Skip to main content

Showing 1–9 of 9 results for author: Acosta, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07988  [pdf

    cs.CV

    A Generalist Learner for Multifaceted Medical Image Interpretation

    Authors: Hong-Yu Zhou, Subathra Adithan, Julián Nicolás Acosta, Eric J. Topol, Pranav Rajpurkar

    Abstract: Current medical artificial intelligence systems are often limited to narrow applications, hindering their widespread adoption in clinical practice. To address this limitation, we propose MedVersa, a generalist learner that enables flexible learning and tasking for medical image interpretation. By leveraging a large language model as a learnable orchestrator, MedVersa can learn from both visual and… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: Technical study

  2. arXiv:2311.12952  [pdf, other

    cs.CR

    Towards new challenges of modern Pentest

    Authors: Daniel Dalalana Bertoglio, Arthur Gil, Juan Acosta, Julia Godoy, Roben Castagna Lunardi, Avelino Francisco Zorzo

    Abstract: With the increasing number of internet-based resources and applications, the amount of attacks faced by companies has increased significantly in the past years. Likewise, the techniques to test security and emulate attacks need to be constantly improved and, as a consequence, help to mitigate attacks. Among these techniques, penetration test (Pentest) provides methods to assess the security postur… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    Comments: 11 pages, 2 figures. Paper presented at World Conference on Smart Trends in Systems, Security, and Sustainability (WorldS4 2023)

  3. arXiv:2309.01447  [pdf, other

    cs.RO

    Experimental method for perching flap**-wing aerial robots

    Authors: Raphael Zufferey, Daniel Feliu-Talegon, Saeed Rafee Nekoo, Jose-Angel Acosta, Anibal Ollero

    Abstract: In this work, we present an experimental setup and guide to enable the perching of large flap**-wing robots. The combination of forward flight, limited payload, and flight oscillations imposes challenging conditions for localized perching. The described method details the different operations that are concurrently performed within the 4 second perching flight. We validate this experiment with a… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

    Comments: IROS 2022 Workshop: Agile Robotics: Perception, Learning, Planning, and Control, 2022

  4. arXiv:2306.06769  [pdf, other

    cs.CR

    Adversarial Reconnaissance Mitigation and Modeling

    Authors: Shanto Roy, Nazia Sharmin, Mohammad Sujan Miah, Jaime C Acosta, Christopher Kiekintveld, Aron Laszka

    Abstract: Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables threat actors to find the weakest points of otherwise well-defended systems. To thwart reconnaissance, defenders can employ cyber deception techniques, such as deploying honeypots. In recent years, researchers have made great strides in develo** game-theoretic models to find optimal deception strategies. Ho… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

  5. How ornithopters can perch autonomously on a branch

    Authors: Raphael Zufferey, Jesus Tormo Barbero, Daniel Feliu Talegon, Saeed Rafee Nekoo, Jose Angel Acosta, Anibal Ollero

    Abstract: Flap** wings are a bio-inspired method to produce lift and thrust in aerial robots, leading to quiet and efficient motion. The advantages of this technology are safety and maneuverability, and physical interaction with the environment, humans, and animals. However, to enable substantial applications, these robots must perch and land. Despite recent progress in the perching field, flap**-wing v… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

    Journal ref: Nat Commun 13, 7713 (2022)

  6. arXiv:2111.12996  [pdf, other

    cs.LG cs.AI

    Generalizing electrocardiogram delineation -- Training convolutional neural networks with synthetic data augmentation

    Authors: Guillermo Jimenez-Perez, Juan Acosta, Alejandro Alcaine, Oscar Camara

    Abstract: Obtaining per-beat information is a key task in the analysis of cardiac electrocardiograms (ECG), as many downstream diagnosis tasks are dependent on ECG-based measurements. Those measurements, however, are costly to produce, especially in recordings that change throughout long periods of time. However, existing annotated databases for ECG delineation are small, being insufficient in size and in t… ▽ More

    Submitted 13 June, 2022; v1 submitted 25 November, 2021; originally announced November 2021.

  7. arXiv:2105.04749  [pdf, other

    cs.CR

    Survey and Taxonomy of Adversarial Reconnaissance Techniques

    Authors: Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka

    Abstract: Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain. We summarize and analyze the methods, tactics, and tools that adversaries use to conduct reconnaissance activities throughout the attack process. Fi… ▽ More

    Submitted 28 April, 2022; v1 submitted 10 May, 2021; originally announced May 2021.

  8. arXiv:2104.03780  [pdf, other

    cs.AR cs.CL cs.SE

    Enabling Cross-Domain Communication: How to Bridge the Gap between AI and HW Engineers

    Authors: Michael J. Klaiber, Axel J. Acosta, Ingo Feldner, Falk Rehm

    Abstract: A key issue in system design is the lack of communication between hardware, software and domain expert. Recent research work shows progress in automatic HW/SW co-design flows of neural accelerators that seems to make this kind of communication obsolete. Most real-world systems, however, are a composition of multiple processing units, communication networks and memories. A HW/SW co-design process o… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Comments: LATTE 2021 Workshop on Languages, Tools, and Techniques for Accelerator Design

  9. Burning graphs through farthest-first traversal

    Authors: Jesús García Díaz, Julio César Pérez Sansalvador, Lil María Xibai Rodríguez Henríquez, José Alejandro Cornejo Acosta

    Abstract: The graph burning problem is an NP-hard combinatorial optimization problem that helps quantify the vulnerability of a graph to contagion. This paper introduces a simple farthest-first traversal-based approximation algorithm for this problem over general graphs. We refer to this proposal as the Burning Farthest-First (BFF) algorithm. BFF runs in $O(n^3)$ steps and has an approximation factor of… ▽ More

    Submitted 13 December, 2021; v1 submitted 30 November, 2020; originally announced November 2020.

    MSC Class: 05C85