Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2019

Wide Residual Network for Lung-Rads (TM) Screening Referral

Authors
Ferreira, CA; Aresta, G; Cunha, A; Mendonca, AM; Campilho, A;

Publication
2019 6TH IEEE PORTUGUESE MEETING IN BIOENGINEERING (ENBENG)

Abstract
Lung cancer has an increasing preponderance in worldwide mortality, demanding for the development of efficient screening methods. With this in mind, a binary classification method using Lung-RADS (TM) guidelines to warn changes in the screening management is proposed. First, having into account the lack of public datasets for this task, the lung nodules in the LIDC-IDRI dataset were re-annotated to include a Lung-RADS (TM)-based referral label. Then, a wide residual network is used for automatically assessing lung nodules in 3D chest computed tomography exams. Unlike the standard malignancy prediction approaches, the proposed method avoids the need to segment and characterize lung nodules, and instead directly defines if a patient should be submitted for further lung cancer tests. The system achieves a nodule-wise accuracy of 0.87 +/- 0.02.

2019

Immersive Learning Research Network

Authors
Beck, D; Peña-Rios, A; Ogle, T; Economou, D; Mentzelopoulos, M; Morgado, L; Eckhardt, C; Pirker, J; Koitz-Hristov, R; Richter, J; Gütl, C; Gardner, M;

Publication
Communications in Computer and Information Science

Abstract

2019

Heart Sounds Classification Using Images from Wavelet Transformation

Authors
Nogueira, DM; Zarmehri, MN; Ferreira, CA; Jorge, AM; Antunes, L;

Publication
PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2019, PT I

Abstract
Cardiovascular disease is the leading cause of death around the world and its early detection is a key to improving long-term health outcomes. To detect possible heart anomalies at an early stage, an automatic method enabling cardiac health low-cost screening for the general population would be highly valuable. By analyzing the phonocardiogram (PCG) signals, it is possible to perform cardiac diagnosis and find possible anomalies at an early-term. Accordingly, the development of intelligent and automated analysis tools of the PCG is very relevant. In this work, the PCG signals are studied with the main objective of determining whether a PCG signal corresponds to a “normal” or “abnormal” physiological state. The main contribution of this work is the evidence provided that time domain features can be combined with features extracted from a wavelet transformation of PCG signals to improve automatic cardiac disease classification. We empirically demonstrate that, from a pool of alternatives, the best classification results are achieved when both time and wavelet features are used by a Support Vector Machine with a linear kernel. Our approach has obtained better results than the ones reported by the challenge participants which use large amounts of data and high computational power. © Springer Nature Switzerland AG 2019.

2019

Performance of Hash Functions in Blockchain Applied to IoT Devices

Authors
Ferreira, J; Zhygulskyy, M; Antunes, M; Frazao, L;

Publication
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)

Abstract
The IoT (Internet of Things) is a network composed of several devices (things) connected to the Internet and to each other. IoT services are increasingly growing and are allowing companies to deploy scalable solutions with reduced costs and instantaneous data access. These solutions require seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self- maintenance. Such requirements can be given to a company's IoT solution by applying blockchain technology. This paper analyzes the blockchain technology and the advantages and challenges behind its implementation in an IoT environment. A blockchain in IoT scenario was developed to evaluate the performance of different cryptographic hash functions in the IoT device RaspberryPi. Conclusions were drawn when it comes to the viability of some hash functions mainly based on the low resource characteristic shared by the IoT devices, which compromises the performance of the hash function.

2019

Machine-Checked Proofs for Cryptographic Standards Indifferentiability of SPONGE and Secure High-Assurance Implementations of SHA-3

Authors
Almeida, JB; Baritel Ruet, C; Barbosa, M; Barthe, G; Dupressoir, F; Gregoire, B; Laporte, V; Oliveira, T; Stoughton, A; Strub, PY;

Publication
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19)

Abstract
We present a high-assurance and high-speed implementation of the SHA-3 hash function. Our implementation is written in the Jasmin programming language, and is formally verified for functional correctness, provable security and timing attack resistance in the EasyCrypt proof assistant. Our implementation is the first to achieve simultaneously the four desirable properties (efficiency, correctness, provable security, and side-channel protection) for a non-trivial cryptographic primitive. Concretely, our mechanized proofs show that: 1) the SHA-3 hash function is indifferentiable from a random oracle, and thus is resistant against collision, first and second preimage attacks; 2) the SHA-3 hash function is correctly implemented by a vectorized x86 implementation. Furthermore, the implementation is provably protected against timing attacks in an idealized model of timing leaks. The proofs include new EasyCrypt libraries of independent interest for programmable random oracles and modular indifferentiability proofs.

2019

Preface

Authors
Paredes H.; Shen W.;

Publication
Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design, CSCWD 2019

Abstract

  • 1349
  • 4137