Presentations in plenary sessions
ID | Title | Authors |
3 | LLM as the core component of C4ISR | Dominique Verdejo and Eunika Mercier Laurent |
19 | Emerging threats based on AI in cyberspace | Gauderic Gumbs, Marie Thérèse Feujio and Patrick Perrot |
40 | Explainability in Fraud Detection: Trustworthy AI and Pattern Detection | Steve Bellart, Hugues Ali Mehenni and Ahmad Chamma |
38 | LLM based data annotation and augmentation for NER and relationship extraction models enhancement | Skander Soltani and Elias Limouni |
39 | Vers un maillage sécuritaire intelligent | Isabelle Cimino and Jérôme Marcenac |
35 | Machine Learning for Cyber Security: Techniques and Business Applications | Kamran Razzaq and Mahmood Shah |
36 | Explainable Contextual Anomaly Detection: a focus on QCAD | Gauderic Gumbs, Maurras Togbe, Yousra Chabchoub and Patrick Perrot |
18 | A responsible crime evolution analysis for homeland security | Daniel Camara and Patrick Perrot |
15 | ODIP : an operational tool to fight against child abuse | Jérémy Billuart, Romain Gémignani and Patrick Perrot |
41 | Human-Centric AI for Enhancing Security in Smart City Anomaly Detection | Sanjay Misra, Kousik Barik, Petter Kvalvik and Sabarathinam Chockalingam |
20 | Swarms of thermal and optical drones for searching for missing persons or fugitives | Thibaut Heckmann and Gautier Filardo |
42 | Drone-Based Victim Detection in Disaster Zones: Leveraging Radiance Fields and Vision Language Models for Enhanced Rescue Efforts | Mohamed Hamdi, Oumayma Mabrouk, Kevin Tiassou, Hichem Snoussi and Simon Thomine |
Posters
ID | Title | Authors |
25 | O2ViRa : Aging tool for forensic investigations | Marie Thérèse Feujio, Aurelle Youego and Patrick Perrot |
7 | Prospective artificial intelligence algorithms, tools, and methodologies for sentiment analysis | Stephen S and Dr.Vadivel R. |
44 | The definition of biometric data in the context of French legislative experimentation and the implementation of EU regulation on artificial intelligence | Amélie Turci |
9 | Harmonizing Food and Livelihood Security Using Unsupervised Learning for Mitigating Herders Farmers Crisis in West Africa | Adamu Hussaini, Ismail Hussain and Murtala Muhammed |
16 | Meta-Analysing Diabetes Mellitus Discovery using Artificial Intelligence Techniques | Saravanan K and Mohan V |
12 | Paddy Disease classification and Fertilizer Recommendation using Deep Learning | Sangeetha Priya Panjalingam and Dr.Geetha G |
30 | Enhancing RDBMS Security through Metaheuristics, Reinforcement Learning, and Triple Loop Learning | William Kandolo |
28 | Design & development of Health Monitoring System with IoT Cryptography scheme for Wind Turbine. | Manimegalai S and Chamundeswari A. |
43 | Prevention of DDoS using AI | Gowri Ganesh N S, Karthi G, Mohanish K, Mohammed Faizal and Dinesh Karthick K J |
45 | Forecasting terrorist attacks based on the analysis of time series terror strikes and paterns according to historical data | Tomislav Dokman and Grgo Dadić |