WISE 2024 Program

Time Monday Tuesday Wedensday Thursday
2-Dec-24 3-Dec-24 4-Dec-24 5-Dec-24
08:00 – 8:30 Registration  Registration Registration Registration
08:30 – 9:00 Session 11 Session 12 Session 13 Session 14 Special Session 15 Session 21 Session 22 Session 23 Session 24 Session 25 Session 36  Session 37 Session 38 Session 39 Session 40
09:00 – 10:30 Congress Opening Ceremony ( I11) Social Media & News Analysis Web Technologies Learning & Optimisation LLMs & their Applications Security & Privacy Security & Privacy Data Analysis and Optimisation AI Applications Web Systems & Architectures Trustworthy Machine Learning PhD Symposium AI Applications Web Systems & Architectures Web For Good Workshop AIWDA 2024
Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD
10:30 – 11:00 Conference Opening and Keynotes 1 & 2 Coffee / Tea Break Coffee / Tea Break WISE2024 Closing Session
11:00 – 12:00 Keynote 3 Keynote 4  
12:00 – 13:40 Lunch Lunch Lunch
13:40 – 15:20 Session 1 Session 2 Session 3 Session 4 Sepcial Session 5 Session 16 Session 17 Session 18 Session 19 Session 20 Session  26 Session  27 Session  28 Session  29 Session  30
Recommendation Systems Humans and Web Security Knowledge & Data Management Online Safety and Wellbeing through AI Graph ML on Web and Social Media  Social Media & News Analysis Recommendation Systems Learning & Optimisation LLMs & their Applications Security & Privacy Security & Privacy Query Processing and Information Extraction Graph Data Management PhD Symposium Trustworthy Machine Learning
Special Talk 1 Special Talk 2 Special Talk 3
Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD Room TBD
15:20 – 15:40 Coffee Breaks DEMOs & Coffee Break Coffee Breaks
15:40 – 17:30 Session 6 Session 7 Session 8 Session 9 Sepcial Session 10 Session 31 Session 32 Session 33 Session 34 Session 35
Recommendation Systems Information Retrieval & Text Processing Knowledge & Data Management Online Safety & Wellbeing through AI Graph ML on Web and Social Media  Panel (TBD) Security & Privacy Query Processing and Information Extraction Graph Data Management PhD Symposium Text & Sentiment Analysis
Room TBD Room TBD Room TBD Room TBD Room TBD   Room TBD Room TBD Room TBD Room TBD Room TBD
17:30 – 18:00   Industrial PhD Roundtable (TBD)
18:00 – 21:00 Gala Dinner
 

Session 1- Recommendation Systems

Wangwang Zhang, Baojun Tian, Tengjiao Wang, Lu Yuan, and Meng Jiang

Research on micro-videos recommendation method integrating multimodal data and user multi-behavior

Longchuan Tu, Shunmei Meng, Xiao Liu, Guanfeng Liu, Amin Beheshti, and Xuyun Zhang

Semantic Similarity-Based Graph Contrastive Learning for Recommender System

Shengfeng Lin, Huanhuan Yuan, Guanfeng Liu, Xuefeng Xian, Zhiming Cui, and Pengpeng Zhao

Feature-Adaptive Meets Domain-Specific Networks for Multi-Domain Recommendation

Zhao Liu, Wei Liu, Huaijie Zhu, Jianxing Yu, and Jian Yin

Next POI Recommendation Based on Time Slot Preferences and Bidirectional Transformation Modeling

Hailong Luo, Yijing Wang, Qingqing Zhu, and Dazhao Ding

DKAF:Diffusion Kolmogorov-Arnold Fourier Hard Sample Mining for CTR

Session 2 – Humans and Web Security

Aya Muhanad, Israa Abuelezz, Khaled Khan and Raian Ali

On How Cialdini's Persuasion Principles Influence Individuals in the Context of Social Engineering: A Qualitative Study

Eiman Al-Hamad, Sameha Alshakhsi, Areej Babiker, Aiman Erbad and Raian Ali

The Impact of Personality Traits and Need for Cognition on Cybersecurity Behavior: A Study Across Arab and European Samples

Eiman Al-Hamad, Aiman Erbad and Raian Ali

Reporting Social Media Fraud: Motivations, Barriers, and Reporting Mechanism 

Faisal Abughazaleh, Israa Abuelezz, Khaled Khan and Raian Ali

Need for Affect and Need for Cognition vs. Cybersecurity Attitude

Harpreet Kaur, Vimal Kumar and Atthapan Daramas

Detecting ransomware using system calls through transfer learning on a limited feature set

Cédric Eichler, Nathan Champeil, Nicolas Anciaux, Alexandra Bensamoun, Héber H. Arcolezi, and José Maria De Fuentes

Nob-MIAs: Non-biased Membership Inference Attacks Assessment on Large Language Models with Ex-Post Dataset Construction

Session 3 – Knowledge and Data Management

Zakaria Maamar, Amel Benna, Vanilson Burégio, Wictor Lopes, Amal Hafsi, Cheima Ben Njima, and Chirine Ghedira Guegan

Data- and Activity-centric Business Process Modeling: An Approach based on Business Units

Shin-Ya Sato

Periphoscape: Enhance Wikipedia Browsing by Presenting Diverse Aspects of Topics

Mengyu Zhu, Zhao Li, Jun Zhao, Xiaopeng Liu, and Yongning Liu

TERM: Tree Ensemble Models for Interpretable Rule Mining

Vanha Tran, Thiloan Bui, Thaigiang Do and Hoangan Le

A high utility co-location pattern mining algorithm using multiple utility thresholds

Devmane Suhas, Omer Rana, Simon Lannon, and Charith Perera

Talking Buildings: Interactive Human-Building Smart-Bot for Smart Buildings

Session 4 – Online Safety and Wellbeing through Ai

Weiqiang Jin, Ningwei Wang, Tao Tao, Mengying Jiang, Xiaotian Wang, Biao Zhao, Hao Wu, Haibin Duan and Guang Yang

DisCo-FEND: Social Context Veracity Dissemination Consistency-Guided Case Reasoning for Few-Shot Fake News Detection

Mengting Song, Ziyuan Li, Kai Liu, Min Peng and Gang Tian

NLWM: a Robust, Efficient and High-quality Watermark for Large Language Models

Larry Huynh, Andrew Gansemer, Hyoungshick Kim and Jin Hong

Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets

Larry Huynh, Jesse Kilcullen and Jin Hong

Rumor Alteration for Improving Rumor Generation

Ananya Balaji, Lea Duesterwald, Ian Yang, Aman Priyanshu, Costanza Alfieri and Norman Sadeh

Generating Effective Answers to People’s Everyday Cybersecurity Questions: An Initial Study

Special Session 5 – Graph Machine Learning On Web and Social Media

Yong Yi Liu, Shanru Lin and Jiangtao Huang

Knowledge Graph Relation Patterns Networks for Recommendations

Venus Haghighi, Nasrin Shabani, Behnaz Soltani, Lina Yao, Quan Z. Sheng, Jian Yang and Amin Beheshti

Robust Graph Learning against Camouflaged Malicious Actors

Session 6 – Recommendation Systems

Lvying Chen, Ji Zhang, Yuxi Zhang, Sujie Yu, and Bohan Li

Cross-Domain Sequential Recommendation with Temporal Encoding and Projection-Based Learning

Yiheng Li and Weihai Lu

MHHCR: Multi-behavior Heterogeneous Hypergraph Contrastive Recommendation

Haibo Liu, Lianjie Yu, Yali Si, and Jinglian Liu

CSA4Rec: Collaborative Signals Augmentation model based on GCN for Recommendation

Wenhao Liu, Sui Lin, and Lanjun Li

Implicit-Relation Knowledge Distillation for Robust Recommendations

Jie Shen, Lei Chen, Guixiang Zhu, Jie Cao, Weiping Qin, Yihan Chen, and Yiheng Lu

Temporal preference and knowledge-aware collaborative attentive network for electrical material recommendation

Tengjiao Wang, Baojun Tian, Wangwang Zhang, Lu Yuan, and Meng Jiang

The Research of Sequence Recommendation Method Based on Heterogeneous Enhanced Transformer with Multi-Behavior Data

Session 7 – Information Retrieval and Text Processing

Munazza Zaib, Quan Z. Sheng, Wei Emma Zhang, Elaf Alhazmi and Adnan Mahmood

Learning Contrastive Representations for Dense Passage Retrieval in Open-domain Conversational Question Answering

S. M. Mazharul Hoque Chowdhury

Wikipedia Empowered Natural Language Interface for Web Search

Xin He

Mathematical Formulas-Based Scientific Literature Retrieval with Heterogeneous Network Semantic Enhancement

Smail Oussaidene, Lynda Said Lhadj and Mohand Boughanem

MarkedDPR: Enhancing Dense Passage Retrieval with Exact Match Signals and Synthetic Data Augmentation

Session 8 – Knowledge and Data Management

Samira Oulefki, Lamia Berkani, Nassim Boudjenah, Ladjel Bellatreche, and Aicha Mokhtari

Concepts and Relations Features Are All You Need for Embedding-based Ontology Matching

Tahani Abu Musa, Abdelaziz Bouras and Abdelhak Belhi

An Ontological Approach for Anomaly Detection in Supply Chain-based Business Processes

Abhilasha Ravichander, Ian Yang, Rex Chen, Shomir Wilson, Thomas Norton and Norman Sadeh

Incorporating Taxonomic Reasoning and Regulatory Knowledge into Automated Privacy Question Answering

Shanshan Huang, Junpeng Zhu, Fengyan Zhang, Peng Cai and Qiwen Dong

AutoTable: Effective and Efficient Automated Feature Transformation for Tabular Data

Session 9 – Online Safety and Wellbeing through Ai

Firoj Alam, Md. Rafiul Biswas, Uzair Shah, Wajdi Zaghouani and Georgios Mikros

Propaganda to Hate: A Multimodal Analysis of Arabic Memes with Multi-Agent LLMs

Surendrabikram Thapa, Kritesh Rauniyar, Hariram Veeramani, Aditya Shah, Imran Razzak and Usman Naseem

Did You Tell a Deadly Lie? Evaluating Large Language Models for Health Misinformation Identification

Mohamed Bayan Kmainasi, Rakif Khan Pathan, Ali Ezzat Shahroor, Boushra Bendou, Maram Hasanain and Firoj Alam

Native vs Non-Native Language Prompting: A Comparative Analysis

Ademola Adesokan, Haiwei Hu and Sanjay Madria

DisFact: Fact-Checking Disaster Claims

Special Sessions 10 – Graph Machine Learning On Web and Social Media

Ziye Fang, Luyao Teng, Zefeng Zheng, Wei Zhang and Shaohua Teng

Label-enhanced Cross-modal Hashing with Dual-semantic Learning

Chang Gong, Boyu Yang, Weiguo Zheng, Xing Huang, Weiyi Huang, Jie Wen, Shijie Sun and Bohua Yang

Towards Building a Lightweight and Powerful Computation Graph for Scalable GNN

Md Jamil Ahmed, Mahdis Saeedi and Hossein Fani

Skill Vector Representation Learning for Collaborative Team Recommendation: A Comparative Study

Mengqiu Cheng, Wangting Qiao, Junming Chen and Xianfeng Li

Learning to Ask about Text Content in an Image with Fine-Grained Features

Session 11 – Social Media and News Analysis

Noor Al-Ansari, Dena Al-Thani, and Mariam Bahameish

The Influence of Social Networking Usage Experience and Activity on Preferences of Explainable Artificial Intelligence (XAI) Representation Methods in a Hate Speech Detection System

Sanaa Kaddoura and Reem Nassar

Language Model-Based Approach for Multiclass Cyberbullying Detection

Ruben Sinu Kurian, Chandramani Chaudhary, Abhay Unni Nambiar, and Abhina Sunny

MeTAN: Metaphoric Temporal Attention Network for depression detection on Social Media

Xiyu Qiao, Xiangmin Zhou, Changjun Zhou, Hua Wang and Yanchun Zhang

EBUD: Evolving Disaster Burst Detection over Social Streams

Sarah Condran, Michael Bewong, Selasi Kwashie, Md Zahidul Islam, Irfan Altas and Joshua Condran

MAPX: An explainable model-agnostic framework for the detection of false information on social media networks

Session 12 – Web Technologies

Ralph Bou Nader, Ikram Garfatta, Marwa Elleuch, Walid Gaaloul and Yehia Taher

Multi-Perspective Conformance Checking For Email-driven Processes

Fernando Miguel Carvalho

Progressive Server-Side Rendering with Suspendable Web Templates

Xingchuang Liao, Wenjun Wu, Xiaoming Yu, Xin Ji, Yiting Chen and Junting Li

HMSC-LLMs: A Hierarchical Multi-agent Service Composition Method Based on Large Language Models

Noah Kader, Inwon Kang, and Oshani Seneviratne

Enhancing Web Spam Detection through a Blockchain-Enabled Crowdsourcing Mechanism

Sebastian Heil, Lucas Schröder, and Martin Gaedke

WNSWE: Web-based Network Simulator for Web Engineering Education

Session 13 – Learning and Optimization

Takumi Ito, Atsuki Maruta, Makoto P. Kato, and Sumio Fujita

PR-Rank: A Parameter Regression Approach for Learning-to-Rank Model Adaptation without Target Domain Data

Hongtao Sun, Libin Zheng, and Jian Yin

Weighted Linear Regression with Optimized Gap for Learned Index

Kai Liu, Mengting Song, Wenjie Xu, Keyao Li, Min Peng and Gang Tian

TAKE: Tracing Associative Empathy Keywords for Generating Empathetic Responses Based on Graph Attention

Senthil Ganesan Yuvaraj, Boualem Benatallah, Hamid Reza Motahari-Nezhad, and Fethi Rabhi

Intent identification using few-shot and active learning with user feedback

Abdullah Alsuhaibani, Imran Razzak, Shoaib Jameel, Xianzhi Wang, and Guandong Xu

CLIMB: Imbalanced Data Modelling using Contrastive Learning with Limited Labels

Session 14 – Large Language Models and Their Applications

Ruoyu Wang, Xiaoxuan Li, and Lina Yao

Deconfounded Causality-aware Parameter-Efficient Fine-Tuning for Problem-Solving Improvement of LLMs

Xiaoxuan Li, Yao Liu, Ruoyu Wang, and Lina Yao

Regularized Multi-LLMs Collaboration for Enhanced Score-based Causal Discovery

Muhammad Mudassar Yamin, Ehtesham Hashmi and Basel Katt

Combining Uncensored and Censored LLMs for Ransomware Generation

Sharjeel Tahir, Jumana ABu-Khalaf, Syed Afaq Ali Shah, and Judith Johnson

Therapying Outside the Box: Innovating the Implementation and Evaulation of CBT in Therapeutic Artificial Agents

Yassir LAIRGI, Ludovic MONCLA, Rémy CAZABET, Khalid BENABDESLEM, and Pierre CLÉAU

iText2KG: Incremental Knowledge Graphs Construction Using Large Language Models.

Special Session 15 – Security, Privacy and Trust

Xuyang Liu, Rong Zhao, Bingwen Feng and Jilian Zhang

Privacy-Preserving k-core Decomposition For Graphs

Daniil Fedotov, Jaroslav Kuchar, and Tomas Vitvar

Anomaly Detection in Log Streams based on Time-Contextual Models

Guolou Ping

Enhancing Open-Set Recognition with Global Feature Representation

Samsad Jahan, Yongfeng Ge, Hua Wang and Enamul Kabir

Dynamic-Parameter Genetic Algorithm for Multi-objective Privacy-Preserving Trajectory Data Publishing

Yinhao Jiang, Michael Bewong, Arash Mahboubi, Sajal Halder, Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Praveen Gauravaram, and Jason Xue

A Graph-Based Approach for Software Functionality Classification on the Web

Session 16 – Social Media and News Analysis

Andrew Bartlett, Waheeb Yaqub, Basem Suleiman and Manoranjan Mohanty

Misinformation in Reels, Influence of Contextual Superimposed Texts in Short Videos

Ansar Iqbal, Waheeb Yaqub, Basem Suleiman and Manoranjan Mohanty

What Did The People Say? Evaluating the Effect of Comment Summarisation Tags on Perceived News Credibility Using Qualitative Approach

Hrishikesh Masurkar, Basem Suleiman, Waheeb Yaqub, and Muhammad Johan Alibasa

Are fact checkers effective in the post truth world? Assessing impact of fact checkers cross medium and platforms

Haoyuan Zeng, Xiang Zeng, Ye Wang, and Bin Zhou

Target-Specific Hate Trend Prediction on Social Network

Josemar Caetano, Humberto T. Marques-Neto and Virgilio Almeida

Characterizing Collective Attention on Online Chats: A Three-Pronged Approach

Session 17 – Recommendation Systems

Junxiong Tong, Mingjia Yin, Hao Wang, Qiushi Pan, Defu Lian, and Enhong Chen

MDAP: A Multi-view Disentangled and Adaptive Preference Learning Framework for Cross-Domain Recommendation

Xingming Chen, Wenqi Fan, and Qing Li

Causal Behavior Pattern Inference for News Recommendation through Multi-interest Matching

Minghao Mo, Weihai Lu, Qixiao Xie, Zikai Xiao, Xiang Lv, Hong Yang and Yanchun Zhang

MIN: Multi-stage Interactive Network for Multimodal Recommendation

Xihao Xie, Jia Zhang, Chang Liu, Rahul Ramachandran, Tsengdar Lee and Seungwon Lee

RANGER: Context-Aware Service Unit of Work Recommendation for Incremental Scientific Workflow Composition

Fatma Sbiaa, Nadia Boufares, Sonia Kotel and Ahmed Maalel

Optimizing Real Estate Recommendations with Elasticsearch and Machine Learning Techniques

Session 18 – Learning and Optimization

Mohamamd Zavid Parvez, Rafiqul Islam , and Md Zahidul Islam

CL3: A Collaborative Learning Framework for the Medical Data Ensuring Data Privacy in the Hyperconnected Environment

Ye Lu, Ji Zhang, Ting Yu, and Gaoming Yang

Equivariant Diffusion-based Sequential Hypergraph Neural Networks with Co-Attention Fusion for Information Diffusion Prediction

Nadir Guermoudi, Houcine Matallah, Amin Mesmoudi, Seif Eddine Benkabou and Allel Hadjali

Selectivity Estimation for Spatial Filters using Optimizer Feedback: A Machine Learning Perspective

Benjamin Zi Hao Zhao, Junda Lu, Xiaowei Zhou, Dinusha Vatsalan, Muhammad Ikram and Mohamed Ali Kaafar

On Adversarial Training with Incorrect Labels

Moncef Garouani, Franck Ravat and Nathalie Valles-Parlangeau

Model Lake: a New Alternative for Machine Learning Models Management and Governance

Zi-Yang Bo, Dan-Ting Duan, Qiang Yang, Xu-Dong Gao, Pei-Lan Xu, Xin Lin, Zhen-Yu Lu and Jun Zhang

A Benchmark Test Suite for Multiple Traveling Salesmen Problem with Pivot Cities

Session 19 – Large Language Models and Their Applications

Yuan-Chen Chang and Esma Aimeur

"Is this site legit?": LLMs for Scam Website Detection

Omar Mussa, Omer Rana, Benoît Goossens, Pablo Orozco-Terwengel and Charith Perera

Towards Enhancing Linked Data Retrieval in Conversational UIs using Large Language Models

Ahmad Sakor, Kuldeep Singh, and Maria-Esther Vidal

BioLinkerAI: Capturing Knowledge using LLMs to Enhance Biomedical Entity Linking

Ada Bagozi, Devis Bianchini, Michele Melchiori and Anisa Rula

Enhancing LLMs Contextual Knowledge with Ontologies for Personalised Food Recommendation

Shuting Yang, Zehui Liu, Wolfgang Mayer, Ningpei Ding, Ying Wang, Yu Huang, Pengfei Wu, Wanli Li, Lin Li, Hongyu Zhang and Zaiwen Feng

ShizishanGPT: An Agricultural Large Language Model Integrating Tools and Resources

Special Session 20 – Security, Privacy and Trust

Gnanakumar Thedchanamoorthy, Michael Bewong, Meisam Mohammady, Tanveer Zia, and Md Zahidul Islam

FUD-LDP: Fully User Driven Local Differential Privacy

Taslima Khanam, Siuly Siuly, Kate Wang and Zhonglong Zheng

A Privacy-Preserving Encryption framework for Big data analysis

Yanni Han, Zhuoqun Li, Jian Zhang, Zhen Wu, and Ying Ding

Location nearest neighbor query scheme in edge computing based on differential privacy

Session 21 – Security, Privacy and Trust

Matilde Tullii, Solenne Gaucher, Hugo Richard, Eustache Diemert, Vianney Perchet, Alain Rakotomamonjy, Clément Calauzènes and Maxime Vono

Open Research Challenges for Private Advertising Systems under Local Differential Privacy

Mohammed Al Kinoon, Hattan Althebeiti, Ali Al Kinoon, Saeed Salem, Manar Mohaisen and David Mohaisen

Industry-Specific Vulnerability Assessment

Wei Shen, Qian Zhou and Jiayang Wu

Blockchain-Driven Medical Data Shamir Threshold Encryption with Attribute-Based Access Control Scheme

Riham Badra, Layth Sliman and Amine Dhraief

Smart Contracts Vulnerability Detection Using Transformers

Zhiqi Li, Weidong Fang and Wuxiong Zhang

Weibo-FA: A Benchmark Dataset for Fake Account Detection in Weibo Platform

Session 22 – Data Analysis and Optimization

Huanyu Zhao, Tongliang Li, Shiting Wen, Zhenyu Shu, Ke Deng, Jian Yang, and Chaoyi Pang

Representation with Minimized Max-error in Optimal Piecewise Linear Approximation of Time Series Data

Zhaohui Zhang, Pei Zhang, Fujuan Xu, Yifei Tang, Dongxue Zhang, and Pengwei Wang

A Big Data Drilling Method for Value Assessment of Leakage Data

Dildar Ali, Harishchandra Kumar, Suman Banerjee and Yamuna Prasad

An Effective Tag Assignment Approach for Billboard Advertisement

Junfeng Wu, Xiangmin Zhou, Guangyan Huang, Borui Cai, Guang-Li Huang, Hui Zheng, Chi-Hung Chi and Jing He

Early Discovery of Key Innovative Publications by Analyzing Emerging Topic Trends

Haoyu Wang, Bin Wang, Sitong Liu, Xiaochun Yang, Jiahe Wang and Shiyu Yu

Two-Stage Trained Stacking Model for Univariate Time Series Forecasting.

Session 23 – Ai Applications

Weichen Bi, Zijian Shao, Yudong Han, Jiaqi Du, Yuan Wei, Lijuan Guo, Tianchen Wu, Shuang Li and Yun Ma

Web-based AI Assistant for Medical Imaging: A Case Study on Predicting Spontaneous Preterm Birth via Ultrasound Images

Xiaohan Zhang, Xiaolong Chen, Wei Han, Xiaohui Huang, Yunliang Chen, Jianxin Li and Lizhe Wang

Satellite-Driven Deep Learning Algorithm for Bathymetry Extraction

Ubaid Azam, Imran Razzak, Shelly Vishwakarma, Hakim Hacid, Dell Zhang, and Shoaib Jameel

Would You Trust an AI Doctor? Building Reliable Medical Predictions with Kernel Dropout Uncertainty

Seyed Shahabadin Nasabeh, Santiago Meliá, Barbara Leporini, and Diana Gadzhimusieva

Empowering Visual Navigation: A Deep-Learning Solution for Enhanced Accessibility and Safety among the Visually Impaired

Laldja Ziani, Anis Chawki Abbes, Mohamed Essaid Khanouche, and Parisa Ghodous

A Transformer and LSTM Model for Electricity Consumption Forecasting and User’s Behavior Influence

Session 24 - Web Systems And Architectures

Di Tian, Juan Chen, Peng Chen, Jie Zhong, Xi Li and Ling Xiong

Deep Reinforcement Learning-based Dependent Task Offloading for QoS Optimization in Satellite Edge Computing

Tinghao Feng, Zeshun Peng, Yanfeng Zhang, Xiaohua Li, Xiaomei Dong, and Ge Yu

HIChain: A Hierarchical IoT Permissioned Blockchain with Edge Cloud Architecture

Christson Awanyo and Nawal Guermouche

Leveraging Deep Learning-based Approach for IoT Service Composition through Local Service Selection

Ao Long, Yuewei Wang, Xiaohui Huang, Wei Han, Runyu Fan, Yunliang Chen and Jianxin Li

An Efficient Device Placement Method for Distributed Training of Multi-branch Neural Network-based Remote Sensing Interpretation

Arije Yahyaoui, Sonia Kotel, Fatma Sbiaa, Lazhar Hamel, Aida Lahouij and Raouda Maraoui Kamoun

A Scalable Approach for Improving IoT Healthcare Systems with Privacy and Permissioned Blockchain

Session 25 – Trustworthy Machine Learning

Yifeng Zheng, Tianchen Xiong, Huajie Ouyang, Songlei Wang, Zhongyun Hua and Yansong Gao

SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization

Yichen Zang, Chengjun Cai, Wentao Dong and Cong Wang

VizardFL: Enabling Private Participation in Federated Learning Systems

Zeming Yao, Lin Li, Leo Yu Zhang, Fusen Guo, Chao Chen and Jun Zhang

Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication

Ahmed Abusnaina, Afsah Anwar, Muhammad Saad, Abdulrahman Alabduljabbar, Rhongho Jang, Saeed Salem and David Mohaisen

Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift

Sen Peng, Yufei Chen, Cong Wang and Xiaohua Jia

Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process

Session 26 – Security, Privacy and Trust

Muhammad Ikram I Wayan Budi Sentana, Hassan Asghar, Mohamed Ali Kaafar, and Michal Kepkowski

More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps

Antoine Boutet, Thomas Lebrun, Tristan Allard, Sébastien Gambs, Louis Beziaud and Mohamed Maouche

Synthetic Data Generation: Limits and Improvement of Avatar Data

Arash Mahboubi Hang Thanh Bui, Hamed Aboutorab, Khanh Luong, Seyit Camtepe, and Keyvan Ansari

A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks

Rouaa Naim, Hams Gelban and Ahmed Badawy

Detection and Mitigation of Backdoor Attacks on x-Apps

Sara Taki, Adrien Boiret, Cédric Eichler and Benjamin Nguyen

Cohesive database neighborhoods for differential privacy: mapping relational databases to RDF

Session 27 – Query Processing and Information Extraction

Yogeswar Lakshmi Narayanan and Hossein Fani

RePair My Queries: Personalized Query Reformulation via Conditional Transformers

Chaofan Zhao and Jing Ren

DORA: A Reliability-Associated Query Optimization Framework for Plan Selection

Zizhao Wang, Qiang Qu, Nan Han, Zhelang Deng, Yizhuo Ma, Xiaowen Huang and Jintao Meng

REXIO: Indexing for Low Write Amplification by Reducing Extra I/Os in Key-Value Store under Mixed Read/Write Workloads

Jin Zhou, Zhi Zheng, Yuanjie Lyu and Tong Xu

Enhancing Multi-Hop Complex Question Answering with LLM-based Pseudo-Document Generation and Adaptive Retrieval

Peng Tian, Xiangyu Shan, Xinpeng Lu, Xueqing Li and Junwu Zhu

ITRA: Incremental Task Replanning Algorithm for multi-UAV Based on Centralized-Distributed Negotiation

Session 28 – Graph Data Management

Hui Wang, Xin Wang, Menglu Ma, and Yiheng You

RPQBench: A Benchmark for Regular Path Queries on Graph Data

Chengguo Li, Xin Wang, Yongqi Yin and Hui Wang

Two Birds One Stone: Dual-Role Path Based Subgraph Matching Using Partial Evaluation

Mohamed Bouadi, Arta Alavi, Salima Benbernou, and Mourad Ouziri

KRAFT: Leveraging Knowlegde Graphs for Interpretable Feature Generation

Faye Wang, Yu Liu and Lei Zou

Neuralizing Graph Edit Distance Computation with Fine-Grained Matching Cost Prediction

Xiaoying Wu, Michael Lan, Md Rakibul Hasan and Dimitri Theodoratos

Scalable Optimization of Graph Pattern Queries Using Summary Graphs

Session 29 – PhD Symposium

Session 30 – Trustworthy Machine Learning

Yousra Chahinez Hadj Azzem, Fouzi Harrag and Ladjel Bellatreche

Evaluating Contrastive and Non-Contrastive Explanations for Language Models: A Study on Faithfulness and Plausibility

Xinqian Wang, Xiaoning Liu, Xun Yi, Xuechao Yang and Iqbal Gondal

Model Extraction Attacks on Privacy-Preserving Deep Learning based Medical Services

Jan Aalmoes, Vasisht Duddu and Antoine Boutet

On the Alignment of Group Fairness with Attribute Privacy

Session 31 – Security, Privacy and Trust

Alexia Dini Kounoudes, Georgia Kapitsaki and Ioannis Katakis

i-Right: Identifying and classifying GDPR user rights in fitness tracker and smart home privacy policies

Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi and Erisa Karafili

AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset

Tamer Ahmed Eltaras, Qutaibah Malluhi, Alessandro Savino, Stefano Di Carlo and Adnan Qayyum

R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients

Farouk Damoun, Hamida Seba and Radu State

Privacy Preserving Behavioral Anomaly Detection in Dynamic Graphs for Card Transactions

Session 32 – Query Processing and Information Extraction

Delaram Rajaei, Zahra Taheri and Hossein Fani

Enhancing RAG’s Retrieval via Query Backtranslations

Hala Saadeh and Joe Tekli

Hierarchical Indexing for Interactive Zooming of Document Clusters

Jinlong Zheng, Yujie Lu and Weiguo Zheng

Distributed k-hop Query Powered by an Asynchronous Framework

Bajeela Aejas, Abdelhak Belhi and Abdelaziz Bouras

Contract Clause Extraction Using Question- Answering Task

Session 33 – Graph Data Management

Riccardo Pozzi, Valentina Barbera, Renzo Alva Principe, Davide Giardini, Riccardo Rubini and Matteo Palmonari

Combining Knowledge Graphs and NLP to Analyze Instant Messaging Data in Criminal Investigations

Lingzhi Xiang, Qing Li, Xiang Li and Xingchun Diao

G-ETI: Incorporating Graph Information for Improved Unsupervised Event Type Induction

Tsuyoshi Hasegawa, Shiori Hironaka and Kazuyuki Shudo

Estimation of Graph Features Based on Random Walks Using Neighbors' Properties

Hao Huang and Maria-Esther Vidal

SemMatch: Semantics-Aware Matching for Causal Inference over Knowledge Graphs

Session 35 – Text and Sentiment Analysis

Kelvin Z. Yeung, Flavius Frasincar, and Finn van der Knaap

Explaining a Deep Learning Model for Aspect-Based Sentiment Analysis Using SHAP

Charlotte Visser and Flavius Frasincar

Knowledge Injection from a Domain Sentiment Ontology in an Attention Neural Network for Aspect-Based Sentiment Classification

Steinar Horst and Flavius Frasincar

Multilingual, Cross-lingual, and Unilingual Models for ABSC

Marwah Alharbi, Jiao Yin, Yuan Miao, and Jinli Cao

From Data to Insights: Constructing and Evaluating a Hospitality Dataset for Quadruple Aspect-Based Sentiment Analysis

David-Gabriel Ion, Răzvan-Alexandru Smădu, Dumitru-Clementin Cercel, Florin Pop and Mihaela-Claudia Cercel

A Cross-Lingual Meta-Learning Method Based on Domain Adaptation for Speech Emotion Recognition

Session 36 – PhD Symposium

S37 – Ai Applications

Amal Alharbi and Samaher Alozayri

Enhancing Customer Service Efficiency in the Holy Makkah Municipality Using Machine Learning

Mohammad Mominur Rahman, Areej Babiker and Raian Ali

Motivation, Concerns, and Attitudes Towards AI: Differences by Gender, Age, and Culture

Amjad Rattrout, Hussein Younis and Ahmad Bsiesy

DefectClassifierX: A Cross-Platform Automated Pattern Classification System for Wafer Defects

Khedher Ibtissem, Faci Noura, and Faiz Sami

Safe-Path: A Perspective on Next-Generation Road Safety Recommendations

Angela Moufarrej, Abdulkader Fatouh and Joe Tekli

Unsupervised and Dynamic Dendrogram-based Visualization of Medical Data

Asma Mansour, Olfa Besbes and Takoua Abdellatif

Federated Deep Learning Models for Stroke Prediction

S38 – Web Systems and Architectures

Wafa Ben Slama Souei, Benoit Charroux, Layth Sliman and Raoudha Ben Djemaa

Towards Blockchain like SOA

Karim Benouaret and Mohamed Essaid Khanouche

Clustering-Based Diversity in Service Recommendation

Devis Bianchini, Valeria De Antonellis, Massimiliano Garda and Michele Melchiori

Resource-based Blockchain Integration in Agri-Food Supply Chains

Zakaria Maamar, Amel Benna, Sami Yangui, Mickaël Pezongo, and Ejub Kajan

On-Demand Bundling of Cloud and Edge Services

João Paulo Moleiro Domingues and Catarina Ferreira da Silva

Acceptance and use of smart home technologies: a focus on Portugal

Session 39 – Web-for-Good Workshop

Session 40 – AIWDA Workshop