Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
About

About

João P. Vilela is a professor at the Department of Computer Science of the University of Porto and a senior researcher at INESC TEC and CISUC. He was previously a professor at the Department of Informatics Engineering of the University of Coimbra, after receiving the Ph.D. in Computer Science in 2011 from the University of Porto, Portugal. He was a visiting researcher at Georgia Tech, working on physical-layer security, and at MIT, working on security for network coding. In recent years, Dr. Vilela has been coordinator and team member of several national, bilateral, and European-funded projects in security and privacy. His main research interests are in security and privacy of computer and communication systems, with applications such as wireless networks, Internet of Things and mobile devices. Specific research topics include wireless physical-layer security, security of next-generation networks, privacy-preserving data mining, location privacy and automated privacy protection. https://www.dcc.fc.up.pt/~joaovilela/

Interest
Topics
Details

Details

  • Name

    João Paulo Vilela
  • Role

    Researcher
  • Since

    01st March 2020
002
Publications

2024

Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types

Authors
Cunha, M; Duarte, G; Andrade, R; Mendes, R; Vilela, JP;

Publication
PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024

Abstract
With the massive data collection from different devices, spanning from mobile devices to all sorts of IoT devices, protecting the privacy of users is a fundamental concern. In order to prevent unwanted disclosures, several Privacy-Preserving Mechanisms (PPMs) have been proposed. Nevertheless, due to the lack of a standardized and universal privacy definition, configuring and evaluating PPMs is quite challenging, requiring knowledge that the average user does not have. In this paper, we propose a privacy toolkit - Privkit - to systematize this process and facilitate automated configuration of PPMs. Privkit enables the assessment of privacy-preserving mechanisms with different configurations, while allowing the quantification of the achieved privacy and utility level of various types of data. Privkit is open source and can be extended with new data types, corresponding PPMs, as well as privacy and utility assessment metrics and privacy attacks over such data. This toolkit is available through a Python Package with several state-of-the-art PPMs already implemented, and also accessible through a Web application. Privkit constitutes a unified toolkit that makes the dissemination of new privacy-preserving methods easier and also facilitates reproducibility of research results, through a repository of Jupyter Notebooks that enable reproduction of research results.

2024

Computation-Limited Signals: A Channel Capacity Regime Constrained by Computational Complexity

Authors
Queiroz, S; Vilela, JP; Monteiro, E;

Publication
IEEE COMMUNICATIONS LETTERS

Abstract
In this letter, we introduce the computation-limited (comp-limited) signals, a communication capacity regime where the computational complexity of signal processing is the primary constraint for communication performance, overriding factors such as power or bandwidth. We present the Spectro-Computational (SC) analysis, a novel mathematical framework designed to enhance classic concepts of information theory -such as data rate, spectral efficiency, and capacity - to accommodate the computational complexity overhead of signal processing. We explore a specific Shannon regime where capacity is expected to increase indefinitely with channel resources. However, we identify conditions under which the time complexity overhead can cause capacity to decrease rather than increase, leading to the definition of the comp-limited signal regime. Furthermore, we provide examples of SC analysis and demonstrate that the Orthogonal Frequency Division Multiplexing (OFDM) waveform falls under the comp-limited regime unless the lower-bound computational complexity of the N-point Discrete Fourier Transform (DFT) problem verifies as ohm (N)$ , which remains an open challenge in the theory of computation.

2024

A Privacy-Aware Remapping Mechanism for Location Data

Authors
Duarte, G; Cunha, M; Vilela, JP;

Publication
39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024

Abstract
In an era dominated by Location-Based Services (LBSs), the concern of preserving location privacy has emerged as a critical challenge. To address this, Location Privacy-Preserving Mechanisms (LPPMs) were proposed, in where an obfuscated version of the exact user location is reported instead. Adding to noise-based mechanisms, location discretization, the process of transforming continuous location data into discrete representations, is relevant for the efficient storage of data, simplifying the process of manipulating the information in a digital system and reducing the computational overhead. Apart from enabling a more efficient data storage and processing, location discretization can also be performed with privacy requirements, so as to ensure discretization while providing privacy benefits. In this work, we propose a Privacy-Aware Remapping mechanism that is able to improve the privacy level attained by Geo-Indistinguishability through a tailored pre-processing discretization step. The proposed remapping technique is capable of reducing the re-identification risk of locations under Geo-Indistinguishability, with limited impact on quality loss.

2024

WiFi-based Person Identification Through Motion Analysis

Authors
Martins Ó.; Vilela J.P.; Gomes M.;

Publication
2024 IEEE International Mediterranean Conference on Communications and Networking, MeditCom 2024

Abstract
By leveraging the advances in wireless communications networks and their ubiquitous nature, sensing through communication technologies has flourished in recent years. In particular, Human-to-Machine Interfaces have been exploiting WiFi IEEE 802.11 networks to obtain information that allows Human Activity Recognition. In this paper, we propose a classification model to perform Person Identification (PI) through Body Velocity Profile time series, obtained by combining Channel State Information containing gesture knowledge from multiple Access Points. Through this model, we investigate the impact of different gestures on PI classification performance and explore how informing the model about the input gesture can enhance classification accuracy. This information may enable the network to adjust to the absence of features capable of adequately characterizing the desired classes in certain gestures. A simplified stacking model is also presented, capable of combining the softmax outputs of K previously proposed individual models. By having the individual models’ evaluations of a gesture and the gesture information relating to it, the number of gestures considered was shown to significantly improve the performance of the PI classification task. This enhancement increased 17% of the average F1 scores when compared to the individual model tested on the same data.

2024

Enhanced authentication and device integrity protection for GDOI using blockchain

Authors
Mukhandi, M; Andrade, E; Granjal, J; Vilela, JP;

Publication
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES

Abstract
Recent device-level cyber-attacks have targeted IoT critical applications in power distribution systems integrated with the Internet communications infrastructure. These systems utilize group domain of interpretation (GDOI) as designated by International Electrotechnical Commission (IEC) power utility standards IEC 61850 and IEC 62351. However, GDOI cannot protect against novel threats, such as IoT device-level attacks that can modify device firmware and configuration files to create command and control malicious communication. As a consequence, the attacks can compromise substations with potentially catastrophic consequences. With this in mind, this article proposes a permissioned/private blockchain-based authentication framework that provides a solution to current security threats such as the IoT device-level attacks. Our work improves the GDOI protocol applied in critical IoT applications by achieving decentralized and distributed device authentication. The security of our proposal is demonstrated against known attacks as well as through formal mechanisms via the joint use of the AVISPA and SPAN tools. The proposed approach adds negligible authentication latency, thus ensuring appropriate scalability as the number of nodes increases. Our work addresses the problem of device-level cyber-attacks such as device identity theft and introduction of fake nodes in GDOI-enabled smart grids. It introduces a permissioned blockchain based device authentication management in the GDOI phase 1 and periodic device integrity check in phase 2 to achieve decentralized authentication and device-level security. image

Supervised
thesis

2024

Privacy-Preserving Joint Communication and Sensing

Author
Óscar Gabriel Bernardes Martins

Institution
UP-FCUP

2023

Privacy-Preserving Mechanisms for Heterogeneous Data Types

Author
Mariana da Cruz Cunha

Institution
UP-FCUP

2023

Privacy-Preserving Mechanisms for Heterogeneous Data Types

Author
Mariana da Cruz Cunha

Institution
UP-FCUP

2023

Privacy in Telecom Fraud Detection

Author
Eduardo Carvalho Santos

Institution
UP-FCUP

2023

Increasing Data Capturing Abilities of HoneyNets: a Proof of Concept

Author
Diogo Miguel Marcos Ribeiro

Institution
UP-FCUP