Skip to main content

Showing 1–14 of 14 results for author: Alegre, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.21106  [pdf, ps, other

    cs.CR cs.AI

    PhishKey: A Novel Centroid-Based Approach for Enhanced Phishing Detection Using Adaptive HTML Component Extraction

    Authors: Felipe Castaño, Eduardo Fidalgo, Enrique Alegre, Rocio Alaiz-Rodríguez, Raul Orduna, Francesco Zola

    Abstract: Phishing attacks pose a significant cybersecurity threat, evolving rapidly to bypass detection mechanisms and exploit human vulnerabilities. This paper introduces PhishKey to address the challenges of adaptability, robustness, and efficiency. PhishKey is a novel phishing detection method using automatic feature extraction from hybrid sources. PhishKey combines character-level processing with Convo… ▽ More

    Submitted 26 June, 2025; originally announced June 2025.

  2. arXiv:2506.13445  [pdf, ps, other

    cs.CV eess.IV

    Overcoming Occlusions in the Wild: A Multi-Task Age Head Approach to Age Estimation

    Authors: Waqar Tanveer, Laura Fernández-Robles, Eduardo Fidalgo, Víctor González-Castro, Enrique Alegre

    Abstract: Facial age estimation has achieved considerable success under controlled conditions. However, in unconstrained real-world scenarios, which are often referred to as 'in the wild', age estimation remains challenging, especially when faces are partially occluded, which may obscure their visibility. To address this limitation, we propose a new approach integrating generative adversarial networks (GANs… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

  3. arXiv:2506.10689  [pdf, ps, other

    cs.CV

    Underage Detection through a Multi-Task and MultiAge Approach for Screening Minors in Unconstrained Imagery

    Authors: Christopher Gaul, Eduardo Fidalgo, Enrique Alegre, Rocío Alaiz Rodríguez, Eri Pérez Corral

    Abstract: Accurate automatic screening of minors in unconstrained images demands models that are robust to distribution shift and resilient to the children under-representation in publicly available data. To overcome these issues, we propose a multi-task architecture with dedicated under/over-age discrimination tasks based on a frozen FaRL vision-language backbone joined with a compact two-layer MLP that sh… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

  4. arXiv:2408.04077  [pdf, ps, other

    cs.CV

    PushPull-Net: Inhibition-driven ResNet robust to image corruptions

    Authors: Guru Swaroop Bennabhaktula, Enrique Alegre, Nicola Strisciuglio, George Azzopardi

    Abstract: We introduce a novel computational unit, termed PushPull-Conv, in the first layer of a ResNet architecture, inspired by the anti-phase inhibition phenomenon observed in the primary visual cortex. This unit redefines the traditional convolutional layer by implementing a pair of complementary filters: a trainable push kernel and its counterpart, the pull kernel. The push kernel (analogous to traditi… ▽ More

    Submitted 13 September, 2024; v1 submitted 7 August, 2024; originally announced August 2024.

    Comments: Accepted at ICPR 2024, code available at https://github.com/bgswaroop/pushpull-conv

  5. arXiv:2402.05976  [pdf

    cs.LG cs.AI

    RankSum An unsupervised extractive text summarization based on rank fusion

    Authors: A. Joshi, E. Fidalgo, E. Alegre, R. Alaiz-Rodriguez

    Abstract: In this paper, we propose Ranksum, an approach for extractive text summarization of single documents based on the rank fusion of four multi-dimensional sentence features extracted for each sentence: topic information, semantic content, significant keywords, and position. The Ranksum obtains the sentence saliency rankings corresponding to each feature in an unsupervised way followed by the weighted… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  6. arXiv:2402.05296  [pdf

    cs.LG cs.AI

    Classifying spam emails using agglomerative hierarchical clustering and a topic-based approach

    Authors: F. Janez-Martino, R. Alaiz-Rodriguez, V. Gonzalez-Castro, E. Fidalgo, E. Alegre

    Abstract: Spam emails are unsolicited, annoying and sometimes harmful messages which may contain malware, phishing or hoaxes. Unlike most studies that address the design of efficient anti-spam filters, we approach the spam email problem from a different and novel perspective. Focusing on the needs of cybersecurity units, we follow a topic-based approach for addressing the classification of spam email into m… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  7. arXiv:2209.14078  [pdf, other

    cs.SD eess.AS

    MeWEHV: Mel and Wave Embeddings for Human Voice Tasks

    Authors: Andrés Carofilis, Laura Fernández-Robles, Enrique Alegre, Eduardo Fidalgo

    Abstract: A recent trend in speech processing is the use of embeddings created through machine learning models trained on a specific task with large datasets. By leveraging the knowledge already acquired, these models can be reused in new tasks where the amount of available data is small. This paper proposes a pipeline to create a new model, called Mel and Wave Embeddings for Human Voice Tasks (MeWEHV), cap… ▽ More

    Submitted 24 June, 2023; v1 submitted 28 September, 2022; originally announced September 2022.

    Comments: Submitted to IEEE Access

  8. Efficient Detection of Botnet Traffic by features selection and Decision Trees

    Authors: Javier Velasco-Mata, Víctor González-Castro, Eduardo Fidalgo, Enrique Alegre

    Abstract: Botnets are one of the online threats with the biggest presence, causing billionaire losses to global economies. Nowadays, the increasing number of devices connected to the Internet makes it necessary to analyze large amounts of network traffic data. In this work, we focus on increasing the performance on botnet traffic classification by selecting those features that further increase the detection… ▽ More

    Submitted 30 June, 2021; originally announced July 2021.

    Comments: Submitted to IEEE Access

  9. arXiv:2101.12723  [pdf, ps, other

    cs.CR cs.LG

    State of the Art: Content-based and Hybrid Phishing Detection

    Authors: F. Castaño, E. Fidalgo, E. Alegre, D. Chaves, M. Sanchez-Paniagua

    Abstract: Phishing attacks have evolved and increased over time and, for this reason, the task of distinguishing between a legitimate site and a phishing site is more and more difficult, fooling even the most expert users. The main proposals focused on addressing this problem can be divided into four approaches: List-based, URL based, content-based, and hybrid. In this state of the art, the most recent tech… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 6 pages, 1 table

  10. arXiv:2012.06277  [pdf, other

    cs.CV eess.IV

    Video Camera Identification from Sensor Pattern Noise with a Constrained ConvNet

    Authors: Derrick Timmerman, Swaroop Bennabhaktula, Enrique Alegre, George Azzopardi

    Abstract: The identification of source cameras from videos, though it is a highly relevant forensic analysis topic, has been studied much less than its counterpart that uses images. In this work we propose a method to identify the source camera of a video based on camera specific noise patterns that we extract from video frames. For the extraction of noise pattern features, we propose an extended version of… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

    Comments: Paper Accepted in - 10th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2021)

  11. arXiv:2011.01113  [pdf, other

    cs.IR cs.LG

    Short Text Classification Approach to Identify Child Sexual Exploitation Material

    Authors: Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, Rocío Alaiz-Rodríguez

    Abstract: Producing or sharing Child Sexual Exploitation Material (CSEM) is a serious crime fought vigorously by Law Enforcement Agencies (LEAs). When an LEA seizes a computer from a potential producer or consumer of CSEM, they need to analyze the suspect's hard disk's files looking for pieces of evidence. However, a manual inspection of the file content looking for CSEM is a time-consuming task. In most ca… ▽ More

    Submitted 13 November, 2020; v1 submitted 29 October, 2020; originally announced November 2020.

  12. arXiv:2005.10098  [pdf, other

    cs.CV

    Classification of Industrial Control Systems screenshots using Transfer Learning

    Authors: Pablo Blanco Medina, Eduardo Fidalgo Fernandez, Enrique Alegre, Francisco Jáñez Martino, Roberto A. Vasco-Carofilis, Víctor Fidalgo Villar

    Abstract: Industrial Control Systems depend heavily on security and monitoring protocols. Several tools are available for this purpose, which scout vulnerabilities and take screenshots from various control panels for later analysis. However, they do not adequately classify images into specific control groups, which can difficult operations performed by manual operators. In order to solve this problem, we us… ▽ More

    Submitted 11 September, 2020; v1 submitted 20 May, 2020; originally announced May 2020.

  13. Device-based Image Matching with Similarity Learning by Convolutional Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise

    Authors: Guru Swaroop Bennabhaktula, Enrique Alegre, Dimka Karastoyanova, George Azzopardi

    Abstract: One of the challenging problems in digital image forensics is the capability to identify images that are captured by the same camera device. This knowledge can help forensic experts in gathering intelligence about suspects by analyzing digital images. In this paper, we propose a two-part network to quantify the likelihood that a given pair of images have the same source camera, and we evaluated it… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

    Comments: 7 pages, 4 figures, conference paper

    Journal ref: In Proceedings of the 9th International Conference on Pattern Recognition Applications and Methods - Volume 1: ICPRAM, 578-584, 2020

  14. arXiv:1910.02332  [pdf, other

    cs.LG cs.IR stat.ML

    Content-Based Features to Rank Influential Hidden Services of the Tor Darknet

    Authors: Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, Deisy Chaves

    Abstract: The unevenness importance of criminal activities in the onion domains of the Tor Darknet and the different levels of their appeal to the end-user make them tangled to measure their influence. To this end, this paper presents a novel content-based ranking framework to detect the most influential onion domains. Our approach comprises a modeling unit that represents an onion domain using forty featur… ▽ More

    Submitted 5 October, 2019; originally announced October 2019.