Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2019

Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security

Autores
Searle, H; Gomes, MAC; Vilela, JP; Harrison, WK;

Publicação
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)

Abstract
We propose adding an irregular quadrature amplitude modulation (QAM) constellation to a wireless transmission scheme in order to obtain greater control over the signal-to-noise ratio (SNR) required to successfully decode the signal. By altering the separation between adjacent symbols, the minimum required SNR is raised without degradation in the performance of the scheme. This allows the system to adapt to preferable channel conditions for the authorized user, making it harder for eavesdroppers to intercept and decode the transmission, thus making the communication safer. In addition, we show that by overlaying a coset code onto the QAM constellation, a new, stronger security gap metric can be further improved. Results show the effectiveness of this strategy with an interleaved coding for secrecy with a hidden key (ICSHK) scheme.

2019

Polar Coding for Physical-layer Security without Knowledge of the Eavesdropper's Channel

Autores
Monteiro, T; Gomes, M; Vilela, JP; Harrison, WK;

Publicação
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING)

Abstract
We propose an adaptive secrecy scheme using polar codes with random frozen bits for a general wiretap channel, in which to protect the data from a potential eavesdropper, part or all of the frozen bits are randomly generated per message. To assess the secrecy level of the proposed scheme, three types of decoding strategies are evaluated: a matching decoder which knows the positions of all inserted bits inside the blocklength and tries to estimate them using the same decoding techniques, a blind decoder which treats all the frozen bits as the same value, and a random decoder which considers those dynamic bits as random at the receiver. Results are presented in terms of the system security gap, assuming an adaptive decoding strategy. It is shown that the system achieves combined secrecy and reliability. The proposed scheme does not assume knowledge of the eavesdropper's channel when defining the indices of information and frozen bits.

2018

Human vs. Automatic Annotation Regarding the Task of Relevance Detection in Social Networks

Autores
Guimaraes, N; Miranda, F; Figueira, A;

Publicação
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES

Abstract
The burst of social networks and the possibility of being continuously connected has provided a fast way for information diffusion. More specifically, real-time posting allowed news and events to be reported quicker through social networks than traditional news media. However, the massive data that is daily available makes newsworthy information a needle in a haystack. Therefore, our goal is to build models that can detect journalistic relevance automatically in social networks. In order to do it, it is essential to establish a ground truth with a large number of entries that can provide a suitable basis for the learning algorithms due to the difficulty inherent to the ambiguity and wide scope associated with the concept of relevance. In this paper, we propose and compare two different methodologies to annotate posts regarding their relevance: automatic and human annotation. Preliminary results show that supervised models trained with the automatic annotation methodology tend to perform better than using human annotation in a test dataset labeled by experts.

2018

Twitter as a Source for Time- and Domain-Dependent Sentiment Lexicons

Autores
Guimaraes, N; Torgo, L; Figueira, A;

Publicação
SOCIAL NETWORK BASED BIG DATA ANALYSIS AND APPLICATIONS

Abstract
Sentiment lexicons are an essential component on most state-of-the-art sentiment analysis methods. However, the terms included are usually restricted to verbs and adjectives because they (1) usually have similar meanings among different domains and (2) are the main indicators of subjectivity in the text. This can lead to a problem in the classification of short informal texts since sometimes the absence of these types of parts of speech does not mean an absence of sentiment. Therefore, our hypothesis states that knowledge of terms regarding certain events and respective sentiment (public opinion) can improve the task of sentiment analysis. Consequently, to complement traditional sentiment dictionaries, we present a system for lexicon expansion that extracts the most relevant terms from news and assesses their positive or negative score through Twitter. Preliminary results on a labelled dataset show that our complementary lexicons increase the performance of three state-of-the-art sentiment systems, therefore proving the effectiveness of our approach.

2018

Contributions to the Detection of Unreliable Twitter Accounts through Analysis of Content and Behaviour

Autores
Guimarães, N; Figueira, A; Torgo, L;

Publicação
Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2018, Volume 1: KDIR, Seville, Spain, September 18-20, 2018.

Abstract
Misinformation propagation on social media has been significantly growing, reaching a major exposition in the 2016 United States Presidential Election. Since then, the scientific community and major tech companies have been working on the problem to avoid the propagation of misinformation. For this matter, research has been focused on three major sub-fields: the identification of fake news through the analysis of unreliable posts, the propagation patterns of posts in social media, and the detection of bots and spammers. However, few works have tried to identify the characteristics of a post that shares unreliable content and the associated behaviour of its account. This work presents four main contributions for this problem. First, we provide a methodology to build a large knowledge database with tweets who disseminate misinformation links. Then, we answer research questions on the data with the goal of bridging these problems to similar problem explored in the literature. Next, we focus on accounts which are constantly propagating misinformation links. Finally, based on the analysis conducted, we develop a model to detect social media accounts that spread unreliable content. Using Decision Trees, we achieved 96% in the F1-score metric, which provides reliability on our approach. Copyright 2018 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved

2018

Current State of the Art to Detect Fake News in Social Media: Global Trendings and Next Challenges

Autores
Figueira, A; Guimarães, N; Torgo, L;

Publicação
Proceedings of the 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, Seville, Spain, September 18-20, 2018.

Abstract
Nowadays, false news can be created and disseminated easily through the many social media platforms, resulting in a widespread real-world impact. Modeling and characterizing how false information proliferates on social platforms and why it succeeds in deceiving readers are critical to develop efficient algorithms and tools for their early detection. A recent surge of researching in this area has aimed to address the key issues using methods based on machine learning, deep learning, feature engineering, graph mining, image and video analysis, together with newly created data sets and web services to identify deceiving content. Majority of the research has been targeting fake reviews, biased messages, and against-facts information (false news and hoaxes). In this work, we present a survey on the state of the art concerning types of fake news and the solutions that are being proposed. We focus our survey on content analysis, network propagation, fact-checking and fake news analysis and emerging detection systems. We also discuss the rationale behind successfully deceiving readers. Finally, we highlight important challenges that these solutions bring. Copyright

  • 57
  • 192