Search Results for author: André Grégio

Found 4 papers, 1 papers with code

Fast & Furious: Modelling Malware Detection as Evolving Data Streams

1 code implementation24 May 2022 Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Felipe Pinagé, Luiz S. Oliveira, André Grégio

This constant evolution of malware samples causes changes to the data distribution (i. e., concept drifts) that directly affect ML model detection rates, something not considered in the majority of the literature work.

Malware Detection

Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles

no code implementations20 May 2021 Luiz Giovanini, Fabrício Ceschin, Mirela Silva, Aokun Chen, Ramchandra Kulkarni, Sanjay Banda, Madison Lysaght, Heng Qiao, Nikolaos Sapountzis, Ruimin Sun, Brandon Matthews, Dapeng Oliver Wu, André Grégio, Daniela Oliveira

This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication.

valid

People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation--A Comparison Between COVID and General Narratives on Twitter

no code implementations3 Dec 2020 Mirela Silva, Fabrício Ceschin, Prakash Shrestha, Christopher Brant, Shlok Gilda, Juliana Fernandes, Catia S. Silva, André Grégio, Daniela Oliveira, Luiz Giovanini

We found that (i) factual tweets, regardless of whether COVID-related, were more engaging than misinformation tweets; and (ii) features that most heavily correlated with engagement varied depending on the veracity and content of the tweet.

Misinformation

Machine Learning (In) Security: A Stream of Problems

no code implementations30 Oct 2020 Fabrício Ceschin, Marcus Botacin, Albert Bifet, Bernhard Pfahringer, Luiz S. Oliveira, Heitor Murilo Gomes, André Grégio

Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in that field.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.