Alberto Huertas Celdrán
Orcid: 0000-0001-7125-1710
According to our database1,
Alberto Huertas Celdrán
authored at least 129 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Detection of Adversarial Attacks Using Deep Learning and Features Extracted From Interpretability Methods in Industrial Scenarios.
IEEE Access, 2025
2024
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice.
Wirel. Networks, November, 2024
Mitigating communications threats in decentralized federated learning through moving target defense.
Wirel. Networks, November, 2024
Privacy-preserving hierarchical federated learning with biosignals to detect drowsiness while driving.
Neural Comput. Appl., November, 2024
Data fusion in neuromarketing: Multimodal analysis of biosignals, lifecycle stages, current advances, datasets, trends, and challenges.
Inf. Fusion, May, 2024
Studying Drowsiness Detection Performance While Driving Through Scalable Machine Learning Models Using Electroencephalography.
Cogn. Comput., May, 2024
Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.
Appl. Intell., April, 2024
Future Gener. Comput. Syst., March, 2024
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification.
Future Gener. Comput. Syst., March, 2024
Single-board device individual authentication based on hardware performance and autoencoder transformer models.
Comput. Secur., February, 2024
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT.
IEEE Trans. Inf. Forensics Secur., 2024
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024
Expert Syst. Appl., 2024
Corrigendum to "Fedstellar: A platform for decentralized federated learning" [Expert Syst. Appl. 242 (2024) 122861].
Expert Syst. Appl., 2024
ProFe: Communication-Efficient Decentralized Federated Learning via Distillation and Prototypes.
CoRR, 2024
FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning.
CoRR, 2024
CoRR, 2024
GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware.
CoRR, 2024
Robust Federated Learning for execution time-based device model identification under label-flipping attack.
Clust. Comput., 2024
Array, 2024
A Systematic Literature Review of XR Interventions to Improve Motor Skills Development Among Autistic Children.
IEEE Access, 2024
SecBox: a Lightweight Data Mining Platform for Dynamic and Reproducible Malware Analysis.
Proceedings of the 11th IEEE Swiss Conference on Data Science, 2024
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls.
Proceedings of the IEEE Military Communications Conference, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the 20th International Conference on Network and Service Management, 2024
FEVER: Intelligent Behavioral Fingerprinting for Anomaly Detection in P4-Based Programmable Networks.
Proceedings of the Advanced Information Networking and Applications, 2024
Evaluating the impact of contextual information on the performance of intelligent continuous authentication systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios.
J. Inf. Secur. Appl., December, 2023
Comput. Secur., December, 2023
CGAPP: A continuous group authentication privacy-preserving platform for industrial scene.
J. Inf. Secur. Appl., November, 2023
Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges.
ACM Comput. Surv., November, 2023
Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning.
Comput. Commun., November, 2023
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers.
Internet Things, July, 2023
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios.
IET Inf. Secur., July, 2023
Int. J. Inf. Sec., June, 2023
Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks.
IEEE Internet Things J., May, 2023
Analyzing the impact of Driving tasks when detecting emotions through brain-computer interfaces.
Neural Comput. Appl., April, 2023
A methodology to identify identical single-board computers based on hardware behavior fingerprinting.
J. Netw. Comput. Appl., March, 2023
Sustain. Comput. Informatics Syst., January, 2023
Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
TemporalFED: Detecting Cyberattacks in Industrial Time-Series Data Using Decentralized Federated Learning.
CoRR, 2023
Single-board Device Individual Authentication based on Hardware Performance and Anomaly Detection for Crowdsensing Platforms.
CoRR, 2023
Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges.
IEEE Commun. Surv. Tutorials, 2023
Commun. ACM, 2023
Proceedings of the NOMS 2023, 2023
Proceedings of the NOMS 2023, 2023
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield.
Proceedings of the IEEE Military Communications Conference, 2023
Fedstellar: A Platform for Training Models in a Privacy-preserving and Decentralized Fashion.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
A Framework Quantifying Trustworthiness of Supervised Machine and Deep Learning Models.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023
2022
MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware.
Dataset, May, 2022
Spotting political social bots in Twitter: a dataset for the 2019 Spanish general election.
Dataset, May, 2022
Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices.
Proceedings of the Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 2022
IEEE Trans. Ind. Informatics, 2022
J. Netw. Syst. Manag., 2022
SAFECAR: A Brain-Computer Interface and intelligent framework to detect drivers' distractions.
Expert Syst. Appl., 2022
Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges.
ACM Comput. Surv., 2022
Comput. Stand. Interfaces, 2022
When Brain-Computer Interfaces Meet the Metaverse: Landscape, Demonstrator, Trends, Challenges, and Concerns.
CoRR, 2022
Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario.
CoRR, 2022
CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors.
CoRR, 2022
Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities.
Comput. Secur., 2022
Clust. Comput., 2022
A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios.
IEEE Access, 2022
SecRiskAI: a Machine Learning-Based Approach for Cybersecurity Risk Prediction in Businesses.
Proceedings of the 24th IEEE Conference on Business Informatics, 2022
Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Study of P300 Detection Performance by Different P300 Speller Approaches Using Electroencephalography.
Proceedings of the 16th IEEE International Symposium on Medical Information and Communication Technology, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 18th International Conference on Network and Service Management, 2022
2021
SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry.
Softw. Pract. Exp., 2021
S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information.
Sensors, 2021
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments.
Peer-to-Peer Netw. Appl., 2021
Towards the mitigation of distributed denial-of-service cyberbioattacks in bacteria-based biosensing systems.
Digit. Signal Process., 2021
Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology.
CoRR, 2021
Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized.
CoRR, 2021
Neuronal Jamming Cyberattack over Invasive BCI Affecting the Resolution of Tasks Requiring Visual Capabilities.
CoRR, 2021
Mitigation of cyber threats: Protection mechanisms in federated SDN/NFV infrastructures for 5G within FIRE+.
Concurr. Comput. Pract. Exp., 2021
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets.
IEEE Commun. Surv. Tutorials, 2021
AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning.
Comput. Secur., 2021
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the 12th International Conference on Ambient Systems, 2021
2020
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election.
IEEE Trans. Netw. Serv. Manag., 2020
Symmetry, 2020
A Scalable Architecture for the Dynamic Deployment of Multimodal Learning Analytics Applications in Smart Classrooms.
Sensors, 2020
Comput. Networks, 2020
IEEE Access, 2020
2019
Sensors, 2019
Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments.
Sensors, 2019
Dynamic network slicing management of multimedia scenarios for future remote healthcare.
Multim. Tools Appl., 2019
Policy-Based Management for Green Mobile Networks Through Software-Defined Networking.
Mob. Networks Appl., 2019
Dynamic management of a deep learning-based anomaly detection system for 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Cybersecurity in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges.
CoRR, 2019
IEEE Access, 2019
Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
2018
Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future.
Sustain. Comput. Informatics Syst., 2018
Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System.
Sensors, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
ICE++: Improving Security, QoS, and High Availability of Medical Cyber-Physical Systems through Mobile Edge Computing.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018
2017
Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets.
IEEE Internet Comput., 2017
IEEE Commun. Mag., 2017
Preserving patients' privacy in health scenarios through a multicontext-aware system.
Ann. des Télécommunications, 2017
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017
2016
SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications.
IEEE Syst. J., 2016
Design of a recommender system based on users' behavior and collaborative location and tracking.
J. Comput. Sci., 2016
Int. J. Inf. Sec., 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2014
Precise: Privacy-aware recommender based on context information for cloud service environments.
IEEE Commun. Mag., 2014
What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014