Searched for: contributor%3A%22Ceballos%2C+Cristina+%28editor%29%22
(1 - 9 of 9)
document
Altmeyer, P. (author), Giovan, Angela (author), Buszydlik, Aleksander (author), Dobiczek, Karol (author), van Deursen, A. (author), Liem, C.C.S. (author)
Existing work on Counterfactual Explanations (CE) and Algorithmic Recourse (AR) has largely focused on single individuals in a static environment: given some estimated model, the goal is to find valid counterfactuals for an individual instance that fulfill various desiderata. The ability of such counterfactuals to handle dynamics like data and...
conference paper 2023
document
Mir, S.A.M. (author), Keshani, M. (author), Proksch, S. (author)
Reusing software libraries is a pillar of modern software engineering. In 2022, the average Java application depends on 40 third-party libraries. Relying on such libraries exposes a project to potential vulnerabilities and may put an application and its users at risk. Unfortunately, research on software ecosystems has shown that the number of...
conference paper 2023
document
Al-Kaswan, A. (author), Ahmed, Toufique (author), Izadi, M. (author), Sawant, Anand Ashok (author), Devanbu, Premkumar (author), van Deursen, A. (author)
Binary reverse engineering is used to understand and analyse programs for which the source code is unavailable. Decompilers can help, transforming opaque binaries into a more readable source code-like representation. Still, reverse engineering is difficult and costly, involving considering effort in labelling code with helpful summaries....
conference paper 2023
document
Olsthoorn, Mitchell (author), van Deursen, A. (author), Panichella, A. (author)
Transaction-reverting statements are key constructs within Solidity that are extensively used for authority and validity checks. Current state-of-the-art search-based testing and fuzzing approaches do not explicitly handle these statements and therefore can not effectively detect security vulnerabilities. In this paper, we argue that it is...
conference paper 2022
document
Singh, A. (author), Fieback, M. (author), Bishnoi, R.K. (author), Bradarić, Filip (author), Gebregiorgis, A.B. (author), Joshi, R.V. (author), Hamdioui, S. (author)
Emerging non-volatile resistive RAM (RRAM) device technology has shown great potential to cultivate not only high-density memory storage, but also energy-efficient computing units. However, the unique challenges related to RRAM fabrication process render the traditional memory testing solutions inefficient and inadequate for high product quality...
conference paper 2022
document
Wu, Han (author), Zhao, Z. (author), Chen, Lydia Y. (author), van Moorsel, Aad (author)
Federated Learning (FL) has emerged as a potentially powerful privacy-preserving machine learning method-ology, since it avoids exchanging data between participants, but instead exchanges model parameters. FL has traditionally been applied to image, voice and similar data, but recently it has started to draw attention from domains including...
conference paper 2022
document
Wang, Weizheng (author), Vette, Marek (author), Wang, Q. (author), Yang, J. (author), Zuniga, Marco (author)
To protect sensitive information on smartphones, state-of-the-art (SoA) studies exploit the built-in camera to capture PPG signals from fingertips as a hard-to-forge biometric. However, those studies do not provide a comprehensive analysis to optimize the camera parameters and finger pressure, leading to distorted and unstable PPG signals that...
conference paper 2022
document
Taouil, M. (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Sepulveda, Johanna (author)
Dynamic Random Access Memory (DRAM)-based systems are widely used in mobile and portable applications where low-cost and high-storage memory capability are required. However, such systems are prone to attacks. A latent threat to DRAM-based system security is the so-called Rowhammer attacks. By repeatedly accessing memory, an attacker is able to...
conference paper 2021
document
Kouvelas, N. (author), Venkatesha Prasad, Ranga Rao (author), Yazdani, N. (author), Lucani, Daniel E. (author)
Long Range Wide Area Networks (LoRaWAN) offer ubiquitous communications for The Internet of Things (IoT). However, there are many challenges in rolling out LoRaWAN - mainly scalability, energy efficiency, Packet Reception Ratio (PRR), and keeping the channel access as simple as unslotted ALOHA. To this end, we design non-persistent Capture...
conference paper 2021
Searched for: contributor%3A%22Ceballos%2C+Cristina+%28editor%29%22
(1 - 9 of 9)