Skip to main content

Showing 1–23 of 23 results for author: Gomez, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13675  [pdf, other

    cs.IT

    AI-Assisted Dynamic Port and Waveform Switching for Enhancing UL Coverage in 5G NR

    Authors: Alejandro Villena-Rodríguez, Gerardo Gómez, Mari Carmen Aguayo-Torres, Francisco J. Martín-Vega, José Outes-Carnero, F. Yak Ng-Molina, Juan Ramiro-Moreno

    Abstract: The uplink of 5G networks allows selecting the transmit waveform between cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) and discrete Fourier transform spread OFDM (DFT-S-OFDM), which is appealing for cell-edge users using high-frequency bands, since it shows a smaller peak-to-average power ratio, and allows a higher transmit power. Nevertheless, DFT-S-OFDM exhibits a higher blo… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 5 pages, 3 figures, 4 tables

  2. Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage

    Authors: Gibran Gomez, Kevin van Liebergen, Juan Caballero

    Abstract: Multiple works have leveraged the public Bitcoin ledger to estimate the revenue cybercriminals obtain from their victims. Estimations focusing on the same target often do not agree, due to the use of different methodologies, seed addresses, and time periods. These factors make it challenging to understand the impact of their methodological differences. Furthermore, they underestimate the revenue d… ▽ More

    Submitted 27 November, 2023; v1 submitted 7 September, 2023; originally announced September 2023.

  3. The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools

    Authors: Juan Caballero, Gibran Gomez, Srdjan Matic, Gustavo Sánchez, Silvia Sebastián, Arturo Villacañas

    Abstract: To adapt to a constantly evolving landscape of cyber threats, organizations actively need to collect Indicators of Compromise (IOCs), i.e., forensic artifacts that signal that a host or network might have been compromised. IOCs can be collected through open-source and commercial structured IOC feeds. But, they can also be extracted from a myriad of unstructured threat reports written in natural la… ▽ More

    Submitted 8 March, 2023; v1 submitted 29 July, 2022; originally announced August 2022.

    Journal ref: Future Generation Computer Systems, Volume 144, 2023, Pages 74-89

  4. arXiv:2207.10495  [pdf, other

    cs.SE cs.LG

    Generating and Detecting True Ambiguity: A Forgotten Danger in DNN Supervision Testing

    Authors: Michael Weiss, André García Gómez, Paolo Tonella

    Abstract: Deep Neural Networks (DNNs) are becoming a crucial component of modern software systems, but they are prone to fail under conditions that are different from the ones observed during training (out-of-distribution inputs) or on inputs that are truly ambiguous, i.e., inputs that admit multiple classes with nonzero probability in their labels. Recent work proposed DNN supervisors to detect high-uncert… ▽ More

    Submitted 8 September, 2023; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: Accepted for publication at Springers "Empirical Software Engineering" (EMSE)

  5. arXiv:2206.00375  [pdf, other

    cs.CR

    Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration

    Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero

    Abstract: Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-and-forth exploration, a novel automated Bitcoin transaction tracing technique to identify cybercrime financial relationships. Given seed addresses belonging to a cybercrime campaign, it outputs a transaction graph, and identifies paths corresponding to relationships between the campaign under study a… ▽ More

    Submitted 18 October, 2022; v1 submitted 1 June, 2022; originally announced June 2022.

  6. arXiv:2203.13510  [pdf, other

    cs.IT eess.SP

    Joint Distribution of Distance and Angles in Finite Wireless Networks

    Authors: Francisco J. Martín-Vega, Gerardo Gómez, David Morales-Jiménez, F. Javier López-Martínez, Mari Carmen Aguayo-Torres

    Abstract: Directional beamforming will play a paramount role in 5G and beyond networks in order to combat the higher path losses incurred at millimeter wave bands. Appropriate modeling and analysis of the angles and distances between transmitters and receivers in these networks are thus essential to understand performance and limiting factors. Most existing literature considers either infinite and uniform n… ▽ More

    Submitted 18 May, 2023; v1 submitted 25 March, 2022; originally announced March 2022.

    Comments: 16 pages, 10 figures

  7. arXiv:2201.10281  [pdf, other

    cs.IT

    Latency Fairness Optimization on Wireless Networks through Deep Reinforcement Learning

    Authors: M. López-Sánchez, A. Villena-Rodríguez, G. Gómez, F. J. Martín-Vega, M. C. Aguayo-Torres

    Abstract: In this paper, we propose a novel deep reinforcement learning framework to maximize user fairness in terms of delay. To this end, we devise a new version of the modified largest weighted delay first (M-LWDF) algorithm, which is called $β$-M-LWDF, aiming to fulfill an appropriate balance between user fairness and average delay. This balance is defined as a feasible region on the cumulative distribu… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

    Comments: 5 pages, 4 figures, 3 tables

  8. Unsupervised Detection and Clustering of Malicious TLS Flows

    Authors: Gibran Gomez, Platon Kotzias, Matteo Dell'Amico, Leyla Bilge, Juan Caballero

    Abstract: Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious TLS flows is an important, but challenging, problem. Prior works have proposed supervised machine learning detectors using TLS features. However, by trying to represent all malicious traffic, supervised binary detectors produce models that are… ▽ More

    Submitted 23 December, 2022; v1 submitted 8 September, 2021; originally announced September 2021.

  9. arXiv:2105.01147  [pdf, other

    cs.CV

    Sketches image analysis: Web image search engine usingLSH index and DNN InceptionV3

    Authors: Alessio Schiavo, Filippo Minutella, Mattia Daole, Marsha Gomez Gomez

    Abstract: The adoption of an appropriate approximate similarity search method is an essential prereq-uisite for develo** a fast and efficient CBIR system, especially when dealing with large amount ofdata. In this study we implement a web image search engine on top of a Locality Sensitive Hashing(LSH) Index to allow fast similarity search on deep features. Specifically, we exploit transfer learningfor deep… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  10. arXiv:2104.07136  [pdf, ps, other

    math.MG cs.LG math.CO stat.ML

    On the Vapnik-Chervonenkis dimension of products of intervals in $\mathbb{R}^d$

    Authors: Alirio Gómez Gómez, Pedro L. Kaufmann

    Abstract: We study combinatorial complexity of certain classes of products of intervals in $\mathbb{R}^d$, from the point of view of Vapnik-Chervonenkis geometry. As a consequence of the obtained results, we conclude that the Vapnik-Chervonenkis dimension of the set of balls in $\ell_\infty^d$ -- which denotes $\R^d$ equipped with the sup norm -- equals $\lfloor (3d+1)/2\rfloor$.

    Submitted 14 April, 2021; originally announced April 2021.

  11. arXiv:2010.08286  [pdf, other

    cs.AI cs.LG cs.NI

    On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series

    Authors: Gastón García González, Pedro Casas, Alicia Fernández, Gabriel Gómez

    Abstract: Despite the many attempts and approaches for anomaly detection explored over the years, the automatic detection of rare events in data communication networks remains a complex problem. In this paper we introduce Net-GAN, a novel approach to network anomaly detection in time-series, using recurrent neural networks (RNNs) and generative adversarial networks (GAN). Different from the state of the art… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

    Comments: To be published in ACM SIGMETRICS Performance Evaluation Review

  12. arXiv:2007.08162  [pdf, other

    cs.IT eess.SP

    A Product Channel Attack to Wireless Physical Layer Security

    Authors: Gonzalo J. Anaya-Lopez, Gerardo Gomez, F. Javier Lopez-Martinez

    Abstract: We propose a novel attack that compromises the physical layer security of downlink (DL) communications in wireless systems. This technique is based on the transmission of a slowly-varying random symbol by the eavesdropper during its uplink transmission, so that the equivalent fading channel observed at the base station (BS) has a larger variance. Then, the BS designs the secure DL transmission und… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 5 pages, 4 figures. This work has been submitted to the IEEE for publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  13. Wiener Filter for Short-Reach Fiber-Optic Links

    Authors: Daniel Plabst, Francisco Javier García Gómez, Thomas Wiegart, Norbert Hanik

    Abstract: Analytic expressions are derived for the Wiener filter (WF), also known as the linear minimum mean square error (LMMSE) estimator, for an intensity-modulation/direct-detection (IM/DD) short-haul fiber-optic communication system. The link is purely dispersive and the nonlinear square-law detector (SLD) operates at the thermal noise limit. The achievable rates of geometrically shaped PAM constellati… ▽ More

    Submitted 5 August, 2020; v1 submitted 25 April, 2020; originally announced April 2020.

    Comments: Accepted to IEEE Communications Letters

  14. arXiv:2002.03237  [pdf, other

    stat.ML cs.LG math.ST

    Learning CHARME models with neural networks

    Authors: José G. Gómez García, Jalal Fadili, Christophe Chesneau

    Abstract: In this paper, we consider a model called CHARME (Conditional Heteroscedastic Autoregressive Mixture of Experts), a class of generalized mixture of nonlinear nonparametric AR-ARCH time series. Under certain Lipschitz-type conditions on the autoregressive and volatility functions, we prove that this model is stationary, ergodic and $τ$-weakly dependent. These conditions are much weaker than those p… ▽ More

    Submitted 17 November, 2020; v1 submitted 8 February, 2020; originally announced February 2020.

    Comments: 31 pages, 4 figures

  15. Software System Design based on Patterns for Newton-Type Methods

    Authors: Ricardo Serrato Barrera, Gustavo Rodríguez Gómez, Julio César Pérez Sansalvador, Saul E. Pomares Hernández, Leticia Flores Pulido, Antonio Muñoz

    Abstract: A wide range of engineering applications uses optimisation techniques as part of their solution process. The researcher uses specialized software that implements well-known optimisation techniques to solve his problem. However, when it comes to develop original optimisation techniques that fit a particular problem the researcher has no option but to implement his own new method from scratch. This… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    Comments: 19 pages, 11 Figures

    MSC Class: 68N19

  16. arXiv:1809.06253  [pdf, ps, other

    cs.LG cs.SI stat.ML

    Multi-hop assortativities for networks classification

    Authors: Leonardo Gutierrez Gomez, Jean-Charles Delvenne

    Abstract: Several social, medical, engineering and biological challenges rely on discovering the functionality of networks from their structure and node metadata, when it is available. For example, in chemoinformatics one might want to detect whether a molecule is toxic based on structure and atomic types, or discover the research field of a scientific collaboration network. Existing techniques rely on coun… ▽ More

    Submitted 16 November, 2018; v1 submitted 14 September, 2018; originally announced September 2018.

    Comments: 20 pages, 7 figures. arXiv admin note: text overlap with arXiv:1705.10817

  17. arXiv:1709.04693  [pdf, other

    cs.IT

    Physical Layer Security in Uplink NOMA Multi-Antenna Systems with Randomly Distributed Eavesdroppers

    Authors: Gerardo Gomez, Francisco J. Martin-Vega, F. Javier Lopez-Martinez, Yuanwei Liu, Maged Elkashlan

    Abstract: The physical layer security of uplink non-orthogonal multiple access (NOMA) is analyzed. A stochastic geometry approach is applied to analyze the coverage probability and the effective secrecy throughput (EST) of the kth NOMA user, where a fixed or an adaptive transmission rate can be used. A protected zone around the legitimate terminals to establish an eavesdropper-exclusion area. We assume that… ▽ More

    Submitted 13 September, 2018; v1 submitted 14 September, 2017; originally announced September 2017.

  18. arXiv:1702.03726  [pdf, ps, other

    cs.IT

    On Muting Mobile Terminals for Uplink Interference Mitigation in HetNets -- System-Level Analysis via Stochastic Geometry

    Authors: F. J. Martin-Vega, M. C. Aguayo-Torres, G. Gomez, M. Di Renzo

    Abstract: We investigate the performance of a scheduling algorithm where the Mobile Terminals (MTs) may be turned off if they cause a level of interference greater than a given threshold. This approach, which is referred to as Interference Aware Muting (IAM), may be regarded as an interference-aware scheme that is aimed to reduce the level of interference. We analyze its performance with the aid of stochast… ▽ More

    Submitted 13 February, 2017; originally announced February 2017.

    Comments: 16 pages, 12 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  19. arXiv:1612.07999  [pdf, other

    cs.IT

    Geo-Location Based Access for Vehicular Communications: Analysis and Optimization via Stochastic Geometry

    Authors: Francisco J. Martin-Vega, Beatriz Soret, Mari Carmen Aguayo-Torres, Istvan Z. Kovacs, Gerardo Gomez

    Abstract: Delivery of broadcast messages among vehicles for safety purposes, which is known as one of the key ingredients of Intelligent Transportation Systems (ITS), requires an efficient Medium Access Control (MAC) that provides low average delay and high reliability. To this end, a Geo-Location Based Access (GLOC) for vehicles has been proposed for Vehicle-to-Vehicle (V2V) communications, aiming at maxim… ▽ More

    Submitted 23 December, 2016; originally announced December 2016.

    Comments: 15 pages and 16 figures. This paper have been submitted for possible publication in IEEE Transactions on Vehicular Technology

  20. Analytical Modeling of Interference Aware Power Control for the Uplink of Heterogeneous Cellular Networks

    Authors: Francisco J. Martin-Vega, Gerardo Gomez, Mari Carmen Aguayo-Torres, Marco Di Renzo

    Abstract: Inter-cell interference is one of the main limiting factors in current Heterogeneous Cellular Networks (HCNs). Uplink Fractional Power Control (FPC) is a well known method that aims to cope with such limiting factor as well as to save battery live. In order to do that, the path losses associated with Mobile Terminal (MT) transmissions are partially compensated so that a lower interference is leake… ▽ More

    Submitted 13 January, 2016; originally announced January 2016.

    Comments: 13 pages, 1 table and 7 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  21. On the Equivalence between Interference and Eavesdrop** in Wireless Communications

    Authors: Gerardo Gomez, F. Javier Lopez-Martinez, David Morales-Jimenez, Matthew R. McKay

    Abstract: We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustra… ▽ More

    Submitted 25 February, 2015; v1 submitted 31 July, 2014; originally announced July 2014.

    Comments: This work has been accepted for publication at IEEE Transactions on Vehicular Technology. Copyright (c) 2014 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]

  22. arXiv:1405.4709  [pdf

    cs.MM

    YouTube QoE Evaluation Tool for Android Wireless Terminals

    Authors: Gerardo Gomez, Lorenzo Hortiguela, Quiliano Perez, Javier Lorca, Raquel Garcia, Mari Carmen Aguayo-Torres

    Abstract: In this paper, we present an Android application which is able to evaluate and analyze the perceived Quality of Experience (QoE) for YouTube service in wireless terminals. To achieve this goal, the application carries out measurements of objective Quality of Service (QoS) parameters, which are then mapped onto subjective QoE (in terms of Mean Opinion Score, MOS) by means of a utility function. Our… ▽ More

    Submitted 19 May, 2014; originally announced May 2014.

  23. Multi-User Coverage Probability of Uplink Cellular Systems: a Stochastic Geometry Approach

    Authors: F. Javier Martin-Vega, F. Javier Lopez-Martinez, Gerardo Gomez, Mari Carmen Aguayo-Torres

    Abstract: We analyze the coverage probability of multi-user uplink cellular networks with fractional power control. We use a stochastic geometry approach where the mobile users are distributed as a Poisson Point Process (PPP), whereas the serving base station (BS) is placed at the origin. Using conditional thinning, we are able to calculate the coverage probability of $k$ users which are allocated a set of… ▽ More

    Submitted 3 April, 2014; originally announced April 2014.

    Comments: 6 pages, 9 figures, conference