Ponències/Comunicacions de congressos
Recent Submissions
-
Link inference attacks in vertical federated graph learning
(Institute of Electrical and Electronics Engineers (IEEE), 2024)
Conference report
Restricted access - publisher's policyVertical Federated Graph Learning (VFGL) is a novel privacy-preserving technology that enables entities to collaborate on training Machine Learning (ML) models without exchanging their raw data. In VGFL, some of the entities ... -
Label-aware aggregation for improved federated learning
(Institute of Electrical and Electronics Engineers (IEEE), 2023)
Conference lecture
Restricted access - publisher's policyFederated Averaging (FedAvg) is the most common aggregation method used in Federated learning, which performs a weighted averaging of the updates based on the sizes of the individual datasets of each client. A raising ... -
Node injection link stealing attack
(Springer, 2024)
Conference lecture
Restricted access - publisher's policyWe present a stealthy privacy attack that exposes links in Graph Neural Networks (GNNs). Focusing on dynamic GNNs, we propose to inject new nodes and attach them to a particular target node to infer its private edge ... -
Diseño de diferentes clases de usuarios en un servicio video-streaming adaptativo
(2007)
Conference report
Open AccessThe provision of end-to-end Quality of Service (QoS) for multimedia services over IP-based networks is already an open issue. To achieve this goal, service providers need to manage Service Level Agreements (SLAs), which ... -
On the necessity of counterfeits and deletions for continuous data publishing
(Springer, 2024)
Conference lecture
Restricted access - publisher's policyContinuous data publishing is the scenario where a dataset is published at different times, while it changes between publications through insertion of new tuples, reinsertions, deletions and updates of previously published ... -
Analytical definition of SLA parameters in a video-on-demand service
(IEEE / Hung-Keng Pung, Francis Bu-Sung Lee, Chen-Kong Tham, Saira Kuttan, 2004)
Conference report
Open AccessIn this work we propose to use a set of equations to calculate some user's level parameters expressed in the Service Level Agreements (SLA). As example, we particularize these expressions for a Video-on-Demand service (VoD) ... -
Modelling an adaptive-rate video-streaming service using Markov-rewards models
(Institute of Electrical and Electronics Engineers (IEEE), 2004)
Conference report
Open AccessNowadays dynamic service management frameworks are proposed to ensure end-to-end QoS. To achieve this goal, it is necessary to manage Service Level Agreements (SLA) which specify quality parameters of the services operation ... -
Design of an adaptive-rate video-streaming service with different classes of users
(Springer, 2006)
Conference report
Open AccessThe provision of end-to-end Quality of Service (QoS) for multimedia services over IP-based networks is already an open issue. To achieve this goal, service providers need to manage Service Level Agreements (SLAs), which ... -
Diseño de esquema de carga/descarga para vehículos eléctricos en entornos urbanos
(2023)
Conference report
Open AccessCon la creciente popularidad de los vehículos eléctricos la necesidad de estrategias de carga eficientes y efectivas se ha vuelto primordial. La programación de la carga de los vehículos eléctricos puede reducir los costos ... -
Composition in differential privacy for general granularity notions
(Institute of Electrical and Electronics Engineers (IEEE), 2024)
Conference lecture
Open AccessThe composition theorems of differential privacy (DP) allow data curators to combine different algorithms to obtain a new algorithm that continues to satisfy DP. However, new granularity notions (i.e., neighborhood ... -
SLOW-based pseudonym changing schemes for location privacy in vehicular networks
(Association for Computing Machinery (ACM), 2023)
Conference report
Restricted access - publisher's policyLocation privacy is a critical aspect of vehicular networks. Privacy schemes adopt diverse methods to minimize vehicle traceability. These schemes include pseudonym periodical changes, silent periods, context-based approaches, ... -
GNB-RPL: Gaussian Naïve Bayes for RPL routing protocol in smart grid communications
(Association for Computing Machinery (ACM), 2023)
Conference report
Restricted access - publisher's policyThis study investigates the potential of utilizing the Gaussian Naive Bayes algorithm for enhancing the performance of the Wireless Smart Grid Networks (WSGNs). We have incorporated the Gaussian Naive Bayes algorithm into ...