default search action
AIIoT 2024: Seattle, WA, USA
- IEEE World AI IoT Congress, AIIoT 2024, Seattle, WA, USA, May 29-31, 2024. IEEE 2024, ISBN 979-8-3503-8780-3
- Adarsha Bhattarai, Yutong Liu, Dongming Peng:
Multi-Tier Arrhythmia Detection: Achieving AI Hardware Compatibility Across Diverse Nodes. 1-7 - Faria Farzana, Damian Valles:
Enhancing Pedestrian Safety: Predicting Movements with Deep Learning Models. 8-15 - Saddam Hossain, Damian Valles:
Traffic Safety through Machine Learning: A Study of Crash Severity Factors. 16-23 - B. Deepanraj, Hiren K. Mewada:
A Deep Learning Network for Classification and Visual Deterioration Detection of Concrete Surfaces. 24-28 - Evan R. Smith, Antonio T. Grahm, Joni E. McCawley, Damian Valles:
Ultrasonic Frequency Anomaly Localization with Machine and Deep Learning. 29-37 - Harsh Kumar, Petro Mushidi Tshakwanda, Sisay T. Arzo, Michael Devetsikiotis, Fabrizio Granelli:
Reinforcement Learning-Driven Adaptive Traffic Routing Role Delegation for Enhanced SDN Network Performance. 38-44 - Gavin E. Jackson, Damian Valles:
Dataset Enlargement with Generative Adversarial Neural Networks. 45-51 - Razaq Jinad, Tosin Akinsowon, Chukwuemeka Ihekweazu, Min Kyung An:
Enhancing Data Security and Privacy through Classification-Based Adaptive Encryption. 52-60 - Harsh Kumar, Patrick Nnaji, Sanjeev Kumar:
Smart Meter Performance Under Wired and Wireless Cyber Security Attack. 61-67 - Tsion Yimer, Otily Toutsop, Kevin T. Kornegay:
Secure BACnet Device Communication and Verification for MS/TP Networks. 68-76 - Prashant Vajpayee, Gahangir Hossain:
Risk Assessment of Cybersecurity IoT Anomalies Through Cyber Value at Risk (CVaR). 77-83 - Damilola Oladimeji, Chiamaka Femi-Adeyinka, Juli Dutta, Min Kyung An:
Enhanced Approaches to Similarity Analysis on Car Accident Reconstruction. 84-90 - Jiyao Li, Vicki H. Allan:
Supply-Demand Balancing and Fairness Enhancement in Ride-Sharing Services: A Graph Reinforcement Learning Based Approach. 91-99 - Kyle Stein, Arash Golibagh Mahyari, Guillermo A. Francia III, Eman El-Sheikh:
A Transformer-Based Framework for Payload Malware Detection and Classification. 105-111 - N. G. Bharath Kumar, Omid Nia:
Iridium Based Agronomical System. 112-117 - Chris Nagel, Cheol-Hong Min:
Boxing Strike Classification from Wearable IMU Sensor Unit. 118-122 - Mubaris Nadeem, Johannes Zenkert, Lisa Bender, Christian Weber, Madjid Fathi:
Quantitative Evaluation of KIRETT Wearable Demonstrator for Rescue Operations. 123-128 - Mehdi Roopaei, Ryan Roopaei:
Gamifying AI Education for Young Minds: The TransAI Adventure in Learning. 129-134 - Chencheng Tang, Jiahao Fan, Qilong Shi, Zhen Chen, Kaiwen Men, Yaodong Hu, Changxu Sun, Min Guo, Yisong Zhang, Xiaodong Ma:
DIM-YOLO: Desktop Item Management System Based on YOLO. 135-141 - Meera Gopinath Sujatha, Rajesh Godasu, Prakash Ranganathan:
Classification of Microcystins Based on Temperature Data in North Dakota Lake. 142-150 - Kyle King, Caleb Thornton, Mehdi Roopaei:
Smart Feeding: Integrating Deep Learning into Dairy Farm Practices. 151-156 - Samar AboulEla, Rasha F. Kashef:
Network Intrusion Detection Using a Stacking of AI-driven Models with Sampling. 157-164 - Fatemehsadat Ghanadi Ladani, Nader Karimi, Pejman Khadivi, Shadrokh Samavi:
Wavelet Based fMRI Analysis for Autism Spectrum Disorder Detection using Feature Selection and Ridge Classifier. 165-171 - Sergei Chuprov, Raman Zatsarenko, Dmitrii Korobeinikov, Leon Reznik:
Robust Training on the Edge: Federated vs. Transfer Learning for Computer Vision in Intelligent Transportation Systems. 172-178 - Hirenkumar Kantilal Mewada, B. Deepanraj:
Low-Power Embedded ECG Acquisition System for Real-Time Monitoring and Analysis. 179-184 - Marufa Kamal, Rakib Hossain Rifat, Abanti Chakraborty Shruti, Mohd Ariful Haque, Kishor Datta Gupta, Roy George:
DetectPLD: A Federated CNN Approach for Collaborative Potato Leaf Disease Detection. 185-191 - Mina Aghaei Dinani, Adrian Holzer, Hung X. Nguyen, Marco Ajmone Marsan, Gianluca Rizzo:
Context-Aware Orchestration of Energy-Efficient Gossip Learning Schemes. 192-198 - Derek Thompson, Parker Padgett, Timothy Cary Johnson, Bhaskar Ghosh:
PyroScan: Wildfire Behavior Prediction System using Unmanned Aerial Vehicles (UAV). 199-204 - Enamul Hassan, Gahangir Hossain, Prashant Vajpayee:
Reducing Cyber Risks in IoT Device Resource Management: A Probabilistic Banker's Algorithm Approach. 205-211 - Moshekwa M. Malatji, Rachel Mohlomi, Gerald Kirui, Simphiwe Mndebele, John E. D. Ekoru, Milka C. I. Madahana:
Student Retention Model via Machine Learning and Predictive analysis. 212-218 - Mariana Marques Ferreira, Maria Paula Medeiros Gomes Miguel, Cleonilson Protásio de Souza, Yajun An, Orlando Baiocchi:
An Energy Efficiency Evaluation of the LTC3108 for Thermal Energy Harvesting. 219-224 - Maria Paula Medeiros Gomes Miguel, Mariana Marques Ferreira, Cleonilson Protásio de Souza, Yajun An, Orlando Baiocchi:
An Experimental Evaluation of a Thermal Energy Harvesting System for IoNT. 225-230 - Mohale Tshwale, Pius A. Owolawi, Moses Olaifa, Vusi Malele:
ResNet50 Pretrained Model Based Pneumonia Detection System. 231-236 - Mandeep Singh, Albert H. Carlson:
Watermarking Using Polymorphic Algorithms For Increased Data Security. 237-243 - Olusola Tolulope Odeyomi, Harshitha Karnati, Austin Smith:
Preserving Medical Data with Renyi Differential Privacy. 244-251 - Kossi Bissadu, Gahangir Hossain, Prashant Vajpayee:
Agriculture 5.0 Cybersecurity: Monitoring Agricultural Cyber Threats with Digital Twin Technology. 252-258 - Ali Tamizifar, Pouya Behzadifar, Zahra Sobhaninia, Nader Karimi, Pejman Khadivi, Shadrokh Samavi:
Enhanced Nuclei Segmentation in Histopathological Images Using a Novel Preprocessing Pipeline and Deep Learning. 259-264 - Rajesh Kalakoti, Sven Nõmm, Hayretdin Bahsi:
Enhancing IoT Botnet Attack Detection in SOCs with an Explainable Active Learning Framework. 265-272 - Raman Zatsarenko, Sergei Chuprov, Dmitrii Korobeinikov, Leon Reznik:
Trust-Based Anomaly Detection in Federated Edge Learning. 273-279 - Jatin Jain, Ahmed A. Mohamed, Tanvir Rahman, Mohamed A. Ali:
A Neural Network based Deep Reinforcement Learning Controller for Voltage Regulation of Active Distribution Network. 280-285 - A. P. Roger Rozario:
Prediction of Dissolved Oxygen in Shrimp Pond using Dolphin Glow Worm Optimization Based Radial Basis Function Neural Network. 286-291 - Eric Rivera, Zoë Statzer, Hayssam El-Razouk, Zoulikha Mouffak:
RFID-PIN Access Control System: Cost-Effective Security for Smart Home Applications. 292-299 - Rasha Kashef, Edwin P. Alegre, Tasnim Prova, Sakshi Aggarwal:
Automated Waste Management using a Customized Vision-based Transformer Model. 300-309 - Brett Wiens, Daniel C. Lee:
Computationally Efficient Global Optimization of Labelling in Non-Uniform QAM Constellations. 310-315 - Wenjun Yang, Eyhab Al-Masri:
ULDP: A User-Centric Local Differential Privacy Optimization Method. 316-322 - Tian-Xiao Lin, Zhen Chen, Min Guo, Yu-Xiang Lin, Yisong Zhang, Ying Gao, Xiao-Dong Ma, Kaiwen Men:
Scenario-Based Programming for IoT Applications Development. 323-328 - Sandra Kumi, Madhurima Ray, Sanskriti Walia, Richard K. Lomotey, Ralph Deters:
Digital Twins for Stress Management Utilizing Synthetic Data. 329-335 - Max Garcia, Sanjeev Kumar:
AI-based detection for Remote Electrocardiogram Monitoring System. 336-341 - Farzaneh Koohestani, Zahra Nabizadeh-ShahreBabak, Nader Karimi, Shadrokh Samavi:
Preserving Details in Darkness: A VQ-VAE Based Approach with SSIM Loss for Low-Light Image Enhancement. 342-348 - Dipok Deb, Hansapani Rodrigo, Sanjeev Kumar:
Performance Analysis of Machine Learning Algorithms on Imbalanced DDoS Attack Dataset. 349-355 - Sanjeev Kumar V. Marimekala, John Lamb, Robert Epstein, Vasundhara Bhupathi:
Using AI and Big Data in the HealthCare Sector to help build a Smarter and more Intelligent HealthCare System. 356-362 - Fatemeh Piri, Nader Karimi, Shadrokh Samavi:
Enhanced Segmentation in Abdominal CT Images: Leveraging Hybrid CNN-Transformer Architectures and Compound Loss Function. 363-369 - S. Chan:
Inference-Optimized Metaheuristic Approach for a Prospective AI Training/Inference Inversion Paradigm in Optimized Energy-Aware Computing. 370-379 - Swagat Ranjit, Jian Zhang, Bijaya B. Karki:
Improved Polyp Segmentation of Irregular Shapes in Colonoscopy Images. 380-386 - Taylor C. Washington, Winston Sealy:
Programming by Demonstration using Mixed Reality and Simulated Kinematics. 387-392 - S. Chan:
Cascading Succession of Models for an Enhanced Long-Tail Discernment AI System. 393-401 - Kaushallya Adhikari, Ridhab Al Kinani:
Model Order Estimation for Sensor Array Observations using a Neural Network. 402-407 - Alvin Wang, Lujun Zhai:
GA-Net: Global-aware Attention-guided CNN for Food Image Classification. 408-413 - Sayed Erfan Arefin, Abdul Serwadda:
Dissecting the Origins of the Power Side-Channel in Deep Neural Networks. 414-420 - Saad A. Rafiq, Erich S. Ellsworth, Oscar Resendiz, Susmitha H. Varanasi, Adenrele A. Ishola, Rachel M. Koldenhoven, John W. Farrell, Yumeng Li, Maria D. Resendiz, Semih Aslan, Ting Liu, Damian Valles:
Design of Autonomous Rover for Firefighter Rescue: Integrating Deep Learning with ROS2. 421-428 - Gvarami Labartkava, Nurin Binti Suhaimi, Thiago Silva, Lev Kirischian:
Autonomously Reconfigurable Robot Coupled with Intelligent Vision and Control System for Rapid Runtime Adaptation. 429-434 - Yishan Liu, Zhen Chen, Xin Xie, Yaodong Hu, Lie Zhang, Weiran Li, Shuangshou Li:
"Hyper Photography" Artifact: An interactive aesthetic education experience device designed based on AIGC. 435-443 - David D. Li, Angela Li, Rodger Mensing, Zy Li:
Modeling dynamic elasticity on intraday volatility and volume by finding PDEs using machine learning. 444-450 - Jiameng Li, Zhen Chen, Weiran Lin, Liangjun Zou, Xin Xie, Yaodong Hu, Dianmo Li:
Mystery Game Script Compose Based on a Large Language Model. 451-455 - Otily Toutsop, Tsion Yimer, Kevin T. Kornegay:
Big Data and the Application of IoT Systems. 456-464 - Azita Ramezani:
Fusion Models for Cyber Threat Defense: Integrating Clustering with Kmeans, Random Forests, and SVM against Windows Malware. 465-470 - Roya Salek Shahrezaie, Parisa Hajibabaee, Mohsen Ahmadi:
An Open Source Framework for Benchmarking Cyberbullying Detection on Social Media. 471-478 - Zaynah L. Kalaoun, Kaushallya Adhikari, Steven Kay:
Minimum Distance Receiver using Dynamic Programming-Based Sparse Samples. 479-484 - Rawshon Ferdaws, Nahid Ebrahimi Majd:
Phishing URL Detection Using Machine Learning and Deep Learning. 485-490 - MuhammadZaid Katlariwala, Aakash Gupta:
Product Recommendation System Using Large Language Model: Llama-2. 491-495 - Oyeniyi Akeem Alimi:
Hybrid Data-Driven Learning-Based Internet of Things Network Intrusion Detection Model. 496-501 - Thuan Nhan, Jiblal Upadhya, Samir Poudel, Satish Wagle, Khem Poudel:
Scalable Multimodal Machine Learning for Cervical Cancer Detection. 502-510 - Alex Sumarsono, Bhuvana Prakash, Christian Leon:
Arbitrated Packet Switching With Machine Learning Driven Data Plane. 511-517 - Dharati Dholariya, Dixit Panchal, Pallavi Singhal:
Dissection of Rorschach Ransomware. 518-520 - M. A. S. P. Dayarathne, M. S. M. Jayathilaka, R. M. V. A. Bandara, V. Logeeshan, S. Kumarawadu, Chathura Wanigasekara:
Deep Learning-Based Cyber Attack Detection in Power Grids with Increasing Renewable Energy Penetration. 521-526 - Aditi Singh, Abul Ehtesham, Saket Kumar, Tala Talaei Khoei:
Enhancing AI Systems with Agentic Workflows Patterns in Large Language Model. 527-532 - Purav Bhatt, Shrikant Jadhav:
Comparative Analysis of Physical Design Parameters for JPEG Encoder IP using OpenROAD. 533-539 - S. M. L. Arampola, M. S. K. Nisakya, W. A. Yasodya, S. Kumarawadu, V. Logeeshan, Chathura Wanigasekara:
Self-Adaptive Non-Intrusive Load Monitoring Using Deep Learning. 540-545 - Puthiyavan Udayakumar, R. Anandan:
Evaluation of Protocol-Centric IDS for the IoMT Leveraging ML Techniques. 546-551 - Mahadi Hasan, Jahirul Islam, Miraz Al Mamun, Afrin Akter Mim, Sharmin Sultana, Md Sanowar Hossain Sabuj:
Optimizing Cervical Cancer Prediction, Harnessing the Power of Machine Learning for Early Diagnosis. 552-556 - Rafael Da Luz Barbosa, Kaushallya Adhikari, Walter G. Besio:
SVM for Classification of Ten-Finger Imagined Movements using tEEG Signals. 557-561 - Shamaltha M. Wickramaarachchi, S. A. Dewmini Suraweera, D. M. Pasindu Akalanka, V. Logeeshan, Chathura Wanigasekara:
Accurate Prediction of Remaining Useful Life for Lithium-ion Battery Cells Using Deep Neural Networks. 562-568 - R. D. Sandakelum, V. H. Liyanage, P. M. Chandrasekara, V. Logeeshan, S. Kumarawadu, Chathura Wanigasekara:
Development of Deep Learning Model to Detect Cyber-Attacks within Vehicular Networks. 569-574 - Emmanuel Kojo Gyamfi, Jess Kropczynski, Joseph S. Johnson, Mustapha Awinsongya Yakubu:
Internet of Things Security and Data Privacy Concerns in Smart Farming. 575-583 - Han Yu, Jianhong Zhou, Maode Ma:
Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of Thing. 584-590 - Qianmin Du, Jianhong Zhou, Maode Ma:
EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of Vehicles. 591-597 - Sudarshan S. Chawathe:
Human Occupancy From Few Diverse Sensors. 598-604 - Gideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan, Vladimir K. Poulkov:
A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems. 605-611 - Anuj Nepal, Mohamed Ahzam Amanullah, Robin Doss, Frank Jiang:
Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and Trust. 612-618 - Aditi Singh, Saket Kumar, Abul Ehtesham, Tala Talaei Khoei, Deepshikha Bhati:
Large Language Model-Driven Immersive Agent. 619-624 - Kyle Arquilla, Ishan Dilipbhai Gajera, Melanie Darling, Deepshikha Bhati, Aditi Singh, Angela Guercio:
Exploring Fine-Grained Feature Analysis for Bird Species Classification using Layer-wise Relevance Propagation. 625-631
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.