Skip to main content

Showing 1–7 of 7 results for author: Ferreira, P M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.06252  [pdf, ps, other

    cs.CR cs.AI cs.LG

    False Alarms, Real Damage: Adversarial Attacks Using LLM-based Models on Text-based Cyber Threat Intelligence Systems

    Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira

    Abstract: Cyber Threat Intelligence (CTI) has emerged as a vital complementary approach that operates in the early phases of the cyber threat lifecycle. CTI involves collecting, processing, and analyzing threat data to provide a more accurate and rapid understanding of cyber threats. Due to the large volume of data, automation through Machine Learning (ML) and Natural Language Processing (NLP) models is ess… ▽ More

    Submitted 5 July, 2025; originally announced July 2025.

  2. arXiv:2404.11716  [pdf, other

    cs.AI

    A Survey on Semantic Modeling for Building Energy Management

    Authors: Miracle Aniakor, Vinicius V. Cogo, Pedro M. Ferreira

    Abstract: Buildings account for a substantial portion of global energy consumption. Reducing buildings' energy usage primarily involves obtaining data from building systems and environment, which are instrumental in assessing and optimizing the building's performance. However, as devices from various manufacturers represent their data in unique ways, this disparity introduces challenges for semantic interop… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: 29 pages, 6 figures, 2 tables

    ACM Class: I.2.4; C.m; H.m

  3. Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness

    Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira

    Abstract: Knowledge sharing about emerging threats is crucial in the rapidly advancing field of cybersecurity and forms the foundation of Cyber Threat Intelligence (CTI). In this context, Large Language Models are becoming increasingly significant in the field of cybersecurity, presenting a wide range of opportunities. This study surveys the performance of ChatGPT, GPT4all, Dolly, Stanford Alpaca, Alpaca-Lo… ▽ More

    Submitted 19 April, 2024; v1 submitted 26 January, 2024; originally announced January 2024.

    Journal ref: Expert Systems with Applications, Volume 261, 1 February 2025, 125509

  4. Surrogate Neural Network Model for Sensitivity Analysis and Uncertainty Quantification of the Mechanical Behavior in the Optical Lens-Barrel Assembly

    Authors: Shantanu Shahane, Erman Guleryuz, Diab W Abueidda, Allen Lee, Joe Liu, Xin Yu, Raymond Chiu, Seid Koric, Narayana R Aluru, Placid M Ferreira

    Abstract: Surrogate neural network-based models have been lately trained and used in a variety of science and engineering applications where the number of evaluations of a target function is limited by execution time. In cell phone camera systems, various errors, such as interferences at the lens-barrel and lens-lens interfaces and axial, radial, and tilt misalignments, accumulate and alter profile of the l… ▽ More

    Submitted 28 June, 2022; v1 submitted 12 January, 2022; originally announced January 2022.

  5. arXiv:1904.02072  [pdf, other

    cs.CR cs.LG

    Processing Tweets for Cybersecurity Threat Awareness

    Authors: Fernando Alves, Aurélien Bettini, Pedro M. Ferreira, Alysson Bessani

    Abstract: Receiving timely and relevant security information is crucial for maintaining a high-security level on an IT infrastructure. This information can be extracted from Open Source Intelligence published daily by users, security organisations, and researchers. In particular, Twitter has become an information hub for obtaining cutting-edge information about many subjects, including cybersecurity. This w… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

  6. arXiv:1904.01127  [pdf, other

    cs.LG cs.CR cs.SI stat.ML

    Cyberthreat Detection from Twitter using Deep Neural Networks

    Authors: Nuno DionĂ­sio, Fernando Alves, Pedro M. Ferreira, Alysson Bessani

    Abstract: To be prepared against cyberattacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds. Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  7. arXiv:1805.01416  [pdf, other

    cs.AI cs.CL cs.CV

    Dimensional emotion recognition using visual and textual cues

    Authors: Pedro M. Ferreira, Diogo Pernes, Kelwin Fernandes, Ana Rebelo, Jaime S. Cardoso

    Abstract: This paper addresses the problem of automatic emotion recognition in the scope of the One-Minute Gradual-Emotional Behavior challenge (OMG-Emotion challenge). The underlying objective of the challenge is the automatic estimation of emotion expressions in the two-dimensional emotion representation space (i.e., arousal and valence). The adopted methodology is a weighted ensemble of several models fr… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.