Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by LIAAD

2022

On Usefulness of Outlier Elimination in Classification Tasks

Authors
Hetlerovic, D; Popelinsky, L; Brazdil, P; Soares, C; Freitas, F;

Publication
ADVANCES IN INTELLIGENT DATA ANALYSIS XX, IDA 2022

Abstract
Although outlier detection/elimination has been studied before, few comprehensive studies exist on when exactly this technique would be useful as preprocessing in classification tasks. The objective of our study is to fill in this gap. We have performed experiments with 12 various outlier elimination methods and 10 classification algorithms on 50 different datasets. The results were then processed by the proposed reduction method, whose aim is identify the most useful workflows for a given set of tasks (datasets). The reduction method has identified that just three OEMs that are generally useful for the given set of tasks. We have shown that the inclusion of these OEMs is indeed useful, as it leads to lower loss in accuracy and the difference is quite significant (0.5%) on average.

2022

Host-based IDS: A review and open issues of an anomaly detection system in IoT

Authors
Martins, I; Resende, JS; Sousa, PR; Silva, S; Antunes, L; Gama, J;

Publication
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE

Abstract
The Internet of Things (IoT) envisions a smart environment powered by connectivity and heterogeneity where ensuring reliable services and communications across multiple industries, from financial fields to healthcare and fault detection systems, is a top priority. In such fields, data is being collected and broadcast at high speed on a continuous and real-time scale, including IoT in the streaming processing paradigm. Intrusion Detection Systems (IDS) rely on manually defined security policies and signatures that fail to design a real-time solution or prevent zero-day attacks. Therefore, anomaly detection appears as a prominent solution capable of recognizing patterns, learning from experience, and detecting abnormal behavior. However, most approaches do not fit the urged requirements, often evaluated on deprecated datasets not representative of the working environment. As a result, our contributions address an overview of cybersecurity threats in IoT, important recommendations for a real-time IDS, and a real-time dataset setting to evaluate a security system covering multiple cyber threats. The dataset used to evaluate current host-based IDS approaches is publicly available and can be used as a benchmark by the community.

2022

Advances in Knowledge Discovery and Data Mining - 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, May 16-19, 2022, Proceedings, Part I

Authors
Gama, J; Li, T; Yu, Y; Chen, E; Zheng, Y; Teng, F;

Publication
PAKDD (1)

Abstract

2022

Advances in Knowledge Discovery and Data Mining - 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, May 16-19, 2022, Proceedings, Part III

Authors
Gama, J; Li, T; Yu, Y; Chen, E; Zheng, Y; Teng, F;

Publication
PAKDD (3)

Abstract

2022

PREDICTIVE MAINTENANCE FOR WIND TURBINES

Authors
Sant'Ana, B; Veloso, B; Gama, J;

Publication
TECHNOLOGIES, MARKETS AND POLICIES: BRINGING TOGETHER ECONOMICS AND ENGINEERING

Abstract
With the greater awareness of climate change, the exponential expansion in the world population's energy needs, and other factors, many countries are producing and using renewable energy sources. However, this type of energy comes with a high cost associated with operation and maintenance. The importance of predictive maintenance in this area is growing, providing valuable insights for strategic decision-making. This paper aims to detect failures in wind turbines early. In our first approach, we considered the Page-Hinkley Test with a sliding window on the different vital components' temperature as a fault detection method. The second approach involved moving averages methods for forecasting the temperature of the different components. Our results showed that both methods could detect failures at least three days before and one day after the failure occurs.

2022

How are you Riding? Transportation Mode Identification from Raw GPS Data

Authors
Andrade, T; Gama, J;

Publication
PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2022

Abstract
Analyzing the way individuals move is fundamental to understand the dynamics of humanity. Transportation mode plays a significant role in human behavior as it changes how individuals travel, how far, and how often they can move. The identification of transportation modes can be used in many applications and it is a key component of the internet of things (IoT) and the Smart Cities concept as it helps to organize traffic control and transport management. In this paper, we propose the use of ensemble methods to infer the transportation modes using raw GPS data. From latitude, longitude, and timestamp we perform feature engineering in order to obtain more discriminative fields for the classification. We test our features in several machine learning algorithms and among those with the best results we perform feature selection using the Boruta method in order to boost our accuracy results and decrease the amount of data, processing time, and noise in the model. We assess the validity of our approach on a real-world dataset with several different transportation modes and the results show the efficacy of our approach.

  • 107
  • 515