Paper ID | Title | Authors | Speaker | Paper Format | Page Extension | Is Paid | Camera Ready |
---|---|---|---|---|---|---|---|
8 | Design and Implementation of an Agentic AI Security Framework | Niharika Jain, | Niharika Jain | ![]() |
![]() |
![]() |
![]() |
9 | Intelligent Agents for Autonomous Task Execution_ A Survey on AI-Powered Program Automation | Arash Kermani Kolankeh, | Arash Kermani Kolankeh | ![]() |
![]() |
![]() |
![]() |
13 | AI for Advanced Financial Fraud Detection and Prevention | Sai Nerella, | Sai Nerella | ![]() |
![]() |
![]() |
![]() |
14 | Integrative Multimodal Emotion Detection: Leveraging Text, Voice, and Facial Analysis | ADABALA HEMA SRINIVAS, | ![]() |
![]() |
![]() |
![]() |
|
15 | AI-Powered Marketing Strategies: Unlocking Economic Potential and Consumer Engagement in Qatar - A systemic literature review | Nasim Shah Shirazi, Muhammad Zain Malik, Warda Saman, Farhan Malik, Allah Wasaya, | Muhammad Zain Malik | ![]() |
![]() |
![]() |
![]() |
18 | Vulnerable Data Analysis on the Dark Web using Large Language Models(LLMS) | Joshua Henry, | ![]() |
![]() |
![]() |
![]() |
|
22 | CodeSync: Multi-Agent System for Programming Assistance and Deterministic Thinking | Bala Guhanesh, MAHESWARI S, Sasikumar P, Arunkumar Sivaraman, | MAHESWARI S | ![]() |
![]() |
![]() |
![]() |
24 | Leveraging Blockchain for Secure and Transparent Patient Case Data Management: Insights from System Implementation and Use Cases | Varun Dev Sahu, Pritish Dipak Divate, Yash Rajesh Akolu, Maheswari S, Sumaiya Thaseen, | Sumaiya Thaseen | ![]() |
![]() |
![]() |
![]() |
26 | CPFE-Focus: Contextual Prior and Facial Stream-Assisted Focus enhancer and 3D Gaussian transition | Aman Kumar, Chirag Bhatia, | Aman Kumar | ![]() |
![]() |
![]() |
![]() |
27 | Transforming Pharmaceutical Care: A Digital Approach to Enhancing Patient Engagement | Kishore Arul, | Kishore Arul | ![]() |
![]() |
![]() |
![]() |
28 | Low-Cost EEG System for Decoding Imagined Phoneme Speech | Kishore Arul, | Kishore Arul | ![]() |
![]() |
![]() |
![]() |
30 | Multi-Agent Deep Reinforcement Learning Allies for Adaptive Algorithms of Trading Systems | Arpit Garg, Teja Sai Sharma Ramadugu, | Arpit Garg | ![]() |
![]() |
![]() |
![]() |
31 | Sybil Attack Detection in Urban VANET Using Exponentially Spider-Tailed Viper Optimization Based Shuffle Attention Network | Nitha Velayudhan, | ![]() |
![]() |
![]() |
![]() |
|
32 | AI-powered Climate Change Analytics Approach | Asem Omari, Azmi Alazzam, Said Badreddine, Omaia Al-Omari, | Asem Omari | ![]() |
![]() |
![]() |
![]() |
33 | SmartInject: Automated SQL Injection Testing using Deep Q-Learning and LSTM-Based Payload Generation | Mohammad ALhussin, Arash Kermani, Gandeva Satrya, | Mohammad ALhussin | ![]() |
![]() |
![]() |
![]() |
34 | Reimagining E-Governance Document Security with Blockchain and Dynamic Consensus | Priyanka Mishra, Ganesan R, | Priyanka Mishra | ![]() |
![]() |
![]() |
![]() |
35 | Simplex Covert Communication Channel Via Google DNS TCP Keep-Alive Packets | Rashed Alnuman, Huda Saadeh, | ![]() |
![]() |
![]() |
![]() |
|
38 | Green/Energy-Efficient AI: Strategies for Reducing Power Usage in Large-Scale Model Training | Arpit Garg, Anuraj Bhosale, | ![]() |
![]() |
![]() |
![]() |
|
39 | Attention-Enhanced ResNet for Accurate Alzheimer’s Disease Classification | Santo Paul M, Anita X, Martin Leo Manickam J, Benson Edwin Raj, | Anita X | ![]() |
![]() |
![]() |
![]() |
40 | Blockchain-Enabled and Paperless Identity Systems for Environmental Sustainability | Tunga Sayıcı, Deniz Salucu, | Tunga Sayıcı | ![]() |
![]() |
![]() |
![]() |
41 | Enabling Metaverse with an AI Companion | Kuntal Gaur, Gautam Samblani, Gatim Saini, | Kuntal Gaur | ![]() |
![]() |
![]() |
![]() |
42 | IMPACT OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ON CUSTOMER EXPERIENCE AS A CATALYST TO NEW MARKETING STRATEGY | Adelina Emini, | Adelina Emini | ![]() |
![]() |
![]() |
![]() |
43 | Digital Forensics in Social Media Investigations | Manal Waqas, | Manal Waqas | ![]() |
![]() |
![]() |
![]() |
44 | Application Of Transfer Learning in Autism Spectrum Disorder Detection Using Brain Imaging | Sasikumar Periyasamy, Maheswari Subburaj, | Sasikumar Periyasamy | ![]() |
![]() |
![]() |
![]() |
47 | Security Risks and Privacy Challenges of Large Language Models in Enterprise Environments | Soliana Hailemichael, Maria Chano, Eman El-Sheikh, Thaier Hayajneh, | Thaier Hayajneh | ![]() |
![]() |
![]() |
![]() |
48 | Innovative Surveillance strategy Advanced Surveillance Systems for Adaptive Security | Nischith T N, Surya Sathyanandam, Prince Depani, Rathan H V, Shaman B H, | Nischith T N | ![]() |
![]() |
![]() |
![]() |
49 | IMPACT OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ON CUSTOMER EXPERIENCE AS A CATALYST TO NEW MARKETING STRATEGY1 | Adelina Emini, | ![]() |
![]() |
![]() |
![]() |
|
50 | Deep Learning-Based Gesture Recognition for Myoelectric Prosthetic Control Using sEMG | Shanmukha Rapeti, Adithya Nandakumar, | ![]() |
![]() |
![]() |
![]() |
|
52 | Reverse Silhouette Cherry Segmentation Using EfficientNetB7-U-Net with Morphological Post-Processing | Hariharan Hariharan, Kaushik S, Abilesh S D, Jani Anbarasi L, Modigari Narendra, Benson Edwin Raj, | Modigari Narendra | ![]() |
![]() |
![]() |
![]() |
53 | Green AI and Sustainable Technology | Zainab Al-zanbouri, | Zainab Al-zanbouri | ![]() |
![]() |
![]() |
![]() |
55 | Enhancing Remote Healthcare Through Contactless Interaction | Martin Žagar, Ivica Klapan, Alan Mutka, Zlatko Majhen, | Martin Žagar | ![]() |
![]() |
![]() |
![]() |
57 | Enhancing Third-Party Risk Management in Aviation: A Comprehensive Framework for Modern Challenges | Khalil Al Hussaeni, Shamma Bin Hammad, | Khalil Al Hussaeni | ![]() |
![]() |
![]() |
![]() |
61 | Revolutionizing Emotion Detection: An Advanced Text Emotion Recognition System (ATERS) for Non-Binary Sentiment Analysis based on Fine-tuned DistilBERT | Hamza Alabdallah, Suleiman Yerima, | Hamza Alabdallah | ![]() |
![]() |
![]() |
![]() |
62 | Real-Time Image Arabic Captioning (RIAC): A Comprehensive Hybrid Framework for Accurate Arabic Captions Generation | Hamza Alabdallah, Suleiman Yerima, | Hamza Alabdallah | ![]() |
![]() |
![]() |
![]() |
63 | A Blockchain-based Storage System Using The Cow Protocol | Utkarsh Pandey, | Utkarsh Pandey | ![]() |
![]() |
![]() |
![]() |
64 | Malware Detection and Analysis Using Large Language Models: A Systematic Review | Peter Chang, Mashel Albalooshi, Hamda AlFalasi, Thekra AlTamimi, Abdulrahman Almarzooqi, Suleiman Yerima, | Peter Chang | ![]() |
![]() |
![]() |
![]() |
67 | Improved Drone Detection Approach: Using RF-based Techniques and Deep Learning | Mariam Alaboudi, Qassim Nasir, Manar Abu Talib, | Manar Abu Talib | ![]() |
![]() |
![]() |
![]() |
68 | Inside the Machine: How ChatGPT Thinks, and Why It Is Reshaping Human Imagination | Constantine Andoniou, | Constantine Andoniou | ![]() |
![]() |
![]() |
![]() |
70 | Visual Provenance: Adaptive Networks for Synthetic Content Detection | Ashutosh Agarwal, | Ashutosh Agarwal | ![]() |
![]() |
![]() |
![]() |
71 | Modeling Phishing Detection Behavior: Hybrid Agent-Based Simulation Integrating Cognitive and Data-Driven Features | Eiman Tamah Al-Shammari, | Eiman Tamah Al-Shammari | ![]() |
![]() |
![]() |
![]() |
72 | Reinforcement Learning Approach for Intrusion Detection | Kusuma Kakarla, Meghana Arepalli, Praveen Kumar Kollu, | Kusuma Kakarla | ![]() |
![]() |
![]() |
![]() |
73 | Proactive Approach to Identify and Mitigate Cybersecurity Threats in Smart Building using AI | Shayma Abdulla, Shayma Alhayyas, | Shayma Abdulla | ![]() |
![]() |
![]() |
![]() |
74 | The Application of Artificial Neural Network for Optimal Real-time Control of Microgrids | Luka Zoroje, Goran Dobrić, Mileta Žarković, Miodrag Forcan, Jovana Forcan, Manuel Barragán-Villarejo, Francisco de Paula García-López, Marene Larruskain, Oihane Abarrategi, | ![]() |
![]() |
![]() |
![]() |
|
75 | SymptoBuddy: A Progressive Web-Based AI Symptom Checker to Enhance Preliminary Health Assessment | Asma'a Ishowo, Joseph Awotunde, Nor Hitam, Fatimah Ishowo-Oloko, | Fatimah Ishowo-Oloko | ![]() |
![]() |
![]() |
![]() |
76 | Evolution of YOLO models and a Comparative Evaluation for Pedestrian Detection | Ma Althea Retig, Fakeha Ansari, Maitha Almarri, Suleiman Yerima, | Ma Althea Retig | ![]() |
![]() |
![]() |
![]() |
77 | Simulating a Ransomware Attack for Security Evaluation | Othman Othman, Yazan Al Balawi, | Othman Othman | ![]() |
![]() |
![]() |
![]() |
78 | Eye Gesture-Based Robotic Arm Control Using EOG and Machine Learning | Mohammed Alshehhi, Abhilasha Singh, Jinane Mounsef, | Jinane Mounsef | ![]() |
![]() |
![]() |
![]() |
79 | Feature Fusion of Deep and Spatio-temporal Features for Dynamic Scene Understanding | Areej Ahmed, Ishana Jabbar, Shehryar Naeem, Md Azher Uddin, | Md Azher Uddin | ![]() |
![]() |
![]() |
![]() |
81 | Game Theory–Driven AI for Zero Trust Security | Al Amin Hossain, Darryl Ahner, Michael Larkin, | Al Amin Hossain | ![]() |
![]() |
![]() |
![]() |
82 | The Distribution of CVE-Based Vulnerabilities on CMS Platforms | Saadet Elif Tokuoglu, Deniz Balta, Musa Balta, | Musa Balta | ![]() |
![]() |
![]() |
![]() |
83 | SwarmForm: A Survey of Shape Formation in Modular and Decentralized Robot Systems | Arash Kermani Kolankeh, | Arash Kermani Kolankeh | ![]() |
![]() |
![]() |
![]() |
87 | Self-Contained Phishing Website Detection Using Machine Learning with Rendered URL and HTML Features | Yusuf Ozaslan, M. Fatih Adak, | Yusuf Ozaslan | ![]() |
![]() |
![]() |
![]() |
88 | AI and ML Bases Traffic Prediction System to Improve City Commutes | Majid Alkharusi, S John, | Majid Alkharusi | ![]() |
![]() |
![]() |
![]() |
89 | Variability Management of Contextual Feature Model in Multi-Software Product Line | Asad Abbas, Muhammad Fezan Afzal, | Asad Abbas | ![]() |
![]() |
![]() |
![]() |