Author:Kaledio Potter

Publications
EasyChair Preprint no. 13788
EasyChair Preprint no. 13787
EasyChair Preprint no. 13780
EasyChair Preprint no. 13773
EasyChair Preprint no. 13766
EasyChair Preprint no. 13762
EasyChair Preprint no. 13761
EasyChair Preprint no. 13760
EasyChair Preprint no. 13734
EasyChair Preprint no. 13674
EasyChair Preprint no. 13666
EasyChair Preprint no. 13665
EasyChair Preprint no. 13664
EasyChair Preprint no. 13663
EasyChair Preprint no. 13662
EasyChair Preprint no. 13657
EasyChair Preprint no. 13065
EasyChair Preprint no. 13064
EasyChair Preprint no. 13063
EasyChair Preprint no. 13062
EasyChair Preprint no. 13059
EasyChair Preprint no. 13058
EasyChair Preprint no. 13053
EasyChair Preprint no. 13051
EasyChair Preprint no. 13034
EasyChair Preprint no. 12914
EasyChair Preprint no. 12913
EasyChair Preprint no. 12912
EasyChair Preprint no. 12848
EasyChair Preprint no. 12847
EasyChair Preprint no. 12832
EasyChair Preprint no. 12831
EasyChair Preprint no. 12829
EasyChair Preprint no. 12758
EasyChair Preprint no. 12757
EasyChair Preprint no. 12574
EasyChair Preprint no. 12572
EasyChair Preprint no. 12571
EasyChair Preprint no. 12570
EasyChair Preprint no. 12569
EasyChair Preprint no. 12568
EasyChair Preprint no. 12567
EasyChair Preprint no. 12551
EasyChair Preprint no. 12550
EasyChair Preprint no. 12522
EasyChair Preprint no. 12521
EasyChair Preprint no. 12520
EasyChair Preprint no. 12519
EasyChair Preprint no. 12518
EasyChair Preprint no. 12517
EasyChair Preprint no. 12516
EasyChair Preprint no. 12406
EasyChair Preprint no. 12405
EasyChair Preprint no. 12404
EasyChair Preprint no. 12399
EasyChair Preprint no. 12389
EasyChair Preprint no. 12387
EasyChair Preprint no. 12386
EasyChair Preprint no. 12385

Keyphrases

Accountability, Accuracy, Accuracy Enhancement, Adaptability, Advancement, adversarial perturbations, Adversarial Text Generation, AI, anomaly detection2, Apache Airflow, Artificial6, Artificial Intelligence, attack scenarios, Automatic Feature Selection, Automation, behavioral economics, Behaviour, Biodefense, building, Business7, business resilience, Cache-based information dissemination, Caching, Caching strategies, Campaign, case studies, chain, Challenges, cities, Cloud Platforms, cloud-based, Colour, community detection, computer3, computing5, consumer2, contextual information, cost-benefit analysis, counting, cultivating, Custom operators, Customer, Cyber Threats, Cybersecurity3, cybersecurity strategy, Data Extraction Pipeline, data integration, data popularity, data preprocessing, data privacy, Data Quality Monitoring, deep, detector, developing economies, Diagnose, digital6, distributed data processing, Domain Adaptation, Domain-specific Language Models, Dynamic Feature Engineering, e-learning, economic growth, economic impact, Economics5, economy, efficiency, elastic computing, embeddings, Embrace, empirical evidence, Employees, Energy2, Engineering, Enterprise, Entrepreneurship2, environment, error handling, evaluation, evaluation metrics, Evasion Strategies, fault tolerance, Feature Hashing, Finance2, financial losses, financial transactions, fine-tuning, fraud detection2, fusion techniques, Future research opportunities, Geometries, Governance, Government, government processes, Graph Databases, Graph Neural Networks (GNNs), graph topology, Green, growth, Health, Healthcare3, Improving, incentive mechanisms, Influencer, Insurance, intelligence4, Involvement, IT security investments, learning, machine, Machine Learning Algorithms, management3, market, Marketing4, metropolitan areas, Metropolitan Cities, Microfluids, Mitigation, mobility patterns, model selection, monitoring, Motivating, Multi-modal fusion, Natural Language Processing (NLP)2, network traffic data, NLP-based Anomaly Detection Systems, NoSQL databases, NoSQL systems, operational, operational efficiency, organs, pathogen, Patient, Performance, policy recommendations2, Portability, pre-trained models, proteins, Prototyping, public services, rapid, real-time detection, reality, relationship, Renewable, Risk, Robotics3, robustness2, Scalability2, science5, Serverless execution, Smart2, smart tech, social, social networks, society, software, Stakeholder, strategies, supply, Sustainability, Sustainable, sustainable development, Synergies, Synergistic benefits, Synthetic Cyber Threats, system logs, tech, Technologies, Technology10, Threat Detection, traffic efficiency, Transfer Learning, transition, transparency, V2V Broadcast Participation, V2V broadcasting, Vascularization, Vehicular Networks, virtual, vision3, workflow orchestration.