Submissions from 2020
Fane-KG: A semantic knowledge graph for context-based fake news detection on social media, Anoud Bani Hani, Oluwasegun Adedugbe, Feras Al-Obeidat, Elhadj Benkhelifa, and Munir Majdalawieh
A Semantic Model for Context-Based Fake News Detection on Social Media, Anoud Bani-Hani, Oluwasegun Adedugbe, Elhadj Benkhelifa, Munir Majdalawieh, and Feras Al-Obeidat
A Framework for Predicting Haptic Feedback in Needle Insertion in 5G Remote Robotic Surgery, Francis Boabang, Roch Glitho, Halima Elbiaze, Fatna Belqami, and Omar Alfandi
Accident Recognition via 3D CNNs for Automated Traffic Monitoring in Smart Cities, Mikhail Bortnikov, Adil Khan, Asad Masood Khattak, and Muhammad Ahmad
UAV-Assisted Vehicular Communication for Densely Crowded Environments, Ouns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi, Omar Alfandi, and Haythem Bany Salameh
ECCV (14) - SipMask: Spatial Information Preservation for Fast Image and Video Instance Segmentation, Jiale Cao, Rao Muhammad Anwer, Hisham Cholakkal, Fahad Shahbaz Khan, Yanwei Pang, and Ling Shao
Learning Attentive and Hierarchical Representations for 3D Shape Recognition, Jiaxin Chen, Jie Qin, Yuming Shen, Li Liu, Fan Zhu, and Ling Shao
The impact of grouping efficiency measures in cellular manufacturing systems, Nadia Dahmani and Adnan Mukattash
Towards an Automatic Identification of Microservices from Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki
Suitability of Blockchain for Collaborative Intrusion Detection Systems, Nahom Aron Dawit, Sujith Samuel Mathew, and Kadhim Hayawi
CLNet: A Compact Latent Network for Fast Adjusting Siamese Trackers, Xingping Dong, Jianbing Shen, Ling Shao, and Fatih Porikli
Building Trusted Startup Teams from LinkedIn Attributes: A Higher Order Probabilistic Analysis, Georgios Drakopoulos, Eleana Kafeza, Phivos Mylonas, and Haseena Al Katheeri
One Dimensional Cross-Correlation Methods for Deterministic and Stochastic Graph Signals with A Twitter Application in Julia, Georgios Drakopoulos and Eleanna Kafeza
Learning to Learn with Variational Information Bottleneck for Domain Generalization, Yingjun Du, Jun Xu, Huan Xiong, Qiang Qiu, Xiantong Zhen, Cees G.M. Snoek, and Ling Shao
MetaNorm: Learning to Normalize Few-Shot Batches Across Domains, Yingjun Du, Xiantong Zhen, Ling Shao, and Cees G. M. Snoek
Evaluating Citizens' Sentiments in Smart Cities: A Deep Learning Approach, Abdallah Elabora, Manar Alkhatib, Sujith Samuel Mathew, and May El Barachi
PraNet: Parallel Reverse Attention Network for Polyp Segmentation, Deng Ping Fan, Ge Peng Ji, Tao Zhou, Geng Chen, Huazhu Fu, Jianbing Shen, and Ling Shao
Exploiting Deep Neural Networks for Intention Mining, Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, and Muhammad Zubair Asghar
Layer-Wise Conditioning Analysis in Exploring the Learning Dynamics of DNNs, Lei Huang, Jie Qin, Li Liu, Fan Zhu, and Ling Shao
VAE-GAN based zero-shot outlier detection, Bekkouch Imad Ibrahim, Dragos Constantin Nicolae, Adil Khan, Syed Imran Ali, and Asad Khattak
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models, Salman Jan, Shahrulniza Musa, Toqeer Ali, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, and Babar Shah
A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach, Sanaa Kaddoura, Omar Alfandi, and Nadia Dahmani
Promoting Teaching Practices in IT Higher Education, Sanaa Kaddoura and Rima Grati
Legal smart contracts in ethereum block chain: Linking the dots, Eleanna Kafeza, Syed Juned Ali, Irene Kafeza, and Haseena Alkatheeri
A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders, Faouzi Kamoun, May El Barachi, Abderrazak Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri
AI and machine learning: A mixed blessing for cybersecurity, Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, and Thar Baker
Analysis of the Importance of Systolic Blood Pressure Versus Diastolic Blood Pressure in Diagnosing Hypertension: MRA Study., Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Adel Elmaghraby, and Ayman El-Baz
Dynamic framework to mining Internet of Things for multimedia services, Yaser Khamayseh, Wail Mardini, J. William Atwood, and Monther Aldwairi
Towards a Novel Intrusion Detection Architecture using Artificial Intelligence, Salam Khanji and Asad Khattak
Interpretable and Generalizable Person Re-identification with Query-Adaptive Convolution and Temporal Lifting, Shengcai Liao and Ling Shao
Interpretable Neural Network Decoupling, Yuchao Li, Rongrong Ji, Shaohui Lin, Baochang Zhang, Chenqian Yan, Yongjian Wu, Feiyue Huang, and Ling Shao
Internet of Things, Zakaria Maamar
Thingsourcing to Enable IoT Collaboration, Zakaria Maamar, Khouloud Boukadi, Bamory Koné, Muhammad Asim, Djamal Benslimane, and Said Elnaffar
Process-of-Things: Weaving film industry’s practices into the Internet-of-Things, Zakaria Maamar, Noura Faci, Ejub Kajan, Safet Purković, and Emir Ugljanin
Structure Preserving Stain Normalization of Histopathology Images Using Self Supervised Semantic Guidance, Dwarikanath Mahapatra, Behzad Bozorgtabar, Jean Philippe Thiran, and Ling Shao
Pink Ocean Strategy: Democratizing Business Knowledge for Social Growth and Innovation, Evangelos Markopoulos, Maria Barbara Ramonda, Lisa Marie Carolin Winter, Haseena Al Katheeri, and Hannu Vanharanta
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data, Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, and Muhsin Cheratta
On the need for cultural sensitivity in digital wellbeing tools and messages: A UK-China comparison, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Predictors of Acceptance and Rejection of Online Peer Support Groups as a Digital Wellbeing Tool, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
WorldCIST (2) - On the Need for Cultural Sensitivity in Digital Wellbeing Tools and Messages: A UK-China Comparison., John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Digital Forensic Acquisition and Analysis of Discord Applications, Michal Motylinski, Aine MacDermott, Farkhund Iqbal, Mohammed Hussain, and Saiqa Aleem
ECCV (22) - Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G. M. Snoek, and Ling Shao
Evaluating IT Governance Structure Implementation in the Gulf Cooperation Council Region, Mathew Nicho and Suadad Muamaar
A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks, Safa Otoum, Burak Kantarci, and Hussein T. Mouftah
Blockchain-Supported Federated Learning for Trustworthy Vehicular Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein T. Mouftah
Contextual healing: Privacy through interpretation management, Fatma Outay and Rula Sayaf
PhishOut: PhishOut: Effective Phishing Detection Using Selected Features, Suhail Paliath, Mohammad Abu Qbeitah, and Monther Aldwairi
On the use of elitism to improve convergence of the chemical reaction optimization algorithm in discrete optimization problems, Sinan Salman
Network design using chemical reaction optimization and markov-chain traffic assignment, Sinan Salman and Suzan Alaswad
Vehicles' emissions consideration in transportation network design using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad
A Comprehensive Framework for Accurate Classification of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
Access Permissions for Apple Watch Applications: A Study on Users' Perceptions, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, and Ali Arsalan
Invertible Zero-Shot Recognition Flows, Yuming Shen, Jie Qin, Lei Huang, Li Liu, Fan Zhu, and Ling Shao
A predictive model of users’ behavior and values of smart energy meters using PLS-SEM, Ahmed Shuhaiber
Trust in smart energy meters: The role of perceived values, Ahmed Shuhaiber
Precise Cerebrovascular Segmentation, F. Taher, A. Soliman, H. Kandil, A. Mahmoud, A. Shalaby, G. Gimel'farb, and A. El-Baz
Improving the impact of power efficiency in mobile cloud applications using cloudlet model, Lo'ai Tawalbeh, Mohammad A. Tawalbeh, and Monther Aldwairi
Building a security framework for smart cities: A case study from UAE, Abdallah Tubaishat and Mariam Al Jouhi
Optimizing the Efficiency of Machine Learning Techniques, Anwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, and Asad Masood Khattak
Automatic C-Plane Detection in Pelvic Floor Transperineal Volumetric Ultrasound, Helena Williams, Laura Cattani, Mohammad Yaqub, Carole Sudre, Tom Vercauteren, Jan Deprest, and Jan D’hooge
Region Graph Embedding Network for Zero-Shot Learning, Guo Sen Xie, Li Liu, Fan Zhu, Fang Zhao, Zheng Zhang, Yazhou Yao, Jie Qin, and Ling Shao
Count- and Similarity-Aware R-CNN for Pedestrian Detection, Jin Xie, Hisham Cholakkal, Rao Muhammad Anwer, Fahad Shahbaz Khan, Yanwei Pang, Ling Shao, and Mubarak Shah
ICML - On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao
ECCV (17) - Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-Identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Drone Forensics: A Detailed Analysis of Emerging DJI Models, Maryam Yousef, Farkhund Iqbal, and Mohammed Hussain
Learning Enriched Features for Real Image Restoration and Enhancement, Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming Hsuan Yang, and Ling Shao
Unsupervised Domain Adaptation with Noise Resistible Mutual-Training for Person Re-identification, Fang Zhao, Shengcai Liao, Guo Sen Xie, Jian Zhao, Kaihao Zhang, and Ling Shao
M2Net : Multi-modal Multi-channel Network for Overall Survival Time Prediction of Brain Tumor Patients, Tao Zhou, Huazhu Fu, Yu Zhang, Changqing Zhang, Xiankai Lu, Jianbing Shen, and Ling Shao
Submissions from 2019
Delay and energy based message delivery in delay tolerant networks, Ali Abbas, Babar Shah, Muhammad Habib, Francis Chow, Raza Hasan, and Ki Il Kim
A Novel Deep Learning Approach for Left Ventricle Automatic Segmentation in Cardiac Cine MR, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Automatic segmentation and functional assessment of the left ventricle using u-net fully convolutional network, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Data Mining in Health Care Sector: Literature Notes, Ahed Abugabah, Ahmad Al Smadi, and Alaa Abuqabbeh
Towards an end-user layer for data integrity, Lu'ay Abu-Rayyan, Hakim Hacid, and Andrew Leoncé
The effect of demand variability on supply chain performance, Suzan Alaswad, Sinan Salman, Arwa Alhashmi, Hawra Almarzooqi, and Meera Alhammadi
Blockchain in Supply Chain Trading, Nedaa Baker Al Barghuthi, Hussam Juma Mohamed, and Huwida E. Said
State of Art of the Effectiveness in Adopting Blockchain Technology-UAE Survey Study, Nedaa Baker Al Barghuthi, Cornelius Ncube, and Huwida Said
Readiness, Safety, and Privacy on Adopting Autonomous Vehicle Technology: UAE Case Study, Nedaa Baker Al Barghuthi and Huwida Said
Online peer support groups to combat digital addiction: User acceptance and rejection factors, Manal Aldhayan, Sainabou Cham, Theodoros Kostoulas, Mohamed Basel Almourad, and Raian Ali
n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems, Monther Aldwairi and Duaa Alansari
Guidelines for key organizational factors for saas organizations, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Khattak
Design guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Masood Khattak
Assessment and hardening of IOT development boards, Omar Alfandi, Musaab Hasan, and Zayed Balbahaith
A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb
Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm, Hafiz Munsub Ali, Waleed Ejaz, May Al Taei, and Farkhund Iqbal
Fog computing framework for internet of things applications, Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, and Omar Alfandi
Enabling high performance fog computing through fog-2-fog coordination model, Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, and Aseel Hussien
Comparing the behaviour of human face capturing attention of autistic & normal developing children using eye tracking data analysis approach, Mohamed Basel Almourad and Emad Bataineh
A Sentiment Analysis Approach of Data Volatility for Consumer Satisfaction in the Fashion Industry, Feras Al-Obeidat, Anoud Bani Hani, Elhadj Benkhelifa, Oluwasegun Adedugbe, and Munir Majdalawieh
Analyzing D-wave quantum macro assembler security, Hesham H. Alsaadi, Monther Aldwairi, and Eva Marie Muller-Stuler
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges, May Altaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, and Huwida Said
A Deep Learning Approach for Amazon EC2 Spot Price Prediction, Hana Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad Alsmirat, and Monther Aldwair
Features weight estimation using a genetic algorithm for customer churn prediction in the telecom sector, Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, and Fernando Moreira
A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing, Mohamad Arafeh, May El Barachi, Azzam Mourad, and Fatna Belqasmi
A comparison between google cloud service and icloud, Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, and Mohammed Ghazal
Online authentication methods used in banks and attacks against these methods, Anoud Bani-Hani, Munir Majdalweieh, and Aisha AlShamsi
Towards a new generation of web browsers: An eyettracking study, Emad Bataineh and Bilal Bataineh
Domain Adaptation for Car Accident Detection in Videos, Elizaveta Batanina, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Adil Khan, Asad Masood Khattak, and Mikhail Bortnikov
Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector, Nacer Eddine Benzebouchi, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, and Monther Aldwairi
Incentive Based Relaying in D2D Social Networks, Jagadeesha R. Bhat, C. V. Anoop, and Omar Alfandi