default search action
3rd IDSTA 2022, San Antonio, TX, USA
- Mohammad A. Alsmirat, Yaser Jararweh, Moayad Aloqaily, Izzat Alsmadi:
3rd International Conference on Intelligent Data Science Technologies and Applications, IDSTA 2022, San Antonio, TX, USA, September 5-7, 2022. IEEE 2022, ISBN 978-1-6654-9960-6 - Jimmy Nguyen:
Keynote Speech 1: A Connected World: Blockchain Scaling for Micropayments, IoT & the Future of Data. 1 - Kip M. Twitchell:
Keynote Speech 2: Transformation of Business and Financial Platforms: What we must understand to renew existing systems. 2 - Daniel Keane:
Keynote Speech 2: Blockchain based Data science and data engineering: (Human) Ecology in the Digital Age. 3 - P. Rajesh, Mansoor Alam, Mansour Tahernezhadi, Monika A, Gm Chanakya:
Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework. 4-12 - Dylan Hall, Anthony Gladdney, Yasimine Labriny, Yazan A. Alqudah:
On the Development of Mobile Application Breathing Analyzer to Detect Breathing Abnormalities. 13-16 - Shovan Chowdhury, Yuxiao Lin, Boryann Liaw, Leslie M. Kerby:
Evaluation of Tree Based Regression over Multiple Linear Regression for Non-normally Distributed Data in Battery Performance. 17-25 - John Olamofe, Xishuang Dong, Lijun Qian, Eric Shields:
Performance Evaluation of Data Augmentation for Object Detection in XView Dataset. 26-33 - Alina Govoruhina, Anastasija Nikiforova:
Digital health shopping assistant with React Native: a simple technological solution to a complex health problem. 34-40 - Debojyoti Seth:
Joint SCSP-LROM: A novel approach to detect Cerebrovascular Anomalies from EEG signals. 41-45 - Xishuang Dong, Shouvon Sarker, Lijun Qian:
Integrating Human-in-the-loop into Swarm Learning for Decentralized Fake News Detection. 46-53 - Hussein Al-Zoubi, Samah Altaamneh:
A Feature Selection Technique for Network Intrusion Detection based on the Chaotic Crow Search Algorithm. 54-60 - Nisha Menon, Shantanu Saboo, Tanmay Ambadkar, Umesh Uppili:
Discrete Sequencing for Demand Forecasting: A novel data sampling technique for time series forecasting. 61-67 - Siyamdumisa Maphisa, Duncan Coulter:
Face Anti-spoofing based on Convolutional Neural Networks. 68-74 - Dana Alsagheer, Hadi Mansourifar, Mohammad Mahdi Dehshibi, Weidong Shi:
Detecting Hate Speech Against Athletes in Social Media. 75-81 - Mahmoud Atari, Amjed Al-Mousa:
A Machine-Learning Based Approach for Detecting Phishing URLs. 82-88 - Naresh Kumar, Abdul Khadar Jilani, Pavan Kumar, Anastasija Nikiforova:
Improved YOLOv3-tiny Object Detector with Dilated CNN for Drone-Captured Images. 89-94 - Rishabh Subramanian:
Differential Privacy Techniques for Healthcare Data. 95-100 - Amy Wilson, Fadi Wedyan, Safwan Omari:
An Empirical Evaluation and Comparison of the Impact of MVVM and MVC GUI Driven Application Architectures on Maintainability and Testability. 101-108 - Yunpeng Zhang, Daniel Egwede, Guohui Zhang, Xuqing Wu:
Pseudonym Tracking Certificateless Aggregate Signature Scheme for Preventing Replay Attacks in a Platoon of Vehicles. 109-116 - Yunpeng Zhang, Yash Gandhi, Zhixia Richard Li, Zhiwen Xiao:
Improving the Classification Effectiveness of Network Intrusion Detection Using Ensemble Machine Learning Techniques and Deep Neural Networks. 117-123 - Evan Lowhorn, Rami J. Haddad:
Rules-Based Distracted Driving Detection System Using Facial Keypoints. 124-128 - Alexander Kalinowski, Yuan An:
Repurposing Knowledge Graph Embeddings for Triple Representation via Weak Supervision. 129-137 - Neha Mishra, Haim Levkowitz:
Performance Evaluation of Permissioned-based Personal Data Vault Implemented Using Hyperledger Fabric v2.x. 138-145 - Ahmed Aleroud, Nour Alhussien, Craig Albert:
From Theory to Practice: Towards an OSINT Framework to Mitigate Arabic Social Cyber Attacks. 146-151 - Mohammed Ali Kunda, Izzat Alsmadi:
Practical web security testing: Evolution of web application modules and open source testing tools. 152-155 - Alexander Shroyer, D. Martin Swany:
Data Augmentation for Code Analysis. 156-163 - Izzat Alsmadi, Bilal Al-Ahmad, Mohammad Alsmadi:
Malware analysis and multi-label category detection issues: Ensemble-based approaches. 164-169 - Ahmad Al-Omari, Andrew Allhusen, Abdullah Wahbeh, Mohammad Al-Ramahi, Izzat Alsmadi:
Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms. 170-175 - Hafed Zarzour, Faiz Maazouzi, Mohammad Al-Zinati, Amjad Nusayr, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub, Yaser Jararweh:
Using K-means Clustering Ensemble to Improve the Performance in Recommender Systems. 176-180 - Alankrit Mishra, Nikhil Raj, Garima Bajwa:
EEG-based Image Feature Extraction for Visual Classification using Deep Learning. 181-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.