Zobrazeno 1 - 10
of 1 231
pro vyhledávání: '"Perez, Manuel P"'
Cybersecurity is developing rapidly, and new methods of defence against attackers are appearing, such as Cyber Deception (CYDEC). CYDEC consists of deceiving the enemy who performs actions without realising that he/she is being deceived. This article
Externí odkaz:
http://arxiv.org/abs/2402.09191
Autor:
Beltrán, Enrique Tomás Martínez, Sánchez, Pedro Miguel Sánchez, Bernal, Sergio López, Bovet, Gérôme, Pérez, Manuel Gil, Pérez, Gregorio Martínez, Celdrán, Alberto Huertas
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces uni
Externí odkaz:
http://arxiv.org/abs/2307.11730
Autor:
Beltrán, Enrique Tomás Martínez, Gómez, Ángel Luis Perales, Feng, Chao, Sánchez, Pedro Miguel Sánchez, Bernal, Sergio López, Bovet, Gérôme, Pérez, Manuel Gil, Pérez, Gregorio Martínez, Celdrán, Alberto Huertas
In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, w
Externí odkaz:
http://arxiv.org/abs/2306.09750
Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges
Autor:
Beltrán, Enrique Tomás Martínez, Pérez, Mario Quiles, Sánchez, Pedro Miguel Sánchez, Bernal, Sergio López, Bovet, Gérôme, Pérez, Manuel Gil, Pérez, Gregorio Martínez, Celdrán, Alberto Huertas
In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a
Externí odkaz:
http://arxiv.org/abs/2211.08413
Publikováno v:
Proceedings of the VII Jornadas Nacionales de Investigaci\'on en Ciberseguridad, pp. 237-240, Bilbao, Spain (2022)
5G networks intend to cover user demands through multi-party collaborations in a secure and trustworthy manner. To this end, marketplaces play a pivotal role as enablers for network service consumers and infrastructure providers to offer, negotiate,
Externí odkaz:
http://arxiv.org/abs/2210.11517
Autor:
Valero, José María Jorquera, Sánchez, Pedro Miguel Sánchez, Pérez, Manuel Gil, Celdrán, Alberto Huertas, Pérez, Gregorio Martínez
Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer f
Externí odkaz:
http://arxiv.org/abs/2210.11501
Autor:
Sánchez, Pedro Miguel Sánchez, Valero, José María Jorquera, Celdrán, Alberto Huertas, Bovet, Gérôme, Pérez, Manuel Gil, Pérez, Gregorio Martínez
In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suita
Externí odkaz:
http://arxiv.org/abs/2204.08516
Autor:
Andreu-Perez, Javier, Pérez-Espinosa, Humberto, Timonet, Eva, Kiani, Mehrin, Girón-Pérez, Manuel I., Benitez-Trinidad, Alma B., Jarchi, Delaram, Rosales-Pérez, Alejandro, Gatzoulis, Nick, Reyes-Galaviz, Orion F., Torres-García, Alejandro, Reyes-García, Carlos A., Ali, Zulfiqar, Rivas, Francisco
Publikováno v:
IEEE Transactions on Services Computing (2021)
We seek to evaluate the detection performance of a rapid primary screening tool of Covid-19 solely based on the cough sound from 8,380 clinically validated samples with laboratory molecular-test (2,339 Covid-19 positives and 6,041 Covid-19 negatives)
Externí odkaz:
http://arxiv.org/abs/2111.05895
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
Autor:
Sánchez, Pedro Miguel Sánchez, Valero, José María Jorquera, Celdrán, Alberto Huertas, Bovet, Gérôme, Pérez, Manuel Gil, Pérez, Gregorio Martínez
The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to i
Externí odkaz:
http://arxiv.org/abs/2106.08209
Autor:
Sánchez, Pedro Miguel Sánchez, Valero, Jose María Jorquera, Celdrán, Alberto Huertas, Bovet, Gérôme, Pérez, Manuel Gil, Pérez, Gregorio Martínez
In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performan
Externí odkaz:
http://arxiv.org/abs/2008.03343