
Martin Bayon- University of Leon
Martin Bayon
- University of Leon
About
16
Publications
1,167
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
131
Citations
Introduction
Current institution
Publications
Publications (16)
The Internet of Things (IoT) presents a unique cybersecurity challenge due to its vast network of interconnected, resource-constrained devices. These vulnerabilities not only threaten data integrity but also the overall functionality of IoT systems. This study addresses these challenges by exploring efficient data reduction techniques within a mode...
La gran exactitud y resolución que presentan las mediciones realizadas con sensores LiDAR (Light Detection And Ranging) los convierte en habituales en sistemas SLAM (Simultaneous Localization And Mapping). El gran volumen de datos proporcionado por dichos sensores se puede reducir a un conjunto de puntos característicos que definen el entorno. Dich...
This study investigates the role of artificial intelligence (AI) in diagnosing Autism Spectrum Disorder (ASD), employing natural language processing (NLP) along machine learning (ML) models including decision trees, extreme gradient boosting (XGB), and k-nearest neighbors (KNN), and as well along deep learning (DL) models like recurrent neural netw...
Robust road surface estimation is required for autonomous ground vehicles to navigate safely. Despite it becoming one of the main targets for autonomous mobility researchers in recent years, it is still an open problem in which cameras and LiDAR sensors have demonstrated to be adequate to predict the position, size and shape of the road a vehicle i...
Purpose
The main aim of our study was to explore the utility of artificial intelligence (AI) in diagnosing autism spectrum disorder (ASD). The study primarily focused on using machine learning (ML) and deep learning (DL) models to detect ASD potential cases by analyzing text inputs, especially from social media platforms like Twitter. This is to ov...
Robotic mobile platforms are key building blocks for numerous applications and cooperation between robots and humans is a key aspect to enhance productivity and reduce labor cost. To operate safely, robots typically rely on a custom map of the environment that depends on the sensor configuration of the platform. In contrast, blueprints stand as an...
Denial of Service (DoS) attack over Internet of Things (IoT) is among the most prevalent cyber threat, their complex behavior makes very expensive the use of Datagram Transport Layer Security (DTLS) for securing purposes. DoS attack exploits specific protocol features, causing disruptions and remaining undetected by legitimate components. This pape...
ROS (Robot Operating System) es un framework para el desarrollo de sistemas robóticos de código abierto ampliamente utilizado en la industria y la investigación. Los sistemas robóticos asistidos requieren una comunicación fluida y fiable entre ROS y el controlador externo, a fin de lograr un control y supervisión eficaz del mismo. En este artículo,...
Autism spectrum disorders (ASD) are developmental disabilities caused by differences in the brain. According to the WHO, ASD affects 1% of the population. However, many people are still undiagnosed. Thanks to artificial intelligence, more and more research is being carried out with the aim of obtaining early diagnoses that help to reduce the negati...
Cardiovascular diseases state as one of the greatest risks of death for the general population. Late detection in heart diseases highly conditions the chances of survival for patients. Age, sex, cholesterol level, sugar level, heart rate, among other factors, are known to have an influence on life-threatening heart problems, but, due to the high am...
One of the most common attacks is man‐in‐the‐middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber‐attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements. In this work,...
Roadway detection is one of the main topics that autonomous vehicles must face to safety navigate along roads. In this paper, we present the architecture and results of a roadway detection system which uses both camera and LiDAR data to segment the road surface from a Bird’s-eye view. Discussion about how camera and LiDAR data has been combined is...