Author:Haney Zaki

Publications
EasyChair Preprint no. 12814
EasyChair Preprint no. 12813
EasyChair Preprint no. 12812
EasyChair Preprint no. 12483
EasyChair Preprint no. 12482
EasyChair Preprint no. 12265
EasyChair Preprint no. 12264
EasyChair Preprint no. 12196
EasyChair Preprint no. 12195
EasyChair Preprint no. 12191
EasyChair Preprint no. 12175
EasyChair Preprint no. 12174
EasyChair Preprint no. 12173
EasyChair Preprint no. 12172
EasyChair Preprint no. 12127
EasyChair Preprint no. 12126
EasyChair Preprint no. 12125
EasyChair Preprint no. 12124
EasyChair Preprint no. 12042
EasyChair Preprint no. 12041
EasyChair Preprint no. 12019
EasyChair Preprint no. 12018
EasyChair Preprint no. 12017
EasyChair Preprint no. 12016
EasyChair Preprint no. 12015
EasyChair Preprint no. 12014
EasyChair Preprint no. 12013
EasyChair Preprint no. 12001
EasyChair Preprint no. 11974
EasyChair Preprint no. 11973
EasyChair Preprint no. 11972
EasyChair Preprint no. 11971
EasyChair Preprint no. 11970

Keyphrases

Adaptability, Advanced Algorithms, Advanced Analytics, advancements, Algorithms2, anomaly detection, Anonymization, Applications2, architectures, Artificial Intelligence7, Automation, autonomous vehicles, Behavioral adaptations, best practices, bias detection, Big Data, Big Data Analytics2, Biomedical Engineering3, Blockchain2, breakthroughs, bug detection2, Bug Training, Business Landscape, Business Strategy, Challenges6, Chatbot Systems, Clinical Impact, clinical significance, collaboration2, commercial address excellence, communication styles2, Competitive edge, complex patterns, consumer behavior, Contemporary, conversational agents, Convolutional Neural Networks, countermeasures2, Cross-cultural perspectives, cross-cultural psychology, cultural diversity, cultural factors, cultural influence, cultural values, customer satisfaction, cyber, cyber defense, CyberGenesis, Cybersecurity5, data analysis2, Data Analytics, data preprocessing, data privacy, data protection3, Data Science2, Data Security, Data-driven approaches, data-driven decision making, decision making, deep learning3, Diagnostics Treatment, differential privacy, District Management, double extortion, Dynamic Characters, e-commerce, education administration, effect size, emotional, Emotional Competence, Emotional Intelligence, emotional regulation, empathy, empirical analysis, Encryption, Engineering, Enigma, Entertainment, environments, ethics2, evidence-based medicine, evolution2, Excellence, feature, feature selection, Federated Learning, Finance3, Fragility index, Future directions, gaming, Generalizability, Genetic Algorithm2, Genetic Algorithms, global markets, Graph Neural Networks, Healthcare6, Healthcare delivery, Healthcare Integration, Healthcare processes, Healthcare Transformation, homomorphic encryption, Immersion, impact2, implementation, incentive structures, industrial sales, information sharing, Innovation6, insights, Integration, Integrity, intelligence2, Interactive Entertainment, Internet of Things (IoT)2, interpretability, interpretation, Intrusion Detection, IoT devices, Latin America, leaders, Leadership, machine learning9, Machine Learning Algorithms, Malware, medical devices3, medical studies, Meta-Analysis Integration, Methodological rigor, mitigation strategies, mobile malware, Model Aggregation, model selection, Modern Era, motivational factors, multidisciplinary approach, Natural Language Processing, Network Security2, neural networks, NPCs, operational efficiency, Optimization5, organizational success, parallel processing, patient care2, Patient Outcomes3, Peak performance, Performance enhancement2, personal selling tactics, practical implementations, predictive modeling, Preprocessing, privacy preserving, Proactive Strategies, Productivity, quality assurance, Ransomware2, Ransomware-as-a-Service (RaaS), real-world applications, realism, Reinforcement Learning3, Relationships, Relative Risk Index, Reliability, reproducibility, research, research findings, Resilience, Retail, revenue growth, risk management, Risk Mitigation, Robustness index, Sales2, Sales effectiveness, Sales Leadership, sales management2, sales performance, Sales Strategies2, Salespeople's Behavior, Scalability, school culture, school improvement, school management, secure multi-party computation, Security, security measures, security protocols, self-efficacy, semi-supervised learning, sensitive data, Social Engineering, Societal Impacts, society, Software Bug Detection, software development, software optimization, stakeholder engagement, statistical significance2, Strategic Approaches, strategic decision making, Strategic Insights, strategic planning, Strategic practices, stress, Structural Equation Modeling, student achievement, supervised learning, supply chain, Teacher Satisfaction, Technological evaluation2, Technology2, technology integration3, threat, Threat Intelligence, Threat Mitigation, Threats, Time convolution neural networks, Time Convolutional Neural Network2, Transfer Learning, transformation, Transformer Models, Transportation, treatment, Treatment Paradigms, Treatments, trends3, unsupervised learning, vulnerability management, Wellness Engineering, zero-day vulnerabilities.