Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2023

Towards Improved Indoor Location with Unmodified RFID Systems

Authors
Santos, R; Alexandre, R; Marques, P; Antunes, M; Barraca, JP; Silva, J; Ferreira, N;

Publication
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2023, Lisbon, Portugal, February 22-24, 2023.

Abstract
The management of health systems has been one of the main challenges in several European countries, especially where the aging population is increasing. This led to the adoption of smarter technologies as a means to automate the processes within hospitals. One of the technologies adopted is active location solutions, which allows the staff within the hospital to quickly find any sort of entity, from key persons to equipment. In this work, we focus on developing a reliable method for active location based on RSSI antennas, passive tags, and ML models. Since the tags are passive, the usage of RSSI is discouraged, since it does not vary sufficiently based on our experiments. We explored the usage of alternative features, such as the number of activations per tag within a time slot. Throughout our evaluation, we were able to reach an average error of 0.275 m which is similar to existing RSSI IPS.

2023

Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication

Authors
Freitas, T; Soares, J; Correia, ME; Martins, R;

Publication
COMPUTERS & SECURITY

Abstract
Byzantine Fault tolerant (BFT) protocols are implemented to guarantee the correct system/application behavior even in the presence of arbitrary faults (i.e., Byzantine faults). Byzantine Fault tolerant State Machine Replication (BFT-SMR) is a known software solution for masking arbitrary faults and malicious attacks (Liu et al., 2020). In this survey, we present and discuss relevant BFT-SMR protocols, focusing on deterministic and probabilistic approaches. The main purpose of this paper is to discuss the characteristics of proposed works for each approach, as well as identify the trade-offs for each different approach.& COPY; 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )

2023

Cutting and packing problems under uncertainty: literature review and classification framework

Authors
Salem, KH; Silva, E; Oliveira, JF;

Publication
INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH

Abstract
Cutting and packing problems are hard combinatorial optimization problems that arise in several manufacturing and process industries or in their supply chains. The solution of these problems is not only a scientific challenge but also has a large economic impact, as it contributes to the reduction of one of the major cost factors for many production sectors, namely raw materials, together with a positive environmental impact. The explicit consideration of uncertainty when solving cutting and packing problems with optimization techniques is crucial for a wider adoption of research results by companies. However, current research has paid little attention to the role of uncertainty in these problems. In this paper, we review the existing literature on uncertainty in cutting and packing problems, propose a classification framework, and highlight the many research gaps and opportunities for scientific contributions.

2023

Detecting wildlife trafficking in images from online platforms: A test case using deep learning with pangolin images

Authors
Cardoso, AS; Bryukhova, S; Renna, F; Reino, L; Xu, C; Xiao, ZX; Correia, R; Di Minin, E; Ribeiro, J; Vaz, AS;

Publication
BIOLOGICAL CONSERVATION

Abstract
E-commerce has become a booming market for wildlife trafficking, as online platforms are increasingly more accessible and easier to navigate by sellers, while still lacking adequate supervision. Artificial intelligence models, and specifically deep learning, have been emerging as promising tools for the automated analysis and monitoring of digital online content pertaining to wildlife trade. Here, we used and fine-tuned freely available artificial intelligence models (i.e., convolutional neural networks) to understand the potential of these models to identify instances of wildlife trade. We specifically focused on pangolin species, which are among the most trafficked mammals globally and receiving increasing trade attention since the COVID-19 pandemic. Our convolutional neural networks were trained using online images (available from iNaturalist, Flickr and Google) displaying both traded and non-traded pangolin settings. The trained models showed great performances, being able to identify over 90 % of potential instances of pangolin trade in the considered imagery dataset. These instances included the showcasing of pangolins in popular marketplaces (e.g., wet markets and cages), and the displaying of commonly traded pangolin parts and derivates (e.g., scales) online. Nevertheless, not all instances of pangolin trade could be identified by our models (e.g., in images with dark colours and shaded areas), leaving space for further research developments. The methodological developments and results from this exploratory study represent an advancement in the monitoring of online wildlife trade. Complementing our approach with other forms of online data, such as text, would be a way forward to deliver more robust monitoring tools for online trafficking.

2023

Towards Privacy-First Security Enablers for 6G Networks: The PRIVATEER Approach

Authors
Masouros, D; Soudris, D; Gardikis, G; Katsarou, V; Christopoulou, M; Xilouris, G; Ramón, H; Pastor, A; Scaglione, F; Petrollini, C; Pinto, A; Vilela, JP; Karamatskou, A; Papadakis, N; Angelogianni, A; Giannetsos, T; García Villalba, LJ; Alonso López, JA; Strand, M; Grov, G; Bikos, AN; Ramantas, K; Santos, R; Silva, F; Tsampieris, N;

Publication
Embedded Computer Systems: Architectures, Modeling, and Simulation - 23rd International Conference, SAMOS 2023, Samos, Greece, July 2-6, 2023, Proceedings

Abstract
The advent of 6G networks is anticipated to introduce a myriad of new technology enablers, including heterogeneous radio, RAN softwarization, multi-vendor deployments, and AI-driven network management, which is expected to broaden the existing threat landscape, demanding for more sophisticated security controls. At the same time, privacy forms a fundamental pillar in the EU development activities for 6G. This decentralized and globally connected environment necessitates robust privacy provisions that encompass all layers of the network stack. In this paper, we present PRIVATEER’s approach for enabling “privacy-first” security enablers for 6G networks. PRIVATEER aims to tackle four major privacy challenges associated with 6G security enablers, i.e., i) processing of infrastructure and network usage data, ii) security-aware orchestration, iii) infrastructure and service attestation and iv) cyber threat intelligence sharing. PRIVATEER addresses the above by introducing several innovations, including decentralised robust security analytics, privacy-aware techniques for network slicing and service orchestration and distributed infrastructure and service attestation mechanisms. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.

2023

BEYOND FRONT AND BACK OFFICE: VISUALIZATIONS, REPRESENTATIONS AND ACCESS THROUGH POSTCOLONIAL LENSES BETWEEN A RESEARCH PLATFORM AND AN ARTS EDUCATION ARCHIVE

Authors
Assis, T; Martins, C; Valle, A; Santos, A; Castro, J; Osório, L; Silva, P;

Publication
ICERI2023 Proceedings - ICERI Proceedings

Abstract

  • 381
  • 4212