


default search action
3rd IDSTA 2022, San Antonio, TX, USA
- Mohammad A. Alsmirat, Yaser Jararweh, Moayad Aloqaily, Izzat Alsmadi:

3rd International Conference on Intelligent Data Science Technologies and Applications, IDSTA 2022, San Antonio, TX, USA, September 5-7, 2022. IEEE 2022, ISBN 978-1-6654-9960-6 - Jimmy Nguyen:

Keynote Speech 1: A Connected World: Blockchain Scaling for Micropayments, IoT & the Future of Data. 1 - Kip M. Twitchell:

Keynote Speech 2: Transformation of Business and Financial Platforms: What we must understand to renew existing systems. 2 - Daniel Keane:

Keynote Speech 2: Blockchain based Data science and data engineering: (Human) Ecology in the Digital Age. 3 - P. Rajesh

, Mansoor Alam, Mansour Tahernezhadi, Monika A
, Gm Chanakya:
Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework. 4-12 - Dylan Hall, Anthony Gladdney, Yasimine Labriny, Yazan A. Alqudah:

On the Development of Mobile Application Breathing Analyzer to Detect Breathing Abnormalities. 13-16 - Shovan Chowdhury, Yuxiao Lin, Boryann Liaw, Leslie M. Kerby:

Evaluation of Tree Based Regression over Multiple Linear Regression for Non-normally Distributed Data in Battery Performance. 17-25 - John Olamofe, Xishuang Dong, Lijun Qian, Eric Shields:

Performance Evaluation of Data Augmentation for Object Detection in XView Dataset. 26-33 - Alina Govoruhina, Anastasija Nikiforova

:
Digital health shopping assistant with React Native: a simple technological solution to a complex health problem. 34-40 - Debojyoti Seth

:
Joint SCSP-LROM: A novel approach to detect Cerebrovascular Anomalies from EEG signals. 41-45 - Xishuang Dong, Shouvon Sarker, Lijun Qian:

Integrating Human-in-the-loop into Swarm Learning for Decentralized Fake News Detection. 46-53 - Hussein Al-Zoubi, Samah Altaamneh:

A Feature Selection Technique for Network Intrusion Detection based on the Chaotic Crow Search Algorithm. 54-60 - Nisha Menon, Shantanu Saboo, Tanmay Ambadkar

, Umesh Uppili:
Discrete Sequencing for Demand Forecasting: A novel data sampling technique for time series forecasting. 61-67 - Siyamdumisa Maphisa, Duncan Coulter:

Face Anti-spoofing based on Convolutional Neural Networks. 68-74 - Dana Alsagheer, Hadi Mansourifar, Mohammad Mahdi Dehshibi

, Weidong Shi:
Detecting Hate Speech Against Athletes in Social Media. 75-81 - Mahmoud Atari

, Amjed Al-Mousa:
A Machine-Learning Based Approach for Detecting Phishing URLs. 82-88 - Naresh Kumar, Abdul Khadar Jilani, Pavan Kumar

, Anastasija Nikiforova
:
Improved YOLOv3-tiny Object Detector with Dilated CNN for Drone-Captured Images. 89-94 - Rishabh Subramanian:

Differential Privacy Techniques for Healthcare Data. 95-100 - Amy Wilson, Fadi Wedyan, Safwan Omari:

An Empirical Evaluation and Comparison of the Impact of MVVM and MVC GUI Driven Application Architectures on Maintainability and Testability. 101-108 - Yunpeng Zhang, Daniel Egwede, Guohui Zhang

, Xuqing Wu:
Pseudonym Tracking Certificateless Aggregate Signature Scheme for Preventing Replay Attacks in a Platoon of Vehicles. 109-116 - Yunpeng Zhang, Yash Gandhi, Zhixia Richard Li

, Zhiwen Xiao:
Improving the Classification Effectiveness of Network Intrusion Detection Using Ensemble Machine Learning Techniques and Deep Neural Networks. 117-123 - Evan Lowhorn, Rami J. Haddad

:
Rules-Based Distracted Driving Detection System Using Facial Keypoints. 124-128 - Alexander Kalinowski, Yuan An:

Repurposing Knowledge Graph Embeddings for Triple Representation via Weak Supervision. 129-137 - Neha Mishra, Haim Levkowitz:

Performance Evaluation of Permissioned-based Personal Data Vault Implemented Using Hyperledger Fabric v2.x. 138-145 - Ahmed Aleroud, Nour Alhussien

, Craig Albert:
From Theory to Practice: Towards an OSINT Framework to Mitigate Arabic Social Cyber Attacks. 146-151 - Mohammed Ali Kunda, Izzat Alsmadi:

Practical web security testing: Evolution of web application modules and open source testing tools. 152-155 - Alexander Shroyer, D. Martin Swany

:
Data Augmentation for Code Analysis. 156-163 - Izzat Alsmadi, Bilal Al-Ahmad

, Mohammad Alsmadi:
Malware analysis and multi-label category detection issues: Ensemble-based approaches. 164-169 - Ahmad Al-Omari, Andrew Allhusen, Abdullah Wahbeh, Mohammad Al-Ramahi, Izzat Alsmadi:

Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms. 170-175 - Hafed Zarzour, Faiz Maazouzi, Mohammad Al-Zinati, Amjad Nusayr, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub, Yaser Jararweh:

Using K-means Clustering Ensemble to Improve the Performance in Recommender Systems. 176-180 - Alankrit Mishra, Nikhil Raj

, Garima Bajwa:
EEG-based Image Feature Extraction for Visual Classification using Deep Learning. 181-188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














