Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyJanuary 2025JUST ACCEPTED
A Comprehensive Survey of Data-Driven Solutions for LoRaWAN: Challenges and Future Directions
ACM Transactions on Internet of Things (TIOT), Just Accepted https://doi.org/10.1145/3711953LoRaWAN is an innovative and prominent communication protocol in the domain of Low Power Wide Area Networks (LPWAN), known for its ability to provide long-range communication with low energy consumption. However, the practical implementation of the ...
- research-articleJanuary 2025JUST ACCEPTED
Applications of Certainty Scoring for Machine Learning Classification and Out-of-Distribution Detection
ACM Transactions on Probabilistic Machine Learning (TOPML), Just Accepted https://doi.org/10.1145/3711713Quantitative characterizations and estimations of uncertainty are of fundamental importance for machine learning classification, particularly in safety-critical settings where continuous real-time monitoring requires explainable and reliable scoring. ...
- surveyJanuary 2025JUST ACCEPTED
Deep Learning on Network Traffic Prediction: Recent Advances, Analysis, and Future Directions
ACM Computing Surveys (CSUR), Just Accepted https://doi.org/10.1145/3703447From the perspective of telecommunications, next-generation networks or beyond 5G will inevitably face the challenge of a growing number of users and devices. Such growth results in high-traffic generation with limited network resources. Thus, the ...
- tutorialJanuary 2025
Concurrent and Learned Data Structures
ICDCN '25: Proceedings of the 26th International Conference on Distributed Computing and NetworkingPages 430–434https://doi.org/10.1145/3700838.3703693We explore the landscape of modern data structures that employ two powerful scaling mechanisms simultaneously: (a) concurrency to harness the power of today’s multicore processors, and (b) learned queries – the operations employing machine learning ...
- extended-abstractJanuary 2025
Postprandial Blood Glucose Level Prediction through combined Machine Learning, Meta-Learning and XAI
ICDCN '25: Proceedings of the 26th International Conference on Distributed Computing and NetworkingPages 284–286https://doi.org/10.1145/3700838.3703661Postprandial blood glucose (PPBG) is the glucose level measured after a meal and it is one of the main factors for Type 2 Diabetes Mellitus (T2DM) management. This work aims to predict PPBG level of T2DM patients by addressing the problems of clinical ...
-
- articleJanuary 2025
Legal Privacy Protection Machine Learning Method Based on Word2Vec Algorithm
International Journal of Information Security and Privacy (IJISP-IGI), Volume 19, Issue 1Pages 1–19https://doi.org/10.4018/IJISP.365911This study uses Word2Vec's word vector representation technology to finely capture the semantic relationships of vocabulary in legal texts through the Skip-gram model. By introducing Hierarchical Softmax optimization, a legal privacy protection model ...
- articleJanuary 2025
Condition Identification of Calcining Kiln Based on Fusion Machine Learning and Semantic Web
International Journal on Semantic Web & Information Systems (IJSWIS-IGI), Volume 21, Issue 1Pages 1–36https://doi.org/10.4018/IJSWIS.365203The static control limits restrict self-healing capabilities and decision-making processes, impeding adaptability to the dynamic shifts in intricate industrial operations, frequently leading to suboptimal or anomalous conditions that undermine production ...
- research-articleDecember 2024JUST ACCEPTED
Explainable Artificial Intelligence for Medical Applications: A Review
ACM Transactions on Computing for Healthcare (HEALTH), Just Accepted https://doi.org/10.1145/3709367The continuous development of artificial intelligence (AI) theory has propelled this field to unprecedented heights, owing to the relentless efforts of scholars and researchers. In the medical realm, AI takes a pivotal role, leveraging robust machine ...
- short-paperJanuary 2025
Short Paper: Prediction of Yarn Fineness Using Computer Vision Based Techniques
- Asef Rahman Dipto,
- Md. Shahriar Istiaqe,
- Nazmul Islam,
- Sultana Umme Habiba,
- Tarik Reza Toha,
- Shaikh Md. Mominul Alam
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 210–215https://doi.org/10.1145/3704522.3704551One of the most important factors that are associated with the quality and performance of textiles is the fineness of yarn. There is usually high demand for automated methods of yarn fineness measurement as the traditional methods are time consuming and ...
- short-paperJanuary 2025
Short Paper: Dementia Patient Health, Prescriptions ML Dataset: LightGBM Classification of XAI-based LIME and SHAP for Dementia Detection
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 197–202https://doi.org/10.1145/3704522.3704550Dementia is a common neurological disorder that substantially impacts the global population. Primarily, it affects elderly individuals who experience a correlation between memory decline and cognitive function. Regrettably, no effective medications are ...
- research-articleJanuary 2025
Enhancing Graph Representation Learning with WalkLM for Effective Community Detection
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 41–47https://doi.org/10.1145/3704522.3704537Embeddings in deep neural networks are essential for processing high-dimensional and categorical data by converting it into compact, low-dimensional vectors. This conversion enables the model to capture complex semantic relationships and improves its ...
- research-articleJanuary 2025
Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI
NSysS '24: Proceedings of the 11th International Conference on Networking, Systems, and SecurityPages 137–145https://doi.org/10.1145/3704522.3704532Phishing has been a prevalent cyber threat that manipulates users into revealing sensitive private information through deceptive tactics, designed to masquerade as trustworthy entities. Over the years, proactively detection of phishing URLs (or websites) ...
- research-articleDecember 2024JUST ACCEPTED
A Systematic Literature Review of Multi-Label Learning in Software Engineering
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3708532In this paper, we provide the first systematic literature review of the intersection of two research areas, Multi-Label Learning (MLL) and Software Engineering (SE). We refer to this intersection as MLL4SE. In recent years, MLL problems have increased in ...
- research-articleDecember 2024
Explainable automated debugging via large language model-driven scientific debugging
Empirical Software Engineering (KLU-EMSE), Volume 30, Issue 2https://doi.org/10.1007/s10664-024-10594-xAbstractAutomated debugging techniques have the potential to reduce developer effort in debugging. However, while developers want rationales for the provided automatic debugging results, existing techniques are ill-suited to provide them, as their ...
- ArticleDecember 2024
Vision-Based Human Fall Detection Using 3D Neural Networks
Artificial Intelligence XLIPages 46–58https://doi.org/10.1007/978-3-031-77918-3_4AbstractThe use of Machine Learning to monitor old people is crucial in providing immediate assistance and potentially life-saving interventions. With the rapid innovation in the field of Artificial Intelligence and Computer Vision, fall detection has ...
- ArticleDecember 2024
An Ensemble Modelling of Feature Engineering and Predictions for Enhanced Fake News Detection
Artificial Intelligence XLIPages 225–231https://doi.org/10.1007/978-3-031-77918-3_16AbstractThe threat of fake news jeopardizing the credibility of online news platforms, particularly on social media, underscores the need for innovative solutions. This paper proposes a creative engine for detecting fake news, leveraging advanced machine ...
- ArticleDecember 2024
Djinn—Data Journalism Interface for Newsgathering and Notifications
- Sara Elo Dean,
- Lars Adrian Giske,
- Herman Jangsett Mostein,
- Silvia Podestà,
- Halvor Helland Barndon,
- Sara Stegane,
- Henrik Nordberg
Artificial Intelligence XLIPages 147–161https://doi.org/10.1007/978-3-031-77918-3_11AbstractJournalists often face the daunting task of manually sifting through vast amounts of documents to uncover newsworthy story ideas. The Djinn platform, or “Data Journalism Interface for Newsgathering and Notifications”, developed by iTromsø, Visito, ...
- ArticleDecember 2024
On the Development of a Pixel-Wise Plastic Waste Identification System for Multispectral Remote Sensing Applications
Artificial Intelligence XLIPages 47–60https://doi.org/10.1007/978-3-031-77915-2_4AbstractThis paper presents the development of a pixel-wise plastic waste identification system for multispectral remote sensing data, based on artificial intelligence methods. The system will be used as part of a two stage approach to identify and ...
- ArticleDecember 2024
Protecting Ownership of Trained DNN Models with Zero-Knowledge Proofs
Information Systems SecurityPages 383–403https://doi.org/10.1007/978-3-031-80020-7_22AbstractNeural Networks are used in various fields such as research and development. Because it takes much time and cost to make high-performance models, we tune a trained model in order to make the model for our purpose more efficiently. Hence, it is ...
- ArticleDecember 2024
REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training
Information Systems SecurityPages 246–264https://doi.org/10.1007/978-3-031-80020-7_14AbstractMalware detection traditionally relies on signature-based approaches, which suffer from limited generalization. To mitigate this issue, machine learning (ML)-based detection methods have been integrated with signature-based methods in recent ...