| MalEfficient10%: A Novel Feature Reduction Approach for Android Malware Detection |
| Android Malware Detection based on Static Analysis and Data Mining Techniques: A Systematic Literature Review |
| Comparative analysis of the Performance Metrics in IMT-E Band using Horn Antenna and Helical Antenna at Center Frequency 2.6 GHz |
| BCTM: A Topic Modeling Method Based on External information |
| A modern platform for social governance |
| Client Selection Based on Diversity Scaling for Federated Learning on Non-IID Data |
| A new approach for measuring delay in 5G cellular networks |
| Research on Robust Optimization of complex networks based on finite edge addition method |
| Amharic Language Hate Speech Detection from Facebook Image Post Using Deep Learning |
| Improving the Efficiency of WebRTC Layered Simulcast Using Software Defined Networking |
| An Empirical Study on Model Pruning and Quantization |
| GreenDRo: Deep Hybrid Edge-Cloud Detection for Battery-Performance Balance Conscious Devices |
| Neural Sample Search and DRo: Data Vs. Model Dimension (Neural Architecture Search) of AutoML |
| Deep CounterStrike: Counter Adversarial Deep Reinforcement Learning for Defense against Metamorphic Ransomware Swarm Attack |
| Modeling Water and Nutrient Dynamics in Response to Conservation Agriculture Practices under Smallholder Farms in the Ethiopian Highlands |
| Hydro systems Analysis of Lake Tana Basin and the impact of irrigation withdrawals on downstream Water Uses. |