Borja Sanz

Orcid: 0000-0003-2039-7773

Affiliations:
  • University of Deusto, Bilbao, Spain (PhD 2012)


According to our database1, Borja Sanz authored at least 54 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep learning applications on cybersecurity: A practical approach.
Neurocomputing, January, 2024

2023
The disconnect between the goals of trustworthy AI for law enforcement and the EU research agenda.
AI Ethics, November, 2023

Let's do it right the first time: Survey on security concerns in the way to quantum software engineering.
Neurocomputing, June, 2023

Efficient Machine Learning on Edge Computing Through Data Compression Techniques.
IEEE Access, 2023

Discovering Mathematical Patterns Behind HIV-1 Genetic Recombination: A New Methodology to Identify Viral Features.
IEEE Access, 2023

Validating by Deep Learning an Efficient Method for Genomic Sequence Analysis: Genomic Spectrograms.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023

A Fuzzy Logic Ensemble Approach to Concept Drift Detection.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023

Bytecode-Based Android Malware Detection Applying Convolutional Neural Networks.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

2022
On the creation of a robotics software architecture for AI-based advanced applications.
Proceedings of the 27th IEEE International Conference on Emerging Technologies and Factory Automation, 2022

2021
Detecting malicious Android applications based on the network packets generated.
Neurocomputing, 2021

Quality assessment methodology based on machine learning with small datasets: Industrial castings defects.
Neurocomputing, 2021

PhrasIS: Phrase Inference and Similarity Benchmark.
Proceedings of the 16th International Conference on Soft Computing Models in Industrial and Environmental Applications, 2021

Optimizing Communication Data Streams in Edge Computing Systems Using Bayesian Algorithms.
Proceedings of the 16th International Conference on Soft Computing Models in Industrial and Environmental Applications, 2021

Content-Based Authorship Identification for Short Texts in Social Media Networks.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

Deep Learning Applications on Cybersecurity.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

Hybrid Deep Learning Approach for Efficient Outdoor Parking Monitoring in Smart Cities.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

A Repeated Mistake is a Choice: Considering Security Issues and Risks in Quantum Computing from Scratch.
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021

2020
Predicting Enamel Layer Defects in an Automotive Paint Shop.
IEEE Access, 2020

A Real Time Vision System Based on Deep Learning for Gesture Based Human Machine Interaction.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020

Effective Bin Picking Approach by Combining Deep Learning and Point Cloud Processing Techniques.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020

2019
Territorial innovation models: to be or not to be, that's the question.
Scientometrics, 2019

How IoT and computer vision could improve the casting quality.
Proceedings of the 9th International Conference on the Internet of Things, 2019

Network Traffic Analysis for Android Malware Detection.
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019

Surface Defect Modelling Using Co-occurrence Matrix and Fast Fourier Transformation.
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019

2017
Using Dalvik opcodes for malware detection on android.
Log. J. IGPL, 2017

An unsupervised approach to online noisy-neighbor detection in cloud data centers.
Expert Syst. Appl., 2017

2015
Negobot: Detecting paedophile activity with a conversational agent based on game theory.
Log. J. IGPL, 2015

Using Dalvik Opcodes for Malware Detection on Android.
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015

The Evolution of Permission as Feature for Android Malware Detection.
Proceedings of the International Joint Conference, 2015

2014
Study on the effectiveness of anomaly detection for spam filtering.
Inf. Sci., 2014

On the adoption of anomaly detection for packed executable filtering.
Comput. Secur., 2014

An Empirical Study on Word Sense Disambiguation for Adult Content Filtering.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Reversing the effects of tokenisation attacks against content-based spam filters.
Int. J. Secur. Networks, 2013

Collective classification for spam filtering.
Log. J. IGPL, 2013

Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013

Mama: manifest Analysis for Malware Detection in Android.
Cybern. Syst., 2013

Anomaly Detection Using String Analysis for Android Malware Detection.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Instance-based Anomaly Method for Android Malware Detection.
Proceedings of the SECRYPT 2013, 2013

MADS: Malicious Android Applications Detection through String Analysis.
Proceedings of the Network and System Security - 7th International Conference, 2013

JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Enhanced Topic-based Vector Space Model for semantics-aware spam filtering.
Expert Syst. Appl., 2012

Word sense disambiguation for spam filtering.
Electron. Commer. Res. Appl., 2012

PUMA: Permission Usage to Detect Malware in Android.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Countering entropy measure attacks on packed software detection.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the automatic categorisation of android applications.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Using opcode sequences in single-class learning to detect unknown malware.
IET Inf. Secur., 2011

Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Spam Filtering through Anomaly Detection.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Opcode-Sequence-Based Semi-supervised Unknown Malware Detection.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Enhancing scalability in anomaly-based email spam filtering.
Proceedings of the 8th Annual Collaboration, 2011

2010
Idea: Opcode-Sequence-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010


  Loading...