Publications (2,871)

¹ Publicaciones consideradas como producción del grupo

View referenced research data.

filter_list

2025

  1. A Lightweight Mechanism for Dynamic Secret Sharing of Private Data by Constrained Devices

    IEEE Internet of Things Journal, Vol. 12, Núm. 13, pp. 22725-22732

  2. A cluster of patterns for trusted computing

    International Journal of Information Security, Vol. 24, Núm. 1

  3. A decision framework for privacy-preserving synthetic data generation

    Computers and Electrical Engineering, Vol. 126

  4. A machine learning-based clinical prediction rule for adverse outcomes in multimorbid patients

    Intelligent Medicine, Vol. 5, Núm. 4, pp. 300-309

  5. A soft sensor open-source methodology for inexpensive monitoring of water quality: A case study of NO3− concentrations

    Journal of Computational Science, Vol. 85

  6. Addressing significant challenges for animal detection in camera trap images: a novel deep learning-based approach

    Scientific Reports, Vol. 15, Núm. 1

  7. Advancing soil biology research: Empowering European databases with ontological frameworks for enhanced data integration of soil biodiversity data

    Ecological Informatics, Vol. 91

  8. An End-to-End Digital Twin Framework for Dynamic Traffic Analytics in O-RAN

    IEEE Transactions on Network and Service Management

  9. Analysis of Transferable Adversarial Evasion Attack Detection in IoT and Industrial ADS

    IEEE Open Journal of the Computer Society

  10. Automatic Proof Generation: Fine-tuning and RAG in Reasoner vs. Math LLMs

    Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering

  11. Benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains

    Lecture Notes in Computer Science

  12. Big Data-driven MLOps workflow for annual high-resolution land cover classification models

    Future Generation Computer Systems, Vol. 163

  13. Blockchain-Based Multi-Signature System for Critical Scenarios

    Proceedings of the International Conference on Security and Cryptography