- Advanced Malware Detection Techniques
- Web Application Security Vulnerabilities
- Security and Verification in Computing
- User Authentication and Security Systems
- Cryptography and Data Security
- RFID technology advancements
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Internet Traffic Analysis and Secure E-voting
- Access Control and Trust
- ECG Monitoring and Analysis
- Spam and Phishing Detection
- Geophysics and Gravity Measurements
- Robotics and Sensor-Based Localization
- Calibration and Measurement Techniques
- EEG and Brain-Computer Interfaces
- Satellite Image Processing and Photogrammetry
- Software Engineering Research
- Peer-to-Peer Network Technologies
- Astronomy and Astrophysical Research
- Biometric Identification and Security
- Cryptographic Implementations and Security
- Indoor and Outdoor Localization Technologies
- Gamma-ray bursts and supernovae
- Privacy, Security, and Data Protection
Halmstad University
2023-2025
Chalmers University of Technology
2018-2024
Universidad Carlos III de Madrid
2014-2023
University of Gothenburg
2017-2020
Universidad Complutense de Madrid
2016-2018
Universidad Politécnica de Madrid
2013
Abstract Large Language Models (LLMs) are a type of machine learning that handles wide range Natural Processing (NLP) scenarios. Recently, in December 2022, company called OpenAI released ChatGPT, tool that, within few months, became the most representative example LLMs, automatically generating unique and coherent text on many topics, summarising rewriting it, or even translating it to other languages. ChatGPT originated some controversy academia since students can generate for writing...
Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by scarcity resources WBAN devices usability restrictions imposed healthcare domain. In this paper, we describe architecture based on well-known publish-subscribe paradigm. We present two protocols for publishing data sending commands to sensor that guarantee confidentiality fine-grained access control. Both are recently proposed ciphertext policy...
Browser extensions boost the browsing experience by a range of features from automatic translation and grammar correction to password management, ad blocking, remote desktops. Yet power poses significant privacy security challenges because can be malicious and/or vulnerable. We observe that there are gaps in previous work on analyzing browser present systematic study attack entry points extension ecosystem. Our reveals novel stealing, traffic inter-extension attacks. Based combination static...
Browser extensions enable rich experience for the users of today's web.Being deployed with elevated privileges, are given power to overrule web pages.As a result, pages often seek detect installed extensions, sometimes benign adoption their behavior but as part privacy-violating user fingerprinting.Researchers have studied class attacks that allow detecting by probing Web Accessible Resources (WARs) via URLs include public extension IDs.Realizing privacy risks associated WARs, Firefox has...
MEGARA (Multi-Espectrógrafo en GTC de Alta Resolución para Astronomía) is an optical Integral-Field Unit (IFU) and Multi-Object Spectrograph (MOS) designed for the 10.4m telescope in La Palma that being built by a Consortium led UCM (Spain) also includes INAOE (Mexico), IAA-CSIC (Spain), UPM (Spain). The instrument currently finishing AIV will be sent to on November 2016 its on-sky commissioning April 2017. IFU fiber bundle (LCB) covers 12.5x11.3 arcsec2 with spaxel size of 0.62 arcsec while...
The proliferation of wearable and implantable medical devices has given rise to an interest in developing security schemes suitable for these systems the environment which they operate. One area that received much attention lately is use (human) biological signals as basis biometric authentication, identification generation cryptographic keys. heart signal (e.g., recorded electrocardiogram) been used by several researchers last few years. Specifically, so-called Inter-Pulse Intervals (IPIs),...
On June 25th 2017, the new intermediate-resolution optical IFU and MOS of 10.4-m GTC had its first light. As part tests carried out to verify performance instrument in two modes (IFU MOS) 18 spectral setups (identical number VPHs with resolutions R=6000-20000 from 0.36 1 micron) a astronomical objects were observed. These observations show that MEGARA@GTC is called fill niche high-throughput, intermediateresolution extremely-faint narrow-lined objects. Lyman-α absorbers, star-forming dwarfs...
MEGARA is the new generation IFU and MOS optical spectrograph built for 10.4m Gran Telescopio CANARIAS (GTC). The project was developed by a consortium led UCM (Spain) that also includes INAOE (Mexico), IAA-CSIC UPM (Spain). instrument arrived to GTC on March 28th 2017 successfully integrated commissioned at telescope from May August 2017. During on-sky commissioning we demonstrated powerful robust provides intermediate-to-high spectral resolutions RFWHM ~ 6,000, 12,000 20,000 an...
Abstract Browser extensions are small applications executed in the browser context that provide additional capabilities and enrich user experience while surfing web. The acceptance of current browsers is unquestionable. For instance, Chrome’s official extension repository has more than 63,000 extensions, with some them having 10M users. When installed, pushed into an internal queue within browser. order which each executes depends on a number factors, including their relative installation...
Password security relies heavily on the choice of password by user but also one-way hash functions used to protect stored passwords.To compensate for increased computing power attackers, modern like Argon2, have been made more complex in terms computational and memory requirements.Nowadays, computation such is performed usually server (or authenticator) instead client.Therefore, constrained Internet Things devices cannot use when authenticating users.Additionally, load may expose servers...
Abstract Cryptanalysis is the development and study of attacks against cryptographic primitives protocols. Many properties rely on difficulty generating an adversary who, given object sampled from one two classes, correctly distinguishes class used to generate that object. In case cipher suite distinguishing problem, classes are different primitives. this paper, we propose a methodology based machine learning automatically classifiers can be by solve any problem. We discuss assumptions,...
Browser extensions are popular web applications that users install in modern browsers to enrich the user experience on web.It is common for browser include static resources form of HTML, CSS, fonts, images, and JavaScript libraries.Unfortunately, state art each extension ships its own version a given resource.This paper presents DeDup.js, framework incorporates similarity analysis achieving two goals: detecting potentially malicious during approval process, an as input, DeDup.jsdiscovers...
Recent advances in natural language processing have increased interest automatic question generation, particularly education (e.g., math, biology, law, medicine, and languages) due to its efficiency assessing comprehension. Specifically, multiple-choice questions become popular, especially standardized proficiency tests. However, manually creating high-quality tests is time-consuming challenging. Distractor a critical aspect of creation, often overlooked, yet it plays crucial role test...
This paper presents the design, implementation and evaluation of waveSLAM, a low-cost mobile robot system that uses millimetre wave (mmWave) communication devices to enhance indoor mapping process targeting environments with reduced visibility or glass/mirror walls. A unique feature waveSLAM is it only leverages existing Commercial-Off-The-Shelf (COTS) hardware (Lidar mmWave radios) are mounted on robots improve accurate achieved optical sensors. The key intuition behind design while moves...