presentación de powerpoints3lab.deusto.es/wp-content/uploads/2014/02/deustotech-computing-e… ·...

36
Computational Intelligence at Society’s Service

Upload: vuongtuyen

Post on 19-Sep-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Computational Intelligence

at Society’s Service

Who we are

An active and young group based on

the University of Deusto since 1999.

Origin

7 PhDs

9 Researchers

11 Dissertations in progress

5 Doctoral grants

4 Grade students

Team

What we do

Information Security

Computational Intelligence

Natural Language Processing

Security

Intelligence

Language

BIOINFORMATICS

ARTIFICIAL VISION

NANOMATERIALSRECOMENDATION SYSTEMS

BOTNET

MALWARE

SPAM/PHISHING

VULNERABILITIES

SYSTEM OPTIMIZATION

REPUTATION SYSTEMS

AUTHORSHIP RECOGNITION

OPINION MINING

SOCIAL MEDIA MONITORS

DECISSION SUPPORT MACHINES

TIMES SERIES ANALYSIS

CONTENT FILTERING

CHILD PROTECTION

ELECTRONIC FRAUD

DIGITAL IDENTITY

DEFECT DETECTION

DEFECT PREVENTION

Enhanced Topic-based Vector

Space Model for Semantics-aware

Spam Filtering

JCR: Q1

Automatic Categorisation of

Comments in Social News

Websites

JCR: Q1

Negobot: A conversational agent

based on game theory for the

detection of paedophile behaviour

CORE: B

Word Sense Disambiguation for

Spam Filtering

JCR: Q2

Model Predictive Control on High

Precision Foundries, a New

Approach for the Prediction Phase

JCR: Q4

Enhanced Image Segmentation

using Quality Threshold

Clustering for Surface Defect

Categorisation in High Precision

Automotive Castings

DBLP Indexed

MAMA: Manifest Analysis for

Malware Detection in Android

JCR: Q3

Opcode Sequences as

Representation of Executables for

Data-mining-based Unknown

Malware Detection

JCR: Q1

Clasificación supervisada de

paquetes procedentes de una

botnet HTTP

CORE: C

Scientific Impact

Security

Intelligence

Language

Last update: September 2013

A TOTAL OF 16 PUBLICATIONS

A TOTAL OF 35 PUBLICATIONS

A TOTAL OF 45 PUBLICATIONS

Scientific Impact

Security

Intelligence

Language

Last update: September 2013

13 indexed articles in the JCR

6 in the first quartile of its category

8 book chapters

75 articles in international conferences

5 with RANK A in the ERA/CORE index

27 with RANK B in the ERA/CORE index

7 theses defended

11 theses registered

2 edited books

Last update: September 2013

Applied Research

CENIT SEGUR@: Seguridad

y Confianza en la Sociedad

de la Información

NEOBIO: Nuevos productos

para la salud reproductiva

y prenatal

ESIDE-MetalBAYES:

Sistema inteligente de

control de proceso para

optimización de

parámetros de fabricación

Marsol: Modelos de

propagación de malware a

través de redes sociales

on-line

Nemesis: Mineria de datos

Eficiente sobre un SIstema

de Supercomputación

PROMEC: Predicción de

propiedades mecánicas en

materiales reforzados con

nanopartículas

IPRO: Intelligent Foundry

Business Process

APPSEYE. Herramienta de

monitorización y análisis

de mercados de

aplicaciones para

dispositivos móviles

ReTTO-PLATFORM:

Dispositivo de

optimización en la

dosificación de tracolimus

en pacientes

trasplantados de riñón

SARA: Sistema Avanzado

de Resguardo contra

Amenazas online

LIPOuniversal: Plataforma

para el diagnóstico

universal de la

hipercolesterolemia

familiar

BrainWave: Sistema de

supercomputación basado

en tecnología GPGPU

NEGOBOT: Análisis

conversacional para

protección de la infancia

en Redes Sociales

SAREAK: Sare-Sozialetan

Erreputazioa eta

Aurriskuak Kudeatzen,

Sistema Inteligente de

Gestión de Seguridad.

TRUSTED BANKING: Secure,

Trust and Resillence

Platform for Banking

Last update: September 2013

Applied ResearchLast update: September 2013

23 8 20 5 5

Applied Research

Software seguro para

estándar VozIP

integrado con

certificados digitales

software y hardware

FutureInternet: A

future internet

Programme

ESIDE-QoMed: Análisis

Bayesiano de

parámetros de calidad

de servicio en la

transmisión de

contenidos multimedia

sobre redes IP

Last update: September 2013

Applied ResearchLast update: September 2013

11

Transference to society:

some successful examples

Foundry

Reduce costs

of the process

Reduce the waste of the

process

Reduce faulty parts

Optimize the management

of raw materials

Specific goals

Foundry: optimising processes

Management Engine

EvaluatorPredictor1Evid

en

ce R

ead

er

Pre

-pro

cesso

r

Average of probabilities

Product of probabilities

Majority voting

Minimum probability

Maximum probability

Predictor2

Predictor3

Predictor4

Predictor5

Predictor6

Optimal Path

[Defect + normality]

Deviations control

(similar to anomaly

detection)

Decision Support System

Feedback to the plant

Operations

Real Time Data

Predictive models

Environmental

information

More than 9 out of 10 pieces that used to be faulty, they are not anymore

GPGPU

GPGPU: interested partners

BRAINWAVE

Grid Computing

Physics simulations

Audio Signal Processing

Scientific applications

Weather forecastand climate research

Molecular models, quantum mechanics, Bioinformatics

Market and financesprediction applications

Computer Vision

Machine Learning

Information Security

Information Security

Virus

Spyware

Botnets

Trojans

Worms

Information Security: platforms

We focus our research in securing every possible platform

Know-how

in global industry of

Information Security

Child protection

The reality:

Child protection: Negobot

Our solution:

A conversational agent looking for pederasty tendencies

Architecture:

International impact:

More than 25 countries interested in our chatbot

Why we do it

We could say…

We are going to save the world!

Or…

Our systems will be

the smartest ones!

Well… of course

we are trying

But focusing on what is

really important

To be at

Society’s Service

«Sapientia melior auro, ideo conserva secura»