


default search action
16th ACIIDS 2024: Ras Al Khaimah, UAE - Companion 1
- Ngoc Thanh Nguyen
, Richard Chbeir
, Yannis Manolopoulos
, Hamido Fujita
, Tzung-Pei Hong
, Minh Le Nguyen
, Krystian Wojtkiewicz
:
Recent Challenges in Intelligent Information and Database Systems - 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, Ras Al Khaimah, UAE, April 15-18, 2024, Proceedings, Part I. Communications in Computer and Information Science 2144, Springer 2024, ISBN 978-981-97-5936-1
AI-Driven Cybersecurity Solutions
- Zoltán Balogh, Jan Francisti, Marek Hrabcák:
Security Aspects of Digital Identity. 3-14 - Ikbel Haouas, Mouna Attia, Lazhar Hamel
, Mohamed Graiet, Walid Gaaloul:
Efficient Deep Learning Method for Detection of Malware Attacks in Internet of Things Networks. 15-26 - Hao Do-Duc, Nguyen Van-Khai, Duc Chau-Thanh:
A Deep Neural Networks Approach for Speaker Verification on Embedded Devices. 27-38 - David Raphael M. Daza, Frank Cally A Tabuco, Prospero C. Naval Jr.:
Phishing Detection Using Ensemble of Classifiers. 39-50 - Jun-Ping Wang, Ti-Ling Wang, Yu-Hsuan Wu, Chun-Wei Tsai:
An Effective Ensemble Classification Algorithm for Intrusion Detection System. 51-62 - Sheng Tian
, Hong Shen
, Hui Tian
:
Mean-Square Consensus of Second-Order Multi-agent Systems with Semi-Markov Switching for Non-periodic DoS Attacks. 63-71
AI-Driven Medical Analytics
- Arshi Parvaiz, Muhammad Moazam Fraz
:
An Attention-Driven Hybrid Network for Survival Analysis of Tumorigenesis Patients Using Whole Slide Images. 75-86 - Zeyu Zhang
, Khandaker Asif Ahmed
, Md. Rakibul Hasan
, Tom Gedeon
, Md. Zakir Hossain
:
A Deep Learning Approach to Diabetes Diagnosis. 87-99 - Mouncef Naji, Maroua Masmoudi, Hajer Baazaoui Zghal:
A Novel Approach for Medical E-Consent: Leveraging Language Models for Informed Consent Management. 100-112 - Duc Le
, Bac Le
:
Multi-scale and Multi-level Attention Based on External Knowledge in EHRs. 113-125 - Rym Dakhli, Walid Barhoumi:
Exploring XAI Attention Maps to Investigate the Effect of Distance Metric and Lesion-Shaped Border Expansion Size for Effective Content-Based Dermatological Lesion Retrieval. 126-138 - Sabrine Benzarti, Wafa Tebourski, Wahiba Ben Abdessalem Karaa:
D-MiQ: Deep Multimodal Interactive Healthcare Query Expansion Approach for Web Search Engines Retrieval Effectiveness. 139-149
Computational Intelligence
- Kerven Durdymyradov
, Mikhail Moshkov
:
Complexity of Transforming Decision Rule Systems into Decision Trees and Acyclic Decision Graphs. 153-163 - Azimkhon Ostonov
, Mikhail Moshkov
:
Depth of Deterministic and Nondeterministic Decision Trees for Decision Tables with Many-Valued Decisions from Closed Classes. 164-174 - Filip Strzalka, Urszula Markowska-Kaczmar
:
Gradient Overdrive: Avoiding Negative Randomness Effects in Stochastic Gradient Descent. 175-186 - Alaa Abid Muslam Abid Ali
, Mohamed Mabrouk
:
Blockchain-Based Educational Certification Systems Using a Modified Hash Algorithm. 187-201 - Chien-Ting Lee, Chang-Biau Yang, Kuo-Si Huang:
The Merged Longest Common Increasing Subsequence Problem. 202-212 - Jaroslaw Wikarek
, Pawel Sitek
:
Applying Transformation to Reduce Model Sizes for Constrained Optimization Problems. 213-225 - Mahdi Moeini
, Do Thanh Dat Le:
Multiple Traveling Salesman Problem with a Drone Station: Using Multi-package Payload Compartments. 226-237 - Kunal Gaikwad, Nabeela Berardinelli, Nadeem Qazi:
Unveiling the Power of Hybrid Balancing Techniques and Ensemble Stacked and Blended Classifiers for Enhanced Churn Prediction. 238-249 - Yuichi Goto
, Yasuaki Taga:
Improvement of a Forward Reasoning Engine FreeEnCal for Trust Reasoning. 250-261 - Marek Krótkiewicz
, Jakub Miklasz
:
A Structure Based on B+ Trees to Represent a Large Number of k-Multisets Stored in Non-volatile Memory. 262-274 - Dai-Jia Wu
, Mu-En Wu
, Sheng-Chi Luo, Jimmy Ming-Tai Wu
:
Optimizing Option Short Strangle Strategies Through Genetic Algorithm. 275-286
Data Modelling and Information Systems
- Mahdi Moeini
:
Optimizing Airline Pilots Training Plans: A Mixed Integer Linear Programming Approach. 289-301 - Thi-Hoa-Hue Nguyen
, Thai-Cuong Nguyen
:
Towards an Ontological Approach for Verifying the Well-Formedness of Training Programs. 302-313 - Kulsoom Saima Bughio
, David Michael Cook
, Syed Afaq Ali Shah
:
Novel Knowledge Graph-Based Modeling for Vulnerability Detection in the Internet of Medical Things. 314-325 - Bogumila Hnatkowska
, Kacper Wójcikowski:
Functional Test Generation Based on Requirements Defined at GUI Level. 326-336 - Maciej Kisielewicz
, Michal Kedziora
, Ireneusz Jozwiak
:
Penetration Testing and Security Assessment Methodology for Biomedical Devices. 337-348 - Tomasz Zyzak
, Ireneusz Smolka
, Piotr Gaj
, Jacek Stój, Rafal Cupek
:
Cooperative User Interface for AGV - Proof of Concept. 349-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.