ORCID as entered in ROS

Select Publications
2003, 'Balancing training data for automated annotation of keywords: a case study', in Proceedings of the Second Brazilian Workshop on Bioinformatics, pp. 35 - 43
,2002, 'Splice junction recognition using machine learning techniques', in Proceedings of the First Brazilian Workshop on Bioinformatics, Citeseer, pp. 32 - 39, Citeseer
,2002, 'The influence of noisy patterns on the performance of learning methods in the splice junction recognition problem', in Neural Networks, 2002. SBRN 2002. Proceedings. VII Brazilian Symposium on, IEEE, pp. 31 - 36, IEEE
,2001, 'A study of K-nearest neighbour as a model-based method to treat missing data', in Argentine Symposium on Artificial Intelligence
,2000, 'A computational environment for extracting rules from databases', in Management Information Systems, pp. 321 - 330
,2003, Pré-processamento de dados em aprendizado de máquinas supervisionado., Tese (Doutorado)-Instituto de Ciências Matemáticas e de Computaç ao …
,2023, Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks, arXiv, 2301.06695v2, http://dx.doi.org10.48550/arXiv.2301.06695, https://arxiv.org/pdf/2301.06695
,2022, AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks, arXiv, ARTN 102801, http://dx.doi.org10.1016/j.cose.2022.102801, https://arxiv.org/pdf/2203.09792.pdf
,2025, FastFlow: Early Yet Robust Network Flow Classification using the Minimal Number of Time-Series Packets, http://dx.doi.org/10.1145/3727115
,2025, Revisit Time Series Classification Benchmark: The Impact of Temporal Information for Classification, http://dx.doi.org/10.48550/arxiv.2503.20264
,2025, Predicting IoT Device Vulnerability Fix Times with Survival and Failure Time Models, http://dx.doi.org/10.48550/arxiv.2501.02520
,2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices, http://dx.doi.org/10.48550/arxiv.2408.13172
,2024, Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification, http://dx.doi.org/10.48550/arxiv.2407.19662
,2023, Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity, http://dx.doi.org/10.48550/arxiv.2304.04987
,2023, Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks, http://dx.doi.org/10.48550/arxiv.2301.06695
,2022, AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks, http://dx.doi.org/10.48550/arxiv.2203.09792
,2021, An Open-Source Tool for Classification Models in Resource-Constrained Hardware, http://dx.doi.org/10.48550/arxiv.2105.05983
,2020, Challenges in Benchmarking Stream Learning Algorithms with Real-world Data, http://dx.doi.org/10.1007/s10618-020-00698-5
,2020, Quantifying With Only Positive Training Data
,2014, Flying Insect Classification with Inexpensive Sensors, http://dx.doi.org/10.48550/arxiv.1403.2654
,2015, Nonstationary environments-archive
,2015, The ucr time series classification archive
,