Follow

Submissions from 2025

Link

Visualization Driven AI Ensuring Quality in Wearable Time-Series Sensor Data for Healthcare, Sayma Akther

PDF

Seeing Bias Through Eye Movements: Investigating Empathy and Engagement with Authentic and Altered Refugee Imagery, Reem Albaghli, Akshay Sunil Gurnaney, and Nada Attar

Deciphering Speech Through Vision: A Deep Learning Lip Reading System, Srujith Rao Ambati and Sayma Akther

Link

Deciphering Speech Through Vision: A Deep Learning Lip Reading System, Srujith Rao Ambati and Sayma Akther

PDF

Finding BERT errors by clustering activation vectors, William B. Andreopoulos, Dominic Lopez, Carlos Rojas, and Vedashree P. Bhandare

Link

Time Series Modelling of Landslides using Reinforcement Learning for Feature Selection, Mohith Sai Venkat Ankem, Navrati Saxena, and Akshay Ravi

Link

A Comparative Study of Ensemble Learning Methodologies for Multilingual Sentiment Analysis, Farhan Ansari, Navrati Saxena, and Aditya Kulkarni

Link

Enhancing Enrollment and Participation in Computing Ethics through CIRCLE: Cross-Campus Responsible Computing Learning Experiences, Nada Attar, Souvick Ghosh, Michele A.L. Villagran, and Darra Hofman

Link

Influence of Motivation and Learning Strategies on Performance in Introductory Programming, Yirsaw Ayalew, Ethel Tshukudu, Monkgogi Mudongo, Bontle Gopolang, Tsholofetso Taukobong, and Edward Zimudzi

PDF

Generating Synthetic Malware Samples Using Generative AI, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park

Poster: Synthetic Malware Generation using Generative Models, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park

Link

Poster: Synthetic Malware Generation using Generative Models, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park

Poster: Synthetic Malware Generation using Generative Models, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park

Link

Secondary Students’ Conceptions of AI in an African Country, Katharine Childs, Douglas Case, Ethel Tshukudu, Tebogo Videlmah Molebatsi, Gaokgakala Alogeng, and Emma R. Dodoo

Secondary Students’ Conceptions of AI in an African Country, Katharine Childs, Douglas Case, Ethel Tshukudu, Tebogo Videlmah Molebatsi, Gaokgakala Alogeng, and Emma R. Dodoo

Link

Bilingual Instruction in Programming: Preliminary Insights from an Amharic-English OOP Course, Fitsum Gizachew Deriba, Ismaila Temitayo Sanusi, and Ethel Tshukudu

PDF

Deep Learning for Non-Invasive Blood Pressure Monitoring: Model Performance and Quantization Trade-Offs, Anbu Valluvan Devadasan, Saptarshi Sengupta, and Mohammad Masum

PDF

Exploring the Role of Culture and Bilingualism in Programming Activities: Lessons from African Educators, Emma R. Dodoo, Katharine Childs, and Ethel Tshukudu

Link

Inter-Device User Keystroke Analysis, Austin Erwin-Martinetti and Amith Kamath Belman

Link

Poster: RTOS Security Risks in Telecommunications Hardware, Austin Erwin-Martinetti and Amith Kamath Belman

PDF

From disciplinary enthusiasm to soulless tasks: norms behind computing educators' emotion display, Virginia Grande, Päivi Kinnunen, Matthew Barr, Anne Kathrin Peters, Mihaela Sabin, Matilde Sánchez-Peña, and Ethel Tshukudu

Link

Expanding Contextualized Computer Science Education in Africa: A Collaborative Initiative, Sally Hamouda, Kehinde Aruleba, Joseph Kizito Bada, Ethel Tshukudu, Cleverence Kombe, Emmanuel Okyere Ekwam, Tessema Mengistu, Linda Marshall, Janet Shufor Bih Fofang, and Nils Timm

PDF

Computing Education in African Countries: A Literature Review and Contextualised Learning Materials, Sally Hamouda, Linda Marshall, Kate Sanders, Ethel Tshukudu, Oluwatoyin Adelakun-Adeyemo, Brett A. Becker, Emma R. Dodoo, G. Ayorkor Korsah, Sandani Luvhengo, Oluwakemi Ola, Jack Parkinson, and Ismaila Temitayo Sanusi

Link

SyntheticPop: Attacking Speaker Verification Systems With Synthetic VoicePops, Eshaq Jamdar and Amith Kamath Belman

PDF

Multimodal Emotion Detection and Analysis from Conversational Data, Abhinay Jatoth, Faranak Abri, and Tien Nguyen

PDF

Multimodal Emotion Detection and Analysis from Conversational Data, Abhinay Jatoth, Faranak Abri, and Tien Nguyen

Link

Diverse GNN Encoder-Decoder for Graph Anomaly Detection, Kenneth John and Katerina Potika

PDF

Embedding-Driven Synthetic Malware Generation with Autoencoders and Cluster-Tangent Diffusion, Gunnika Kapoor, Sathvika Nadipalli, and Fabio Di Troia

PDF

Robust Hashing for Improved CNN Performance in Image-Based Malware Detection, Sanket Shekhar Kulkarni and Fabio Di Troia

PDF

Robust Hashing for Improved CNN Performance in Image-Based Malware Detection, Sanket Shekhar Kulkarni and Fabio Di Troia

Link

Context-Aware Natural Language Processing for Malware Detection, Helen Liu, Summer Mccune, Quang Duy Tran, Fabio Di Troia, and Younghee Park

Link

Resource Coordination Learning for End-to-End Network Slicing Under Limited State Visibility, Xiang Liu, Jason P. Jue, and Genya Ishigaki

Link

Temporal Dynamics of Diabetes Prediction: A Sensor-Based Time-Series Investigation, Monica Meduri and Sayma Akther

Temporal Dynamics of Diabetes Prediction: A Sensor-Based Time-Series Investigation, Monica Meduri and Sayma Akther

Link

LatticeAnalytics: Strut-Level Visualization and Inspection of Additively Manufactured Lattice Structures, Haichao Miao, Saurabh Narain, Vuthea Chheang, Garrett Hooten, Raiyan Seede, Pavol Klacansky, Kaila Morgen Bertsch, Gabe Guss, Brian Giera, and Peer Timo Bremer

LatticeAnalytics: Strut-Level Visualization and Inspection of Additively Manufactured Lattice Structures, Haichao Miao, Saurabh Narain, Vuthea Chheang, Garrett Hooten, Raiyan Seede, Pavol Klacansky, Kaila Morgen Bertsch, Gabe Guss, Brian Giera, and Peer Timo Bremer

PDF

Cluster analysis and concept drift detection in malware, Aniket Mishra and Mark Stamp

PDF

On Modeling Agent Behavior Change Through Multi-Typed Information Diffusion in Online Social Networks, Masaaki Miyashita, Norihiko Shinomiya, Daisuke Kasamatsu, and Genya Ishigaki

Link

Understanding Java Programming Errors by First Year Students through the Lens of the Neo-Piaget Cognitive Development Framework, Monkgogi Mudongo, Tsholofetso Taukobong, Bontle Gopolang, Yirsaw Ayalew, Edward Zimudzi, and Ethel Tshukudu

An Incentivization Strategy toward E2E Network Slice as a Service, Yosha Mundhra, Riti Gour, and Genya Ishigaki

Link

An Incentivization Strategy toward E2E Network Slice as a Service, Yosha Mundhra, Riti Gour, and Genya Ishigaki

Link

A Comparative Study of Retrieval-Augmented Generation (RAG) Chatbots, Kalindi Vijesh Parekh, Navrati Saxena, and Mohammad Adil Ansari

Link

Detecting Fake Reviews Using Aspect-Based Sentiment Analysis and Graph Convolutional Networks, Prathana Phukon, Petros Potikas, and Katerina Potika

Link

Multi-Agent Lane Optimization in Cluttered Environments, Maryam Khazaei Pool, Matthew Morozov, and Marcelo Kallmann

Link

Special issue on big data computing service and machine learning applications, Katerina Potika, Magdalini Eirinaki, Monica Vitali, Anna Bernasconi, and Hiroyuki Fujioka

Link

An Efficient Multi-Class Traffic Delivery Scheme in 5G Vehicle-to-Everything Communications, Eshita Rastogi, Jaehoon Jeong, Abhishek Roy, and Navrati Saxena

PDF

High Abundances of Crustose Coralline Algae Inside Cryptic Coral Habitats Linked to Coral Reef Functioning, Anna Rothstein, Orion S. McCarthy, Sophie Luu, Emily L.A. Kelly, Philip Heller, Stuart Sandin, Jennifer E. Smith, and Maya S. deVries

PDF

Discriminative Regions and Adversarial Sensitivity in CNN-Based Malware Image Classification, Anish Roy and Fabio Di Troia

Link

Link-level Blocking Prediction for Dynamic Network Slicing using Graph Neural Networks, Manmohanbabu Rupanagudi and Genya Ishigaki

Link

Affordable NTN to Bridge the Digital Divide: A Case Study on Women Micro-Entrepreneurs, Navrati Saxena, Abhishek Roy, Sree Hari Karri, and Melody Moh

Link

User Behavior Based Implicit Personality Detection in Recommendation Systems, Uzma Zubair Shaikh and Robert Chun

Link

Tracing the Past, Predicting the Future: A Systematic Review of AI in Archival Science, Gaurav Shinde, Tiana Kirstein, Souvick Ghosh, and Patricia Franks

The Power of Patterns in Detecting News Articles Written by AI, Lilou Sicard-Noel, Eric Wu, and Mike Wu

Link

The Power of Patterns in Detecting News Articles Written by AI, Lilou Sicard-Noel, Eric Wu, and Mike Wu

Synthetic Malware Image Generation Based on Generative Models Against Zero-Day Attacks, Arjun Sudheer, Ayesha Ahmed, Fabio Di Troia, and Younghee Park

Link

Synthetic Malware Image Generation Based on Generative Models Against Zero-Day Attacks, Arjun Sudheer, Ayesha Ahmed, Fabio Di Troia, and Younghee Park

PDF

AI-Generated Text Detection and Source Identification, Anjana Priyatham Tatavarthi, Faranak Abri, and Nada Attar

Link

Growing a National Computing Movement in an African Country: A Multi-Stakeholder Model, Ethel Tshukudu, Alan Peterfreund, Shanah Suping, Sue Sentance, and Quintin Cutts

PDF

Contextualizing Introductory Computer Science: Insights from African Faculty, Ethel Tshukudu, Ismaila Temitayo Sanusi, Oluwakemi Ola, Sally Hamouda, Linda Marshall, Oluwatoyin Adelakun-Adeyemo, Emma R. Dodoo, G. Ayorkor Korsah, Sandani Luvhengo, and Jack Parkinson

Link

Evolving Capacity for Computing Education in Botswana: A Comparative Look at 2021 and 2025 Teacher Perspectives, Ethel Tshukudu, Shain Vyomakesan, Keoikantse Sehuhula, and Boitshwarelo Palamelo

Link

Improving the Diversity and Fairness in Job Recommendations Using the Stable Matching Algorithm, Jatin Unecha, Melody Moh, and Teng Sheng Moh

Link

Survival Analysis for Cancers of the Brain, CNS and Bone using Retrieval Augmented Generation on the SEER Database, Jyothi Vaidyanathan, Shourya Gupta, Justin Lee, Srikanth Prabhu, and Saptarshi Sengupta

PDF

Exploring the Use and Misuse of Large Language Models, Hezekiah Paul D. Valdez, Faranak Abri, Jade Webb, and Thomas H. Austin

Link

Breaking the Cycle: Countering Popularity Bias for Diverse Content Discovery, Brandon Weaver, Melody Moh, and Teng Sheng Moh

PDF

Synthetic Social Engineering Scenario Generation Using LLMs for Awareness-Based Attack Resilience, Jade Webb, Faranak Abri, and Sayma Akther

PDF

Synthetic Social Engineering Scenario Generation Using LLMs for Awareness-Based Attack Resilience, Jade Webb, Faranak Abri, and Sayma Akther

Link

Multi-Modal Adversarial Activity Detection Using Keyboard and Mouse Dynamics, Johny Xiong and Amith Kamath Belman

Link

MultiMap Implementation in OpenJDK, Nishant Yadav and Robert Chun

Submissions from 2024

Link

MorteSense DIY Home Security, Shohin Abdulkhamidov, Diego Cruz, Diego Garcia-Carrasco, Spartak Gevorgyan, and Faramarz Mortezaie

PDF

Malware Classification Using Dynamically Extracted API Call Embeddings, Sahil Aggarwal and Fabio Di Troia

Link

Gesture Recognition Dynamics: Unveiling Video Patterns with Deep Learning, Nithish Reddy Agumamidi and Sayma Akther

PDF

Eyes on Higher Education: Evaluating Web Usability in Kuwaiti Private Universities Using Eye-Tracking and Supr-Q Metrics, Reem Albaghli, Ayah Beidas, and Nada Attar

Link

Detecting Bias in Refugee Perception using Face Swapping: An Empirical Eye-Tracking Study, Reem Albaghli, Akshay Gurnaney, and Nada Attar

PDF

Oxygenation influences xylose fermentation and gene expression in the yeast genera Spathaspora and Scheffersomyces, Katharina O. Barros, Megan Mader, David J. Krause, Jasmyn Pangilinan, Bill Andreopoulos, Anna Lipzen, Stephen J. Mondo, Igor V. Grigoriev, Carlos A. Rosa, Trey K. Sato, and Chris Todd Hittinger

PDF

Evolutionary genomic analyses of canine E. coli infections identify a relic capsular locus associated with resistance to multiple classes of antimicrobials, Kristina Ceres, Jordan D. Zehr, Chloe Murrell, Jean K. Millet, Qi Sun, Holly C. McQueary, Alanna Horton, Casey Cazer, Kelly Sams, Guillaume Reboul, William B. Andreopoulos, Patrick K. Mitchell, Renee Anderson, Rebecca Franklin-Guild, Brittany D. Cronk, Bryce J. Stanhope, Claire R. Burbick, Rebecca Wolking, and Laura Peak

Link

Scaling Container Caching to Larger Networks with Multi-Agent Reinforcement Learning, Austin Chen and Genya Ishigaki

Link

Synthetic Malware Using Deep Variational Autoencoders and Generative Adversarial Networks, Aaron Choi, Albert Giang, Sajit Jumani, David Luong, and Fabio Di Troia

Link

Health Communication in an Era of Disinformation: Perceived Source Credibility Among Transgender and Gender Diverse Individuals, E. Ciszek, Gerold Dermid, Mansi Shah, Richard Mocarski, Debra Hope, and Nathan Woodruff

PDF

Bisphenol F affects neurodevelopmental gene expression, mushroom body development, and behavior in Drosophila melanogaster, Judith L.A. Fishburn, Heather L. Larson, An Nguyen, Chloe J. Welch, Taylor Moore, Aliyah Penn, Johnathan Newman, Anthony Mangino, Erin Widman, Rana Ghobashy, Jocelyn Witherspoon, Wendy Lee, and Kimberly A. Mulligan

Link

Message from the Technical Program Chairs: IEEE BDS 2024, Hiroyuki Fujioka, Katerina Potika, and Junchi Yan

Link

Fast Software-Based Real Time Panoramic Image Processing, Matthew Gerlits, Melody Moh, and Teng Sheng Moh

PDF

The Applicability of LLMs in Generating Textual Samples for Analysis of Imbalanced Datasets, Saroj Gopali, Faranak Abri, Akbar Siami Namin, and Keith S. Jones

Link

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs, Saroj Gopali, Akbar S. Namin, Faranak Abri, and Keith S. Jones

PDF

A Comparative Multivariate Analysis of VAR and Deep Learning-based Models for Forecasting Volatile Time Series Data, Saroj Gopali, Sima Siami-Namini, Faranak Abri, and Akbar Siami Namin

PDF

Classification and online clustering of zero-day malware, Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, and Róbert Lórencz

PDF

Creating valid adversarial examples of malware, Matouš Kozák, Martin Jureček, Mark Stamp, and Fabio Di Troia

PDF

Adversarial Attacks and Defenses in Multivariate Time-Series Forecasting for Smart and Connected Infrastructures, Pooja Krishan, Rohan Mohapatra, Sanchari Das, and Saptarshi Sengupta

Link

Learning to Play the Trading Game: Exploring Reinforcement Learning-Based Stock Trading Bots, Neeraj Kulkarni, Petros Potikas, and Katerina Potika

Link

Advanced DDoS Attack Classification using Ensemble Model with Meta-Learner, Ankith Indra Kumar and Genya Ishigaki

Link

The Physiology of Sponge Behavior, Sally P. Leys, Emma J.K. Esposito, and Amanda S. Kahn

PDF

A comparison of adversarial malware generators, Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp, and Fabio Di Troia

Link

A comparison of graph neural networks for malware classification, Vrinda Malhotra, Katerina Potika, and Mark Stamp

PDF

Enhancing Botnet Detection in Network Security Using Profile Hidden Markov Models, Rucha Mannikar and Fabio Di Troia

Link

A natural language processing approach to Malware classification, Ritik Mehta, Olha Jurečková, and Mark Stamp

Link

Neural Network-based Blocking Prediction for Dynamic Network Slicing, Nitin Datta Movva and Genya Ishigaki

Link

Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data, Tien Nguyen, Faranak Abri, Akbar Siami Namin, and Keith S. Jones

PDF

Resume Content Generation Using Llama 2 with Adapters, Navaneeth Sai Nidadavolu and William B. Andreopoulos

Link

Kismet/CHD7/CHD8 affects gut microbiota, mechanics, and the gut-brain axis in Drosophila melanogaster, Angelo Niosi, Nguyên Henry Võ, Punithavathi Sundaramurthy, Chloe Welch, Aliyah Penn, Yelena Yuldasheva, Adam Alfareh, Kaitlyn Rausch, Takhmina Amin-Rahbar, Jeffery Cavanaugh, Prince Yadav, Stephanie Peterson, Raina Brown, Alain Hu, Any Ardon-Castro, Darren Nguyen, Robert Crawford, Wendy Lee, and Eliza J. Morris

Link

The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models, Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, and Akbar Siami Namin

PDF

Community Detection Using Deep Learning: Combining Variational Graph Autoencoders with Leiden and K-Truss Techniques, Jyotika Hariom Patil, Petros Potikas, William B. Andreopoulos, and Katerina Potika