AI for Sustainable Cities: Intelligent Solutions for a Greener and Smarter Future

By: Bhavya, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, ABSTRACT Sensitive…

Agentic AI to Boost Network Resilience

By: Simar Atwal, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India mco23384@ccet.ac.in…

The Anatomy of an SQL Injection Attack

By: Sahil Kumar, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India co24355@ccet.ac.in…

Red Teaming AI: How Ethical Hackers are Stress-Testing Generative Models

By: Shavi Bansal, Insights2Techinfo, India Email: shavi@insights2techinfo.com Abstract. Generative AI systems are everywhere in every field…

Post-Quantum Internet: Rethinking Trust in a Quantum World

By: Varsha Arya, Asia University Abstract Quantum computers are coming and they will EASILY break the…

Data Poisoning: The Silent Killer of AI Models

By: Akshat Gaurav, Asia University, Taiwan Abstract When the data used to train a model is…

Role of Natural Language Processing (NLP) in Email Phishing Detection

By: Rekarius; Asia University Abstract Phishing emails are one of the most common phishing attack vectors…

LLM-Based Phishing Detection: URL Phishing and Voice Phishing

By: Rekarius; Asia University Abstract Phishing is a cyberattack in which an attacker deceives users by…

Beyond the Code: A Systematic Review of Psychological Techniques in Phishing Attacks

By: RekaRius; Asia University Abstract Phishing attacks are a combination of technological sophistication and human psychological…

Improving Generalization in Phishing URL Detection: A Review of Multimodal BERT and BERT-PhishFinder Models

By: Rekarius, Asia University Abstract Phishing is a form of cyberattack aimed at gaining access to…

QR code Phishing URL Detection Based on Lightweight Deep Learning Model

By: Rekarius, Asia University Abstract QR Phishing (Quishing) represents a variant of phishing attacks in which…

Phishing Detection Based on Deep Learning in Cloud Environment

By: Rekarius Asia University Abstract Cloud computing services are also targets of phishing attacks. This paper…

Hybrid Deep Learning CNN-GRU and CNN-Bi-GRU Approaches to Smishing Detection

By: Rekarius Asia University Abstract Dependence on mobile device usage opens the door for cybercriminals to…

Deepfake Fraud in Banking and Finance: Exploiting AI for Identity Theft

By: C S Nakul Kalyan; Asia University Abstract This study focuses on the emerging threat of…

AI-Generated News Reports and Obituaries: Fabricating Reality Through Media

By; C S Nakul Kalyan; Asia University Abstract The rapid development of fake news production has…

Text-to-Video Synthesis: Creating Deepfakes from Words Alone

By: C S Nakul Kalyan, Asia University Abstract The development of generative AI models for text-to-video…

Synthetic Data Generation Using Deepfakes: Fueling AI with Fake Inputs

By: C S Nakul Kalyan; Asia University Abstract In this study, we will go through the…

AI-Generated Voices in Scam Calls: Phishing Gets a New Voice

By: C S Nakul Kalyan; Asia University Abstract The emergence of Artificial Intelligence (AI) has paved…

Voice-to-Voice Translation with Lip Sync: A New Era in Multilingual Deepfakes

By: C S Nakul Kalyan; Asia University Abstract In this study, we will propose a detection…

Scene and Background Manipulation in Deepfake Videos: Beyond Green Screens

By: C S Nakul Kalyan, Asia University Abstract Due to advancements in the digital world, technologies…