Zum Hauptinhalt springen

Showing 1–50 of 70 results for author: Garcia, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.08446  [pdf, other

    cs.LG

    Lifelong Reinforcement Learning via Neuromodulation

    Authors: Sebastian Lee, Samuel Liebana Garcia, Claudia Clopath, Will Dabney

    Abstract: Navigating multiple tasks$\unicode{x2014}$for instance in succession as in continual or lifelong learning, or in distributions as in meta or multi-task learning$\unicode{x2014}$requires some notion of adaptation. Evolution over timescales of millennia has imbued humans and other animals with highly effective adaptive learning and decision-making strategies. Central to these functions are so-called… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

  2. arXiv:2407.08745  [pdf, other

    cs.NE cs.AI

    Evolutionary Computation for the Design and Enrichment of General-Purpose Artificial Intelligence Systems: Survey and Prospects

    Authors: Javier Poyatos, Javier Del Ser, Salvador Garcia, Hisao Ishibuchi, Daniel Molina, Isaac Triguero, Bing Xue, Xin Yao, Francisco Herrera

    Abstract: In Artificial Intelligence, there is an increasing demand for adaptive models capable of dealing with a diverse spectrum of learning tasks, surpassing the limitations of systems devised to cope with a single task. The recent emergence of General-Purpose Artificial Intelligence Systems (GPAIS) poses model configuration and adaptability challenges at far greater complexity scales than the optimal de… ▽ More

    Submitted 3 June, 2024; originally announced July 2024.

  3. arXiv:2407.03368  [pdf, other

    eess.SY cs.AI

    Predict. Optimize. Revise. On Forecast and Policy Stability in Energy Management Systems

    Authors: Evgenii Genov, Julian Ruddick, Christoph Bergmeir, Majid Vafaeipour, Thierry Coosemans, Salvador Garcia, Maarten Messagie

    Abstract: This research addresses the challenge of integrating forecasting and optimization in energy management systems, focusing on the impacts of switching costs, forecast accuracy, and stability. It proposes a novel framework for analyzing online optimization problems with switching costs and enabled by deterministic and probabilistic forecasts. Through empirical evaluation and theoretical analysis, the… ▽ More

    Submitted 11 July, 2024; v1 submitted 29 June, 2024; originally announced July 2024.

    Comments: 14 pages, contains the Online Appendix with a comment on KPIs, MPC formulation, Theoretical analysis of the MPC performance bounds and extra results on the in-sample performance

  4. arXiv:2406.10272  [pdf, other

    cs.CL cs.LG cs.SD eess.AS

    Connected Speech-Based Cognitive Assessment in Chinese and English

    Authors: Saturnino Luz, Sofia De La Fuente Garcia, Fasih Haider, Davida Fromm, Brian MacWhinney, Alyssa Lanzi, Ya-Ning Chang, Chia-Ju Chou, Yi-Chien Liu

    Abstract: We present a novel benchmark dataset and prediction tasks for investigating approaches to assess cognitive function through analysis of connected speech. The dataset consists of speech samples and clinical information for speakers of Mandarin Chinese and English with different levels of cognitive impairment as well as individuals with normal cognition. These data have been carefully matched by age… ▽ More

    Submitted 18 June, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

    Comments: To appear in Proceedings of Interspeech 2024

    ACM Class: J.3; I.5.4

  5. arXiv:2406.03138  [pdf, other

    cs.SD eess.AS

    A Frame-based Attention Interpretation Method for Relevant Acoustic Feature Extraction in Long Speech Depression Detection

    Authors: Qingkun Deng, Saturnino Luz, Sofia de la Fuente Garcia

    Abstract: Speech-based depression detection tools could help early screening of depression. Here, we address two issues that may hinder the clinical practicality of such tools: segment-level labelling noise and a lack of model interpretability. We propose a speech-level Audio Spectrogram Transformer to avoid segment-level labelling. We observe that the proposed model significantly outperforms a segment-leve… ▽ More

    Submitted 7 June, 2024; v1 submitted 5 June, 2024; originally announced June 2024.

    Comments: 5 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2309.13476

  6. arXiv:2404.14997  [pdf, other

    nlin.AO cond-mat.stat-mech cs.SI math-ph physics.soc-ph

    Mining higher-order triadic interactions

    Authors: Anthony Baptista, Marta Niedostatek, Jun Yamamoto, Ben MacArthur, Jurgen Kurths, Ruben Sanchez Garcia, Ginestra Bianconi

    Abstract: Complex systems often present higher-order interactions which require us to go beyond their description in terms of pairwise networks. Triadic interactions are a fundamental type of higher-order interaction that occurs when one node regulates the interaction between two other nodes. Triadic interactions are a fundamental type of higher-order networks, found in a large variety of biological systems… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  7. arXiv:2404.01940  [pdf, other

    cs.CL

    Towards Better Understanding of Cybercrime: The Role of Fine-Tuned LLMs in Translation

    Authors: Veronica Valeros, Anna Širokova, Carlos Catania, Sebastian Garcia

    Abstract: Understanding cybercrime communications is paramount for cybersecurity defence. This often involves translating communications into English for processing, interpreting, and generating timely intelligence. The problem is that translation is hard. Human translation is slow, expensive, and scarce. Machine translation is inaccurate and biased. We propose using fine-tuned Large Language Models (LLM) t… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 9 pages, 4 figures

  8. arXiv:2403.02432  [pdf, other

    stat.ML cs.LG math.OC

    On the impact of measure pre-conditionings on general parametric ML models and transfer learning via domain adaptation

    Authors: Joaquín Sánchez García

    Abstract: We study a new technique for understanding convergence of learning agents under small modifications of data. We show that such convergence can be understood via an analogue of Fatou's lemma which yields gamma-convergence. We show it's relevance and applications in general machine learning tasks and domain adaptation transfer learning.

    Submitted 4 March, 2024; originally announced March 2024.

  9. arXiv:2402.06315  [pdf, other

    cs.CV

    Multisource Semisupervised Adversarial Domain Generalization Network for Cross-Scene Sea-Land Clutter Classification

    Authors: Xiaoxuan Zhang, Quan Pan, Salvador García

    Abstract: Deep learning (DL)-based sea\textendash land clutter classification for sky-wave over-the-horizon-radar (OTHR) has become a novel research topic. In engineering applications, real-time predictions of sea\textendash land clutter with existing distribution discrepancies are crucial. To solve this problem, this article proposes a novel Multisource Semisupervised Adversarial Domain Generalization Netw… ▽ More

    Submitted 9 March, 2024; v1 submitted 9 February, 2024; originally announced February 2024.

    Comments: 15 pages, 8 figures, 4 tables

  10. Automatic UAV-based Airport Pavement Inspection Using Mixed Real and Virtual Scenarios

    Authors: Pablo Alonso, Jon Ander Iñiguez de Gordoa, Juan Diego Ortega, Sara García, Francisco Javier Iriarte, Marcos Nieto

    Abstract: Runway and taxiway pavements are exposed to high stress during their projected lifetime, which inevitably leads to a decrease in their condition over time. To make sure airport pavement condition ensure uninterrupted and resilient operations, it is of utmost importance to monitor their condition and conduct regular inspections. UAV-based inspection is recently gaining importance due to its wide ra… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 12 pages, 6 figures, published in proceedings of 15th International Conference on Machine Vision (ICMV)

    Journal ref: Proc. SPIE 12701, Fifteenth International Conference on Machine Vision (ICMV 2022), 1270118

  11. arXiv:2401.05815  [pdf, other

    physics.acc-ph cs.AI cs.LG

    Cheetah: Bridging the Gap Between Machine Learning and Particle Accelerator Physics with High-Speed, Differentiable Simulations

    Authors: Jan Kaiser, Chenran Xu, Annika Eichler, Andrea Santamaria Garcia

    Abstract: Machine learning has emerged as a powerful solution to the modern challenges in accelerator physics. However, the limited availability of beam time, the computational cost of simulations, and the high-dimensionality of optimisation problems pose significant challenges in generating the required data for training state-of-the-art machine learning models. In this work, we introduce Cheetah, a PyTorc… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 16 pages, 9 figures, 3 tables

    Report number: PUBDB-2023-07854

    Journal ref: Phys. Rev. Accel. Beams 27 (2024) 054601

  12. arXiv:2312.17553  [pdf, other

    cs.CV stat.ML

    A Fully Automated Pipeline Using Swin Transformers for Deep Learning-Based Blood Segmentation on Head CT Scans After Aneurysmal Subarachnoid Hemorrhage

    Authors: Sergio Garcia Garcia, Santiago Cepeda, Ignacio Arrese, Rosario Sarabia

    Abstract: Background: Accurate volumetric assessment of spontaneous subarachnoid hemorrhage (SAH) is a labor-intensive task performed with current manual and semiautomatic methods that might be relevant for its clinical and prognostic implications. In the present research, we sought to develop and validate an artificial intelligence-driven, fully automated blood segmentation tool for SAH patients via noncon… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

  13. arXiv:2312.01354  [pdf, other

    cs.CR

    Protecting Sensitive Tabular Data in Hybrid Clouds

    Authors: Maya Anderson, Gidon Gershinsky, Eliot Salant, Salvador Garcia

    Abstract: Regulated industries, such as Healthcare and Finance, are starting to move parts of their data and workloads to the public cloud. However, they are still reluctant to trust the public cloud with their most sensitive records, and hence leave them in their premises, leveraging the hybrid cloud architecture. We address the security and performance challenges of big data analytics using a hybrid cloud… ▽ More

    Submitted 3 December, 2023; originally announced December 2023.

    Comments: 5 pages, 3 figures

    ACM Class: D.4.6; K.6.5; J.3

  14. arXiv:2311.05051  [pdf, other

    cs.CL

    Deep Learning Brasil at ABSAPT 2022: Portuguese Transformer Ensemble Approaches

    Authors: Juliana Resplande Santanna Gomes, Eduardo Augusto Santos Garcia, Adalberto Ferreira Barbosa Junior, Ruan Chaves Rodrigues, Diogo Fernandes Costa Silva, Dyonnatan Ferreira Maia, Nádia Félix Felipe da Silva, Arlindo Rodrigues Galvão Filho, Anderson da Silva Soares

    Abstract: Aspect-based Sentiment Analysis (ABSA) is a task whose objective is to classify the individual sentiment polarity of all entities, called aspects, in a sentence. The task is composed of two subtasks: Aspect Term Extraction (ATE), identify all aspect terms in a sentence; and Sentiment Orientation Extraction (SOE), given a sentence and its aspect terms, the task is to determine the sentiment polarit… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: 11 pages, 3 figures, In Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2022), Online. CEUR. org

    Report number: urn:nbn:de:0074-3202-9

  15. arXiv:2310.17332  [pdf, other

    cs.LG

    On Forecast Stability

    Authors: Rakshitha Godahewa, Christoph Bergmeir, Zeynep Erkin Baz, Chengjun Zhu, Zhangdi Song, Salvador García, Dario Benavides

    Abstract: Forecasts are typically not produced in a vacuum but in a business context, where forecasts are generated on a regular basis and interact with each other. For decisions, it may be important that forecasts do not change arbitrarily, and are stable in some sense. However, this area has received only limited attention in the forecasting literature. In this paper, we explore two types of forecast stab… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

  16. arXiv:2309.13476  [pdf, other

    cs.CL cs.SD eess.AS

    Hierarchical attention interpretation: an interpretable speech-level transformer for bi-modal depression detection

    Authors: Qingkun Deng, Saturnino Luz, Sofia de la Fuente Garcia

    Abstract: Depression is a common mental disorder. Automatic depression detection tools using speech, enabled by machine learning, help early screening of depression. This paper addresses two limitations that may hinder the clinical implementations of such tools: noise resulting from segment-level labelling and a lack of model interpretability. We propose a bi-modal speech-level transformer to avoid segment-… ▽ More

    Submitted 6 October, 2023; v1 submitted 23 September, 2023; originally announced September 2023.

    Comments: 5 pages, 3 figures, submitted to IEEE International Conference on Acoustics, Speech, and Signal Processing

    ACM Class: F.2.2; I.2.7

  17. arXiv:2309.08337  [pdf

    cs.OH

    Proceedings of the XII International Workshop on Locational Analysis and Related Problems

    Authors: Marta Baldomero-Naranjo, Víctor Blanco, Sergio García, Ricardo Gázquez, Jörg Kalcsics, Luisa I. Martínez-Merino, Juan M. Muñoz-Ocaña, Francisco Temprano, Alberto Torrejón

    Abstract: The International Workshop on Locational Analysis and Related Problems will take place during September 7-8, 2023 in Edinburgh (United Kingdom). It is organized by the Spanish Location Network and the Location Group GELOCA from the Spanish Society of Statistics and Operations Research (SEIO). The Spanish Location Network is a group of more than 140 researchers from several Spanish universities org… ▽ More

    Submitted 5 October, 2023; v1 submitted 15 September, 2023; originally announced September 2023.

    Comments: The proceedings book of the previous editions can be found at arXiv:2002.08287 arXiv:2002.08293 arXiv:2002.08300 arXiv:2002.01702 arXiv:2202.13878

    Report number: ISBN: 978-84-09-53463-0

  18. arXiv:2309.00155  [pdf, other

    cs.CR cs.AI cs.CL

    LLM in the Shell: Generative Honeypots

    Authors: Muris Sladić, Veronica Valeros, Carlos Catania, Sebastian Garcia

    Abstract: Honeypots are essential tools in cybersecurity. However, most of them (even the high-interaction ones) lack the required realism to engage and fool human attackers. This limitation makes them easily discernible, hindering their effectiveness. This work introduces a novel method to create dynamic and realistic software honeypots based on Large Language Models. Preliminary results indicate that LLMs… ▽ More

    Submitted 9 February, 2024; v1 submitted 31 August, 2023; originally announced September 2023.

    Comments: 6 pages. 2 figures. 2 tables

  19. The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning

    Authors: Maria Rigaki, Sebastian Garcia

    Abstract: Due to the proliferation of malware, defenders are increasingly turning to automation and machine learning as part of the malware detection tool-chain. However, machine learning models are susceptible to adversarial attacks, requiring the testing of model and product robustness. Meanwhile, attackers also seek to automate malware generation and evasion of antivirus systems, and defenders try to gai… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

    Comments: 12 pages, 3 figures, 3 tables. Accepted at ESORICS 2023

  20. arXiv:2308.16061  [pdf, other

    cs.CR cs.CL cs.LG

    Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning

    Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia

    Abstract: Ransomware-as-a-service (RaaS) is increasing the scale and complexity of ransomware attacks. Understanding the internal operations behind RaaS has been a challenge due to the illegality of such activities. The recent chat leak of the Conti RaaS operator, one of the most infamous ransomware operators on the international scene, offers a key opportunity to better understand the inner workings of suc… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

  21. arXiv:2308.12086  [pdf, other

    cs.CR cs.AI cs.CL

    Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments

    Authors: Maria Rigaki, Ondřej Lukáš, Carlos A. Catania, Sebastian Garcia

    Abstract: Large Language Models (LLMs) have gained widespread popularity across diverse domains involving text generation, summarization, and various natural language processing tasks. Despite their inherent limitations, LLM-based designs have shown promising capabilities in planning and navigating open-world scenarios. This paper introduces a novel application of pre-trained LLMs as agents within cybersecu… ▽ More

    Submitted 28 August, 2023; v1 submitted 23 August, 2023; originally announced August 2023.

    Comments: Under review. 10 pages plus appendices, 7 figures, 4 tables. Edit: fix e-mails and code repository

  22. arXiv:2307.03948  [pdf, other

    cs.CV

    Reading Between the Lanes: Text VideoQA on the Road

    Authors: George Tom, Minesh Mathew, Sergi Garcia, Dimosthenis Karatzas, C. V. Jawahar

    Abstract: Text and signs around roads provide crucial information for drivers, vital for safe navigation and situational awareness. Scene text recognition in motion is a challenging problem, while textual cues typically appear for a short time span, and early detection at a distance is necessary. Systems that exploit such information to assist the driver should not only extract and incorporate visual and te… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

  23. Methodology for generating synthetic labeled datasets for visual container inspection

    Authors: Guillem Delgado, Andoni Cortés, Sara García, Estíbaliz Loyo, Maialen Berasategi, Nerea Aranjuelo

    Abstract: Nowadays, containerized freight transport is one of the most important transportation systems that is undergoing an automation process due to the Deep Learning success. However, it suffers from a lack of annotated data in order to incorporate state-of-the-art neural network models to its systems. In this paper we present an innovative methodology to generate a realistic, varied, balanced, and la… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Journal ref: Transportation Research Part E: Logistics and Transportation Review, Volume 175, 2023, 103174

  24. arXiv:2306.03739  [pdf, other

    cs.LG cs.AI physics.acc-ph

    Learning to Do or Learning While Doing: Reinforcement Learning and Bayesian Optimisation for Online Continuous Tuning

    Authors: Jan Kaiser, Chenran Xu, Annika Eichler, Andrea Santamaria Garcia, Oliver Stein, Erik Bründermann, Willi Kuropka, Hannes Dinter, Frank Mayet, Thomas Vinatier, Florian Burkart, Holger Schlarb

    Abstract: Online tuning of real-world plants is a complex optimisation problem that continues to require manual intervention by experienced human operators. Autonomous tuning is a rapidly expanding field of research, where learning-based methods, such as Reinforcement Learning-trained Optimisation (RLO) and Bayesian optimisation (BO), hold great promise for achieving outstanding plant performance and reduci… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 17 pages, 8 figures, 2 tables

  25. arXiv:2305.01346  [pdf, other

    cs.CR cs.NI

    Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots

    Authors: Veronica Valeros, Maria Rigaki, Sebastian Garcia

    Abstract: Honeypots are a well-known and widely used technology in the cybersecurity community, where it is assumed that placing honeypots in different geographical locations provides better visibility and increases effectiveness. However, how geolocation affects the usefulness of honeypots is not well-studied, especially for threat intelligence as early warning systems. This paper examines attack patterns… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  26. arXiv:2305.01337  [pdf, other

    cs.CR

    Towards a better labeling process for network security datasets

    Authors: Sebastian Garcia, Veronica Valeros

    Abstract: Most network security datasets do not have comprehensive label assignment criteria, hindering the evaluation of the datasets, the training of models, the results obtained, the comparison with other methods, and the evaluation in real-life scenarios. There is no labeling ontology nor tools to help assign the labels, resulting in most analyzed datasets assigning labels in files or directory names. T… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  27. arXiv:2303.00522  [pdf, other

    cs.LG cs.AI

    Semi-Supervised Constrained Clustering: An In-Depth Overview, Ranked Taxonomy and Future Research Directions

    Authors: Germán González-Almagro, Daniel Peralta, Eli De Poorter, José-Ramón Cano, Salvador García

    Abstract: Clustering is a well-known unsupervised machine learning approach capable of automatically grouping discrete sets of instances with similar characteristics. Constrained clustering is a semi-supervised extension to this process that can be used when expert knowledge is available to indicate constraints that can be exploited. Well-known examples of such constraints are must-link (indicating that two… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

  28. arXiv:2302.14060  [pdf, other

    cs.LG cs.AI

    Semi-supervised Clustering with Two Types of Background Knowledge: Fusing Pairwise Constraints and Monotonicity Constraints

    Authors: Germán González-Almagro, Juan Luis Suárez, Pablo Sánchez-Bermejo, José-Ramón Cano, Salvador García

    Abstract: This study addresses the problem of performing clustering in the presence of two types of background knowledge: pairwise constraints and monotonicity constraints. To achieve this, the formal framework to perform clustering under monotonicity constraints is, firstly, defined, resulting in a specific distance measure. Pairwise constraints are integrated afterwards by designing an objective function… ▽ More

    Submitted 25 February, 2023; originally announced February 2023.

  29. Catch Me If You Can: Improving Adversaries in Cyber-Security With Q-Learning Algorithms

    Authors: Arti Bandhana, Ondřej Lukáš, Sebastian Garcia, Tomáš Kroupa

    Abstract: The ongoing rise in cyberattacks and the lack of skilled professionals in the cybersecurity domain to combat these attacks show the need for automated tools capable of detecting an attack with good performance. Attackers disguise their actions and launch attacks that consist of multiple actions, which are difficult to detect. Therefore, improving defensive tools requires their calibration against… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  30. arXiv:2209.00232  [pdf, other

    cs.CV

    Hybrid Gromov-Wasserstein Embedding for Capsule Learning

    Authors: Pourya Shamsolmoali, Masoumeh Zareapoor, Swagatam Das, Eric Granger, Salvador Garcia

    Abstract: Capsule networks (CapsNets) aim to parse images into a hierarchy of objects, parts, and their relations using a two-step process involving part-whole transformation and hierarchical component routing. However, this hierarchical relationship modeling is computationally expensive, which has limited the wider use of CapsNet despite its potential advantages. The current state of CapsNet models primari… ▽ More

    Submitted 24 October, 2023; v1 submitted 1 September, 2022; originally announced September 2022.

  31. arXiv:2207.10733  [pdf, other

    cs.LG cs.CY

    GreenDB -- A Dataset and Benchmark for Extraction of Sustainability Information of Consumer Goods

    Authors: Sebastian Jäger, Alexander Flick, Jessica Adriana Sanchez Garcia, Kaspar von den Driesch, Karl Brendel, Felix Biessmann

    Abstract: The production, shipping, usage, and disposal of consumer goods have a substantial impact on greenhouse gas emissions and the depletion of resources. Machine Learning (ML) can help to foster sustainable consumption patterns by accounting for sustainability aspects in product search or recommendations of modern retail platforms. However, the lack of large high quality publicly available product dat… ▽ More

    Submitted 16 August, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: Presented at DataPerf Workshop at the 39th International Conference on Machine Learning, Baltimore, Maryland, USA, 2022

  32. A Driver-Vehicle Model for ADS Scenario-based Testing

    Authors: Rodrigo Queiroz, Divit Sharma, Ricardo Caldas, Krzysztof Czarnecki, Sergio García, Thorsten Berger, Patrizio Pelliccione

    Abstract: Scenario-based testing for automated driving systems (ADS) must be able to simulate traffic scenarios that rely on interactions with other vehicles. Although many languages for high-level scenario modelling have been proposed, they lack the features to precisely and reliably control the required micro-simulation, while also supporting behavior reuse and test reproducibility for a wide range of int… ▽ More

    Submitted 29 May, 2024; v1 submitted 5 May, 2022; originally announced May 2022.

    Comments: 15 pages, 15 figures

  33. Handling Imbalanced Classification Problems With Support Vector Machines via Evolutionary Bilevel Optimization

    Authors: Alejandro Rosales-Pérez, Salvador García, Francisco Herrera

    Abstract: Support vector machines (SVMs) are popular learning algorithms to deal with binary classification problems. They traditionally assume equal misclassification costs for each class; however, real-world problems may have an uneven class distribution. This article introduces EBCS-SVM: evolutionary bilevel cost-sensitive SVMs. EBCS-SVM handles imbalanced classification problems by simultaneously learni… ▽ More

    Submitted 21 April, 2022; originally announced April 2022.

    Comments: Copyright 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

    MSC Class: 62H30 ACM Class: I.2

    Journal ref: IEEE Transactions on Cybernetics, Early Access, april 13, 2022

  34. Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions

    Authors: Maria Rigaki, Sebastian Garcia

    Abstract: Model stealing attacks have been successfully used in many machine learning domains, but there is little understanding of how these attacks work against models that perform malware detection. Malware detection and, in general, security domains have unique conditions. In particular, there are very strong requirements for low false positive rates (FPR). Antivirus products (AVs) that use machine lear… ▽ More

    Submitted 4 June, 2023; v1 submitted 13 April, 2022; originally announced April 2022.

    Comments: 20 pages, 10 figures, 8 tables. Accepted, please use the DOI/ journal for citations

    Journal ref: Computers & Security, Volume 129, June 2023, 103192

  35. arXiv:2203.05968  [pdf, other

    eess.IV cs.CV cs.LG math.NA math.OC physics.med-ph

    Multi-Channel Convolutional Analysis Operator Learning for Dual-Energy CT Reconstruction

    Authors: Alessandro Perelli, Suxer Alfonso Garcia, Alexandre Bousse, Jean-Pierre Tasu, Nikolaos Efthimiadis, Dimitris Visvikis

    Abstract: Objective. Dual-energy computed tomography (DECT) has the potential to improve contrast, reduce artifacts and the ability to perform material decomposition in advanced imaging applications. The increased number or measurements results with a higher radiation dose and it is therefore essential to reduce either number of projections per energy or the source X-ray intensity, but this makes tomographi… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

    Comments: 23 pages, 11 figures, published in the Physics in Medicine & Biology journal

    Journal ref: Phys. Med. Biol., 67, 065001, 2022

  36. Entanglement: Cybercrime Connections of an Internet Marketing Forum Population

    Authors: Masarah Paquet-Clouston, Serge-Olivier Paquette, Sebastián García, María José Erquiaga

    Abstract: Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cybercrime. It does so by investigating the involvement in cybercrime of a population of users interested in internet marketing, both at a micro and macro s… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 18 pages, 4 figures

    Report number: tyac010

    Journal ref: Journal of Cybersecurity 8-1 (2022) 1-14

  37. Signaling Design for Cooperative Resource Allocation and its Impact to Reliability

    Authors: Rasmus Liborius Bruun, C. Santiago Morejón García, Troels B. Sørensen, Nuno K. Pratas, Tatiana Kozlova Madsen, Preben Mogensen

    Abstract: Decentralized cooperative resource allocation schemes for robotic swarms are essential to enable high reliability in high throughput data exchanges. These cooperative schemes require control signaling with the aim to avoid half-duplex problems at the receiver and mitigate interference. We propose two cooperative resource allocation schemes, device sequential and group scheduling, and introduce a c… ▽ More

    Submitted 15 September, 2022; v1 submitted 15 September, 2021; originally announced September 2021.

  38. Deep Generative Models to Extend Active Directory Graphs with Honeypot Users

    Authors: Ondrej Lukas, Sebastian Garcia

    Abstract: Active Directory (AD) is a crucial element of large organizations, given its central role in managing access to resources. Since AD is used by all users in the organization, it is hard to detect attackers. We propose to generate and place fake users (honeyusers) in AD structures to help detect attacks. However, not any honeyuser will attract attackers. Our method generates honeyusers with a Variat… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

    Comments: 2nd International Conference on Deep Learning Theory and Applications - DeLTA2021

    Journal ref: In Proceedings of the 2nd International Conference on Deep Learning Theory and Applications - DeLTA, ISBN 978-989-758-526-5; ISSN 2184-9277, pages 140-147; 2021

  39. arXiv:2109.00201  [pdf, other

    cs.LG cs.AI cs.CV

    An Empirical Study on the Joint Impact of Feature Selection and Data Re-sampling on Imbalance Classification

    Authors: Chongsheng Zhang, Paolo Soda, Jingjun Bi, Gaojuan Fan, George Almpanidis, Salvador Garcia

    Abstract: In predictive tasks, real-world datasets often present different degrees of imbalanced (i.e., long-tailed or skewed) distributions. While the majority (the head) classes have sufficient samples, the minority (the tail) classes can be under-represented by a rather limited number of samples. Data pre-processing has been shown to be very effective in dealing with such problems. On one hand, data re-s… ▽ More

    Submitted 13 September, 2021; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: 25 pages, 12 figures; revision v1

  40. arXiv:2107.04436  [pdf, other

    cs.CR cs.NI

    Large Scale Measurement on the Adoption of Encrypted DNS

    Authors: Sebastián García, Karel Hynek, Dmtrii Vekshin, Tomáš Čejka, Armin Wasicek

    Abstract: Several encryption proposals for DNS have been presented since 2016, but their adoption was not comprehensively studied yet. This research measured the current adoption of DoH (DNS over HTTPS), DoT (DNS over TLS), and DoQ (DNS over QUIC) for five months at the beginning of 2021 by three different organizations with global coverage. By comparing the total values, amount of requests per user, and th… ▽ More

    Submitted 9 July, 2021; originally announced July 2021.

    Comments: 16 pages, 10 figures

    ACM Class: C.2.0; C.2.2

  41. arXiv:2105.02710  [pdf, other

    cs.NI

    Current State of IPv6 Security in IoT

    Authors: Lisandro Ubiedo, Thomas O'Hara, María José Erquiaga, Sebastian Garcia

    Abstract: This report presents the current state of security in IPv6 for IoT devices. In this research conducted from May 2020 to July 2020, we explored the global growth of IPv6 and compared it with the real growth of IPv6 in a medium size network. If IPv6 is already being used, are attackers already attacking using this protocol? To answer this question we look at the current vulnerabilities, attacks, and… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: Editor: Veronica Valeros

  42. arXiv:2104.10775  [pdf, other

    cs.CV

    Meta-learning for skin cancer detection using Deep Learning Techniques

    Authors: Sara I. Garcia

    Abstract: This study focuses on automatic skin cancer detection using a Meta-learning approach for dermoscopic images. The aim of this study is to explore the benefits of the generalization of the knowledge extracted from non-medical data in the classification performance of medical data and the impact of the distribution shift problem within limited data by using a simple class and distribution balancer al… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

  43. arXiv:2102.00700  [pdf, other

    cs.LG cond-mat.mtrl-sci

    A reproducibility study of "Augmenting Genetic Algorithms with Deep Neural Networks for Exploring the Chemical Space"

    Authors: Kevin Maik Jablonka, Fergus Mcilwaine, Susana Garcia, Berend Smit, Brian Yoo

    Abstract: Nigam et al. reported a genetic algorithm (GA) utilizing the SELFIES representation and also propose an adaptive, neural network-based penalty that is supposed to improve the diversity of the generated molecules. The main claims of the paper are that this GA outperforms other generative techniques (as measured by the penalized logP) and that a neural network-based adaptive penalty increases the di… ▽ More

    Submitted 10 February, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

    Comments: Fixed typos use rasterized figure

  44. arXiv:2010.06047  [pdf, other

    cs.AI cs.CL eess.AS

    Artificial Intelligence, speech and language processing approaches to monitoring Alzheimer's Disease: a systematic review

    Authors: Sofia de la Fuente Garcia, Craig Ritchie, Saturnino Luz

    Abstract: Language is a valuable source of clinical information in Alzheimer's Disease, as it declines concurrently with neurodegeneration. Consequently, speech and language data have been extensively studied in connection with its diagnosis. This paper summarises current findings on the use of artificial intelligence, speech and language processing to predict cognitive decline in the context of Alzheimer's… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: Pre-print submitted to the Journal of Alzheimer's Disease

    ACM Class: J.3; I.2.7; I.2.6; I.5.4

  45. arXiv:2007.07646  [pdf, other

    cs.CR cs.LG

    A Survey of Privacy Attacks in Machine Learning

    Authors: Maria Rigaki, Sebastian Garcia

    Abstract: As machine learning becomes more widely used, the need to study its implications in security and privacy becomes more urgent. Although the body of work in privacy has been steadily growing over the past few years, research on the privacy aspects of machine learning has received less focus than the security aspects. Our contribution in this research is an analysis of more than 40 papers related to… ▽ More

    Submitted 16 September, 2023; v1 submitted 15 July, 2020; originally announced July 2020.

    Comments: Edit to add DOI. Accepted in ACM Computing Surveys, please cite the journal version

  46. Robotics Software Engineering: A Perspective from the Service Robotics Domain

    Authors: Sergio García, Daniel Strüber, Davide Brugali, Thorsten Berger, Patrizio Pelliccione

    Abstract: Robots that support humans by performing useful tasks (a.k.a., service robots) are booming worldwide. In contrast to industrial robots, the development of service robots comes with severe software engineering challenges, since they require high levels of robustness and autonomy to operate in highly heterogeneous environments. As a domain with critical safety implications, service robotics faces a… ▽ More

    Submitted 8 September, 2020; v1 submitted 18 June, 2020; originally announced June 2020.

    Comments: 11 pages + 1 page for references, 3 figures, 3 tables, in proceedings of ESEC/FSE 2020

  47. arXiv:2006.06122  [pdf, other

    cs.CR cs.LG

    DNS Tunneling: A Deep Learning based Lexicographical Detection Approach

    Authors: Franco Palau, Carlos Catania, Jorge Guerra, Sebastian Garcia, Maria Rigaki

    Abstract: Domain Name Service is a trusted protocol made for name resolution, but during past years some approaches have been developed to use it for data transfer. DNS Tunneling is a method where data is encoded inside DNS queries, allowing information exchange through the DNS. This characteristic is attractive to hackers who exploit DNS Tunneling method to establish bidirectional communication with machin… ▽ More

    Submitted 14 June, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

  48. arXiv:2003.02601  [pdf, other

    cs.LG stat.ML

    Fuzzy k-Nearest Neighbors with monotonicity constraints: Moving towards the robustness of monotonic noise

    Authors: Sergio González, Salvador García, Sheng-Tun Li, Robert John, Francisco Herrera

    Abstract: This paper proposes a new model based on Fuzzy k-Nearest Neighbors for classification with monotonic constraints, Monotonic Fuzzy k-NN (MonFkNN). Real-life data-sets often do not comply with monotonic constraints due to class noise. MonFkNN incorporates a new calculation of fuzzy memberships, which increases robustness against monotonic noise without the need for relabeling. Our proposal has been… ▽ More

    Submitted 5 March, 2020; originally announced March 2020.

    Comments: Accepted in Neurocomputing

  49. Recent Trends in the Use of Statistical Tests for Comparing Swarm and Evolutionary Computing Algorithms: Practical Guidelines and a Critical Review

    Authors: J. Carrasco, S. García, M. M. Rueda, S. Das, F. Herrera

    Abstract: A key aspect of the design of evolutionary and swarm intelligence algorithms is studying their performance. Statistical comparisons are also a crucial part which allows for reliable conclusions to be drawn. In the present paper we gather and examine the approaches taken from different perspectives to summarise the assumptions made by these statistical tests, the conclusions reached and the steps f… ▽ More

    Submitted 21 February, 2020; originally announced February 2020.

    Comments: 52 pages, 10 figures, 19 tables

    Journal ref: SWEVO, Volume 54, May 2020, 100665

  50. Comprehensive Taxonomies of Nature- and Bio-inspired Optimization: Inspiration versus Algorithmic Behavior, Critical Analysis and Recommendations (from 2020 to 2024)

    Authors: Daniel Molina, Javier Poyatos, Javier Del Ser, Salvador García, Amir Hussain, Francisco Herrera

    Abstract: In recent years, bio-inspired optimization methods, which mimic biological processes to solve complex problems, have gained popularity in recent literature. The proliferation of proposals prove the growing interest in this field. The increase in nature- and bio-inspired algorithms, applications, and guidelines highlights growing interest in this field. However, the exponential rise in the number o… ▽ More

    Submitted 17 April, 2024; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: 89 pages, 9 figures

    ACM Class: I.2.8

    Journal ref: Cognitive Computation 12:5 (2020) 897-939