Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Tópicos
de interesse
Detalhes

Detalhes

  • Nome

    João Paulo Vilela
  • Cargo

    Investigador
  • Desde

    01 março 2020
002
Publicações

2024

Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types

Autores
Cunha, M; Duarte, G; Andrade, R; Mendes, R; Vilela, JP;

Publicação
PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024

Abstract
With the massive data collection from different devices, spanning from mobile devices to all sorts of IoT devices, protecting the privacy of users is a fundamental concern. In order to prevent unwanted disclosures, several Privacy-Preserving Mechanisms (PPMs) have been proposed. Nevertheless, due to the lack of a standardized and universal privacy definition, configuring and evaluating PPMs is quite challenging, requiring knowledge that the average user does not have. In this paper, we propose a privacy toolkit - Privkit - to systematize this process and facilitate automated configuration of PPMs. Privkit enables the assessment of privacy-preserving mechanisms with different configurations, while allowing the quantification of the achieved privacy and utility level of various types of data. Privkit is open source and can be extended with new data types, corresponding PPMs, as well as privacy and utility assessment metrics and privacy attacks over such data. This toolkit is available through a Python Package with several state-of-the-art PPMs already implemented, and also accessible through a Web application. Privkit constitutes a unified toolkit that makes the dissemination of new privacy-preserving methods easier and also facilitates reproducibility of research results, through a repository of Jupyter Notebooks that enable reproduction of research results.

2024

Computation-Limited Signals: A Channel Capacity Regime Constrained by Computational Complexity

Autores
Queiroz, S; Vilela, JP; Monteiro, E;

Publicação
IEEE COMMUNICATIONS LETTERS

Abstract
In this letter, we introduce the computation-limited (comp-limited) signals, a communication capacity regime where the computational complexity of signal processing is the primary constraint for communication performance, overriding factors such as power or bandwidth. We present the Spectro-Computational (SC) analysis, a novel mathematical framework designed to enhance classic concepts of information theory -such as data rate, spectral efficiency, and capacity - to accommodate the computational complexity overhead of signal processing. We explore a specific Shannon regime where capacity is expected to increase indefinitely with channel resources. However, we identify conditions under which the time complexity overhead can cause capacity to decrease rather than increase, leading to the definition of the comp-limited signal regime. Furthermore, we provide examples of SC analysis and demonstrate that the Orthogonal Frequency Division Multiplexing (OFDM) waveform falls under the comp-limited regime unless the lower-bound computational complexity of the N-point Discrete Fourier Transform (DFT) problem verifies as ohm (N)$ , which remains an open challenge in the theory of computation.

2024

A Privacy-Aware Remapping Mechanism for Location Data

Autores
Duarte, G; Cunha, M; Vilela, JP;

Publicação
39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024

Abstract
In an era dominated by Location-Based Services (LBSs), the concern of preserving location privacy has emerged as a critical challenge. To address this, Location Privacy-Preserving Mechanisms (LPPMs) were proposed, in where an obfuscated version of the exact user location is reported instead. Adding to noise-based mechanisms, location discretization, the process of transforming continuous location data into discrete representations, is relevant for the efficient storage of data, simplifying the process of manipulating the information in a digital system and reducing the computational overhead. Apart from enabling a more efficient data storage and processing, location discretization can also be performed with privacy requirements, so as to ensure discretization while providing privacy benefits. In this work, we propose a Privacy-Aware Remapping mechanism that is able to improve the privacy level attained by Geo-Indistinguishability through a tailored pre-processing discretization step. The proposed remapping technique is capable of reducing the re-identification risk of locations under Geo-Indistinguishability, with limited impact on quality loss.

2024

WiFi-based Person Identification Through Motion Analysis

Autores
Martins, Ó; Vilela, P; Gomes, M;

Publicação
2024 IEEE International Mediterranean Conference on Communications and Networking, MeditCom 2024

Abstract
By leveraging the advances in wireless communications networks and their ubiquitous nature, sensing through communication technologies has flourished in recent years. In particular, Human-to-Machine Interfaces have been exploiting WiFi IEEE 802.11 networks to obtain information that allows Human Activity Recognition. In this paper, we propose a classification model to perform Person Identification (PI) through Body Velocity Profile time series, obtained by combining Channel State Information containing gesture knowledge from multiple Access Points. Through this model, we investigate the impact of different gestures on PI classification performance and explore how informing the model about the input gesture can enhance classification accuracy. This information may enable the network to adjust to the absence of features capable of adequately characterizing the desired classes in certain gestures. A simplified stacking model is also presented, capable of combining the softmax outputs of K previously proposed individual models. By having the individual models’ evaluations of a gesture and the gesture information relating to it, the number of gestures considered was shown to significantly improve the performance of the PI classification task. This enhancement increased 17% of the average F1 scores when compared to the individual model tested on the same data. © 2024 IEEE.

2024

Enhanced authentication and device integrity protection for GDOI using blockchain

Autores
Mukhandi, M; Andrade, E; Granjal, J; Vilela, JP;

Publicação
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES

Abstract
Recent device-level cyber-attacks have targeted IoT critical applications in power distribution systems integrated with the Internet communications infrastructure. These systems utilize group domain of interpretation (GDOI) as designated by International Electrotechnical Commission (IEC) power utility standards IEC 61850 and IEC 62351. However, GDOI cannot protect against novel threats, such as IoT device-level attacks that can modify device firmware and configuration files to create command and control malicious communication. As a consequence, the attacks can compromise substations with potentially catastrophic consequences. With this in mind, this article proposes a permissioned/private blockchain-based authentication framework that provides a solution to current security threats such as the IoT device-level attacks. Our work improves the GDOI protocol applied in critical IoT applications by achieving decentralized and distributed device authentication. The security of our proposal is demonstrated against known attacks as well as through formal mechanisms via the joint use of the AVISPA and SPAN tools. The proposed approach adds negligible authentication latency, thus ensuring appropriate scalability as the number of nodes increases. Our work addresses the problem of device-level cyber-attacks such as device identity theft and introduction of fake nodes in GDOI-enabled smart grids. It introduces a permissioned blockchain based device authentication management in the GDOI phase 1 and periodic device integrity check in phase 2 to achieve decentralized authentication and device-level security. image

Teses
supervisionadas

2024

Privacy-Preserving Joint Communication and Sensing

Autor
Óscar Gabriel Bernardes Martins

Instituição
UP-FCUP

2023

Privacy-Preserving Face Detection: A Comprehensive Analysis of Face Anonymization Techniques

Autor
Ricardo Gonçalves de Andrade

Instituição
UP-FCUP

2023

Privacy-Preserving Mechanisms for Heterogeneous Data Types

Autor
Mariana da Cruz Cunha

Instituição
UP-FCUP

2023

Privacy-Preserving Mechanisms for Heterogeneous Data Types

Autor
Mariana da Cruz Cunha

Instituição
UP-FCUP

2023

Privacy in Telecom Fraud Detection

Autor
Eduardo Carvalho Santos

Instituição
UP-FCUP