Loading…
Type: Virtual Room_12A clear filter
Saturday, April 11
 

2:58pm GMT+07

Opening Remarks
Saturday April 11, 2026 2:58pm - 3:00pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Chandrakant D. Kokane

Dr. Chandrakant D. Kokane

Associate Professor, Vishwakarma Institute of Technology, India

Saturday April 11, 2026 2:58pm - 3:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Chaos-Based Permutation–Diffusion Framework for Secure and Efficient Digital Image Encryption
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Selvamani K, Saranraj S, Muthusundar SK, Kanimozhi S, Mohana Suganthi N
Abstract - The phishing attack through email remains a significant threat to cybersecurity because the attack has become highly advanced, flexible, and widely spread among individuals and organizations. The phishing tricks, such as personalized social engineering, impersonated identities, and malicious links, have evolved fast and made the traditional email security measures less useful. As such, numerous schemes of email phishing attack detection and prevention have been suggested, combining rule-based approaches with machine learning, deep learning, natural language processing, and sophisticated artificial intelligence systems. This review paper provides a detailed discussion of the currently existing email phishing detection and prevention frameworks, their architectural elements, detection schemes, and preventive schemes. The paper systematically evaluates the conventional, machine learning, and more advanced AI-driven methods with their advantages, weaknesses, and flexibility to the changing phishing threats. The synthesis of existing research trends and unaddressed issues makes the review valuable to researchers and cybersecurity practitioners and will allow building solid, scalable, and intelligent email phishing defense systems.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Hybrid Semantic–Linguistic Framework for Clinical Detection of Drug–Drug Interactions and Contraindications
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Mohanad A. Deif, Mohamed A. Hafez, Samar Mouakket, Mohamed
Abstract - Polypharmacy and multiple chronic conditions in older adults increase the likelihood of adverse drug events caused by drug–drug interactions (DDIs) and contraindications. Many clinical decision support systems still have limited ability to use patient context and to exchange knowledge in a consistent semantic form. This study presents a hybrid semantic–linguistic framework for automated DDI detection by combining biomedical natural language processing, ontology-based reasoning, and risk scoring. The framework uses BioBERT to extract relevant information and represents it using RDF knowledge graphs, OWL 2 DL ontologies, and SWRL rules. In an evaluation with 1,000 synthetic patient profiles containing RxNorm-coded medications and SNOMED CTencoded diagnoses, the system identified a wide range of clinically important interaction patterns. Statistical testing showed that age and the number of medications were strongly associated with alert frequency (p < 0.001). These findings suggest that the proposed approach can improve medication safety by providing explainable clinical decision support.
Paper Presenter
avatar for Samar Mouakket

Samar Mouakket

United Arab Emirates

Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Quantum-Resistant Security Framework for Real-Time Financial Transaction Systems
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Selvamani K, Kanimozhi S, Muthusundar S K, Saranraj S, Jagadeesh K
Abstract - Multi-object tracking (MOT) is a pillar of many computer vision applications such as video surveillance, self-driving and crowd analysis [1]. The main difficulty does not only exist in correct identification of objects but also in consistent identities of objects in different frames when there is occlusion, camera motion and changes in scene density [14]. The paper introduces a highly advanced MOT system, combining the latest YOLOv8x detector with a modified and improved version of the original ByteTrack association system, which is called RobustBoTSORTTracker [14]. With the new detection quality of YOLOv8x and the robustness of low-confidence detections in ByteTrack, augmented with selective improvements of BoT-SORT including camera motion compensation and exponential moving average smoothing, the proposed system demonstrates significant gains on the MOT15 benchmark [7]. Experimental findings indicate a MOTA of 55.6, IDF1 of 72.2, precision of 74.3 and a recall of 95.7, which is significantly higher than the previous baselines under similar conditions.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Adverse Rainy Condition Classification Using Customize Lightweight CNN Models for UAVs
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Abhay Saxena, Ankit Kumar, Prasant Kumar Sahu
Abstract - In this paper, we address the problem of rainy condition classification in order to allow autonomous systems to ensure safe operation in different weather conditions of rain, especially for drones. The earlier weather condition classification methods are inclined towards using big and computationally costly models and cannot thus be employed in real-time on resource-constrained platforms such as drones and edge devices. The motivation behind this work is to introduce a light-weight, efficient deep model which would be able to classify various rain conditions with low computational cost so that it may be deployed efficiently on low-resource devices. We present a novel CNN architecture and evaluate its performance on a collection of seven distinct rain conditions. The models are bench marked against some of the state-of-the-art pretrained models to demonstrate the compromise between efficiency and accuracy. Performance is evaluated using accuracy, inference time, and model size. The model has accuracy 95.93% with least model size 89.09 KB with inference time of 32.664 ms bridging the gap in lightweight and real-time classification.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Bonding of material and Electrical Properties of EVA shoes under various Physical and Manufacturing conditions
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Arjun Verma, D.K. Chaturvedi
Abstract - Ethylene and vinyl acetate or EVA is a co-polymer used as a substitute for a lot of materials. EVA is a versatile material and it has a lot of applications ranging from electronics, healthcare, footwear, building applications etc. It is mainly used in sport shoes due to its property to absorb shock impact and insulation properties. In addition, EVA is very cost-friendly, produces no odor, and light in weight material. But with overuse of it, the cellular structure chang-es and can affect the shoes' quality and insulation properties. In addition to the cellular structure, the air molecules present in it also collapse. This paper focus-es on the bonding properties of EVA at different temperatures and its dielectric properties under different operating and manufacturing conditions. The upper, bottom, and sides of EVA shoes are exposed to high voltage till the breakdown. The experimentation was done at Electrical HV laboratory on the university campus where a 100kV HVAC testing system is available. This paper presents the tabulated results on the dielectric strength of EVA shoes under varying operating conditions. Additionally, it examines the bonding properties of EVA shoes at different manufacturing temperatures, aiming to predict their lifespan, quality, and finish. The results of these studies are thoroughly discussed within the document.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Development of a Context-based Prompt Generation Framework to Enhance Model-Driven Engineering using Retrieval-Augmented Generation with Large Language Models
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Nasika Ijaz, Farooque Azam, Saliha Ejaz, Muhammad Waseem Anwar
Abstract - Anomaly detection in dynamic cybersecurity networks has been a promising problem that has been addressed using Graph Neural Networks (GNNs). Today’s network topologies are too difficult to handle for traditional methods; the topologies are too dynamic and complex. The main contribution of this study is the evaluation of three GNN models, Graph Convolutional Networks (GCNs), Graph Attention Networks (GATs), and RepographGAN, in terms of effectiveness to detect anomalies in dynamic network environments. Conventional anomaly detection techniques such as logistic regression, support vectors machines (SVM) and decision trees are compared against the models. The results demonstrate that RegraphGAN is superior to the other models in terms of accuracy, precision, recall, F1 score, and AUC-ROC, and is thus very effective at identifying anomalies. However, as computing resources are required for it, a compromise between performance and computing resources is found. Despite the lower accuracy of GCN and GAT, these provide more computationally efficient solutions that are appropriate for real time deployment constraints in such resource constrained environments. The findings provide a basis for future research that can optimize scalability and computational efficiency for large scale applications and in the context suggest the use of GNNs for improving cybersecurity systems.
Paper Presenter
avatar for Nasika Ijaz

Nasika Ijaz

Pakistan

Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Enhancing Password Guessing Efficiency: A Partition-Aware TCN Approach Beyond PGTCN
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Aaqib Hakeem, Akshay V, Parthav Mathu, Kotnada Yogesh, Gokul Kannan Sadasivam
Abstract - Passwords remain one of the most widely deployed authentication mechanisms despite well-documented vulnerabilities to guessing attacks. Recent deep learning approaches, including Password Guessing using Temporal Convolutional Networks (PGTCN), have demonstrated that sequence modeling can effectively capture structural regularities in leaked password corpora. However, practical performance often depends not only on model architecture but also on training stability, batching strategy, and decoding configuration. In this work, we investigate a partition-aware training and generation pipeline built around a single Temporal Convolutional Network (TCN). Rather than introducing additional architectural complexity, the proposed framework emphasizes standardized preprocessing, balanced data partitioning for stable batching, optimized training procedures, and large-batch probabilistic decoding. A lightweight buffering layer is incorporated to decouple generation from evaluation and improve throughput without requiring distributed training infrastructure. Experiments on multiple real-world leaked password datasets show consistent, though modest, improvements in match rate compared to the PGTCN baseline under same-site evaluation. The results suggest that careful optimization and pipeline-level design can yield measurable gains in candidate ordering while maintaining reproducibility and implementation simplicity.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Image Forgery Detection Using Convolutional Autoencoder
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Sushant Maji, Sachin B. Jadhav
Abstract - The offline signature validation by means of hand written signature is also a significant consideration in the financial, legal and ad- ministrative authentication systems. However, this is particularly challenging because of the inaccessibility of dynamic data of handwriting such as pen-pressure and stroke-velocity, and small training samples. The paper describes a modified version of Siamese-Transformer model called SigNeura, which is also improved with Synthetic Pen Pressure Map Generation to refine the accuracy of the verification in the few-shot learning. The adaptive thresholding, and utilization of the stroke-width estimation is applied to obtain synthetic pressure maps and fill in the dynamic information of the synthetic grayscale signatures with the static grayscale signatures. The Siamese network is optimized on discriminative embeddings and Transformer encoders are optimized on triplet long range contextual dependencies. The analysis conducted on benchmarking data using experiments demonstrates that SigNeura is a significantly superior approach than conventional CNN and Siamese-based approaches with a high level of accuracy and resistance to skilled forgeries.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Personality Rights–Based Financial Inclusion through ICT: Reconceptualizing Digital Finance as a Rights-Dependent Process
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Siddharth Joshi, Deepti Kiran, Dev Kumar Yadav, Harshit Sinha, Abhishek Kukreti
Abstract - Artificial Intelligence (AI), as a technology, has the potential to change the manner in which organizations are run in the world. However, small and medium-sized enterprises (SMEs) in the Philippines have unique limitations in the use of AI in running the business. The study aims to explore the perceptions of SME managers in the Philippines on the use of AI, with particular reference to the limitations and facilitators in the use of the technology in the business environment. In this study, the researcher interviewed five SME managers from different sectors, including retail, manufacturing, and service sectors. The researcher used thematic analysis to identify the commonalities in the decisions made by the SME managers on the use of AI in the business environment. The study revealed the perceptions of the SME managers on the use of AI in the business environment in the Philippines, with the limitations and facilitators in the use of the technology in the business environment. The study provides practical insights that can guide strategies aimed at strengthening AI readiness and responsible adoption among SMEs in the Philippines.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Privacy Preservation Techniques in Big Datasets: A Comprehensive Review
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Ambrish Kumar Sharma, Swati Namdev
Abstract - The volume of data is growing gradually in all around by various sec-tors like e-commerce, stock market, medical, banking, education, social networks (Facebook, Twitter, WhatsApp) and also because of the utilization of the internet and mobile apps. Privacy and security have always been important issues with big datasets. Big datasets may be a collection of facts that has huge and multiplex structure like sensors, emails, weblogs and images. Sensitive information about individuals, which is usually evident or hidden in data, is susceptible to various privacy attacks and high risks of privacy disclosure. Constructing a secure and reliable environment for big dataset requires a distinction between existing approaches so that we can develop a unique solution in future for this that maximizes data privacy. This paper offers insights into the overview of big datasets, big dataset privacy problems and various privacy preservation techniques with comparative study used in big datasets.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

5:00pm GMT+07

Session Chair Concluding Remarks
Saturday April 11, 2026 5:00pm - 5:02pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Chandrakant D. Kokane

Dr. Chandrakant D. Kokane

Associate Professor, Vishwakarma Institute of Technology, India

Saturday April 11, 2026 5:00pm - 5:02pm GMT+07
Virtual Room A Bangkok, Thailand

5:02pm GMT+07

Session Closing and Information To Authors
Saturday April 11, 2026 5:02pm - 5:05pm GMT+07

Moderator
Saturday April 11, 2026 5:02pm - 5:05pm GMT+07
Virtual Room A Bangkok, Thailand
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
  • Inaugural Session
  • Physical Technical Session 1A
  • Physical Technical Session 1B
  • Physical Technical Session 1C
  • Physical Technical Session 1D
  • Physical Technical Session 2A
  • Physical Technical Session 2B
  • Physical Technical Session 2C
  • Physical Technical Session 2D
  • Virtual Room 1A
  • Virtual Room 1B
  • Virtual Room 1C
  • Virtual Room 1D
  • Virtual Room 1E
  • Virtual Room 1F
  • Virtual Room 2A
  • Virtual Room 2B
  • Virtual Room 2C
  • Virtual Room 2D
  • Virtual Room 2E
  • Virtual Room 2F
  • Virtual Room 2G
  • Virtual Room 3A
  • Virtual Room 3B
  • Virtual Room 3C
  • Virtual Room 3D
  • Virtual Room 3E
  • Virtual Room 3F
  • Virtual Room 3G
  • Virtual Room 7A
  • Virtual Room 7B
  • Virtual Room 7C
  • Virtual Room 7D
  • Virtual Room 7E
  • Virtual Room 7F
  • Virtual Room 7G
  • Virtual Room 8A
  • Virtual Room 8B
  • Virtual Room 8C
  • Virtual Room 8D
  • Virtual Room 8E
  • Virtual Room 8F
  • Virtual Room 8G
  • Virtual Room 9A
  • Virtual Room 9B
  • Virtual Room 9C
  • Virtual Room 9D
  • Virtual Room 9E
  • Virtual Room 9F
  • Virtual Room 9G
  • Virtual Room_10A
  • Virtual Room_10B
  • Virtual Room_10C
  • Virtual Room_10D
  • Virtual Room_10E
  • Virtual Room_10F
  • Virtual Room_10G
  • Virtual Room_11A
  • Virtual Room_11B
  • Virtual Room_11C
  • Virtual Room_11D
  • Virtual Room_11E
  • Virtual Room_11F
  • Virtual Room_11G
  • Virtual Room_12A
  • Virtual Room_12B
  • Virtual Room_12C
  • Virtual Room_12D
  • Virtual Room_12E
  • Virtual Room_12F
  • Virtual Room_12G