2015
Authors
Santos, M; Araujo, A; Barbeiro, S; Caramelo, F; Correia, A; Marques, MI; Morgado, M; Pinto, L; Serranho, P; Bernardes, R;
Publication
2015 IEEE 4TH PORTUGUESE MEETING ON BIOENGINEERING (ENBENG)
Abstract
The goal of this work is to develop a computational model of the human retina and simulate light scattering through its structure aiming to shed light on data obtained by optical coherence tomography in human retinas. Currently, light propagation in scattering media is often described by Mie's solution to Maxwell's equations, which only describes the scattering patterns for homogeneous spheres, thus limiting its application for scatterers of more complex shapes. In this work, we propose a discontinuous Galerkin method combined with a low-storage Runge-Kutta method as an accurate and efficient way to numerically solve the time-dependent Maxwell's equations. In this work, we report on the validation of the proposed methodology by comparison with Mie's solution, a mandatory step before further elaborating the numerical scheme towards the propagation of electromagnetic waves through the human retina.
2025
Authors
Apóstolo, D; Santos, MS; Lorena, AC; Abreu, PH;
Publication
Neurocomputing
Abstract
2025
Authors
Mangussi, AD; Pereira, RC; Lorena, AC; Santos, MS; Abreu, PH;
Publication
Comput. Secur.
Abstract
Cybersecurity attacks, such as poisoning and evasion, can intentionally introduce false or misleading information in different forms into data, potentially leading to catastrophic consequences for critical infrastructures, like water supply or energy power plants. While numerous studies have investigated the impact of these attacks on model-based prediction approaches, they often overlook the impurities present in the data used to train these models. One of those forms is missing data, the absence of values in one or more features. This issue is typically addressed by imputing missing values with plausible estimates, which directly impacts the performance of the classifier. The goal of this work is to promote a Data-centric AI approach by investigating how different types of cybersecurity attacks impact the imputation process. To this end, we conducted experiments using four popular evasion and poisoning attacks strategies across 29 real-world datasets, including the NSL-KDD and Edge-IIoT datasets, which were used as case study. For the adversarial attack strategies, we employed the Fast Gradient Sign Method, Carlini & Wagner, Project Gradient Descent, and Poison Attack against Support Vector Machine algorithm. Also, four state-of-the-art imputation strategies were tested under Missing Not At Random, Missing Completely at Random, and Missing At Random mechanisms using three missing rates (5%, 20%, 40%). We assessed imputation quality using MAE, while data distribution shifts were analyzed with the Kolmogorov–Smirnov and Chi-square tests. Furthermore, we measured classification performance by training an XGBoost classifier on the imputed datasets, using F1-score, Accuracy, and AUC. To deepen our analysis, we also incorporated six complexity metrics to characterize how adversarial attacks and imputation strategies impact dataset complexity. Our findings demonstrate that adversarial attacks significantly impact the imputation process. In terms of imputation assessment in what concerns to quality error, the scenario that enrolees imputation with Project Gradient Descent attack proved to be more robust in comparison to other adversarial methods. Regarding data distribution error, results from the Kolmogorov–Smirnov test indicate that in the context of numerical features, all imputation strategies differ from the baseline (without missing data) however for the categorical context Chi-Squared test proved no difference between imputation and the baseline. © 2025
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.