Skip to main content

Showing 1–13 of 13 results for author: Vella, M

.
  1. Runtime Verification for Trustworthy Computing

    Authors: Robert Abela, Christian Colombo, Axel Curmi, Mattea Fenech, Mark Vella, Angelo Ferrando

    Abstract: Autonomous and robotic systems are increasingly being trusted with sensitive activities with potentially serious consequences if that trust is broken. Runtime verification techniques present a natural source of inspiration for monitoring and enforcing the desirable properties of the communication protocols in place, providing a formal basis and ways to limit intrusiveness. A recently proposed app… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: In Proceedings AREA 2023, arXiv:2310.00333

    Journal ref: EPTCS 391, 2023, pp. 49-62

  2. arXiv:2209.03177  [pdf, other

    eess.IV cs.CV cs.LG

    Morphology-preserving Autoregressive 3D Generative Modelling of the Brain

    Authors: Petru-Daniel Tudosiu, Walter Hugo Lopez Pinaya, Mark S. Graham, Pedro Borges, Virginia Fernandez, Dai Yang, Jeremy Appleyard, Guido Novati, Disha Mehra, Mike Vella, Parashkev Nachev, Sebastien Ourselin, Jorge Cardoso

    Abstract: Human anatomy, morphology, and associated diseases can be studied using medical imaging data. However, access to medical imaging data is restricted by governance and privacy concerns, data ownership, and the cost of acquisition, thus limiting our ability to understand the human body. A possible solution to this issue is the creation of a model able to learn and then generate synthetic images of th… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 13 pages, 3 figures, 2 tables, accepted at SASHIMI MICCAI 2022

    MSC Class: 68T99 (Primary) 92C55 (Secondary) ACM Class: I.2.1; J.3

  3. arXiv:2203.14437  [pdf, other

    eess.SY

    Individual and Team Trust Preferences for Robotic Swarm Behaviors

    Authors: Elena M Vella, Daniel A Williams, Airlie Chapman, Chris Manzie

    Abstract: Trust between humans and multi-agent robotic swarms may be analyzed using human preferences. These preferences are expressed by an individual as a sequence of ordered comparisons between pairs of swarm behaviors. An individual's preference graph can be formed from this sequence. In addition, swarm behaviors may be mapped to a feature vector space. We formulate a linear optimization problem to loca… ▽ More

    Submitted 27 March, 2022; originally announced March 2022.

  4. Casting exploit analysis as a Weird Machine reconstruction problem

    Authors: Robert Abela, Mark Vella

    Abstract: Exploits constitute malware in the form of application inputs. They take advantage of security vulnerabilities inside programs in order to yield execution control to attackers. The root cause of successful exploitation lies in emergent functionality introduced when programs are compiled and loaded in memory for execution, called `Weird Machines' (WMs). Essentially WMs are unexpected virtual machin… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Journal ref: In: WorldCIS 2017, Infonomics Society, pp 47-54 (2017)

  5. arXiv:2106.07066  [pdf, other

    eess.IV cs.LG eess.SP

    Enhanced Hyperspectral Image Super-Resolution via RGB Fusion and TV-TV Minimization

    Authors: Marija Vella, Bowen Zhang, Wei Chen, João F. C. Mota

    Abstract: Hyperspectral (HS) images contain detailed spectral information that has proven crucial in applications like remote sensing, surveillance, and astronomy. However, because of hardware limitations of HS cameras, the captured images have low spatial resolution. To improve them, the low-resolution hyperspectral images are fused with conventional high-resolution RGB images via a technique known as fusi… ▽ More

    Submitted 13 June, 2021; originally announced June 2021.

    Comments: Accepted to ICIP 2021

  6. arXiv:2105.05510  [pdf, other

    cs.CR

    Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android

    Authors: Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio Hernandez-Castro

    Abstract: Digital investigations of stealthy attacks on Android devices pose particular challenges to incident responders. Whereas consequential late detection demands accurate and comprehensive forensic timelines to reconstruct all malicious activities, reduced forensic footprints with minimal malware involvement, such as when Living-Off-the-Land (LOtL) tactics are adopted, leave investigators little evide… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: 14 pages, 3 figures, 2 tables, 2 listings, SECRYPT 2021

  7. EtherClue: Digital investigation of attacks on Ethereum smart contracts

    Authors: Simon Joseph Aquilina, Fran Casino, Mark Vella, Joshua Ellul, Constantinos Patsakis

    Abstract: Programming errors in Ethereum smart contracts can result in catastrophic financial losses from stolen cryptocurrency. While vulnerability detectors can prevent vulnerable contracts from being deployed, this does not mean that such contracts will not be deployed. Once a vulnerable contract is instantiated on the blockchain and becomes the target of attacks, the identification of exploit transactio… ▽ More

    Submitted 2 September, 2021; v1 submitted 12 April, 2021; originally announced April 2021.

    Journal ref: Blockchain: Research and Applications,2021,100028,ISSN 2096-7209

  8. SpotCheck: On-Device Anomaly Detection for Android

    Authors: Mark Vella, Christian Colombo

    Abstract: In recent years the PC has been replaced by mobile devices for many security sensitive operations, both from a privacy and a financial standpoint. While security mechanisms are deployed at various levels, these are frequently put under strain by previously unseen malware. An additional protection layer capable of novelty detection is therefore needed. In this work we propose SpotCheck, an anomaly… ▽ More

    Submitted 25 February, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

    Journal ref: SIN 2020: 13th International Conference on Security of Information and Networks, Merkez, Turkey, November 2020

  9. arXiv:2011.14387  [pdf, other

    eess.IV cs.CV eess.SP math.OC

    Overcoming Measurement Inconsistency in Deep Learning for Linear Inverse Problems: Applications in Medical Imaging

    Authors: Marija Vella, João F. C. Mota

    Abstract: The remarkable performance of deep neural networks (DNNs) currently makes them the method of choice for solving linear inverse problems. They have been applied to super-resolve and restore images, as well as to reconstruct MR and CT images. In these applications, DNNs invert a forward operator by finding, via training data, a map between the measurements and the input images. It is then expected t… ▽ More

    Submitted 31 May, 2021; v1 submitted 29 November, 2020; originally announced November 2020.

    Comments: Accepted for publication at ICASSP 2021

  10. arXiv:2004.00843  [pdf, other

    cs.CV cs.LG math.OC

    Robust Single-Image Super-Resolution via CNNs and TV-TV Minimization

    Authors: Marija Vella, João F. C. Mota

    Abstract: Single-image super-resolution is the process of increasing the resolution of an image, obtaining a high-resolution (HR) image from a low-resolution (LR) one. By leveraging large training datasets, convolutional neural networks (CNNs) currently achieve the state-of-the-art performance in this task. Yet, during testing/deployment, they fail to enforce consistency between the HR and LR images: if we… ▽ More

    Submitted 2 April, 2020; originally announced April 2020.

    Comments: Under peer review

  11. arXiv:1907.05380  [pdf, other

    cs.CV cs.LG math.OC

    Single Image Super-Resolution via CNN Architectures and TV-TV Minimization

    Authors: Marija Vella, João F. C. Mota

    Abstract: Super-resolution (SR) is a technique that allows increasing the resolution of a given image. Having applications in many areas, from medical imaging to consumer electronics, several SR methods have been proposed. Currently, the best performing methods are based on convolutional neural networks (CNNs) and require extensive datasets for training. However, at test time, they fail to impose consistenc… ▽ More

    Submitted 27 November, 2019; v1 submitted 11 July, 2019; originally announced July 2019.

    Comments: Accepted to BMVC 2019; v2 contains updated results and minor bug fixes

  12. arXiv:physics/0008156  [pdf

    physics.acc-ph

    The DARHT Phase 2 Linac

    Authors: HL Rutkowski, LL Reginato, WL Waldron, KP Chow, MC Vella, WM Fawley, R Briggs, S Nelson, Z Wolf, D Birx

    Abstract: The second phase accelerator for the Dual Axis Hydrodynamic Test facility (DARHT) is designed to provide an electron beam pulse that is 2 microsec long, 2kA, and 20 MeV in particle energy. The injector provides 3.2 MeV so that the linac need only provide 16.8 MeV. The linac is made with two types of induction accelerator cells. The first block of 8 cells have a 14 in. beam pipe compared to 10 in… ▽ More

    Submitted 18 August, 2000; originally announced August 2000.

    Comments: 3 pgs, 3 figs

    Journal ref: eConf C000821 (2000) TUB08

  13. arXiv:physics/0008099  [pdf

    physics.acc-ph

    RF Cell Modeling and Experiments for Wakefield Minimization in DARHT-II

    Authors: Scott D. Nelson, Michael Vella

    Abstract: Electron beams of linear induction accelerators experience deflective forces caused by RF fields building up as a result of accelerating cavities of finite size. These forces can significantly effect the beam when a long linac composed of identical cells is assembled. Recent techniques in computational modeling, simulation, and experiments for 20 MeV DARHT-II (Dual Axis Radiographic Hydrodynamic… ▽ More

    Submitted 21 August, 2000; v1 submitted 16 August, 2000; originally announced August 2000.

    Comments: LINAC2000 TUB09

    Journal ref: eConf C000821 (2000) TUB09