default search action
3rd ICAIC 2024: Houston, TX, USA
- 3rd IEEE International Conference on AI in Cybersecurity, ICAIC 2024, Houston, TX, USA, February 7-9, 2024. IEEE 2024, ISBN 979-8-3503-8185-6
- Tanvir H. Sardar, Ruhul Amin Hazarika, Bishwajeet Pandey, Guru Prasad M. S, Sk Mahmudul Hassan, Radhakrishna Dodmane, Hardik A. Gohel:
Video key concept extraction using Convolution Neural Network. 1-6 - Maulin Raval, Aobo Jin, Yun Wan, Hardik A. Gohel:
Leveraging Advanced Visual Recognition Classifier For Pneumonia Prediction. 1-8 - Mandar Khoje:
Navigating Data Privacy and Analytics: The Role of Large Language Models in Masking conversational data in data platforms. 1-5 - Rathinaraja Jeyaraj, Barathi Subramanian, Karnam Yogesh, Aobo Jin, Hardik A. Gohel:
YSAF: Yolo with Spatial Attention and FFT to Detect Face Spoofing Attacks. 1-6 - Manit Mishra, Abderrahman Braham, Charles Marsom, Bryan Chung, Gavin Griffin, Dakshesh Sidnerlikar, Chatanya Sarin, Arjun Rajaram:
DataAgent: Evaluating Large Language Models' Ability to Answer Zero-Shot, Natural Language Queries. 1-5 - Trishla Shah, Raghav V. Sampangi, Angela A. Siegel:
Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User Inputs. 1-8 - Gerard Shu Fuhnwi, Matthew Revelle, Clemente Izurieta:
Improving Network Intrusion Detection Performance : An Empirical Evaluation Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination. 1-8 - Ade Kurniawan, Yuichi Ohsita, Masayuki Murata:
Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors. 1-5 - Antonio Maci, Nicola Tamma, Antonio Coscia:
Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection. 1-7 - Trishla Shah, Raghav V. Sampangi, Angela A. Siegel:
Mobile Application Security Risk Score: A sensitive user input-based approach. 1-10 - Shadi Jawhar, Jeremy R. Miller, Zeina Bitar:
AI-Driven Customized Cyber Security Training and Awareness. 1-5 - Wenhui Chu, Aobo Jin, Hardik A. Gohel:
A Novel Deep Learning Method for Segmenting the Left Ventricle in Cardiac Cine MRI. 1-9 - Mojtaba Ahmadi, Reza Nourmohammadi:
zkFDL: An efficient and privacy-preserving decentralized federated learning with zero knowledge proof. 1-10 - Sylvia Worlali Azumah, Victor Adewopo, Zag ElSayed, Nelly Elsayed, Murat Ozer:
A Secure Open-Source Intelligence Framework For Cyberbullying Investigation. 1-8 - Shakhmaran Seilov, Bishwajeet Pandey, Akniyet Nurzhaubayev, Dias Abildinov, Assem Konyrkhanova, Bibinur Zhursinbek:
Federated Learning Based Smart Horticulture and Smart Storage of Fruits Using E-Nose, and Blockchain: A Proposed Model. 1-5 - Wenhui Chu, Aobo Jin, Hardik A. Gohel:
Simulations and Advancements in MRI-Guided Power-Driven Ferric Tools for Wireless Therapeutic Interventions. 1-10 - Xavier Lessage, Leandro Collier, Charles-Henry Bertrand Van Ouytsel, Axel Legay, Saïd Mahmoudi, Philippe Massonet:
Secure federated learning applied to medical imaging with fully homomorphic encryption. 1-12 - Joseph Ponnoly, John Puthenveetil, Patricia D'Urso:
Prescriptive Analytics-based Robust Decision-Making Model for Cyber Disaster Risk Reduction. 1-5 - Chipo Mutongi, Billy Rigava:
Robotics in Healthcare: The African Perspective. 1-10 - Urjitkumar Patel, Fang-Chun Yeh, Chinmay Gondhalekar:
CANAL - Cyber Activity News Alerting Language Model : Empirical Approach vs. Expensive LLMs. 1-12 - Aadi Chauhan, Taran Anand, Tanisha Jauhari, Arjav Shah, Rudransh Singh, Arjun Rajaram, Rithvik Vanga:
Identifying Race and Gender Bias in Stable Diffusion AI Image Generation. 1-6 - Bryan Chung:
Addressing Data Imbalance in Plant Disease Recognition through Contrastive Learning. 1-6 - K. Rama Abirami, Tiago Zonta, Mithileysh Sathiyanarayanan:
A Holistic Review on Detection of Malicious Browser Extensions and Links using Deep Learning. 1-6 - Gideon Popoola, Khadijat-Kuburat Abdullah, Gerard Shu Fuhnwi, Janet O. Agbaje:
Sentiment Analysis of Financial News Data using TF-IDF and Machine Learning Algorithms. 1-6 - Ahamadali Jamali, Shahin Alipour, Audrey Rah:
Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment Analysis on Label-Free News Headlines. 1-5 - Shadi Jawhar, Jeremy R. Miller, Zeina Bitar:
AI-Based Cybersecurity Policies and Procedures. 1-5 - Charlie Grimshaw, Brian Lachine, Taylor Perkins, Emilie Coote:
Link-based Anomaly Detection with Sysmon and Graph Neural Networks. 1-6 - Chipo Mutongi, Billy Rigava:
The Application of the Fifth Discipline Strategies in the Learning City Concept. 1-7 - Priyan Malarvizhi Kumar, Kavya Vedantham, Jeeva Selvaraj, Balasubramanian Prabhu Kavin:
Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven Cybersecurity. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.