| 2025 | A Multi-Layer Phishing Defense Framework for Trusted Cloud Environments. Alias Davis, Samah Abdelsalam, Mustafa Ghaleb, Mohammed S. M. Gismalla, E. I. Eltahir, Mosab Hamdan |
| 2025 | An Empirical Study on Estimating Energy Consumption From Software Traces. Phuong Nguyen, Adel Noureddine, Congduc Pham |
| 2025 | Balancing Compression and Prediction: A Hybrid Autoencoder-LSTM Framework for Cloud Workloads. Lidia Kidane, Paul Townend, Thijs Metsch, Erik Elmroth |
| 2025 | Building a Datasets for Character Product Detection from SNS. Maho Funada, Reiya Sato, Yoshitaka Sakurai |
| 2025 | BullyHCL: Unsupervised Heterogeneous Graph Contrastive Learning Framework for Session-based Cyberbullying Detection. Munkhbuyan Buyankhishig, Thanda Shwe, Israel Mendonça, Masayoshi Aritsugi |
| 2025 | Cloud-Based Phishing Awareness Analyzer for Automated User Training and Assessment. Mohammad Alwanain, Abdullah M. Alnajim, Ibraheem Al-Hejri, Hassen Hamouda, Sheroz Khan, Abdul Wahid Khan |
| 2025 | Comparative Analysis of Motif-Based Anomaly Detection for Humidity Monitoring in Digital Twin Systems. Ionica-Larisa Puiu, Daniela Zaharie, Teodor-Florin Fortis |
| 2025 | Design and Development of a Predictive Security Threat Management System Leveraging CWEs, CVEs, and CAPECs. Joaquín Sierra-Granados, José L. Ruiz-Catalán, David Garcia Rosado, Manuel A. Serrano |
| 2025 | Development and Comparative Evaluation of Three Artificial Intelligence Models (NLP, LLM, JEPA) for Predicting Triage in Emergency Departments: A 7-Month Retrospective Proof-of-Concept: Triage Intelligent A l'Entréé des Urgences (TIAEU). Edouard Lansiaux, Ramy Azzouz, Emmanuel Chazard, Amélie Vromant, Eric Wiel |
| 2025 | Dual-Modality UAV Detection and Classification under Low-Visibility: A Synth-Real RGB-IR Dataset and Benchmark for Aerial Surveillance. Hatoun Alshoail, Sarah Alruwais, Juri Alqorashi, Najah Alsubaie |
| 2025 | Dual-Space Augmentation and Sampling for Training Language Models on Limited and Imbalanced Surgical Reports. Ashok Choudhary, Frank Lee, Cornelius A. Thiels, Hojjat Salehinejad |
| 2025 | Early detection of backdoor attacks in federated learning via ecosystemic symmetry breaking. Carlos Mario Braga Ortuño, Manuel A. Serrano, Eduardo Fernández-Medina |
| 2025 | Edge-Driven Water Quality Monitoring and Prediction: A Spatio-Temporal GNN-based IoT Approach for Environmental Sensing. Lia Anggraini, Elisha Elikem Kofi Senoo, Israel Rodrigues Soares, Thanda Shwe, Israel Mendonça, Masayoshi Aritsugi |
| 2025 | Evolutionary Train-Test Split for Hierarchical Monte Carlo Ensemble. Ziauddin Ursani, Dmytro Antypov, Katie Atkinson, Matthew S. Dyer, Matthew J. Rosseinsky, Sven Schewe, Ahsan Ahmad Ursani, Andrij Vasylenko |
| 2025 | From High to Low: A Numerical Experiment to Analyse Contour Detection at Resolution Loss in Images of Damaged Glass Plates. Sabrina Pietzsch, Sebastian Wollny, Paul Grimm |
| 2025 | Gaia: Hybrid Hardware Acceleration for Serverless AI in the 3D Compute Continuum. Maximilian Reisecker, Cynthia Marcelino, Thomas W. Pusztai, Stefan Nastic |
| 2025 | How to evaluate NoSQL Database Paradigms for Knowledge Graph Processing. Rosario Napoli, Antonio Celesti, Massimo Villari, Maria Fazio |
| 2025 | Optimal Warehouse Distribution Center Placement using Evolutionary Algorithms. Corrado Mio, Abdulla Alfalasi, Siddhartha Shakya |
| 2025 | Optimizing Code Embeddings and ML Classifiers for Python Source code Vulnerability Detection. Talaya Farasat, Joachim Posegga |
| 2025 | Optimizing Video Analytics Inference Pipelines: A Case Study. Saeid Ghafouri, Yuming Ding, Katerine Díaz-Chito, Jesús Martínez del Rincón, Niamh O'Connell, Hans Vandierendonck |
| 2025 | Privacy-Preserving Machine Learning for Encrypted Traffic Classification in Secure Cloud Services. Sultan Almuhammadi, Nahad Alnahari, Rana Ba-amer |
| 2025 | Proceedings of the IEEE/ACM 12th International Conference on Big Data Computing, Applications and Technologies, BDCAT 2025, Nantes, France, December 1-4, 2025 |
| 2025 | Reflect, Reason, Rephrase (R³-Detox): An In-Context Learning Approach to Text Detoxification. Guillermo Villate-Castillo, Javier Del Ser, Borja Sanz |
| 2025 | Repudiation For Good: Privacy-Preserving Prompt Deniability Through Embedding-Based Approximation. Eiman Mohammed, Shawqi Al-Maliki, Mohamed M. Abdallah, Ala I. Al-Fuqaha |
| 2025 | Scaling AI for Embryo Transition Detection: Benchmarking Spatio-Temporal Deep Models. Aissa Benfettoume Souda, Mohammed El Amine Bechar, Souaad Hamza-Cherif, Jean-Marie Guyader, Marwa Elbouz, Frederic Morel, Aurore Perrin, Nesma Settouti |
| 2025 | Single-Round Zero-Knowledge Proof for the Square-Root Problem in Cloud Systems. Sultan Almuhammadi |
| 2025 | System Requirements for Decentralised Collaborative Machine Learning in Industry 4.0. Sylwia Olbrych, Hans Aoyang Zhou, Anas Abdelrazeq, Robert H. Schmitt |
| 2025 | Toward Agentic IAM: A Probabilistic Authorization Framework for Least Privilege AI Workflows. Jaouaher Zouari |
| 2025 | Towards Efficient and Privacy-Preserving Cloud Computing. Heba Aljabrine, Md. Mahfuzur Rahman |
| 2025 | Towards a Framework for Personal and Domestic Cybersecurity. Ángel Suarez-Bárcena, Antonio Santos-Olmo, Eduardo Fernández-Medina |
| 2025 | Verifiability and Privacy in Federated Learning through Context-Hiding Multi-Key Homomorphic Authenticators. Simone Bottoni, Giulio Zizzo, Stefano Braghin, Alberto Trombetta |
| 2025 | Zero Trust Architecture for Ransomware Defense in Virtualized Environment. Atharva Dhumal, Mustafa Ghaleb, Samah Abdelsalam, Arghir-Nicolae Moldovan, Mosab Hamdan |