Skip to main content

Showing 1–25 of 25 results for author: Praça, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08050  [pdf, ps, other

    cs.CL cs.LG

    Adversarial Evasion Attack Efficiency against Large Language Models

    Authors: João Vitorino, Eva Maia, Isabel Praça

    Abstract: Large Language Models (LLMs) are valuable for text classification, but their vulnerabilities must not be disregarded. They lack robustness against adversarial examples, so it is pertinent to understand the impacts of different types of perturbations, and assess if those attacks could be replicated by common users with a small amount of perturbations and a small number of queries to a deployed LLM.… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: 9 pages, 1 table, 2 figures, DCAI 2024 conference

  2. arXiv:2406.08042  [pdf

    cs.CR cs.LG cs.NI

    Efficient Network Traffic Feature Sets for IoT Intrusion Detection

    Authors: Miguel Silva, João Vitorino, Eva Maia, Isabel Praça

    Abstract: The use of Machine Learning (ML) models in cybersecurity solutions requires high-quality data that is stripped of redundant, missing, and noisy information. By selecting the most relevant features, data integrity and model efficiency can be significantly improved. This work evaluates the feature sets provided by a combination of different feature selection methods, namely Information Gain, Chi-Squ… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: 10 pages, 9 tables, DCAI 2024 conference

  3. arXiv:2404.11372  [pdf, other

    cs.CR

    S3PHER: Secure and Searchable System for Patient-driven HEalth data shaRing

    Authors: Ivan Costa, Ivone Amorim, Eva Maia, Pedro Barbosa, Isabel Praca

    Abstract: Healthcare data contains some of the most sensitive information about an individual, yet sharing this data with healthcare practitioners can significantly enhance patient care and support research efforts. However, current systems for sharing health data between patients and caregivers do not fully address the critical security requirements of privacy, confidentiality, and consent management. Furt… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: 20 pages, 1 figure, 2 tables in the appendix

    ACM Class: E.3; H.3.1; H.3.2; H.3.3

  4. arXiv:2404.04188  [pdf

    cs.CR cs.LG cs.NI

    Reliable Feature Selection for Adversarially Robust Cyber-Attack Detection

    Authors: João Vitorino, Miguel Silva, Eva Maia, Isabel Praça

    Abstract: The growing cybersecurity threats make it essential to use high-quality data to train Machine Learning (ML) models for network traffic analysis, without noisy or missing data. By selecting the most relevant features for cyber-attack detection, it is possible to improve both the robustness and computational efficiency of the models used in a cybersecurity system. This work presents a feature select… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: 24 pages, 17 tables, Annals of Telecommunications journal. arXiv admin note: substantial text overlap with arXiv:2402.16912

  5. arXiv:2404.02361  [pdf

    cs.MA cs.AI

    EnergAIze: Multi Agent Deep Deterministic Policy Gradient for Vehicle to Grid Energy Management

    Authors: Tiago Fonseca, Luis Ferreira, Bernardo Cabral, Ricardo Severino, Isabel Praca

    Abstract: This paper investigates the increasing roles of Renewable Energy Sources (RES) and Electric Vehicles (EVs). While indicating a new era of sustainable energy, these also introduce complex challenges, including the need to balance supply and demand and smooth peak consumptions amidst rising EV adoption rates. Addressing these challenges requires innovative solutions such as Demand Response (DR), ene… ▽ More

    Submitted 9 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: 6 pages, 6 figures, 2 tables

  6. arXiv:2402.16912  [pdf

    cs.CR cs.LG cs.NI

    An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

    Authors: João Vitorino, Miguel Silva, Eva Maia, Isabel Praça

    Abstract: As cyber-attacks become more sophisticated, improving the robustness of Machine Learning (ML) models must be a priority for enterprises of all sizes. To reliably compare the robustness of different ML models for cyber-attack detection in enterprise computer networks, they must be evaluated in standardized conditions. This work presents a methodical adversarial robustness benchmark of multiple deci… ▽ More

    Submitted 25 February, 2024; originally announced February 2024.

    Comments: 15 pages, 8 tables, 2 figures, FPS 2023 conference

  7. SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection

    Authors: João Vitorino, Isabel Praça, Eva Maia

    Abstract: Machine Learning (ML) can be incredibly valuable to automate anomaly detection and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is performed. However, despite the benefits of ML models, they are highly susceptible to adversarial cyber-attack examples specifically crafted to exploit them. A wide range of adversarial attacks have been created and researchers… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: 31 pages, 3 tables, 6 figures, Computers and Security journal

  8. Herb-Drug Interactions: A Holistic Decision Support System in Healthcare

    Authors: Andreia Martins, Eva Maia, Isabel Praça

    Abstract: Complementary and alternative medicine are commonly used concomitantly with conventional medications leading to adverse drug reactions and even fatality in some cases. Furthermore, the vast possibility of herb-drug interactions prevents health professionals from remembering or manually searching them in a database. Decision support systems are a powerful tool that can be used to assist clinicians… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Journal ref: 2022 IEEE International Conference on E-health Networking, Application & Services (HealthCom)

  9. arXiv:2306.04653  [pdf

    cs.LG cs.CV eess.SY

    From Data to Action: Exploring AI and IoT-driven Solutions for Smarter Cities

    Authors: Tiago Dias, Tiago Fonseca, João Vitorino, Andreia Martins, Sofia Malpique, Isabel Praça

    Abstract: The emergence of smart cities demands harnessing advanced technologies like the Internet of Things (IoT) and Artificial Intelligence (AI) and promises to unlock cities' potential to become more sustainable, efficient, and ultimately livable for their inhabitants. This work introduces an intelligent city management system that provides a data-driven approach to three use cases: (i) analyze traffic… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 10 pages, 8 Figures, accepted for DCAI2023

  10. arXiv:2306.03602  [pdf, other

    cs.SE cs.AI

    TestLab: An Intelligent Automated Software Testing Framework

    Authors: Tiago Dias, Arthur Batista, Eva Maia, Isabel Praça

    Abstract: The prevalence of software systems has become an integral part of modern-day living. Software usage has increased significantly, leading to its growth in both size and complexity. Consequently, software development is becoming a more time-consuming process. In an attempt to accelerate the development cycle, the testing phase is often neglected, leading to the deployment of flawed systems that can… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 10 pages, 5 figures, 1 table, accepted for DCAI2023

  11. arXiv:2305.02225  [pdf, other

    cs.CR cs.AI

    Data Privacy with Homomorphic Encryption in Neural Networks Training and Inference

    Authors: Ivone Amorim, Eva Maia, Pedro Barbosa, Isabel Praça

    Abstract: The use of Neural Networks (NNs) for sensitive data processing is becoming increasingly popular, raising concerns about data privacy and security. Homomorphic Encryption (HE) has the potential to be used as a solution to preserve data privacy in NN. This study provides a comprehensive analysis on the use of HE for NN training and classification, focusing on the techniques and strategies used to en… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: 11 pages, 1 figure, DCAI 2023 Conference Pre-print

  12. Adversarial Robustness and Feature Impact Analysis for Driver Drowsiness Detection

    Authors: João Vitorino, Lourenço Rodrigues, Eva Maia, Isabel Praça, André Lourenço

    Abstract: Drowsy driving is a major cause of road accidents, but drivers are dismissive of the impact that fatigue can have on their reaction times. To detect drowsiness before any impairment occurs, a promising strategy is using Machine Learning (ML) to monitor Heart Rate Variability (HRV) signals. This work presents multiple experiments with different HRV time windows and ML models, a feature impact analy… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: 10 pages, 2 tables, 3 figures, AIME 2023 conference

  13. arXiv:2303.07546  [pdf, other

    cs.SE cs.LG

    Constrained Adversarial Learning and its applicability to Automated Software Testing: a systematic review

    Authors: João Vitorino, Tiago Dias, Tiago Fonseca, Eva Maia, Isabel Praça

    Abstract: Every novel technology adds hidden vulnerabilities ready to be exploited by a growing number of cyber-attacks. Automated software testing can be a promising solution to quickly analyze thousands of lines of code by generating and slightly modifying function-specific testing data to encounter a multitude of vulnerabilities and attack vectors. This process draws similarities to the constrained adver… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: 32 pages, 5 tables, 2 figures, Information and Software Technology journal

  14. arXiv:2301.13122  [pdf

    cs.CR cs.AI cs.LG

    Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification

    Authors: João Vitorino, Isabel Praça, Eva Maia

    Abstract: The Internet of Things (IoT) faces tremendous security challenges. Machine learning models can be used to tackle the growing number of cyber-attack variations targeting IoT systems, but the increasing threat posed by adversarial attacks restates the need for reliable defense strategies. This work describes the types of constraints required for a realistic adversarial cyber-attack example and propo… ▽ More

    Submitted 3 March, 2023; v1 submitted 30 January, 2023; originally announced January 2023.

    Comments: 19 pages, 5 tables, 7 figures, Annals of Telecommunications journal

  15. arXiv:2209.00741  [pdf

    cs.CR cs.CV eess.SY

    A Low-Cost Multi-Agent System for Physical Security in Smart Buildings

    Authors: Tiago Fonseca, Tiago Dias, João Vitorino, Luís Lino Ferreira, Isabel Praça

    Abstract: Modern organizations face numerous physical security threats, from fire hazards to more intricate concerns regarding surveillance and unauthorized personnel. Conventional standalone fire and intrusion detection solutions must be installed and maintained independently, which leads to high capital and operational costs. Nonetheless, due to recent developments in smart sensors, computer vision techni… ▽ More

    Submitted 1 September, 2022; originally announced September 2022.

    Comments: 10 pages, 2 tables, 3 figures, ICCCN 2022 conference

  16. arXiv:2207.01595  [pdf, ps, other

    cs.AI cs.LG eess.SP

    Deep Learning for Short-term Instant Energy Consumption Forecasting in the Manufacturing Sector

    Authors: Nuno Oliveira, Norberto Sousa, Isabel Praça

    Abstract: Electricity is a volatile power source that requires great planning and resource management for both short and long term. More specifically, in the short-term, accurate instant energy consumption forecasting contributes greatly to improve the efficiency of buildings, opening new avenues for the adoption of renewable energy. In that regard, data-driven approaches, namely the ones based on machine l… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

  17. A Multi-Policy Framework for Deep Learning-Based Fake News Detection

    Authors: João Vitorino, Tiago Dias, Tiago Fonseca, Nuno Oliveira, Isabel Praça

    Abstract: Connectivity plays an ever-increasing role in modern society, with people all around the world having easy access to rapidly disseminated information. However, a more interconnected society enables the spread of intentionally false information. To mitigate the negative impacts of fake news, it is essential to improve detection methodologies. This work introduces Multi-Policy Statement Checker (MPS… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: 10 pages, 1 table, 3 figures, DCAI 2022 conference

  18. arXiv:2203.04234  [pdf

    cs.CR cs.AI cs.LG

    Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection

    Authors: João Vitorino, Nuno Oliveira, Isabel Praça

    Abstract: Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated for a domain with tabular data must be realistic within that domain. This work establishes the fundamental constraint levels required to achieve realis… ▽ More

    Submitted 29 March, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

    Comments: 18 pages, 6 tables, 10 figures, Future Internet journal

  19. arXiv:2112.14821  [pdf, other

    cs.CR

    Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space

    Authors: Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça

    Abstract: Cyber-physical systems are infrastructures that use digital information such as network communications and sensor readings to control entities in the physical world. Many cyber-physical systems in airports, hospitals and nuclear power plants are regarded as critical infrastructures since a disruption of its normal functionality can result in negative consequences for the society. In the last few y… ▽ More

    Submitted 29 December, 2021; originally announced December 2021.

  20. arXiv:2112.01103  [pdf

    cs.CR

    A tool to support the investigation and visualization of cyber and/or physical incidents

    Authors: Inês Macedo, Sinan Wanous, Nuno Oliveira, Orlando Sousa, Isabel Praça

    Abstract: Investigating efficiently the data collected from a system's activity can help to detect malicious attempts and better understand the context behind past incident occurrences. Nowadays, several solutions can be used to monitor system activities to detect probable abnormalities and malfunctions. However, most of these systems overwhelm their users with vast amounts of information, making it harder… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

  21. A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection

    Authors: João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia

    Abstract: The digital transformation faces tremendous security challenges. In particular, the growing number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a reliable detection of malicious network activity. This paper presents a comparative analysis of supervised, unsupervised and reinforcement learning techniques on nine malware captures of the IoT-23 dataset, considerin… ▽ More

    Submitted 1 June, 2022; v1 submitted 25 November, 2021; originally announced November 2021.

    Comments: 16 pages, 12 tables, 4 figures, FPS 2021 conference

  22. arXiv:2111.10280  [pdf

    cs.CR cs.AI

    A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System

    Authors: Tiago Dias, Nuno Oliveira, Norberto Sousa, Isabel Praça, Orlando Sousa

    Abstract: Cybersecurity has been a concern for quite a while now. In the latest years, cyberattacks have been increasing in size and complexity, fueled by significant advances in technology. Nowadays, there is an unavoidable necessity of protecting systems and data crucial for business continuity. Hence, many intrusion detection systems have been created in an attempt to mitigate these threats and contribut… ▽ More

    Submitted 19 November, 2021; originally announced November 2021.

    Comments: 11 pages, 5 figures, 1 table, ISDA conference

  23. arXiv:2109.12386  [pdf, other

    cs.RO

    A Multi-Agent System for Autonomous Mobile Robot Coordination

    Authors: Norberto Sousa, Nuno Oliveira, Isabel Praça

    Abstract: The automation of internal logistics and inventory-related tasks is one of the main challenges of modern-day manufacturing corporations since it allows a more effective application of their human resources. Nowadays, Autonomous Mobile Robots (AMR) are state of the art technologies for such applications due to their great adaptability in dynamic environments, replacing more traditional solutions su… ▽ More

    Submitted 25 September, 2021; originally announced September 2021.

  24. arXiv:2107.02753  [pdf, other

    cs.CR

    Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset

    Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça

    Abstract: With the increasing amount of reliance on digital data and computer networks by corporations and the public in general, the occurrence of cyber attacks has become a great threat to the normal functioning of our society. Intrusion detection systems seek to address this threat by preemptively detecting attacks in real time while attempting to block them or minimizing their damage. These systems can… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

  25. arXiv:2107.00082  [pdf, other

    cs.AI cs.IR

    A Search Engine for Scientific Publications: a Cybersecurity Case Study

    Authors: Nuno Oliveira, Norberto Sousa, Isabel Praça

    Abstract: Cybersecurity is a very challenging topic of research nowadays, as digitalization increases the interaction of people, software and services on the Internet by means of technology devices and networks connected to it. The field is broad and has a lot of unexplored ground under numerous disciplines such as management, psychology, and data science. Its large disciplinary spectrum and many significan… ▽ More

    Submitted 30 June, 2021; originally announced July 2021.