Issue 50 of Volume 178

Toward Mitigating Adversarial Texts

Authors: Basemah Alshemali, Jugal Kalita

Understanding Textbook of History with Pictorial Representation using NLP

Authors: Abhishek Mukherjee, Nikhar Jain, Pratik Nandurkar, Pooja Vengurlekar

A Taxonomy for Social Engineering Attacks via Personal Devices

Authors: Hussain Aldawood, Geoffrey Skinner

Library Book Sharing Network (LBSN)

Authors: Syed Asif Ali, Basit Hassan Qureshi, Syeda Wajiha Naim, Maham Nasrullah

Hiding Confidential File using Audio Steganography

Authors: Md. Rasedur Rahman, Partha Chakraborty, Md. Zahidur Rahman, Md. Golam Moazzam

Computational Analysis for Estimating Electricity Wastage in Buildings

Authors: P. A. Ozoh, A. A. Adigun, L. O. Omotosho