Eric Medvet

According to our database1, Eric Medvet authored at least 120 papers between 2006 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Optimizing the Sensory Apparatus of Voxel-Based Soft Robots Through Evolution and Babbling.
SN Comput. Sci., 2022

Evolving Modular Soft Robots without Explicit Inter-Module Communication using Local Self-Attention.
CoRR, 2022

Collective control of modular soft robots via embodied Spiking Neural Cellular Automata.
CoRR, 2022

Less is More: A Call to Focus on Simpler Models in Genetic Programming for Interpretable Machine Learning.
CoRR, 2022

On the Schedule for Morphological Development of Evolved Modular Soft Robots.
Proceedings of the Genetic Programming - 25th European Conference, 2022

One-Shot Learning of Ensembles of Temporal Logic Formulas for Anomaly Detection in Cyber-Physical Systems.
Proceedings of the Genetic Programming - 25th European Conference, 2022

2021
Automatic Search-and-Replace From Examples With Coevolutionary Genetic Programming.
IEEE Trans. Cybern., 2021

Crowded Environment Navigation with NEAT: Impact of Perception Resolution on Controller Optimization.
J. Intell. Robotic Syst., 2021

Criticality-Driven Evolution of Adaptable Morphologies of Voxel-Based Soft-Robots.
Frontiers Robotics AI, 2021

Crossing the Reality Gap: A Survey on Sim-to-Real Transferability of Robot Controllers in Reinforcement Learning.
IEEE Access, 2021

Characterization of Modeling Errors Affecting Performances of a Robotics Deep Reinforcement Learning Controller in a Sim-to-Real Transfer.
Proceedings of the 44th International Convention on Information, 2021

Model learning with personalized interpretability estimation (ML-PIE).
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

On the effects of pruning on evolved neural controllers for soft robots.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Biodiversity in evolved voxel-based soft robots.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Beyond Body Shape and Brain: Evolving the Sensory Apparatus of Voxel-Based Soft Robots.
Proceedings of the Applications of Evolutionary Computation, 2021

2020
Specializing Context-Free Grammars With a (1 + 1)-EA.
IEEE Trans. Evol. Comput., 2020

Weighted Hierarchical Grammatical Evolution.
IEEE Trans. Cybern., 2020

2D-VSR-Sim: A simulation tool for the optimization of 2-D voxel-based soft robots.
SoftwareX, 2020

Visualizing the outcome of dynamic analysis of Android malware with VizMal.
J. Inf. Secur. Appl., 2020

Genetic programming in the twenty-first century: a bibliometric and content-based analysis from both sides of the fence.
Genet. Program. Evolvable Mach., 2020

Interactive example-based finding of text items.
Expert Syst. Appl., 2020

2D-VSR-Sim: an Optimization-friendly Simulator of 2-D Voxel-based Soft Robots.
CoRR, 2020

Evolutionary optimization of sliding contact positions in powered floor systems for mobile robots.
Autom., 2020

Learning a Formula of Interpretability to Learn Interpretable Formulas.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020

Mosaic Images Segmentation using U-net.
Proceedings of the 9th International Conference on Pattern Recognition Applications and Methods, 2020

Investigating Similarity Metrics for Convolutional Neural Networks in the Case of Unstructured Pruning.
Proceedings of the Pattern Recognition Applications and Methods, 2020

On the Similarity between Hidden Layers of Pruned and Unpruned Convolutional Neural Networks.
Proceedings of the 9th International Conference on Pattern Recognition Applications and Methods, 2020

Speeding-up pruning for Artificial Neural Networks: Introducing Accelerated Iterative Magnitude Pruning.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Evolution of distributed neural controllers for voxel-based soft robots.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Exploring the Potential of GPT-2 for Generating Fake Reviews of Research Papers.
Proceedings of the Fuzzy Systems and Data Mining VI, 2020

Evolutionary Optimization of Graphs with GraphEA.
Proceedings of the AIxIA 2020 - Advances in Artificial Intelligence, 2020

2019
Designing automatically a representation for grammatical evolution.
Genet. Program. Evolvable Mach., 2019

Enterprise wi-fi: we need devices that are secure by default.
Commun. ACM, 2019

Multi-level diversity promotion strategies for Grammar-guided Genetic Programming.
Appl. Soft Comput., 2019

Communication-based cooperative tasks: how the language expressiveness affects reinforcement learning.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Automatic Translation of Spatio-Temporal Logics to Streaming-Based Monitoring Applications for IoT-Equipped Autonomous Agents.
Proceedings of the 6th International Workshop on Middleware and Applications for the Internet of Things, 2019

An analysis of dimensionality reduction techniques for visualizing evolution.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Active Learning of Predefined Models for Information Extraction: Selecting Regular Expressions from Examples.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Design of Powered Floor Systems for Mobile Robots with Differential Evolution.
Proceedings of the Applications of Evolutionary Computation, 2019

2018
Active Learning of Regular Expressions for Entity Extraction.
IEEE Trans. Cybern., 2018

Unveiling evolutionary algorithm representation with DU maps.
Genet. Program. Evolvable Mach., 2018

Observing the Population Dynamics in GE by means of the Intrinsic Dimension.
CoRR, 2018

Evil twins and WPA2 Enterprise: A coming security disaster?
Comput. Secur., 2018

GOMGE: Gene-Pool Optimal Mixing on Grammatical Evolution.
Proceedings of the Parallel Problem Solving from Nature - PPSN XV, 2018

VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Back To The Basics: Security of Software Downloads for Smart Objects.
Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good, 2018

Selfish vs. global behavior promotion in car controller evolution.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Exploring the application of GOMEA to bit-string GE.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

On the Automatic Design of a Representation for Grammar-Based Genetic Programming.
Proceedings of the Genetic Programming - 21st European Conference, 2018

Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning.
Proceedings of the Risks and Security of Internet and Systems, 2018

(In)Secure Configuration Practices of WPA2 Enterprise Supplicants.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Detection of Obfuscation Techniques in Android Applications.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A Language for UAV Traffic Rules in an Urban Environment and Decentralized Scenario.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

The DU map: a visualization to gain insights into genotype-phenotype mapping and diversity.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Evolvability in grammatical evolution.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

An effective diversity promotion mechanism in grammatical evolution.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Hierarchical grammatical evolution.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Road Traffic Rules Synthesis Using Grammatical Evolution.
Proceedings of the Applications of Evolutionary Computation - 20th European Conference, 2017

A Comparative Analysis of Dynamic Locality and Redundancy in Grammatical Evolution.
Proceedings of the Genetic Programming - 20th European Conference, 2017

2016
Correction to "Inference of Regular Expressions for Text Extraction from Examples".
IEEE Trans. Knowl. Data Eng., 2016

Inference of Regular Expressions for Text Extraction from Examples.
IEEE Trans. Knowl. Data Eng., 2016

An Architecture for Anonymous Mobile Coupons in a Large Network.
J. Comput. Networks Commun., 2016

Can a Machine Replace Humans in Building Regular Expressions? A Case Study.
IEEE Intell. Syst., 2016

Predicting the effectiveness of pattern-based entity extractor inference.
Appl. Soft Comput., 2016

"Best Dinner Ever!!!": Automatic Generation of Restaurant Reviews with LSTM-RNN.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

A Language and an Inference Engine for Twitter Filtering Rules.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Active learning approaches for learning regular expressions with genetic programming.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Syntactical Similarity Learning by Means of Grammatical Evolution.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016

Computer vision for the blind: A dataset for experiments on face detection and recognition.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

Computer Vision for the Blind: A Comparison of Face Detectors in a Relevant Scenario.
Proceedings of the Smart Objects and Technologies for Social Good, 2016

Understanding Needs, Identifying Opportunities: ICT in the View of Universal Design.
Proceedings of the Smart Objects and Technologies for Social Good, 2016

Segmentation of Mosaic Images Based on Deformable Models Using Genetic Algorithms.
Proceedings of the Smart Objects and Technologies for Social Good, 2016

On the Automatic Construction of Regular Expressions from Examples (GP vs. Humans 1-0).
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Exploring the Usage of Topic Modeling for Android Malware Static Analysis.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Data Quality Challenge: Toward a Tool for String Processing by Examples.
ACM J. Data Inf. Qual., 2015

On the Assessment of Segmentation Methods for Images of Mosaics.
Proceedings of the VISAPP 2015, 2015

Detecting Android malware using sequences of system calls.
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

Image processing issues in a social assistive system for the blind.
Proceedings of the 9th International Symposium on Image and Signal Processing and Analysis, 2015

Detecting Anomalies in Embedded Computing Systems via a Novel HMM-Based Machine Learning Approach.
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015

Evolutionary Learning of Syntax Patterns for Genic Interaction Extraction.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Learning Text Patterns Using Separate-and-Conquer Genetic Programming.
Proceedings of the Genetic Programming - 18th European Conference, 2015

Evolutionary Inference of Attribute-Based Access Control Policies.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2015

An Author Profiling Approach Based on Language-dependent Content and Stylometric Features.
Proceedings of the Working Notes of CLEF 2015, 2015

An Author Verification Approach Based on Differential Features: Notebook for PAN at CLEF 2015.
Proceedings of the Working Notes of CLEF 2015, 2015

Towards More Natural Social Interactions of Visually Impaired Persons.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2015

Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Semisupervised Wrapper Choice and Generation for Print-Oriented Documents.
IEEE Trans. Knowl. Data Eng., 2014

Bibliometric Evaluation of Researchers in the Internet Age.
Inf. Soc., 2014

Automatic Synthesis of Regular Expressions from Examples.
Computer, 2014

Compressing Regular Expression Sets for Deep Packet Inspection.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014

Publication Venue Recommendation Based on Paper Abstract.
Proceedings of the 26th IEEE International Conference on Tools with Artificial Intelligence, 2014

Playing regex golf with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse Dynamics.
Proceedings of the Ninth International Conference on Availability, 2014

Detection of Malicious Web Pages Using System Calls Sequences.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Citation Counts and Evaluation of Researchers in the Internet Age.
CoRR, 2013

A novel estimation methodology for tracheal pressure in mechanical ventilation control.
Proceedings of the 8th International Symposium on Image and Signal Processing and Analysis, 2013

Automatic string replace by examples.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Brand-Related Events Detection, Classification and Summarization on Twitter.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Recording and Replaying Navigations on AJAX Web Sites.
Proceedings of the Web Engineering - 12th International Conference, 2012

Automatic generation of regular expressions from examples with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

A look at hidden web pages in Italian public administrations.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
A probabilistic approach to printed document understanding.
Int. J. Document Anal. Recognit., 2011

Anomaly detection techniques for a web defacement monitoring service.
Expert Syst. Appl., 2011

Automatic Face Annotation in News Images by Mining the Web.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Rainbow crypt: Securing communication through a protected visual channel.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

GP-Based Electricity Price Forecasting.
Proceedings of the Genetic Programming - 14th European Conference, 2011

2010
A Framework for Large-Scale Detection of Web Site Defacements.
ACM Trans. Internet Techn., 2010

Open world classification of printed invoices.
Proceedings of the 2010 ACM Symposium on Document Engineering, 2010

2009
The Reaction Time to Web Site Defacements.
IEEE Internet Comput., 2009

2008
Visual-similarity-based phishing detection.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Camera-based Scrolling Interface for Hand-held Devices.
Proceedings of the 12th International Conference on Information Visualisation, 2008

2007
On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements.
Proceedings of the Detection of Intrusions and Malware, 2007

Detection of Web Defacements by means of Genetic Programming.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Automatic Integrity Checks for Remote Web Resources.
IEEE Internet Comput., 2006


  Loading...