Search Results for author: Gérôme Bovet

Found 17 papers, 6 papers with code

A Big Data Architecture for Early Identification and Categorization of Dark Web Sites

1 code implementation24 Jan 2024 Javier Pastor-Galindo, Hông-Ân Sandlin, Félix Gómez Mármol, Gérôme Bovet, Gregorio Martínez Pérez

The dark web has become notorious for its association with illicit activities and there is a growing need for systems to automate the monitoring of this space.

Dimensionality Reduction

Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

1 code implementation21 Jul 2023 Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

A DFL scenario with physical and virtual deployments have been executed, encompassing three security configurations: (i) a baseline without security, (ii) an encrypted configuration, and (iii) a configuration integrating both encryption and MTD techniques.

Federated Learning

RansomAI: AI-powered Ransomware for Stealthy Encryption

no code implementations27 Jun 2023 Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates.

Q-Learning

Fedstellar: A Platform for Decentralized Federated Learning

1 code implementation16 Jun 2023 Enrique Tomás Martínez Beltrán, Ángel Luis Perales Gómez, Chao Feng, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

To overcome these challenges, this paper presents Fedstellar, a platform extended from p2pfl library and designed to train FL models in a decentralized, semi-decentralized, and centralized fashion across diverse federations of physical or virtualized devices.

Federated Learning

FederatedTrust: A Solution for Trustworthy Federated Learning

no code implementations20 Feb 2023 Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Ning Xie, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

Subsequently, an algorithm named FederatedTrust is designed based on the pillars and metrics identified in the taxonomy to compute the trustworthiness score of FL models.

Edge-computing Fairness +2

Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification

no code implementations30 Dec 2022 Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

In contrast, attackers do not stay stalled and have developed adversarial attacks focused on context modification and ML/DL evaluation evasion applied to IoT device identification solutions.

RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

1 code implementation30 Dec 2022 Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for representing SBC's states, and iii) calculating the consumption of resources in SBC.

Reinforcement Learning (RL)

Maximum Likelihood Distillation for Robust Modulation Classification

no code implementations1 Nov 2022 Javier Maroto, Gérôme Bovet, Pascal Frossard

Deep Neural Networks are being extensively used in communication systems and Automatic Modulation Classification (AMC) in particular.

Classification Knowledge Distillation

Robust Federated Learning for execution time-based device model identification under label-flipping attack

no code implementations29 Nov 2021 Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez

In this context, newer approaches such as Federated Learning (FL) have not been fully explored yet, especially when malicious clients are present in the scenario setup.

Federated Learning

SafeAMC: Adversarial training for robust modulation recognition models

no code implementations28 May 2021 Javier Maroto, Gérôme Bovet, Pascal Frossard

We propose to use adversarial training, which consists of fine-tuning the model with adversarial perturbations, to increase the robustness of automatic modulation recognition (AMC) models.

Automatic Modulation Recognition

On the benefits of robust models in modulation recognition

no code implementations27 Mar 2021 Javier Maroto, Gérôme Bovet, Pascal Frossard

When analyzing these vulnerable models we found that adversarial perturbations do not shift the symbols towards the nearest classes in constellation space.

Image Classification

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

no code implementations7 Aug 2020 Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

The article at hand studies the recent growth of the device behavior fingerprinting field in terms of application scenarios, behavioral sources, and processing and evaluation techniques.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.