Author:Kaledio Potter

Publications
EasyChair Preprint no. 13065
EasyChair Preprint no. 13064
EasyChair Preprint no. 13063
EasyChair Preprint no. 13062
EasyChair Preprint no. 13059
EasyChair Preprint no. 13058
EasyChair Preprint no. 13053
EasyChair Preprint no. 13051
EasyChair Preprint no. 13034
EasyChair Preprint no. 12914
EasyChair Preprint no. 12913
EasyChair Preprint no. 12912
EasyChair Preprint no. 12848
EasyChair Preprint no. 12847
EasyChair Preprint no. 12832
EasyChair Preprint no. 12831
EasyChair Preprint no. 12829
EasyChair Preprint no. 12758
EasyChair Preprint no. 12757
EasyChair Preprint no. 12574
EasyChair Preprint no. 12572
EasyChair Preprint no. 12571
EasyChair Preprint no. 12570
EasyChair Preprint no. 12569
EasyChair Preprint no. 12568
EasyChair Preprint no. 12567
EasyChair Preprint no. 12551
EasyChair Preprint no. 12550
EasyChair Preprint no. 12522
EasyChair Preprint no. 12521
EasyChair Preprint no. 12520
EasyChair Preprint no. 12519
EasyChair Preprint no. 12518
EasyChair Preprint no. 12517
EasyChair Preprint no. 12516
EasyChair Preprint no. 12406
EasyChair Preprint no. 12405
EasyChair Preprint no. 12404
EasyChair Preprint no. 12399
EasyChair Preprint no. 12389
EasyChair Preprint no. 12387
EasyChair Preprint no. 12386
EasyChair Preprint no. 12385

Keyphrases

Accuracy, Accuracy Enhancement, Adaptability, Advancement, adversarial perturbations, Adversarial Text Generation, AI, anomaly detection2, Apache Airflow, Artificial5, attack scenarios, Automatic Feature Selection, Automation, behavioral economics, Biodefense, building, Business4, Cache-based information dissemination, Caching, Caching strategies, case studies, chain, Challenges, Cloud Platforms, Colour, community detection, computer3, computing3, contextual information, counting, Custom operators, Customer, Cyber Threats, Cybersecurity2, Data Extraction Pipeline, data integration, data popularity, data preprocessing, Data Quality Monitoring, deep, detector, Diagnose, digital3, distributed data processing, Domain Adaptation, Domain-specific Language Models, Dynamic Feature Engineering, Economics3, economy, efficiency, elastic computing, embeddings, Embrace, empirical evidence, Employees, Energy2, Engineering, Enterprise, Entrepreneurship2, environment, error handling, evaluation, evaluation metrics, Evasion Strategies, fault tolerance, Feature Hashing, financial transactions, fine-tuning, fraud detection2, fusion techniques, Future research opportunities, Geometries, Government, Graph Databases, Graph Neural Networks (GNNs), graph topology, Green, growth, Health, Healthcare3, Improving, incentive mechanisms, Insurance, intelligence3, learning, machine, Machine Learning Algorithms, management2, metropolitan areas, Metropolitan Cities, Microfluids, Mitigation, mobility patterns, model selection, monitoring, Motivating, Multi-modal fusion, Natural Language Processing (NLP)2, network traffic data, NLP-based Anomaly Detection Systems, NoSQL databases, NoSQL systems, operational, organs, pathogen, Patient, Performance, Portability, pre-trained models, proteins, Prototyping, rapid, real-time detection, reality, relationship, Renewable, Risk, Robotics3, robustness2, Scalability2, science4, Serverless execution, social networks, society, software, strategies, supply, Sustainability, Synergies, Synergistic benefits, Synthetic Cyber Threats, system logs, tech, Technology7, Threat Detection, traffic efficiency, Transfer Learning, transition, V2V Broadcast Participation, V2V broadcasting, Vascularization, Vehicular Networks, virtual, vision3, workflow orchestration.