Raúl Monroy
Orcid: 0000-0002-3465-995X
According to our database1,
Raúl Monroy
authored at least 94 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field.
Intell. Syst. Appl., March, 2024
Intell. Syst. Appl., 2024
Neural architecture search for image super-resolution: A review on the emerging state-of-the-art.
Neurocomputing, 2024
IEEE Access, 2024
Integrating Knowledge Graph Data with Large Language Models for Explainable Inference.
Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024
Surrogate Modeling for Efficient Evolutionary Multi-Objective Neural Architecture Search in Super Resolution Image Restoration.
Proceedings of the 16th International Joint Conference on Computational Intelligence, 2024
2023
Comparing Automated Machine Learning Against an Off-the-Shelf Pattern-Based Classifier in a Class Imbalance Problem: Predicting University Dropout.
IEEE Access, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the Mexican International Conference on Computer Science, 2023
2022
Knowl. Based Syst., 2022
A secure and robust indexing algorithm for distorted fingerprints and latent palmprints.
Expert Syst. Appl., 2022
A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities.
ACM Comput. Surv., 2022
2021
COARSE-EMOA: An indicator-based evolutionary algorithm for solving equality constrained multi-objective optimization problems.
Swarm Evol. Comput., 2021
The Integration of Protection, Restoration, and Adaptive Flow Redistribution in Building Resilient Networked Critical Infrastructures Against Intentional Attacks.
IEEE Syst. J., 2021
RootLogChain: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root.
Sensors, 2021
An ensemble of fingerprint matching algorithms based on cylinder codes and mtriplets for latent fingerprint identification.
Pattern Anal. Appl., 2021
Expert Syst. Appl., 2021
A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print.
Expert Syst. Appl., 2021
A Video Game-Crowdsourcing Approach to Discover a Player's Strategy for Problem Solution to Housing Development.
IEEE Access, 2021
An Indexing Algorithm Based on Clustering of Minutia Cylinder Codes for Fast Latent Fingerprint Identification.
IEEE Access, 2021
IEEE Access, 2021
2020
Comput. Secur., 2020
IEEE Access, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
A Pattern-Based Approach for Detecting Pneumatic Failures on Temporary Immersion Bioreactors.
Sensors, 2019
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.
Sensors, 2019
Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection.
Mach. Vis. Appl., 2019
Inf. Fusion, 2019
A survey on minutiae-based palmprint feature representations, and a full analysis of palmprint feature representation role in latent identification performance.
Expert Syst. Appl., 2019
Expert Syst. J. Knowl. Eng., 2019
A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation.
IEEE Access, 2019
DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2019
2018
IEEE Trans. Affect. Comput., 2018
Knowl. Based Syst., 2018
Some features speak loud, but together they all speak louder: A study on the correlation between classification error and feature usage in decision-tree classification ensembles.
Eng. Appl. Artif. Intell., 2018
Proceedings of the Advances in Soft Computing, 2018
2017
Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects.
Soft Comput., 2017
Knowl. Based Syst., 2017
Inf. Sci., 2017
Computación y Sistemas, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Ensemble of One-Class Classifiers for Personal Risk Detection Based on Wearable Sensor Data.
Sensors, 2016
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.
Sensors, 2016
CoRR, 2016
Maintaining strong mutual visibility of an evader moving over the reduced visibility graph.
Auton. Robots, 2016
2015
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks.
Sensors, 2015
Res. Comput. Sci., 2015
2014
The Windows-Users and -Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms.
Expert Syst. Appl., 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
2013
Es NP-completo calcular la comunidad entre los objetos sobre los que una colección de agentes ha realizado una acción.
Computación y Sistemas, 2013
2012
IEEE Trans. Syst. Man Cybern. Part C, 2012
2011
Proceedings of the Advances in Artificial Intelligence, 2011
Proceedings of the Digital Information Processing and Communications, 2011
2010
Proceedings of the Advances in Artificial Intelligence, 2010
Proceedings of the IEEE International Conference on Robotics and Automation, 2010
2009
Proceedings of the Foundations and Applications of Security Analysis, 2009
2008
Computación y Sistemas, 2008
A Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008
2007
Proceedings of the Computer Security, 2007
2006
Robotics Auton. Syst., 2006
Proceedings of the Workshop on Verification and Debugging, 2006
Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Toward Category-Level Object Recognition, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
2005
A Framework for Reactive Motion and Sensing Planning: A Critical Events-Based Approach.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals.
Proceedings of the Advances in Artificial Intelligence, 2004
Proceedings of the Advances in Web Intelligence, 2004
2003
Autom. Softw. Eng., 2003
On Automating the Formulation of Security Goals under the Inductive Approach.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003
2002
Proceedings of the MICAI 2002: Advances in Artificial Intelligence, 2002
2001
Proceedings of the Logic for Programming, 2001
2000
Proceedings of the MICAI 2000: Advances in Artificial Intelligence, 2000
The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000
1998
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998
Observant: An Annotated Term-Rewriting System for Deciding Observation Congruence.
Proceedings of the 13th European Conference on Artificial Intelligence, 1998
1997
1994
Proceedings of the Logic Programming and Automated Reasoning, 5th International Conference, 1994