Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CRACS

2023

Machine learning models based on clinical indices and cardiotocographic features for discriminating asphyxia fetuses-Porto retrospective intrapartum study

Authors
Ribeiro, M; Nunes, I; Castro, L; Costa-Santos, C; Henriques, TS;

Publication
FRONTIERS IN PUBLIC HEALTH

Abstract
IntroductionPerinatal asphyxia is one of the most frequent causes of neonatal mortality, affecting approximately four million newborns worldwide each year and causing the death of one million individuals. One of the main reasons for these high incidences is the lack of consensual methods of early diagnosis for this pathology. Estimating risk-appropriate health care for mother and baby is essential for increasing the quality of the health care system. Thus, it is necessary to investigate models that improve the prediction of perinatal asphyxia. Access to the cardiotocographic signals (CTGs) in conjunction with various clinical parameters can be crucial for the development of a successful model. ObjectivesThis exploratory work aims to develop predictive models of perinatal asphyxia based on clinical parameters and fetal heart rate (fHR) indices. MethodsSingle gestations data from a retrospective unicentric study from Centro Hospitalar e Universitario do Porto de Sao Joao (CHUSJ) between 2010 and 2018 was probed. The CTGs were acquired and analyzed by Omniview-SisPorto, estimating several fHR features. The clinical variables were obtained from the electronic clinical records stored by ObsCare. Entropy and compression characterized the complexity of the fHR time series. These variables' contribution to the prediction of asphyxia perinatal was probed by binary logistic regression (BLR) and Naive-Bayes (NB) models. ResultsThe data consisted of 517 cases, with 15 pathological cases. The asphyxia prediction models showed promising results, with an area under the receiver operator characteristic curve (AUC) >70%. In NB approaches, the best models combined clinical and SisPorto features. The best model was the univariate BLR with the variable compression ratio scale 2 (CR2) and an AUC of 94.93% [94.55; 95.31%]. ConclusionBoth BLR and Bayesian models have advantages and disadvantages. The model with the best performance predicting perinatal asphyxia was the univariate BLR with the CR2 variable, demonstrating the importance of non-linear indices in perinatal asphyxia detection. Future studies should explore decision support systems to detect sepsis, including clinical and CTGs features (linear and non-linear).

2023

Calcium-dependent subquantal peptide release from single docked lawn-resident vesicles of pituitary lactotrophs

Authors
Goncalves, PP; Stenovec, M; Gracio, L; Kreft, M; Zorec, R;

Publication
CELL CALCIUM

Abstract
Regulated exocytosis consists of the fusion between vesicles and the plasma membranes, leading to the formation of a narrow fusion pore through which secretions exit the vesicle lumen into the extracellular space. An increase in the cytosolic concentration of free Ca2+ ([Ca2+](i)) is considered the stimulus of this process. However, whether this mechanism can be preserved in a simplified system of membrane lawns with docked secretory vesicles, devoid of cellular components, is poorly understood. Here, we studied peptide discharge from individual secretory vesicles docked at the plasma membrane, prepared from primary endocrine pituitary cells (the lactotrophs), releasing hormone prolactin. To label secretory vesicles, we transfected lactotrophs to express the fluorescent atrial natriuretic peptide (ANP.emd), previously shown to be expressed in and released from prolactin-containing vesicles. We used stimulating solutions containing different [Ca2+] to evoke vesicle peptide discharge, which appeared similar in membrane lawns and in intact stimulated lactotrophs. All vesicles examined discharged peptides in a subquantal manner, either exhibiting a unitary or sequential time course. In the membrane lawns, the unitary vesicle peptide discharge was predominant and slightly slower than that recorded in intact cells, but with a shorter delay with respect to the stimulation onset. This study revealed directly that Ca2+ triggers peptide discharge from docked single vesicles in the membrane lawns with a half-maximal response of similar to 8 mu M [Ca2+], consistent with previous whole-cell patch-clamp studies in endocrine cells where the rapid component of exocytosis, interpreted to represent docked vesicles, was fully activated at <10 mu M [Ca2+]. Interestingly, the sequential subquantal peptide vesicle discharge indicates that fluctuations between constricted and dilated fusion pore states are preserved in membrane lawns and that fusion pore regulation appears to be an autonomously controlled process.

2023

Poster: Privacy-Preserving Joint Communication and Sensing

Authors
Martins, O; Vilela, JP; Gomes, M;

Publication
2023 IEEE 24TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM

Abstract
With the recent advancements in wireless networks, Joint Communication and Sensing (JCAS) has become a growing field that is expected to be included in next-generation standards. However, not only is the current performance of the sensing ability still lacking to be used in real-world scenarios, proper security of such privacy-invasive technology has not been fully explored. To this end, we propose the creation of a more robust framework, capable of cross-domain detection and long-term analysis for improved detection, which will also serve as the basis for a security and privacy analysis of the threat landscape and solutions in this field.

2023

Velocity-Aware Geo-Indistinguishability

Authors
Mendes, R; Cunha, M; Vilela, JP;

Publication
CODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy

Abstract
Location Privacy-Preserving Mechanisms (LPPMs) have been proposed to mitigate the risks of privacy disclosure yielded from location sharing. However, due to the nature of this type of data, spatio-temporal correlations can be leveraged by an adversary to extenuate the protections. Moreover, the application of LPPMs at collection time has been limited due to the difficulty in configuring the parameters and in understanding their impact on the privacy level by the end-user. In this work we adopt the velocity of the user and the frequency of reports as a metric for the correlation between location reports. Based on such metric we propose a generalization of Geo-Indistinguishability denoted Velocity-Aware Geo-Indistinguishability (VA-GI). We define a VA-GI LPPM that provides an automatic and dynamic trade-off between privacy and utility according to the velocity of the user and the frequency of reports. This adaptability can be tuned for general use, by using city or country-wide data, or for specific user profiles, thus warranting fine-grained tuning for users or environments. Our results using vehicular trajectory data show that VA-GI achieves a dynamic trade-off between privacy and utility that outperforms previous works. Additionally, by using a Gaussian distribution as estimation for the distribution of the velocities, we provide a methodology for configuring our proposed LPPM without the need for mobility data. This approach provides the required privacy-utility adaptability while also simplifying its configuration and general application in different contexts. © 2023 Owner/Author.

2023

Rogue key and impersonation attacks on FIDO2: From theory to practice

Authors
Barbosa, M; Cirne, A; Esquível, L;

Publication
18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023

Abstract
FIDO2 is becoming a defacto standard for passwordless authentication. Using FIDO2 and WebAuthn, web applications can enable users to associate cryptographic credentials to their profiles, and then rely on an external authenticator (e.g., a hardware token plugged into the USB port) to perform strong signature-based authentication when accessing their accounts. The security of FIDO2 has been theoretically validated, but these analyses follow the threat model adopted in the FIDO2 design and explicitly exclude some attack vectors as being out of scope. In this paper we show that two of these attacks, which appear to be folklore in the community, are actually straightforward to launch in practice (user PIN extraction, impersonation and rogue key registration). We demonstrate a deployment over vanilla Linux distributions and commercial FIDO2 authenticators. We discuss the potential impact of our results, which we believe will contribute to the improvement of future versions of the protocol.

2022

Automated Assessment in Computer Science Education: A State-of-the-Art Review

Authors
Paiva, JC; Leal, JP; Figueira, A;

Publication
ACM TRANSACTIONS ON COMPUTING EDUCATION

Abstract
Practical programming competencies are critical to the success in computer science (CS) education and goto-market of fresh graduates. Acquiring the required level of skills is a long journey of discovery, trial and error, and optimization seeking through a broad range of programming activities that learners must perform themselves. It is not reasonable to consider that teachers could evaluate all attempts that the average learner should develop multiplied by the number of students enrolled in a course, much less in a timely, deep, and fair fashion. Unsurprisingly, exploring the formal structure of programs to automate the assessment of certain features has long been a hot topic among CS education practitioners. Assessing a program is considerably more complex than asserting its functional correctness, as the proliferation of tools and techniques in the literature over the past decades indicates. Program efficiency, behavior, and readability, among many other features, assessed either statically or dynamically, are now also relevant for automatic evaluation. The outcome of an evaluation evolved from the primordial Boolean values to information about errors and tips on how to advance, possibly taking into account similar solutions. This work surveys the state of the art in the automated assessment of CS assignments, focusing on the supported types of exercises, security measures adopted, testing techniques used, type of feedback produced, and the information they offer the teacher to understand and optimize learning. A new era of automated assessment, capitalizing on static analysis techniques and containerization, has been identified. Furthermore, this review presents several other findings from the conducted review, discusses the current challenges of the field, and proposes some future research directions.

  • 11
  • 192