![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
AIIoT 2024: Seattle, WA, USA
- IEEE World AI IoT Congress, AIIoT 2024, Seattle, WA, USA, May 29-31, 2024. IEEE 2024, ISBN 979-8-3503-8780-3
- Adarsha Bhattarai, Yutong Liu, Dongming Peng:
Multi-Tier Arrhythmia Detection: Achieving AI Hardware Compatibility Across Diverse Nodes. 1-7 - Faria Farzana, Damian Valles:
Enhancing Pedestrian Safety: Predicting Movements with Deep Learning Models. 8-15 - Saddam Hossain
, Damian Valles:
Traffic Safety through Machine Learning: A Study of Crash Severity Factors. 16-23 - B. Deepanraj, Hiren K. Mewada
:
A Deep Learning Network for Classification and Visual Deterioration Detection of Concrete Surfaces. 24-28 - Evan R. Smith, Antonio T. Grahm, Joni E. McCawley, Damian Valles:
Ultrasonic Frequency Anomaly Localization with Machine and Deep Learning. 29-37 - Harsh Kumar, Petro Mushidi Tshakwanda, Sisay T. Arzo, Michael Devetsikiotis, Fabrizio Granelli:
Reinforcement Learning-Driven Adaptive Traffic Routing Role Delegation for Enhanced SDN Network Performance. 38-44 - Gavin E. Jackson, Damian Valles:
Dataset Enlargement with Generative Adversarial Neural Networks. 45-51 - Razaq Jinad, Tosin Akinsowon, Chukwuemeka Ihekweazu, Min Kyung An
:
Enhancing Data Security and Privacy through Classification-Based Adaptive Encryption. 52-60 - Harsh Kumar, Patrick Nnaji, Sanjeev Kumar:
Smart Meter Performance Under Wired and Wireless Cyber Security Attack. 61-67 - Tsion Yimer, Otily Toutsop, Kevin T. Kornegay:
Secure BACnet Device Communication and Verification for MS/TP Networks. 68-76 - Prashant Vajpayee, Gahangir Hossain:
Risk Assessment of Cybersecurity IoT Anomalies Through Cyber Value at Risk (CVaR). 77-83 - Damilola Oladimeji, Chiamaka Femi-Adeyinka, Juli Dutta, Min Kyung An
:
Enhanced Approaches to Similarity Analysis on Car Accident Reconstruction. 84-90 - Jiyao Li, Vicki H. Allan:
Supply-Demand Balancing and Fairness Enhancement in Ride-Sharing Services: A Graph Reinforcement Learning Based Approach. 91-99 - Kyle Stein, Arash Golibagh Mahyari, Guillermo A. Francia III, Eman El-Sheikh:
A Transformer-Based Framework for Payload Malware Detection and Classification. 105-111 - N. G. Bharath Kumar, Omid Nia:
Iridium Based Agronomical System. 112-117 - Chris Nagel, Cheol-Hong Min:
Boxing Strike Classification from Wearable IMU Sensor Unit. 118-122 - Mubaris Nadeem
, Johannes Zenkert, Lisa Bender, Christian Weber, Madjid Fathi:
Quantitative Evaluation of KIRETT Wearable Demonstrator for Rescue Operations. 123-128 - Mehdi Roopaei, Ryan Roopaei:
Gamifying AI Education for Young Minds: The TransAI Adventure in Learning. 129-134 - Chencheng Tang, Jiahao Fan, Qilong Shi
, Zhen Chen, Kaiwen Men, Yaodong Hu, Changxu Sun, Min Guo, Yisong Zhang, Xiaodong Ma:
DIM-YOLO: Desktop Item Management System Based on YOLO. 135-141 - Meera Gopinath Sujatha, Rajesh Godasu, Prakash Ranganathan:
Classification of Microcystins Based on Temperature Data in North Dakota Lake. 142-150 - Kyle King, Caleb Thornton, Mehdi Roopaei:
Smart Feeding: Integrating Deep Learning into Dairy Farm Practices. 151-156 - Samar AboulEla, Rasha F. Kashef:
Network Intrusion Detection Using a Stacking of AI-driven Models with Sampling. 157-164 - Fatemehsadat Ghanadi Ladani, Nader Karimi, Pejman Khadivi, Shadrokh Samavi:
Wavelet Based fMRI Analysis for Autism Spectrum Disorder Detection using Feature Selection and Ridge Classifier. 165-171 - Sergei Chuprov, Raman Zatsarenko, Dmitrii Korobeinikov, Leon Reznik
:
Robust Training on the Edge: Federated vs. Transfer Learning for Computer Vision in Intelligent Transportation Systems. 172-178 - Hirenkumar Kantilal Mewada, B. Deepanraj:
Low-Power Embedded ECG Acquisition System for Real-Time Monitoring and Analysis. 179-184 - Marufa Kamal, Rakib Hossain Rifat, Abanti Chakraborty Shruti, Mohd Ariful Haque, Kishor Datta Gupta, Roy George:
DetectPLD: A Federated CNN Approach for Collaborative Potato Leaf Disease Detection. 185-191 - Mina Aghaei Dinani, Adrian Holzer, Hung X. Nguyen, Marco Ajmone Marsan, Gianluca Rizzo:
Context-Aware Orchestration of Energy-Efficient Gossip Learning Schemes. 192-198 - Derek Thompson, Parker Padgett, Timothy Cary Johnson, Bhaskar Ghosh:
PyroScan: Wildfire Behavior Prediction System using Unmanned Aerial Vehicles (UAV). 199-204 - Enamul Hassan, Gahangir Hossain, Prashant Vajpayee:
Reducing Cyber Risks in IoT Device Resource Management: A Probabilistic Banker's Algorithm Approach. 205-211 - Moshekwa M. Malatji, Rachel Mohlomi, Gerald Kirui, Simphiwe Mndebele, John E. D. Ekoru, Milka C. I. Madahana:
Student Retention Model via Machine Learning and Predictive analysis. 212-218 - Mariana Marques Ferreira, Maria Paula Medeiros Gomes Miguel, Cleonilson Protásio de Souza, Yajun An, Orlando Baiocchi:
An Energy Efficiency Evaluation of the LTC3108 for Thermal Energy Harvesting. 219-224 - Maria Paula Medeiros Gomes Miguel, Mariana Marques Ferreira, Cleonilson Protásio de Souza, Yajun An, Orlando Baiocchi:
An Experimental Evaluation of a Thermal Energy Harvesting System for IoNT. 225-230 - Mohale Tshwale, Pius A. Owolawi, Moses Olaifa, Vusi Malele:
ResNet50 Pretrained Model Based Pneumonia Detection System. 231-236 - Mandeep Singh, Albert H. Carlson:
Watermarking Using Polymorphic Algorithms For Increased Data Security. 237-243 - Olusola Tolulope Odeyomi, Harshitha Karnati, Austin Smith:
Preserving Medical Data with Renyi Differential Privacy. 244-251 - Kossi Bissadu, Gahangir Hossain, Prashant Vajpayee:
Agriculture 5.0 Cybersecurity: Monitoring Agricultural Cyber Threats with Digital Twin Technology. 252-258 - Ali Tamizifar, Pouya Behzadifar, Zahra Sobhaninia, Nader Karimi, Pejman Khadivi, Shadrokh Samavi:
Enhanced Nuclei Segmentation in Histopathological Images Using a Novel Preprocessing Pipeline and Deep Learning. 259-264 - Rajesh Kalakoti
, Sven Nõmm, Hayretdin Bahsi:
Enhancing IoT Botnet Attack Detection in SOCs with an Explainable Active Learning Framework. 265-272 - Raman Zatsarenko, Sergei Chuprov, Dmitrii Korobeinikov, Leon Reznik
:
Trust-Based Anomaly Detection in Federated Edge Learning. 273-279 - Jatin Jain, Ahmed A. Mohamed, Tanvir Rahman, Mohamed A. Ali:
A Neural Network based Deep Reinforcement Learning Controller for Voltage Regulation of Active Distribution Network. 280-285 - A. P. Roger Rozario
:
Prediction of Dissolved Oxygen in Shrimp Pond using Dolphin Glow Worm Optimization Based Radial Basis Function Neural Network. 286-291 - Eric Rivera, Zoë Statzer, Hayssam El-Razouk, Zoulikha Mouffak:
RFID-PIN Access Control System: Cost-Effective Security for Smart Home Applications. 292-299 - Rasha Kashef, Edwin P. Alegre, Tasnim Prova, Sakshi Aggarwal:
Automated Waste Management using a Customized Vision-based Transformer Model. 300-309 - Brett Wiens, Daniel C. Lee:
Computationally Efficient Global Optimization of Labelling in Non-Uniform QAM Constellations. 310-315 - Wenjun Yang, Eyhab Al-Masri:
ULDP: A User-Centric Local Differential Privacy Optimization Method. 316-322 - Tian-Xiao Lin, Zhen Chen, Min Guo, Yu-Xiang Lin, Yisong Zhang, Ying Gao, Xiao-Dong Ma, Kaiwen Men:
Scenario-Based Programming for IoT Applications Development. 323-328 - Sandra Kumi, Madhurima Ray, Sanskriti Walia, Richard K. Lomotey, Ralph Deters:
Digital Twins for Stress Management Utilizing Synthetic Data. 329-335 - Max Garcia, Sanjeev Kumar:
AI-based detection for Remote Electrocardiogram Monitoring System. 336-341 - Farzaneh Koohestani, Zahra Nabizadeh-ShahreBabak, Nader Karimi, Shadrokh Samavi:
Preserving Details in Darkness: A VQ-VAE Based Approach with SSIM Loss for Low-Light Image Enhancement. 342-348 - Dipok Deb, Hansapani Rodrigo, Sanjeev Kumar:
Performance Analysis of Machine Learning Algorithms on Imbalanced DDoS Attack Dataset. 349-355 - Sanjeev Kumar V. Marimekala, John Lamb, Robert Epstein, Vasundhara Bhupathi:
Using AI and Big Data in the HealthCare Sector to help build a Smarter and more Intelligent HealthCare System. 356-362 - Fatemeh Piri, Nader Karimi, Shadrokh Samavi:
Enhanced Segmentation in Abdominal CT Images: Leveraging Hybrid CNN-Transformer Architectures and Compound Loss Function. 363-369 - S. Chan:
Inference-Optimized Metaheuristic Approach for a Prospective AI Training/Inference Inversion Paradigm in Optimized Energy-Aware Computing. 370-379 - Swagat Ranjit, Jian Zhang, Bijaya B. Karki:
Improved Polyp Segmentation of Irregular Shapes in Colonoscopy Images. 380-386 - Taylor C. Washington, Winston Sealy:
Programming by Demonstration using Mixed Reality and Simulated Kinematics. 387-392 - S. Chan:
Cascading Succession of Models for an Enhanced Long-Tail Discernment AI System. 393-401 - Kaushallya Adhikari, Ridhab Al Kinani:
Model Order Estimation for Sensor Array Observations using a Neural Network. 402-407 - Alvin Wang, Lujun Zhai:
GA-Net: Global-aware Attention-guided CNN for Food Image Classification. 408-413 - Sayed Erfan Arefin, Abdul Serwadda:
Dissecting the Origins of the Power Side-Channel in Deep Neural Networks. 414-420 - Saad A. Rafiq, Erich S. Ellsworth, Oscar Resendiz, Susmitha H. Varanasi, Adenrele A. Ishola, Rachel M. Koldenhoven
, John W. Farrell, Yumeng Li, Maria D. Resendiz, Semih Aslan, Ting Liu, Damian Valles:
Design of Autonomous Rover for Firefighter Rescue: Integrating Deep Learning with ROS2. 421-428 - Gvarami Labartkava, Nurin Binti Suhaimi, Thiago Silva, Lev Kirischian:
Autonomously Reconfigurable Robot Coupled with Intelligent Vision and Control System for Rapid Runtime Adaptation. 429-434 - Yishan Liu, Zhen Chen, Xin Xie, Yaodong Hu, Lie Zhang, Weiran Li, Shuangshou Li:
"Hyper Photography" Artifact: An interactive aesthetic education experience device designed based on AIGC. 435-443 - David D. Li, Angela Li, Rodger Mensing, Zy Li:
Modeling dynamic elasticity on intraday volatility and volume by finding PDEs using machine learning. 444-450 - Jiameng Li, Zhen Chen, Weiran Lin, Liangjun Zou, Xin Xie, Yaodong Hu, Dianmo Li:
Mystery Game Script Compose Based on a Large Language Model. 451-455 - Otily Toutsop, Tsion Yimer, Kevin T. Kornegay:
Big Data and the Application of IoT Systems. 456-464 - Azita Ramezani:
Fusion Models for Cyber Threat Defense: Integrating Clustering with Kmeans, Random Forests, and SVM against Windows Malware. 465-470 - Roya Salek Shahrezaie, Parisa Hajibabaee, Mohsen Ahmadi:
An Open Source Framework for Benchmarking Cyberbullying Detection on Social Media. 471-478 - Zaynah L. Kalaoun, Kaushallya Adhikari, Steven Kay:
Minimum Distance Receiver using Dynamic Programming-Based Sparse Samples. 479-484 - Rawshon Ferdaws, Nahid Ebrahimi Majd:
Phishing URL Detection Using Machine Learning and Deep Learning. 485-490 - MuhammadZaid Katlariwala, Aakash Gupta:
Product Recommendation System Using Large Language Model: Llama-2. 491-495 - Oyeniyi Akeem Alimi
:
Hybrid Data-Driven Learning-Based Internet of Things Network Intrusion Detection Model. 496-501 - Thuan Nhan, Jiblal Upadhya, Samir Poudel
, Satish Wagle, Khem Poudel:
Scalable Multimodal Machine Learning for Cervical Cancer Detection. 502-510 - Alex Sumarsono, Bhuvana Prakash, Christian Leon:
Arbitrated Packet Switching With Machine Learning Driven Data Plane. 511-517 - Dharati Dholariya, Dixit Panchal, Pallavi Singhal:
Dissection of Rorschach Ransomware. 518-520 - M. A. S. P. Dayarathne, M. S. M. Jayathilaka, R. M. V. A. Bandara, V. Logeeshan, S. Kumarawadu, Chathura Wanigasekara
:
Deep Learning-Based Cyber Attack Detection in Power Grids with Increasing Renewable Energy Penetration. 521-526 - Aditi Singh
, Abul Ehtesham
, Saket Kumar, Tala Talaei Khoei:
Enhancing AI Systems with Agentic Workflows Patterns in Large Language Model. 527-532 - Purav Bhatt, Shrikant Jadhav:
Comparative Analysis of Physical Design Parameters for JPEG Encoder IP using OpenROAD. 533-539 - S. M. L. Arampola, M. S. K. Nisakya, W. A. Yasodya, S. Kumarawadu, V. Logeeshan, Chathura Wanigasekara
:
Self-Adaptive Non-Intrusive Load Monitoring Using Deep Learning. 540-545 - Puthiyavan Udayakumar, R. Anandan:
Evaluation of Protocol-Centric IDS for the IoMT Leveraging ML Techniques. 546-551 - Mahadi Hasan, Jahirul Islam, Miraz Al Mamun, Afrin Akter Mim, Sharmin Sultana, Md Sanowar Hossain Sabuj:
Optimizing Cervical Cancer Prediction, Harnessing the Power of Machine Learning for Early Diagnosis. 552-556 - Rafael Da Luz Barbosa, Kaushallya Adhikari, Walter G. Besio:
SVM for Classification of Ten-Finger Imagined Movements using tEEG Signals. 557-561 - Shamaltha M. Wickramaarachchi, S. A. Dewmini Suraweera, D. M. Pasindu Akalanka, V. Logeeshan, Chathura Wanigasekara
:
Accurate Prediction of Remaining Useful Life for Lithium-ion Battery Cells Using Deep Neural Networks. 562-568 - R. D. Sandakelum, V. H. Liyanage, P. M. Chandrasekara, V. Logeeshan, S. Kumarawadu, Chathura Wanigasekara
:
Development of Deep Learning Model to Detect Cyber-Attacks within Vehicular Networks. 569-574 - Emmanuel Kojo Gyamfi, Jess Kropczynski, Joseph S. Johnson, Mustapha Awinsongya Yakubu:
Internet of Things Security and Data Privacy Concerns in Smart Farming. 575-583 - Han Yu, Jianhong Zhou, Maode Ma:
Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of Thing. 584-590 - Qianmin Du, Jianhong Zhou, Maode Ma:
EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of Vehicles. 591-597 - Sudarshan S. Chawathe:
Human Occupancy From Few Diverse Sensors. 598-604 - Gideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan, Vladimir K. Poulkov:
A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems. 605-611 - Anuj Nepal, Mohamed Ahzam Amanullah, Robin Doss, Frank Jiang:
Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and Trust. 612-618 - Aditi Singh
, Saket Kumar, Abul Ehtesham
, Tala Talaei Khoei, Deepshikha Bhati:
Large Language Model-Driven Immersive Agent. 619-624 - Kyle Arquilla, Ishan Dilipbhai Gajera, Melanie Darling, Deepshikha Bhati, Aditi Singh
, Angela Guercio:
Exploring Fine-Grained Feature Analysis for Bird Species Classification using Layer-wise Relevance Propagation. 625-631
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.