2021
Autores
Barbosa, A; Ribeiro, P; Dutra, I;
Publicação
MLSA@PKDD/ECML
Abstract
Association football has been the subject of many research studies. In this work we present a study on player similarity using passing sequences extracted from games from the top-5 European football leagues during the 2017/2018 season. We present two different approaches: first, we only count the motifs a player is involved in; then we also take into consideration the specific position a player occupies in each motif. We also present a new way to objectively judge the quality of the generated models in football analytics. Our results show that the study of passing sequences can be used to study player similarity with relative success.
2022
Autores
Neto, MTRS; Dutra, I; Mollinetti, MAF;
Publicação
2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)
Abstract
Convolutional Neural Networks (CNN) have been successfully applied to images, text and audio, but their performance are not so good when applied to feature-based tabular data. Exceptions are works such as TabNet and DeepInsight, which employ end-to-end approaches. In this work, we propose an alternative way of using CNNs to model tabular data where knowledge is extracted from the feature space before being introduced to the network. Our strategy, Map-Optimize-Learn (MOL), changes the shape representation of samples in order to produce suitable input data for the CNN architecture. The strategy is applied to a real-world scenario of children and teenagers with cardiac pathology and compared against baseline and state of the art Machine Learning (ML) algorithms for tabular datasets. Preliminary results suggest that the strategy has potential to improve prediction quality of tabular data over end-to-end CNN methods and classical ML methods.
2020
Autores
Areias, M; Barbosa, J; Dutra, I;
Publicação
Proceedings - Symposium on Computer Architecture and High Performance Computing
Abstract
2026
Autores
Pfahringer, B; Japkowicz, N; Larrañaga, P; Ribeiro, RP; Dutra, I; Pechenizkiy, M; Cortez, P; Pashami, S; Jorge, AM; Soares, C; Abreu, PH; Gama, J;
Publicação
ECML/PKDD (8)
Abstract
2026
Autores
Dutra, I; Pechenizkiy, M; Cortez, P; Pashami, S; Pasquali, A; Moniz, N; Jorge, AM; Soares, C; Abreu, PH; Gama, J;
Publicação
ECML/PKDD (10)
Abstract
2025
Autores
Freitas, T; Novo, C; Dutra, I; Soares, J; Correia, ME; Shariati, B; Martins, R;
Publicação
SOFTWARE-PRACTICE & EXPERIENCE
Abstract
Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness.Objective This work extends the HAL 9000 Risk Manager to integrate additional real-time threat intelligence sources and employ machine learning techniques to automatically predict and reassess vulnerability risk scores, addressing limitations of existing solutions.Methods A custom-built scraper collects diverse cybersecurity data from multiple Open Source Intelligence (OSINT) platforms, such as NVD, CVE, AlienVault OTX, and OSV. HAL 9000 uses machine learning models for CVE score prediction, vulnerability clustering through scalable algorithms, and reassessment incorporating exploit likelihood and patch availability to dynamically evaluate system configurations.Results Integration of newly scraped data significantly enhances the risk management capabilities, enabling faster detection and mitigation of emerging vulnerabilities with improved resilience and security. Experiments show HAL 9000 provides lower risk and more resilient configurations compared to prior methods while maintaining scalability and automation.Conclusions The proposed enhancements position HAL 9000 as a next-generation autonomous Risk Manager capable of effectively incorporating diverse intelligence sources and machine learning to improve ITS security posture in dynamic threat environments. Future work includes expanding data sources, addressing misinformation risks, and real-world deployments.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.