Submissions from 2025
Visualization Driven AI Ensuring Quality in Wearable Time-Series Sensor Data for Healthcare, Sayma Akther
Seeing Bias Through Eye Movements: Investigating Empathy and Engagement with Authentic and Altered Refugee Imagery, Reem Albaghli, Akshay Sunil Gurnaney, and Nada Attar
Deciphering Speech Through Vision: A Deep Learning Lip Reading System, Srujith Rao Ambati and Sayma Akther
Deciphering Speech Through Vision: A Deep Learning Lip Reading System, Srujith Rao Ambati and Sayma Akther
Finding BERT errors by clustering activation vectors, William B. Andreopoulos, Dominic Lopez, Carlos Rojas, and Vedashree P. Bhandare
Time Series Modelling of Landslides using Reinforcement Learning for Feature Selection, Mohith Sai Venkat Ankem, Navrati Saxena, and Akshay Ravi
A Comparative Study of Ensemble Learning Methodologies for Multilingual Sentiment Analysis, Farhan Ansari, Navrati Saxena, and Aditya Kulkarni
Enhancing Enrollment and Participation in Computing Ethics through CIRCLE: Cross-Campus Responsible Computing Learning Experiences, Nada Attar, Souvick Ghosh, Michele A.L. Villagran, and Darra Hofman
Influence of Motivation and Learning Strategies on Performance in Introductory Programming, Yirsaw Ayalew, Ethel Tshukudu, Monkgogi Mudongo, Bontle Gopolang, Tsholofetso Taukobong, and Edward Zimudzi
Generating Synthetic Malware Samples Using Generative AI, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park
Poster: Synthetic Malware Generation using Generative Models, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park
Poster: Synthetic Malware Generation using Generative Models, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park
Poster: Synthetic Malware Generation using Generative Models, Tiffany Bao, Kylie Trousil, Quang Duy Tran, Fabio Di Troia, and Younghee Park
Secondary Students’ Conceptions of AI in an African Country, Katharine Childs, Douglas Case, Ethel Tshukudu, Tebogo Videlmah Molebatsi, Gaokgakala Alogeng, and Emma R. Dodoo
Secondary Students’ Conceptions of AI in an African Country, Katharine Childs, Douglas Case, Ethel Tshukudu, Tebogo Videlmah Molebatsi, Gaokgakala Alogeng, and Emma R. Dodoo
Bilingual Instruction in Programming: Preliminary Insights from an Amharic-English OOP Course, Fitsum Gizachew Deriba, Ismaila Temitayo Sanusi, and Ethel Tshukudu
Deep Learning for Non-Invasive Blood Pressure Monitoring: Model Performance and Quantization Trade-Offs, Anbu Valluvan Devadasan, Saptarshi Sengupta, and Mohammad Masum
Exploring the Role of Culture and Bilingualism in Programming Activities: Lessons from African Educators, Emma R. Dodoo, Katharine Childs, and Ethel Tshukudu
Inter-Device User Keystroke Analysis, Austin Erwin-Martinetti and Amith Kamath Belman
Poster: RTOS Security Risks in Telecommunications Hardware, Austin Erwin-Martinetti and Amith Kamath Belman
From disciplinary enthusiasm to soulless tasks: norms behind computing educators' emotion display, Virginia Grande, Päivi Kinnunen, Matthew Barr, Anne Kathrin Peters, Mihaela Sabin, Matilde Sánchez-Peña, and Ethel Tshukudu
Expanding Contextualized Computer Science Education in Africa: A Collaborative Initiative, Sally Hamouda, Kehinde Aruleba, Joseph Kizito Bada, Ethel Tshukudu, Cleverence Kombe, Emmanuel Okyere Ekwam, Tessema Mengistu, Linda Marshall, Janet Shufor Bih Fofang, and Nils Timm
Computing Education in African Countries: A Literature Review and Contextualised Learning Materials, Sally Hamouda, Linda Marshall, Kate Sanders, Ethel Tshukudu, Oluwatoyin Adelakun-Adeyemo, Brett A. Becker, Emma R. Dodoo, G. Ayorkor Korsah, Sandani Luvhengo, Oluwakemi Ola, Jack Parkinson, and Ismaila Temitayo Sanusi
SyntheticPop: Attacking Speaker Verification Systems With Synthetic VoicePops, Eshaq Jamdar and Amith Kamath Belman
Multimodal Emotion Detection and Analysis from Conversational Data, Abhinay Jatoth, Faranak Abri, and Tien Nguyen
Multimodal Emotion Detection and Analysis from Conversational Data, Abhinay Jatoth, Faranak Abri, and Tien Nguyen
Diverse GNN Encoder-Decoder for Graph Anomaly Detection, Kenneth John and Katerina Potika
Embedding-Driven Synthetic Malware Generation with Autoencoders and Cluster-Tangent Diffusion, Gunnika Kapoor, Sathvika Nadipalli, and Fabio Di Troia
Robust Hashing for Improved CNN Performance in Image-Based Malware Detection, Sanket Shekhar Kulkarni and Fabio Di Troia
Robust Hashing for Improved CNN Performance in Image-Based Malware Detection, Sanket Shekhar Kulkarni and Fabio Di Troia
Context-Aware Natural Language Processing for Malware Detection, Helen Liu, Summer Mccune, Quang Duy Tran, Fabio Di Troia, and Younghee Park
Resource Coordination Learning for End-to-End Network Slicing Under Limited State Visibility, Xiang Liu, Jason P. Jue, and Genya Ishigaki
Temporal Dynamics of Diabetes Prediction: A Sensor-Based Time-Series Investigation, Monica Meduri and Sayma Akther
Temporal Dynamics of Diabetes Prediction: A Sensor-Based Time-Series Investigation, Monica Meduri and Sayma Akther
LatticeAnalytics: Strut-Level Visualization and Inspection of Additively Manufactured Lattice Structures, Haichao Miao, Saurabh Narain, Vuthea Chheang, Garrett Hooten, Raiyan Seede, Pavol Klacansky, Kaila Morgen Bertsch, Gabe Guss, Brian Giera, and Peer Timo Bremer
LatticeAnalytics: Strut-Level Visualization and Inspection of Additively Manufactured Lattice Structures, Haichao Miao, Saurabh Narain, Vuthea Chheang, Garrett Hooten, Raiyan Seede, Pavol Klacansky, Kaila Morgen Bertsch, Gabe Guss, Brian Giera, and Peer Timo Bremer
Cluster analysis and concept drift detection in malware, Aniket Mishra and Mark Stamp
On Modeling Agent Behavior Change Through Multi-Typed Information Diffusion in Online Social Networks, Masaaki Miyashita, Norihiko Shinomiya, Daisuke Kasamatsu, and Genya Ishigaki
Understanding Java Programming Errors by First Year Students through the Lens of the Neo-Piaget Cognitive Development Framework, Monkgogi Mudongo, Tsholofetso Taukobong, Bontle Gopolang, Yirsaw Ayalew, Edward Zimudzi, and Ethel Tshukudu
An Incentivization Strategy toward E2E Network Slice as a Service, Yosha Mundhra, Riti Gour, and Genya Ishigaki
An Incentivization Strategy toward E2E Network Slice as a Service, Yosha Mundhra, Riti Gour, and Genya Ishigaki
A Comparative Study of Retrieval-Augmented Generation (RAG) Chatbots, Kalindi Vijesh Parekh, Navrati Saxena, and Mohammad Adil Ansari
Detecting Fake Reviews Using Aspect-Based Sentiment Analysis and Graph Convolutional Networks, Prathana Phukon, Petros Potikas, and Katerina Potika
Multi-Agent Lane Optimization in Cluttered Environments, Maryam Khazaei Pool, Matthew Morozov, and Marcelo Kallmann
Special issue on big data computing service and machine learning applications, Katerina Potika, Magdalini Eirinaki, Monica Vitali, Anna Bernasconi, and Hiroyuki Fujioka
An Efficient Multi-Class Traffic Delivery Scheme in 5G Vehicle-to-Everything Communications, Eshita Rastogi, Jaehoon Jeong, Abhishek Roy, and Navrati Saxena
High Abundances of Crustose Coralline Algae Inside Cryptic Coral Habitats Linked to Coral Reef Functioning, Anna Rothstein, Orion S. McCarthy, Sophie Luu, Emily L.A. Kelly, Philip Heller, Stuart Sandin, Jennifer E. Smith, and Maya S. deVries
Discriminative Regions and Adversarial Sensitivity in CNN-Based Malware Image Classification, Anish Roy and Fabio Di Troia
Link-level Blocking Prediction for Dynamic Network Slicing using Graph Neural Networks, Manmohanbabu Rupanagudi and Genya Ishigaki
Affordable NTN to Bridge the Digital Divide: A Case Study on Women Micro-Entrepreneurs, Navrati Saxena, Abhishek Roy, Sree Hari Karri, and Melody Moh
User Behavior Based Implicit Personality Detection in Recommendation Systems, Uzma Zubair Shaikh and Robert Chun
Tracing the Past, Predicting the Future: A Systematic Review of AI in Archival Science, Gaurav Shinde, Tiana Kirstein, Souvick Ghosh, and Patricia Franks
The Power of Patterns in Detecting News Articles Written by AI, Lilou Sicard-Noel, Eric Wu, and Mike Wu
The Power of Patterns in Detecting News Articles Written by AI, Lilou Sicard-Noel, Eric Wu, and Mike Wu
Synthetic Malware Image Generation Based on Generative Models Against Zero-Day Attacks, Arjun Sudheer, Ayesha Ahmed, Fabio Di Troia, and Younghee Park
Synthetic Malware Image Generation Based on Generative Models Against Zero-Day Attacks, Arjun Sudheer, Ayesha Ahmed, Fabio Di Troia, and Younghee Park
AI-Generated Text Detection and Source Identification, Anjana Priyatham Tatavarthi, Faranak Abri, and Nada Attar
Growing a National Computing Movement in an African Country: A Multi-Stakeholder Model, Ethel Tshukudu, Alan Peterfreund, Shanah Suping, Sue Sentance, and Quintin Cutts
Contextualizing Introductory Computer Science: Insights from African Faculty, Ethel Tshukudu, Ismaila Temitayo Sanusi, Oluwakemi Ola, Sally Hamouda, Linda Marshall, Oluwatoyin Adelakun-Adeyemo, Emma R. Dodoo, G. Ayorkor Korsah, Sandani Luvhengo, and Jack Parkinson
Evolving Capacity for Computing Education in Botswana: A Comparative Look at 2021 and 2025 Teacher Perspectives, Ethel Tshukudu, Shain Vyomakesan, Keoikantse Sehuhula, and Boitshwarelo Palamelo
Improving the Diversity and Fairness in Job Recommendations Using the Stable Matching Algorithm, Jatin Unecha, Melody Moh, and Teng Sheng Moh
Survival Analysis for Cancers of the Brain, CNS and Bone using Retrieval Augmented Generation on the SEER Database, Jyothi Vaidyanathan, Shourya Gupta, Justin Lee, Srikanth Prabhu, and Saptarshi Sengupta
Exploring the Use and Misuse of Large Language Models, Hezekiah Paul D. Valdez, Faranak Abri, Jade Webb, and Thomas H. Austin
Breaking the Cycle: Countering Popularity Bias for Diverse Content Discovery, Brandon Weaver, Melody Moh, and Teng Sheng Moh
Synthetic Social Engineering Scenario Generation Using LLMs for Awareness-Based Attack Resilience, Jade Webb, Faranak Abri, and Sayma Akther
Synthetic Social Engineering Scenario Generation Using LLMs for Awareness-Based Attack Resilience, Jade Webb, Faranak Abri, and Sayma Akther
Multi-Modal Adversarial Activity Detection Using Keyboard and Mouse Dynamics, Johny Xiong and Amith Kamath Belman
MultiMap Implementation in OpenJDK, Nishant Yadav and Robert Chun
Submissions from 2024
MorteSense DIY Home Security, Shohin Abdulkhamidov, Diego Cruz, Diego Garcia-Carrasco, Spartak Gevorgyan, and Faramarz Mortezaie
Malware Classification Using Dynamically Extracted API Call Embeddings, Sahil Aggarwal and Fabio Di Troia
Gesture Recognition Dynamics: Unveiling Video Patterns with Deep Learning, Nithish Reddy Agumamidi and Sayma Akther
Eyes on Higher Education: Evaluating Web Usability in Kuwaiti Private Universities Using Eye-Tracking and Supr-Q Metrics, Reem Albaghli, Ayah Beidas, and Nada Attar
Detecting Bias in Refugee Perception using Face Swapping: An Empirical Eye-Tracking Study, Reem Albaghli, Akshay Gurnaney, and Nada Attar
Oxygenation influences xylose fermentation and gene expression in the yeast genera Spathaspora and Scheffersomyces, Katharina O. Barros, Megan Mader, David J. Krause, Jasmyn Pangilinan, Bill Andreopoulos, Anna Lipzen, Stephen J. Mondo, Igor V. Grigoriev, Carlos A. Rosa, Trey K. Sato, and Chris Todd Hittinger
Evolutionary genomic analyses of canine E. coli infections identify a relic capsular locus associated with resistance to multiple classes of antimicrobials, Kristina Ceres, Jordan D. Zehr, Chloe Murrell, Jean K. Millet, Qi Sun, Holly C. McQueary, Alanna Horton, Casey Cazer, Kelly Sams, Guillaume Reboul, William B. Andreopoulos, Patrick K. Mitchell, Renee Anderson, Rebecca Franklin-Guild, Brittany D. Cronk, Bryce J. Stanhope, Claire R. Burbick, Rebecca Wolking, and Laura Peak
Scaling Container Caching to Larger Networks with Multi-Agent Reinforcement Learning, Austin Chen and Genya Ishigaki
Synthetic Malware Using Deep Variational Autoencoders and Generative Adversarial Networks, Aaron Choi, Albert Giang, Sajit Jumani, David Luong, and Fabio Di Troia
Health Communication in an Era of Disinformation: Perceived Source Credibility Among Transgender and Gender Diverse Individuals, E. Ciszek, Gerold Dermid, Mansi Shah, Richard Mocarski, Debra Hope, and Nathan Woodruff
Bisphenol F affects neurodevelopmental gene expression, mushroom body development, and behavior in Drosophila melanogaster, Judith L.A. Fishburn, Heather L. Larson, An Nguyen, Chloe J. Welch, Taylor Moore, Aliyah Penn, Johnathan Newman, Anthony Mangino, Erin Widman, Rana Ghobashy, Jocelyn Witherspoon, Wendy Lee, and Kimberly A. Mulligan
Message from the Technical Program Chairs: IEEE BDS 2024, Hiroyuki Fujioka, Katerina Potika, and Junchi Yan
Fast Software-Based Real Time Panoramic Image Processing, Matthew Gerlits, Melody Moh, and Teng Sheng Moh
The Applicability of LLMs in Generating Textual Samples for Analysis of Imbalanced Datasets, Saroj Gopali, Faranak Abri, Akbar Siami Namin, and Keith S. Jones
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs, Saroj Gopali, Akbar S. Namin, Faranak Abri, and Keith S. Jones
A Comparative Multivariate Analysis of VAR and Deep Learning-based Models for Forecasting Volatile Time Series Data, Saroj Gopali, Sima Siami-Namini, Faranak Abri, and Akbar Siami Namin
Classification and online clustering of zero-day malware, Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, and Róbert Lórencz
Creating valid adversarial examples of malware, Matouš Kozák, Martin Jureček, Mark Stamp, and Fabio Di Troia
Adversarial Attacks and Defenses in Multivariate Time-Series Forecasting for Smart and Connected Infrastructures, Pooja Krishan, Rohan Mohapatra, Sanchari Das, and Saptarshi Sengupta
Learning to Play the Trading Game: Exploring Reinforcement Learning-Based Stock Trading Bots, Neeraj Kulkarni, Petros Potikas, and Katerina Potika
Advanced DDoS Attack Classification using Ensemble Model with Meta-Learner, Ankith Indra Kumar and Genya Ishigaki
The Physiology of Sponge Behavior, Sally P. Leys, Emma J.K. Esposito, and Amanda S. Kahn
A comparison of adversarial malware generators, Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp, and Fabio Di Troia
A comparison of graph neural networks for malware classification, Vrinda Malhotra, Katerina Potika, and Mark Stamp
Enhancing Botnet Detection in Network Security Using Profile Hidden Markov Models, Rucha Mannikar and Fabio Di Troia
A natural language processing approach to Malware classification, Ritik Mehta, Olha Jurečková, and Mark Stamp
Neural Network-based Blocking Prediction for Dynamic Network Slicing, Nitin Datta Movva and Genya Ishigaki
Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data, Tien Nguyen, Faranak Abri, Akbar Siami Namin, and Keith S. Jones
Resume Content Generation Using Llama 2 with Adapters, Navaneeth Sai Nidadavolu and William B. Andreopoulos
Kismet/CHD7/CHD8 affects gut microbiota, mechanics, and the gut-brain axis in Drosophila melanogaster, Angelo Niosi, Nguyên Henry Võ, Punithavathi Sundaramurthy, Chloe Welch, Aliyah Penn, Yelena Yuldasheva, Adam Alfareh, Kaitlyn Rausch, Takhmina Amin-Rahbar, Jeffery Cavanaugh, Prince Yadav, Stephanie Peterson, Raina Brown, Alain Hu, Any Ardon-Castro, Darren Nguyen, Robert Crawford, Wendy Lee, and Eliza J. Morris
The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models, Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, and Akbar Siami Namin
Community Detection Using Deep Learning: Combining Variational Graph Autoencoders with Leiden and K-Truss Techniques, Jyotika Hariom Patil, Petros Potikas, William B. Andreopoulos, and Katerina Potika