ST-14
Software Technology and Software Development
Papers (4)
- Software Architecture for Essential and Accidental UncertaintyNeil Harrison, George Rudolph, Peter Aldous
- Understanding the Evolution of Serverless Computing: A Computational Literature ReviewMUHAMMAD HAMZA, Rafael Capilla, Kari Smolander
- Developer Productivity With and Without GitHub Copilot: A Longitudinal Mixed-Methods Case StudyViktoria Stray, Elias Goldmann Brandtzæg, Viggo Wivestad, Astri Barbala, Nils Brede Moe
- Investigating the Pareto Principle in Student Software Engineering Team ProjectsAditi More, Kevin Buffardi
ST-8
Generative AI in IS Research and Education: Opportunities and Challenges
Papers (3)
- Prompt Engineering as a Cognitive Interface: Reframing Human-AI Collaboration and Digital Literacy in the Age of Generative AISasan Azizian, Reza Mehrabian, Vahraz Honary
- Adaptive Kernels in DCGANsShamir Khandaker, Sahan Ahmad, Aminul Islam
- AI-Enhanced Literature Reviews: Connecting Emerging Phenomena and Bodies of KnowledgeSyed Asad Ali Naqvi, Markus Zimmer, Martin Kauschinger, Paul Drews, Rahul Basole
ST-9
Impact of AI on Software Engineering
Papers (4)
- Prompt Engineering Patents in Software Development: Trends, Themes, and Future DirectionsMohamad Kassab
- Engineering prompts while navigating the tradeoffs of LLM integration in First Responder Software ApplicationSonipriya Paul, Abm Adnan Azmee, Dominic Thomas
- Collaborative LLM Agents for C4 Software Architecture Design AutomationKamil Szczepanik, Jarosław A Chudziak
- Rethinking Programming Skills in the Age of Generative AIFrancesco Bolici, Kevin Crowston, Alberto Varone, Michael Fudge
ST-2
AI-Powered Cyber Attacks and Countermeasures
Papers (4)
- An Empirical Study of Automated Adversary EmulatorsHannes Holm, Lars Helgeson
- AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting SystemChanti Raju Mylay, Bobin Deng, Taeyoeng Choi, Zhipeng Cai, Honghui Xu
- Hacking Distributed Energy Resource Power Plant Infrastructure Using Reinforcement LearningBirk Jones, Georgios Fragkos
- Lightweight and Privacy-Enhanced Detection Model on Aerial Imagery for Post-Disaster Building Damage ReconnaissanceMd Abdullahil Oaphy, Da Hu, Adeel Khalid, Honghui Xu
ST-12
Real-Time Simulation of Cyber-Physical Systems
Papers (1)
- Virtualized Software Application: Real-Time Synchro Phasor PMU Development Utilizing IEC 61850-9-2 Based HIL TestingMike Mekkanen
ST-16
Trustworthy Artificial Intelligence and Machine Learning
Papers (3)
- Optimizing Class Distributions for Bias-Aware Multi-Class LearningMirco Felske, Stefan Stiene
- An Empirical Framework for Evaluating Semantic Preservation Using Hugging FaceNan Jia, Anita Raja, Raffi Khatchadourian
- MAEBE: Multi-Agent Emergent Behavior FrameworkTim Gothard, Sinem Erisken, Martin Leitgab, Ram Potham
ST-4
Cyber Security, Operations, Defense, and Forensics
Papers (3)
- Your Bulb Has Trust IssuesKaleigh Powell, William Bradley Glisson
- Introduction of Gabor Transform Features for an Internet of Things Security ParadigmReid Hessman, Christopher Rondeau, Michael Temple
- Evading Detection or Triggering False Alarms? A Character Level Adversarial Attack on LLM Detection of Arabic Social Media BotsAbdullah Melhem , Ahmed Aleroud, Craig Albert
ST-5
Cyber Security, Operations, Defense, and Forensics
Papers (2)
- Virtual Private Networks over Satellite Communication Systems in Support of Secure Telemedical Communication in Expeditionary EnvironmentsJoshua Cohen, John McEachen, Murali Tummala
- Reinforcement Learning and Hidden Markov Models for Simulating and Analyzing Social Engineering AttacksBharkavi Sachithanandam, Faranak Abri, Genya Ishigaki, Jade Webb
ST-10
Intelligent Edge Computing
Papers (4)
- Encoding Time Series on an FPGA, with an Efficient Izhikevich Neuron ImplementationThomas Borrill, Louise Crockett, Kevin Thomas, Gaetano Di Caterina
- Addressing the Lack of Neuromorphic Data in Low SNR ScenariosRoss Perry, Gaetano Di Caterina, Trevor Bihl, Kara Combs
- HALO: A Hierarchical and Adaptive Large Language Model Framework with Centralized FeedbackYun-Hao Lee, Pouya Taaghol, Hyundong Kim, Gopal Gupta, Bingzhe Li
- Initial Review of Goal-Directed Answer Set Programming for Orchestration of Neuro-Symbolic UAV AutonomyAlexis Tudor, Keegan Kimbrell, Gopal Gupta
ST-15
Tools and Processes for Enabling Agile Projects, Teams, and Organizations
Papers (1)
- Hybrid Work in Agile Software Teams: Practices, Challenges, and Success FactorsNils Brede Moe, Yashwant Singh Yadav, Susanne Semsøy
ST-7
Games for Impact
Papers (4)
- Developing The Strategists, an Online, AI-Aware Financial Investment Game for Technology-Enhanced Learning and ResearchShubham Chawla, Bretho Danzy III, Jai Narula, Ashish Amresh, Chris Bryan
- Educational Games to Teach Fundamental Principles of CybersecurityGreg White, Johanna Jacob, Natalie Sjelin, Larry Sjelin
- iFractions: Using Games to Teach Children FractionsPriscila da Silva Neves Lima, Wilk Oliveira, Laira das Almas Silva, Leônidas de Oliveira Brandão
- Beyond Multiple Choice Tests: Enhancing the Effectiveness of Traffic Law Learning through Immersive Simulations and Cognitive MonitoringAnna Lewandowska, Agnieszka Olejnik-Krugły, Nikolas Mazur, Krzysztof Małecki
ST-11
Intelligent Edge Computing
Papers (4)
- Edge-Based Fault diagnosis of Autonomous Ground Robots with Simultaneous Actuator and Sensor FaultsVaishnavi Janakiraman, Xiaodong (Frank) Zhang
- MoCap2Radar: A Spatiotemporal Transformer For Synthesizing Micro‑Doppler Radar Signatures from Motion CaptureKevin Chen, Kenneth Parker, Anish Arora
- Edge-Kalman Filter for Improved Quality of Service in Indoor Spatial Temporal SystemsVivya Kalidindi, Pradeep Chowriappa
- Model Evaluation for Radio-Frequency Signal Modulation Classifiers in the Existence of Novel SamplesAdam Trott, Henry Thompson, Gokhan Kul
ST-3
Artificial Intelligence Security: Ensuring Safety, Trustworthiness, and Responsibility in AI Systems
Papers (3)
- Quantifying True Robustness: Synonymity-Weighted Similarity for Trustworthy XAI EvaluationChristopher Burger
- Detecting Data Poisoning Attacks in Image Datasets Using a Vision-Language Hybrid PipelineSabrina Perry, Sam Perry, Yili Jiang, Charles Walter
- Detecting Synthetic Text Profiles: Human Discernment Versus AI AnalyticsRegina Luttrell, Jason Davis, Carrie Welch
ST-13
Software Sustainability: Research on Usability, Maintainability, and Reproducibility
Papers (1)
- Sustaining Research Software: A Fitness Function ApproachPhilipp Zech, Irdin Pekaric
ST-1
Advancing Software Resilience in the Age of LLM - Testing, Quality Assurance, and Metrics for Robust Engineering
Papers (2)
- Using Transformer and GAN Models for Software and Security TestingManfred Hauswirth, Christoph Huy
- LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop?Irdin Pekaric, Tom Mattson, Philipp Zech
ST-6
Cybersecurity and Software Assurance
Papers (2)
- Self-Modifiable Reversible CircuitsMichael Fiske
- Securing Python Supply Chain: Using Graph Theory for Vulnerability PredictionGianluca Zanella, Pouria Rad, Charles Zhechao Liu
