Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2024

Applying the LOT Methodology to Enhance the Cinematic Heritage Archives

Authors
Cosentino, A; Araújo, W; Koch, I;

Publication
Proceedings of the 16th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management

Abstract

2024

Keywords attention for fake news detection using few positive labels

Authors
de Souza, MC; Golo, MPS; Jorge, AMG; de Amorim, ECF; Campos, RNT; Marcacini, RM; Rezende, SO;

Publication
INFORMATION SCIENCES

Abstract
Fake news detection (FND) tools are essential to increase the reliability of information in social media. FND can be approached as a machine learning classification problem so that discriminative features can be automatically extracted. However, this requires a large news set, which in turn implies a considerable amount of human experts' effort for labeling. In this paper, we explore Positive and Unlabeled Learning (PUL) to reduce the labeling cost. In particular, we improve PUL with the network-based Label Propagation (PU-LP) algorithm. PU-LP achieved competitive results in FND exploiting relations between news and terms and using few labeled fake news. We propose integrating an attention mechanism in PU-LP that can define which terms in the network are more relevant for detecting fake news. We use GNEE, a state-of-the-art algorithm based on graph attention networks. Our proposal outperforms state-of-the-art methods, improving F-1 in 2% to 10%, especially when only 10% labeled fake news are available. It is competitive with the binary baseline, even when nearly half of the data is labeled. Discrimination ability is also visualized through t-SNE. We also present an analysis of the limitations of our approach according to the type of text found in each dataset.

2024

Cyber Resilience of Cyber-Physical Systems and Machine Learning, a Scoping Review

Authors
Pavão, J; Bastardo, R; Rocha, NP;

Publication
Lecture Notes in Networks and Systems

Abstract
The scoping review reported by this paper aimed to analyze and synthesize state-of-the-art studies focused on the application of machine learning methods to enhance the cyber resilience of cyber-physical systems. An electronic search was conducted, and 24 studies were included in this review after the selection process. The most representative application domains were computer networks and power systems, while in terms of cyber resilience functions, risk identification, risk mitigation or protection, and detection of anomalous situations were the most implemented functions. Moreover, the results of this scoping review show that the interest in the topic of cyber resilience and machine learning is quite recent, which justifies the heterogeneity of the included studies in terms of machine learning methods and datasets being used for the experimental validations, as well as in terms of outcomes being measured. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.

2024

Advancements in Remote Sensing Imagery Applications for Precision Management in Olive Growing: A Systematic Review

Authors
Marques, P; Padua, L; Sousa, JJ; Fernandes Silva, A;

Publication
REMOTE SENSING

Abstract
This systematic review explores the role of remote sensing technology in addressing the requirements of sustainable olive growing, set against the backdrop of growing global food demands and contemporary environmental constraints in agriculture. The critical analysis presented in this document assesses different remote sensing platforms (satellites, manned aircraft vehicles, unmanned aerial vehicles and terrestrial equipment) and sensors (RGB, multispectral, thermal, hyperspectral and LiDAR), emphasizing their strategic selection based on specific study aims and geographical scales. Focusing on olive growing, particularly prominent in the Mediterranean region, this article analyzes the diverse applications of remote sensing, including the management of inventory and irrigation; detection/monitoring of diseases and phenology; and estimation of crucial parameters regarding biophysical parameters, water stress indicators, crop evapotranspiration and yield. Through a global perspective and insights from studies conducted in diverse olive-growing regions, this review underscores the potential benefits of remote sensing in shaping and improving sustainable agricultural practices, mitigating environmental impacts and ensuring the economic viability of olive trees.

2024

Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection

Authors
Abreu, R; Simão, E; Serôdio, C; Branco, F; Valente, A;

Publication
AI

Abstract
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people’s daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This connectivity allows for a better integration of the pervasive computing, making devices “smart” and capable of interacting with each other and with the corresponding users in a sublime way. However, the widespread adoption of IoT devices has introduced some security challenges, because these devices usually run in environments that have limited resources. As IoT technology becomes more integrated into critical infrastructure and daily life, the need for stronger security measures will increase. These devices are exposed to a variety of cyber-attacks. This literature review synthesizes the current research of artificial intelligence (AI) technologies to improve IoT security. This review addresses key research questions, including: (1) What are the primary challenges and threats that IoT devices face?; (2) How can AI be used to improve IoT security?; (3) What AI techniques are currently being used for this purpose?; and (4) How does applying AI to IoT security differ from traditional methods? Methods: We included a total of 33 peer-reviewed studies published between 2020 and 2024, specifically in journal and conference papers written in English. Studies irrelevant to the use of AI for IoT security, duplicate studies, and articles without full-text access were excluded. The literature search was conducted using scientific databases, including MDPI, ScienceDirect, IEEE Xplore, and SpringerLink. Results were synthesized through a narrative synthesis approach, with the help of the Parsifal tool to organize and visualize key themes and trends. Results: We focus on the use of machine learning, deep learning, and federated learning, which are used for anomaly detection to identify and mitigate the security threats inherent to these devices. AI-driven technologies offer promising solutions for attack detection and predictive analysis, reducing the need for human intervention more significantly. This review acknowledges limitations such as the rapidly evolving nature of IoT technologies, the early-stage development or proprietary nature of many AI techniques, the variable performance of AI models in real-world applications, and potential biases in the search and selection of articles. The risk of bias in this systematic review is moderate. While the study selection and data collection processes are robust, the reliance on narrative synthesis and the limited exploration of potential biases in the selection process introduce some risk. Transparency in funding and conflict of interest reporting reduces bias in those areas. Discussion: The effectiveness of these AI-based approaches can vary depending on the performance of the model and the computational efficiency. In this article, we provide a comprehensive overview of existing AI models applied to IoT security, including machine learning (ML), deep learning (DL), and hybrid approaches. We also examine their role in enhancing the detection accuracy. Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. Conclusion: This review provides a comprehensive overview of ML applications to enhance IoT security. We also discuss and outline future directions, emphasizing the need for collaboration between interested parties and ongoing innovation to address the evolving threat landscape in IoT security.

2024

How are Contracts Used in Android Mobile Applications?

Authors
Ferreira, DR; Mendes, A; Ferreira, JF;

Publication
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, ICSE Companion 2024, Lisbon, Portugal, April 14-20, 2024

Abstract
Formal contracts and assertions are effective methods to enhance software quality by enforcing preconditions, postconditions, and invariants. However, the adoption and impact of contracts in the context of mobile application development, particularly of Android applications, remain unexplored. We present the first large-scale empirical study on the presence and use of contracts in Android applications, written in Java or Kotlin. We consider 2,390 applications and five categories of contract elements: conditional runtime exceptions, APIs, annotations, assertions, and other. We show that most contracts are annotation-based and are concentrated in a small number of applications. © 2024 IEEE Computer Society. All rights reserved.

  • 21
  • 3953