By: Ritika Kalia, Department of Computer Science Chandigarh College of Engg. & Tech., Chandigarh, India, lco23393@ccet.ac.in…
Category: Research
The Future of Remote Work and Hybrid Models in 2025
By: Sargun, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, co23357@ccet.ac.in Abstract…
Photonic AI Processors: Architectures, Applications, and Limitations
By: Dhruv Bali , Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India…
Neuro-Symbolic AI: The Comeback of Logic in an LLM World
By: Harshita Sharma, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, mco23378@ccet.ac.in…
Metaverse and Virtual Reality: What’s Next?
By: Shreya, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, co23362@ccet.ac.in Abstract…
Generative AI in Education: Transforming Learning and Skill Development in the Digital Age
By: Samriti Sharma, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, mco23383@ccet.ac.in…
Digital Twins of Employees: A New Paradigm in Workforce Training and Development
By: Angad Devgan, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, mco23374@ccet.ac.in…
AI-Powered Healthcare Diagnostics: Redefining Precision Medicine and Patient Care
By: Aanshi Bansal Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, co23302@ccet.ac.in…
AI for Sustainable Cities: Intelligent Solutions for a Greener and Smarter Future
By: Bhavya, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, ABSTRACT Sensitive…
Agentic AI to Boost Network Resilience
By: Simar Atwal, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India mco23384@ccet.ac.in…
The Anatomy of an SQL Injection Attack
By: Sahil Kumar, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India co24355@ccet.ac.in…
Red Teaming AI: How Ethical Hackers are Stress-Testing Generative Models
By: Shavi Bansal, Insights2Techinfo, India Email: shavi@insights2techinfo.com Abstract. Generative AI systems are everywhere in every field…
Post-Quantum Internet: Rethinking Trust in a Quantum World
By: Varsha Arya, Asia University Abstract Quantum computers are coming and they will EASILY break the…
Data Poisoning: The Silent Killer of AI Models
By: Akshat Gaurav, Asia University, Taiwan Abstract When the data used to train a model is…
Role of Natural Language Processing (NLP) in Email Phishing Detection
By: Rekarius; Asia University Abstract Phishing emails are one of the most common phishing attack vectors…
LLM-Based Phishing Detection: URL Phishing and Voice Phishing
By: Rekarius; Asia University Abstract Phishing is a cyberattack in which an attacker deceives users by…
Beyond the Code: A Systematic Review of Psychological Techniques in Phishing Attacks
By: RekaRius; Asia University Abstract Phishing attacks are a combination of technological sophistication and human psychological…
Improving Generalization in Phishing URL Detection: A Review of Multimodal BERT and BERT-PhishFinder Models
By: Rekarius, Asia University Abstract Phishing is a form of cyberattack aimed at gaining access to…
QR code Phishing URL Detection Based on Lightweight Deep Learning Model
By: Rekarius, Asia University Abstract QR Phishing (Quishing) represents a variant of phishing attacks in which…
Phishing Detection Based on Deep Learning in Cloud Environment
By: Rekarius Asia University Abstract Cloud computing services are also targets of phishing attacks. This paper…