Skip to main content

Showing 1–50 of 50 results for author: López, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.03976  [pdf, other

    q-bio.QM cs.AI q-bio.GN

    OLAF: An Open Life Science Analysis Framework for Conversational Bioinformatics Powered by Large Language Models

    Authors: Dylan Riffle, Nima Shirooni, Cody He, Manush Murali, Sovit Nayak, Rishikumar Gopalan, Diego Gonzalez Lopez

    Abstract: OLAF (Open Life Science Analysis Framework) is an open-source platform that enables researchers to perform bioinformatics analyses using natural language. By combining large language models (LLMs) with a modular agent-pipe-router architecture, OLAF generates and executes bioinformatics code on real scientific data, including formats like .h5ad. The system includes an Angular front end and a Python… ▽ More

    Submitted 10 April, 2025; v1 submitted 4 April, 2025; originally announced April 2025.

  2. arXiv:2502.18746  [pdf, other

    cs.CL

    Automatic Prompt Optimization via Heuristic Search: A Survey

    Authors: Wendi Cui, Jiaxin Zhang, Zhuohang Li, Hao Sun, Damien Lopez, Kamalika Das, Bradley A. Malin, Sricharan Kumar

    Abstract: Recent advances in Large Language Models have led to remarkable achievements across a variety of Natural Language Processing tasks, making prompt engineering increasingly central to guiding model outputs. While manual methods can be effective, they typically rely on intuition and do not automatically refine prompts over time. In contrast, automatic prompt optimization employing heuristic-based sea… ▽ More

    Submitted 25 February, 2025; originally announced February 2025.

  3. A survey on cutting-edge relation extraction techniques based on language models

    Authors: Jose A. Diaz-Garcia, Julio Amador Diaz Lopez

    Abstract: This comprehensive survey delves into the latest advancements in Relation Extraction (RE), a pivotal task in natural language processing essential for applications across biomedical, financial, and legal sectors. This study highlights the evolution and current state of RE techniques by analyzing 137 papers presented at the Association for Computational Linguistics (ACL) conferences over the past f… ▽ More

    Submitted 27 November, 2024; originally announced November 2024.

    Comments: 50 pages, under review in Artificial Intelligence Review

    Journal ref: Artif Intell Rev 58, 287 (2025)

  4. Open-Source Periorbital Segmentation Dataset for Ophthalmic Applications

    Authors: George R. Nahass, Emma Koehler, Nicholas Tomaras, Danny Lopez, Madison Cheung, Alexander Palacios, Jeffrey C. Peterson, Sasha Hubschman, Kelsey Green, Chad A. Purnell, Pete Setabutr, Ann Q. Tran, Darvin Yi

    Abstract: Periorbital segmentation and distance prediction using deep learning allows for the objective quantification of disease state, treatment monitoring, and remote medicine. However, there are currently no reports of segmentation datasets for the purposes of training deep learning models with sub mm accuracy on the regions around the eyes. All images (n=2842) had the iris, sclera, lid, caruncle, and b… ▽ More

    Submitted 7 December, 2024; v1 submitted 30 September, 2024; originally announced September 2024.

    Comments: 10 pages, 7 figures, 3 Tables

    Journal ref: Ophthalmology Science, Volume 5, Issue 4, 2025, Article 100757

  5. arXiv:2409.15916  [pdf, other

    physics.med-ph cs.LG

    Deep convolutional framelets for dose reconstruction in BNCT with Compton camera detector

    Authors: Angelo Didonna, Dayron Ramos Lopez, Giuseppe Iaselli, Nicola Amoroso, Nicola Ferrara, Gabriella Maria Incoronata Pugliese

    Abstract: Boron Neutron Capture Therapy (BNCT) is an innovative binary form of radiation therapy with high selectivity towards cancer tissue based on the neutron capture reaction 10B(n,$α$)7Li, consisting in the exposition of patients to neutron beams after administration of a boron compound with preferential accumulation in cancer cells. The high linear energy transfer products of the ensuing reaction depo… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

    Comments: 16 pages, 12 figures, preprint

  6. arXiv:2409.01454  [pdf

    cs.SI physics.soc-ph

    Healthcare system resilience and adaptability to pandemic disruptions in the United States

    Authors: Lu Zhong, Dimitri Lopez, Sen Pei, Jianxi Gao

    Abstract: Understanding healthcare system resilience has become paramount, particularly in the wake of the COVID-19 pandemic, which imposed unprecedented burdens on healthcare services and severely impacted public health. Resilience is defined as the system's ability to absorb, recover from, and adapt to disruptions; however, despite extensive studies on this subject, we still lack empirical evidence and ma… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

  7. arXiv:2406.02601  [pdf, other

    cs.LG cs.AI

    Multimodal Deep Learning for Low-Resource Settings: A Vector Embedding Alignment Approach for Healthcare Applications

    Authors: David Restrepo, Chenwei Wu, Sebastián Andrés Cajas, Luis Filipe Nakayama, Leo Anthony Celi, Diego M López

    Abstract: Large-scale multi-modal deep learning models have revolutionized domains such as healthcare, highlighting the importance of computational power. However, in resource-constrained regions like Low and Middle-Income Countries (LMICs), limited access to GPUs and data poses significant challenges, often leaving CPUs as the sole resource. To address this, we advocate for leveraging vector embeddings to… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  8. arXiv:2404.12278  [pdf, other

    cs.AI

    DF-DM: A foundational process model for multimodal data fusion in the artificial intelligence era

    Authors: David Restrepo, Chenwei Wu, Constanza Vásquez-Venegas, Luis Filipe Nakayama, Leo Anthony Celi, Diego M López

    Abstract: In the big data era, integrating diverse data modalities poses significant challenges, particularly in complex fields like healthcare. This paper introduces a new process model for multimodal Data Fusion for Data Mining, integrating embeddings and the Cross-Industry Standard Process for Data Mining with the existing Data Fusion Information Group model. Our model aims to decrease computational cost… ▽ More

    Submitted 2 June, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

    Comments: 6 figures, 5 tables

    MSC Class: 68T30 ACM Class: I.2.0; I.3.6

  9. arXiv:2404.05703  [pdf, other

    cs.CR

    Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets

    Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson

    Abstract: Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural network malware classification systems are key tools for combating these threats but are vulnerable to adversarial machine learning attacks. These attacks perturb input data to cause misclassification, bypassing protective systems. Existing defens… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: In International Conference On Formal Methods in Software Engineering, 2024; (FormaliSE'24)

  10. arXiv:2402.18986  [pdf, other

    cs.CR

    Always be Pre-Training: Representation Learning for Network Intrusion Detection with GNNs

    Authors: Zhengyao Gu, Diego Troy Lopez, Lilas Alrahis, Ozgur Sinanoglu

    Abstract: Graph neural network-based network intrusion detection systems have recently demonstrated state-of-the-art performance on benchmark datasets. Nevertheless, these methods suffer from a reliance on target encoding for data pre-processing, limiting widespread adoption due to the associated need for annotated labels--a cost-prohibitive requirement. In this work, we propose a solution involving in-cont… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: Will appear in the 2024 International Symposium on Quality Electronic Design (ISQED'24)

  11. arXiv:2402.11347  [pdf, other

    cs.CL

    PhaseEvo: Towards Unified In-Context Prompt Optimization for Large Language Models

    Authors: Wendi Cui, Jiaxin Zhang, Zhuohang Li, Hao Sun, Damien Lopez, Kamalika Das, Bradley Malin, Sricharan Kumar

    Abstract: Crafting an ideal prompt for Large Language Models (LLMs) is a challenging task that demands significant resources and expert human input. Existing work treats the optimization of prompt instruction and in-context learning examples as distinct problems, leading to sub-optimal prompt performance. This research addresses this limitation by establishing a unified in-context prompt optimization framew… ▽ More

    Submitted 17 February, 2024; originally announced February 2024.

    Comments: 50 pages, 9 figures, 26 tables

  12. Toward Building a Semantic Network Inventory for Model-Driven Telemetry

    Authors: I. D. Martínez-Casanueva, D. González-Sanchez, L. Bellido, D. Fernández, D. R. López

    Abstract: Network telemetry based on data models is expected to become the standard mechanism for collecting operational data from network devices efficiently. But the wide variety of standard and proprietary data models along with the different implementations of telemetry protocols offered by network vendors, become a barrier when monitoring heterogeneous network infrastructures. To facilitate the integra… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    Comments: 8 pages, 5 figures

    Journal ref: IEEE Communications Magazine, vol. 61, no. 3, pp. 60-66, March 2023

  13. Online Reachability Analysis and Space Convexification for Autonomous Racing

    Authors: Sergiy Bogomolov, Taylor T. Johnson, Diego Manzanas Lopez, Patrick Musau, Paulius Stankaitis

    Abstract: This paper presents an optimisation-based approach for an obstacle avoidance problem within an autonomous vehicle racing context. Our control regime leverages online reachability analysis and sensor data to compute the maximal safe traversable region that an agent can traverse within the environment. The idea is to first compute a non-convex safe region, which then can be convexified via a novel… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: In Proceedings FMAS 2023, arXiv:2311.08987

    Journal ref: EPTCS 395, 2023, pp. 95-112

  14. arXiv:2311.08038  [pdf, other

    cs.CR cs.NI

    Linking QKD testbeds across Europe

    Authors: Max Brauer, Rafael J. Vicente, Jaime S. Buruaga, Ruben B. Mendez, Ralf-Peter Braun, Marc Geitz, Piotr Rydlichkowski, Hans H. Brunner, Fred Fung, Momtchil Peev, Antonio Pastor, Diego Lopez, Vicente Martin, Juan P. Brito

    Abstract: Quantum-key-distribution (QKD) networks are gaining importance and it has become necessary to analyze the most appropriate methods for their long-distance interconnection. In this paper, four different methods of interconnecting remote QKD networks are proposed. The methods are used to link three different QKD testbeds in Europe, located in Berlin, Madrid, and Poznan. Although long-distance QKD li… ▽ More

    Submitted 10 January, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  15. arXiv:2307.13907  [pdf, other

    cs.LG cs.AI cs.CY cs.NE

    Robustness Verification of Deep Neural Networks using Star-Based Reachability Analysis with Variable-Length Time Series Input

    Authors: Neelanjana Pal, Diego Manzanas Lopez, Taylor T Johnson

    Abstract: Data-driven, neural network (NN) based anomaly detection and predictive maintenance are emerging research areas. NN-based analytics of time-series data offer valuable insights into past behaviors and estimates of critical parameters like remaining useful life (RUL) of equipment and state-of-charge (SOC) of batteries. However, input time series data can be exposed to intentional or unintentional no… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Under Review, 26 Pages, 14 figures, 2 tables

  16. arXiv:2307.04427  [pdf, other

    astro-ph.HE astro-ph.GA cs.LG

    Observation of high-energy neutrinos from the Galactic plane

    Authors: R. Abbasi, M. Ackermann, J. Adams, J. A. Aguilar, M. Ahlers, M. Ahrens, J. M. Alameddine, A. A. Alves Jr., N. M. Amin, K. Andeen, T. Anderson, G. Anton, C. Argüelles, Y. Ashida, S. Athanasiadou, S. Axani, X. Bai, A. Balagopal V., S. W. Barwick, V. Basu, S. Baur, R. Bay, J. J. Beatty, K. -H. Becker, J. Becker Tjus , et al. (364 additional authors not shown)

    Abstract: The origin of high-energy cosmic rays, atomic nuclei that continuously impact Earth's atmosphere, has been a mystery for over a century. Due to deflection in interstellar magnetic fields, cosmic rays from the Milky Way arrive at Earth from random directions. However, near their sources and during propagation, cosmic rays interact with matter and produce high-energy neutrinos. We search for neutrin… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: Submitted on May 12th, 2022; Accepted on May 4th, 2023

    Journal ref: Science 380, 6652, 1338-1343 (2023)

  17. arXiv:2307.00969  [pdf, other

    cs.NI eess.SY

    High Altitude Platform Stations: the New Network Energy Efficiency Enabler in the 6G Era

    Authors: Tailai Song, David Lopez, Michela Meo, Nicola Piovesan, Daniela Renga

    Abstract: The rapidly evolving communication landscape, with the advent of 6G technology, brings new challenges to the design and operation of wireless networks. One of the key concerns is the energy efficiency of the Radio Access Network (RAN), as the exponential growth in wireless traffic demands increasingly higher energy consumption. In this paper, we assess the potential of integrating a High Altitude… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  18. arXiv:2306.13456  [pdf

    cs.LG

    Enhanced Dengue Outbreak Prediction in Tamilnadu using Meteorological and Entomological data

    Authors: Varalakshmi M, Daphne Lopez

    Abstract: This paper focuses on studying the impact of climate data and vector larval indices on dengue outbreak. After a comparative study of the various LSTM models, Bidirectional Stacked LSTM network is selected to analyze the time series climate data and health data collected for the state of Tamil Nadu (India), for the period 2014 to 2020. Prediction accuracy of the model is significantly improved by i… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: 6 Pages and submitted to ICAI'22 - The 24th International Conference on Artificial Intelligence

  19. arXiv:2305.11419  [pdf, other

    cs.CV cs.AI cs.LG

    JetSeg: Efficient Real-Time Semantic Segmentation Model for Low-Power GPU-Embedded Systems

    Authors: Miguel Lopez-Montiel, Daniel Alejandro Lopez, Oscar Montiel

    Abstract: Real-time semantic segmentation is a challenging task that requires high-accuracy models with low-inference times. Implementing these models on embedded systems is limited by hardware capability and memory usage, which produces bottlenecks. We propose an efficient model for real-time semantic segmentation called JetSeg, consisting of an encoder called JetNet, and an improved RegSeg decoder. The Je… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

  20. arXiv:2210.02873  [pdf, other

    cs.CR cs.AI cs.LG

    Blockchain-based Monitoring for Poison Attack Detection in Decentralized Federated Learning

    Authors: Ranwa Al Mallah, David Lopez

    Abstract: Federated Learning (FL) is a machine learning technique that addresses the privacy challenges in terms of access rights of local datasets by enabling the training of a model across nodes holding their data samples locally. To achieve decentralized federated learning, blockchain-based FL was proposed as a distributed FL architecture. In decentralized FL, the chief is eliminated from the learning pr… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  21. arXiv:2209.03042  [pdf, other

    hep-ex astro-ph.IM cs.LG physics.data-an physics.ins-det

    Graph Neural Networks for Low-Energy Event Classification & Reconstruction in IceCube

    Authors: R. Abbasi, M. Ackermann, J. Adams, N. Aggarwal, J. A. Aguilar, M. Ahlers, M. Ahrens, J. M. Alameddine, A. A. Alves Jr., N. M. Amin, K. Andeen, T. Anderson, G. Anton, C. Argüelles, Y. Ashida, S. Athanasiadou, S. Axani, X. Bai, A. Balagopal V., M. Baricevic, S. W. Barwick, V. Basu, R. Bay, J. J. Beatty, K. -H. Becker , et al. (359 additional authors not shown)

    Abstract: IceCube, a cubic-kilometer array of optical sensors built to detect atmospheric and astrophysical neutrinos between 1 GeV and 1 PeV, is deployed 1.45 km to 2.45 km below the surface of the ice sheet at the South Pole. The classification and reconstruction of events from the in-ice detectors play a central role in the analysis of data from IceCube. Reconstructing and classifying events is a challen… ▽ More

    Submitted 11 October, 2022; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Prepared for submission to JINST

  22. arXiv:2207.11537  [pdf, other

    cs.RO

    RGB-D Robotic Pose Estimation For a Servicing Robotic Arm

    Authors: Jared Herron, Daniel Lopez, Jarred Jordan, Jillian Rudy, Aryslan Malik, Daniel Posada, Mehran Andalibi, Troy Henderson

    Abstract: A large number of robotic and human-assisted missions to the Moon and Mars are forecast. NASA's efforts to learn about the geology and makeup of these celestial bodies rely heavily on the use of robotic arms. The safety and redundancy aspects will be crucial when humans will be working alongside the robotic explorers. Additionally, robotic arms are crucial to satellite servicing and planned orbit… ▽ More

    Submitted 23 July, 2022; originally announced July 2022.

  23. arXiv:2207.06531  [pdf, other

    cs.LG

    Reachability Analysis of a General Class of Neural Ordinary Differential Equations

    Authors: Diego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Taylor T. Johnson

    Abstract: Continuous deep learning models, referred to as Neural Ordinary Differential Equations (Neural ODEs), have received considerable attention over the last several years. Despite their burgeoning impact, there is a lack of formal analysis techniques for these systems. In this paper, we consider a general class of neural ODEs with varying architectures and layers, and introduce a novel reachability fr… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  24. arXiv:2207.03689  [pdf, other

    cs.SE cs.AI cs.LG

    Guiding the retraining of convolutional neural networks against adversarial inputs

    Authors: Francisco Durán López, Silverio Martínez-Fernández, Michael Felderer, Xavier Franch

    Abstract: Background: When using deep learning models, there are many possible vulnerabilities and some of the most worrying are the adversarial inputs, which can cause wrong decisions with minor perturbations. Therefore, it becomes necessary to retrain these models against adversarial inputs, as part of the software testing process addressing the vulnerability to these inputs. Furthermore, for an energy ef… ▽ More

    Submitted 12 July, 2022; v1 submitted 8 July, 2022; originally announced July 2022.

  25. Network Digital Twin: Context, Enabling Technologies and Opportunities

    Authors: Paul Almasan, Miquel Ferriol-Galmés, Jordi Paillisse, José Suárez-Varela, Diego Perino, Diego López, Antonio Agustin Pastor Perales, Paul Harvey, Laurent Ciavaglia, Leon Wong, Vishnu Ram, Shihan Xiao, Xiang Shi, Xiangle Cheng, Albert Cabellos-Aparicio, Pere Barlet-Ros

    Abstract: The proliferation of emergent network applications (e.g., telesurgery, metaverse) is increasing the difficulty of managing modern communication networks. These applications entail stringent network requirements (e.g., ultra-low deterministic latency), which hinders network operators to manage their resources efficiently. In this article, we introduce the network digital twin (NDT), a renovated con… ▽ More

    Submitted 2 August, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: 7 pages, 4 figures. arXiv admin note: text overlap with arXiv:2201.01144

  26. arXiv:2205.10469  [pdf, other

    cs.CV cs.AI cs.LG

    Masterful: A Training Platform for Computer Vision Models

    Authors: Samuel Wookey, Yaoshiang Ho, Tom Rikert, Juan David Gil Lopez, Juan Manuel Muñoz Beancur, Santiago Cortes, Ray Tawil, Aaron Sabin, Jack Lynch, Travis Harper, Nikhil Gajendrakumar

    Abstract: Masterful is a software platform to train deep learning computer vision models. Data and model architecture are inputs to the platform, and the output is a trained model. The platform's primary goal is to maximize a trained model's accuracy, which it achieves through its regularization and semi-supervised learning implementations. The platform's secondary goal is to minimize the amount of manual e… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

  27. arXiv:2205.01419  [pdf, other

    cs.RO cs.CV cs.FL cs.LG eess.SY

    An Empirical Analysis of the Use of Real-Time Reachability for the Safety Assurance of Autonomous Vehicles

    Authors: Patrick Musau, Nathaniel Hamilton, Diego Manzanas Lopez, Preston Robinette, Taylor T. Johnson

    Abstract: Recent advances in machine learning technologies and sensing have paved the way for the belief that safe, accessible, and convenient autonomous vehicles may be realized in the near future. Despite tremendous advances within this context, fundamental challenges around safety and reliability are limiting their arrival and comprehensive adoption. Autonomous vehicles are often tasked with operating in… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: 30 pages, 12 Figures, Submitted to Artificial Intelligence's Special Issue on "Risk-Aware Autonomous Systems: Theory and Practice."

  28. arXiv:2204.03857  [pdf, other

    cs.NI

    How to Design Autonomous Service Level Agreements for 6G

    Authors: Tooba Faisal, Jose Antonio Ordonez Lucena, Diego R. Lopez, Chonggang Wang, Mischa Dohler

    Abstract: With the growing demand for network connectivity and diversity of network applications, one primary challenge that network service providers are facing is managing the commitments for Service Level Agreements~(SLAs). Service providers typically monitor SLAs for management tasks such as improving their service quality, customer billing and future network planning. Network service customers, on thei… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  29. Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges

    Authors: Nuria Rodríguez-Barroso, Daniel Jiménez López, M. Victoria Luzón, Francisco Herrera, Eugenio Martínez-Cámara

    Abstract: Federated learning is a machine learning paradigm that emerges as a solution to the privacy-preservation demands in artificial intelligence. As machine learning, federated learning is threatened by adversarial attacks against the integrity of the learning model and the privacy of data via a distributed approach to tackle local and global learning. This weak point is exacerbated by the inaccessibil… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Journal ref: Information Fusion (2022)

  30. arXiv:2201.01144  [pdf, other

    cs.NI

    Digital Twin Network: Opportunities and Challenges

    Authors: Paul Almasan, Miquel Ferriol-Galmés, Jordi Paillisse, José Suárez-Varela, Diego Perino, Diego López, Antonio Agustin Pastor Perales, Paul Harvey, Laurent Ciavaglia, Leon Wong, Vishnu Ram, Shihan Xiao, Xiang Shi, Xiangle Cheng, Albert Cabellos-Aparicio, Pere Barlet-Ros

    Abstract: The proliferation of emergent network applications (e.g., AR/VR, telesurgery, real-time communications) is increasing the difficulty of managing modern communication networks. These applications typically have stringent requirements (e.g., ultra-low deterministic latency), making it more difficult for network operators to manage their network resources efficiently. In this article, we propose the… ▽ More

    Submitted 7 January, 2022; v1 submitted 4 January, 2022; originally announced January 2022.

    Comments: 7 pages, 4 figures

  31. BEAT: Blockchain-Enabled Accountable and Transparent Infrastructure Sharing in 6G and Beyond

    Authors: Tooba Faisal, Mischa Dohler, Simone Mangiante, Diego R. Lopez

    Abstract: It is widely expected that future networks of 6G and beyond will deliver on the unachieved goals set by 5G. Technologies such as Internet of Skills and Industry 4.0 will become stable and viable, as a direct consequence of networks that offer sustained and reliable mobile performance levels. The primary challenges for future technologies are not just low-latency and high-bandwidth. The more crit… ▽ More

    Submitted 25 May, 2022; v1 submitted 24 December, 2021; originally announced December 2021.

    Comments: arXiv admin note: text overlap with arXiv:2107.04328

    Journal ref: IEEE Access, vol. 10, pp. 48660-48672, 2022

  32. Quantum Technologies in the Telecommunications Industry

    Authors: Vicente Martin, Juan Pedro Brito, Carmen Escribano, Marco Menchetti, Catherine White, Andrew Lord, Felix Wissel, Matthias Gunkel, Paulette Gavignet, Naveena Genay, Olivier Le Moult, Carlos Abellán, Antonio Manzalini, Antonio Pastor-Perales, Victor López, Diego López

    Abstract: Quantum based technologies have been fundamental in our world. After producing the laser and the transistor, the devices that have shaped our modern information society, the possibilities enabled by the ability to create and manipulate individual quantum states opens the door to a second quantum revolution. In this paper we explore the possibilities that these new technologies bring to the Telecom… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Journal ref: EPJ Quantum Technology 8:19 (2021)

  33. arXiv:2107.04328  [pdf, other

    cs.NI

    BEAT: Blockchain-Enabled Accountable and Transparent Network Sharing in 6G

    Authors: Tooba Faisal, Mischa Dohler, Simone Mangiante, Diego R. Lopez

    Abstract: Infrastructure sharing is a widely discussed and implemented approach and is successfully adopted in telecommunications networks today. In practice, it is implemented through prior negotiated Service Level Agreements (SLAs) between the parties involved. However, it is recognised that these agreements are difficult to negotiate, monitor and enforce. For future 6G networks, resource and infrastructu… ▽ More

    Submitted 17 January, 2022; v1 submitted 9 July, 2021; originally announced July 2021.

  34. arXiv:2105.14276  [pdf, other

    cs.CY cs.AI cs.CL cs.LG

    Correcting public opinion trends through Bayesian data assimilation

    Authors: Robin Hendrickx, Rossella Arcucci, Julio Amador Dıaz Lopez, Yi-Ke Guo, Mark Kennedy

    Abstract: Measuring public opinion is a key focus during democratic elections, enabling candidates to gauge their popularity and alter their campaign strategies accordingly. Traditional survey polling remains the most popular estimation technique, despite its cost and time intensity, measurement errors, lack of real-time capabilities and lagged representation of public opinion. In recent years, Twitter opin… ▽ More

    Submitted 29 May, 2021; originally announced May 2021.

  35. Anomaly Detection in Predictive Maintenance: A New Evaluation Framework for Temporal Unsupervised Anomaly Detection Algorithms

    Authors: Jacinto Carrasco, Irina Markova, David López, Ignacio Aguilera, Diego García, Marta García-Barzana, Manuel Arias-Rodil, Julián Luengo, Francisco Herrera

    Abstract: The research in anomaly detection lacks a unified definition of what represents an anomalous instance. Discrepancies in the nature itself of an anomaly lead to multiple paradigms of algorithms design and experimentation. Predictive maintenance is a special case, where the anomaly represents a failure that must be prevented. Related time-series research as outlier and novelty detection or time-seri… ▽ More

    Submitted 2 September, 2021; v1 submitted 26 May, 2021; originally announced May 2021.

    Comments: 25 pages, 9 figures, 5 tables

    ACM Class: J.2

  36. arXiv:2101.10904  [pdf, other

    cs.CR cs.AI cs.LG

    Untargeted Poisoning Attack Detection in Federated Learning via Behavior Attestation

    Authors: Ranwa Al Mallah, David Lopez, Godwin Badu Marfo, Bilal Farooq

    Abstract: Federated Learning (FL) is a paradigm in Machine Learning (ML) that addresses data privacy, security, access rights and access to heterogeneous information issues by training a global model using distributed nodes. Despite its advantages, there is an increased potential for cyberattacks on FL-based ML techniques that can undermine the benefits. Model-poisoning attacks on FL target the availability… ▽ More

    Submitted 16 January, 2022; v1 submitted 24 January, 2021; originally announced January 2021.

  37. arXiv:2012.06923  [pdf, other

    cs.IR cs.LG

    A Refined SVD Algorithm for Collaborative Filtering

    Authors: Marko Kabić, Gabriel Duque López, Daniel Keller

    Abstract: Collaborative filtering tries to predict the ratings of a user over some items based on opinions of other users with similar taste. The ratings are usually given in the form of a sparse matrix, the goal being to find the missing entries (i.e. ratings). Various approaches to collaborative filtering exist, some of the most popular ones being the Singular Value Decomposition (SVD) and K-means cluster… ▽ More

    Submitted 12 December, 2020; originally announced December 2020.

  38. arXiv:2004.05519  [pdf, other

    eess.SY cs.LG

    NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems

    Authors: Hoang-Dung Tran, Xiaodong Yang, Diego Manzanas Lopez, Patrick Musau, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, Taylor T. Johnson

    Abstract: This paper presents the Neural Network Verification (NNV) software tool, a set-based verification framework for deep neural networks (DNNs) and learning-enabled cyber-physical systems (CPS). The crux of NNV is a collection of reachability algorithms that make use of a variety of set representations, such as polyhedra, star sets, zonotopes, and abstract-domain representations. NNV supports both exa… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

  39. arXiv:1908.05629  [pdf, other

    cs.CY

    A blockchain-based user-centric emission monitoring and trading system for multi-modal mobility

    Authors: Johannes Eckert, David López, Carlos Lima Azevedo, Bilal Farooq

    Abstract: Since the transport sector accounts for one of the highest shares of greenhouse gases (GHG) emissions, several existing proposals state the idea to control the by the transportation sector caused GHG emissions through an Emission Trading Systems (ETS). However, most existing approaches integrate GHG emissions through the fuel consumption and car registration, limiting the tracing of emissions in m… ▽ More

    Submitted 27 August, 2019; v1 submitted 15 August, 2019; originally announced August 2019.

    Comments: 15 pages, 5 figures

  40. arXiv:1908.03446  [pdf, other

    cs.CR econ.EM

    Privacy-Aware Distributed Mobility Choice Modelling over Blockchain

    Authors: David Lopez, Bilal Farooq

    Abstract: A generalized distributed tool for mobility choice modelling is presented, where participants do not share personal raw data, while all computations are done locally. Participants use Blockchain based Smart Mobility Data-market (BSMD), where all transactions are secure and private. Nodes in blockchain can transact information with other participants as long as both parties agree to the transaction… ▽ More

    Submitted 12 August, 2019; v1 submitted 9 August, 2019; originally announced August 2019.

    Comments: Accepted in the proceedings of IEEE International Smart Cities Conference

  41. The Engineering of Software-Defined Quantum Key Distribution Networks

    Authors: Alejandro Aguado, Victor Lopez, Diego Lopez, Momtchil Peev, Andreas Poppe, Antonio Pastor, Jesus Folgueira, Vicente Martiin

    Abstract: Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of the cryptography as we know it. Quantum Key distribution is a physical layer techno… ▽ More

    Submitted 29 June, 2019; originally announced July 2019.

    Comments: 7 pages, 4 figures, Accepted for publication in the IEEE Communications Magazine, Future Internet: Architectures and Protocols issue

    Journal ref: IEEE Communications Magazine ( Volume: 57 , Issue: 7 , July 2019 )

  42. A multi-layered blockchain framework for smart mobility data-markets

    Authors: David Lopez, Bilal Farooq

    Abstract: Blockchain has the potential to render the transaction of information more secure and transparent. Nowadays, transportation data are shared across multiple entities using heterogeneous mediums, from paper collected data to smartphone. Most of this data are stored in central servers that are susceptible to hacks. In some cases shady actors who may have access to such sources, share the mobility dat… ▽ More

    Submitted 22 January, 2020; v1 submitted 14 June, 2019; originally announced June 2019.

    Comments: Accepted in "Transportation Research Part C: Emerging Technologies" (January 06, 2020), doi: 10.1016/j.trc.2020.01.002

    Journal ref: Transportation Research Part C: Emerging Technologies, 111C (2020) pp. 588-615

  43. arXiv:1904.07454  [pdf, other

    cs.CV

    Point cloud registration: matching a maximal common subset on pointclouds with noise (with 2D implementation)

    Authors: Jorge Arce Garro, David Jiménez López

    Abstract: We analyze the problem of determining whether 2 given point clouds in 2D, with any distinct cardinality and any number of outliers, have subsets of the same size that can be matched via a rigid motion. This problem is important, for example, in the application of fingerprint matching with incomplete data. We propose an algorithm that, under assumptions on the noise tolerance, allows to find corres… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 13 pages, 5 figures

  44. arXiv:1812.10660  [pdf, other

    cs.NI

    We all do better when we work together?

    Authors: Thomas Fossati, Pedro A. Aranda Gutiérrez, Diego López

    Abstract: This paper evaluates the impact of a RD signal on traffic crossing the mobile network through a set of experiments in a simulated 5G network scenario built with ns-3. In our experiments, we compare a scenario with no RD treatment (i.e. a single best--effort EPS bearer) with scenarios with RD treatment (i.e. separate EPS bearers to carry RD--partitioned traffic) with honest and cheating users. Our… ▽ More

    Submitted 27 December, 2018; originally announced December 2018.

  45. arXiv:1812.04834  [pdf

    cs.NI

    Analysis and Consideration on Management of Encrypted Traffic

    Authors: Pedro A. Aranda Gutiérrez, Diego López, Thomas Fossati

    Abstract: Encrypted traffic poses new and unique challenges for network operators because information that is useful or necessary for management purposes is not accessible anymore. This paper examines proposed approaches to provide end-to-end encryption as well as ways to provide the access to the needed information for network management. The two main approaches we consider are 1.- extending and adapting a… ▽ More

    Submitted 16 December, 2018; v1 submitted 12 December, 2018; originally announced December 2018.

    Comments: 11 pages

  46. arXiv:1810.01989  [pdf, ps, other

    cs.AI cs.LG

    Verification for Machine Learning, Autonomy, and Neural Networks Survey

    Authors: Weiming Xiang, Patrick Musau, Ayana A. Wild, Diego Manzanas Lopez, Nathaniel Hamilton, Xiaodong Yang, Joel Rosenfeld, Taylor T. Johnson

    Abstract: This survey presents an overview of verification techniques for autonomous systems, with a focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents thereof. Autonomy in CPS is enabling by recent advances in artificial intelligence (AI) and machine learning (ML) through approaches such as deep neural networks (DNNs), embedded in so-called learning enabled components (LECs)… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

  47. arXiv:1809.05785  [pdf, other

    cs.CY

    A blockchain framework for smart mobility

    Authors: David Lopez, Bilal Farooq

    Abstract: A blockchain framework is presented for addressing the privacy and security challenges associated with the Big Data in smart mobility. It is composed of individuals, companies, government and universities where all the participants collect, own, and control their data. Each participant shares their encrypted data to the blockchain network and can make information transactions with other participan… ▽ More

    Submitted 15 September, 2018; originally announced September 2018.

    Comments: In the proceedings of IEEE International Smart Cities Conference 2018

  48. arXiv:1804.09642  [pdf, other

    cs.NI

    The Creation Phase in Network Slicing: From a Service Order to an Operative Network Slice

    Authors: Jose Ordonez-Lucena, Oscar Adamuz-Hinojosa, Pablo Ameigeiras, Pablo Muñoz, Juan J. Ramos-Muñoz, Jesús Folgueira Chavarria, Diego Lopez

    Abstract: Network slicing is considered a key mechanism to serve the multitude of tenants (e.g. vertical industries) targeted by forthcoming 5G systems in a flexible and cost-efficient manner. In this paper, we present a SDN/NFV architecture with multi-tenancy support. This architecture enables a network slice provider to deploy network slice instances for multiple tenants on-the-fly, and simultaneously pro… ▽ More

    Submitted 25 April, 2018; originally announced April 2018.

    Comments: This article has been accepted for publication in the European Conference on Networks and Communications (EuCNC), 2018

  49. Automated Network Service Scaling in NFV: Concepts, Mechanisms and Scaling Workflow

    Authors: Oscar Adamuz-Hinojosa, Jose Ordonez-Lucena, Pablo Ameigeiras, Juan J. Ramos-Munoz, Diego Lopez, Jesus Folgueira

    Abstract: Next-generation systems are anticipated to be digital platforms supporting innovative services with rapidly changing traffic patterns. To cope with this dynamicity in a cost-efficient manner, operators need advanced service management capabilities such as those provided by NFV. NFV enables operators to scale network services with higher granularity and agility than today. For this end, automation… ▽ More

    Submitted 15 June, 2018; v1 submitted 24 April, 2018; originally announced April 2018.

    Comments: This work has been accepted for publication in the IEEE Communications Magazine

  50. Network Slicing for 5G with SDN/NFV: Concepts, Architectures and Challenges

    Authors: Jose Ordonez-Lucena, Pablo Ameigeiras, Diego Lopez, Juan J. Ramos-Munoz, Javier Lorca, Jesus Folgueira

    Abstract: The fifth generation of mobile communications is anticipated to open up innovation opportunities for new industries such as vertical markets. However, these verticals originate myriad use cases with diverging requirements that future 5G networks have to efficiently support. Network slicing may be a natural solution to simultaneously accommodate over a common network infrastructure the wide range o… ▽ More

    Submitted 1 May, 2017; v1 submitted 14 March, 2017; originally announced March 2017.