Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 59 results for author: Sanchez, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.19458  [pdf, other

    cs.CV cs.AI

    MemControl: Mitigating Memorization in Medical Diffusion Models via Automated Parameter Selection

    Authors: Raman Dutt, Pedro Sanchez, Ondrej Bohdal, Sotirios A. Tsaftaris, Timothy Hospedales

    Abstract: Diffusion models show a remarkable ability in generating images that closely mirror the training distribution. However, these models are prone to training data memorization, leading to significant privacy, ethical, and legal concerns, particularly in sensitive fields such as medical imaging. We hypothesize that memorization is driven by the overparameterization of deep models, suggesting that regu… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  2. arXiv:2405.09318  [pdf, other

    cs.CR cs.LG

    Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the lite… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Submitted to IEEE MILCOM 2024

  3. arXiv:2404.12920  [pdf, other

    cs.CV cs.LG

    Zero-Shot Medical Phrase Grounding with Off-the-shelf Diffusion Models

    Authors: Konstantinos Vilouras, Pedro Sanchez, Alison Q. O'Neil, Sotirios A. Tsaftaris

    Abstract: Localizing the exact pathological regions in a given medical scan is an important imaging problem that requires a large amount of bounding box ground truth annotations to be accurately solved. However, there exist alternative, potentially weaker, forms of supervision, such as accompanying free-text reports, which are readily available. The task of performing localization with textual guidance is c… ▽ More

    Submitted 17 July, 2024; v1 submitted 19 April, 2024; originally announced April 2024.

    Comments: 10 pages, 3 figures, submitted to IEEE J-BHI Special Issue on Foundation Models in Medical Imaging

  4. arXiv:2404.12356  [pdf, other

    stat.ML cs.LG cs.SI

    Improving the interpretability of GNN predictions through conformal-based graph sparsification

    Authors: Pablo Sanchez-Martin, Kinaan Aamir Khan, Isabel Valera

    Abstract: Graph Neural Networks (GNNs) have achieved state-of-the-art performance in solving graph classification tasks. However, most GNN architectures aggregate information from all nodes and edges in a graph, regardless of their relevance to the task at hand, thus hindering the interpretability of their predictions. In contrast to prior work, in this paper we propose a GNN \emph{training} approach that j… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  5. arXiv:2403.20287  [pdf, other

    cs.CV cs.LG

    Benchmarking Counterfactual Image Generation

    Authors: Thomas Melistas, Nikos Spyrou, Nefeli Gkouti, Pedro Sanchez, Athanasios Vlontzos, Yannis Panagakis, Giorgos Papanastasiou, Sotirios A. Tsaftaris

    Abstract: Generative AI has revolutionised visual content editing, empowering users to effortlessly modify images and videos. However, not all edits are equal. To perform realistic edits in domains such as natural image or medical imaging, modifications must respect causal relationships inherent to the data generation process. Such image editing falls into the counterfactual image generation regime. Evaluat… ▽ More

    Submitted 10 June, 2024; v1 submitted 29 March, 2024; originally announced March 2024.

  6. arXiv:2403.17776  [pdf, other

    cs.SI cs.HC stat.ME

    Exploring the Boundaries of Ambient Awareness in Twitter

    Authors: Pablo Sanchez-Martin, Sonja Utz, Isabel Valera

    Abstract: Ambient awareness refers to the ability of social media users to obtain knowledge about who knows what (i.e., users' expertise) in their network, by simply being exposed to other users' content (e.g, tweets on Twitter). Previous work, based on user surveys, reveals that individuals self-report ambient awareness only for parts of their networks. However, it is unclear whether it is their limited co… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  7. arXiv:2312.12865  [pdf, other

    cs.CV cs.AI

    RadEdit: stress-testing biomedical vision models via diffusion image editing

    Authors: Fernando Pérez-García, Sam Bond-Taylor, Pedro P. Sanchez, Boris van Breugel, Daniel C. Castro, Harshita Sharma, Valentina Salvatelli, Maria T. A. Wetscherek, Hannah Richardson, Matthew P. Lungren, Aditya Nori, Javier Alvarez-Valle, Ozan Oktay, Maximilian Ilse

    Abstract: Biomedical imaging datasets are often small and biased, meaning that real-world performance of predictive models can be substantially lower than expected from internal testing. This work proposes using generative image editing to simulate dataset shifts and diagnose failure modes of biomedical vision models; this can be used in advance of deployment to assess readiness, potentially reducing cost a… ▽ More

    Submitted 3 April, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

  8. ViKi-HyCo: A Hybrid-Control approach for complex car-like maneuvers

    Authors: Edison P. Velasco Sánchez, Miguel Ángel Muñoz-Bañón, Francisco A. Candelas, Santiago T. Puente, Fernando Torres

    Abstract: While Visual Servoing is deeply studied to perform simple maneuvers, the literature does not commonly address complex cases where the target is far out of the camera's field of view (FOV) during the maneuver. For this reason, in this paper, we present ViKi-HyCo (Visual Servoing and Kinematic Hybrid-Controller). This approach generates the necessary maneuvers for the complex positioning of a non-ho… ▽ More

    Submitted 16 May, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

    Comments: This paper is published at the journal "IEEE Access"

    Journal ref: In IEEE Access, vol. 12, pp. 65428-65443, May. 2024

  9. arXiv:2311.07229  [pdf, other

    cs.IR

    Understanding the Influence of Data Characteristics on the Performance of Point-of-Interest Recommendation Algorithms

    Authors: Linus W. Dietz, Pablo Sánchez, Alejandro Bellogín

    Abstract: The performance of recommendation algorithms is closely tied to key characteristics of the data sets they use, such as sparsity, popularity bias, and preference distributions. In this paper, we conduct a comprehensive explanatory analysis to shed light on the impact of a broad range of data characteristics within the point-of-interest (POI) recommendation domain. To accomplish this, we extend prio… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  10. arXiv:2311.00476  [pdf, other

    cs.CV cs.LG

    Group Distributionally Robust Knowledge Distillation

    Authors: Konstantinos Vilouras, Xiao Liu, Pedro Sanchez, Alison Q. O'Neil, Sotirios A. Tsaftaris

    Abstract: Knowledge distillation enables fast and effective transfer of features learned from a bigger model to a smaller one. However, distillation objectives are susceptible to sub-population shifts, a common scenario in medical imaging analysis which refers to groups/domains of data that are underrepresented in the training set. For instance, training models on health data acquired from multiple scanners… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: 9 pages, MLMI workshop

  11. arXiv:2310.20435  [pdf, other

    cs.CY

    Assessing the Sustainability and Trustworthiness of Federated Learning Models

    Authors: Alberto Huertas Celdran, Chao Feng, Pedro Miguel Sanchez Sanchez, Lynn Zumtaugwald, Gerome Bovet, Burkhard Stiller

    Abstract: Artificial intelligence (AI) plays a pivotal role in various sectors, influencing critical decision-making processes in our daily lives. Within the AI landscape, novel AI paradigms, such as Federated Learning (FL), focus on preserving data privacy while collaboratively training AI models. In such a context, a group of experts from the European Commission (AI-HLEG) has identified sustainable AI as… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  12. arXiv:2310.04800  [pdf, other

    cs.CV cs.RO

    Towards Long-Range 3D Object Detection for Autonomous Vehicles

    Authors: Ajinkya Khoche, Laura Pereira Sánchez, Nazre Batool, Sina Sharif Mansouri, Patric Jensfelt

    Abstract: 3D object detection at long range is crucial for ensuring the safety and efficiency of self driving vehicles, allowing them to accurately perceive and react to objects, obstacles, and potential hazards from a distance. But most current state of the art LiDAR based methods are range limited due to sparsity at long range, which generates a form of domain gap between points closer to and farther away… ▽ More

    Submitted 20 May, 2024; v1 submitted 7 October, 2023; originally announced October 2023.

    Comments: Accepted to Intelligent Vehicle Symposium (IV) 2024

  13. arXiv:2308.05978  [pdf, other

    cs.CR cs.AI

    CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

    Authors: Chao Feng, Alberto Huertas Celdran, Pedro Miguel Sanchez Sanchez, Jan Kreischer, Jan von der Assen, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller

    Abstract: Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective agains… ▽ More

    Submitted 8 September, 2023; v1 submitted 11 August, 2023; originally announced August 2023.

    Comments: 11 pages, 8 figures

  14. arXiv:2308.03554  [pdf, other

    cs.CR

    TemporalFED: Detecting Cyberattacks in Industrial Time-Series Data Using Decentralized Federated Learning

    Authors: Ángel Luis Perales Gómez, Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán

    Abstract: Industry 4.0 has brought numerous advantages, such as increasing productivity through automation. However, it also presents major cybersecurity issues such as cyberattacks affecting industrial processes. Federated Learning (FL) combined with time-series analysis is a promising cyberattack detection mechanism proposed in the literature. However, the fact of having a single point of failure and netw… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  15. arXiv:2307.15208  [pdf, other

    eess.IV cs.CV

    Generative AI for Medical Imaging: extending the MONAI Framework

    Authors: Walter H. L. Pinaya, Mark S. Graham, Eric Kerfoot, Petru-Daniel Tudosiu, Jessica Dafflon, Virginia Fernandez, Pedro Sanchez, Julia Wolleb, Pedro F. da Costa, Ashay Patel, Hyungjin Chung, Can Zhao, Wei Peng, Zelong Liu, Xueyan Mei, Oeslle Lucena, Jong Chul Ye, Sotirios A. Tsaftaris, Prerna Dogra, Andrew Feng, Marc Modat, Parashkev Nachev, Sebastien Ourselin, M. Jorge Cardoso

    Abstract: Recent advances in generative AI have brought incredible breakthroughs in several areas, including medical imaging. These generative models have tremendous potential not only to help safely share medical data via synthetic datasets but also to perform an array of diverse applications, such as anomaly detection, image-to-image translation, denoising, and MRI reconstruction. However, due to the comp… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

  16. arXiv:2307.11730  [pdf, other

    cs.CR cs.AI cs.DC cs.LG cs.NI

    Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

    Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decent… ▽ More

    Submitted 9 December, 2023; v1 submitted 21 July, 2023; originally announced July 2023.

  17. arXiv:2307.05704  [pdf, other

    cs.LG cs.AI cs.CV

    A Causal Ordering Prior for Unsupervised Representation Learning

    Authors: Avinash Kori, Pedro Sanchez, Konstantinos Vilouras, Ben Glocker, Sotirios A. Tsaftaris

    Abstract: Unsupervised representation learning with variational inference relies heavily on independence assumptions over latent variables. Causal representation learning (CRL), however, argues that factors of variation in a dataset are, in fact, causally related. Allowing latent variables to be correlated, as a consequence of causal relationships, is more realistic and generalisable. So far, provably ident… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

  18. arXiv:2306.15559  [pdf, other

    cs.CR cs.AI cs.LG

    RansomAI: AI-powered Ransomware for Stealthy Encryption

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in inef… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  19. arXiv:2306.09750  [pdf, other

    cs.LG cs.AI cs.DC cs.NI

    Fedstellar: A Platform for Decentralized Federated Learning

    Authors: Enrique Tomás Martínez Beltrán, Ángel Luis Perales Gómez, Chao Feng, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, sin… ▽ More

    Submitted 8 April, 2024; v1 submitted 16 June, 2023; originally announced June 2023.

  20. arXiv:2306.08495  [pdf, other

    cs.CR

    Single-board Device Individual Authentication based on Hardware Performance and Autoencoder Transformer Models

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications, where a multitude of interconnected devices collaboratively collect and analyze data. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerab… ▽ More

    Submitted 11 November, 2023; v1 submitted 14 June, 2023; originally announced June 2023.

  21. arXiv:2306.07783  [pdf, other

    cs.CV cs.LG

    Compositionally Equivariant Representation Learning

    Authors: Xiao Liu, Pedro Sanchez, Spyridon Thermos, Alison Q. O'Neil, Sotirios A. Tsaftaris

    Abstract: Deep learning models often need sufficient supervision (i.e. labelled data) in order to be trained effectively. By contrast, humans can swiftly learn to identify important anatomy in medical images like MRI and CT scans, with minimal guidance. This recognition capability easily generalises to new images from different medical facilities and to new tasks in different settings. This rapid and genera… ▽ More

    Submitted 17 June, 2023; v1 submitted 13 June, 2023; originally announced June 2023.

    Comments: Submitted. 10 pages. arXiv admin note: text overlap with arXiv:2206.14538

  22. arXiv:2306.01322  [pdf, other

    cs.LG cs.CR cs.CV

    Privacy Distillation: Reducing Re-identification Risk of Multimodal Diffusion Models

    Authors: Virginia Fernandez, Pedro Sanchez, Walter Hugo Lopez Pinaya, Grzegorz Jacenków, Sotirios A. Tsaftaris, Jorge Cardoso

    Abstract: Knowledge distillation in neural networks refers to compressing a large model or dataset into a smaller version of itself. We introduce Privacy Distillation, a framework that allows a text-to-image generative model to teach another model without exposing it to identifiable data. Here, we are interested in the privacy issue faced by a data provider who wishes to share their data via a multimodal ge… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

  23. arXiv:2305.08252  [pdf, other

    cs.CV cs.AI

    Parameter-Efficient Fine-Tuning for Medical Image Analysis: The Missed Opportunity

    Authors: Raman Dutt, Linus Ericsson, Pedro Sanchez, Sotirios A. Tsaftaris, Timothy Hospedales

    Abstract: Foundation models have significantly advanced medical image analysis through the pre-train fine-tune paradigm. Among various fine-tuning algorithms, Parameter-Efficient Fine-Tuning (PEFT) is increasingly utilized for knowledge transfer across diverse tasks, including vision-language and text-to-image generation. However, its application in medical image analysis is relatively unexplored due to the… ▽ More

    Submitted 10 June, 2024; v1 submitted 14 May, 2023; originally announced May 2023.

    Comments: Accepted as Oral Presentation at MIDL 2024

  24. arXiv:2302.09844  [pdf, other

    cs.CR cs.AI

    FederatedTrust: A Solution for Trustworthy Federated Learning

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Ning Xie, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: The rapid expansion of the Internet of Things (IoT) and Edge Computing has presented challenges for centralized Machine and Deep Learning (ML/DL) methods due to the presence of distributed data silos that hold sensitive information. To address concerns regarding data privacy, collaborative and privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged. However, ensuring data pri… ▽ More

    Submitted 6 July, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

  25. arXiv:2301.08330  [pdf, other

    eess.IV cs.CV

    The role of noise in denoising models for anomaly detection in medical images

    Authors: Antanas Kascenas, Pedro Sanchez, Patrick Schrempf, Chaoyang Wang, William Clackett, Shadia S. Mikhael, Jeremy P. Voisey, Keith Goatman, Alexander Weir, Nicolas Pugeault, Sotirios A. Tsaftaris, Alison Q. O'Neil

    Abstract: Pathological brain lesions exhibit diverse appearance in brain images, in terms of intensity, texture, shape, size, and location. Comprehensive sets of data and annotations are difficult to acquire. Therefore, unsupervised anomaly detection approaches have been proposed using only normal data for training, with the aim of detecting outlier anomalous voxels at test time. Denoising methods, for inst… ▽ More

    Submitted 19 January, 2023; originally announced January 2023.

    Comments: Submitted to Medical Image Analysis special issue for MIDL 2022

    MSC Class: 68T99; 92C55; 68U10

  26. arXiv:2212.14677  [pdf, other

    cs.CR cs.AI

    Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: In the last years, the number of IoT devices deployed has suffered an undoubted explosion, reaching the scale of billions. However, some new cybersecurity issues have appeared together with this development. Some of these issues are the deployment of unauthorized devices, malicious code modification, malware deployment, or vulnerability exploitation. This fact has motivated the requirement for new… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  27. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

    Authors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learnin… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  28. arXiv:2211.08413  [pdf, other

    cs.LG cs.CR cs.DC cs.NI

    Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges

    Authors: Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustwo… ▽ More

    Submitted 13 September, 2023; v1 submitted 15 November, 2022; originally announced November 2022.

  29. arXiv:2210.11501  [pdf, other

    cs.CR cs.NI

    Trust-as-a-Service: A reputation-enabled trust framework for 5G networks

    Authors: José María Jorquera Valero, Pedro Miguel Sánchez Sánchez, Manuel Gil Pérez, Alberto Huertas Celdrán, Gregorio Martínez Pérez

    Abstract: Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  30. arXiv:2210.11061  [pdf, other

    cs.LG

    Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Enrique Tomás Martínez Beltrán, Daniel Demeter, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Federated learning (FL) allows participants to collaboratively train machine and deep learning models while protecting data privacy. However, the FL paradigm still presents drawbacks affecting its trustworthiness since malicious participants could launch adversarial attacks against the training process. Related work has studied the robustness of horizontal FL scenarios under different attacks. How… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  31. A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jordan Cedeño, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Malware affecting Internet of Things (IoT) devices is rapidly growing due to the relevance of this paradigm in real-world scenarios. Specialized literature has also detected a trend towards multi-purpose malware able to execute different malicious actions such as remote control, data leakage, encryption, or code hiding, among others. Protecting IoT devices against this kind of malware is challengi… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  32. arXiv:2210.06201  [pdf, other

    cs.LG cs.AI

    Diffusion Models for Causal Discovery via Topological Ordering

    Authors: Pedro Sanchez, Xiao Liu, Alison Q O'Neil, Sotirios A. Tsaftaris

    Abstract: Discovering causal relations from observational data becomes possible with additional assumptions such as considering the functional relations to be constrained as nonlinear with additive noise (ANM). Even with strong assumptions, causal discovery involves an expensive search problem over the space of directed acyclic graphs (DAGs). \emph{Topological ordering} approaches reduce the optimisation sp… ▽ More

    Submitted 26 June, 2023; v1 submitted 12 October, 2022; originally announced October 2022.

    Comments: Implementation is available at https://github.com/vios-s/DiffAN Published as a conference paper at ICLR 2023 https://openreview.net/forum?id=Idusfje4-Wq

    Report number: ICLR 2023

    Journal ref: The Eleventh International Conference on Learning Representations (2023)

  33. arXiv:2208.03563  [pdf, other

    cs.CV

    HSIC-InfoGAN: Learning Unsupervised Disentangled Representations by Maximising Approximated Mutual Information

    Authors: Xiao Liu, Spyridon Thermos, Pedro Sanchez, Alison Q. O'Neil, Sotirios A. Tsaftaris

    Abstract: Learning disentangled representations requires either supervision or the introduction of specific model designs and learning constraints as biases. InfoGAN is a popular disentanglement framework that learns unsupervised disentangled representations by maximising the mutual information between latent representations and their corresponding generated images. Maximisation of mutual information is ach… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Comments: MICCAI MAD Workshop 2022

  34. arXiv:2207.12268  [pdf, other

    cs.CV cs.AI

    What is Healthy? Generative Counterfactual Diffusion for Lesion Localization

    Authors: Pedro Sanchez, Antanas Kascenas, Xiao Liu, Alison Q. O'Neil, Sotirios A. Tsaftaris

    Abstract: Reducing the requirement for densely annotated masks in medical image segmentation is important due to cost constraints. In this paper, we consider the problem of inferring pixel-level predictions of brain lesions by only using image-level labels for training. By leveraging recent advances in generative diffusion probabilistic models (DPM), we synthesize counterfactuals of "How would a patient app… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: Accepted at the Deep Generative Models workshop at MICCAI 2022

  35. arXiv:2207.11765  [pdf, other

    cs.SE cs.AI

    Neurosymbolic Repair for Low-Code Formula Languages

    Authors: Rohan Bavishi, Harshit Joshi, José Pablo Cambronero Sánchez, Anna Fariha, Sumit Gulwani, Vu Le, Ivan Radicek, Ashish Tiwari

    Abstract: Most users of low-code platforms, such as Excel and PowerApps, write programs in domain-specific formula languages to carry out nontrivial tasks. Often users can write most of the program they want, but introduce small mistakes that yield broken formulas. These mistakes, which can be both syntactic and semantic, are hard for low-code users to identify and fix, even though they can be resolved with… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

  36. arXiv:2206.14538  [pdf, other

    cs.CV

    vMFNet: Compositionality Meets Domain-generalised Segmentation

    Authors: Xiao Liu, Spyridon Thermos, Pedro Sanchez, Alison Q. O'Neil, Sotirios A. Tsaftaris

    Abstract: Training medical image segmentation models usually requires a large amount of labeled data. By contrast, humans can quickly learn to accurately recognise anatomy of interest from medical (e.g. MRI and CT) images with some limited guidance. Such recognition ability can easily generalise to new images from different clinical centres. This rapid and generalisable learning ability is mostly due to the… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

    Comments: Accepted by MICCAI 2022

  37. arXiv:2205.11402  [pdf, other

    cs.LG cs.AI

    Causal Machine Learning for Healthcare and Precision Medicine

    Authors: Pedro Sanchez, Jeremy P. Voisey, Tian Xia, Hannah I. Watson, Alison Q. ONeil, Sotirios A. Tsaftaris

    Abstract: Causal machine learning (CML) has experienced increasing popularity in healthcare. Beyond the inherent capabilities of adding domain knowledge into learning systems, CML provides a complete toolset for investigating how a system would react to an intervention (e.g.\ outcome given a treatment). Quantifying effects of interventions allows actionable decisions to be made whilst maintaining robustness… ▽ More

    Submitted 31 May, 2022; v1 submitted 23 May, 2022; originally announced May 2022.

    Comments: 19 pages, 4 figures, 1 table

  38. LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers

    Authors: Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explore… ▽ More

    Submitted 24 October, 2022; v1 submitted 18 April, 2022; originally announced April 2022.

  39. arXiv:2203.07815  [pdf, other

    eess.IV cs.CV cs.LG

    Adversarial Counterfactual Augmentation: Application in Alzheimer's Disease Classification

    Authors: Tian Xia, Pedro Sanchez, Chen Qin, Sotirios A. Tsaftaris

    Abstract: Due to the limited availability of medical data, deep learning approaches for medical image analysis tend to generalise poorly to unseen data. Augmenting data during training with random transformations has been shown to help and became a ubiquitous technique for training neural networks. Here, we propose a novel adversarial counterfactual augmentation scheme that aims at finding the most \textit{… ▽ More

    Submitted 1 October, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

  40. arXiv:2202.10166  [pdf, other

    cs.LG cs.CV

    Diffusion Causal Models for Counterfactual Estimation

    Authors: Pedro Sanchez, Sotirios A. Tsaftaris

    Abstract: We consider the task of counterfactual estimation from observational imaging data given a known causal structure. In particular, quantifying the causal effect of interventions for high-dimensional data with neural networks remains an open challenge. Herein we propose Diff-SCM, a deep structural causal model that builds on recent advances of generative energy-based models. In our setting, inference… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: Accepted at CLeaR (Causal Learning and Reasoning) 2022

  41. Studying the Robustness of Anti-adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.

  42. CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors

    Authors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Integrated sensing and communication (ISAC) is a novel paradigm using crowdsensing spectrum sensors to help with the management of spectrum scarcity. However, well-known vulnerabilities of resource-constrained spectrum sensors and the possibility of being manipulated by users with physical access complicate their protection against spectrum sensing data falsification (SSDF) attacks. Most recent li… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  43. Robust Federated Learning for execution time-based device model identification under label-flipping attack

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: The computing device deployment explosion experienced in recent years, motivated by the advances of technologies such as Internet-of-Things (IoT) and 5G, has led to a global scenario with increasing cybersecurity risks and threats. Among them, device spoofing and impersonation cyberattacks stand out due to their impact and, usually, low complexity required to be launched. To solve this issue, seve… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

  44. arXiv:2110.14690  [pdf, other

    stat.ML cs.LG

    VACA: Design of Variational Graph Autoencoders for Interventional and Counterfactual Queries

    Authors: Pablo Sanchez-Martin, Miriam Rateike, Isabel Valera

    Abstract: In this paper, we introduce VACA, a novel class of variational graph autoencoders for causal inference in the absence of hidden confounders, when only observational data and the causal graph are available. Without making any parametric assumptions, VACA mimics the necessary properties of a Structural Causal Model (SCM) to provide a flexible and practical framework for approximating interventions (… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

  45. Learning Disentangled Representations in the Imaging Domain

    Authors: Xiao Liu, Pedro Sanchez, Spyridon Thermos, Alison Q. O'Neil, Sotirios A. Tsaftaris

    Abstract: Disentangled representation learning has been proposed as an approach to learning general representations even in the absence of, or with limited, supervision. A good general representation can be fine-tuned for new target tasks using modest amounts of data, or used directly in unseen domains achieving remarkable performance in the corresponding task. This alleviation of the data and annotation re… ▽ More

    Submitted 29 July, 2022; v1 submitted 26 August, 2021; originally announced August 2021.

    Comments: Accepted by Medical Image Analysis. This paper follows a tutorial style but also surveys a considerable (more than 260 citations) number of works

  46. Point-of-Interest Recommender Systems based on Location-Based Social Networks: A Survey from an Experimental Perspective

    Authors: Pablo Sánchez, Alejandro Bellogín

    Abstract: Point-of-Interest recommendation is an increasing research and developing area within the widely adopted technologies known as Recommender Systems. Among them, those that exploit information coming from Location-Based Social Networks (LBSNs) are very popular nowadays and could work with different information sources, which pose several challenges and research questions to the community as a whole.… ▽ More

    Submitted 27 January, 2022; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: Submitted in Jul 2020 (revised in September 2021, accepted in January 2022, online January 2022)

  47. A methodology to identify identical single-board computers based on hardware behavior fingerprinting

    Authors: Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data po… ▽ More

    Submitted 22 June, 2022; v1 submitted 15 June, 2021; originally announced June 2021.

  48. arXiv:2106.01722  [pdf, other

    cs.CV

    GMAIR: Unsupervised Object Detection Based on Spatial Attention and Gaussian Mixture

    Authors: Weijin Zhu, Yao Shen, Linfeng Yu, Lizeth Patricia Aguirre Sanchez

    Abstract: Recent studies on unsupervised object detection based on spatial attention have achieved promising results. Models, such as AIR and SPAIR, output "what" and "where" latent variables that represent the attributes and locations of objects in a scene, respectively. Most of the previous studies concentrate on the "where" localization performance; however, we claim that acquiring "what" object attribut… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: 15 pages, 5 figures

  49. Federated Learning for Malware Detection in IoT Devices

    Authors: Valerian Rey, Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Martin Jaggi

    Abstract: This work investigates the possibilities enabled by federated learning concerning IoT malware detection and studies security issues inherent to this new learning paradigm. In this context, a framework that uses federated learning to detect malware affecting IoT devices is presented. N-BaIoT, a dataset modeling network traffic of several real IoT devices while affected by malware, has been used to… ▽ More

    Submitted 19 November, 2021; v1 submitted 15 April, 2021; originally announced April 2021.

    Journal ref: Rey, V., Sánchez, P. M. S., Celdrán, A. H., & Bovet, G. (2022). Federated learning for malware detection in iot devices. Computer Networks, 108693

  50. A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

    Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., senso… ▽ More

    Submitted 3 March, 2021; v1 submitted 7 August, 2020; originally announced August 2020.