Full Description
This three-volume set CCIS 2873-2875 constitutes the revised selected papers of the 7th International Conference on Soft Computing and its Engineering Applications, icSoftComp 2025, held in Hanoi, Vietnam, during December 9-11, 2025.
The 105 full papers and 7 Short papers included in these volumes were carefully reviewed and selected from 710 submissions. They were organized in topical sections as follows:
Part I: Theory and Methods.
Part II: Theory and Methods; Systems and Applications.
Part III: Systems and Applications; Hybrid Techniques; Soft Computing for Smart World.
Contents
.- Theory and Methods.
.- Toward Human-Level Task Automation with Large Action Models.
.- Efficient LLM Framework Using LORA Based Fine Tuning to Analyse Textual Astronomical Data.
.- ChipClaude: A Framework for Natural Language-Based Hardware Design Using LLM Distillation.
.- FactFrame-X: A Self-Attention-Enhanced NLP Model with XAI for Classifying Hyperpartisan News in Online Media.
.- Linguistic Variations in WhatsApp Chats of Multilingual South Karnataka Natives: A Case Study on Chats Generated by Engineering Student Groups.
.- LLM-Based Vulnerability Detection in Decompiled Binary Code for Automated Reverse Engineering.
.- Collaborative Multi-Agent LLMs for Autonomous Portfolio Management: An Empirical Study of Distributed AI Decision-Making in Financial Markets.
.- Analyzing Library Borrowing Patterns and Predicting Circulation Trends Using Data-Driven Approaches.
.- Automated Segregation, Quality Prediction, and Disease Detection of Pomegranates Using Deep Learning.
.- Discovering the significance of LLM's in Medi-cal Science for Disease Detection.
.- PSKA-UAV: A Pre-Shared Key-Based Authentication Protocol for Secure and Efficient Communication between UAV and GCS.
.- Signature-Based Anomaly-Aware DAG Execution for Efficient Real-Time Data Quality Remediation.
.- Adversarial Robustness in AI-Driven Bioinformatics Pipelines A Cyber-Biosecurity Perspective.
.- SECAT: A Lightweight Image Encryption Scheme using Cellular Automata Rules and Tinkerbell Map for IoT Devices.
.- Lightweight Real-Time Anomaly Detection on IoT Edge Devices Using Machine Learning.
.- Defeating Evasion Attack- An Adversarially Trained Ensemble for Phishing URL Detection.
.- Evaluating an ELiPS-Based CP-ABE Enhancement on Server and IoT Platforms.
.- HAD-IDS: A Hybrid Adversarial Defense Framework for Intrusion Detection Systems.
.- FORMAL-IoT:Formal Models and Adaptive Defense Methodology Against Optical and BLE Side-Channel Attacks on Smart IoT Devices.
.- AI-Powered intelligent assistant for predictive maintenance decision support and automated operational processes: a self-learning approach.
.- An Efficient Scheduling Method for Taxi Ridesharing.
.- A Framework for Prompt-Driven Deep Reinforcement Learning in Modern Predictive Maintenance.
.- Systems and Applications.
.- A Hybrid AI-Based Model for Secure Image Encryption in Cloud Storage Systems.
.- HERMES: Design and Deployment of a Hybrid AI/ML Network Security System on ARM Clusters for Edge Environments.
.- Enhancing Fake Review Detection with Transformer-Based Embeddings and Behavioral Features.
.- Multiclass Classification of Rice Plant Leaf Diseases Using Image Processing and Vision Transformer (ViT) Deep Neural Network.
.- Performance Evaluation of Clustering Algorithms Applied to Web Services.
.- Rule Based Transliteration System: An Extensive Study.
.- Temporal-Aware Machine and Deep Learning Models for Intrusion Detection Using Engineered Features and UNSW-NB15 Dataset.
.- Cyberbullying Detection Using Machine and Deep Learning Models on a YouTube Dataset.
.- CL-PPIIMS: A Cognitive Load-Based Privacy-Preserving Intelligent Interruption Management System.
.- An Ensemble Machine Learning Based Cyber Attack Detection Framework for IoMT Networks.
.- Enhanced Anomaly Detection in IoT Networks Using Machine Learning and Deep Learning Approaches.
.- Privacy-Preserving ETL Pipelines for Sensitive AI Systems: A Dual-Domain Evaluation Using Differential Privacy.
.- A Robust Parametric Watermarking Framework for Deep Neural Network Ownership Verification.
.- Formal Specification and Verification of Smart Contract Access Control Policies.
.- From Taste to Text: Fine-Tuning ASR for Vietnamese Sensory Evaluation Domain.
.- Morphological and Contour-Based Handwritten English Word Segmentation on IAM Dataset.



