PUBLICATIONS

This page gives you the opportunity to view all the scientific publications from ARCADIAN-IoT.

JournalS papers

  1. Gelayol Golcarenarenji, Ignacio Martinez-Alpiste, Qi Wang, Jose Maria Alcaraz-Calero, Illumination-aware image fusion for around-the-clock human detection in adverse environments from Unmanned Aerial Vehicle, Expert Systems with Applications, Volume 204, 2022, 117413, ISSN 0957-4174. https://doi.org/10.1016/j.eswa.2022.117413.
  2. Salva-Garcia, P., Ricart-Sanchez, R., Chirivella-Perez, E. et al. XDP-Based SmartNIC Hardware Performance Acceleration for Next-Generation Networks. J Netw Syst Manage 30, 75 (2022). https://doi.org/10.1007/s10922-022-09687-z
  3. Pablo Benlloch-Caballero, Qi Wang, Jose M. Alcaraz Calero, Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks, Computer Networks, Volume 222, 2023, 109526, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2022.109526.
  4. Joel Höglund, Martin Furuhed, Shahid Raza, Lightweight certificate revocation for low-power IoT with end-to-end security, Journal of Information Security and Applications, Volume 73, 2023, 103424, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2023.103424.
  5. Han Wang, Luis Muñoz-González, Muhammad Zaid Hameed, David Eklund, Shahid Raza, SparSFA: Towards robust and communication efficient peer-to-peer federated learning, Computers & Security, Volume 129, 2023, 103182, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2023.103182.
  6. David Tena-Gago, Qi Wang, Jose M. Alcaraz-Calero, Non-invasive, plug-and-play pollution detector for vehicle on-board instantaneous CO2 emission monitoring, Internet of Things, Volume 22, 2023, 100755, ISSN 2542-6605, https://doi.org/10.1016/j.iot.2023.100755.
  7. Han Wang, David Eklund, Alina Oprea, and Shahid Raza. 2023. FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning. ACM Trans. Internet Things 4, 3, Article 17 (August 2023), 24 pages. https://doi.org/10.1145/3603257.
  8. D. Gaspar, P. Silva and C. Silva, “Explainable AI for Intrusion Detection Systems: LIME and SHAP Applicability on Multi-Layer Perceptron,” in IEEE Access, vol. 12, pp. 30164-30175, 2024, doi: 10.1109/ACCESS.2024.3368377.
  9. Diez-Tomillo J, Alcaraz-Calero JM, Wang Q. Dynamic-Distance-Based Thresholding for UAV-Based Face Verification Algorithms. Sensors. 2023; 23(24):9909. https://doi.org/10.3390/s23249909.
  10. Diez-Tomillo, J., Martinez-Alpiste, I., Golcarenarenji, G. et al. Efficient CNN-based low-resolution facial detection from UAVs. Neural Comput & Applic 36, 5847–5860 (2024). https://doi.org/10.1007/s00521-023-09401-3.
  11. J. Diez-Tomillo, J. Alcaraz-Calero and Q. Wang, “Face Verification Algorithms for UAV Applications: An Empirical Comparative Analysis,” in Journal of Communications Software and Systems, vol. 20, no. 1, pp. 1-12, January 2024, doi: https://doi.org/10.24138/jcomss-2023-0165.
  12. G. Maria Riccio, F. Iraci Gambazza, P. Gentili; A. Peduto and G. Munafò, “Use of Biometric Data in research activity. The solution adopted by the Arcadian Project”, in Dorrito Mercado Technologia, https://www.dimt.it/la-rivista/articoli/use-of-biometric-data-in-research-activity-the-solution-adopted-by-the-arcadian-project/
  13. Höglund, J., Bouget, S., Furuhed, M. et al. AutoPKI: public key infrastructure for IoT with automated trust transfer. Int. J. Inf. Secur. 23, 1859–1875 (2024). https://doi.org/10.1007/s10207-024-00825-z.
  14. Kianpour, M., Raza, S. More than malware: unmasking the hidden risk of cybersecurity regulations. Int. Cybersecur. Law Rev. 5, 169–212 (2024). https://doi.org/10.1365/s43439-024-00111-7.
  15. C. Troy, S. Sturley, J. M. Alcaraz-Calero and Q. Wang, “Enabling Generative AI to Produce SQL Statements: A Framework for the Auto- Generation of Knowledge Based on EBNF Context-Free Grammars,” in IEEE Access, vol. 11, pp. 123543-123564, 2023, doi: 10.1109/ACCESS.2023.3329071.
  16. J. Andrade-Hoz, J. M. Alcaraz-Calero and Q. Wang, “NetLabeller: Architecture with data extraction and labelling framework for beyond 5G networks,” in Journal of Communications and Networks, vol. 26, no. 1, pp. 80-98, Feb. 2024, doi: 10.23919/JCN.2023.000063.
  17. Andrade-Hoz J, Wang Q, Alcaraz-Calero JM. Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks. Sensors. 2024; 24(3):783. https://doi.org/10.3390/s24030783.

CONFERENCES papers

  1. Figueiredo, S. et al. (2022). ARCADIAN-IoT – Enabling Autonomous Trust, Security and Privacy Management for IoT. In: González-Vidal, A., Mohamed Abdelgawad, A., Sabir, E., Ziegler, S., Ladid, L. (eds) Internet of Things. GIoTS 2022. Lecture Notes in Computer Science, vol 13533. Springer, Cham. https://doi.org/10.1007/978-3-031-20936-9_28
  2. V. Holubenko, P. Silva and C. Bento, “An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices,” 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2023, pp. 959-960, doi: 10.1109/CCNC51644.2023.10060443.
  3. A. Iacovazzi and S. Raza, “Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers,” 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 2022, pp. 30-37, doi: 10.1109/CSR54599.2022.9850307.
  4. J. Höglund, S. Raza and M. Furuhed, “Towards Automated PKI Trust Transfer for IoT,” 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), Bangalore, India, 2022, pp. 1-8, doi: 10.1109/PKIA56009.2022.9952223.
  5. J. Höglund and S. Raza, “BLEND: Efficient and blended IoT data storage and communication with application layer security,” 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 2022, pp. 253-260, doi: 10.1109/CSR54599.2022.9850290.
  6. I. Zenden, H. Wang, A. Iacovazzi, A. Vahidi, R. Blom and S. Raza, “On the Resilience of Machine Learning-Based IDS for Automotive Networks,” 2023 IEEE Vehicular Networking Conference (VNC), Istanbul, Turkiye, 2023, pp. 239-246, doi: 10.1109/VNC57357.2023.10136285.
  7. Marques, A. and Sousa, B. (2023). CHARRA-PM: An Attestation Approach Relying on the Passport Model. In Proceedings of the 9th International Conference on Information Systems Security and Privacy – ICISSP; ISBN 978-989-758-624-8; ISSN 2184-4356, SciTePress, pages 349-356. DOI: 10.5220/0011623600003405
  8. Iacovazzi, Alfonso, et al. “Towards Cyber Threat Intelligence for the IoT.” 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2023. https://doi.org/10.1109/CSR57506.2023.10225002
  9. R. Höglund, M. Tiloca, S. Bouget and S. Raza, “Key Update for the IoT Security Standard OSCORE,2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 78-85, doi: 10.1109/CSR57506.2023.10225002.
  10. T. Silva, J. Casal and R. Chaves, “Lightweight Network-Based IoT Device Authentication in Cloud Services,” 2023 IEEE 31st International Conference on Network Protocols (ICNP), Reykjavik, Iceland, 2023, pp. 1-6, doi: 10.1109/ICNP59255.2023.10355621.
  11. J. Diez-Tomillo, J. M. Alcaraz-Calero and Q. Wang, “Empirical Comparison of Face Verification Algorithms from UAVs,” 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 2023, pp. 1-6, doi: 10.23919/SoftCOM58365.2023.10271666.
  12. J. Saez-Perez, Q. Wang, J. M. A. Calero and J. Garcia-Rodriguez, “Enhancing Point Cloud Resolution for Autonomous Driving with Deep Learning AI Models,” 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Biarritz, France, 2024, pp. 599-604, doi: 10.1109/PerComWorkshops59983.2024.10503354.
  13. A. M. G. Garcia, J. M. A. Calero, H. M. Mora and Q. Wang, “Process Slicing: A New Mitigation Tool for Cyber-attacks against Softwarised Industrial Environments,” 2023 IEEE 9th International Conference on Network Softwarization (NetSoft), Madrid, Spain, 2023, pp. 468-473, doi: 10.1109/NetSoft57336.2023.10175447.
  14. Andrade-Hoz, J., Alcaraz-Calero, J. M., & Wang, Q. (Accepted/In press). Handling imbalanced 5G and beyond network tabular data using conditional generative models. In Proceedings of the 20th International Wireless Communications & Mobile Computing Conference IEEE. https://uws.elsevierpure.com/en/publications/handling-imbalanced-5g-and-beyond-network-tabular-data-using-cond
  15. C. Troy, S. Sturley, J. M. Alcaraz Calero, and Q. Wang, “A novel weight-driven ATN-based SQL sentence generator to accommodate AI-based Reinforcement Learning”, Proc. International Conference on Computer, Information and Telecommunication Systems (CITS) 2024, accepted.