default search action
2nd ICAIC 2023: Houston, TX, USA
- IEEE 2nd International Conference on AI in Cybersecurity, ICAIC 2023, Houston, TX, USA, February 7-9, 2023. IEEE 2023, ISBN 979-8-3503-9696-6
- Jyoti Saini, Keshav Kumar, Bishwajeet Pandey, Hardik A. Gohel:
Detection of Cardiac Tumors Using Parallel Computing. 1-4 - Elham Abdulwahab Anaam, Mohammad Kamrul Hasan, Taher M. Ghazal, Su-Cheng Haw, Haitham M. Alzoubi, Muhammad Turki Alshurideh:
How Private Blockchain Technology Secure IoT Data Record. 1-6 - Jing Su, Suku Nair, Leo Popokh:
EdgeGym: A Reinforcement Learning Environment for Constraint-Aware NFV Resource Allocation. 1-7 - Guanhua Zhu, Xiaofan Liu, Lizhe Tan:
Bearing Fault Diagnosis Based on Sparse Wavelet Decomposition and Sparse Graph Connection Using GraphSAGE. 1-6 - Gasim Othman Alandjani:
Blockchain Technology and Impacts on Potential Industries. 1-4 - Ismail Hossain, Sai Puppala, Sajedul Talukder:
Collaborative Differentially Private Federated Learning Framework for the Prediction of Diabetic Retinopathy. 1-6 - Otavio Kiyatake Nicesio, Adriano Galindo Leal, Vagner Luiz Gava:
Quantum Machine Learning for Network Intrusion Detection Systems, a Systematic Literature Review. 1-6 - Omar Saif Musabbeh Bin Hamed Almazrouei, Pritheega Magalingam, Mohammad Kamrul Hasan, Majed Almehrzi, Ahmed Alshamsi:
Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAM. 1-5 - Yuri B. Boiko, Iluju Kiringa, Tet Hin Yeap:
Voltage hopping induced by bias injection attack against Kalman filter of BLDC motor. 1-5 - Ayodeji Ogundiran, Hongmei Chi, Jie Yan, Ruth Agada:
A Framework to Reconstruct Digital Forensics Evidence via Goal-Oriented Modeling. 1-11 - Michael P. Murphy, Hirak Mazumdar, Hardik A. Gohel, Hilary P. Emerson, Daniel I. Kaplan:
Long Short-Term Memory Networks for Monitoring Groundwater Contamination at the Hanford Site. 1-5 - Imadeldin Elsayed Elmutasima, Izzeldin I. Mohd, Khalid Hamid Bilal:
Scrutinization of Saline Sea Utilizing a Water-Based Antenna for the Radio Communications. 1-4 - Daryle Smith, Sajad Khorsandroo, Kaushik Roy:
Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets. 1-7 - Wesam Fadheel, Steve Carr, Wassnaa Al-Mawee:
On Phishing: Proposing a Traffic Behavior-Based Model to Detect, Prevent, and Classify Webpage Suspicious and Malicious Activities. 1-8 - Gengjia Zhang, Daegil Choi, Siho Shin, Jaehyo Jung:
Cuff-less blood pressure estimation from ECG and PPG using CNN-LSTM algorithms. 1-4 - Monika Sharma, Ajay Kaul:
Suspicious Permissions Detection of Covid-19 Themed Malicious Android Applications. 1-6 - Miguel A Barajas, Michael P. Murphy, Louis C. Lasseter, Godspower I Sunny, Hirak Mazumdar, Hardik A. Gohel, Hilary P. Emerson, Daniel I. Kaplan:
Seasonal Trend Assessment for Groundwater Contamination Detection and Monitoring using ARIMA Model. 1-7 - Daegil Choi, Gengjia Zhang, Siho Shin, Jaehyo Jung:
Decision Tree Algorithm for Depression Diagnosis from Facial Images. 1-4 - Sangu Venkata Sai Harsith Reddy, Gadhiraju Reddy Sekhar Raju, Nookala Jayanth, Malla Charan Sai, Bishwajeet Pandey, Geetha G., Hardik A. Gohel:
Design of QR Based Smart Student Attendance System. 1-4 - Sai Puppala, Ismail Hossain, Sajedul Talukder:
Machine Learning and Sentiment Analysis for Predicting Environmental Lead Toxicity in Children at the ZIP Code Level. 1-6 - Elham Anaam, Taher M. Ghazal, Su-Cheng Haw, Haitham M. Alzoubi, Muhammad Turki Alshurideh, Abdullah Al Mamun:
Utilization of Blockchain Technology In Human Resource Management. 1-5 - Yashwant Aditya:
Significance of artificial intelligence to deal with stress during the organisational changes. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.