Skip to main content

Showing 1–6 of 6 results for author: Gamba, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.01700  [pdf, other

    cs.RO

    Computer-Vision Based Real Time Waypoint Generation for Autonomous Vineyard Navigation with Quadruped Robots

    Authors: Lee Milburn, Juan Gamba, Miguel Fernandes, Claudio Semini

    Abstract: The VINUM project seeks to address the shortage of skilled labor in modern vineyards by introducing a cutting-edge mobile robotic solution. Leveraging the capabilities of the quadruped robot, HyQReal, this system, equipped with arm and vision sensors, offers autonomous navigation and winter pruning of grapevines reducing the need for human intervention. At the heart of this approach lies an archit… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: Accepted to IEEE-ICARSC 2023 Conference. arXiv admin note: text overlap with arXiv:2301.00887

  2. arXiv:2301.00887  [pdf, other

    cs.RO

    Towards Computer-Vision Based Vineyard Navigation for Quadruped Robots

    Authors: Lee Milburn, Juan Gamba, Claudio Semini

    Abstract: There is a dramatic shortage of skilled labor for modern vineyards. The Vinum project is developing a mobile robotic solution to autonomously navigate through vineyards for winter grapevine pruning. This necessitates an autonomous navigation stack for the robot pruning a vineyard. The Vinum project is using the quadruped robot HyQReal. This paper introduces an architecture for a quadruped robot to… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

  3. arXiv:2212.03615  [pdf, other

    cs.CR

    Not Your Average App: A Large-scale Privacy Analysis of Android Browsers

    Authors: Amogh Pradeep, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, David Choffnes

    Abstract: The transparency and privacy behavior of mobile browsers has remained widely unexplored by the research community. In fact, as opposed to regular Android apps, mobile browsers may present contradicting privacy behaviors. On the one end, they can have access to (and can expose) a unique combination of sensitive user data, from users' browsing history to permission-protected personally identifiable… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: Privacy Enhancing Technologies Symposium, 2023

  4. arXiv:2211.13104  [pdf, other

    cs.CR cs.SE

    Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem

    Authors: Kaspar Hageman, Álvaro Feal, Julien Gamba, Aniketh Girish, Jakob Bleier, Martina Lindorfer, Juan Tapiador, Narseo Vallina-Rodriguez

    Abstract: The ability to identify the author responsible for a given software object is critical for many research studies and for enhancing software transparency and accountability. However, as opposed to other application markets like iOS, attribution in the Android ecosystem is known to be hard. Prior research has leveraged market metadata and signing certificates to identify software authors without que… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

  5. arXiv:1905.02713  [pdf, other

    cs.CR

    An Analysis of Pre-installed Android Software

    Authors: Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez

    Abstract: The open-source nature of the Android OS makes it possible for manufacturers to ship custom versions of the OS along with a set of pre-installed apps, often for product differentiation. Some device vendors have recently come under scrutiny for potentially invasive private data collection practices and other potentially harmful or unwanted behavior of the pre-installed apps on their devices. Yet, t… ▽ More

    Submitted 7 May, 2019; originally announced May 2019.

    Journal ref: 41st IEEE Symposium on Security and Privacy, 18-20 May 2020, San Fransisco, CA, USA

  6. A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists

    Authors: Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, Narseo Vallina-Rodriguez

    Abstract: A broad range of research areas including Internet measurement, privacy, and network security rely on lists of target domains to be analysed; researchers make use of target lists for reasons of necessity or efficiency. The popular Alexa list of one million domains is a widely used example. Despite their prevalence in research papers, the soundness of top lists has seldom been questioned by the com… ▽ More

    Submitted 23 September, 2018; v1 submitted 29 May, 2018; originally announced May 2018.

    Comments: To be published at ACM IMC 2018. Web site with live data under: https://toplists.github.io