Saltar al contenido
Enrique Tomás Martínez Beltrán
InicioInvestigaciónPublicacionesDocenciaBlog
ENES
Contacto
InicioInvestigaciónPublicacionesDocenciaBlog
ENES
Contacto

Enrique Tomás Martínez Beltrán

Estudiante de doctorado en la Universidad de Murcia, centrado en aprendizaje federado, ciberseguridad e IA que preserva la privacidad para sistemas reales.

  • Política de privacidad
  • Términos del servicio
  • Accesibilidad
  • GitHubse abre en una pestaña nueva
  • LinkedInse abre en una pestaña nueva
  • Google Scholarse abre en una pestaña nueva
  • RGse abre en una pestaña nueva
  • ORCIDse abre en una pestaña nueva
  • Scopusse abre en una pestaña nueva
  • DBLPse abre en una pestaña nueva
  • Web of Sciencese abre en una pestaña nueva

Enrique Tomás Martínez Beltrán. Todos los derechos reservados.

Volver arriba

Este sitio utiliza cookies analíticas para entender cómo los visitantes interactúan con el contenido. No se comparten datos personales con terceros.

  1. Inicio
  2. Publicaciones
  3. Breaching Subjects’ Thoughts Privacy: A Study with Visual Stimuli and Brain-Computer Interfaces
Prepublicación2021

Journal of Healthcare Engineering

Breaching Subjects’ Thoughts Privacy: A Study with Visual Stimuli and Brain-Computer Interfaces

Brain-computer interfaces (BCIs) started being used in clinical scenarios, reaching nowadays new fields such as entertainment or learning. Using BCIs, neuronal activity can be monitored for various purposes, with the stu...

Editorialse abre en una pestaña nuevaDOIse abre en una pestaña nueva
  • LinkedInse abre en una pestaña nueva
  • Xse abre en una pestaña nueva

Datos rápidos

Año
2021
Venue
Journal of Healthcare Engineering
Identificador
quilesperez2021breaching

Cita sugerida

Mario Quiles Pérez, Enrique Tomás Martínez Beltrán, Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez (2021). Breaching Subjects’ Thoughts Privacy: A Study with Visual Stimuli and Brain-Computer Interfaces. Journal of Healthcare Engineering.

Resumen

Brain-computer interfaces (BCIs) started being used in clinical scenarios, reaching nowadays new fields such as entertainment or learning. Using BCIs, neuronal activity can be monitored for various purposes, with the study of the central nervous system response to certain stimuli being one of them, being the case of evoked potentials. However, due to the sensitivity of these data, the transmissions must be protected, with blockchain being an interesting approach to ensure the integrity of the data. This work focuses on the visual sense, and its relationship with the P300 evoked potential, where several open challenges related to the privacy of subjects’ information and thoughts appear when using BCI. The first and most important challenge is whether it would be possible to extract sensitive information from evoked potentials. This aspect becomes even more challenging and dangerous if the stimuli are generated when the subject is not aware or conscious that they have occurred. There is an important gap in this regard in the literature, with only one work existing dealing with subliminal stimuli and BCI and having an unclear methodology and experiment setup. As a contribution of this paper, a series of experiments, five in total, have been created to study the impact of visual stimuli on the brain tangibly. These experiments have been applied to a heterogeneous group of ten subjects. The experiments show familiar visual stimuli and gradually reduce the sampling time of known images, from supraliminal to subliminal. The study showed that supraliminal visual stimuli produced P300 potentials about 50% of the time on average across all subjects. Reducing the sample time between images degraded the attack, while the impact of subliminal stimuli was not confirmed. Additionally, younger subjects generally presented a shorter response latency. This work corroborates that subjects’ sensitive data can be extracted using visual stimuli and P300.

Autores

Mario Quiles PérezEnrique Tomás Martínez BeltránSergio López BernalAlberto Huertas CeldránGregorio Martínez Pérez

Palabras clave

Publicaciones relacionadas

Trabajos cercanos por temática, tipo y solapamiento de etiquetas.

Prepublicación2026

Submitted to Information Fusion

Decentralized Self-Supervised Representation Learning via Prototype Exchange under Non-IID Data

Enrique Tomás Martínez Beltrán, Gérôme Bovet, Gregorio Martínez Pérez, Alberto Huertas Celdrán

Prepublicación2026

Submitted to Future Generation Computer Systems

FedEnD: Communication-Efficient Federated Learning for Non-IID Data via Decentralized Ensemble Distillation

Enrique Tomás Martínez Beltrán, Philip Giryes, Gérôme Bovet, Burkhard Stiller, Gregorio Martínez Pérez, Alberto Huertas Celdrán

Prepublicación2024

Submitted to International Journal of Information Security

Reputation System based on Distributed Ledger to Secure Decentralized Federated Learning

Jan von der Assen, Sandrin Raphael Hunkeler, Alberto Huertas Celdrán, Enrique Tomás Martínez Beltrán, Gérôme Bovet, Burkhard Stiller

Machine Learning (ML) faces several challenges, including susceptibility to data leakage and the overhead associated with data storage. Decentralized Federated Learning (DFL) offers a robust solution to these issues by e...

Editorialse abre en una pestaña nuevaDOIse abre en una pestaña nueva

Investigación relacionada

DEFENDIS: aprendizaje federado descentralizado para identificación y seguridad de dispositivos IoT

Abr 2023 — Nov 2023

DEFENDIS: aprendizaje federado descentralizado para identificación y seguridad de dispositivos IoT

DEFENDIS desarrolla un marco para identificar de forma distribuida dispositivos IoT y abordar amenazas de seguridad mediante aprendizaje federado descentralizado.

EU-GUARDIAN: marco europeo y pruebas de concepto para la automatización inteligente de la gestión de incidentes de ciberdefensa

Dic 2022 — Nov 2025

EU-GUARDIAN: marco europeo y pruebas de concepto para la automatización inteligente de la gestión de incidentes de ciberdefensa

Solución avanzada basada en IA para automatizar la gestión de incidentes de ciberdefensa y reforzar la postura y las capacidades operativas de ciberdefensa de la UE.