Héctor Pérez-Meana
YOU?
Author Swipe
View article: Dynamic Facial Expression Recognition Using Geometric and Deep Features
Dynamic Facial Expression Recognition Using Geometric and Deep Features Open
This work proposes an approach for dynamic facial expression recognition to recognize emotions in controlled environments, due to its computational efficiency. The CREMA-D and RAVDESS datasets are used, from which sequences of 100 frames p…
View article: Multi-Corpus Benchmarking of CNN and LSTM Models for Speaker Gender and Age Profiling
Multi-Corpus Benchmarking of CNN and LSTM Models for Speaker Gender and Age Profiling Open
Speaker profiling systems are often evaluated on a single corpus, which complicates reliable comparison. We present a fully reproducible evaluation pipeline that trains Convolutional Neural Networks (CNNs) and Long-Short Term Memory (LSTM)…
View article: Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning Open
In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. Traditional static and dynamic analysis techniques, although widely used, often exhibit high false-positive ra…
View article: Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems
Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems Open
Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify p…
View article: Sign Language Interpreting System Using Recursive Neural Networks
Sign Language Interpreting System Using Recursive Neural Networks Open
According to the World Health Organization (WHO), 5% of people around the world have hearing disabilities, which limits their capacity to communicate with others. Recently, scientists have proposed systems based on deep learning techniques…
View article: AISMSNet: Advanced Image Splicing Manipulation Identification Based on Siamese Networks
AISMSNet: Advanced Image Splicing Manipulation Identification Based on Siamese Networks Open
The exponential surge in specialized image editing software has intensified visual forgery, with splicing attacks emerging as a popular forgery technique. In this context, Siamese neural networks are a remarkable tool in pattern identifica…
View article: A New Class of Edge Filter Based on a Cross-correlation-like Equation Derived from Fractional Calculus Principles
A New Class of Edge Filter Based on a Cross-correlation-like Equation Derived from Fractional Calculus Principles Open
In this paper, we propose a new sliding window edge-oriented filter that computes the output pixels using a cross-correlation-like equation derived from the principles of fractional calculus (FC); thus, we call it the “fractional cross-cor…
View article: Non-attachment, Meaning in Life, and Self-Efficacy among Chinese Undergraduate and Graduate Students
Non-attachment, Meaning in Life, and Self-Efficacy among Chinese Undergraduate and Graduate Students Open
This study examined the relationship between non-attachment, meaning of life, and self-efficacy in 823 Chinese college students, using the Non-Attachment Scale (NAS-7), Meaning of Life Questionnaire (MLQ), and General Self-Efficacy Invento…
View article: Source Camera Linking Algorithm Based on the Analysis of Plain Image Zones
Source Camera Linking Algorithm Based on the Analysis of Plain Image Zones Open
This paper proposes an image linking scheme, where the plain zones of the image under analysis are used, which are detected using the Discrete Cosine Transform. Then, a Block Matching 3D denoising filter is used to reduce the additive nois…
View article: Perception of care and emotional impact of perinatal women during COVID-19: A multicenter study
Perception of care and emotional impact of perinatal women during COVID-19: A multicenter study Open
To evaluate in women in the perinatal period during COVID-19 the perception of the care received by the healthcare system, the prevalence and levels of anxiety and depression symptoms, the presence of post-traumatic stress, and its associa…
View article: Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks
Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks Open
The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellect…
View article: Fast Jukebox: Accelerating Music Generation with Knowledge Distillation
Fast Jukebox: Accelerating Music Generation with Knowledge Distillation Open
The Jukebox model can generate high-diversity music within a single system, which is achieved by using a hierarchical VQ-VAE architecture to compress audio in a discrete space at different compression levels. Even though the results are im…
View article: A Compact and High-Performance Acoustic Echo Canceller Neural Processor Using Grey Wolf Optimizer along with Least Mean Square Algorithms
A Compact and High-Performance Acoustic Echo Canceller Neural Processor Using Grey Wolf Optimizer along with Least Mean Square Algorithms Open
Recently, the use of acoustic echo canceller (AEC) systems in portable devices has significantly increased. Therefore, the need for superior audio quality in resource-constrained devices opens new horizons in the creation of high-convergen…
View article: Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management Open
A reversible data hiding in the encrypted domain (RDH-ED) aims to hide data within encrypted images, protecting its content, while allowing additional information to be distributed. This paper presents a complete separable RDH-ED scheme, w…
View article: ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning
ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning Open
In recent years, cybersecurity has been strengthened through the adoption of processes, mechanisms and rapid sources of indicators of compromise in critical areas. Among the most latent challenges are the detection, classification and erad…
View article: Applications of the Generalized Morse Wavelets: A Review
Applications of the Generalized Morse Wavelets: A Review Open
The study of signals, processes, and systems has motivated the development of different representations that can be used to analyze and understand them. Classical ways of studying the behavior of signals are the time domain and frequency d…
View article: Work Values and Stress Levels of Selected Displaced Filipino Workers of COVID-19 Pandemic
Work Values and Stress Levels of Selected Displaced Filipino Workers of COVID-19 Pandemic Open
<p>The economic crisis brought on by the COVID-19 Pandemic directly impacted the growing numbers of displaced workers in the Philippines. This scenario motivates the researchers to conduct this study which has the primary objective t…
View article: SOMN_IA: Portable and Universal Device for Real-Time Detection of Driver’s Drowsiness and Distraction Levels
SOMN_IA: Portable and Universal Device for Real-Time Detection of Driver’s Drowsiness and Distraction Levels Open
In this paper, we propose a portable device named SOMN_IA, to detect drowsiness and distraction in drivers. The SOMN_IA can be installed inside of any type of vehicle, and it operates in real time, alerting the dangerous state caused by dr…
View article: FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences
FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences Open
Most of the methods for real-time semantic segmentation do not take into account temporal information when working with video sequences. This is counter-intuitive in real-world scenarios where the main application of such methods is, preci…
View article: A Novel PSO-Based Adaptive Filter Structure with Switching Selection Criteria for Active Noise Control
A Novel PSO-Based Adaptive Filter Structure with Switching Selection Criteria for Active Noise Control Open
In recent years, active noise control (ANC) systems have been widely used in advanced electronic appliances. Nowadays, several authors use gradient-optimization algorithms since they can be easily implemented in these devices. However, the…
View article: Ensemble Learning Approach With Class Rotation for Three-Dimensional Classification on Direction-of-Arrival Estimation
Ensemble Learning Approach With Class Rotation for Three-Dimensional Classification on Direction-of-Arrival Estimation Open
Over the past decade, neural networks have been widely used for direction-of-arrival (DoA) estimation owing to their high accuracy in noisy and reverberant environments. Classes of singular-model classifiers generally correspond to discret…
View article: A Dual Adaptive Filter Spike-Based Hardware Architecture for Implementation of a New Active Noise Control Structure
A Dual Adaptive Filter Spike-Based Hardware Architecture for Implementation of a New Active Noise Control Structure Open
Presently, the technology development trend of active noise control (ANC) systems is focused on implementing advanced adaptive filters in resource-constrained electronic appliances. Recently, several authors have proved that the use of two…
View article: FASSD-Net Model for Person Semantic Segmentation
FASSD-Net Model for Person Semantic Segmentation Open
This paper proposes the use of the FASSD-Net model for semantic segmentation of human silhouettes, these silhouettes can later be used in various applications that require specific characteristics of human interaction observed in video seq…
View article: A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT Open
At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and s…
View article: Seam Carving based visible watermarking robust to removal attacks
Seam Carving based visible watermarking robust to removal attacks Open
Visible watermarking offers direct copyright protection to the naked eye using visible pattern superimposed in the host image. However, due to their exposure, the watermark pattern becomes an easy target to remove by malicious entities tha…
View article: Statistical Assessment of Discrimination Capabilities of a Fractional Calculus Based Image Watermarking System for Gaussian Watermarks
Statistical Assessment of Discrimination Capabilities of a Fractional Calculus Based Image Watermarking System for Gaussian Watermarks Open
In this paper, we explore the advantages of a fractional calculus based watermarking system for detecting Gaussian watermarks. To reach this goal, we selected a typical watermarking scheme and replaced the detection equation set by another…
View article: JPEG Images Encryption Scheme Using Elliptic Curves and A New S-Box Generated by Chaos
JPEG Images Encryption Scheme Using Elliptic Curves and A New S-Box Generated by Chaos Open
This paper proposes a new symmetric encryption system based on an elliptical curve and chaos, where the encryption is done in a single block and runs for 14 rounds. Here, the 15 encryption keys have the same size as the image and are gener…
View article: Simultaneous Audio Encryption and Compression Using Compressive Sensing Techniques
Simultaneous Audio Encryption and Compression Using Compressive Sensing Techniques Open
The development of coding schemes with the capacity to simultaneously encrypt and compress audio signals is a subject of active research because of the increasing necessity for transmitting sensitive audio information over insecure communi…