2025
Authors
Cardoso, JMP; Najjar, WA;
Publication
Applied Reconfigurable Computing. Architectures, Tools, and Applications - 21st International Symposium, ARC 2025, Seville, Spain, April 9-11, 2025, Proceedings
Abstract
The International Symposium on Applied Reconfigurable Computing (ARC) is an annual forum for the discussion and dissemination of research, notably applying the Reconfigurable Computing (RC) concept to real-world problems. The first edition of ARC took place in 2005, and in 2024, ARC celebrated its 20th edition. During those 20 years, the field of reconfigurable computing saw a tremendous growth in its underlying technology. ARC contributed very significantly to the presentation and dissemination of new ideas, innovative applications, and fruitful discussions, all of which have resulted in the shaping of novel lines of research. Here, we present selected papers from the first 20 years of ARC, that we believe represent the corpus of work and reflect the ARC spirit by covering a broad spectrum of RC applications, benchmarks, tools, and architectures. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
2025
Authors
Almeida, PS;
Publication
ACM COMPUTING SURVEYS
Abstract
Conflict-free Replicated Data Types (CRDTs) allow optimistic replication in a principled way. Different replicas can proceed independently, being available even under network partitions and always converging deterministically: Replicas that have received the same updates will have equivalent state, even if received in different orders. After a historical tour of the evolution from sequential data types to CRDTs, we present in detail the two main approaches to CRDTs, operation-based and state-based, including two important variations, the pure operation-based and the delta-state based. Intended for prospective CRDT researchers and designers, this article provides solid coverage of the essential concepts, clarifying some misconceptions that frequently occur, but also presents some novel insights gained from considerable experience in designing both specific CRDTs and approaches to CRDTs.
2025
Authors
Sitnievski, N; Schlemmer, E;
Publication
Congresso Internacional de Cidadania Digital
Abstract
2025
Authors
Gomes, C; Mendes, R; Vilela, JP;
Publication
2025 IEEE 10TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P
Abstract
Federated Learning (FL), a distributed learning mechanism where data is decentralized across multiple devices and periodic gradient updates are shared, is an alternative to centralized training that aims to address privacy issues arising from raw data sharing. Despite the expected privacy benefits, prior research showcases the potential privacy leakage derived from overfitting, exploited by passive attacks. However, limited attention has been given to understanding and defending against active threats that increase model leakage by interfering with the training process, instead of relying on overfitting. This work addresses this gap by introducing Active Attribute Inference (AAI*), a novel active attack that encodes sensitive attribute information by making any targeted training sample leave a distinguishable footprint on the gradient of maliciously modified neurons [8]. Results, using two real-world datasets, show that it is possible to successfully encode sensitive information incurring a small error in terms of neuron activation. More importantly, on a practical scenario, AAI. can improve upon a state-of-theart approach by achieving over 90% of restricted ROC AUC, therefore increasing model leakage. To defend against such active attacks, this work introduces several attack detection strategies tailored for different levels of the defender's knowledge. Including the novel White-box Attack Detection Mechanism (WADM*) that detects abnormal changes in weights distribution, and two black-box strategies based on the monitorization of model performance. Results show that the detection rate can be 100% on both datasets. Remarkably, WADM. reduces any attack to random guessing while preserving model utility, offering significant improvements over existing defenses, particularly when clients are non-IID. By proposing active attacks against well-generalized models and effective countermeasures, this research contributes to a better understanding of privacy in FL systems.
2025
Authors
Lima, PV; Cardoso, JS; Oliveira, HP;
Publication
BIBE
Abstract
2025
Authors
Pereira, J; Baltazar, AR; Pinheiro, I; da Silva, DQ; Frazao, ML; Neves Dos Santos, FN;
Publication
IEEE International Conference on Emerging Technologies and Factory Automation, ETFA
Abstract
Automated fruit harvesting systems rely heavily on accurate visual perception, particularly for crops such as the Arbutus tree (Arbutus unedo), which holds both ecological and economic significance. However, this species poses considerable challenges for computer vision due to its dense foliage and the morphological variability of its berries across different ripening stages. Despite its importance, the Arbutus tree remains under-explored in the context of precision agriculture and robotic harvesting. This study addresses that gap by evaluating a computer vision-based approach to detect and classify Arbutus berries into three ripeness categories: green, yellow-orange, and red. A significant contribution of this work is the release of two fully annotated open-access datasets, Arbutus Berry Detection Dataset and Arbutus Berry Ripeness Level Detection Dataset, developed through a structured manual labeling process. Additionally, we benchmarked four YOLO architectures - YOLOv8n, YOLOv9t, YOLOv10n, and YOLO11n - as well as the RT-DETR models, using these datasets. Among these, RT-DETR-L demonstrated the most consistent performance in terms of precision, recall, and generalization, outperforming the lighter YOLO models in both speed and accuracy. This highlights RT-DETR's strong potential for deployment in real-time automated harvesting systems, where robust detection and efficient inference are critical. © 2025 IEEE.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.