BITS-HAR: Human Activity Recognition using Explainable Deep Learning Models | Jhala, Devrajsinh (BITS Pilani, India); Kurian, Gladwin (BITS Pilani, India); Agrawal, Yogesh Kumar (BITS Pilani, India); Jat, Ishan (BITS Pilani, India); Rathore, Hemant (BITS Pilani) |
PhishBuster: Phishing Detection based on URL Embeddings and Deep Learning Models with Explainability | Pavan, T.M.V.S.G (BITS Pilani, India); Charan, Tanikella Sai (BITS Pilani, India); Agarwal, Ayush (BITS Pilani, India); Vivekanandan, Ajith (BITS Pilani, India); Rathore, Hemant (BITS Pilani, India) |
Phenotypic Analysis of Sorghum Canopies via UAV Multispectral Data and Machine Learning | Deng, Linqiang (College of Software, Shanxi Agricultural University) |
Privacy enhancing Healthcare Data Analysis using BNN | Ding, Yongjian (University of Electronic Science and Technology of China); li, hongping (UESTC) |
Pixel-level privacy preserving in DICOM anonymisation | Dai, Jinxiang (University of Electronic Science and Technology of China); Li, Hongping (UESTC) |
Poster: An Anomaly Causal Analysis Method in Complex 5G Network Environments | Zhijian, Xu (XIdian University); Zhiwei, Zhang (Xidian University) |
Probabilistic packet scheduler for multipath data transfer in highly variable delay conditions | Morawski, Michal (Lodz University of Technology, Lodz, Poland); Ignaciuk, Przemyslaw (Lodz University of Technology, Lodz, Poland) |
Atomic Operation Classification for Effective Legal Supervision Model Construction | Qin, Tao (Xi’an Jiaotong University); Liu, Yunzhe (Xi’an Jiaotong University); Gao, Ya (Xi’an Jiaotong University); Li, Yizhen (Xi’an Jiaotong University); Wang, Pinghui (Xi’an Jiaotong University) |
A Novel GAN-based DDoS Attack Detection Method for Smart Home Networks | Ahmed, Ismeil (Coventry University); Rakib, Abdur (Coventry University); Aydin, Mehmet Emin (University of the West of England) |
Performance evaluation of SARQ in LLNs | Chahed, Manel (University of Sousse); Meddeb, Aref (University of Sherbrooke); Boufaied, Amine (University of Sousse) |
A NOVEL ENCRYPTED DATA HIDING AND IMAGE ENCRYPTION FOR AUTHENTICATION BASED COMMUNICATION FRAMEWORK | P, Siva Priyanga (Anna University); C, RAMASAMY SANKAR RAM (ANNA UNIVERSITY, BIT CAMPUS, TRICHY) |
OST: An AI enabled One-Stop Station Platform for Cyber Security Incident Reporting | Li, Shancang (Cardiff University); Al Rashdi, Alwaleed (Cardiff University) |
A Hierarchical Lattice-Based Distributed Identity Authentication Scheme | Xinqi, Dong (Qufu normal university); Yijia, Wang (Qufu normal university); Xu, Zhang (Qufu normal university); Yilei, Wang (Qufu normal university) |
A Fake News Detection Model based on Expert Knowledge Integration | Xu, Hui (Xi’an Jiaotong University); Fang, Haowen (Xi’an Jiaotong university); Qin, Tao (Xi’an Jiaotong University) |
Optimization of Image Binarization Threshold Based on Gaussian Weighted Averaging and Machine Learning | Lu, Kui (qufu normal university); li, tao (qufu normal university); fan, Shuyu (qufu normal university); Ye, Baopeng (qufu normal university) |
Network-orchestrated security protocol for the Internet of Drones in O-RAN | Donaghy, Nathan (Queen’s University Belfast); Olukoya, Oluwafemi (Queen’s University Belfast); Rafferty, Karen (Queen’s University Belfast); Duong, Trung Q. (Queen’s University Belfast); Sharma, Vishal (Queen’s University Belfast) |