Search dblp for Publications

export results for "toc:db/conf/icaic2/icaic2024.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icaic2/AbiramiZS24,
  author       = {K. Rama Abirami and
                  Tiago Zonta and
                  Mithileysh Sathiyanarayanan},
  title        = {A Holistic Review on Detection of Malicious Browser Extensions and
                  Links using Deep Learning},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433842},
  doi          = {10.1109/ICAIC60265.2024.10433842},
  timestamp    = {Tue, 05 Mar 2024 21:04:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AbiramiZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AhmadiN24,
  author       = {Mojtaba Ahmadi and
                  Reza Nourmohammadi},
  title        = {zkFDL: An efficient and privacy-preserving decentralized federated
                  learning with zero knowledge proof},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433831},
  doi          = {10.1109/ICAIC60265.2024.10433831},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AhmadiN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AzumahAEEO24,
  author       = {Sylvia Worlali Azumah and
                  Victor Adewopo and
                  Zag ElSayed and
                  Nelly Elsayed and
                  Murat Ozer},
  title        = {A Secure Open-Source Intelligence Framework For Cyberbullying Investigation},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433832},
  doi          = {10.1109/ICAIC60265.2024.10433832},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AzumahAEEO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ChauhanAJSSRV24,
  author       = {Aadi Chauhan and
                  Taran Anand and
                  Tanisha Jauhari and
                  Arjav Shah and
                  Rudransh Singh and
                  Arjun Rajaram and
                  Rithvik Vanga},
  title        = {Identifying Race and Gender Bias in Stable Diffusion {AI} Image Generation},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433840},
  doi          = {10.1109/ICAIC60265.2024.10433840},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ChauhanAJSSRV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ChuJG24,
  author       = {Wenhui Chu and
                  Aobo Jin and
                  Hardik A. Gohel},
  title        = {A Novel Deep Learning Method for Segmenting the Left Ventricle in
                  Cardiac Cine {MRI}},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433830},
  doi          = {10.1109/ICAIC60265.2024.10433830},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ChuJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ChuJG24a,
  author       = {Wenhui Chu and
                  Aobo Jin and
                  Hardik A. Gohel},
  title        = {Simulations and Advancements in MRI-Guided Power-Driven Ferric Tools
                  for Wireless Therapeutic Interventions},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433835},
  doi          = {10.1109/ICAIC60265.2024.10433835},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ChuJG24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Chung24,
  author       = {Bryan Chung},
  title        = {Addressing Data Imbalance in Plant Disease Recognition through Contrastive
                  Learning},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433841},
  doi          = {10.1109/ICAIC60265.2024.10433841},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Chung24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/FuhnwiRI24,
  author       = {Gerard Shu Fuhnwi and
                  Matthew Revelle and
                  Clemente Izurieta},
  title        = {Improving Network Intrusion Detection Performance : An Empirical Evaluation
                  Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433805},
  doi          = {10.1109/ICAIC60265.2024.10433805},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/FuhnwiRI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GrimshawLPC24,
  author       = {Charlie Grimshaw and
                  Brian Lachine and
                  Taylor Perkins and
                  Emilie Coote},
  title        = {Link-based Anomaly Detection with Sysmon and Graph Neural Networks},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433846},
  doi          = {10.1109/ICAIC60265.2024.10433846},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GrimshawLPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JamaliAR24,
  author       = {Ahamadali Jamali and
                  Shahin Alipour and
                  Audrey Rah},
  title        = {Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment
                  Analysis on Label-Free News Headlines},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433844},
  doi          = {10.1109/ICAIC60265.2024.10433844},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JamaliAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JawharMB24,
  author       = {Shadi Jawhar and
                  Jeremy R. Miller and
                  Zeina Bitar},
  title        = {AI-Driven Customized Cyber Security Training and Awareness},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433829},
  doi          = {10.1109/ICAIC60265.2024.10433829},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JawharMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JawharMB24a,
  author       = {Shadi Jawhar and
                  Jeremy R. Miller and
                  Zeina Bitar},
  title        = {AI-Based Cybersecurity Policies and Procedures},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433845},
  doi          = {10.1109/ICAIC60265.2024.10433845},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JawharMB24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JeyarajSYJG24,
  author       = {Rathinaraja Jeyaraj and
                  Barathi Subramanian and
                  Karnam Yogesh and
                  Aobo Jin and
                  Hardik A. Gohel},
  title        = {{YSAF:} Yolo with Spatial Attention and {FFT} to Detect Face Spoofing
                  Attacks},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433802},
  doi          = {10.1109/ICAIC60265.2024.10433802},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JeyarajSYJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Khoje24,
  author       = {Mandar Khoje},
  title        = {Navigating Data Privacy and Analytics: The Role of Large Language
                  Models in Masking conversational data in data platforms},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433801},
  doi          = {10.1109/ICAIC60265.2024.10433801},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Khoje24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/KumarVSK24,
  author       = {Priyan Malarvizhi Kumar and
                  Kavya Vedantham and
                  Jeeva Selvaraj and
                  Balasubramanian Prabhu Kavin},
  title        = {Enhanced Network Intrusion Detection System Using PCGSO-Optimized
                  {BI-GRU} Model in AI-Driven Cybersecurity},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10443675},
  doi          = {10.1109/ICAIC60265.2024.10443675},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/KumarVSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/KurniawanOM24,
  author       = {Ade Kurniawan and
                  Yuichi Ohsita and
                  Masayuki Murata},
  title        = {Toward robust systems against sensor-based adversarial examples based
                  on the criticalities of sensors},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433806},
  doi          = {10.1109/ICAIC60265.2024.10433806},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/KurniawanOM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/LessageCOLMM24,
  author       = {Xavier Lessage and
                  Leandro Collier and
                  Charles{-}Henry Bertrand Van Ouytsel and
                  Axel Legay and
                  Sa{\"{\i}}d Mahmoudi and
                  Philippe Massonet},
  title        = {Secure federated learning applied to medical imaging with fully homomorphic
                  encryption},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433836},
  doi          = {10.1109/ICAIC60265.2024.10433836},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/LessageCOLMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MaciTC24,
  author       = {Antonio Maci and
                  Nicola Tamma and
                  Antonio Coscia},
  title        = {Deep Reinforcement Learning-based Malicious {URL} Detection with Feature
                  Selection},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433827},
  doi          = {10.1109/ICAIC60265.2024.10433827},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MaciTC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MishraBMCGSSR24,
  author       = {Manit Mishra and
                  Abderrahman Braham and
                  Charles Marsom and
                  Bryan Chung and
                  Gavin Griffin and
                  Dakshesh Sidnerlikar and
                  Chatanya Sarin and
                  Arjun Rajaram},
  title        = {DataAgent: Evaluating Large Language Models' Ability to Answer Zero-Shot,
                  Natural Language Queries},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433803},
  doi          = {10.1109/ICAIC60265.2024.10433803},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MishraBMCGSSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MutongiR24,
  author       = {Chipo Mutongi and
                  Billy Rigava},
  title        = {Robotics in Healthcare: The African Perspective},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433838},
  doi          = {10.1109/ICAIC60265.2024.10433838},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MutongiR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MutongiR24a,
  author       = {Chipo Mutongi and
                  Billy Rigava},
  title        = {The Application of the Fifth Discipline Strategies in the Learning
                  City Concept},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433847},
  doi          = {10.1109/ICAIC60265.2024.10433847},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MutongiR24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PatelYG24,
  author       = {Urjitkumar Patel and
                  Fang{-}Chun Yeh and
                  Chinmay Gondhalekar},
  title        = {{CANAL} - Cyber Activity News Alerting Language Model : Empirical
                  Approach vs. Expensive LLMs},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433839},
  doi          = {10.1109/ICAIC60265.2024.10433839},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PatelYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PonnolyPD24,
  author       = {Joseph Ponnoly and
                  John Puthenveetil and
                  Patricia D'Urso},
  title        = {Prescriptive Analytics-based Robust Decision-Making Model for Cyber
                  Disaster Risk Reduction},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433837},
  doi          = {10.1109/ICAIC60265.2024.10433837},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PonnolyPD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PopoolaAFA24,
  author       = {Gideon Popoola and
                  Khadijat{-}Kuburat Abdullah and
                  Gerard Shu Fuhnwi and
                  Janet Agbaje},
  title        = {Sentiment Analysis of Financial News Data using {TF-IDF} and Machine
                  Learning Algorithms},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433843},
  doi          = {10.1109/ICAIC60265.2024.10433843},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PopoolaAFA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/RavalAWG24,
  author       = {Maulin Raval and
                  Aobo Jin and
                  Yun Wan and
                  Hardik A. Gohel},
  title        = {Leveraging Advanced Visual Recognition Classifier For Pneumonia Prediction},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433800},
  doi          = {10.1109/ICAIC60265.2024.10433800},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/RavalAWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SardarHPSHDG24,
  author       = {Tanvir H. Sardar and
                  Ruhul Amin Hazarika and
                  Bishwajeet Pandey and
                  Guru Prasad M. S and
                  Sk Mahmudul Hassan and
                  Radhakrishna Dodmane and
                  Hardik A. Gohel},
  title        = {Video key concept extraction using Convolution Neural Network},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433799},
  doi          = {10.1109/ICAIC60265.2024.10433799},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SardarHPSHDG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SeilovPNAKZ24,
  author       = {Shakhmaran Seilov and
                  Bishwajeet Pandey and
                  Akniyet Nurzhaubayev and
                  Dias Abildinov and
                  Assem Konyrkhanova and
                  Bibinur Zhursinbek},
  title        = {Federated Learning Based Smart Horticulture and Smart Storage of Fruits
                  Using E-Nose, and Blockchain: {A} Proposed Model},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433834},
  doi          = {10.1109/ICAIC60265.2024.10433834},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SeilovPNAKZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahSS24,
  author       = {Trishla Shah and
                  Raghav V. Sampangi and
                  Angela A. Siegel},
  title        = {Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User
                  Inputs},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433804},
  doi          = {10.1109/ICAIC60265.2024.10433804},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahSS24a,
  author       = {Trishla Shah and
                  Raghav V. Sampangi and
                  Angela A. Siegel},
  title        = {Mobile Application Security Risk Score: {A} sensitive user input-based
                  approach},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433828},
  doi          = {10.1109/ICAIC60265.2024.10433828},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahSS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icaic2/2024,
  title        = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024},
  doi          = {10.1109/ICAIC60265.2024},
  isbn         = {979-8-3503-8185-6},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics