Submissions from 2022
IoT Enhancements for an In-house Calm Computing Environment, Athanasios Tsoukalas, Steven Annor, Eleanna Kafeza, and Anthony Tzes
STKE: Temporal Knowledge Graph Embedding in the Spherical Coordinate System, Shibo Wang, Ruinan Liu, Linshan Shen, and Asad Masood Khattak
Towards Bilateral Client Selection in Federated Learning Using Matching Game Theory, Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, and Azzam Mourad
Soft systems modelling of design artefacts for blockchain-enabled precision healthcare as a service, Arnob Zahid, Ravishankar Sharma, Stephen C. Wingreen, and Anushia Inthiran
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network, Zhibo Zhang, Ernesto Damiani, Hussam Al Hamadi, Chan Yeob Yeun, and Fatma Taher
Submissions from 2021
Pros and cons of Blockchain-based approaches in Education, Dua’a Abu Hamdi and Omar Alfandi
Drone-Based Cattle Detection Using Deep Neural Networks, R. Y. Aburasain, E. A. Edirisinghe, and Ali Albatay
Visual Pseudo Haptics for a Dynamic Squeeze / Grab Gesture in Immersive Virtual Reality, Naveed Ahmed, Mohammed Lataifeh, and Imran Junejo
Crowd Modeling using Temporal Association Rules, Rizwan Ahmed, Muhammad Shahzad Rafiq, and Imran N. Junejo
WhatsApp Network Forensics: Discovering the IP Addresses of Suspects, Waqas Ahmed, Faisal Shahzad, Abdul Rehman Javed, Farkhund Iqbal, and Liaqat Ali
Multicriteria Decision Making Using TOPSIS Method: An Accurate Selection of Deserving Candidates, Rahman Ali and Asad Masood Khatak
IoT Protocols – MQTT versus CoAP, Alyaziya Almheiri and Zakaria Maamar
Blockchain and FL-based Network Resource Management for Interactive Immersive Services, Moayad Aloqaily, Ouns Bouachir, and Ismaeel Al Ridhawi
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka, Eiman Alothali, Hany Alashwal, Motamen Salih, and Kadhim Hayawi
SpeculoLab: A Protocol and a Tool for Identity Deception Experimentation in Social Networks, Noora Al Roken, Maryam Al Abdooli, Sumaya Khoory, and Hakim Hacid
Towards a personalized recommendation model in location-based social networks, Reem Atassi, Ons Al-Shamaileh, and Hakim Hacid
Privacy-Preserving and Efficient Aggregation for Smart Grid based on Blockchain, Mohamad Badra and Rouba Borghol
Lightweight IDS for UAV Networks: A Periodic Deep Reinforcement Learning-based Approach, Omar Bouhamed, Ouns Bouachir, Moayad Aloqaily, and Ismaeel Al Ridhawi
AI-based Energy Model for Adaptive Duty Cycle Scheduling in Wireless Networks, Nadia Charef, Adel Ben Mnaouer, and Ouns Bouachir
Student Perceptions of an Asychronous Online Discussion Board Used to Assess the Professional Skills, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov
THECOG - Transforms in Behavioral and Affective Computing, Georgios Drakopoulos and Eleanna Kafeza
Approximate High Dimensional Graph Mining With Matrix Polar Factorization: A Twitter Application, Georgios Drakopoulos, Eleanna Kafeza, Phivos Mylonas, and Spyros Sioutas
Process Mining Analytics for Industry 4.0 with Graph Signal Processing, Georgios Drakopoulos, Eleanna Kafeza, Phivos Mylonas, and Spyros Sioutas
A Hybrid Machine Learning Approach for Sentiment Analysis of Partially Occluded Faces, May El Barachi, Manar Alkhatib, and Sujith Samuel Mathew
AI based Login System using Facial Recognition, Siem Girmay, Faniel Samsom, and Asad Masood Khattak
Formal Modeling and Verification of Property-based Resource Consumption Cycles, Rania Ben Halima, Kais Klai, Mohamed Sellami, and Zakaria Maamar
Smart Guest Virtual Assistant with Automatic Guest Registration, Mohammed Hussain, Abdullah Hussein, and Mohamed Basel AlMourad
Discord Server Forensics: Analysis and Extraction of Digital Evidence, Farkhund Iqbal, Michał Motyliński, and Áine MacDermott
Community Search in a Multi-Attributed Graph using Collaborative Similarity Measure and Node Filtering, Naveed Javaid, Kifayat Ullah Khan, Asad Masood Khattak, and Waqas Nawaz
Classification of malicious and benign websites by network features using supervised machine learning algorithms, Sanaa Kaddoura
Evaluation of Supervised Machine Learning Algorithms for Multi-class Intrusion Detection Systems, Sanaa Kaddoura, Amal El Arid, and Mirna Moukhtar
Knowledge Engineering in the Social Era, Ejub Kajan and Zakaria Maamar
Comparative analysis of activation functions in neural networks, Firuz Kamalov, Amril Nazir, Murodbek Safaraliev, Aswani Kumar Cherukuri, and Rita Zgheib
A Novel Deep Reinforcement Learning-based Approach for Task-offloading in Vehicular Networks, S. M. Ahsan Kazmi, Safa Otoum, Rasheed Hussain, and Hussein T. Mouftah
Impact of Model Ensemble On the Fairness of Classifiers in Machine Learning, Patrik Joslin Kenfack, Adil Mehmood Khan, S.M. Ahsan Kazmi, Rasheed Hussain, Alma Oracevic, and Asad Masood Khattak
Forensic Analysis of the Cisco WebEx Application, Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, and Liaqat Ali Khan
Detecting Arabic Fake News Using Machine Learning, Ashwaq Khalil, Moath Jarrah, Monther Aldwairi, and Yaser Jararweh
Efficient In-Network Caching in NDN-based Connected Vehicles, Hasan Ali Khattak, Farkhanda Zafar Raja, Moayad Aloqaily, and Ouns Bouachir
Temporal behavioural analysis of extremists on social media: A machine learning based approach, Saad Lutfi, Rand Yasin, May El Barachi, Farhad Oroumchian, Ajala Imene, and Sujith Samuel Mathew
An IoT Application Business-Model on Top of Cloud and Fog Nodes, Zakaria Maamar, Mohammed Al-Khafajiy, and Murtada Dohan
Orchestration- and choreography-based composition of Internet of Transactional Things, Zakaria Maamar, Muhammad Asim, Saoussen Cheikhrouhou, and Ayesha Qamar
A Data-based Guiding Framework for Digital Transformation, Zakaria Maamar, Saoussen Cheikhrouhou, and Said Elnaffar
Trust-empowered, IoT-driven legitimate data offloading, Zakaria Maamar, Noura Faci, Fadwa Yahya, and Ejub Kajan
Cloud-edge coupling to mitigate execution failures, Zakaria Maamar and Mohammed Al Khafajiy
Blockchain-based Secure CIDS Operation, Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, and Mohammad Mehedy Masud
An Innovative and Decentralized Identity Framework Based on Blockchain Technology, Daniel Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, and Mohamad Badra
The Super-Node Topology in Collaborative Learning, Loubna Mekouar, Muna Bader, and Fatna Belqasmi
Super-Node Topology In Collaborative Learning: Concrete Examples And Benefits, Loubna Mekouar, Fatna Belqasmi, and Muna Bader
Modeling Evasive Malware Authoring Techniques, Mathew Nicho and Maitha Alkhateri
Application of Consumptive Metrics to Measure Internship Alignment, Mathew Nicho, Emad Bataineh, and Tarannum Parkar
IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats, Mathew Nicho and Shini Girija
Federated Reinforcement Learning-Supported IDS for IoT-steered Healthcare Systems, Safa Otoum, Nadra Guizani, and Hussein Mouftah
What do developers reply to? An empirical study of the top Unmanned Aerial Vehicles (UAVs) apps, Fatma Outay, Haroon Malik, and David Dampier
A Predictive Framework for Haptic Enabled VR-based Remote Phobia Treatment in Cloud/Fog Environment, Farinaz Rasouli, Amin Ebrahimzadeh, Somayeh Kianpisheh, Nattakorn Promwongsa, Fatna Belqasmi, and Roch Glitho
Persuasive Technology in Games: A Brief Review and Reappraisal, Umair Rehman, Muhammad Umair Shah, Amir Zaib Abbasi, Farkhund Iqbal, Ali Arsalan, and Muhammad Umair Javaid
Semantic composition of cloud services, Mouna Rekik, Khouloud Boukadi, and Rima Grati
Discovering Influential Twitter Authors Via Clustering And Ranking On Apache Storm, Christina Saravanos, Georgios Drakopoulos, Andreas Kanavos, Eleanna Kafeza, and Christos Makris
IT Teaching Labs: Innovations in a Distance Education Era, Ahmed Seffah, Mohammad Amin Kuhail, and Joao Negreiros
A Novel Framework for Accurate and Non-Invasive Pulmonary Nodule Diagnosis by Integrating Texture and Contour Descriptors, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, and Ayman El-Baz
An Alternate Account on the Ethical Implications of Autonomous Vehicles, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Mohammed Hussain, and Fazli Wahid
Towards A Smarter Energy Metering System For A Smarter City: A Regression-Based Model From Users’ Perspective, Ahmed Shuhaiber, Nabil Adam, and Mohammad Sh.Daoud
Cardiovascular Segmentation Methods Based on Weak or no Prior, Fatma Taher and Neema Prakash
Which Virtualization Technology is Right for My Online IT Educational Labs?, Ahmad Samer Wazan, Mohammad Amin Kuhail, Kadhim Hayawi, and Rémi Venant
Forensic Analysis of Fitbit Versa: Android vs iOS, Joseph Williams, Aine Macdermott, Kellyann Stamp, and Farkhund Iqbal
Abstraction-Based Outlier Detection for Image Data, Kirill Yakovlev, Imad Eddine Ibrahim Bekkouch, Adil Mehmood Khan, and Asad Masood Khattak
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks, Benjamin Yankson, Javed Vali K, Patrick C. K. Hung, Farkhund Iqbal, and Liaqat Ali
Study of radical views on social media: Classification and group dynamics analysis, Rand Yasin, Saad Lutfi, Ajala Imene, Farhad Oroumchian, May El Barachi, and Sujith Samuel Mathew
Ontology Evolution Using Recoverable SQL Logs, Awais Yousaf, Asad Masood Khattak, and Kifayat Ullah Khan
Submissions from 2020
An Interactive Data Assignment Algorithm for Non-Replicated DDBMSs, Hassan I. Abdalla and Abdelmonim M. Artoli
Dynamic Graph Attention-Aware Networks for Session-Based Recommendation, Ahed Abugabah, Xiaochun Cheng, and Jianfeng Wang
A review of challenges and barriers implementing RFID technology in the Healthcare sector, Ahed Abugabah, Nishara Nizamuddin, and Alaa Abuqabbeh
A Cloud Computing Capability Model for Large-Scale Semantic Annotation, Oluwasegun Adedugbe, Elhadj Benkhelifa, and Anoud Bani-Hani
Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users, Hussain Ahmad, Areeba Arif, Asad Masood Khattak, Anam Habib, Muhammad Zubair Asghar, and Babar Shah
Blockchain-based chain of custody: Towards real-time tamper-proof evidence management, Liza Ahmad, Salam Khanji, Farkhund Iqbal, and Faouzi Kamoun
A Hybrid Approach for Counting Templates in Images, Maher Ala'raj and Munir Majdalawieh
Sentiment analysis on predicting presidential election: Twitter used case, Nedaa Baker Al Barghuthi and Huwida E. Said
Blockchain Solution for IoT-based Critical Infrastructures: Byzantine Fault Tolerance, Omar Alfandi, Safa Otoum, and Yaser Jararweh
State of the Art in Digital Forensics for Small Scale Digital Devices, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, and Farkhund Iqbal
Blockchain-assisted Decentralized Virtual Prosumer Grouping for P2P Energy Trading, Faizan Safdar Ali, Moayad Aloqaily, Oznur Ozkasap, and Ouns Bouachir
Using Artificial Intelligence to Monitor the Evolution of Opinion Leaders' Sentiments: Case Study on Global Warming, Manar Alkhatib, May El Barachi, Sujith Samuel Mathew, and Farhad Oroumchian
UniBud: A Virtual Academic Adviser, Abdulrahman Alkhoori, Mohammad Amin Kuhail, and Abdulla Alkhoori
Visual Attention toward Human Face Recognizing for Autism Spectrum Disorder and Normal Developing Children: An Eye Tracking Study, Mohamed Basel Almourad and Emad Bataineh
Cone-KG: A semantic knowledge graph with news content and social context for studying covid-19 news articles on social media, Feras Al-Obeidat, Oluwasegun Adedugbe, Anoud Bani Hani, Elhadj Benkhelifa, and Munir Majdalawieh
The Socio-economic Impacts of Social Media Privacy and Security Challenges, Feras Al-Obeidat, Anoud Bani Hani, Oluwasegun Adedugbe, Munir Majdalawieh, and Elhadj Benkhelifa
On minimizing synchronization cost in NFV-based environments, Zakaria Alomari, Mohamed Faten Zhani, Moayad Aloqaily, and Ouns Bouachir
Characteristics of Similar-Context Trending Hashtags in Twitter: A Case Study, Eiman Alothali, Kadhim Hayawi, and Hany Alashwal
Should We Rush to Implement Password-less Single Factor FIDO2 based Authentication?, Fatima Alqubaisi, Ahmad Samer Wazan, Liza Ahmad, and David W. Chadwick
A WUSN-based Smart System for Water Flow Control, Nahom Aron, Bereket Yemane, Temesgen Mikael, Reem Salem, and Fatna Belqasmi
Energy Efficiency in SDDC: Considering Server and Network Utilities, Beakal Gizachew Assefa, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily, and Ouns Bouachir
A latent model for ad hoc table retrieval, Ebrahim Bagheri and Feras Al-Obeidat
Capturing Public Concerns about Coronavirus Using Arabic Tweets: An NLP-Driven Approach, Mohammed Bahja, Rawad Hammad, and Mohammed Amin Kuhail
A secure fog-based platform for SCADA-based IoT critical infrastructure, Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, and Mohammad Hammoudeh
Fane-KG: A semantic knowledge graph for context-based fake news detection on social media, Anoud Bani Hani, Oluwasegun Adedugbe, Feras Al-Obeidat, Elhadj Benkhelifa, and Munir Majdalawieh
A Semantic Model for Context-Based Fake News Detection on Social Media, Anoud Bani-Hani, Oluwasegun Adedugbe, Elhadj Benkhelifa, Munir Majdalawieh, and Feras Al-Obeidat
A Framework for Predicting Haptic Feedback in Needle Insertion in 5G Remote Robotic Surgery, Francis Boabang, Roch Glitho, Halima Elbiaze, Fatna Belqami, and Omar Alfandi
Accident Recognition via 3D CNNs for Automated Traffic Monitoring in Smart Cities, Mikhail Bortnikov, Adil Khan, Asad Masood Khattak, and Muhammad Ahmad
UAV-Assisted Vehicular Communication for Densely Crowded Environments, Ouns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi, Omar Alfandi, and Haythem Bany Salameh
ECCV (14) - SipMask: Spatial Information Preservation for Fast Image and Video Instance Segmentation, Jiale Cao, Rao Muhammad Anwer, Hisham Cholakkal, Fahad Shahbaz Khan, Yanwei Pang, and Ling Shao
Learning Attentive and Hierarchical Representations for 3D Shape Recognition, Jiaxin Chen, Jie Qin, Yuming Shen, Li Liu, Fan Zhu, and Ling Shao
The impact of grouping efficiency measures in cellular manufacturing systems, Nadia Dahmani and Adnan Mukattash