Explainable Artificial Intelligence (XAI) is a growing area of research that aims to improve the interpretability of the not-so-informative black-box models. However, it is currently difficult to categorize an existing method in terms of its intrinsic characteristics and explainability. We provide a new unified yet simple taxonomy for the categorization of XAI methods and present the explainability methods curr...
Understanding the elements that allow the recognition of archaeological structures is an essential task for the identification of cultural heritage. On the other hand, recording these elements is necessary for the historical study, evolution, and recognition of these types of structures. One of the challenges presented for digital representation of this information and knowledge relates with the fact that there...
Social media platforms have become powerful tools for startups, helping them find customers and raise funding. In this study, we applied a social media intelligence-based methodology to analyze startups’ content and to understand how their communication strategies may differ during their scaling process. To understand if a startup’s social media content reflects its current business maturation position, we firs...
O objetivo da missão Inteligência Artificial para a Administração Pública (IA>AP)* é promover a ligação entre estudantes, docentes e investigadores do Iscte, na área de Inteligência Artificial (IA), e as instituições da Administração Pública (AP). Pretende-se disponibilizar os conhecimentos e experiência académica na área de IA às entidades da AP que detêm dados passíveis de exploração, muitas vezes não usados,...
Companies seek to promote a swift digitalization of their business processes and new disruptive features to gain an advantage over their competitors. This often results in a wider attack surface that may be exposed to exploitation from adversaries. As budgets are thin, one of the most popular security solutions CISOs choose to invest in is Network-based Intrusion Detection Systems (NIDS). As anomaly-based NIDS ...
Remote sensing data covering large geographical areas can be easily accessed and are being acquired with greater frequency. The massive volume of data requires an automated image analysis system. By taking advantage of the increasing availability of data using computer vision, we can design specific systems to automate data analysis and detection of archaeological objects. In the past decade, there has been a r...
Users trust their most sensitive data to their mobile devices and installed applications. These applications continuously collect information about users and their interactions and store that data locally or share it over the network. App stores provide these applications for the user devices and act as trust gateways between the application developers and the end-users, providing the needed assurance to the us...
Computers and devices, today ubiquitous in our daily life, foster the generation of vast amounts of data. Turning data into information and knowledge is the core of data mining and predictive analytics. Data mining uses machine learning, statistics, data visualization, databases, and other computer science methods to find patterns in data and extract knowledge from information. While data mining is usually asso...
The widespread usage of mobile devices and their seamless adaptation to each user’s needs through useful applications (apps) makes them a prime target for malware developers. Malware is software built to harm the user, e.g., to access sensitive user data, such as banking details, or to hold data hostage and block user access. These apps are distributed in marketplaces that host millions and therefore have their...
Mobile computing is on the rise. More and more users rely on mobile applications and mobile devices to execute the most basic tasks of their lives while depositing their most private and critical data on them. Mobile application stores act as the trust anchors that sit between applications developed by third parties and the user’s mobile devices. Therefore, app stores should provide the means to ensure that the...