Skip to main content

Showing 1–14 of 14 results for author: Antunes, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14073  [pdf, other

    cs.LG cs.AI cs.NE

    Exploring Layerwise Adversarial Robustness Through the Lens of t-SNE

    Authors: Inês Valentim, Nuno Antunes, Nuno Lourenço

    Abstract: Adversarial examples, designed to trick Artificial Neural Networks (ANNs) into producing wrong outputs, highlight vulnerabilities in these models. Exploring these weaknesses is crucial for develo** defenses, and so, we propose a method to assess the adversarial robustness of image-classifying ANNs. The t-distributed Stochastic Neighbor Embedding (t-SNE) technique is used for visual inspection, a… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  2. arXiv:2308.16570  [pdf, other

    cs.CR cs.LG

    MONDEO: Multistage Botnet Detection

    Authors: Duarte Dias, Bruno Sousa, Nuno Antunes

    Abstract: Mobile devices have widespread to become the most used piece of technology. Due to their characteristics, they have become major targets for botnet-related malware. FluBot is one example of botnet malware that infects mobile devices. In particular, FluBot is a DNS-based botnet that uses Domain Generation Algorithms (DGA) to establish communication with the Command and Control Server (C2). MONDEO i… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

  3. arXiv:2308.03404  [pdf, other

    cs.LG

    Applied metamodelling for ATM performance simulations

    Authors: Christoffer Riis, Francisco N. Antunes, Tatjana Bolić, Gérald Gurtner, Andrew Cook, Carlos Lima Azevedo, Francisco Câmara Pereira

    Abstract: The use of Air traffic management (ATM) simulators for planing and operations can be challenging due to their modelling complexity. This paper presents XALM (eXplainable Active Learning Metamodel), a three-step framework integrating active learning and SHAP (SHapley Additive exPlanations) values into simulation metamodels for supporting ATM decision-making. XALM efficiently uncovers hidden relatio… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  4. arXiv:2207.05451  [pdf, other

    cs.NE cs.AI cs.LG

    Adversarial Robustness Assessment of NeuroEvolution Approaches

    Authors: Inês Valentim, Nuno Lourenço, Nuno Antunes

    Abstract: NeuroEvolution automates the generation of Artificial Neural Networks through the application of techniques from Evolutionary Computation. The main goal of these approaches is to build models that maximize predictive performance, sometimes with an additional objective of minimizing computational complexity. Although the evolved models achieve competitive results performance-wise, their robustness… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  5. arXiv:2006.08811  [pdf, other

    cs.CR cs.SE

    A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate

    Authors: Charles F. Gonçalves, Daniel S. Menasché, Alberto Avritzer, Nuno Antunes, Marco Vieira

    Abstract: The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 2020 Mediterranean Communication and Computer Networking Conference (MedComNet)

    ACM Class: C.4

  6. arXiv:1910.02321  [pdf, other

    cs.LG cs.AI stat.ML

    The Impact of Data Preparation on the Fairness of Software Systems

    Authors: Inês Valentim, Nuno Lourenço, Nuno Antunes

    Abstract: Machine learning models are widely adopted in scenarios that directly affect people. The development of software systems based on these models raises societal and legal concerns, as their decisions may lead to the unfair treatment of individuals based on attributes like race or gender. Data preparation is key in any machine learning pipeline, but its effect on fairness is yet to be studied in deta… ▽ More

    Submitted 5 October, 2019; originally announced October 2019.

  7. arXiv:1810.01300  [pdf, other

    stat.ME cs.SI physics.soc-ph

    Sampling-based Estimation of In-degree Distribution with Applications to Directed Complex Networks

    Authors: Nelson Antunes, Shankar Bhamidi, Tianjian Guo, Vladas Pipiras, Bang Wang

    Abstract: The focus of this work is on estimation of the in-degree distribution in directed networks from sampling network nodes or edges. A number of sampling schemes are considered, including random sampling with and without replacement, and several approaches based on random walks with possible jumps. When sampling nodes, it is assumed that only the out-edges of that node are visible, that is, the in-deg… ▽ More

    Submitted 2 October, 2018; originally announced October 2018.

    Comments: 30 pages , 6 figures

  8. arXiv:1410.1160  [pdf, other

    cs.CR eess.SY

    On Benchmarking Intrusion Detection Systems in Virtualized Environments

    Authors: Aleksandar Milenkoski, Samuel Kounev, Alberto Avritzer, Nuno Antunes, Marco Vieira

    Abstract: Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for vi… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group

    Report number: SPEC-RG-2013-002

  9. arXiv:1410.1158  [pdf, other

    cs.CR

    Technical Information on Vulnerabilities of Hypercall Handlers

    Authors: Aleksandar Milenkoski, Marco Vieira, Bryan D. Payne, Nuno Antunes, Samuel Kounev

    Abstract: Modern virtualized service infrastructures expose attack vectors that enable attacks of high severity, such as attacks targeting hypervisors. A malicious user of a guest VM (virtual machine) may execute an attack against the underlying hypervisor via hypercalls, which are software traps from a kernel of a fully or partially paravirtualized guest VM to the hypervisor. The exploitation of a vulnerab… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group

    Report number: SPEC-RG-2014-001

  10. arXiv:1002.2385  [pdf, other

    cs.NI

    Traffic Capacity of Large WDM Passive Optical Networks

    Authors: Nelson Antunes, Christine Fricker, Philippe Robert, James Roberts

    Abstract: As passive optical networks (PON) are increasingly deployed to provide high speed Internet access, it is important to understand their fundamental traffic capacity limits. The paper discusses performance models applicable to wavelength division multiplexing (WDM) EPONs and GPONs under the assumption that users access the fibre via optical network units equipped with tunable transmitters. The con… ▽ More

    Submitted 27 March, 2010; v1 submitted 11 February, 2010; originally announced February 2010.

  11. arXiv:1002.2384  [pdf, other

    cs.NI

    Upstream traffic capacity of a WDM EPON under online GATE-driven scheduling

    Authors: Nelson Antunes, Christine Fricker, Philippe Robert, James Roberts

    Abstract: Passive optical networks are increasingly used for access to the Internet and it is important to understand the performance of future long-reach, multi-channel variants. In this paper we discuss requirements on the dynamic bandwidth allocation (DBA) algorithm used to manage the upstream resource in a WDM EPON and propose a simple novel DBA algorithm that is considerably more efficient than class… ▽ More

    Submitted 11 February, 2010; originally announced February 2010.

  12. Integration of streaming services and TCP data transmission in the Internet

    Authors: Nelson Antunes, Christine Fricker, Fabrice Guillemin, Philippe Robert

    Abstract: We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian p… ▽ More

    Submitted 6 January, 2006; originally announced January 2006.

    Journal ref: Performance Evaluation 62, 1-4 (2006) 263-277

  13. arXiv:cs/0601015  [pdf, ps, other

    cs.NI

    Perturbation Analysis of a Variable M/M/1 Queue: A Probabilistic Approach

    Authors: Nelson Antunes, Christine Fricker, Fabrice Guillemin, Philippe Robert

    Abstract: Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute t… ▽ More

    Submitted 6 January, 2006; originally announced January 2006.

    Journal ref: Advances in Applied Probability 38, 1 (2006) 263-283

  14. arXiv:cs/0512088  [pdf, ps, other

    cs.NI math.PR

    Analysis of loss networks with routing

    Authors: Nelson Antunes, Christine Fricker, Philippe Robert, Danielle Tibi

    Abstract: This paper analyzes stochastic networks consisting of finite capacity nodes with different classes of requests which move according to some routing policy. The Markov processes describing these networks do not, in general, have reversibility properties, so the explicit expression of their invariant distribution is not known. Kelly's limiting regime is considered: the arrival rates of calls as we… ▽ More

    Submitted 14 February, 2007; v1 submitted 22 December, 2005; originally announced December 2005.

    Comments: Published at http://dx.doi.org/10.1214/105051606000000466 in the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    MSC Class: 60K35 (Primary) 60K25 (Secondary)

    Journal ref: Annals of Applied Probability 16, 4 (2006) 2007-2026