Skip to main content

Showing 1–17 of 17 results for author: Diaz, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.04011  [pdf

    cs.HC cs.CY cs.RO eess.SY

    Validation of critical maneuvers based on shared control

    Authors: Mauricio Marcano, Joseba Sarabia, Asier Zubizarreta, Sergio Díaz

    Abstract: This paper presents the validation of shared control strategies for critical maneuvers in automated driving systems. Shared control involves collaboration between the driver and automation, allowing both parties to actively engage and cooperate at different levels of the driving task. The involvement of the driver adds complexity to the control loop, necessitating comprehensive validation methodol… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: 8 pages, 19 figures. Published in IEEE 26th International Conference on Intelligent Transportation Systems (ITSC)

    MSC Class: 68U99 ACM Class: I.6.6; J.7

    Journal ref: 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 2023, pp. 5611-5618

  2. arXiv:2311.06074  [pdf, other

    q-bio.NC cs.NE

    Two-compartment neuronal spiking model expressing brain-state specific apical-amplification, -isolation and -drive regimes

    Authors: Elena Pastorelli, Alper Yegenoglu, Nicole Kolodziej, Willem Wybo, Francesco Simula, Sandra Diaz, Johan Frederik Storm, Pier Stanislao Paolucci

    Abstract: Mounting experimental evidence suggests that brain-state-specific neural mechanisms, supported by connectomic architectures, play a crucial role in integrating past and contextual knowledge with the current, incoming flow of evidence (e.g., from sensory systems). These mechanisms operate across multiple spatial and temporal scales, necessitating dedicated support at the levels of individual neuron… ▽ More

    Submitted 26 March, 2024; v1 submitted 10 November, 2023; originally announced November 2023.

    Comments: 23 pages, 9 figures (29 single images), 4 tables, paper

  3. arXiv:2310.13079  [pdf, other

    cs.CR

    Critical Path Prioritization Dashboard for Alert-driven Attack Graphs

    Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem

    Abstract: Although intrusion alerts can provide threat intelligence regarding attacker strategies, extracting such intelligence via existing tools is expensive and time-consuming. Earlier work has proposed SAGE, which generates attack graphs from intrusion alerts using unsupervised sequential machine learning. This paper proposes a querying and prioritization-enabled visual analytics dashboard for SAGE. The… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  4. arXiv:2307.03547  [pdf

    cs.SI physics.soc-ph q-bio.QM

    In A Society of Strangers, Kin Is Still Key: Identified Family Relations In Large-Scale Mobile Phone Data

    Authors: Tamás Dávid-Barrett, Sebastian Diaz, Carlos Rodriguez-Sickert, Isabel Behncke, Anna Rotkirch, János Kertész, Loreto Bravo

    Abstract: Mobile call networks have been widely used to investigate communication patterns and the network of interactions of humans at the societal scale. Yet, more detailed analysis is often hindered by having no information about the nature of the relationships, even if some metadata about the individuals are available. Using a unique, large mobile phone database with information about individual surname… ▽ More

    Submitted 7 July, 2023; originally announced July 2023.

    Comments: 26 pages, 5 figures, 1 table, supplementary material at the end

  5. arXiv:2305.07415  [pdf, other

    cs.LG cs.CR cs.DB

    Comparison of machine learning models applied on anonymized data with different techniques

    Authors: Judith Sáinz-Pardo Díaz, Álvaro López García

    Abstract: Anonymization techniques based on obfuscating the quasi-identifiers by means of value generalization hierarchies are widely used to achieve preset levels of privacy. To prevent different types of attacks against database privacy it is necessary to apply several anonymization techniques beyond the classical k-anonymity or $\ell$-diversity. However, the application of these methods is directly conne… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: Accepted for publication: IEEE International Conference in Cyber Security and Resilience 2023 (IEEE CSR)

  6. arXiv:2211.02608  [pdf, other

    cs.OH

    Knowledge Retrieval With Functional Object-Oriented Networks

    Authors: Shawn Diaz

    Abstract: In this experiment, three different search algorithms are implemented for the purpose of extracting a task tree from a large knowledge graph, known as the Functional Object-Oriented Network (FOON). Using a universal FOON, which contains knowledge extracted by annotating online cooking videos, and a desired goal, a task tree can be retrieved. The process of searching the universal FOON for task tre… ▽ More

    Submitted 21 October, 2022; originally announced November 2022.

    Comments: 3 pages, 1 figure

  7. pyCANON: A Python library to check the level of anonymity of a dataset

    Authors: Judith Sáinz-Pardo Díaz, Álvaro López García

    Abstract: Openly sharing data with sensitive attributes and privacy restrictions is a challenging task. In this document we present the implementation of pyCANON, a Python library and command line interface (CLI) to check and assess the level of anonymity of a dataset through some of the most common anonymization techniques: k-anonymity, ($α$,k)-anonymity, $\ell$-diversity, entropy $\ell$-diversity, recursi… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  8. arXiv:2208.00519  [pdf

    cs.CV cs.AI

    Assessing The Performance of YOLOv5 Algorithm for Detecting Volunteer Cotton Plants in Corn Fields at Three Different Growth Stages

    Authors: Pappu Kumar Yadav, J. Alex Thomasson, Stephen W. Searcy, Robert G. Hardin, Ulisses Braga-Neto, Sorin C. Popescu, Daniel E. Martin, Roberto Rodriguez, Karem Meza, Juan Enciso, Jorge Solorzano Diaz, Tianyi Wang

    Abstract: The boll weevil (Anthonomus grandis L.) is a serious pest that primarily feeds on cotton plants. In places like Lower Rio Grande Valley of Texas, due to sub-tropical climatic conditions, cotton plants can grow year-round and therefore the left-over seeds from the previous season during harvest can continue to grow in the middle of rotation crops like corn (Zea mays L.) and sorghum (Sorghum bicolor… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

    Comments: Preprint Under Review

  9. arXiv:2207.08581  [pdf, other

    cs.LG cs.AI cs.CV eess.IV

    Study of the performance and scalability of federated learning for medical imaging with intermittent clients

    Authors: Judith Sáinz-Pardo Díaz, Álvaro López García

    Abstract: Federated learning is a data decentralization privacy-preserving technique used to perform machine or deep learning in a secure way. In this paper we present theoretical aspects about federated learning, such as the presentation of an aggregation operator, different types of federated learning, and issues to be taken into account in relation to the distribution of data from the clients, together w… ▽ More

    Submitted 3 November, 2022; v1 submitted 18 July, 2022; originally announced July 2022.

  10. arXiv:2207.07334  [pdf

    eess.IV cs.AI

    Computer Vision for Volunteer Cotton Detection in a Corn Field with UAS Remote Sensing Imagery and Spot Spray Applications

    Authors: Pappu Kumar Yadav, J. Alex Thomasson, Stephen W. Searcy, Robert G. Hardin, Ulisses Braga-Neto, Sorin C. Popescu, Daniel E. Martin, Roberto Rodriguez, Karem Meza, Juan Enciso, Jorge Solorzano Diaz, Tianyi Wang

    Abstract: To control boll weevil (Anthonomus grandis L.) pest re-infestation in cotton fields, the current practices of volunteer cotton (VC) (Gossypium hirsutum L.) plant detection in fields of rotation crops like corn (Zea mays L.) and sorghum (Sorghum bicolor L.) involve manual field scouting at the edges of fields. This leads to many VC plants growing in the middle of fields remain undetected that conti… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

    Comments: 39 pages

  11. arXiv:2207.06673  [pdf

    cs.CV cs.AI

    Detecting Volunteer Cotton Plants in a Corn Field with Deep Learning on UAV Remote-Sensing Imagery

    Authors: Pappu Kumar Yadav, J. Alex Thomasson, Robert Hardin, Stephen W. Searcy, Ulisses Braga-Neto, Sorin C. Popescu, Daniel E. Martin, Roberto Rodriguez, Karem Meza, Juan Enciso, Jorge Solorzano Diaz, Tianyi Wang

    Abstract: The cotton boll weevil, Anthonomus grandis Boheman is a serious pest to the U.S. cotton industry that has cost more than 16 billion USD in damages since it entered the United States from Mexico in the late 1800s. This pest has been nearly eradicated; however, southern part of Texas still faces this issue and is always prone to the pest reinfestation each year due to its sub-tropical climate where… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: 38 Pages

  12. Forecasting COVID-19 spreading trough an ensemble of classical and machine learning models: Spain's case study

    Authors: Ignacio Heredia Cacha, Judith Sainz-Pardo Díaz, María Castrillo Melguizo, Álvaro López García

    Abstract: In this work we evaluate the applicability of an ensemble of population models and machine learning models to predict the near future evolution of the COVID-19 pandemic, with a particular use case in Spain. We rely solely in open and public datasets, fusing incidence, vaccination, human mobility and weather data to feed our machine learning models (Random Forest, Gradient Boosting, k-Nearest Neigh… ▽ More

    Submitted 12 August, 2022; v1 submitted 12 July, 2022; originally announced July 2022.

  13. arXiv:1903.08052  [pdf

    cs.CR

    Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

    Authors: Pablo Daniel Marcillo Lara, Daniel Alejandro Maldonado-Ruiz, Santiago Daniel Arrais Díaz, Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay

    Abstract: The new generation of security threats has been promoted by digital currencies and real-time applications, where all users develop new ways to communicate on the Internet. Security has evolved in the need of privacy and anonymity for all users and his portable devices. New technologies in every field prove that users need security features integrated into their communication applications, parallel… ▽ More

    Submitted 19 March, 2019; originally announced March 2019.

    Journal ref: Latin American Journal of Computing, 6(1), 2019, 39-49

  14. arXiv:1711.03488  [pdf

    cs.NI

    D3.2: SPEED-5G enhanced functional and system architecture, scenarios and performance evaluation metrics

    Authors: Shahid Mumtaz, Kazi Saidul, Huq Jonathan Rodriguez, Paulo Marques, Ayman Radwan, Keith Briggs Michael Fitch BT, Andreas Georgakopoulos, Ioannis-Prodromos Belikaidis, Panagiotis Vlacheas, Dimitrios Kelaidonis, Evangelos Kosmatos, Serafim Kotrotsos, Stavroula Vassaki, Yiouli Kritikou, Panagiotis Demestichas, Kostas Tsagkaris, Evangelia Tzifa, Aikaterini Demesticha, Vera Stavroulaki, Athina Ropodi, Evangelos Argoudelis, Marinos Galiatsatos, Aristotelis Margaris, George Paitaris, Dimitrios Kardaris , et al. (14 additional authors not shown)

    Abstract: This deliverable contains a detailed description of the use cases considered in SPEED-5G, which will be used as a basis for demonstration in project. These use cases are Dynamic Channel selection, Load balancing, carrier aggregation. This deliverable also explains the SPEED-5G architecture design principles, which is based on software-defined networking and network function virtualisation. The deg… ▽ More

    Submitted 14 November, 2017; v1 submitted 9 November, 2017; originally announced November 2017.

  15. arXiv:1708.02597  [pdf

    cs.NI

    Virtualized 5G Air Interface Protocol Stack for Multi-Cell Coordination

    Authors: Óscar Carrasco, Salva Díaz, Jordi Calabug

    Abstract: This article proposes a novel virtualized air interface protocol stack for next-generation wireless networks, that natively supports multiple radio access technologies and multi-point transmissions. Leveraging upon the concepts of softwarization of the air interface and virtualization, this design provides flexibility and scalability towards future advances in the radio access, whilst at the same… ▽ More

    Submitted 8 August, 2017; originally announced August 2017.

  16. arXiv:1706.08057  [pdf

    cs.NI

    Centralized Radio Resource Management for 5G small cells as LSA enabler

    Authors: Oscar Carrasco, Federico Miatton, Salva Diaz, Uwe Herzog, Valerio Frascolla, Michael Fitch, Keith Briggs, Benoit Miscopein, Antonio de Domenico, Andreas Georgakopoulos

    Abstract: The stringent requirements defined for 5G systems drive the need to promote new paradigms to the existing cellular networks. Dense and ultra-dense networks based on small cells, together with new spectrum sharing schemes seem to be key enabling technologies for emerging 5G mobile networks. This article explores the vision of the SPEED-5G project, analyzing the ability of a Centralized Radio Resour… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

    Comments: European Conference on Networks and Communications (EUCNC), 2016

  17. arXiv:1603.05212  [pdf

    cs.DL

    Analysis of the Cuban journal Bibliotecas: Anales de Investigacion

    Authors: C. L. González-Valiente, S. Núñez Amaro, J. R. Santovenia Díaz, M. P. Linares Herrera

    Abstract: The objective of this article is to describe the academic impact, the editorial process quality, and the editorial and visibility strategies of Bibliotecas. Anales de Investigacion (BAI), a scientific Cuban journal edited by National Library of Cuba Jose Marti. The academic impact is determined through a citation analysis, which considers Google Scholar database as reference source. The bibliometr… ▽ More

    Submitted 16 March, 2016; originally announced March 2016.

    Comments: in Spanish, Biblios, 2016