default search action
CCCI 2024: Beijing, China
- Mohammad S. Obaidat, Lin Zhang, Xiaokun Wang, Chao Yao, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:
International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2024, Beijing, China, October 16-18, 2024. IEEE 2024, ISBN 979-8-3503-4983-2 - Lakshin Pathak, Mili Virani, Mohammad S. Obaidat, Prachita Patel, Jigna J. Hathaliya, Nilesh Kumar Jadav, Sudeep Tanwar, Nagendar Yamsani:
A Transfer Learning-Based Intelligent Judiciary System for Public Safety. 1-6 - Li Zha, Hai Zhang, Cancan Tao, Shibo Qu:
A Correlation Approach for SOPs Detection Combining OFDM. 1-8 - Payel Biswas, Debashis De, Mohammad S. Obaidat, Arnab Hazra, Balqies Sadoun:
FedHZone: Federated Learning Based Hazardous Zone Detection Using Internet of Drone Things. 1-6 - Jieui Kang, Sooyoung Kwon, Hyojin Kim, Jaehyeong Sim:
AutoCaps-Zero: Searching for Hardware-Efficient Squash Function in Capsule Networks. 1-8 - Jieui Kang, Subean Lee, Eunseo Kim, Soeun Choi, Jaehyeong Sim:
OCW: Enhancing Few-Shot Learning with Optimized Class-Weighting Methods. 1-8 - Xirui Wang, Hui Lu, Shiqi Wang, Zhu Zheng:
Boundary Scenario Generation Method of the Intelligence System Based on Adaptive Poisson Disk Sampling. 1-8 - Sapan Anupkumar Shah, Shanika Soni, Mohammad S. Obaidat, Nilesh Kumar Jadav, Jigna J. Hathaliya, Sudeep Tanwar, Nagendar Yamsani:
Blockchain-Assisted Secure and Trusted Ticketing System for Outsourced Premier League. 1-6 - Qianshun Zou, Bing Sun, Yiheng Zhou, Yunfei Xi:
Multi-Target Deblurred Monitoring Method Combining Millimeter Wave Radar and Camera. 1-5 - Abhijay Rana, Kevin Lu, Rudransh Singh:
Enhancing Electronic Health Record Systems with Serverless Blockchain Integration. 1-5 - Zsolt Csaba Johanyák, Edit Laufer, Levente Kovács:
Fuzzy Logic-Based Preliminary Risk Assessment for a Supervised Federated Learning Solution in Predicting Student Results. 1-8 - Xing Chang, Mohammad S. Obaidat, Xiaoping Xue, Jingxiao Ma, Xiaowen Duan:
Mobility-Aware Vehicle Selection Strategy for Federated Learning in the Internet of Vehicles. 1-6 - Jinlong Wang, Qiang Zhang:
Controllability of Symmetric Double Layer Networks. 1-7 - Hirofumi Noguchi, Masashi Kaneko:
Application-Independent DVFS Method Based on OS Metrics Monitoring for Cloud Servers. 1-6 - Veska Gancheva:
Healthcare Data Analytics Based on Machine Learning. 1-6 - Altaaf Ahmed Jahankeer, Gary Deng, Abdullah Aslam, Arjen Arumalingam:
Autonomous Ping Pong Ball Collector. 1-7 - Evan Gardner, Gurmeet Singh, Weihao Qu:
Penetration Testing Operating Systems: Exploiting Vulnerabilities. 1-9 - Aparna Kumari, Mohammad S. Obaidat, Shikhar Panchal, Nikhil Raval, Prasun Kumar, Dileep Kumar Yadav:
M- VMT-PC: Metaverse-Enabled Virtual Medical Training and Patient Care Framework Underlying 5G. 1-7 - Pragya Bhatt, Mohammad S. Obaidat, Gagan Dangwal, Ashok Kumar Das, Mohammad Wazid, Balqies Sadoun:
Machine Learning-Based Security Mechanism for Detecting Phishing Attacks. 1-6 - Haoyu Yuan, Tingting Li, Chenguang Wang:
Route Planning Algorithm Based on Irradiation Requirements for Laser-Guided Airborne Ground Weapons. 1-8 - Ren Duan, Meng Ma, Chaohai Du:
A Perfect Secrecy Communication Scheme Based on Strictly Typical Artificial Noise and Cascaded Secure Codes. 1-5 - Md Kamruzzaman, Md Khokan Bhuyan, Rakibul Hasan, Syeda Farjana Farabi, Sadia Islam Nilima, Md Azhad Hossain:
Exploring the Landscape: A Systematic Review of Artificial Intelligence Techniques in Cybersecurity. 1-6 - Zahra Kokhazad, Charalampos Bournas, Dimitrios Gkountelos, Georgios Keramidas:
DNN-Based Speech Enhancement on Microcontrollers. 1-7 - Deepika Gautam, Garima Thakur, Mohammad S. Obaidat, Kuei-Fang Hsiao, Pankaj Kumar:
Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT. 1-8 - Yepeng Ding, Lingfeng Zhang, Junwei Yu, Hiroyuki Sato, Tohru Kondo, Kouji Nishimura:
Emer: Reputation-Based Event Consumer for Event-Driven Decentralized Systems. 1-8 - Chandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Agbotiname Lucky Imoize:
An Efficient Provably Secure Identity-Based Authentication Technique for TMIS Under a Smart City Environment. 1-7 - Boma ThankGod-Ibulubo, Harpreet Singh, Cosmas Ifeanyi Nwakanma, Edwin Allotey-Acquaye:
Mitigating Broadcast Propagation in Redundant BMA Networks Using Layer 3 Uplinks. 1-8 - Song Fang, Jiamin Wang, Zirun Zhao, Chaopeng Wei, Xudong Zhang, Jiaxin Wang, Mohammad S. Obaidat, Xiaokun Wang:
Shape Prior Enhanced Unet Model for Medical Image Segmentation. 1-9 - Bingzhou Dai, Lei Wang, Xiaoyong Zhao, Yu Guo, Mohammad S. Obaidat:
GemmaWithLoRA: A New Approach to Click Fraud Detection. 1-8 - Zhiyuan Wu, Fengchun Tian, James Anthony Covington, Hantao Li, Li Hu, Yue Liu:
Silhouette-Based Selectivity Analysis of a Staircase-Modulated Electronic Nose. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.