no code implementations • 20 Mar 2024 • Francesco Zola, Lander Segurola, Erin King, Martin Mullins, Raul Orduna
Tools for fighting cyber-criminal activities using new technologies are promoted and deployed every day.
no code implementations • 12 Feb 2024 • Xabier Echeberria-Barrio, Mikel Gorricho, Selene Valencia, Francesco Zola
This tool was deployed and used in a Hackathon event to evaluate the reliability of a skin cancer image detector.
no code implementations • 16 Dec 2022 • Idoia Eizaguirre-Peral, Lander Segurola-Gil, Francesco Zola
Results indicate that the cGAN can effectively generate keystroke dynamics patterns that can be used for deceiving keystroke authentication systems.
no code implementations • 28 Jul 2022 • Francesco Zola, Jose Alvaro Fernandez-Carrasco, Jan Lukas Bruse, Mikel Galar, Zeno Geradts
Biometric systems represent valid solutions in tasks like user authentication and verification, since they are able to analyze physical and behavioural features with high precision.
no code implementations • 15 Sep 2021 • Lander Segurola-Gil, Francesco Zola, Xabier Echeberria-Barrio, Raul Orduna-Urrutia
In the recent years, cybersecurity has gained high relevance, converting the detection of attacks or intrusions into a key task.
no code implementations • 11 May 2021 • Francesco Zola, Lander Segurola, Jan Lukas Bruse, Mikel Galar Idoate
We extract these graph structures that can represent the evolution of both normal and attack entities and apply a temporal dissection approach in order to highlight their micro-dynamics.
no code implementations • 27 May 2020 • Francesco Zola, Jan Lukas Bruse, Xabier Etxeberria Barrio, Mikel Galar, Raul Orduna Urrutia
In fact, setting GAN training parameters is non-trivial and heavily affects the quality of the generated synthetic data.
no code implementations • 15 Oct 2019 • Francesco Zola, Maria Eguimendia, Jan Lukas Bruse, Raul Orduna Urrutia
Bitcoin is a decentralized, pseudonymous cryptocurrency that is one of the most used digital assets to date.