Luis Antonio Ribot García
YOU?
Author Swipe
View article: Amplifying Our Voices: Fostering Advocacy in Infectious Diseases Fellowship
Amplifying Our Voices: Fostering Advocacy in Infectious Diseases Fellowship Open
Advocacy has long been at the core of the infectious diseases (ID) field, with clinicians and researchers advocating to ensure patients can access the care they need on an individual and global scale. The Infectious Diseases Society of Ame…
View article: Emerging trends in multi-channel systems: Applications and challenges in communication networks
Emerging trends in multi-channel systems: Applications and challenges in communication networks Open
View article: Administrative management and budget execution in a public university
Administrative management and budget execution in a public university Open
View article: HealthSec '24: First ACM CCS Workshop on Cybersecurity in Healthcare
HealthSec '24: First ACM CCS Workshop on Cybersecurity in Healthcare Open
View article: Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE)
Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE) Open
To transform cybersecurity and privacy research into a highly integrated, community-wide effort, researchers need a common, rich, representative research infrastructure that meets the needs across all members of the research community, and…
View article: Knowledge Management in Local Governments: A Boost or a Brake on Productivity?
Knowledge Management in Local Governments: A Boost or a Brake on Productivity? Open
This study analyzes the impact of knowledge management on the productivity of a local government, to determine whether it acts as a boost or a brake on institutional performance. Using a quantitative approach, a non-experimental design and…
View article: Privacy Policies on the Fediverse: A Case Study of Mastodon Instances
Privacy Policies on the Fediverse: A Case Study of Mastodon Instances Open
Free and open source social platform software has dramatically lowered the barrier to entry for anyone to set up and administer their own social network. This new population of social network administrators thus assume data management resp…
View article: Towards Cross-Physical-Domain Threat Inference for Industrial Control System Defense Adaptation
Towards Cross-Physical-Domain Threat Inference for Industrial Control System Defense Adaptation Open
View article: SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices
SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices Open
Safety-critical cyber-physical systems, such as autonomous vehicles and medical devices, are often driven by notions of state provided by sensor information translated through embedded firmware. This sensor pipeline is often a fragmented s…
View article: Continuous Stress Monitoring for Healthcare Workers: Evaluating Generalizability Across Real-World Datasets
Continuous Stress Monitoring for Healthcare Workers: Evaluating Generalizability Across Real-World Datasets Open
Healthcare workers are constantly exposed to high-stress working conditions that increase burnout rates and lower the quality of patient care. While it is vital to continuously monitor healthcare worker stress to provide necessary interven…
View article: Eagle: End-to-end Deep Reinforcement Learning based Autonomous Control of PTZ Cameras
Eagle: End-to-end Deep Reinforcement Learning based Autonomous Control of PTZ Cameras Open
Existing approaches for autonomous control of pan-tilt-zoom (PTZ) cameras use multiple stages where object detection and localization are performed separately from the control of the PTZ mechanisms. These approaches require manual labels a…
View article: Inertial Navigation on Extremely Resource-Constrained Platforms: Methods, Opportunities and Challenges
Inertial Navigation on Extremely Resource-Constrained Platforms: Methods, Opportunities and Challenges Open
Inertial navigation provides a small footprint, low-power, and low-cost pathway for localization in GPS-denied environments on extremely resource-constrained Internet-of-Things (IoT) platforms. Traditionally, application-specific heuristic…
View article: X-CHAR
X-CHAR Open
End-to-end deep learning models are increasingly applied to safety-critical human activity recognition (HAR) applications, e.g., healthcare monitoring and smart home control, to reduce developer burden and increase the performance and robu…
View article: PAtt: Physics-based Attestation of Control Systems
PAtt: Physics-based Attestation of Control Systems Open
Ensuring the integrity of embedded programmable logic controllers (PLCs) is critical for safe operation of industrial con-trol systems. In particular, a cyber-attack could manipulatecontrol logic running on the PLCs to bring the process of…
View article: DeepProbCEP: A neuro-symbolic approach for complex event processing in adversarial settings
DeepProbCEP: A neuro-symbolic approach for complex event processing in adversarial settings Open
Detecting complex events from subsymbolic data streams (such as images, audio recordings or videos) is a challenging problem, as traditional symbolic approaches cannot be used to process subsymbolic data, and neural-only approaches usually…
View article: TinyOdom
TinyOdom Open
Deep inertial sequence learning has shown promising odometric resolution over model-based approaches for trajectory estimation in GPS-denied environments. However, existing neural inertial dead-reckoning frameworks are not suitable for rea…
View article: Aerogel: Lightweight Access Control Framework for WebAssembly-Based Bare-Metal IoT Devices.
Aerogel: Lightweight Access Control Framework for WebAssembly-Based Bare-Metal IoT Devices. Open
Application latency requirements, privacy, and security concerns have naturally pushed computing onto smartphone and IoT devices in a decentralized manner. In response to these demands, researchers have developed micro-runtimes for WebAsse…
View article: PERFUME
PERFUME Open
Algorithmic identification is the crux for several binary analysis applications, including malware analysis, vulnerability discovery, and embedded firmware reverse engineering. However, data-driven and signature-based approaches often brea…
View article: Using DeepProbLog to perform Complex Event Processing on an Audio Stream
Using DeepProbLog to perform Complex Event Processing on an Audio Stream Open
In this paper, we present an approach to Complex Event Processing (CEP) that is based on DeepProbLog. This approach has the following objectives: (i) allowing the use of subsymbolic data as an input, (ii) retaining the flexibility and modu…
View article: DeepSQA
DeepSQA Open
The ubiquity of mobile, wearable, and IoT devices enhances humans with a network of environmental sensors. These devices capture raw, time-series measurements of scalar physical phenomena. To transform the data into human-digestible repres…
View article: SecDeep
SecDeep Open
There is an increasing emphasis on securing deep learning (DL) inference pipelines for mobile and IoT applications with privacy-sensitive data. Prior works have shown that privacy-sensitive data can be secured throughout deep learning infe…
View article: Neuroplex
Neuroplex Open
Despite the remarkable success in a broad set of sensing applications, state-of-the-art deep learning techniques struggle with complex reasoning tasks across a distributed set of sensors. Unlike recognizing transient complex activities (e.…
View article: UWHear
UWHear Open
An ability to detect, classify, and locate complex acoustic events can be a powerful tool to help smart systems build context-awareness, e.g., to make rich inferences about human behaviors in physical spaces. Conventional methods to measur…
View article: An Experimentation Platform for Explainable Coalition Situational Understanding
An Experimentation Platform for Explainable Coalition Situational Understanding Open
We present an experimentation platform for coalition situational understanding research that highlights capabilities in explainable artificial intelligence/machine learning (AI/ML) and integration of symbolic and subsymbolic AI/ML approach…
View article: Proceedings 36th International Conference on Logic Programming (Technical Communications)
Proceedings 36th International Conference on Logic Programming (Technical Communications) Open
Bitcoin is one of the first decentralized, peer to peer, payment systems based on the so-called Proof-of-Work (PoW).PoW is an algorithm that requires the computation of a hard function in order to gain access to a resource but, at the same…
View article: A Hybrid Neuro-Symbolic Approach for Complex Event Processing
A Hybrid Neuro-Symbolic Approach for Complex Event Processing Open
Training a model to detect patterns of interrelated events that form situations of interest can be a complex problem: such situations tend to be uncommon, and only sparse data is available. We propose a hybrid neuro-symbolic architecture b…
View article: I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors
I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors Open
The increasing ubiquity of low-cost wireless sensors has enabled users to easily deploy systems to remotely monitor and control their environments. However, this raises privacy concerns for third-party occupants, such as a hotel room guest…
View article: Control Behavior Integrity for Distributed Cyber-Physical Systems
Control Behavior Integrity for Distributed Cyber-Physical Systems Open
Cyber-physical control systems, such as industrial control systems (ICS), are increasingly targeted by cyberattacks. Such attacks can potentially cause tremendous damage, affect critical infrastructure or even jeopardize human life when th…
View article: España y la guerra de los treinta años
España y la guerra de los treinta años Open
El estudio tiene su origen en la conferencia inaugural encargada por los organizadores del congreso, y se centra en el análisis del importante papel desempeñado por la Monarquía de España en la Guerra de los Treinta Años. Plantea una perio…
View article: RemedioT
RemedioT Open
The increasing complexity and ubiquity of using IoT devices exacerbate the existing programming challenges in smart environments such as smart homes, smart buildings, and smart cities. Recent works have focused on detecting conflicts for t…