |
Template Matching based Cash Register for Disabled Workers
Michael Sarpong, Cristian Simoni, Brandon Samaroo, Camilo Rodriguez, Daniel Samaniego, Wafa Elmannai and Yi Wang |
8934 |
Smart White Cane for Visually Impaired Persons with Emergency Fall Alert System
Obed Appiah and Wafa Elmannai |
8063 |
DDoS Attack Forecasting Using Transformers
Zain Alrahmani and Khaled Elleithy |