Search Results - "Faustini, Pedro"
-
1
Fake news detection in multiple platforms and languages
Published in Expert systems with applications (15-11-2020)“…•We perform a comparison of fake news detection in three languages and two platforms.•We employ platform/language independent feature sets.•Our results show…”
Get full text
Journal Article -
2
Using NFV and Reinforcement Learning for Anomalies Detection and Mitigation in SDN
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Computer networks are subject to several anomalies, which leads to the necessity of techniques to coordinate detection and mitigation to keep the network…”
Get full text
Conference Proceeding -
3
Suspiciousness of Adversarial Texts to Human
Published 06-10-2024“…Adversarial examples pose a significant challenge to deep neural networks (DNNs) across both image and text domains, with the intent to degrade model…”
Get full text
Journal Article -
4
Fake News Detection Using One-Class Classification
Published in 2019 8th Brazilian Conference on Intelligent Systems (BRACIS) (01-10-2019)“…Fake news have attracted attention of general public because of the influence they can exert on important activities of society, such as elections. Efforts…”
Get full text
Conference Proceeding -
5
NFRs early estimation through software metrics
Published in 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2015)“…We propose the use of regression analysis to generate accurate predictive models for physical metrics using design metrics as input. We validate our approach…”
Get full text
Conference Proceeding -
6
Answering Unanswered Questions through Semantic Reformulations in Spoken QA
Published 27-05-2023“…Spoken Question Answering (QA) is a key feature of voice assistants, usually backed by multiple QA systems. Users ask questions via spontaneous speech which…”
Get full text
Journal Article -
7
Directional Privacy for Deep Learning
Published 09-11-2022“…Differentially Private Stochastic Gradient Descent (DP-SGD) is a key method for applying privacy in the training of deep learning models. It applies isotropic…”
Get full text
Journal Article -
8
IDT: Dual-Task Adversarial Attacks for Privacy Protection
Published 28-06-2024“…Natural language processing (NLP) models may leak private information in different ways, including membership inference, reconstruction or attribute inference…”
Get full text
Journal Article -
9
Bayes' capacity as a measure for reconstruction attacks in federated learning
Published 19-06-2024“…Within the machine learning community, reconstruction attacks are a principal attack of concern and have been identified even in federated learning, which was…”
Get full text
Journal Article -
10
Follow-on Question Suggestion via Voice Hints for Voice Assistants
Published 25-10-2023“…The adoption of voice assistants like Alexa or Siri has grown rapidly, allowing users to instantly access information via voice search. Query suggestion is a…”
Get full text
Journal Article -
11
Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software
Published in 2014 IEEE International Conference on Software Maintenance and Evolution (01-09-2014)“…This paper proposes a strategy to assist the designer in evaluating the impact of a design choice with respect to the non-functional requirements in embedded…”
Get full text
Conference Proceeding -
12
Early Estimation of NFRs for Embedded System Using Design Metrics
Published in 2014 Brazilian Symposium on Computing Systems Engineering (01-11-2014)“…In this paper, an approach is proposed to assist the designer in evaluating the impact of a design choice with respect to the Non-Functional Requirements…”
Get full text
Conference Proceeding