


default search action
4th ICAIC 2025: Houston, TX, USA
- 4th IEEE International Conference on AI in Cybersecurity, ICAIC 2025, Houston, TX, USA, February 5-7, 2025. IEEE 2025, ISBN 979-8-3315-1888-2
- Fozia Hanif, Rehan Shams:
Evaluation of Cybersecurity awareness level: A Case Study of Students of Sir Syed University of Engineering and Technology. 1-5 - Sebastian De La Cruz, Alexander Perez-Pons:
Transforming Program Control Flow Data into Space-Filling Curves for Data Analysis. 1-9 - Minh Dao Nguyen, Martin C. Carlisle:
C/C++ Vulnerability Data Set Generation Framework using a Parser and LLM. 1-11 - Advait Patel, Pravin Pandey, Hariharan Ragothaman, Ramasankar Molleti, Diwakar Reddy Peddinti:
Generative AI for Automated Security Operations in Cloud Computing. 1-7 - Ahmad Mohammadi, Vahid Hemmati, Reza Ahmari, Frederick Owusu-Ambrose, Mahmoud Nabil Mahmoud, Abdollah Homaifar:
Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles. 1-9 - Rei Meguro, Ng S. T. Chong:
AdaPhish: AI-Powered Adaptive Defense and Education Resource Against Deceptive Emails. 1-7 - Helen Qin, Shiyu Sun, Xiaohong Yuan:
Evaluating a Malware Benchmark Dataset Using Neural Network Models and Shapley-Based Explainability. 1-8 - Rohit Singh Raja:
"SQLSynthGen: Generating Synthetic Data for Healthcare Databases". 1-11 - Gregory Powers, Aobo Jin, Abdul Basit Tonmoy, Haowei Cao, Hardik A. Gohel, Qixin Deng:
Advanced Facial Emotion Classification with 135 Classes for Enhanced Cybersecurity Applications. 1-8 - Milavkumar Shah, Parth Shah, Swapnil Patil:
Secure and Efficient Fraud Detection Using Federated Learning and Distributed Search Databases. 1-6 - Rami Darwish, Kaushik Roy:
Comparative Analysis of Federated Learning, Deep Learning, and Traditional Machine Learning Techniques for IoT Malware Detection. 1-10 - Bandar F. Alkhalil, Yu Zhuang, Khalid T. Mursi, Ahmad O. Aseeri:
Enhancing Trust Factor Identification in E-Commerce: The Role of Text Segmentation and Factor Extraction with Transformer Models. 1-8 - Sallar Khan, Khawaja Usman Ali, Ali Raza Ali Qadri, Maisam Rizvi:
Silent Speech Interfaces: Non-Invasive Neuromuscular Signal Processing for Assistive Communication. 1-6 - Priyan Malarvizhi Kumar, Balasubramanian Prabhu Kavin, Abhignya Jagathpally, Tayyaba Shahwar:
Transforming the cybersecurity space of healthcare IoT devices using Deep Learning. 1-6 - Neil Dixit:
Quantifying Classification Metrics in Black Box Membership Inference Attacks. 1-6 - Maryam Massoud Ahmed, Michael Lim, Xiaorui Liu, Shen-Shyang Ho, Nikolay Ivanov:
Quantifying the Risk of Out-of-Gas Conditions in Ethereum Smart Contracts. 1-8 - Mourya Chigurupati, Rajesh Kumar Malviya, Arvind Reddy Toorpu, Karanveer Anand:
AI Agents for Cloud Reliability: Autonomous Threat Detection and Mitigation Aligned with Site Reliability Engineering Principles. 1-4 - Shiu-Wan Hung, Jyun-Hao Jian, Che-Wei Chang, Jing-Ya Huang:
AI-Driven Experiences: Exploring Consumer Purchase Intentions in a Social Context. 1-7 - Sandra-Evelia Garcia-Sandoval, Ciro Rodriguez Rodriguez:
Machine Learning Techniques for Predicting the Increase in Municipal Solid Waste Generation in Lima, Perú. 1-9 - Kun Wang, Aobo Jin, Hongchun Guo, Yun Wan, Qixin Deng, Wenhui Chu, Maulin Raval, Hardik A. Gohel:
Low Field MRI Image Synthesis. 1-7 - Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo, Lucia Sarcinella, Alessandro Stamerra:
MAGICIAN: Malware classification Approach through Generation Image using a Conditional and wassersteIn generative Adversarial Network variants. 1-7 - Justin Jiang:
Addressing Vulnerabilities in AI-Image Detection: Challenges and Proposed Solutions. 1-9 - Md. Hasin Sarwar Ifty, Nisharga Nirjan, Labib Islam, M. A. Diganta, Reeyad Ahmed Ornate, Anika Tasnim, Md. Saiful Islam:
Automated Detection of Malignant Lesions in the Ovary Using Deep Learning Models and XAI. 1-8 - Chipo Mutongi, Billy Rigava, Tinashe Muchuri, Mufaro Rindai Chiwanza:
Rethinking the Place of African Kitchen Hut as a Hub for Business Management, Marketing, Education, Health and Strategies in the Age of Artificial Intelligence. 1-10 - Rohit Singh Raja:
"Promoting Health through Transformative Innovation Policies and Emerging Technologies". 1-16 - Rohit Singh Raja:
"Time-Varying In-Hospital Mortality Prediction with Apache Spark". 1-6 - Rohit Singh Raja:
"A Multi-Level NLP Framework for Medical Concept Mapping in Healthcare AI Systems". 1-3 - Manuel Lengl, Simon Schumann, Stefan Röhrl, Oliver Hayden, Klaus Diepold:
Homomorphic Encryption in Federated Medical Image Classification. 1-6 - James Johnstone, Adewale Akinfaderin:
Mapping Cyber Threats in IoT-Driven MSPs: An Explainable Machine Learning Approach for Remote Work Security. 1-9 - Bryan Anderson, Gahangir Hossain:
Electronic Vehicle Charging and the Security Challenges of Renewable Energy Integration: An Optimization Framework. 1-6 - Anshul Shrivastava, Rajesh Kumar, Kurmendra:
Design and Analysis of Microstrip Patch Antenna Using Metamaterial for Biomedical Applications. 1-4 - Priyan Malarvizhi Kumar, Tayyaba Shahwar, C. Gokulnath, Jeeva Selvaraj:
Cyber attack prediction on IoT and IIOT devices using ensemble based predictive analytic model. 1-7 - Sarbagya Ratna Shakya, Edgar Eduardo Ceh-Varela, Soneya Shakya, Caleb Parten, Zhaoxian Zhou:
Boosting Stock Predictions with Sentiment Analysis and Deep Learning Models. 1-6 - Rohit Singh Raja:
A Metric for Measuring Distances Between Attack Trees in Cybersecurity. 1-16 - Rahul Cherekar:
Comparative Analysis of Password Alternatives for Enterprise Authentication: A Case Study. 1-8 - Michael Cardoso, George Cardoso, Na Li:
A Framework of Dynamic Analysis of WannaCry. 1-11 - Aakarsh Etar, Jayesh Soni, Himanshu Upadhyay:
Evaluating Text-Image Alignment using Gecko2K. 1-6 - Fozia Hanif, Rehan Shams, Urooj Waheed:
Lightweight security Mechanism for IoT Applications using Substitution-Box. 1-6 - Andrew Bala Abhilash Polisetty, Nandini Shankara Murthy, Yong Shi, Hugo Watanuki, Flavio Villanustre, Robert Foreman:
Model Inversion Attacks and Prevention Tactics Using the HPCC Systems Platform. 1-5 - Darshika Ravindra Pongallu, Shreyas Setlur Arun, Rohit Verma:
SecureMedZK - A Blockchain-based Approach with Zero-Knowledge Rollups for Secure EHR. 1-9 - Molly Campbell, Sandhya Joshi, Ankur Barthwal, Austin Shouli, Ajay Kumar Shrestha:
Applying Communication Privacy Management Theory to Youth Privacy Management in AI Contexts. 1-10 - Taiwo Adeyemi, Felix Ngobigha, Adnane Ez-Zizi:
Future-Proofed Intrusion Detection for Internet of Things with Machine Learning. 1-6 - Sanam Narejo, Muhammad Taimoor Khan, Muhammad Zakir Shaikh, Lubna Luxmi Dhirani, Bhawani Shankar Chowdhry:
Optimizing Route Efficiency in Formula One (F1) Vehicles Using Reinforcement Learning Algorithms. 1-8 - Ankita Samaddar, Nicholas Potteiger, Xenofon D. Koutsoukos:
Out-of-Distribution Detection for Neurosymbolic Autonomous Cyber Agents. 1-9 - Marzia Ahmed, Ahmad Johari Mohamad, Md. Maruf Hassan, Touhid Bhuiyan:
Air Pollutant (CO) Forecasting: A Hybrid Approach Using Gooseneck Barnacle Optimization and Artificial Neural Networks. 1-6 - Jesudhas Yogarajah, Gahangir Hossain:
Optimizing Cybersecurity Recruitment with Graph-Based Algorithms. 1-7 - Sarvapriya Tripathi, Himanshu Upadhyay, Jayesh Soni:
Quantum Long Sort-Term Memory-based Identification of Distributed Denial of Service Attacks. 1-8 - Rajesh Natarajan, Sujatha Krishna, Christodoss Prasanna Ranjith:
A Novel Federated Learning Framework for Healthcare Applications Using Wearable Devices. 1-6 - Kashifah Afroz, Swetha Chittam, Kaushik Roy:
Understanding the Threat of Political Deepfakes. 1-6 - Rashad Aliyev, Ziyafat Amirov, Alakbar Aliyev:
Building Unique Interactive, Gamified Practical Exams for Cybersecurity Students. 1-4 - Binod Tandan, Prashant Vajpayee, Gahangir Hossain:
Explaining Cyber Risks in Transportaion 5.0: A Data Driven Approach. 1-8 - Amin Amiri, Alireza Ghaffarnia, Shahnewaz Karim Sakib, Dalei Wu, Yu Liang:
FocalCA: A Hybrid-Convolutional-Attention Encoder for Intrusion Detection on UNSW-NB15 Achieving High Accuracy Without Data Balancing. 1-8 - Daniel Machooka, Xiaohong Yuan, Kaushik Roy, Guenvere Chen:
Differential Privacy with DP-SGD and PATE for Intrusion Detection: A Comparative Study. 1-7 - Keshav Kumar, Dr Chinnaiyan Ramasubramanian, Bishwajeet Pandey:
Low Area Design and Implementation of Lightweight Encryption Algorithm on FPGA for IoT Devices. 1-4 - Hesborn Ondiba:
Proactive AI-Driven Cybersecurity for Endangered Language Preservation: Safeguarding the Suba Linguistic Corpus. 1-5 - Md. Nasif Sarwar, Md. Shohel Arman, Touhid Bhuiyan, Fatama Binta Rafiq:
Optimizing Intrusion Detection with Hybrid Deep Learning Models and Data Balancing Techniques. 1-6 - Pushpanjali Pandey, K. K. Garg:
Credit Card Fraud Detection Using KNC, SVC, and Decision Tree Machine Learning Algorithms. 1-3 - Abdullah Al Siam, Md. Maruf Hassan, Touhid Bhuiyan:
Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algorithm with Integrated Encryption. 1-6 - Advait Patel, Pravin Pandey, Hariharan Ragothaman, Ramasankar Molleti, Ajay Tanikonda:
Securing Cloud AI Workloads: Protecting Generative AI Models from Adversarial Attacks. 1-7 - Md. Habibur Rahman, Leo Martinez, Avdesh Mishra, Mais Nijim, Ayush Goyal, David Hicks:
AI2DS: Advanced Deep Autoencoder-Driven Method for Intelligent Network Intrusion Detection Systems. 1-6 - Emre Tokgoz:
Artificial Bee Colony Optimization Techniques' Utilization for Intrusion Detection Systems' Analysis. 1-16 - Gerard Shu Fuhnwi, Matthew Revelle, Bradley M. Whitaker, Clemente Izurieta:
Using Large Language Models to Mitigate Human-Induced Bias in SMS Spam: An Empirical Approach. 1-7 - Magani Niyomdi, Jared Oluoch:
A Comprehensive Security Orchestration, Automation, and Response System (SOAR) for Connected and Autonomous Vehicles (CAVs). 1-14 - Bishwajeet Pandey, Nurkhat Zhakiyev, Madhu Sharma Gaur, Fariza Tumenbayeva, Sanjeev Kumar, Pushpanjali Pandey:
Prediction of False Data Injection Attacks in Smart Grid using AdaBoost, Deep Learning, and KNN. 1-4 - Abdullah Al Siam, Md. Maruf Hassan, Touhid Bhuiyan:
Artificial Intelligence for Cybersecurity: A State of the Art. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.