{"id":1021,"date":"2025-09-25T18:38:13","date_gmt":"2025-09-25T18:38:13","guid":{"rendered":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/?page_id=1021"},"modified":"2025-10-22T13:41:24","modified_gmt":"2025-10-22T13:41:24","slug":"aiccsa-2025-program","status":"publish","type":"page","link":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/aiccsa-2025-program\/","title":{"rendered":"AICCSA 2025 Program"},"content":{"rendered":"\n<div id=\"section-g-11i1iyo\" class=\"wp-block-gutentor-e6 section-g-11i1iyo gutentor-element gutentor-element-image\"><div class=\"gutentor-element-image-box\"><div class=\"gutentor-image-thumb\"><img decoding=\"async\" class=\"normal-image\" src=\"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-content\/uploads\/2025\/10\/Prog-5.jpg\"\/><\/div><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong><mark style=\"background-color:#ffffff\" class=\"has-inline-color has-vivid-red-color\">Rooms (and online Teams Links) Table:<\/mark><\/strong><\/h1>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Room 1<\/mark><\/strong>: &nbsp;&nbsp;&nbsp;Al-Thuraya A <mark style=\"background-color:#ffffff\" class=\"has-inline-color has-vivid-red-color\">(<strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ameeting_NDg2MzhlMmItMThhZi00M2FjLWI5YTgtYjA0ZWU3NWE0NmZl%40thread.v2\/0?context=%7b%22Tid%22%3a%22bb3e9d2a-3b46-4675-82e6-ecc94aef3c7a%22%2c%22Oid%22%3a%221b277398-5580-4d5f-9bab-4eff49e70746%22%7d\">Online Teams Link 1<\/a><\/strong>)<\/mark><br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Room 2<\/mark><\/strong>: &nbsp;&nbsp;&nbsp;Nejma (<strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ameeting_MDE5ZTliZGYtOWM0Ni00OTgwLWIwZWMtMzI4Zjk0ZWQ1Nzg3%40thread.v2\/0?context=%7b%22Tid%22%3a%22bb3e9d2a-3b46-4675-82e6-ecc94aef3c7a%22%2c%22Oid%22%3a%221b277398-5580-4d5f-9bab-4eff49e70746%22%7d\">Online Teams Link 2<\/a><\/strong>)<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Room 3<\/mark><\/strong>:&nbsp;&nbsp;&nbsp; Sama (<strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ameeting_MzNlZDM1NGItMjY4MC00NWZiLWFjMTEtNWU0OWNlYTA0YjJl%40thread.v2\/0?context=%7b%22Tid%22%3a%22bb3e9d2a-3b46-4675-82e6-ecc94aef3c7a%22%2c%22Oid%22%3a%221b277398-5580-4d5f-9bab-4eff49e70746%22%7d\">Online Teams Link 3<\/a><\/strong>)<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Room 4:<\/mark><\/strong> &nbsp;&nbsp;&nbsp;Rimal &amp; Sahara (<strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ameeting_N2JjMjBlMmQtZWQ1NS00OTg4LWEzZDAtZGY4OTdiMDkxNThk%40thread.v2\/0?context=%7b%22Tid%22%3a%22bb3e9d2a-3b46-4675-82e6-ecc94aef3c7a%22%2c%22Oid%22%3a%221b277398-5580-4d5f-9bab-4eff49e70746%22%7d\">Online Teams Link 4<\/a><\/strong>)<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Main Hall<\/mark><\/strong>: Al Thuraya B (<strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ameeting_Yzg5ZGIxZjEtYWJiMS00NTkzLTg2NzgtNjFiMjk1OGIwNWFl%40thread.v2\/0?context=%7b%22Tid%22%3a%22bb3e9d2a-3b46-4675-82e6-ecc94aef3c7a%22%2c%22Oid%22%3a%2256ea6568-5635-42a0-89ed-702611113c77%22%7d\">Online Teams Link 5<\/a><\/strong>)<\/h3>\n\n\n\n<hr class=\"wp-block-separator alignwide has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><strong>AICCSA 2025 &#8211; Program<\/strong><\/mark><\/h2>\n\n\n\n<p><strong>Sunday, 19 October<\/strong><\/p>\n\n\n\n<p><strong>Session 1: AI4GOOD Workshop<\/strong><br>Time: 11:00 \u2013 12:30<br>Room 1: Al-Thuraya A<br>Session Chair: Mahmoud Barhamgi, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 26 \u2013 Enhanced Construction Projects Compliance Prediction with Machine Learning. Adnan Abdelkarim and Uzair Ahmad.<\/li>\n\n\n\n<li>Paper 2925 \u2013 Exploring the Complexities and Possibilities of Digital Twin Technology. Ziqing Gong and Usama Mir.<\/li>\n\n\n\n<li>Paper 5710 \u2013 Enhancing Intrusion Detection Systems (IDS) with Synthetic Data. Usama Mir and Ubaid Abbasi.<\/li>\n\n\n\n<li>Paper 7825 \u2013 ELENIDS: An EnsembLE Network-based Intrusion Detection System. Mariagrazia Fugini, Virgilio Cusano and Emilio Fattibene.<\/li>\n\n\n\n<li>Paper 2679 \u2013 A Distributed RAG-based Framework for Automated Extraction of Information from Multiple Types of Resources. Charbel El Gemayel, Joseph El Gemayel and Joseph Constantin.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 2: Symposium &#8211; AI Applications<\/strong><strong><br><\/strong>Time: 11:00 \u2013 12:30<br>Room 2: Nejma<br>Session Chair: Dimitrios Katsaros, University of Thessaly.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 434 \u2013 Decoupling Tracking and Segmentation: Introducing VOST for Efficient Video Object Segmentation. Islam Osman and Mohamed Shehata.<\/li>\n\n\n\n<li>Paper 4215 \u2013 Energy Optimization of 6G V2X Networks through Federated and Deep Reinforcement Learning. Mahdia Slimi, Ibtissem Brahmi and Faouzi Zaraii.<\/li>\n\n\n\n<li>Paper 4536 \u2013 Beyond the Black Box: A Hybrid SHAP-LIME Approach for Transparent and Explainable Deep Neural Networks. Zina Tayari and Mourad Zaied.<\/li>\n\n\n\n<li>Paper 1553 \u2013 Predicting Digital Literacy Gains in Rural Contexts Using Multidimensional Data: A Machine Learning Approach. Sameher Ajili, Rym Cheour, Mariem Abid, Mouna Baklouti and Richard Hotte.<\/li>\n\n\n\n<li>Paper 3587 \u2013 Structured Comprehensive Textual Representations for Medical Vision-Language Pretraining. Youssef Ibrahim, Anabia Sohail, Sajid Javed, Hasan Al Marzouqi and Naoufel Werghi.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 3: PhD Forum<\/strong><br>Time: 11:00 \u2013 12:30<br>Room 3: Sama<br>Session Chair: Yannis Manolopoulos, University of Nicosia<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 588 \u2013 Towards a GenAI-Driven Gamified Platform for Supporting Social Turn-Taking in Autistic Children. Kahina Foudad and Dena Al-Thani.<\/li>\n\n\n\n<li>Paper 1957 \u2013 Towards A Model-Driven Framework Integrating XAI and Formal Methods for Medical CPS Design. Feryel Benina, Zakaria Benzadri, Faiza Belala and Ahmed Hadj Kacem.<\/li>\n\n\n\n<li>Paper 5078 \u2013 Towards a Driven Specific Modeling Language for Deep Neural Networks. Angham Boukhari, Ahmed Hadj Kacem, Faiza Belala and A\u00efcha Choutri.<\/li>\n\n\n\n<li>Paper 5886 \u2013 Building A Comprehensive Ontology for Arabic Islamic Resources. Rana Zayed, Bashar Al-Shboul and Dana Al-Qudah.<\/li>\n\n\n\n<li>Paper 5987 \u2013 Towards an Explainable Framework for Personalized Treatment Recommendations. Mohamed Ouassim Labraoui, Zakaria Benzadri and Naila Marir.<\/li>\n\n\n\n<li>Paper 775 \u2013 MAS4D: Advanced Multi-Agent Simulations for Sustainable Urban Air Mobility. Mahshid Sarafraz, Besma Zeddini, Vincent Gauthier and Stephane Serfaty.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 4: Symposium &#8211; Privacy and Security<\/strong><br>Time: 11:00 \u2013 12:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Dr. Hussein Hazimeh, Lebanese University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 1830 \u2013 ForenSys: Semantic Assistant for Expressive Cyber Forensics in Connected Vehicles. Amani Abou-Rida, Hamza Khemissa, Karam Bou Chaaya and Helmi Rais.<\/li>\n\n\n\n<li>Paper 1854 \u2013 Privacy Perceptions Among Saudis: Theory and Empirical Insights. Suaad Alarifi.<\/li>\n\n\n\n<li>Paper 2360 \u2013 Can Diffusion-Based Posterior Smoothing Secure GNNs from Membership Inference Attacks? Abdellah Jnaini.<\/li>\n\n\n\n<li>Paper 4560 \u2013 EECG: An Efficient and Scalable Blockchain Solution for Securing Two-Way Cryptographic Communications in Smart Grids. Ahmad El-Hajj, Alaa Awad Abdellatif, Mohammed Al-Husseini, Wassim El-Hajj, Hazem Hajj, Khaled Shaban and Rabih A. Jabr.<\/li>\n<\/ul>\n\n\n\n<p>12:30-14:00 \u2013 Lunch<\/p>\n\n\n\n<p><strong>Session 5: AI4GOOD Workshop<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 1: Al-Thuraya A<br>Session Chair: Mahmoud Barhamgi, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 8548 \u2013 Flow and Thermal Prediction in a Lid-Driven Cavity with a Rotating Cylinder Using Machine Learning. Khalil Khanafer.<\/li>\n\n\n\n<li>Paper 9358 \u2013 Benchmarking Deep Learning Models for Detecting SSRF Vulnerabilities: A Comparative Study. Jema David Ndibwile, Jacqueline Mukamisha, Aline Iradukunda and Elyse Manzi.<\/li>\n\n\n\n<li>Paper 6946 \u2013 Assessing Public Acceptance of Autonomous Vehicles in Saudi Arabia. Asaeyl Alahmadi, Salma Elhag and Maram Meccawy.<\/li>\n\n\n\n<li>Paper 7503 \u2013 Ethical Implications Regulation of Deep fake: A Business Process Approach. Salma Elhag.<\/li>\n\n\n\n<li>Paper 9916 \u2013 Building a Large Dataset of Genome Mutations Associated with Antibiotic Resistance in Mycobacterium tuberculosis. Jihad Al Akl, Chady Abou Jaoude, Zahi Al Chami, David Laiymani, Christophe Guyeux and Christophe Sola.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 6: Symposium &#8211; AI Applications<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 2: Nejma<br>Session Chair: Dimitrios Katsaros, University of Thessaly.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 398 \u2013 Support Set-Based Retrieval-Augmented Generation for Multimodal Media Summarization. Ahror Belaid, Katia Bair, Khawla Belgacem, Said Yahiaoui, Djamal Belazzougui and Abdesalam Amrane.<\/li>\n\n\n\n<li>Paper 4425 \u2013 How Is AI Used for User Representation?: An Analysis of 83 Persona Prompts. Joni Salminen, Danial Amin and Bernard Jansen.<\/li>\n\n\n\n<li>Paper 4983 \u2013 Weather-Aware Transformer for Real-Time Route Optimization in Drone-as-a-Service Operations. Kamal Mohamed, Lillian Wassim, Ali Hamdi and Khaled Shaban.<\/li>\n\n\n\n<li>Paper 7776 \u2013 LAMPAS: LLM-driven Adaptive Multi-factor Personalised Learning System. Reda Bendraou, Fatima Gul Zeb, Aziza Mohammed, Warda Irfan, Kalysha Utama, Fatima Anwar Safir and Ali Ahmad.<\/li>\n\n\n\n<li>Paper 8778 \u2013 MHA-DQN: Personalized Route Planning for Asthma Patients Using Multi-Head Attention and Deep Reinforcement Learning. Nada Ayman, Shaimaa Alaa, Ali Hamdi, Khaled Shaban and Hozaifa Kassab.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 7: Symposium &#8211; Medical Informatics<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 3: Sama<br>Session Chair: Yannis Manolopoulos, University of Nicosia<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 765 \u2013 Privacy-Preserving Machine Learning for Heart Disease Detection Using Fully Homomorphic Encryption. Mayssa Dziri, Haifa Touati, Mohamed Hadded, Hakim Ghazzai, Omar Kassem Khalil and Anis Laouiti.<\/li>\n\n\n\n<li>Paper 4158 \u2013 BRAIN-CNet: A Segmentation-guided Framework for Brain Tumor Detection and Classification from MRI Scans. Namya Musthafa, Mohammad Mehedy Masud and Qurban Memon.<\/li>\n\n\n\n<li>Paper 7076 \u2013 A Mobile Game for Enhancing Diabetes Awareness: A Pilot Study. Amani Al-Ajlan.<\/li>\n\n\n\n<li>Paper 9094 \u2013 Information Reasoning and Question Answering in Healthcare: A PubMedQA Benchmark Study. Dina Sayed and Heiko Schuldt.<\/li>\n\n\n\n<li>Paper 9976 \u2013 TextAge: Evaluating Large Language Models for Historical Text Dating. Michael P. Oakes, Azizur Rahman, Rushikesh Hiray, Laraib Hasan, Mohammad Hijjawi, Shubham Srivastava, Paras Nigam and Sayed Javed Ali.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 8: AA2S Special Track<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Dr. Richard Chbeir University of Pau<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 4845 \u2013 PRISM-AI: A Dual-Stage Neuro-Symbolic Agentic Framework for Privacy Risk Mitigation in LLMs. Sabrine Amri, Nora Boulahia-Cuppens and Fr\u00e9d\u00e9ric Cuppens.<\/li>\n\n\n\n<li>Paper 3537 \u2013 Attack Classification Using Retrieval-Augmented Generation and Large Language Models. Ivan Kawaminami, Mohammad Wali Ur Rahman, Jin Bai and Salim Hariri.<\/li>\n\n\n\n<li>Paper 6952 \u2013 ClaimVerAgents: A Multi-Agent Retrieval-Augmented Claim Verification Framework. Dorsaf Sallami, Sabrine Amri and Esma A\u00efmeur.<\/li>\n\n\n\n<li>Paper 2568 \u2013 Data-Aware Clustered Federated Learning in WSNs for Natural Disaster Management. Zouheir Belfeki, Moez Krichen, Mondher Bouazizi and Salah Zidi.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 9: AI4GOOD Workshop<\/strong><br>Time: 16:00 \u2013 17:30<br>Room 1: Al-Thuraya A<br>Session Chair: Mahmoud Barhamgi, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 4714 \u2013 From Annotation to Detection: Evaluating LLMs for Hate Speech and Stereotype Identification in Italian. Fatemeh Mohammadi, Samira Maghool and Paolo Ceravolo.<\/li>\n\n\n\n<li>Paper 5083 \u2013 AgriFormer: Advancing 3D LiDAR-based Biomass Prediction through Hierarchical Feature Learning. Malik Shahzaib Khan, Faareh Ahmed, Abdul Wahab, Zuhair Zafar, Karsten Berns and Muhammad Moazam Fraz.<\/li>\n\n\n\n<li>Paper 1703 \u2013 Analyzing and Designing Complex Systems Using GraphQL. Thomas Gyeera, Diya Ram Mohan, Jayson Urena, Houda Lahrouz and Mark Montels.<\/li>\n\n\n\n<li>Paper 5779 \u2013 Giving a Voice: A Novel Approach Combining Visual and Product-based Applications to Sign Language Translation. Ibrahim Aldrees, Saad Aldoihi and Khalid Albalaihid.<\/li>\n\n\n\n<li>Paper 7365 \u2013 Evaluating Arabic Language Embedding Models for Semantic Retrieval in Fatwas. Hassan Ben Ayed, Omar Cheikhrouhou and Habib Hamam.<\/li>\n<\/ul>\n\n\n\n<p><strong>Monday, 20 October<\/strong><\/p>\n\n\n\n<p>Conference Opening Ceremony<\/p>\n\n\n\n<p>09:00-09:05 \u2013 Welcome Word, Prof. Salim Hariri, <em>Chair of AICCSA Steering Committee.<\/em><\/p>\n\n\n\n<p>09:05-09:15 \u2013 Welcome Word, Prof. Aiman Erbad, <em>General Chair, VP of Research, Qatar University.<\/em><\/p>\n\n\n\n<p>09:15-09:30 \u2013 AICCSA 2025 Program, Prof. Yannis Manolopoulos, PC Chair University of Nicosia.<\/p>\n\n\n\n<p>09:30-10:30 \u2013 Keynote 1: Prof. Dr. Aziz Mohaisen, \u201c<em>AI in Cybersecurity: Attribution, Inference, and the Attack\u2013Defense Arms Race<\/em>\u201d<\/p>\n\n\n\n<p>Hall: Al Thuraya B<\/p>\n\n\n\n<p><strong>Session 10: Track 1 &#8211; Advanced Computing Applications<\/strong><br>Time: 11:00 \u2013 12:30<br>Room 1: Al-Thuraya A<br>Session Chair: Akram Hakiri, University of Pau &amp; Pays de l&#8217;Adour, France<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 4065 \u2013 KoHPCG \u2013 High-Performance Conjugate Gradient Benchmark Program on Kokkos Performance Portability Ecosystem. Muhammad Rizwan, Jaeyoung Choi and Yoonhee Kim.<\/li>\n\n\n\n<li>Paper 4307 \u2013 Swarm-Optimized BiLSTM-Attention Model for Adaptive Irrigation Scheduling in Precision Agriculture. Bassem Sellami, Maher Jabberi, Akram Hakiri and Samira El Yacoubi.<\/li>\n\n\n\n<li>Paper 8423 \u2013 Learning-Driven Dutch Auction for UAV-assisted Weather Nowcasting Task Offloading. Soumeya Demil, Mohammed Riyadh Abdmeziem and Yacine Challal.<\/li>\n\n\n\n<li>Paper 556 \u2013 Towards a Uniform Description Language for the Social Integration of Smart Objects. Olfa Dallel, Elhadj Benkhelifa and Nadia Kabachi.<\/li>\n\n\n\n<li>Paper 4272 \u2013 Conceptual Use Case for Learning Public Health Systems as a Service. Nabil Badr.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 11: Track 2 &#8211; Technical Aspects of Security<\/strong><br>Time: 11:00 \u2013 12:30<br>Room 2: Nejma<br>Session Chair: Rasheed Hussain, University of Bristol<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 58 \u2013 Exploiting ftrace\u2019s function_graph Tracer Features for Machine Learning: A Case Study on Encryption Detection. Kenan Begovic, Abdulaziz Al-Ali and Qutaibah Malluhi.<\/li>\n\n\n\n<li>Paper 153 \u2013 Decentralized Post-Quantum Authentication Protocol for Drone Communication Networks. Edoukou Berenger Ayebie, Elie Noumon Allini, Karam Bou-Chaaya and Helmi Rais.<\/li>\n\n\n\n<li>Paper 408 \u2013 A Comprehensive Comparison of LLaMA 3.1 and Traditional ML Approaches in Automated Vulnerability Detection. Ahmed Sajwani, Fatima Alkaabi, Amr Tamer, Mohamed Yaqoob and Panos Liatsis.<\/li>\n\n\n\n<li>Paper 2638 \u2013 Enhancing Transparency in Android Privacy Policies via LLM-Based Permission Mapping. Ali Alkinoon and David Mohaisen.<\/li>\n\n\n\n<li>Paper 7128 \u2013 Dual\u2010Path Phishing Detection: Integrating Transformer\u2010Based NLP with Structural URL Analysis. Ibrahim Altan, Abdulla Bachir, Yousuf Parbhulkar, Abdul Muksith Rizvi and Moshiur Farazi.<\/li>\n\n\n\n<li>Paper 7834 \u2013 An Infrastructure for Managing AI Bias in Complex Web Systems. Sebastian Heil, Jannatul Ferdous, Abubaker Gaber and Martin Gaedke.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 12: Track 3 &#8211; Data Engineering and Ontologies<\/strong><br>Time: 11:00 \u2013 12:30<br>Room 3: Sama<br>Session Chair: Haytham Elghazel, Lyon1 University.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 4149 \u2013 Ontological Modeling of Kubernetes Clusters Leveraging In-Memory Dependency Graphs. Anouar Jridi, Marouen Kachroudi, Marius Zaharia and Mohamed Farah.<\/li>\n\n\n\n<li>Paper 4340 \u2013 Representing Religious Practices via AI-Generated Personas: A Case Study of Ramadan Behaviors from Four Predominantly Muslim Countries. Leen Alqadi, Soon-Gyo Jung, Danial Amin, Amani Alabed, Joni Salminen and Bernard Jansen.<\/li>\n\n\n\n<li>Paper 7546 \u2013 Predicting Stock Trends in Emerging Markets with Multi-Source Data: A Study on the Qatar Stock Exchange. Marwan Sayed, Alhasan Mahmood, Youssef Ahmed, Muhammad Muaz Khan and Saleh Alhazbi.<\/li>\n\n\n\n<li>Paper 8834 \u2013 Ensemble Hallucination Detection in Arabic Large Language Models: A Multi-Modal Linguistic and Self-Consistency Approach. Abderrahmane Maaradji, Abdelhak Mehadjbia and Oussama Djedidi.<\/li>\n\n\n\n<li>Paper 9065 \u2013 Bridging Language Models and Formal Methods for Intent-Driven Optical Network Design. Anis Bekri, Amar Abane, Abdella Battou and Saddek Bensalem.<\/li>\n\n\n\n<li>Paper 852 \u2013 From Incomplete Data to Accurate Aggregation: Exploring the Accuracy-Efficiency Trade-off of Data Imputation Methods. Linda Mohammed, Heba Helal and Mohamed Sharaf.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 13: Track 4 &#8211; Theoretical Issues<\/strong><br>Time: 11:00 \u2013 12:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Belkacem Chikhaoui, TELUQ University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 1200 \u2013 A Monte-Carlo Method for Designing Compressed Sensing Measurement Matrices, with Applications to Robot Path Planning and Environmental Sensing. Alghalya Al-Hajri, Ejmen Al-Ubejdij, Aiman Erbad and Ali Safa.<\/li>\n\n\n\n<li>Paper 3030 \u2013 Quantum Long Short-Term Memory for Sequence Prediction. Belkacem Chikhaoui.<\/li>\n\n\n\n<li>Paper 3977 \u2013 Incremental learning approach using fuzzy logic to mitigate catastrophic forgetting. Livia Alexandre and Cleber Zanchettin.<\/li>\n\n\n\n<li>Paper 4686 \u2013 Multi-Modal Sentiment Analysis with Dynamic Attention Fusion. Sadia Abdulhalim, Muaz Albaghdadi and Moshiur Farazi.<\/li>\n\n\n\n<li>Paper 8487 \u2013 Seq2Seq Model Implementation for ADE Prediction Using MedDRa and FAERS Data. Rasha Assaf, Amjad Rattrout, Mohammed Khalilia and Rashid Jayousi.<\/li>\n<\/ul>\n\n\n\n<p>12:30-14:00 \u2013 Lunch<\/p>\n\n\n\n<p><strong>Session 14: Track 1 &#8211; Advanced Architectures<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 1: Al-Thuraya A<br>Session Chair: Akram Hakiri, University of Pau &amp; Pays de l&#8217;Adour, France.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 3900 \u2013 A Data-driven Analysis of Code Optimizations. Akram Badreddine Laissaoui and Riyadh Baghdadi.<\/li>\n\n\n\n<li>Paper 2976 \u2013 A Deep Learning Model for Predicting Transformation Legality. Avani Tiwari, Yacine Hakimi and Riyadh Baghdadi.<\/li>\n\n\n\n<li>Paper 6251 \u2013 Protocol-Aware Hybrid Clustering for IoT: Adaptive Reconfiguration and Secure Communication with MQTT\/CoAP Integration. Osama Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Bashair Alrashed and Ibrahim Haddadi.<\/li>\n\n\n\n<li>Paper 6638 \u2013 SimBench-HSS: A Configurable Simulation Framework for Evaluating Hierarchical Storage Architectures in Cloud Systems. Mohammad Akef Habbal and Qutaibah Malluhi.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 15: Track 2 &#8211; Deep Learning<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 2: Nejma<br>Session Chair: Rasheed Hussain, University of Bristol<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 2605 \u2013 Privacy-preserving Back-propagation for Training a Deep Learning Remote Model in Pervasive Health Monitoring Environments with Constrained Client-side. Amine Boulemtafes, Abdelouahid Derhab and Yacine Challal.<\/li>\n\n\n\n<li>Paper 3911 \u2013 Privacy in Generative AI: Understanding User Concerns, Trust, and Awareness. Hamda Al Breiki, Qusay Mahmoud, Thani Al-Riyami and Khaled Abdulrahim Aljneibi.<\/li>\n\n\n\n<li>Paper 4245 \u2013 A Distributed Federated Learning Framework for Privacy-Preserving ADHD Diagnosis. Okba Ben Atia, Mustafa Al Samara, Ismail Bennis and Aiman Erbad.<\/li>\n\n\n\n<li>Paper 4692 \u2013 Hybrid Semantic-Structural Learning for URL Multi-Classification Using DistilBERT and Feature Engineering. Noshina Tariq, Khulud Salem Alshudukhi, Muhammad Haroon Wajid, Mamoona Humayun and Hamid Jahankhani.<\/li>\n\n\n\n<li>Paper 8704 \u2013 Optimizing IoT Botnet Detection: A Comparative Study of Machine Learning and Feature Engineering Strategies. Mustafa Al Lail.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 16: Track 3 &#8211; Data Science Meets AI<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 3: Sama<br>Session Chair: Haytham Elghazel, Lyon1 University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 621 \u2013 Anomaly Detection in Automotive CAN Networks Using a Hybrid Approach. Abdelkader Berrouachedi, Rakia Jaziri and Gilles Bernard.<\/li>\n\n\n\n<li>Paper 2978 \u2013 Deep Reinforcement Learning for Energy-Aware and Time-Efficient Scheduling in Industry 4.0. Houssem Eddine Ounissi, Khaled Benfriha, Abdelhak Belhi and Abdelaziz Bouras.<\/li>\n\n\n\n<li>Paper 8631 \u2013 A Fuzzy and Multiple-context Approach for Semantic Similarity by Using BabelNet. Anna Formica, Ida Mele and Francesco Taglino.<\/li>\n\n\n\n<li>Paper 8675 \u2013 Unsupervised Learning for Intelligent Driver Profiling. Ilyes Zeroual, Rakia Jaziri and Gilles Bernard.<\/li>\n\n\n\n<li>Paper 9437 \u2013 Interpretable At-Risk Student Prediction Using XGBoost and Behavioral Autoencoder on OULAD. Ahlem Makni, Wael Ouarda, Khouloud Boukadi and Mourad Abed.<\/li>\n\n\n\n<li>Paper 3023 \u2013 Prompt-Based Recommendation with In-Context Learning and Category-Enriched Modeling. Ichrak Ennaceur, Haytham Elghazel, Alexandre Aussem, Guillaume Lefebvre and Matthieu Sonnati.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 17: Track 4 &#8211; Applied Artificial Intelligence<\/strong><br>Time: 14:00 \u2013 15:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Belkacem Chikhaoui, TELUQ University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 4269 \u2013 Language Models for Disinformation Detection: To be Large or to be Small? Ioannis Kalamakis, Sotiria Liappi, Dimitrios Papakostas and Dimitrios Katsaros.<\/li>\n\n\n\n<li>Paper 6076 \u2013 Dental Age Estimation From Mandibular Teeth in Jordanian Population. Mohamed Osman, Mohamed Elshrif, Muna Shaweesh, Khaled Shaban, Raidan Ba Hattab, Elham Abu Alhaija and Ridha Hamila.<\/li>\n\n\n\n<li>Paper 7441 \u2013 Integrating Structural Graphs and Cross-Attention for Drug\u2013Target Interaction Prediction. Khadidja Henni, Leila Hamdad, Lina Abou-Abbas and Neila Mezghani.<\/li>\n\n\n\n<li>Paper 7960 \u2013 Assessing the Efficiency of One-shot Visual Object Trackers for Underwater Robot Position Locking. Waqas Aman, Ali Al-Zawqari, Farida Mohsen, Saif Al-Kuwari and Ali Safa.<\/li>\n\n\n\n<li>Paper 2940 \u2013 Intelligent Mobile Learning Application Using Large Model Language. Ahmed Ewais and Sirien Jaradat.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 18: Track 1 &#8211; Learning-Based Optimized Architectures<\/strong><br>Time: 16:00 \u2013 17:30<br>Room 1: Al-Thuraya A<br>Session Chair: Akram Hakiri, University of Pau &amp; Pays de l&#8217;Adour, France<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 721 \u2013 A Modular Framework for Hierarchical Federated Learning with Multi-Key Homomorphic Encryption. Ashika Sameem Abdul Rasheed and Mohammad Mehedy Masud.<\/li>\n\n\n\n<li>Paper 3784 \u2013 Federated Learning-Based Resource AlRoom in Fog-Cloud Computing for Electric Vehicle Charging Stations. Ibtissem Mokni, Sonia Yassa, Stephane Zuckerman, Olivier Romain and Omri Mohamed Nazih.<\/li>\n\n\n\n<li>Paper 7683 \u2013 Intrusion Detection Systems for IoT Using Federated Learning. Amal Alkabkabi, Asmaa Cherif and Suhair Alshehri.<\/li>\n\n\n\n<li>Paper 9826 \u2013 AFA-DPD: Adaptive Federated Approach using Data Poisoning Detection. Hanen Hamdani, Emna Benmohamed and Hela Ltifi.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 19: Track 2 &#8211; Cybersecurity Technicalities<\/strong><br>Time: 16:00 \u2013 17:30<br>Room 2: Nejma<br>Session Chair: Rasheed Hussain, University of Bristol<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 5332 \u2013 Multi-Stage Payload Execution with Fragmented Double-Layer Encoding. Arash Mahboubi, Keyvan Ansari and Seyit Camtepe.<\/li>\n\n\n\n<li>Paper 5855 \u2013 Cryptanalysis and Improvement of an Authentication Scheme for Fog Environments. Pierre Abi-Char.<\/li>\n\n\n\n<li>Paper 8418 \u2013 Collusion-Resilient Traitor Tracing via 3D Video Provenance Analysis. Karama Abdelhedi, Faten Chaabane, William Puech and Chokri Ben Amar.<\/li>\n\n\n\n<li>Paper 8942 \u2013 A Comprehensive Evaluation of Tor Path Selections Across Network Scales. Siddique Abubakr Muntaka and Jacques Bou Abdo.<\/li>\n\n\n\n<li>Paper 9787 \u2013 MultiFuzz: A Dense Retrieval-based Multi-Agent System for Network Protocol Fuzzing. Youssef Maklad, Fares Wael, Ali Hamdi, Wael Elsersy and Khaled Shaban.<\/li>\n\n\n\n<li>Paper 3793 \u2013 RBFL: Securing Federated Learning against Data Poisoning Using a Reputation-based Approach. Abdul Rehman, Issiaka Ischolla Mazu, Fehmi Jaafar, Darine Ameyed and Hamdi Ben Abdessalem.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 20: Track 3 &#8211; Data Science Applications<\/strong><br>Time: 16:00 \u2013 17:30<br>Room 3: Sama<br>Session Chair: Haytham Elghazel, Lyon1 University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 648 \u2013 Two-Stage Quranic QA via Ensemble Retrieval and Instruction-Tuned Answer Extraction. Mohamed Basem, Islam Oshallah, Ali Hamdi, Khaled Shaban and Hozaifa Kassab.<\/li>\n\n\n\n<li>Paper 4369 \u2013 Data-Driven Optimization of Photovoltaic Maintenance in Hotel Networks. Chedli Damak, Boukthir Haddar, Mohamed Ali Elleuch, Ahmed Frikha and Mohamed Benaouicha.<\/li>\n\n\n\n<li>Paper 4517 \u2013 Mitigating the Capacity Gap in Knowledge Distillation via Iterative Tutoring. Sara Karam, Ralph Aouad, Joseph Attieh and Joe Tekli.<\/li>\n\n\n\n<li>Paper 5061 \u2013 Sweet Deception: Detecting Honey Adulteration Using Generative AI and Hyperspectral Imaging. Safa Khaloui, Leila Ben Othman, Akram Hakiri and Hella Kaffel.<\/li>\n\n\n\n<li>Paper 9938 \u2013 Data-Driven Forecasting of Refugee Displacement Using Machine and Deep Learning Models with XAI. Ibrahim Sani, Umar Hasan, Raihan Sharif, Tahfeem Islam Siam, Md Alamgir Hossain and Riasat Khan.<\/li>\n\n\n\n<li>Paper 7121 \u2013 The Recommendation Conundrum: A deeper look at transformer models for next basket prediction. Maxime Pegane and Besma Zeddini.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 2205 \u2013 Computing Semantic Relatedness between Named Entities in DBpedia Fancesco Taglino.<\/li>\n\n\n\n<li>Paper 2688 \u2013 FastRAG: Retrieval Augmented Generation for Semi-structured Data. Amar Abane, Anis Bekri, Abdella Battou and Saddek Bensalem.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 21: Track 4 &#8211; Deep Learning<\/strong><br>Time: 16:00 \u2013 17:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Dr. \u00c7a\u011fatay \u00c7atal, Qatar University.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 3631 \u2013 A Modular Federated Learning Framework for Privacy-Aware Food Adulteration Detection. Safa Khaloui, Leila Ben Othman, Akram Hakiri and Hella Kaffel.<\/li>\n\n\n\n<li>Paper 6507 \u2013 Formal Concept Analysis-Guided Federated Learning (FCA-FL) for Personalized 6G Services. Khouloud Affi, Ibtissem Brahmi and Faouzi Zarai.<\/li>\n\n\n\n<li>Paper 8549 \u2013 Deep Learning for Discriminating Essential Tremor from Parkinson&#8217;s Disease via Handwriting Analysis. Mohamed Azlouk, Thameur Dhieb, Islem Jarraya, Mohamed Neji, Nouha Farhat, Sirine Sellami, Tarek M. Hamdani, Mariem Damak, Chokri Mhiri and Adel M. Alimi.<\/li>\n\n\n\n<li>Paper 9621 \u2013 Explainable Ensemble Learning for Early Diagnosis of Alzheimer\u2019s Disease Using SHAP and FSHAP on ADNI Tabular Data. Bayan Al Durgham and Moatsum Alawida.<\/li>\n\n\n\n<li>Paper 9926 \u2013 A Review on Multi-Agent Deep Reinforcement Learning for IoT: Techniques and Applications. Fatima-Zohra Bemrah, Samir Ouchani and Azeddine Chikh.<\/li>\n<\/ul>\n\n\n\n<p>18:00-20:00 \u2013 Reception.<\/p>\n\n\n\n<p>&nbsp;Location: Pool &amp; Terrace<\/p>\n\n\n\n<p><strong>Tuesday, 21 October<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>Session 22: Track 5 &#8211; Arabic Language Processing<\/strong><br>Time: 08:30-10:30<br>Room 1: Al-Thuraya A<br>Session Chair: Ali Jaoua, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 532 \u2013 Multilingual Model Enhancement Framework using a Human-Centered Approach for Arabic Spam Detection. Saleh Alqahtani, Raddad Faqihi, Priyadarsi Nanda and Bashair Alrashed.<\/li>\n\n\n\n<li>Paper 3392 \u2013 SAGE: Semantic Adaptation of Graph Embeddings for Arabic Entity Linking. Fouad Al Tfaily, Hussein Hazimeh, Ali Takach, Hatem El Zein, Hassan Harb, and Ali Jaber.<\/li>\n\n\n\n<li>Paper 5510 \u2013 An Ensemble Classification Approach in A Multi-Layered Large Language Model Framework for Disease Prediction. Ali Hamdi, Malak Mohamed, Rokaia Emad and Khaled Shaban.<\/li>\n\n\n\n<li>Paper 8820 \u2013 Mitigating Bias in Arabic NLP: A Framework for Ethical and Inclusive Data Preparation. Eiman Al-Shammari.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 23: Track 6 &#8211; Multimedia Applications<\/strong><br>Time: 08:30-10:30<br>Room 2: Nejma<br>Session Chair: Layth Sliman, EFREI Research Lab<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 7000 \u2013 Towards Smart Glasses as Visual Field Compensation for visually impaired patients. Imen Rjab, Layth Sliman and Ines Drira.<\/li>\n\n\n\n<li>Paper 1798 \u2013 Deep Fusion of Ultra-Low-Resolution Thermal Camera and Gyroscope Data for Lighting-Robust and Compute-Efficient Rotational Odometry. Farida Mohsen and Ali Safa.<\/li>\n\n\n\n<li>Paper 2992 \u2013 Construction of a Mobile Headset for Automated Pupillary Motor Assessment. Marcel Schepelmann and Hans Georg Krojanski.<\/li>\n\n\n\n<li>Paper 3947 \u2013 Intelligent Road Anomaly Detection with Real-time Notification System for Enhanced Road Safety. Ali Almakhluk, Uthman Baroudi and Yasser El-Alfy.<\/li>\n\n\n\n<li>Paper 3217 \u2013 Methodological Framework for Building DENT_VQA: A Dental Panoramic X-ray Dataset for Medical VQA Systems. Hamza Mbarek, Hela Mahersia and Nabil Litayem.<\/li>\n\n\n\n<li>Paper 4752 \u2013 GMaxViT: Gabor Multi-axis Vision Transformer for Tomato Disease Identification. Hassiba Nemmour, Amine Mezenner, Mohamed Rayane Lakehal, Mohamed Lamine Bouibed, Imene Ammi, Chaima Moghrabi and Youcef Chibani.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 24: Track 2 &#8211; Cybersecurity and Attacks<\/strong><br>Time: 08:30-10:30<br>Room 3: Sama<br>Session Chair: Rasheed Hussain, University of Bristol<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 36 \u2013 Is Attention All Security Domain Needs? A Systematic Review of Self-attention Mechanism in Cybersecurity. Huiyao Dong.<\/li>\n\n\n\n<li>Paper 840 \u2013 A Scalable Framework for Insider Threat Detection Session Modelling and Class Balancing with XGBoost. Raddad Faqihi, Priyadarsi Nanda, Manoranjan Mohanty, Saleh Alqahtani and Bashair Alrashed.<\/li>\n\n\n\n<li>Paper 3368 \u2013 AI-Based Predictive Analytics for Cybersecurity Risk Prioritization Using Machine Learning. Ahood Abdullah and Sarah Abu Ghazalah.<\/li>\n\n\n\n<li>Paper 6040 \u2013 Enhancing the PGD Attack: A Dynamic Step-Size Approach for Robust Evasion on Android Malware Detection. Roshni Nawaz, Mohammed Al-Sada and Mahmoud Barhamgi.<\/li>\n\n\n\n<li>Paper 8349 \u2013 Lightweight Kerberos-based Messaging Protocol for Secure IoT Communications. Sarah Abu Ghazalah.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 25: Track 1 &#8211; Parallel and Distributing Computing<\/strong><br>Time: 08:30-10:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Akram Hakiri, University of Pau &amp; Pays de l&#8217;Adour, France<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 1375 \u2013 Smart Routing in IoV Environments: A Evolutionary-based Approach for Emergency Response Optimization. Mohamed Amine Marzouk, Ali El Kamel and Habib Youssef.<\/li>\n\n\n\n<li>Paper 1494 \u2013 QoS-Aware Routing Optimization in MANETs by an Adapted Deep Reinforcement Learning Network. Maher Jasim Al-Mashhadani and Kamel Karoui.<\/li>\n\n\n\n<li>Paper 3916 \u2013 Optimized Power Control and Bandwidth Allocation for Multi-UAV Network in Post-Disaster Scenarios. Ayman Zayyan, Ali Selamat, Alaa Abdellatif and Amr Mohamed.<\/li>\n\n\n\n<li>Paper 8362 \u2013 A Frequency-Based Quality of Service Strategy for Named Data Networks. Salwa Abdelwahed, Fatma Somaa, Haifa Touati and Mohamed Hadded.<\/li>\n\n\n\n<li>Paper 8821 \u2013 TRACED: Trust-Aware Clustering and Dynamic Role Management for Secure Edge Systems. Luigi Mastromauro, Muslum Ozgur Ozmen, Dhiego Souto Andrade and Michel Kinsy.<\/li>\n<\/ul>\n\n\n\n<p>11:00-12:00 \u2013 <strong>Keynote 2<\/strong> &#8211; Dr. Dena Al-Thani<\/p>\n\n\n\n<p>Session Chair: Chirine Ghedira, iaelyon, University of Lyon 3, France<\/p>\n\n\n\n<p>Title: From Sensing to Personalization: The A-Sense Route Toward Inclusive and Human-Centered Technologies.<\/p>\n\n\n\n<p>Hall: Al Thuraya B<\/p>\n\n\n\n<p>12:00-12:30 \u2013 Panel: Women in STEM<strong><\/strong><\/p>\n\n\n\n<p>Moderators: Chirine Ghedira, France &amp; Takoua Abdellatif, University of Carthage, Tunisia<\/p>\n\n\n\n<p><strong>Session 26: Track 5 &#8211; Large Language Models<\/strong><br>Time: 14:00-15:30<br>Room 1: Al-Thuraya A<br>Session Chair: Ali Jaoua, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 25 \u2013 Autonomous QA Data Augmentation via Open-Source LLM Agents for Metaverse Applications. Faiza Belbachir, R\u00e9my Chen, Lucas Lorang, Arthur Delfose, Nasredine Semmar, Samia Bouzefrane and Assia Soukane.<\/li>\n\n\n\n<li>Paper 38 \u2013 Beyond Stars: Bridging the Gap Between Ratings and Review Sentiment with LLM. Najla Zuhir, Amna Mohammad Salim, Parvathy Prem Kumar and Moshiur Farazi.<\/li>\n\n\n\n<li>Paper 2824 \u2013 CAKD: A Confidence-Aware Knowledge Distillation Approach for Building Compact and Efficient LLMs. Mohammad Basheer Kotit,&nbsp;Omama Hamad, Khaled Shaban, and Ali Hamdi.<\/li>\n\n\n\n<li>Paper 5287 \u2013 The Prompting Brain: Neurocognitive Markers of Expertise in Guiding Large Language Models. Hend Alkhalifa, Raneem Almansour, Layan Alhuasini, Alanood Alsaleh, Mohamad-Hani Temsah and Ashwag Alruwaili.<\/li>\n\n\n\n<li>Paper 9137 \u2013 Z-Pruner: Post-Training Pruning of Large Language Models for Efficiency without Retraining. Samiul Basir Bhuiyan, Md. Sazzad Hossain Adib, Mohammed Aman Bhuiyan, Muhammad Rafsan Kabir, Moshiur Farazi, Shafin Rahman and Nabeel Mohammed.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 27: Track 6 &#8211; Multimedia Applications<\/strong><br>Time: 14:00-15:30<br>Room 2: Nejma<br>Session Chair: Layth Sliman, EFREI Research Lab<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 27 \u2013 Robust assessment Fall Detection Architecture: Intra\/Inter-Subject and Cross-Dataset Evaluation. Khouloud Guemri, Wael Ouarda, Khouloud Boukadi, Imen Megdiche, Yohan Chasseray and Elyes Lamine.<\/li>\n\n\n\n<li>Paper 894 \u2013 Efficient Segmentation of Solar Panel Defects Using Knowledge Distillation. Shahd Shaban, Ali Hamdi and Khaled Shaban.<\/li>\n\n\n\n<li>Paper 2363 \u2013 Assessing the Suitability of Multidimensional Transpose of YUV Sequences for All-Intra Video Coding using Multi-Scale Feature Extraction and Classification. Tamer Shanableh.<\/li>\n\n\n\n<li>Paper 7853 \u2013 Yaqeen: A Mobile-Based Deep Learning Framework for Prayer Posture Recognition. Ghada Amoudi, Ritaj Albogami, Rahma Alsharif and Bushra Alsulami.<\/li>\n\n\n\n<li>Paper 8574 \u2013 A Multi-Task Convolutional Neural Network for Gaze Estimation: A From-Scratch Approach. Rawdha Karmi, Ines Rahmany and Nawres Khlifa.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 28: Track 2 &#8211; Cybersecurity and Attacks<\/strong><br>Time: 14:00-15:30<br>Room 3: Sama<br>Session Chair: Rasheed Hussain, University of Bristol<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 1953 \u2013 Challenges of Attack Automation in AI Models: Toward a Red Teaming Strategy. Hassan Chaitou, Karam Bou-Chaaya, Njaka-Harilala Andriamandratomanana and Helmi Rais.<\/li>\n\n\n\n<li>Paper 2276 \u2013 A Multi-Phase Resilient Machine Learning Architecture Against Data Poisoning Attacks. Gizem Altintarla and Salim Hariri.<\/li>\n\n\n\n<li>Paper 8255 \u2013 DoS-based Fake Task Injection for Disrupted Sensing. Mohamad Abdulkadir, Hanane Lamaazi and Ruhul Amin Khalil.<\/li>\n\n\n\n<li>Paper 8375 \u2013 Actionable Malware Intelligence: LLM-Driven Automation with MITRE ATT&amp;CK. Maher Salem and Abdel-Karim Al-Tamimi.<\/li>\n\n\n\n<li>Paper 9335 \u2013 What is Cybersecurity in Space? Charbel Mattar, Jacques Bou Abdo, Abdallah Makhoul, Beno\u00eet Piranda and Jacques Demerjian.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 29: HOPE Workshop<\/strong><br>Time: 14:00-15:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Dr. Thomas Lux, Niederrhein University of Applied Sciences<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 101 \u2013 Evaluating the Potential of Virtual Reality in Healthcare Education: A Quantitative Study Using a &#8220;Room of Errors&#8221; Delivery Room Scenario. Hana Alwafai, Thomas Lux and Lea Leeser.<\/li>\n\n\n\n<li>Paper 6195 \u2013 Integrating Gender-Sensitive Data into Clinical AI Systems: A Proof of Concept for Inclusive Healthcare. Lukas Tetz, Lisa Capitaine, Ryoko Kobayashi, Benjamin Jagusch, Thao Nguyen and Thomas Lux.<\/li>\n\n\n\n<li>Paper 988 \u2013 Early Diagnosis of Alzheimer\u2019s Disease by AI: A Hybrid Approach Based on U-Net and MobileNetV2. Keita Mahamadou and Olfa Souki.<\/li>\n\n\n\n<li>Paper 9347 \u2013 Fuzzy Choquet Ensemble Deep Learning Approach for Diabetic Retinopathy Detection. Amani Trad, Olfa Fakhfakh, Ghaith Manita and Ouajdi Korbaa.<\/li>\n<\/ul>\n\n\n\n<p>16:00-17:30 \u2013 Tutorial Session<br>Room 4: Rimal &amp; Sahara<strong><\/strong><\/p>\n\n\n\n<p><strong>Session 30: Track 5 &#8211; Arabic Language Processing<\/strong><br>Time: 16:00-17:30<br>Room 1: Al-Thuraya A<br>Session Chair: Faiza Belbachir, AGECE Lyrids ECE, Paris, France.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 4578 \u2013 Exploring the Impact of Large Language Models on Opinion Analysis in Arabic Social Media. Mohammad Alzyadneh, Feriel Benfraj and Chiraz Zribi.<\/li>\n\n\n\n<li>Paper 5344 \u2013 Scaling Arabic Medical Chatbots Using Synthetic Data: Enhancing Generative AI with Synthetic Patient Records. Abdulrahman Allam, Seif Ahmed, Ali Hamdi and Khaled Shaban.<\/li>\n\n\n\n<li>Paper 7933 \u2013 Automatic Code-switched Academic Tunisian Arabic Speech Recognition. Fatma Zahra Besdouri, In\u00e8s Zribi and Lamia Hadrich Belguith.<\/li>\n\n\n\n<li>Paper 9373 \u2013 Unlocking Additional Learning Capabilities of Whisper for Arabic Language Via Instruction Fine-tuning. Bassam Mattar, Marwan Torki and Ayman Khalafallah.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 31: Track 4 &#8211; Medical and Other Applications<\/strong><br>Time: 16:00-17:30<br>Room 2: Nejma<br>Session Chair: Nadia Kabachi, Universit\u00e9 Claude Bernard Lyon1<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 2081 \u2013 Toward EEG-Free Seizure Detection: Evidence of EEG\u2013ECG Synchronization. Hussein El Amouri, Hassan Tfaily, Khadidja Henni and Lina Abou Abbas.<\/li>\n\n\n\n<li>Paper 7327 \u2013 The Symbolic Interplay of Korean Pensive Buddha Statue and Colour: A Case Study in Thailand. Lalita Narupiyakul, Hao-An Tseng, Chen-Wei Hsieh, Khusrav Badalov, Patrick C. K. Hung, Vien Cheung, Annie Jiang and Young Yoon.<\/li>\n\n\n\n<li>Paper 8709 \u2013 Implicit Neural Representations for ECG Synthesis: What is the Potential? Nour Neifar and Achraf Ben-Hamadou.<\/li>\n\n\n\n<li>Paper 9913 \u2013 Bio-inspired Locomotion of Modular Caterpillar Robots. Joseph Gemayel, Jacques Bou Abdo, Charbel El Gemayel, Jad Bassil, Abdallah Makhoul and Jacques Demerjian.<\/li>\n<\/ul>\n\n\n\n<p>18:00-22:00 \u2013 Gala Dinner.<\/p>\n\n\n\n<p>&nbsp;Location: INTERCONTINENTAL DOHA BEACH &amp; SPA BY IHG<strong><\/strong><\/p>\n\n\n\n<p><strong>Wednesday, 22 October<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>Session 32: Track 2 &#8211; Internet of Things<\/strong><br>Time: 08:30-10:30<br>Room 1: Al-Thuraya A<br>Session Chair: Dr. Abdelhak Belhi, Joaan Bin Jassim Academy<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 1065 \u2013 Enhancing IoT Cybersecurity and Compliance through BPMN Integration. Youssef Sellami, Salwa Alem, Abderrahmane Yakob and Xavier Scharff.<\/li>\n\n\n\n<li>Paper 1278 \u2013 WAMflow: a Web-Based Editor for Modelling Web Systems Architecture. Abubaker Gaber, Sebastian Heil, Ahmad Hijazi and Martin Gaedke.<\/li>\n\n\n\n<li>Paper 2421 \u2013 Hash-based Threshold Group RFID Authentication Protocol for Medical Privacy in IoT. Fatma Merabet, Yacine Challal, Emmanuel Conchon and Damien Sauveron.<\/li>\n\n\n\n<li>Paper 3542 \u2013 Cryptanalysis and Improvement of an RFID Authentication Protocol for Smart Medical Systems. Pierre Abi-Char.<\/li>\n\n\n\n<li>Paper 7595 \u2013 Adaptive Chaotic-Neural Ascon Image Encryption with Mish Activation and AI-Driven Key Scheduling for Secure and High-Speed IoT Applications. Zaydon L. Ali, Walid Barhoumi and Houcemeddine Hermassi.<\/li>\n\n\n\n<li>Paper 9071 \u2013 Enhanced Ascon-Neuro Mish: A Novel Chaotic-Neural Framework with Mish Activation and AI-Based Key Scheduling for Secure IoT Image Encryption. Zaydon L. Ali.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 33: Track 6 &#8211; Image and Video Processing<\/strong><br>Time: 08:30-10:30<br>Room 2: Nejma<br>Session Chair: Dr. Moutaz Saleh, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 3 \u2013 Deep Learning-based Multiple Pedestrian Crossing Behavior Analysis Framework. Tudor Barbu and Silviu-Ioan Bejinariu.<\/li>\n\n\n\n<li>Paper 1756 \u2013 Comparative Study of Residual and Efficient CNN Architectures for Disaster Type Classification in Social Media Images. Ayisha Firoz and Somaya Al-Maadeed.<\/li>\n\n\n\n<li>Paper 4365 \u2013 A Scalable and Explainable CNN for Mammographic Breast Cancer Detection Using Grad-CAM and EfficientNet-B0. Noora Shifa, Dr. Moutaz Saleh, Dr. Younes Akbari and Dr. Sumaya Al Maadeed.<\/li>\n\n\n\n<li>Paper 5925 \u2013 Spatiotemporal Transformer-Based Analysis of Social Gaze in Multi-Agent Interaction Videos. Ali Aldhubri, Elizabeth B. Varghese, Dena Al-Thani and Marwa K. Qarage.<\/li>\n\n\n\n<li>Paper 4702 \u2013 Attentional Language Modeling for Text to 3D Generation. Marena Anis, Ali Hamdi and Khaled Shaban.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 34: Track 4 &#8211; Classification<\/strong><br>Time: 08:30-10:30<br>Room 3: Sama<br>Session Chair: Belkacem Chikhaoui, TELUQ University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 1706 \u2013 Energy-Efficient UAV Surveillance for Early Wildfire Detection Using AI-Driven Image Analysis. Bennett Akpomedaye, Atef Shalan, Nafeeul Alam Walee and Munshi Rahman.<\/li>\n\n\n\n<li>Paper 4779 \u2013 Balancing Explainability and Accuracy in Credit Risk Classification Using Neuro-Fuzzy Model. Sirine Ben Ghozzi, Mohamed Aymen Ben Hajkacem and Nadia Essoussi.<\/li>\n\n\n\n<li>Paper 6982 \u2013 Classification of Skin Lesion Images based on Ensemble Deep Learning. Hiba Chelabi, Tarek Khadir and Belkacem Chikhaoui.<\/li>\n\n\n\n<li>Paper 9038 \u2013 iESN-SWT: improved Echo State Network with Small World Topology and Dimension Reduction for Time Series Classification. Rana Albelaihi and Emna Benmohamed.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 35: Track 5 &#8211; Large Language Models<\/strong><br>Time: 08:30-10:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Khaled Shaban, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 6337 \u2013 Context-Aware Prompt Engineering and Time-Aware LLM Architecture for Radiology Report Generation. Mariem Medini, Riadh Bouslimi and Kaouthar Nouira.<\/li>\n\n\n\n<li>Paper 6917 \u2013 A Novel Competency Tagging Method Through Semantic Search Using Fine-Tuned LLM. Imene Jemal, Naoussi Sijou Wilfried Armand and Belkacem Chikhaoui.<\/li>\n\n\n\n<li>Paper 9069 \u2013 Improving Accuracy in Medical French Transcriptions: A Hybrid Approach Using Whisper and Large Language Models. Gabriela Herrera Altamira and Kalim Moussa.<\/li>\n\n\n\n<li>Paper 9589 \u2013 Augmented Fine-Tuned LLMs for Enhanced Recruitment Automation. Mohamed Younes, Omar Walid, Khaled Shaban, Ali Hamdi and Mai Hassan.<\/li>\n\n\n\n<li>Paper 9941 \u2013 MSLEF: Multi-Segment LLM Ensemble Finetuning in Recruitment. Omar Walid, Mohamed Younes, Khaled Shaban, Ali Hamdi and Mai Hassan.<\/li>\n<\/ul>\n\n\n\n<p>11:00-12:30 \u2013 Keynote 3 &#8211; Dr. Iyad Rahwan<\/p>\n\n\n\n<p>Title: Science Fiction Science: Facing the challenges of Artificial Intelligence.<\/p>\n\n\n\n<p>Session Chair: Prof. Bashar Nuseibeh, Open University, UK.<\/p>\n\n\n\n<p>Hall: Al Thuraya B<\/p>\n\n\n\n<p>12:30-14:00 \u2013 Lunch<\/p>\n\n\n\n<p>14:00-15:00 \u2013 Keynote 4: Prof. Athena Vakali,<\/p>\n\n\n\n<p>Title: \u201cTies-of-Trust in AI: Unravel the Links Between Human Judgment and AI Harms\u201d<\/p>\n\n\n\n<p>Hall: Al Thuraya B<\/p>\n\n\n\n<p><strong>Session 36: Track 2 &#8211; Learning and Explainability<\/strong><br>Time: 15:00-16:30<br>Room 1: Al-Thuraya A<br>Session Chair: Dr. Abdelhak Belhi, Joaan Bin Jassim Academy<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 4879 \u2013 Anomaly-based Intrusion Detection System for Ethernet\/Industrial Protocol (ENIP). Clarisa Grijalva Lugo and Salim Hariri.<\/li>\n\n\n\n<li>Paper 1715 \u2013 A Modular Framework for Anomaly Detection in IoT Networks with Explainability. Amina Lamharzi, Nadia Kabachi, Meriem Zouzou and Elhadj Benkhelifa.<\/li>\n\n\n\n<li>Paper 7954 \u2013 Explainable AI for Network Threat Detection: Isolation Forests and Synthetic WiFi Traffic. Simona Fioretto, Elio Masciari, Enea Vincenzo Napolitano, Fabio Rendace and Francesco Zumpano.<\/li>\n\n\n\n<li>Paper 8085 \u2013 A Novel Approach to Secure MANETs: LSTM-Based Intrusion Detection and Multi-Objective QoS Routing Framework. Maher Jasim Al-Mashhadani and Kamel Karoui.<\/li>\n\n\n\n<li>Paper 8115 \u2013 FLCMed-TAD: An Anomaly-Aware Federated Learning Approach for EV Load Forecasting. Sashank Kumar and Eyhab Al-Masri.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 37: Track 6 &#8211; Image and Video Processing<\/strong><br>Time: 15:00-16:30<br>Room 2: Nejma<br>Session Chair: Mahmoud Barhamgi, Qatar University.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 268 \u2013 A Parallel Island Genetic Algorithm for Triangle-based Image Reconstruction. Jean-Philippe Valois, Thomas Firmin and Nouredine Melab.<\/li>\n\n\n\n<li>Paper 2084 \u2013 Deep Learning Based Real-Time Hand Detection Using First-Person Egocentric Perspectives. Aminun Nahar, Mehedi Hasan Shuvo, Mahbubul Islam, Rifat Tasnim Anannya, Shahnaj Parvin and Kamruddin Nur.<\/li>\n\n\n\n<li>Paper 2119 \u2013 STTATrack: Enhancing One-Stream Single Object Tracking via Score Temporal Token Attention. Omar Abdelaziz, Mahmoud Soliman, Ahmed Elgazwy and Mohamed Shehata.<\/li>\n\n\n\n<li>Paper 4836 \u2013 Facial Emotion Recognition Using Vision Transformers: A Comprehensive Evaluation on Multiple Datasets. Sabrine Brahmi, Ibtissem Brahmi and Faouzi Zerai.<\/li>\n\n\n\n<li>Paper 8433 \u2013 HTEB: Hybrid Transformer Enhancement Block for Robust Image Flare Suppression. Mohamed Goher, Hicham G. Elmongui and Marwan Torki.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 38: Track 4 &#8211; Theoretical Issues<\/strong><br>Time: 15:00-16:30<br>Room 3: Sama<br>Session Chair: Dr. Tewfik Ziadi, University of Doha.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 515 \u2013 DetectorsForge: A Software Product Line for Transfer-learning in Code Smells Detection. Syrine Wardi, Rania Mzid and Tewfik Ziadi.<\/li>\n\n\n\n<li>Paper 2423 \u2013 Efficient Graph-Transformer-based Neural Collaborative Filtering for Candidate Preselection. Jos\u00e9 Quenum and Marthin Thomas.<\/li>\n\n\n\n<li>Paper 2919 \u2013 Secure Transformer-Guided Chaotic-Neural Encryption Using Swish and GELU-Based Dynamic S-Boxes for Lightweight ASCON in Intelligent IoT Systems. Zaydon L. Ali.<\/li>\n\n\n\n<li>Paper 7530 \u2013 LLM-Ops and Ensemble Intelligence for Robust LLM Performance: Integrating Fine-Tuning and Majority Voting. Osama Abdellatif, Ahmed Ayman, Abdelrahman Hassan, Ali Hamdi and Khaled Shaban.<\/li>\n<\/ul>\n\n\n\n<p><strong>Session 39: Track 5 &#8211; NLP Issues<\/strong><br>Time: 15:00-16:30<br>Room 4: Rimal &amp; Sahara<br>Session Chair: Mucahid Kulu, Qatar University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 952 \u2013 Automating user-feedback driven requirements gathering: A Case Study on Mobile Apps for Diabetes Self-Management. Maroua Loukil, Mariem Haoues and Nedia Bouacida.<\/li>\n\n\n\n<li>Paper 1093 \u2013 Analyzing the Persuasive Strategies of Influencers and News Media on Social Media. Omran Berjawi, Rida Khatoun and Giuseppe Fenza.<\/li>\n\n\n\n<li>Paper 6356 \u2013 Benchmarking BERT for Software Requirements Classification Across Diverse Datasets. Nourch\u00e8ne Elleuch Ben Ayed and Muath Alrammal.<\/li>\n\n\n\n<li>Paper 8797 \u2013 Balancing Factual Consistency and Diversity in Abstractive Summarization via Model-Agnostic Composite Reranking. Mariam Elewa, Ali Hamdi, Hozaifa Kassab and Khaled Shaban.<\/li>\n\n\n\n<li>Paper 9687 \u2013 Towards Explainable Aspect-Based Sentiment Analysis in Agriculture: A Post-hoc Analysis with SHAP. Ameni Chamekh, Mariem Mahfoudh and Khouloud Boukadi.<\/li>\n<\/ul>\n\n\n\n<p><strong>Posters<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper 1722 \u2013 Comparative Analysis of Autonomous Vehicle Simulation Environments: GTAV vs CARLA. Ahmad Jafari Takhtinejad, Mohammad Amaan, Mohammed Alqunaibi, Naser Ahmad, Kazi Ahmed, Fatima Alsulaiti, Abderrahmane Maaradji and Yacine Challal.<\/li>\n\n\n\n<li>Paper 4275 \u2013 Sub-Range Unspent Transaction Outputs with Succinct Verkle-Tree Proofs for Exact Coin Taint. Nawaf Alsowadi.<\/li>\n\n\n\n<li>Paper 5089 \u2013 Neuromorphic LIDAR-based Robot Navigation using Spiking Neural Networks. Zainab Ali, Lujayn Al-Amir and Ali Safa.<\/li>\n<\/ul>\n\n\n\n<p>Closing<\/p>\n","protected":false},"excerpt":{"rendered":"<p>11 March, 2019, Tehran Iran<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1021","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages\/1021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/comments?post=1021"}],"version-history":[{"count":54,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages\/1021\/revisions"}],"predecessor-version":[{"id":1224,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages\/1021\/revisions\/1224"}],"wp:attachment":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/media?parent=1021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}