Circular Image

R.L. Lagendijk

25 records found

Human Insight vs. Artificial Intelligence: A Thematic Analysis

Comparing Manual and LLM Approaches to Understanding How Smokers Experience Preparatory Activities in a Digital Cessation Intervention

Smoking remains a leading cause of preventable death, making effective cessation support a global health priority. While conversational agents (chatbots) offer a scalable solution, their success depends on understanding the user’s experience. This study addresses two interconnect ...

Towards Robust Deep Learning

Deep Latent Variable Modeling against Out-of-Distribution and Adversarial Inputs

As Deep Neural Networks (DNNs) continue to be deployed in safety-critical domains, two specific concerns — adversarial examples and Out-of-Distribution (OoD) data — pose significant threats to their reliability. This thesis proposes novel methods to enhance the robustness of deep ...

Decision Tree Learning

Algorithms for Robust Prediction and Policy Optimization

We increasingly encounter artificial intelligence-based technology in our daily lives, from smart home devices to self-driving cars to invisible systems running on our internet. Many artificial intelligence techniques use machine learning, algorithms that learn to predict or act ...
In modern society, data is increasingly important for people's daily lives and commercial activities to benefit organization, management and analysis. Proper data utilization involves different stages, and the data life cycle is introduced to describe the procedures as generation ...
In an era of increasing reliance on digital technology, securing embedded and interconnected devices, such as smart cards or Internet of Things (IoT) devices, against emerging threats becomes crucial, highlighting the need for advanced security measures. Cryptographic algorithms, ...

Why does the machine punish?

The effects of the use of machine learning in criminal sentencing on the application of the theories of punishment

In recent years, the practice of risk-assessment has started to utilize machine learning to take in larger data sets and improve prediction accuracy. Simultaneously, it has expanded into the sentencing stage of the criminal justice system. This paper analyzes the effect of these ...
Bitcoin is a widely acknowledged digital currency that is designed in a decentralized manner. The recognition of Bitcoin has introduced the notion of cryptocurrencies and, in general, blockchain technology. Blockchain, within less than a decade, has become one of the most excitin ...

Statistical Analysis in Cyberspace

Data veracity, completeness, and clustering

This thesis presents several methodological and statistical solutions to problems encountered in cyber security. We investigated the effects of compromised data veracity in state estimators and fraud detection systems, a model to impute missing data in attributes of linked observ ...
The internet traffic is constantly rising nowadays due to the significant increase of the devices connected to the Internet. As a consequence, many cyber risks have arisen. Cybercriminals are trying to exploit the vulnerabilities of these devices to cause damage and gain profit. ...

CAML-IDS

A framework for the correct assessment of machine learning-based intrusion detection systems

The Internet is a relatively new technology that the world has become immensely dependent on. It is a tool that makes it possible to simplify our lives and better our society. But as with many things, there are people who with to exploit this tool we have for their own malicious ...

Strape SDK

A gesture-based peer-to-peer transaction system

Strape enables users to initiate and authorize peer-to-peer transactions without alphanumerical input by
using gestures. OK, a smart wallet app, combines authentication, marketing and payment services in a single
app. By choice, peer-to-peer payments were excluded from th ...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a mobile software agent that performs a task on behalf of its user. The agent travels over the network and is executed at different locations of which beforehand it is not known whe ...