- document
-
Guo, Zhongyuan (author), Guendel, Ronny (author), Yarovoy, Alexander (author), Fioranelli, F. (author)Radar-based Human Activity Recognition(HAR) is considered by using snapshots of point clouds. Such point cloudsinterpret 2D images generated by an mm-wave FMCW MIMO radar enriched byincluding Doppler and temporal information. We use the similarity between suchradar data representation and the core of the self-attention concept inartificial...conference paper 2023
- document
-
Bartlett, A.J. (author), Liem, C.C.S. (author), Panichella, A. (author)Deep learning (DL) models are known to be highly accurate, yet vulnerable to adversarial examples. While earlier research focused on generating adversarial examples using whitebox strategies, later research focused on black-box strategies, as models often are not accessible to external attackers. Prior studies showed that black-box approaches...conference paper 2023
- document
-
Al-Kaswan, A. (author), Ahmed, Toufique (author), Izadi, M. (author), Sawant, Anand Ashok (author), Devanbu, Premkumar (author), van Deursen, A. (author)Binary reverse engineering is used to understand and analyse programs for which the source code is unavailable. Decompilers can help, transforming opaque binaries into a more readable source code-like representation. Still, reverse engineering is difficult and costly, involving considering effort in labelling code with helpful summaries....conference paper 2023
- document
-
Lee, Y. (author), Specht, M.M. (author)Reading on digital devices has become more commonplace, while it often poses challenges to learners' attention. In this study, we hypothesized that allowing learners to reflect on their reading phases with an empathic social robot companion might enhance learners' attention in e-reading. To verify our assumption, we collected a novel dataset ...conference paper 2023
- document
-
Guendel, Ronny (author), Ullmann, I. (author), Fioranelli, F. (author), Yarovoy, Alexander (author)Radar-based human activity recognition in crowded environments using regression approaches is addressed. Whereas previous research has focused on single activities and subjects, the problem of continuous activity recognition involving up to five individuals moving in arbitrary directions in an indoor area is introduced. To treat the problem, a...conference paper 2023
- document
-
Zhu, S. (author), Fioranelli, F. (author), Yarovoy, Alexander (author)The problem of 2D instantaneous ego-motion estimation for vehicles equipped with automotive radars is studied. To leverage multi-dimensional radar point clouds and exploit point features automatically, without human engineering, a novel approach is proposed that transforms ego-motion estimation into a weighted least squares (wLSQ) problem using...conference paper 2023
- document
-
Cardaioli, Matteo (author), Conti, M. (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)Ideally, secure user sessions should start and end with authentication and de-Authentication phases, respectively. While the user must pass the former to start a secure session, the latter's importance is often ignored or underestimated. Dangling or unattended sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, the...conference paper 2022
- document
-
Caglar, Baris (author), Broggi, G.C. (author), Ali, Muhammad A. (author), Orgéas, Laurent (author), Michaud, Véronique (author)Knowledge of permeability of fibrous microstructures is crucial for predicting the mold fill times and resin flow path in composite manufacturing. Herein we report a method to rapidly predict the permeability of 3D fibrous microstructures. Our method relies on predicting the permeability of 2D cross-sections via deep neural networks and...conference paper 2022
- document
-
Moradi, M. (author), Ghorbani, R. (author), Sfarra, Stefano (author), Tax, D.M.J. (author), Zarouchas, D. (author)Assessment of cultural heritage assets is now extremely important all around the world. Non-destructive inspection is essential for preserving the integrity of the artworks while avoiding the loss of any precious materials that make it up. The use of Infrared Thermography (IRT) is an interesting concept since surface and subsurface faults can be...conference paper 2022
- document
-
Aljuffri, A.A.M. (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author), Sepulveda, Johanna (author)Currently NIST is working towards the standardization of lightweight cryptography (LWC). Although the cryptanalytic strength of LWC is currently under deep scrutiny, the LWC implementation security has not been yet widely explored. GIFT block cipher is the main building block of many of the LWC NIST candidates and therefore has the potential to...conference paper 2022
- document
-
Dushatskiy, A. (author), Lowe, Gerry (author), Bosman, P.A.N. (author), Alderliesten, T. (author)Deep learning algorithms have become the golden standard for segmentation of medical imaging data. In most works, the variability and heterogeneity of real clinical data is acknowledged to still be a problem. One way to automatically overcome this is to capture and exploit this variation explicitly. Here, we propose an approach that improves...conference paper 2022
- document
-
Chebykin, Alexander (author), Alderliesten, T. (author), Bosman, P.A.N. (author)To achieve excellent performance with modern neural networks, having the right network architecture is important. Neural Architecture Search (NAS) concerns the automatic discovery of task-specific network architectures. Modern NAS approaches leverage super-networks whose subnetworks encode candidate neural network architectures. These...conference paper 2022
- document
-
Wu, L. (author), Perin, G. (author), Picek, S. (author)Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto standard for the most powerful profiling side-channel analysis.The results from the last few years show that deep learning techniques can efficiently break targets that are even protected with countermeasures. While there are constant improvements in making...conference paper 2022
- document
-
Bai, N. (author), Luo, Renqian (author), Nourian, Pirouz (author), Pereira Roders, A. (author)The UNESCO World Heritage List (WHL) includes the exceptionally valuable cultural and natural heritage to be preserved for mankind. Evaluating and justifying the Outstanding Universal Value (OUV) is essential for each site inscribed in the WHL, and yet a complex task, even for experts, since the selection criteria of OUV are not mutually...conference paper 2021
- document
-
Li, Z. (author), Mancini, Maria Elisabetta (author), Monizzi, Giovanni (author), Andreini, Daniele (author), Ferrigno, Giancarlo (author), Dankelman, J. (author), De Momi, Elena (author)Cardiologists highlight the need for an intra-operative 3D visualization to assist interventions. The intra-operative 2D X-ray/Digital Subtraction Angiography (DSA) images in the standard clinical workflow limit cardiologists’ views significantly. Compared with image-to-image registration, model-to-image registration is an essential approach...conference paper 2021
- document
-
Erba, Alessandro (author), Taormina, R. (author), Galelli, Stefano (author), Pogliani, Marcello (author), Carminati, Michele (author), Zanero, Stefano (author), Tippenhauer, Nils Ole (author)Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based detectors operate on the measured sensor data, leveraging physical process models learned a priori....conference paper 2020
- document
-
Pérez-Dattari, Rodrigo (author), Celemin, Carlos (author), Ruiz-del-Solar, Javier (author), Kober, J. (author)Deep Reinforcement Learning (DRL) has become a powerful strategy to solve complex decision making problems based on Deep Neural Networks (DNNs). However, it is highly data demanding, so unfeasible in physical systems for most applications. In this work, we approach an alternative Interactive Machine Learning (IML) strategy for training DNN...conference paper 2020