


default search action
2nd AIBThings 2024: Mt. Pleasant, MI, USA
- 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024, Mt Pleasant, MI, USA, September 7-8, 2024. IEEE 2024, ISBN 979-8-3315-2952-9
- Abhishek Phadke, Chandra N. Sekharan, Karthik Kumar Vasudeva, Dulal C. Kar:
Unifying Sky and Chain: A Perspective on Blockchain's Role in UAV Swarms. 1-9 - Mohamed A. Torad, Mohamed Abdulhamid ElKassas, Ahmed F. Ashour, Mostafa M. Fouda, Eslam Samy El-Mokadem:
Enhanced IoT Data Security with Robust AES-CBC Encryption Algorithm. 1-6 - Shekhar Shukla, Vartul Shrivastava:
Vectorizing Judicial Texts: A Novel Approach for Analysing POCSO Judgments using Text Embeddings and Transformers. 1-5 - Foster Yeboah, Jones Yeboah, George Yeboah, Kofi Bampoh, Owusu Nyarko-Boateng:
Comparative Analysis of Tree Classifiers to Mitigate Fraud in Electronic Loan Application. 1-4 - Mahmoud Darwich, Kasem Khalil, Magdy A. Bayoumi:
Adaptive Multi-Path Video Streaming Using AI-Driven Edge Computing for Enhanced Quality of Experience (QoE). 1-6 - Mohamed Shaban:
Prediction of Freezing of Gait for Patients with Parkinson's Disease Using Deep Learning. 1-4 - Hussien AbdelRaouf, Michael Long, Paul Tran, Luna Baral, Zuha Khan, Mohamed Mahmoud, Mostafa M. Fouda, Mohamed I. Ibrahem:
Privacy Preservation Techniques in Smart Grids: Balancing Security and Utility in IoT-Driven Environments. 1-6 - Thomas J. Kopcho, Mostafa M. Fouda, Cameron J. Krome:
A Lightweight AI Model for Anomaly Detection in Wireless Networks. 1-6 - Odunayo Gabriel Adepoju, Kevin Jin, Kemi Akanbi, Saheed Popoola:
Early Detection of Heart Disease Using Machine Learning Algorithm: Performance Analysis and Model Comparison. 1-5 - Jones Yeboah, Saheed Popoola:
Uncovering User Concerns and Preferences in Static Analysis Tools: a Topic Modeling Approach. 1-6 - Dhanush Adithya Balamurugan, Tala Talaei Khoei, Aditi Singh
:
An Efficient Deep Learning-based Model for Detecting and Tracking Multiple Objects. 1-6 - Mahamudul Hasan
, Rambabu Nalagandla:
An Ensemble Weighted User-Based Collaborative Filtering Recommender System. 1-6 - Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Deceptive Approach for Internet of Things Security with Machine Learning. 1-5 - Sophia Tali, Daniel Noguera, Rasha S. Gargees
:
Comparative Analysis of Hate Speech Detection Using Various Vectorization and Classification Techniques. 1-5 - Md. Nazmus Sakib, Md Athikul Islam, Royal Pathak, Md Mashrur Arifin:
Risks, Causes, and Mitigations of Widespread Deployments of Large Language Models (LLMs): A Survey. 1-7 - Antora Dev, Yomna Mohamed
, Ahmed Hamed, Yidong Xia, Robert Seifert, Mostafa M. Fouda:
Automated Phenotyping of Herbaceous Biomass Using U-Net Architecture for μ-CT Images Segmentation. 1-6 - Atul Agrawal
, Pashupati Baniya, Esraa Mohammed Alazzawi, Nitin Rakesh, Bharat Bhushan, Akhtar Jamil:
Detection of DoS and DDoS Attacks Using Machine Learning and Blockchain in IoMT Networks. 1-5 - Md Rahat Kader Khan
, Tamador Mohaidat, Kasem Khalil:
Predicting Acute Myocardial Infarction Using Machine Learning Algorithms. 1-5 - Mitra Bakhshi:
Novel Saliency Analysis for the Forward-Forward Algorithm. 1-5 - Ayisha Tabbassum, Vinod Goje
, Pradeep Chintale, Shaik Abdul Kareem:
The Use of Blockchain to Enhance Transparency and Accountability in SRE Workflows. 1-6 - Mahmoud Darwich, Kasem Khalil, Magdy A. Bayoumi:
End-to-End Secure Video Streaming Using Homomorphic Encryption Techniques. 1-6 - Md. Bipul Hossain
, Mohamed Shaban:
Resource Efficient Deep Learning Architectures for Histopathology-Based Colorectal Cancer Detection. 1-5 - Habibur Rahman, Md Tanvir Chowdhury, Monjurul Islam Sumon, Fatiha Mahbub Mim, Mohammad Rifat Ahmmad Rashid, Raihan Ul Islam, Mahamudul Hasan
:
Analyzing A/B Testing Results in Digital Marketing. 1-5 - Sheenam Naaz, Suraiya Parveen, Ihtiram Raza Khan
, Safdar Tanweer:
Enhancing Security in Smart Cities: A Blockchain and AI Integrated Framework. 1-5 - Michael Arthur Mills, Tala Talei Khoei:
Future-Proofing Computer Behavior: A Framework for Predictive Analytics and Seamless Device Integration. 1-5 - Enoch Solomon:
Reinforcement Learning for Autonomous Agents via Deep Q Networks (DQN) within ViZDoom environment. 1-5 - Hussam N. Fakhouri, Faten Hamad:
Hybrid Four Vector Intelligent Optimizer with SaDE for Solving Robot Gripper Optimization Problem. 1-6 - Nafay Rizwani, Akhtar Jamil, Alaa Ali Hameed:
Deep Learning-based Techniques for Intrusion Detection Systems. 1-9 - Jason Eckardt-Taing, Yasser Alginahi:
Real-Time American Sign Language Recognition Using Machine Learning. 1-5 - Tanzim Mostafa
, Mohamed I. Ibrahem, Mostafa M. Fouda:
Unraveling Model Inversion Attacks: A Survey of Machine Learning Vulnerabilities. 1-8 - Essel Emmanuel, Fred Lacy, Yasser Ismail:
Optimizing Resource Utilization and Power Efficiency in FPGA-Accelerated YOLOv8 Object Detection Using Vivado High-Level Synthesis (HLS) Tool. 1-4 - Mahamudul Hasan
:
An Efficient Multi-threaded Collaborative Filtering Approach in Recommendation System. 1-6 - Ghassan A. Abed:
Embedded Intelligence Algorithms to Improve Performance in Software-Defined Networks (SDN). 1-6 - Stephane Maillard, Mohammad Safayet Khan:
French regional languages identification using custom dataset and Naive Bayes model. 1-5 - Mohamad Zafar Iqbal Badar, Mohammed Majid M. Al Khalidy
:
Secure Energy Transactions in Smart Grids Using Blockchain and Machine Learning. 1-10 - Hussien AbdelRaouf, Ryker Gogolkiewicz, Nathaniel Kim, Nicholas McCaughan, Joel Alanes, Ali Nadhaif, Mostafa M. Fouda, Mohamed I. Ibrahem:
Demand Response in Smart Grids: Challenges, Solutions, and Security Implications. 1-6 - Andleeb Khan
, Parma Nand, Bharat Bhushan, Alaa Ali Hameed, Akhtar Jamil:
A Review of Blockchain based Decentralised Authentication Solutions and their improvement through Metamask. 1-5 - Md. Abdur Rahman, Hossain Shahriar, Fan Wu, Alfredo Cuzzocrea:
Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks Detection. 1-7 - Brett Sicard, S. Andrew Gadsden:
Hybrid Modeling for Condition Monitoring in Digital Twin Systems. 1-5 - Tamador Mohaidat, Md Rahat Kader Khan
, Kasem Khalil:
Curvature-Based Piecewise Linear Approximation Method of GELU Activation Function in Neural Networks. 1-5 - Shakib Sadat Shanto, Rahul Paul, Zishan Ahmed, Ahmed Shakib Reza
, Kazi Mejbaul Islam, Saumya Shovan Roy:
Console Log Explainer: A Framework for Generating Automated Explanations using LLM. 1-5 - A. N. K. Zaman, Prosenjit Chatterjee, Tapas Vashi:
Social Impact of Healthcare Privatization: An Analysis. 1-5 - Mohammed A. Alqodah
, Mahdia Tahsin, Mohammad H. Omari, Mustafa M. Matalgah, David Harrison:
RF-Based Lightweight Machine Learning for Comprehensive Drone Activity Classification. 1-5 - Ikhlass Boukrouh
, Faouzi Tayalati, Abdellah Azmani
:
Integrating Genetic Algorithms and Analytic Hierarchy Process for Customer Retention Optimization in E-Commerce. 1-5 - Andleeb Khan
, Parma Nand, Bharat Bhushan, Esraa Mohammed Alazzawi, Akhtar Jamil:
A Review of Spectrum Sharing in 6G for IoT Environment. 1-6 - Atoshe Islam Sumaya, Shamim Forhad, Md Al Rafi
, Hamdadur Rahman, Muhibul Haque Bhuyan, Qazi Tareq:
Comparative Analysis of AlexNet, GoogLeNet, VGG19, ResNet50, and ResNet101 for Improved Plant Disease Detection Through Convolutional Neural Networks. 1-6 - Eisha Rehan, Shahwaiz Memon, Muhsin Raza, M. Asif Naeem, Fazeel Nadeem Bhatti:
A Light-Weight Image to Description Model Using Knowledge Distillation. 1-7 - Chris Brogly, Austin McCutcheon:
Interrupted time series analysis of clickbait on worldwide news websites, 2016-2023. 1-4 - Shaibal Das, Mostafa M. Fouda:
Drone Detection: Countering Optical Evasion Strategies Using Deep Learning. 1-5 - Ank Zaman, Prosenjit Chatterjee, Rajat Sharma:
Real-Time Drivers' Drowsiness Detection: A Deep Learning Approach. 1-5 - Asif Rasheed
, Zubair Md Fadlullah, Mostafa M. Fouda:
Alzheimer's Disease Stage Classification using Blood Data. 1-5 - Xian Gao
, Peixiong He, Yi Zhou, Xiao Qin:
Limited Resources Usage of Deep-Learning-Based IoT Devices in Healthcare. 1-6 - Enkeleda Lulaj, Desi Tahiraj, Alaa Ali Hameed, Donjeta Lulaj:
Seeing Isn't Always Believing: Unveiling the Financial Risks of Fraudulent Images on Personal Finances in Online Shopping. 1-10 - Md. Nazmus Sakib, Md Athikul Islam, Md Mashrur Arifin:
Automatic Pull Request Description Generation Using LLMs: A T5 Model Approach. 1-5 - Sivani Chava, Isaac Kofi Nti, Murat Ozer:
A Thematic Analysis and Detection of Fraudulent Online Ratings. 1-6 - Sylvia Worlali Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer, Amanda La Guardia:
Deep Learning Approaches for Detecting Adversarial Cyberbullying and Hate Speech in Social Networks. 1-10 - Siddique Abubakr Muntaka, Murat Ozer, Emmanuel Kojo Gyamfi
, Faiza Hussein, Mohammed Nadhir Muntaka, Insanatu Muntaka:
Harnessing IT Best Practices: IoT for Continuous Monitoring and Control in Agriculture. 1-5 - Hussien AbdelRaouf, Mohamed I. Ibrahem:
Exploring Advanced Techniques for Identifying Electricity Theft in Smart Grid Systems. 1-6 - Mohammad Amir Sharif, Phuong Hoang, Justin Huang, Wenshan Wang, David Molina, Ajay Kumar, Suhai Liu, Faizan Javed:
Efficient Health Class Recommendations for Kaiser Permanente Members: A Scalable Embedding-Based Approach. 1-5 - Faouzi Tayalati, Ikhlass Boukrouh
, Abdellah Azmani
, Monir Azmani:
Predictive Quality Defects Combining Design of Experiments and Machine Learning: A Case Study on Shrinkage in Injection Molding. 1-5 - Naga Sri Harsha Sankabathula, Isaac Kofi Nti, Murat Ozer:
Thyro-AI: Harnessing Machine Learning for Thyroid Prediction. 1-6 - Md Tanvir Chowdhury, Habibur Rahman, Md Safayet Islam, Monjurul Islam Sumon, Abu Talha, Abin Roy, Md Moinul Hassan, Md Rabiul Hasan Rabin:
Exploring the Challenges and Solutions for Securing Smart Cities. 1-5 - Shijon Das, Mohamed I. Ibrahem, Mostafa M. Fouda:
A Survey on the Landscape of Machine Learning Solutions for Detecting Phishing Attacks. 1-7 - Yakubu Joseph Itodo, Isaac Kofi Nti:
Enhancing Network Intrusion Detection System Using NDAE With Xgboost. 1-9 - Arifa I. Champa, Md. Fazle Rabbi, Mostafa M. Fouda, Minhaz F. Zibran:
Deep Enough? On the Effectiveness of Deep Learning in Phishing Email Detection. 1-7 - Kasem Khalil, Samiul Islam Niloy
, Tamador Mohaidat, Md Rahat Kader Khan
, Magdy A. Bayoumi:
Efficient Deep Learning Approach for Arthritis Prediction. 1-5 - Thomas J. Kopcho, Mostafa M. Fouda, Cameron J. Krome, Anna T. Quach, Israel G. Olaveson:
Analyzing the Impact of Security Measures on Wi-Fi Quality of Service. 1-5 - Enoch Solomon, Abraham Woubie, Eyael Solomon Emiru, Ahmed F. Abdelzaher:
Secure and Efficient Face Recognition via Supervised Federated Learning. 1-5 - Md Sabbir Hossain, Ummay Khadiza Rumpa, Shatabdi Sharma, Mamunur Rashid, Habibur Rahman, Sazzadul Islam Shovon:
Smart Home Automation System controlling Through Computer Vision. 1-5 - Vasavi Krishna Chintamaneni, Sai Kiran Debbadi, Sri Srujani Kandula, Rasha S. Gargees
:
Hybrid Deep Learning/Machine Learning Model for Retinal Diseases Classifications Using OCT Images. 1-5 - Sandeep Shiraskar
, Dominick Rizk:
Advancements in Brain Tumor Detection: Utilizing Xception Enhanced Tumor Identifier Network. 1-5 - Yash Jani:
Scaling Visual Creativity: Benchmarking stable-diffusion-3 on AWS Cloud. 1-7 - Jones Yeboah, Saheed Popoola:
Analyzing User Sentiments Towards Static Analysis Tools: A Study Using User Reviews. 1-7 - Ahmed Alsalem, Mohamed Zohdy:
Wheat Field Fire Smoke Detection from UAV Images using CNN-CBAM. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.