Skip to main content

Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025. Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025.

Journal: Journal of Systems and Software, Volume 227, September 2025, 112448 Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: Recently software security community has exploited text mining and deep learning methods to identify vulnerabilities. To this end, the progress in the field of Natural Language Processing (NLP)…
Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025. Publications

Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025.

Journal: IEEE Network Magazine Authors: Luo T, Wang J, Yan Z, Gelenbe E. Abstract: The process of quantifying trust considers the factors that affect it, which can be applied to identify malicious behavior, reduce uncertainty, and facilitate decision-making. Traditional trust evaluation methods based on statistics and reasoning, rely heavily on domain…
Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. 2025. A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification. Applied Sciences 2025. Publications

Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. 2025. A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification. Applied Sciences 2025.

Journal: Applied Sciences Authors: Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. Abstract: As Information and Communication Technology (ICT) systems become increasingly complex, the need for adaptable and efficient security certification frameworks grows. This paper introduces a flexible security evaluation methodology designed to serve as the…
Deé-Lukács A, Földvári A, Pataricza A. 2025. Evaluation of Embedded AI Through Model Difference Analysis. 32nd Minisymposium Publications

Deé-Lukács A, Földvári A, Pataricza A. 2025. Evaluation of Embedded AI Through Model Difference Analysis. 32nd Minisymposium

Conference: 32th Minisymposium of the Department of Artificial Intelligence and Systems Engineering of the Budapest University of Technology and Economics, 3-4. February 2025, Budapest, Hungary Authors: Deé-Lukács A, Földvári A, Pataricza A. Abstract: The growing reliance on embedded AI components in critical systems demands robust mechanisms for explainability and reliability.…
Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors. Publications

Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors.

Journal: Sensors Authors: Gelenbe E. Abstract: Edge computing systems must offer low latency at low cost and low power consumption for sensors and other applications, including the IoT, smart vehicles, smart homes, and 6G. Thus, substantial research has been conducted to identify optimum task allocation schemes in this context using…