Image, Video Processing and Analysis.-
Classification and Segmentation Models for Hyperspectral Imaging- An Overview.- Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns.- Occupancy Flow Control - Case Study: Elevator Cabin.-
Security and IoT.-
Protecting IoT Devices with Software-defined Networks.- Digital Forensic Readiness in IoT - a risk assessment model.- System Requirements of Software-defined IoT Networks for Critical Infrastructure.- An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality.-
Health and AI.-
Machine Learning based methodology for Depressive Sentiment Analysis.- Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis.- A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms.-
Deep Learning.-
Interpretable Option Discovery usingDeep Q-Learning and Variational Autoencoders.- Evaluating Predictive Deep Learning Models.- Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification.- Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow.-
Biometrics.-
Multilingual Voice Impersonation Dataset and Evaluation.- A Survey on Unknown Presentation Attack Detection for Fingerprint.- Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection.- Cross-lingual Speaker Verification: Evaluation On X-Vector Method.- Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos.-
Intelligent Environments.-
A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas.- The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel.-
Intrusion and Malware Detection.-
Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems.- Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks.- Towards Low Cost and Smart Load Testing as a Service using Containers.- Security Guard: An Automated Secure Coding Framework.- The multi-objective feature selection in Android malware detection system.-
AIRLEAs.-
Border Management Systems: How can they help against pandemics.- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design.- An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE.- Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network.- Criminal Network Community Detection in Social Media Forensics.- Data Privacy in IoT Equipped Future Smart Homes.- Machine Learning and the Legal Framework for the Use of PassengerName Record Data.- Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.