Narrow your search

Library

KU Leuven (45)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

VIVES (2)

VUB (2)

AP (1)

EhB (1)

KBR (1)

More...

Resource type

dissertation (44)

book (3)

digital (1)


Language

English (35)

Dutch (13)


Year
From To Submit

2024 (8)

2023 (4)

2022 (6)

2021 (5)

2020 (6)

More...
Listing 1 - 10 of 48 << page
of 5
>>
Sort by

Book
Workshop proceedings of the 11th International Conference on Intelligent Environments
Authors: ---
ISBN: 1614995303 9781614995302 9781614995296 Year: 2015 Publisher: Amsterdam

Loading...
Export citation

Choose an application

Bookmark

Abstract


Dissertation
Support for context-driven applications in ambient intelligence environments
Authors: ---
ISBN: 9789460180941 Year: 2009 Publisher: Heverlee Katholieke Universiteit Leuven. Faculteit Ingenieurswetenschappen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Omwille van de steeds vernieuwende ontwikkelingen op het gebied van draadloze communicatie en sensor technologie hebben sinds de jaren '90 contextgedreven toepassingen meer en meer aandacht gekregen en dit heeft geleid tot nieuwe computing paradigma's die luisteren naar de namen Ubiquitous and Pervasive Computing en Ambient Intelligence. Nieuwe applicaties zijn op de hoogte van de context van hun gebruiker en passen zich hieraan automatisch aan. Men zegt dat dergelijke applicaties contextbewust zijn. Hiermee bedoelt men dat dergelijke applicaties relevante informatie over de situatie van de gebruiker en zijn omgeving gebruiken, zoals zijn huidige locatie en tijdstip, maar ook de activiteiten die op dat ogenblik uitgevoerd worden en gebruikersvoorkeuren die hier aan gekoppeld zijn.De ontwikkeling van contextbewuste applicaties die draaien in zeer dynamische omgevingen en die zich aanpassen aan de veranderende behoeften van de gebruikers, blijft een complexe en foutgevoelige taak. Om deze situatie te verhelpen, is dit proefschrift gericht op het verstrekken van middleware ondersteuning voor de ontwikkeling van contextbewuste applicaties in een Ambient Intelligence (AmI) omgeving. De voornaamste doelstellingen zijn het verschaffen van modelleerabstracties voor contextinformatie en toepassingen, en middleware ondersteuning voor het behandelen van contextinformatie en het aanpassen van applicaties aan deze context. Door het beheer van contextinformatie te delegeren naar de middleware verminderen we de ontwikkeltijd die nodig is om contextbewust gedrag door de applicatie te realiseren.Het proefschrift bevat verscheidene onderzoeksbijdragen. Ten eerste, omdat contextbewuste toepassingen informatie nodig hebben om hun gedrag te bepalen en om te beslissen met wie samen te werken, presenteert deze thesis abstracties om context te modelleren zodat elke applicatie deze op dezelfde manier interpreteert. Deze abstracties omvatten semantische, ruimtelijke, temporele aspecten en eveneens manieren om contextambiguiteit uit te sluiten. Ten tweede voorzien we middleware-ondersteuning die gemeenschappelijke functionaliteit implementeert voor het beheren en verwerken van contextinformatie. Het encapsuleert deze functies als modulaire bouwstenen die kunnen worden geactiveerd wanneer deze nodig zijn. Deze bouwstenen zijn verantwoordelijk voor de verwerving van de contextinformatie uit verschillende bronnen, de verwerking en de persistentie ervan. Ten derde leveren we ondersteuning voor contextgedreven aanpassing van mobiele diensten gebaseerd op modelleerabstracties die zowel functionele als niet-functionele aspecten van contextbewuste applicaties beschrijven. Ten vierde presenteert dit proefschrift algoritmen en protocollen om contextinformatie te distribueren van en naar relevante toepassingen die actief zijn in mobiele ad-hoc netwerken, evenals mechanismen voor de contextgedreven ontdekking, selectie en het gebruik van externe applicaties. Door het delen van contextinformatie in het netwerk kunnen externe toepassingen profiteren van de context die zij zelf niet kunnen waarnemen.Het proefschrift presenteert real-world toepassingen en case studies die de implementatie van de middleware en de onderliggende algoritmen en mechanismen evalueren, en die het proces en de problemen in verband met het ontwerpen van contextbewuste toepassingen illustreren.


Digital
Ambient Intelligence - Software and Applications : 2nd International Symposium on Ambient Intelligence (ISAmI 2011)
Authors: --- ---
ISBN: 9783642199370 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Ambient Intelligence - Software and Applications : 2nd International Symposium on Ambient Intelligence (ISAmI 2011)
Authors: --- --- ---
ISBN: 9783642199370 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

ISAmI is the International Symposium on Ambient Intelligence, and aims to bring together researchers from various disciplines that are interested in all aspects of Ambient Intelligence. The symposium provides a forum to present and discuss the latest results, innovative projects, new ideas and research directions, and to review current trends in this area. This volume presents the papers that have been accepted for the 2011 edition, both for the main event and workshop. The ISAmI workshop WoRIE promises to be a very interesting event that complements the regular program with an emerging topic on reliability of intelligent environments


Book
Ambient intelligence - software and applications : 2nd International Symposium on Ambient Intelligence (ISAmI 2011)
Authors: --- --- ---
ISBN: 3642199364 3642199372 Year: 2011 Publisher: Heidelberg [Germany] : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ISAmI is the International Symposium on Ambient Intelligence, and aims to bring together researchers from various disciplines that are interested in all aspects of Ambient Intelligence. The symposium provides a forum to present and discuss the latest results, innovative projects, new ideas and research directions, and to review current trends in this area. This volume presents the papers that have been accepted for the 2011 edition, both for the main event and workshop. The ISAmI workshop WoRIE promises to be a very interesting event that complements the regular program with an emerging topic on reliability of intelligent environments.


Dissertation
Comparison between classic algorithms and agent based approaches to solve the graph coloring problem.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Het testen of programma's single assignment zijn.
Authors: --- ---
Year: 2002 Publisher: Leuven K.U.Leuven. Faculteit Toegepaste wetenschappen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Dissertation
Applied deep learning in security and privacy
Authors: --- --- ---
Year: 2022 Publisher: Leuven KU Leuven. Faculty of Engineering Science

Loading...
Export citation

Choose an application

Bookmark

Abstract

Today's digital society is threatened by evermore sophisticated cyber attacks. One of the drivers behind this phenomenon is the advances in Artificial Intelligence (AI), which empower attackers to perform automated analysis of victim systems. Thankfully, AI can also be leveraged to upgrade defensive systems to match the unprecedented speed and scale of attacks. This duality of use motivates comprehensive research into and scientific understanding of both offensive and defensive applications of AI in cybersecurity. In this dissertation, we investigate deep learning as a compelling data-driven AI technique in the realm of network security and privacy. These domains deal with network traffic characterized by overwhelming volumes, dynamic nature, and low interpretability by human analysts. Hence, we focus on applying deep learning techniques to automatically derive high-level representations from network traffic for offensive and defensive approaches. The overarching objective is then to assess general applicability, advantages, and possible drawbacks of deep neural networks applied to security and privacy. In the first part of this dissertation, we research side-channel traffic analysis attacks on Tor, a popular privacy-enhancing technology on the web. As a first contribution, we develop deep learning techniques to deanonymize encrypted Tor traffic automatically. Our results, for the first time, obviated the need for manually engineering traffic features, as required by prior website fingerprinting attacks. This work has proven to be a game changer in this area, leading to further active development of deep learning-based website fingerprinting attacks and more robust defenses. As a second contribution, we propose a more realistic data collection setup to diminish timing bias when modeling so-called end-to-end traffic confirmation attacks on Tor in a lab environment. These results show that deep neural networks, now the established state-of-the-art approach for traffic analysis on Tor, silently memorize artifacts in data, which may cause a drastic overestimation of attack performance. We develop a general scientific methodology for replicating and comparing attacks while considering the non-determinism and variability of deep neural networks. In the second part of this dissertation, we investigate the promises and pitfalls of deep learning for defensive applications in network intrusion detection. First, we comprehensively overview the foundations, recent advances, and open challenges for data-driven network intrusion detection. Next, we present an empirical analysis of the applicability and reliability of deep neural networks as a stand-alone mechanism for analyzing raw traffic and detecting malicious or suspicious behaviors. These results highlight some of the inherent critical drawbacks of applying deep neural networks to real-world defensive applications.In summary, our contributions and resulting insights provide a solid ground for further scientific advances in data-driven security and privacy research while promoting a holistic view of the decision-making capacities of deep learning.

Keywords


Dissertation
Securing self-sovereign identity to prevent impersonation of digital identity

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this thesis we present Trustworthy SSI, an extension to self-sovereign identity (SSI) that aims to prevent digital identity impersonation. The need for digital identity has increased significantly in the last decade, but most identity management systems today lack user ownership and control. SSI is a new paradigm for decentralized identity management that aims to resolve these issues. It puts the user in full control of his identity without being dependent on a single trusted third party by using Distributed Ledger Technology such as the blockchain and public key cryptography. But as with digital identity in general, it faces the challenge of theft and fraud which can lead to impersonation. Proving legitimate ownership of a digital identity is hard, since it is difficult to detect whether an identity is stolen or shared, or if it is used by the legitimate owner. Trustworthy SSI addresses this problem by adding a specialized verifiable credential issuer to the SSI architecture. Its responsibility is to authenticate entities via password or behavioral authentication and issue verifiable credentials proving the legitimate ownership of a digital identity. We design and analyze Trustworthy SSI and show the necessary conditions where this successfully prevents impersonation. To validate our solution we apply the STRIDE and LINDDUN analysis tools to SSI and Trustworthy SSI for evaluating security and privacy respectively. STRIDE indicated the impersonation problem of SSI and that Trustworthy SSI solves this under certain conditions. It also showed that Trustworthy SSI introduces extra vulnerabilities because of the need to put trust in sensors to provide behaviometrics for the verifiable credential issuer. LINDDUN indicated non-repudiable linkability and non-repudiation of identity information and it showed that no additional privacy issues are introduced by the Trustworthy SSI extension.

Keywords


Dissertation
Morphed face generation using GANs

Loading...
Export citation

Choose an application

Bookmark

Abstract

Automatic border control systems have recently been shown to be vulnerable to a morphing attack. It attacks the authentication process by creating face images that can be used to match multiple people. This can then be used to create a passport that is valid for two or more individuals. Current methods to generate these morphs have been shown to have several problems: They are (1) very easy to identify using specialized detectors and (2) only work when there is a high similarity between the two input faces. Our goal is to find a new generation method that does not suffer from these shortcomings. To do this we explore generating morphs using generative adversarial networks. First we create an overview of the conditional neural network designs used for image generation. For each we discuss the core idea behind it and its advantages and disadvantages. We then work out two of these designs for the application of morph generation. Finally we compare their performance to the current state of the art of morph generation. To do so we introduce a new evaluation methodology that tests both the quality and morph similarity with human and automatic evaluation methods. Our approach achieves the same automated match rate of 60% compared to existing techniques, but results in morphs that are visually a better split between the inputs. The downside however is that our method has more artifacting. We conclude that generative adversarial neural networks show potential for morph generation, but miss a good way to teach the network about the similarity between two faces, which directly results in poorer quality morphs.

Keywords

Listing 1 - 10 of 48 << page
of 5
>>
Sort by