Presentación de PowerPoint

Transcripción

Presentación de PowerPoint
Computational Intelligence
at Society’s Service
Who we are
Origin
An active and young group based on
the University of Deusto since 1999.
7
9
11
5
4
Team
PhDs
Researchers
Dissertations in progress
Doctoral grants
Grade students
What we do
Information Security
Computational Intelligence
Natural Language Processing
BOTNET
Security
Intelligence
MALWARE
VULNERABILITIES
DEFECT DETECTION
DIGITAL IDENTITY
DEFECT PREVENTION
BIOINFORMATICS
ELECTRONIC FRAUD
Language
ARTIFICIAL VISION
NANOMATERIALS
SYSTEM OPTIMIZATION
SOCIAL MEDIA MONITORS
RECOMENDATION SYSTEMS TIMES SERIES ANALYSIS
DECISSION SUPPORT MACHINES
SPAM/PHISHING
REPUTATION SYSTEMS
CHILD PROTECTION
AUTHORSHIP RECOGNITION
OPINION MINING
CONTENT FILTERING
Scientific Impact
Opcode Sequences as
Representation of Executables for
Data-mining-based Unknown
Malware Detection
JCR: Q1
Clasificación supervisada de
paquetes procedentes de una
botnet HTTP
CORE: C
Intelligence
Model Predictive Control on High
Precision Foundries, a New
Approach for the Prediction Phase
JCR: Q4
Word Sense Disambiguation for
Spam Filtering
JCR: Q2
Enhanced Image Segmentation
using Quality Threshold
Clustering for Surface Defect
Categorisation in High Precision
Automotive Castings
DBLP Indexed
Language
Enhanced Topic-based Vector
Space Model for Semantics-aware
Spam Filtering
JCR: Q1
Automatic Categorisation of
Comments in Social News
Websites
JCR: Q1
Negobot: A conversational agent
based on game theory for the
detection of paedophile behaviour
CORE: B
Security
MAMA: Manifest Analysis for
Malware Detection in Android
JCR: Q3
Last update: September 2013
Scientific Impact
Security
A TOTAL OF 45 PUBLICATIONS
Intelligence
A TOTAL OF 35 PUBLICATIONS
Language
A TOTAL OF 16 PUBLICATIONS
Last update: September 2013
13 indexed articles in the JCR
6 in the first quartile of its category
8 book chapters
2 edited books
75 articles in international conferences
5 with RANK A in the ERA/CORE index
27 with RANK B in the ERA/CORE index
7 theses defended
11 theses registered
Last update: September 2013
CENIT SEGUR@: Seguridad
y Confianza en la Sociedad
de la Información
APPSEYE. Herramienta de
monitorización y análisis
de mercados de
aplicaciones para
dispositivos móviles
SARA: Sistema Avanzado
de Resguardo contra
Amenazas online
NEOBIO: Nuevos productos
para la salud reproductiva
y prenatal
ReTTO-PLATFORM:
Dispositivo de
optimización en la
dosificación de tracolimus
en pacientes
trasplantados de riñón
LIPOuniversal: Plataforma
para el diagnóstico
universal de la
hipercolesterolemia
familiar
ESIDE-MetalBAYES:
Sistema inteligente de
control de proceso para
optimización de
parámetros de fabricación
PROMEC: Predicción de
propiedades mecánicas en
materiales reforzados con
nanopartículas
IPRO: Intelligent Foundry
Business Process
Marsol: Modelos de
propagación de malware a
través de redes sociales
on-line
Nemesis: Mineria de datos
Eficiente sobre un SIstema
de Supercomputación
NEGOBOT: Análisis
conversacional para
protección de la infancia
en Redes Sociales
BrainWave: Sistema de
supercomputación basado
en tecnología GPGPU
SAREAK: Sare-Sozialetan
Erreputazioa eta
Aurriskuak Kudeatzen,
Sistema Inteligente de
Gestión de Seguridad.
TRUSTED BANKING: Secure,
Trust and Resillence
Platform for Banking
Applied Research
Last update: September 2013
23
8
20
5
Applied Research
5
Last update: September 2013
FutureInternet: A
future internet
Programme
Software seguro para
estándar VozIP
integrado con
certificados digitales
software y hardware
ESIDE-QoMed: Análisis
Bayesiano de
parámetros de calidad
de servicio en la
transmisión de
contenidos multimedia
sobre redes IP
Applied Research
Last update: September 2013
11
Applied Research
Last update: September 2013
Transference to society:
some successful examples
Foundry
Reduce faulty parts
Reduce the waste of the
process
Reduce costs
of the process
Specific goals
Optimize the management
of raw materials
Foundry: optimising processes
Operations
Management Engine
Pre-processor
Real Time Data
Evidence Reader
Predictive models
Predictor1
Evaluator
Predictor2
Average of probabilities
Predictor3
Product of probabilities
Predictor4
Majority voting
Predictor5
Minimum probability
Predictor6
Maximum probability
Deviations control
(similar to anomaly
detection)
Optimal Path
[Defect + normality]
Feedback to the plant
Environmental
information
Decision
Support
System
More than 9 out of 10 pieces
that used to be faulty, they are not anymore
GPGPU
GPGPU: interested partners
BRAINWAVE
Weather forecast
Grid
Computing
and climate research
MolecularMachine
models,Learning
quantum
Physics
simulations
mechanics, Bioinformatics
Market and finances
Audio Signal Processing
prediction applications
Information Security
Computer applications
Vision
Scientific
Information Security
Worms
Virus
Botnets
Spyware
Trojans
Information Security: platforms
We focus our research in securing every possible platform
Know-how
in global industry of
Information Security
Child protection
The reality:
Child protection: Negobot
Our solution:
A conversational agent looking for pederasty tendencies
Architecture:
International impact:
More than 25 countries interested in our chatbot
Why we do it
We could say…
We are going to save the world!
Or…
Our systems will be
the smartest ones!
Well… of course
we are trying
But focusing on what is
really important
To be at
Society’s Service
«Sapientia melior auro, ideo conserva secura»

Documentos relacionados