Raúl Monroy

Orcid: 0000-0002-3465-995X

According to our database1, Raúl Monroy authored at least 119 papers between 1994 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Public opinion and emotional discourse: a study of YouTube comments on Mexican news in 2024.
Int. J. Data Sci. Anal., June, 2026

A multibiometric system based on finger photo and palm photo.
Multim. Tools Appl., February, 2026

PFPINet: An End-to-End Network for Partial Finger Photo Identification.
IEEE Trans. Biom. Behav. Identity Sci., January, 2026

Evolutionary Neural Architecture Search for Super-Resolution: Benchmarking SynFlow and model-based predictors.
Swarm Evol. Comput., 2026

An explainable autoencoder integrating regression and classification trees for anomaly detection.
Expert Syst. Appl., 2026

Minutiae-based palm photo recognition using deep neural networks.
Eng. Appl. Artif. Intell., 2026

2025
A Unified Framework for Segmentation, Scaling, and Indexing of Contactless Fingerprints.
IEEE Trans. Biom. Behav. Identity Sci., October, 2025

Can Artificial Intelligence Write Like Borges? An Evaluation Protocol for Spanish Microfiction.
CoRR, June, 2025

Online Social Support Detection in Spanish Social Media Texts.
CoRR, February, 2025

Advanced Machine Learning Techniques for Social Support Detection on Social Media.
CoRR, January, 2025

Spherical model for Minimalist Machine Learning paradigm in handling complex databases.
Frontiers Artif. Intell., 2025

Resilient facility location optimization under failure scenarios using NSGA-III: A multi-objective approach for enhanced system robustness.
Expert Syst. Appl., 2025

Emphasizing the Early Phases of the Software Development Process Before Deploying Smart Contracts.
IEEE Access, 2025

New Evaluation Method for Fuzzy Cluster Validity Indices.
IEEE Access, 2025

Beyond Performance: Designing a Super-Resolution Architecture Search Space and a Hybrid Multi-Objective Approach for Neural Architecture Optimization.
IEEE Access, 2025

Improving Identification by Removing Obstructive Minutiae From Latent Fingerprints.
IEEE Access, 2025

Comparative Analysis of Performance Predictors in Multi-objective Neural Architecture Search for Single Image Super-Resolution: XGBoost Regressor and SynFlow.
Proceedings of the Computational Intelligence - 17th International Joint Conference, 2025

2024
A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field.
Intell. Syst. Appl., March, 2024

LLAMA Assisted Nutritional Recipe Suggestions: Integrating the Dietary Quality Index for Health Conscious Cooking.
Res. Comput. Sci., 2024

Enhancing latent palmprints using frequency domain analysis.
Intell. Syst. Appl., 2024

Neural architecture search for image super-resolution: A review on the emerging state-of-the-art.
Neurocomputing, 2024

Botnet Identification on Twitter: A Novel Clustering Approach Based on Similarity.
IEEE Access, 2024

Integrating Knowledge Graph Data with Large Language Models for Explainable Inference.
Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024

Surrogate Modeling for Efficient Evolutionary Multi-Objective Neural Architecture Search in Super Resolution Image Restoration.
Proceedings of the 16th International Joint Conference on Computational Intelligence, 2024

2023
Comparing Automated Machine Learning Against an Off-the-Shelf Pattern-Based Classifier in a Class Imbalance Problem: Predicting University Dropout.
IEEE Access, 2023

An Experimental Protocol for Neural Architecture Search in Super-Resolution.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Zero-Knowledge Proofs for Questionnaire Result Verification in Smart Contracts.
Proceedings of the Mexican International Conference on Computer Science, 2023

2022
FT4cip: A new functional tree for classification in class imbalance problems.
Knowl. Based Syst., 2022

A secure and robust indexing algorithm for distorted fingerprints and latent palmprints.
Expert Syst. Appl., 2022

A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities.
ACM Comput. Surv., 2022

2021
COARSE-EMOA: An indicator-based evolutionary algorithm for solving equality constrained multi-objective optimization problems.
Swarm Evol. Comput., 2021

The Integration of Protection, Restoration, and Adaptive Flow Redistribution in Building Resilient Networked Critical Infrastructures Against Intentional Attacks.
IEEE Syst. J., 2021

RootLogChain: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root.
Sensors, 2021

An ensemble of fingerprint matching algorithms based on cylinder codes and mtriplets for latent fingerprint identification.
Pattern Anal. Appl., 2021

The adaptable Pareto set problem for facility location: A video game approach.
Expert Syst. Appl., 2021

A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print.
Expert Syst. Appl., 2021

A Video Game-Crowdsourcing Approach to Discover a Player's Strategy for Problem Solution to Housing Development.
IEEE Access, 2021

An Indexing Algorithm Based on Clustering of Minutia Cylinder Codes for Fast Latent Fingerprint Identification.
IEEE Access, 2021

A Review and Experimental Comparison of Multivariate Decision Trees.
IEEE Access, 2021

2020
A one-class classification approach for bot detection on Twitter.
Comput. Secur., 2020

An Explainable Artificial Intelligence Model for Clustering Numerical Databases.
IEEE Access, 2020

Blockchain and off-chain: A Solution for Audit Issues in Supply Chain Systems.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
A Pattern-Based Approach for Detecting Pneumatic Failures on Temporary Immersion Bioreactors.
Sensors, 2019

New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.
Sensors, 2019

Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection.
Mach. Vis. Appl., 2019

Fusing pattern discovery and visual analytics approaches in tweet propagation.
Inf. Fusion, 2019

A survey on minutiae-based palmprint feature representations, and a full analysis of palmprint feature representation role in latent identification performance.
Expert Syst. Appl., 2019

Cluster validation in clustering-based one-class classification.
Expert Syst. J. Knowl. Eng., 2019

A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation.
IEEE Access, 2019

DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks.
IEEE Access, 2019

Contrast Pattern-Based Classification for Bot Detection on Twitter.
IEEE Access, 2019

Classification Based on Multivariate Contrast Patterns.
IEEE Access, 2019

Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2019

2018
FiToViz: A Visualisation Approach for Real-Time Risk Situation Awareness.
IEEE Trans. Affect. Comput., 2018

Cluster validation using an ensemble of supervised classifiers.
Knowl. Based Syst., 2018

Some features speak loud, but together they all speak louder: A study on the correlation between classification error and feature usage in decision-tree classification ensembles.
Eng. Appl. Artif. Intell., 2018

An Approach Based on Contrast Patterns for Bot Detection on Web Log Files.
Proceedings of the Advances in Soft Computing, 2018

2017
Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects.
Soft Comput., 2017

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.
Sensors, 2017

PBC4cip: A new contrast pattern-based classifier for class imbalance problems.
Knowl. Based Syst., 2017

Online personal risk detection based on behavioural and physiological patterns.
Inf. Sci., 2017

A Model Checker for the Verification of Browser Based Protocols.
Computación y Sistemas, 2017

2016
Temporal and Spatial Locality: An Abstraction for Masquerade Detection.
IEEE Trans. Inf. Forensics Secur., 2016

Ensemble of One-Class Classifiers for Personal Risk Detection Based on Wearable Sensor Data.
Sensors, 2016

Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.
Sensors, 2016

On the Phase Transition of Finding a Biclique in a larger Bipartite Graph.
CoRR, 2016

Maintaining strong mutual visibility of an evader moving over the reduced visibility graph.
Auton. Robots, 2016

2015
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks.
Sensors, 2015

Hacia la construcción de una herramienta para la creación de bitácoras para Android.
Res. Comput. Sci., 2015

2014
The Windows-Users and -Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms.
Expert Syst. Appl., 2014

Towards a Masquerade Detection System Based on User's Tasks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
Hacia la detección de impostores mediante un modelo basado en tareas.
Res. Comput. Sci., 2013

WUIL: una base de datos para probar mecanismos de detección de intrusos.
Res. Comput. Sci., 2013

Es NP-completo calcular la comunidad entre los objetos sobre los que una colección de agentes ha realizado una acción.
Computación y Sistemas, 2013

Strand-Based Approach to Patch Security Protocols.
CoRR, 2013

2012
Analyzing Log Files for Postmortem Intrusion Detection.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Un nuevo esquema para la detección de ataques en redes inalámbricas.
Res. Comput. Sci., 2012

Complejidad computacional de un caso especial de cálculo de grupos en las redes de interacción.
Res. Comput. Sci., 2012

Hacia la detección de impostores mediante grafos de navegación.
Res. Comput. Sci., 2012

Masquerade attacks based on user's profile.
J. Syst. Softw., 2012

Editorial.
Computación y Sistemas, 2012

2011
Towards Building a Masquerade Detection Method Based on User File System Navigation.
Proceedings of the Advances in Artificial Intelligence, 2011

Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents.
Proceedings of the Digital Information Processing and Communications, 2011

2010
Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample.
Proceedings of the Advances in Artificial Intelligence, 2010

Evader surveillance under incomplete information.
Proceedings of the IEEE International Conference on Robotics and Automation, 2010

2009
On Process Equivalence = Equation Solving in CCS.
J. Autom. Reason., 2009

On the Automated Correction of Protocols with Improper Message Encoding.
Proceedings of the Foundations and Applications of Security Analysis, 2009

2008
Intrusion Detection for Mobile Ad-Hoc Networks based on a Non-Negative Matrix Factorization Method.
Res. Comput. Sci., 2008

Formal Support to Security Protocol Development: A Survey.
Computación y Sistemas, 2008

A Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008

2007
On the Automated Correction of Security Protocols Susceptible to a Replay Attack.
Proceedings of the Computer Security, 2007

2006
Planning exploration strategies for simultaneous localization and mapping.
Robotics Auton. Syst., 2006

A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols.
Proceedings of the Workshop on Verification and Debugging, 2006

Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

A Hybrid Segmentation Method Applied to Color Images and 3D Information.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

A Tool for Managing Security Policies in Organisations.
Proceedings of the Advances in Information and Computer Security, 2006

Web Attack Detection Using ID3.
Proceedings of the Toward Category-Level Object Recognition, 2006

On the Use of Word Networks to Mimicry Attack Detection.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
An Artificial Manager for Security Policies in Organizations.
Res. Comput. Sci., 2005

A Framework for Reactive Motion and Sensing Planning: A Critical Events-Based Approach.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

On the Role of Information Compaction to Intrusion Detection.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005

Audit File Reduction Using N-Gram Models.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
On Modelling an Immune System.
Computación y Sistemas, 2004

Service Discrimination and Audit File Reduction for Effective Intrusion Detection.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Process Algebra Model of the Immune System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals.
Proceedings of the Advances in Artificial Intelligence, 2004

Attribute Reduction for Effective Intrusion Detection.
Proceedings of the Advances in Web Intelligence, 2004

2003
Predicate Synthesis for Correcting Faulty Conjectures: The Proof Planning Paradigm.
Autom. Softw. Eng., 2003

On Automating the Formulation of Security Goals under the Inductive Approach.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
Towards a Model for an Immune System.
Proceedings of the MICAI 2002: Advances in Artificial Intelligence, 2002

2001
On the Correction of Faulty Formulae.
Computación y Sistemas, 2001

Concept Formation via Proof Planning Failure.
Proceedings of the Logic for Programming, 2001

2000
Planning Proofs of Equations in CCS.
Autom. Softw. Eng., 2000

Searching for a Solution to Program Verification=Equation Solving in CCS.
Proceedings of the MICAI 2000: Advances in Artificial Intelligence, 2000

The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000

1998
Planning Equational Verification in CCS.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

Observant: An Annotated Term-Rewriting System for Deciding Observation Congruence.
Proceedings of the 13th European Conference on Artificial Intelligence, 1998

1997
Planning proofs of correctness of CCS systems.
PhD thesis, 1997

1994
Proof Plans for the Correction of False Conjectures.
Proceedings of the Logic Programming and Automated Reasoning, 5th International Conference, 1994


  Loading...