Memory in Conversational AI Agents: The Backbone of Long-Term Intelligence

By: Ritika Kalia, Department of Computer Science Chandigarh College of Engg. & Tech., Chandigarh, India, lco23393@ccet.ac.in…

The Future of Remote Work and Hybrid Models in 2025

By: Sargun, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, co23357@ccet.ac.in Abstract…

Photonic AI Processors: Architectures, Applications, and Limitations

By: Dhruv Bali , Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India…

Neuro-Symbolic AI: The Comeback of Logic in an LLM World

By: Harshita Sharma, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, mco23378@ccet.ac.in…

Metaverse and Virtual Reality: What’s Next?

By: Shreya, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, co23362@ccet.ac.in Abstract…

Generative AI in Education: Transforming Learning and Skill Development in the Digital Age

By: Samriti Sharma, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, mco23383@ccet.ac.in…

Digital Twins of Employees: A New Paradigm in Workforce Training and Development

By: Angad Devgan, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, mco23374@ccet.ac.in…

AI-Powered Healthcare Diagnostics: Redefining Precision Medicine and Patient Care

By: Aanshi Bansal Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, co23302@ccet.ac.in…

AI for Sustainable Cities: Intelligent Solutions for a Greener and Smarter Future

By: Bhavya, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, ABSTRACT Sensitive…

Agentic AI to Boost Network Resilience

By: Simar Atwal, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India mco23384@ccet.ac.in…

The Anatomy of an SQL Injection Attack

By: Sahil Kumar, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India co24355@ccet.ac.in…

Red Teaming AI: How Ethical Hackers are Stress-Testing Generative Models

By: Shavi Bansal, Insights2Techinfo, India Email: shavi@insights2techinfo.com Abstract. Generative AI systems are everywhere in every field…

Post-Quantum Internet: Rethinking Trust in a Quantum World

By: Varsha Arya, Asia University Abstract Quantum computers are coming and they will EASILY break the…

Data Poisoning: The Silent Killer of AI Models

By: Akshat Gaurav, Asia University, Taiwan Abstract When the data used to train a model is…

Role of Natural Language Processing (NLP) in Email Phishing Detection

By: Rekarius; Asia University Abstract Phishing emails are one of the most common phishing attack vectors…

LLM-Based Phishing Detection: URL Phishing and Voice Phishing

By: Rekarius; Asia University Abstract Phishing is a cyberattack in which an attacker deceives users by…

Beyond the Code: A Systematic Review of Psychological Techniques in Phishing Attacks

By: RekaRius; Asia University Abstract Phishing attacks are a combination of technological sophistication and human psychological…

Improving Generalization in Phishing URL Detection: A Review of Multimodal BERT and BERT-PhishFinder Models

By: Rekarius, Asia University Abstract Phishing is a form of cyberattack aimed at gaining access to…

QR code Phishing URL Detection Based on Lightweight Deep Learning Model

By: Rekarius, Asia University Abstract QR Phishing (Quishing) represents a variant of phishing attacks in which…

Phishing Detection Based on Deep Learning in Cloud Environment

By: Rekarius Asia University Abstract Cloud computing services are also targets of phishing attacks. This paper…