Description
This three-volume set CCIS 2873-2875 constitutes the revised selected papers of the 7th International Conference on Soft Computing and its Engineering Applications, icSoftComp 2025, held in Hanoi, Vietnam, during December 9 11, 2025.
The 105 full papers and 7 Short papers included in these volumes were carefully reviewed and selected from 710 submissions. They were organized in topical sections as follows:
Part I: Theory and Methods.
Part II: Theory and Methods; Systems and Applications.
Part III: Systems and Applications; Hybrid Techniques; Soft Computing for Smart World.
.- Theory and Methods. .- Toward Human-Level Task Automation with Large Action Models..- Efficient LLM Framework Using LORA Based Fine Tuning to Analyse Textual Astronomical Data. .- ChipClaude: A Framework for Natural Language-Based Hardware Design Using LLM Distillation..- FactFrame-X: A Self-Attention-Enhanced NLP Model with XAI for Classifying Hyperpartisan News in Online Media..- Linguistic Variations in WhatsApp Chats of Multilingual South Karnataka Natives: A Case Study on Chats Generated by Engineering Student Groups..- LLM-Based Vulnerability Detection in Decompiled Binary Code for Automated Reverse Engineering..- Collaborative Multi-Agent LLMs for Autonomous Portfolio Management: An Empirical Study of Distributed AI Decision-Making in Financial Markets..- Analyzing Library Borrowing Patterns and Predicting Circulation Trends Using Data-Driven Approaches..- Automated Segregation, Quality Prediction, and Disease Detection of Pomegranates Using Deep Learning..- Discovering the significance of LLM s in Medi-cal Science for Disease Detection..- PSKA-UAV: A Pre-Shared Key-Based Authentication Protocol for Secure and Efficient Communication between UAV and GCS..- Signature-Based Anomaly-Aware DAG Execution for Efficient Real-Time Data Quality Remediation..- Adversarial Robustness in AI-Driven Bioinformatics Pipelines A Cyber-Biosecurity Perspective..- SECAT: A Lightweight Image Encryption Scheme using Cellular Automata Rules and Tinkerbell Map for IoT Devices..- Lightweight Real-Time Anomaly Detection on IoT Edge Devices Using Machine Learning..- Defeating Evasion Attack- An Adversarially Trained Ensemble for Phishing URL Detection..- Evaluating an ELiPS-Based CP-ABE Enhancement on Server and IoT Platforms..- HAD-IDS: A Hybrid Adversarial Defense Framework for Intrusion Detection Systems..- FORMAL-IoT:Formal Models and Adaptive Defense Methodology Against Optical and BLE Side-Channel Attacks on Smart IoT Devices..- AI-Powered intelligent assistant for predictive maintenance decision support and automated operational processes: a self-learning approach..- An Efficient Scheduling Method for Taxi Ridesharing..- A Framework for Prompt-Driven Deep Reinforcement Learning in Modern Predictive Maintenance. .- Systems and Applications. .- A Hybrid AI-Based Model for Secure Image Encryption in Cloud Storage Systems..- HERMES: Design and Deployment of a Hybrid AI/ML Network Security System on ARM Clusters for Edge Environments..- Enhancing Fake Review Detection with Transformer-Based Embeddings and Behavioral Features..- Multiclass Classification of Rice Plant Leaf Diseases Using Image Processing and Vision Transformer (ViT) Deep Neural Network..- Performance Evaluation of Clustering Algorithms Applied to Web Services..- Rule Based Transliteration System: An Extensive Study..- Temporal-Aware Machine and Deep Learning Models for Intrusion Detection Using Engineered Features and UNSW-NB15 Dataset..- Cyberbullying Detection Using Machine and Deep Learning Models on a YouTube Dataset..- CL-PPIIMS: A Cognitive Load-Based Privacy-Preserving Intelligent Interruption Management System..- An Ensemble Machine Learning Based Cyber Attack Detection Framework for IoMT Networks..- Enhanced Anomaly Detection in IoT Networks Using Machine Learning and Deep Learning Approaches..- Privacy-Preserving ETL Pipelines for Sensitive AI Systems: A Dual-Domain Evaluation Using Differential Privacy..- A Robust Parametric Watermarking Framework for Deep Neural Network Owne
