Skip to main content

Showing 1–20 of 20 results for author: Diaz, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06760  [pdf, other

    cs.CR

    Decentralized Reliability Estimation for Mixnets

    Authors: Claudia Diaz, Harry Halpin, Aggelos Kiayias

    Abstract: Continuous-time decryption mixnets can anonymously route data packets with end to end latency that can be as low as a second, making them usable for a variety of applications. Such mixnets however lack verifiable reliability properties that ensure the correct processing and delivery of packets, while existing verifiability mechanisms are incompatible with scalable low latency continuous-time mixne… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2309.17161  [pdf, other

    q-bio.BM cs.LG stat.ML

    Current Methods for Drug Property Prediction in the Real World

    Authors: Jacob Green, Cecilia Cabrera Diaz, Maximilian A. H. Jakobs, Andrea Dimitracopoulos, Mark van der Wilk, Ryan D. Greenhalgh

    Abstract: Predicting drug properties is key in drug discovery to enable de-risking of assets before expensive clinical trials, and to find highly active compounds faster. Interest from the Machine Learning community has led to the release of a variety of benchmark datasets and proposed methods. However, it remains unclear for practitioners which method or approach is most suitable, as different papers bench… ▽ More

    Submitted 25 July, 2023; originally announced September 2023.

  3. arXiv:2201.11860  [pdf, other

    cs.CR

    On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies

    Authors: Piyush Kumar Sharma, Devashish Gosain, Claudia Diaz

    Abstract: Cryptocurrency systems can be subject to deanonimization attacks by exploiting the network-level communication on their peer-to-peer network. Adversaries who control a set of colluding node(s) within the peer-to-peer network can observe transactions being exchanged and infer the parties involved. Thus, various network anonymity schemes have been proposed to mitigate this problem, with some solutio… ▽ More

    Submitted 7 November, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

  4. arXiv:2105.11928  [pdf, other

    cs.CR

    VerLoc: Verifiable Localization in Decentralized Systems

    Authors: Katharina Kohls, Claudia Diaz

    Abstract: We tackle the challenge of reliably determining the geo-location of nodes in decentralized networks, considering adversarial settings and without depending on any trusted landmarks. In particular, we consider active adversaries that control a subset of nodes, announce false locations and strategically manipulate measurements. To address this problem we propose, implement and evaluate VerLoc, a sys… ▽ More

    Submitted 1 October, 2021; v1 submitted 25 May, 2021; originally announced May 2021.

  5. arXiv:2009.14614  [pdf, other

    astro-ph.IM astro-ph.HE cs.LG

    Detecting optical transients using artificial neural networks and reference images from different surveys

    Authors: Katarzyna Wardęga, Adam Zadrożny, Martin Beroiz, Richard Camuccio, Mario C. Díaz

    Abstract: To search for optical counterparts to gravitational waves, it is crucial to develop an efficient follow-up method that allows for both a quick telescopic scan of the event localization region and search through the resulting image data for plausible optical transients. We present a method to detect these transients based on an artificial neural network. We describe the architecture of two networks… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

  6. arXiv:2009.08696  [pdf, other

    cs.AI

    TotalBotWar: A New Pseudo Real-time Multi-action Game Challenge and Competition for AI

    Authors: Alejandro Estaben, César Díaz, Raul Montoliu, Diego Pérez-Liebana

    Abstract: This paper presents TotalBotWar, a new pseudo real-time multi-action challenge for game AI, as well as some initial experiments that benchmark the framework with different agents. The game is based on the real-time battles of the popular TotalWar games series where players manage an army to defeat the opponent's one. In the proposed game, a turn consists of a set of orders to control the units. Th… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

    Comments: 6 pages, 5 figures

  7. Towards Practical 2D Grapevine Bud Detection with Fully Convolutional Networks

    Authors: Wenceslao Villegas Marset, Diego Sebastián Pérez, Carlos Ariel Díaz, Facundo Bromberg

    Abstract: In Viticulture, visual inspection of the plant is a necessary task for measuring relevant variables. In many cases, these visual inspections are susceptible to automation through computer vision methods. Bud detection is one such visual task, central for the measurement of important variables such as: measurement of bud sunlight exposure, autonomous pruning, bud counting, type-of-bud classificatio… ▽ More

    Submitted 4 February, 2021; v1 submitted 26 August, 2020; originally announced August 2020.

    Comments: Revised version submitted to Journal of Computers and Electronics in Agriculture November 13, 2020

    Journal ref: Computers and Electronics in Agriculture, Volume 182, 2021,105947, ISSN 0168-1699

  8. arXiv:2007.08319  [pdf, other

    cs.CR cs.LG

    Less is More: A privacy-respecting Android malware classifier using Federated Learning

    Authors: Rafa Gálvez, Veelasha Moonsamy, Claudia Diaz

    Abstract: In this paper we present LiM ("Less is More"), a malware classification framework that leverages Federated Learning to detect and classify malicious apps in a privacy-respecting manner. Information about newly installed apps is kept locally on users' devices, so that the provider cannot infer which apps were installed by users. At the same time, input from all users is taken into account in the fe… ▽ More

    Submitted 16 June, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

    Comments: 21 pages, 8 figures, accepted in PoPETS 2021.4

  9. FVV Live: A real-time free-viewpoint video system with consumer electronics hardware

    Authors: Pablo Carballeira, Carlos Carmona, César Díaz, Daniel Berjón, Daniel Corregidor, Julián Cabrera, Francisco Morán, Carmen Doblado, Sergio Arnaldo, María del Mar Martín, Narciso García

    Abstract: FVV Live is a novel end-to-end free-viewpoint video system, designed for low cost and real-time operation, based on off-the-shelf components. The system has been designed to yield high-quality free-viewpoint video using consumer-grade cameras and hardware, which enables low deployment costs and easy installation for immersive event-broadcasting or videoconferencing. The paper describes the archi… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

  10. FVV Live: Real-Time, Low-Cost, Free Viewpoint Video

    Authors: Daniel Berjón, Pablo Carballeira, Julián Cabrera, Carlos Carmona, Daniel Corregidor, César Díaz, Francisco Morán, Narciso García

    Abstract: FVV Live is a novel real-time, low-latency, end-to-end free viewpoint system including capture, transmission, synthesis on an edge server and visualization and control on a mobile terminal. The system has been specially designed for low-cost and real-time operation, only using off-the-shelf components.

    Submitted 30 June, 2020; originally announced June 2020.

  11. arXiv:1906.09682  [pdf, other

    cs.CR

    Encrypted DNS --> Privacy? A Traffic Analysis Perspective

    Authors: Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso

    Abstract: Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship. To address these issues, large organizations such as Google and Cloudflare are deploying recently standardized protocols that encrypt DNS traffic between end users and recursive resolvers such a… ▽ More

    Submitted 6 October, 2019; v1 submitted 23 June, 2019; originally announced June 2019.

  12. Methodology for accurately assessing the quality perceived by users on 360VR contents

    Authors: Lara Muñoz, César Díaz, Marta Orduna, José Ignacio Ronda, Pablo Pérez, Ignacio Benito, Narciso García

    Abstract: To properly evaluate the performance of 360VR-specific encoding and transmission schemes, and particularly of the solutions based on viewport adaptation, it is necessary to consider not only the bandwidth saved, but also the quality of the portion of the scene actually seen by users over time. With this motivation, we propose a robust, yet flexible methodology for accurately assessing the quality… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Journal ref: Digital Signal Processing, vol. 100, article 102706, pp. 1-16, May 2020

  13. Video Multimethod Assessment Fusion (VMAF) on 360VR contents

    Authors: Marta Orduna, César Díaz, Lara Muñoz, Pablo Pérez, Ignacio Benito, Narciso García

    Abstract: This paper describes the subjective experiments and subsequent analysis carried out to validate the application of one of the most robust and influential video quality metrics, Video Multimethod Assessment Fusion (VMAF), to 360VR contents. VMAF is a full reference metric initially designed to work with traditional 2D contents. Hence, at first, it cannot be assumed to be compatible with the particu… ▽ More

    Submitted 18 January, 2019; originally announced January 2019.

    Journal ref: IEEE Trans. Consumer Electronics, vol. 66, no. 1, pp. 22-31, Feb. 2020

  14. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services

    Authors: Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz

    Abstract: Recent studies have shown that Tor onion (hidden) service websites are particularly vulnerable to website fingerprinting attacks due to their limited number and sensitive nature. In this work we present a multi-level feature analysis of onion site fingerprintability, considering three state-of-the-art website fingerprinting methods and 482 Tor onion services, making this the largest analysis of th… ▽ More

    Submitted 20 September, 2017; v1 submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted by ACM CCS 2017

  15. arXiv:1708.03387  [pdf, other

    cs.CR

    Multiparty Routing: Secure Routing for Mixnets

    Authors: Fatemeh Shirazi, Elena Andreeva, Markulf Kohlweiss, Claudia Diaz

    Abstract: Anonymous communication networks are important building blocks for online privacy protection. One approach to achieve anonymity is to relay messages through multiple routers, where each router shuffles messages independently. To achieve anonymity, at least one router needs to be honest. In the presence of an adversary that is controlling a subset of the routers unbiased routing is important for gu… ▽ More

    Submitted 9 November, 2017; v1 submitted 10 August, 2017; originally announced August 2017.

  16. arXiv:1608.05538  [pdf, ps, other

    cs.CR

    A Survey on Routing in Anonymous Communication Protocols

    Authors: Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Diaz

    Abstract: The Internet has undergone dramatic changes in the past 15 years, and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, ranging from profiling of users for monetizing personal information to nearly omnipotent governmental survei… ▽ More

    Submitted 19 August, 2016; originally announced August 2016.

    Comments: 24 pages, 4 tables, 4 figures

  17. arXiv:1605.02775  [pdf, other

    cs.CV

    Image Classification of Grapevine Buds using Scale-Invariant Features Transform, Bag of Features and Support Vector Machines

    Authors: Diego Sebastián Pérez, Facundo Bromberg, Carlos Ariel Diaz

    Abstract: In viticulture, there are several applications where bud detection in vineyard images is a necessary task, susceptible of being automated through the use of computer vision methods. A common and effective family of visual detection algorithms are the scanning-window type, that slide a (usually) fixed size window along the original image, classifying each resulting windowed-patch as containing or n… ▽ More

    Submitted 9 May, 2016; originally announced May 2016.

    Comments: 21 pages, 7 figures, 2 tables

  18. arXiv:1512.00524  [pdf, other

    cs.CR

    Toward an Efficient Website Fingerprinting Defense

    Authors: Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright

    Abstract: Website Fingerprinting attacks enable a passive eavesdropper to recover the user's otherwise anonymized web browsing activity by matching the observed traffic with prerecorded web traffic templates. The defenses that have been proposed to counter these attacks are impractical for deployment in real-world systems due to their high cost in terms of added delay and bandwidth overhead. Further, these… ▽ More

    Submitted 19 July, 2016; v1 submitted 1 December, 2015; originally announced December 2015.

    Comments: To appear In the proceedings of the European Symposium on Research in Computer Security (ESORICS), pp. 20, Springer, 2016

  19. arXiv:1111.3567  [pdf, other

    cs.IT cs.CR

    On the Measurement of Privacy as an Attacker's Estimation Error

    Authors: David Rebollo-Monedero, Javier Parra-Arnau, Claudia Diaz, Jordi Forné

    Abstract: A wide variety of privacy metrics have been proposed in the literature to evaluate the level of protection offered by privacy enhancing-technologies. Most of these metrics are specific to concrete systems and adversarial models, and are difficult to generalize or translate to other contexts. Furthermore, a better understanding of the relationships between the different privacy metrics is needed to… ▽ More

    Submitted 13 November, 2012; v1 submitted 15 November, 2011; originally announced November 2011.

    Comments: This paper has 18 pages and 17 figures

  20. arXiv:cs/0411058  [pdf

    cs.NI

    Deployment in dynamic environments

    Authors: Jose L. Ruiz, Juan C. Duenas, Fernando Usero, Cristina Diaz

    Abstract: Information and communication technologies are moving towards a new stage where applications will be dynamically deployed, uninstalled, updated and (re)configured. Several approaches have been followed with the goal of creating a fully automated and context-aware deployment system. Ideally, this system should be capable of handling the dynamics of this new situation, without losing sight of othe… ▽ More

    Submitted 17 November, 2004; originally announced November 2004.

    Journal ref: DECOR04 (2004) 85-98