Gnjatović, Milan

Link to this page

Authority KeyName Variants
orcid::0000-0002-0343-7596
  • Gnjatović, Milan (8)
  • Gnjatović, Milan J. (1)
Projects
No records found.

Author's Bibliography

Cognitively Economical Heuristic for Multiple Sequence Alignment under Uncertainties

Gnjatović, Milan; Maček, Nemanja; Saračević, Muzafer; Adamović, Saša; Joksimović, Dušan; Karabašević, Darjan

(Basel, Switzerland : MDPI, 2023)

TY  - JOUR
AU  - Gnjatović, Milan
AU  - Maček, Nemanja
AU  - Saračević, Muzafer
AU  - Adamović, Saša
AU  - Joksimović, Dušan
AU  - Karabašević, Darjan
PY  - 2023
UR  - http://jakov.kpu.edu.rs/handle/123456789/1514
AB  - This paper introduces a heuristic for multiple sequence alignment aimed at improving
real-time object recognition in short video streams with uncertainties. It builds upon the idea of
the progressive alignment but is cognitively economical to the extent that the underlying edit dis-
tance approach is adapted to account for human working memory limitations. Thus, the proposed
heuristic procedure has a reduced computational complexity compared to optimal multiple sequence
alignment. On the other hand, its relevance was experimentally confirmed. An extrinsic evaluation
conducted in real-life settings demonstrated a significant improvement in number recognition accu-
racy in short video streams under uncertainties caused by noise and incompleteness. The second line
of evaluation demonstrated that the proposed heuristic outperforms humans in the post-processing
of recognition hypotheses. This indicates that it may be combined with state-of-the-art machine
learning approaches, which are typically not tailored to the task of object sequence recognition from a
limited number of frames of incomplete data recorded in a dynamic scene situation
PB  - Basel, Switzerland : MDPI
T2  - Axioms
T1  - Cognitively Economical Heuristic for Multiple Sequence Alignment under Uncertainties
VL  - 12
IS  - 1
SP  - 3
DO  - 10.3390/axioms12010003
ER  - 
@article{
author = "Gnjatović, Milan and Maček, Nemanja and Saračević, Muzafer and Adamović, Saša and Joksimović, Dušan and Karabašević, Darjan",
year = "2023",
abstract = "This paper introduces a heuristic for multiple sequence alignment aimed at improving
real-time object recognition in short video streams with uncertainties. It builds upon the idea of
the progressive alignment but is cognitively economical to the extent that the underlying edit dis-
tance approach is adapted to account for human working memory limitations. Thus, the proposed
heuristic procedure has a reduced computational complexity compared to optimal multiple sequence
alignment. On the other hand, its relevance was experimentally confirmed. An extrinsic evaluation
conducted in real-life settings demonstrated a significant improvement in number recognition accu-
racy in short video streams under uncertainties caused by noise and incompleteness. The second line
of evaluation demonstrated that the proposed heuristic outperforms humans in the post-processing
of recognition hypotheses. This indicates that it may be combined with state-of-the-art machine
learning approaches, which are typically not tailored to the task of object sequence recognition from a
limited number of frames of incomplete data recorded in a dynamic scene situation",
publisher = "Basel, Switzerland : MDPI",
journal = "Axioms",
title = "Cognitively Economical Heuristic for Multiple Sequence Alignment under Uncertainties",
volume = "12",
number = "1",
pages = "3",
doi = "10.3390/axioms12010003"
}
Gnjatović, M., Maček, N., Saračević, M., Adamović, S., Joksimović, D.,& Karabašević, D.. (2023). Cognitively Economical Heuristic for Multiple Sequence Alignment under Uncertainties. in Axioms
Basel, Switzerland : MDPI., 12(1), 3.
https://doi.org/10.3390/axioms12010003
Gnjatović M, Maček N, Saračević M, Adamović S, Joksimović D, Karabašević D. Cognitively Economical Heuristic for Multiple Sequence Alignment under Uncertainties. in Axioms. 2023;12(1):3.
doi:10.3390/axioms12010003 .
Gnjatović, Milan, Maček, Nemanja, Saračević, Muzafer, Adamović, Saša, Joksimović, Dušan, Karabašević, Darjan, "Cognitively Economical Heuristic for Multiple Sequence Alignment under Uncertainties" in Axioms, 12, no. 1 (2023):3,
https://doi.org/10.3390/axioms12010003 . .

A Clustering-Based Approach to Detecting Critical Traffic Road Segments in Urban Areas

Košanin, Ivan; Gnjatović, Milan; Maček, Nemanja; Joksimović, Dušan

(Basel, Switzerland : MDPI, 2023)

TY  - JOUR
AU  - Košanin, Ivan
AU  - Gnjatović, Milan
AU  - Maček, Nemanja
AU  - Joksimović, Dušan
PY  - 2023
UR  - http://jakov.kpu.edu.rs/handle/123456789/1513
AB  - This paper introduces a parameter-free clustering-based approach to detecting critical traffic
road segments in urban areas, i.e., road segments of spatially prolonged and high traffic accident
risk. In addition, it proposes a novel domain-specific criterion for evaluating the clustering results,
which promotes the stability of the clustering results through time and inter-period accident spatial
collocation, and penalizes the size of the selected clusters. To illustrate the proposed approach, it is
applied to data on traffic accidents with injuries or death that occurred in three of the largest cities of
Serbia over the three-year period.
PB  - Basel, Switzerland : MDPI
T2  - Axioms
T1  - A Clustering-Based Approach to Detecting Critical Traffic Road Segments in Urban Areas
VL  - 12
IS  - 6
SP  - 509
DO  - 10.3390/axioms12060509
ER  - 
@article{
author = "Košanin, Ivan and Gnjatović, Milan and Maček, Nemanja and Joksimović, Dušan",
year = "2023",
abstract = "This paper introduces a parameter-free clustering-based approach to detecting critical traffic
road segments in urban areas, i.e., road segments of spatially prolonged and high traffic accident
risk. In addition, it proposes a novel domain-specific criterion for evaluating the clustering results,
which promotes the stability of the clustering results through time and inter-period accident spatial
collocation, and penalizes the size of the selected clusters. To illustrate the proposed approach, it is
applied to data on traffic accidents with injuries or death that occurred in three of the largest cities of
Serbia over the three-year period.",
publisher = "Basel, Switzerland : MDPI",
journal = "Axioms",
title = "A Clustering-Based Approach to Detecting Critical Traffic Road Segments in Urban Areas",
volume = "12",
number = "6",
pages = "509",
doi = "10.3390/axioms12060509"
}
Košanin, I., Gnjatović, M., Maček, N.,& Joksimović, D.. (2023). A Clustering-Based Approach to Detecting Critical Traffic Road Segments in Urban Areas. in Axioms
Basel, Switzerland : MDPI., 12(6), 509.
https://doi.org/10.3390/axioms12060509
Košanin I, Gnjatović M, Maček N, Joksimović D. A Clustering-Based Approach to Detecting Critical Traffic Road Segments in Urban Areas. in Axioms. 2023;12(6):509.
doi:10.3390/axioms12060509 .
Košanin, Ivan, Gnjatović, Milan, Maček, Nemanja, Joksimović, Dušan, "A Clustering-Based Approach to Detecting Critical Traffic Road Segments in Urban Areas" in Axioms, 12, no. 6 (2023):509,
https://doi.org/10.3390/axioms12060509 . .

A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective

Ilić, Slaviša Ž.; Gnjatović, Milan J.; Popović, Brankica M.; Maček, Nemanja D.

(Beograd : Univerzitet odbrane = Belgrade : University of defence, 2022)

TY  - JOUR
AU  - Ilić, Slaviša Ž.
AU  - Gnjatović, Milan J.
AU  - Popović, Brankica M.
AU  - Maček, Nemanja D.
PY  - 2022
UR  - https://jakov.kpu.edu.rs/handle/123456789/1623
AB  - Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior.
Methods: Both sandboxes were set up with basic configurations and confronted with the same set of malware samples. The evaluation was primarily conducted with respect to the question of to what extent a sandbox is helpful to the human analyst in malware analysis. Thus, only the information available in Web console reports was considered.
Results: Drakvuf is expected to perform better when confronted with evasive malware and so-called “file-less” malware. Although still not mature in terms of integration, customization and tools, this sandbox is considered a second generation sandbox because of its agentless design. On the other hand, the Cuckoo sandbox creates a better overall experience: it is supported through good documentation and strong professional community, better integrated with various tools, support more virtualization, operating system and sample types, and generates more informative reports. Even with a smaller capacity to prevent evasive malware, its Python 2 agent script makes it more powerful than Drakvuf.
Conclusion: To achieve the optimal open-source sandbox-based protection, it is recommended to apply both the Cuckoo and Drakvuf sandboxes. In circumstances of limited resources, applying the Cuckoo sandbox is preferable, especially if exposure to malware deploying evading techniques is not frequently expected.
AB  - Введение/цель: В данной статье представлен экспериментальный сравнительный анализ программных сред песочниц Cuckoo и Drakvuf. Эти системы были выбраны в качестве предмета анализа из-за их популярности в профессиональном сообществе и их взаимодополняющих подходов к анализу воздействия вредоносных программ.
Методы: Обе системы имеют базовые настройки и подвергаются воздействию одного и того же набора вредоносных программ. Анализ преимущественно проводился с целью выявления степени полезности песочниц для аналитика-человека при анализе вредоносных программ. Следовательно, учитывалась только та информация, которая была доступа в отчетах веб-интерфейсов наблюдаемых систем.
Результаты: Можно ожидать, что Drakvuf даст лучшие результаты при воздействии вредоносных программ, использующих методы обхода песочниц в виртуальных средах. Несмотря на то, что данная среда пока не достигла своей полной мощности относительно интеграции, настроек и доступных программных инструментов, ее все-таки можно считать представителем второго поколения изолированных систем программной среды, благодаря ее безагентной технологии. С другой стороны, песочница Cuckoo в целом более удобна для пользователей: она поддерживается хорошей документацией и сильным профессиональным сообществом, лучше интегрирована с различными программными инструментами, поддерживает больше видов виртуализации, типов операционных систем и образцов, в том числе она лучше генерирует отчеты. Несмотря на то, что у этой песочницы гораздо меньше возможностей предотвращения атак вредоносных программ в виртуальной среде, применение сценария с выявлением действий вредоносных программ делает эту песочницу более эффективной.
Выводы: Для достижения оптимальной защиты на основе песочницы с открытым исходным кодом рекомендуется применять как песочницы Cuckoo, так и Drakvuf. В условиях ограниченных ресурсов предпочтительнее применять песочницу Cuckoo, особенно если не предполагается частое воздействие вредоносных программ, использующих метод уклонения от обнаружения.
AB  - Увод/циљ: У раду се приказује упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма. Ови системи одабрани су за предмет анализе због своје популарности у професионалној заједници и комплементарних приступа анализи понашања злонамерних програма.
Методе: Оба система постављена су на основна подешавања и изложена истом скупу злонамерних програма. Анализа је примарно урађена с аспекта процене степена информативности добијених извештаја о извршавању злонамерних програма за људског аналитичара. Стога су, као предмет анализе, узете у обзир само информације доступне у веб-интерфејсима посматраних система.
Резултати: Може се очекивати да ће Драквуф остварити бољи учинак када се изложи злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима. Иако ово окружење још увек није остварило пун капацитет у смислу интегрисања, прилагођавања и доступних софтверских алата, може се сматрати представником друге генерације система за изоловано извршавање програма, због свог дизајна који искључује примену софтверског агента. С друге стране, окружење Куку ствара боље свеукупно корисничко искуство: подржано је добром документацијом и јаком професионалном заједницом, боље је интегрисано са различитим софтверским алатима, подржава више типова виртуелизације, оперативних система и типова узорака и генерише информативније извештаје. Иако поседује мањи капацитет за откривање злонамерних програма који примењују технике избегавања извршавања у виртуалним окружењима, могућност примене скрипти с дефиницијама злонамерног понашања програма чини ово окружење ефективнијим.
Закључак: Да би се постигла оптимална заштита, заснована на окружењима отвореног кода за изоловано извршавање програма, препоручује се примена оба разматрана система. У условима ограничених ресурса, примена система Куку пожељнија је, посебно ако се не очекује често излагање злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима.
PB  - Beograd : Univerzitet odbrane =  Belgrade : University of defence
T2  - Vojnotehnički glasnik = Military Technical Courier
T1  - A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective
T1  - Упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма : перспектива крајњег корисника
T1  - Экспериментальный сравнительный анализ песочниц Cuckoo и Drakvuf : взгляд конечного пользователя
VL  - 70
IS  - 2
SP  - 372
EP  - 392
DO  - 10.5937/vojtehg70-36196
ER  - 
@article{
author = "Ilić, Slaviša Ž. and Gnjatović, Milan J. and Popović, Brankica M. and Maček, Nemanja D.",
year = "2022",
abstract = "Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior.
Methods: Both sandboxes were set up with basic configurations and confronted with the same set of malware samples. The evaluation was primarily conducted with respect to the question of to what extent a sandbox is helpful to the human analyst in malware analysis. Thus, only the information available in Web console reports was considered.
Results: Drakvuf is expected to perform better when confronted with evasive malware and so-called “file-less” malware. Although still not mature in terms of integration, customization and tools, this sandbox is considered a second generation sandbox because of its agentless design. On the other hand, the Cuckoo sandbox creates a better overall experience: it is supported through good documentation and strong professional community, better integrated with various tools, support more virtualization, operating system and sample types, and generates more informative reports. Even with a smaller capacity to prevent evasive malware, its Python 2 agent script makes it more powerful than Drakvuf.
Conclusion: To achieve the optimal open-source sandbox-based protection, it is recommended to apply both the Cuckoo and Drakvuf sandboxes. In circumstances of limited resources, applying the Cuckoo sandbox is preferable, especially if exposure to malware deploying evading techniques is not frequently expected., Введение/цель: В данной статье представлен экспериментальный сравнительный анализ программных сред песочниц Cuckoo и Drakvuf. Эти системы были выбраны в качестве предмета анализа из-за их популярности в профессиональном сообществе и их взаимодополняющих подходов к анализу воздействия вредоносных программ.
Методы: Обе системы имеют базовые настройки и подвергаются воздействию одного и того же набора вредоносных программ. Анализ преимущественно проводился с целью выявления степени полезности песочниц для аналитика-человека при анализе вредоносных программ. Следовательно, учитывалась только та информация, которая была доступа в отчетах веб-интерфейсов наблюдаемых систем.
Результаты: Можно ожидать, что Drakvuf даст лучшие результаты при воздействии вредоносных программ, использующих методы обхода песочниц в виртуальных средах. Несмотря на то, что данная среда пока не достигла своей полной мощности относительно интеграции, настроек и доступных программных инструментов, ее все-таки можно считать представителем второго поколения изолированных систем программной среды, благодаря ее безагентной технологии. С другой стороны, песочница Cuckoo в целом более удобна для пользователей: она поддерживается хорошей документацией и сильным профессиональным сообществом, лучше интегрирована с различными программными инструментами, поддерживает больше видов виртуализации, типов операционных систем и образцов, в том числе она лучше генерирует отчеты. Несмотря на то, что у этой песочницы гораздо меньше возможностей предотвращения атак вредоносных программ в виртуальной среде, применение сценария с выявлением действий вредоносных программ делает эту песочницу более эффективной.
Выводы: Для достижения оптимальной защиты на основе песочницы с открытым исходным кодом рекомендуется применять как песочницы Cuckoo, так и Drakvuf. В условиях ограниченных ресурсов предпочтительнее применять песочницу Cuckoo, особенно если не предполагается частое воздействие вредоносных программ, использующих метод уклонения от обнаружения., Увод/циљ: У раду се приказује упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма. Ови системи одабрани су за предмет анализе због своје популарности у професионалној заједници и комплементарних приступа анализи понашања злонамерних програма.
Методе: Оба система постављена су на основна подешавања и изложена истом скупу злонамерних програма. Анализа је примарно урађена с аспекта процене степена информативности добијених извештаја о извршавању злонамерних програма за људског аналитичара. Стога су, као предмет анализе, узете у обзир само информације доступне у веб-интерфејсима посматраних система.
Резултати: Може се очекивати да ће Драквуф остварити бољи учинак када се изложи злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима. Иако ово окружење још увек није остварило пун капацитет у смислу интегрисања, прилагођавања и доступних софтверских алата, може се сматрати представником друге генерације система за изоловано извршавање програма, због свог дизајна који искључује примену софтверског агента. С друге стране, окружење Куку ствара боље свеукупно корисничко искуство: подржано је добром документацијом и јаком професионалном заједницом, боље је интегрисано са различитим софтверским алатима, подржава више типова виртуелизације, оперативних система и типова узорака и генерише информативније извештаје. Иако поседује мањи капацитет за откривање злонамерних програма који примењују технике избегавања извршавања у виртуалним окружењима, могућност примене скрипти с дефиницијама злонамерног понашања програма чини ово окружење ефективнијим.
Закључак: Да би се постигла оптимална заштита, заснована на окружењима отвореног кода за изоловано извршавање програма, препоручује се примена оба разматрана система. У условима ограничених ресурса, примена система Куку пожељнија је, посебно ако се не очекује често излагање злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима.",
publisher = "Beograd : Univerzitet odbrane =  Belgrade : University of defence",
journal = "Vojnotehnički glasnik = Military Technical Courier",
title = "A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective, Упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма : перспектива крајњег корисника, Экспериментальный сравнительный анализ песочниц Cuckoo и Drakvuf : взгляд конечного пользователя",
volume = "70",
number = "2",
pages = "372-392",
doi = "10.5937/vojtehg70-36196"
}
Ilić, S. Ž., Gnjatović, M. J., Popović, B. M.,& Maček, N. D.. (2022). A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective. in Vojnotehnički glasnik = Military Technical Courier
Beograd : Univerzitet odbrane =  Belgrade : University of defence., 70(2), 372-392.
https://doi.org/10.5937/vojtehg70-36196
Ilić SŽ, Gnjatović MJ, Popović BM, Maček ND. A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective. in Vojnotehnički glasnik = Military Technical Courier. 2022;70(2):372-392.
doi:10.5937/vojtehg70-36196 .
Ilić, Slaviša Ž., Gnjatović, Milan J., Popović, Brankica M., Maček, Nemanja D., "A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective" in Vojnotehnički glasnik = Military Technical Courier, 70, no. 2 (2022):372-392,
https://doi.org/10.5937/vojtehg70-36196 . .
1

Clustering of Road Traffic Accidents as a Gestalt Problem

Gnjatović, Milan; Košanin, Ivan; Maček, Nemanja; Joksimović, Dušan

(Basel, Switzerland : MDPI, 2022)

TY  - JOUR
AU  - Gnjatović, Milan
AU  - Košanin, Ivan
AU  - Maček, Nemanja
AU  - Joksimović, Dušan
PY  - 2022
UR  - http://jakov.kpu.edu.rs/handle/123456789/1515
AB  - This paper introduces and illustrates an approach to automatically detecting and selecting
“critical” road segments, intended for application in circumstances of limited human or technical
resources for traffic monitoring and management. The reported study makes novel contributions
at three levels. At the specification level, it conceptualizes “critical segments” as road segments
of spatially prolonged and high traffic accident risk. At the methodological level, it proposes a
two-stage approach to traffic accident clustering and selection. The first stage is devoted to spatial
clustering of traffic accidents. The second stage is devoted to selection of clusters that are dominant in
terms of number of accidents. At the implementation level, the paper reports on a prototype system
and illustrates its functionality using publicly available real-life data. The presented approach is
psychologically inspired to the extent that it introduces a clustering criterion based on the Gestalt
principle of proximity. Thus, the proposed algorithm is not density-based, as are most other state-of-
the-art clustering algorithms applied in the context of traffic accident analysis, but still keeps their
main advantages: it allows for clusters of arbitrary shapes, does not require an a priori given number
of clusters, and excludes “noisy” observations.
PB  - Basel, Switzerland : MDPI
T2  - Applied Sciences
T1  - Clustering of Road Traffic Accidents as a Gestalt Problem
VL  - 12
IS  - 9
SP  - 4543
DO  - 10.3390/app12094543
ER  - 
@article{
author = "Gnjatović, Milan and Košanin, Ivan and Maček, Nemanja and Joksimović, Dušan",
year = "2022",
abstract = "This paper introduces and illustrates an approach to automatically detecting and selecting
“critical” road segments, intended for application in circumstances of limited human or technical
resources for traffic monitoring and management. The reported study makes novel contributions
at three levels. At the specification level, it conceptualizes “critical segments” as road segments
of spatially prolonged and high traffic accident risk. At the methodological level, it proposes a
two-stage approach to traffic accident clustering and selection. The first stage is devoted to spatial
clustering of traffic accidents. The second stage is devoted to selection of clusters that are dominant in
terms of number of accidents. At the implementation level, the paper reports on a prototype system
and illustrates its functionality using publicly available real-life data. The presented approach is
psychologically inspired to the extent that it introduces a clustering criterion based on the Gestalt
principle of proximity. Thus, the proposed algorithm is not density-based, as are most other state-of-
the-art clustering algorithms applied in the context of traffic accident analysis, but still keeps their
main advantages: it allows for clusters of arbitrary shapes, does not require an a priori given number
of clusters, and excludes “noisy” observations.",
publisher = "Basel, Switzerland : MDPI",
journal = "Applied Sciences",
title = "Clustering of Road Traffic Accidents as a Gestalt Problem",
volume = "12",
number = "9",
pages = "4543",
doi = "10.3390/app12094543"
}
Gnjatović, M., Košanin, I., Maček, N.,& Joksimović, D.. (2022). Clustering of Road Traffic Accidents as a Gestalt Problem. in Applied Sciences
Basel, Switzerland : MDPI., 12(9), 4543.
https://doi.org/10.3390/app12094543
Gnjatović M, Košanin I, Maček N, Joksimović D. Clustering of Road Traffic Accidents as a Gestalt Problem. in Applied Sciences. 2022;12(9):4543.
doi:10.3390/app12094543 .
Gnjatović, Milan, Košanin, Ivan, Maček, Nemanja, Joksimović, Dušan, "Clustering of Road Traffic Accidents as a Gestalt Problem" in Applied Sciences, 12, no. 9 (2022):4543,
https://doi.org/10.3390/app12094543 . .
3

A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks

Barzut, Srđan; Milosavljević, Milan; Adamović, Saša; Saračević, Muzafer; Maček, Nemanja; Gnjatović, Milan

(Basel, Switzerland : MDPI, 2021)

TY  - JOUR
AU  - Barzut, Srđan
AU  - Milosavljević, Milan
AU  - Adamović, Saša
AU  - Saračević, Muzafer
AU  - Maček, Nemanja
AU  - Gnjatović, Milan
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1511
AB  - Modern access controls employ biometrics as a means of authentication to a great extent.
For example, biometrics is used as an authentication mechanism implemented on commercial devices
such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on
the fuzzy commitment scheme and convolutional neural networks. One of its main contributions
is a novel approach to automatic discretization of fingerprint texture descriptors, entirely based on
a convolutional neural network, and designed to generate fixed-length templates. By converting
templates into the binary domain, we developed the biometric cryptosystem that can be used in
key-release systems or as a template protection mechanism in fingerprint matching biometric systems.
The problem of biometric data variability is marginalized by applying the secure block-level Bose–
Chaudhuri–Hocquenghem error correction codes, resistant to statistical-based attacks. The evaluation
shows significant performance gains when compared to other texture-based fingerprint matching
and biometric cryptosystems.
PB  - Basel, Switzerland : MDPI
T2  - Mathematics
T1  - A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks
VL  - 9
IS  - 7
SP  - 730
DO  - 10.3390/math9070730
ER  - 
@article{
author = "Barzut, Srđan and Milosavljević, Milan and Adamović, Saša and Saračević, Muzafer and Maček, Nemanja and Gnjatović, Milan",
year = "2021",
abstract = "Modern access controls employ biometrics as a means of authentication to a great extent.
For example, biometrics is used as an authentication mechanism implemented on commercial devices
such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on
the fuzzy commitment scheme and convolutional neural networks. One of its main contributions
is a novel approach to automatic discretization of fingerprint texture descriptors, entirely based on
a convolutional neural network, and designed to generate fixed-length templates. By converting
templates into the binary domain, we developed the biometric cryptosystem that can be used in
key-release systems or as a template protection mechanism in fingerprint matching biometric systems.
The problem of biometric data variability is marginalized by applying the secure block-level Bose–
Chaudhuri–Hocquenghem error correction codes, resistant to statistical-based attacks. The evaluation
shows significant performance gains when compared to other texture-based fingerprint matching
and biometric cryptosystems.",
publisher = "Basel, Switzerland : MDPI",
journal = "Mathematics",
title = "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks",
volume = "9",
number = "7",
pages = "730",
doi = "10.3390/math9070730"
}
Barzut, S., Milosavljević, M., Adamović, S., Saračević, M., Maček, N.,& Gnjatović, M.. (2021). A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks. in Mathematics
Basel, Switzerland : MDPI., 9(7), 730.
https://doi.org/10.3390/math9070730
Barzut S, Milosavljević M, Adamović S, Saračević M, Maček N, Gnjatović M. A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks. in Mathematics. 2021;9(7):730.
doi:10.3390/math9070730 .
Barzut, Srđan, Milosavljević, Milan, Adamović, Saša, Saračević, Muzafer, Maček, Nemanja, Gnjatović, Milan, "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks" in Mathematics, 9, no. 7 (2021):730,
https://doi.org/10.3390/math9070730 . .
6
11

Putting Humans Back in the Loop: A Study in Human-Machine Cooperative Learning

Gnjatović, Milan; Maček, Nemanja; Adamović, Saša

(Budapest : Óbuda University, 2020)

TY  - JOUR
AU  - Gnjatović, Milan
AU  - Maček, Nemanja
AU  - Adamović, Saša
PY  - 2020
UR  - http://jakov.kpu.edu.rs/handle/123456789/1516
AB  - This paper introduces a novel approach to human-machine collaborative
learning that allows for the chronically missing human learnability in the context of
supervised machine learning. The basic tenet of this approach is the refinement of a human
designed software model through the iterative learning loop. Each iteration of the loop
consists of two phases: (i) automatic data-driven parameter adjustment, performed by
means of stochastic greedy local search, and (ii) human-driven model adjustment based on
insights gained in the previous phase. The proposed approach is demonstrated through a
real-life study of automatic electricity meter reading in the presence of noise. Thus, a
cognitively-inspired non-connectionist approach to digit detection and recognition is
introduced, which is subject to refinement through the iterative process of human-machine
cooperation. The prototype system is evaluated with respect to the recognition accuracy
(with the highest digit recognition accuracy of 94%), and also discussed with respect to the
storage requirements, generalizability, utilized contextual information, and efficiency.
PB  - Budapest : Óbuda University
T2  - Acta Polytechnica Hungarica
T1  - Putting Humans Back in the Loop: A Study in Human-Machine Cooperative Learning
VL  - 17
IS  - 2
SP  - 191
EP  - 210
DO  - 10.12700/APH.17.2.2020.2.11
ER  - 
@article{
author = "Gnjatović, Milan and Maček, Nemanja and Adamović, Saša",
year = "2020",
abstract = "This paper introduces a novel approach to human-machine collaborative
learning that allows for the chronically missing human learnability in the context of
supervised machine learning. The basic tenet of this approach is the refinement of a human
designed software model through the iterative learning loop. Each iteration of the loop
consists of two phases: (i) automatic data-driven parameter adjustment, performed by
means of stochastic greedy local search, and (ii) human-driven model adjustment based on
insights gained in the previous phase. The proposed approach is demonstrated through a
real-life study of automatic electricity meter reading in the presence of noise. Thus, a
cognitively-inspired non-connectionist approach to digit detection and recognition is
introduced, which is subject to refinement through the iterative process of human-machine
cooperation. The prototype system is evaluated with respect to the recognition accuracy
(with the highest digit recognition accuracy of 94%), and also discussed with respect to the
storage requirements, generalizability, utilized contextual information, and efficiency.",
publisher = "Budapest : Óbuda University",
journal = "Acta Polytechnica Hungarica",
title = "Putting Humans Back in the Loop: A Study in Human-Machine Cooperative Learning",
volume = "17",
number = "2",
pages = "191-210",
doi = "10.12700/APH.17.2.2020.2.11"
}
Gnjatović, M., Maček, N.,& Adamović, S.. (2020). Putting Humans Back in the Loop: A Study in Human-Machine Cooperative Learning. in Acta Polytechnica Hungarica
Budapest : Óbuda University., 17(2), 191-210.
https://doi.org/10.12700/APH.17.2.2020.2.11
Gnjatović M, Maček N, Adamović S. Putting Humans Back in the Loop: A Study in Human-Machine Cooperative Learning. in Acta Polytechnica Hungarica. 2020;17(2):191-210.
doi:10.12700/APH.17.2.2020.2.11 .
Gnjatović, Milan, Maček, Nemanja, Adamović, Saša, "Putting Humans Back in the Loop: A Study in Human-Machine Cooperative Learning" in Acta Polytechnica Hungarica, 17, no. 2 (2020):191-210,
https://doi.org/10.12700/APH.17.2.2020.2.11 . .
6

Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics

Maček, Nemanja; Adamović, Saša; Milosavljević, Milan; Jovanović, Miloš; Gnjatović, Milan; Trenkić, Branimir

(Budapest : Óbuda University, 2019)

TY  - JOUR
AU  - Maček, Nemanja
AU  - Adamović, Saša
AU  - Milosavljević, Milan
AU  - Jovanović, Miloš
AU  - Gnjatović, Milan
AU  - Trenkić, Branimir
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/1517
AB  - This paper presents an approach to designing secure modular authentication
framework based on iris biometrics and its’ implementation into mobile banking scenario.
The system consists of multiple clients and an authentication server. Client, a smartphone
with accompanying application, is used to capture biometrics, manage auxiliary data and
create and store encrypted cancelable templates. Bank’s authentication server manages
encryption keys and provides the template verification service. Proposed system keeps
biometric templates encrypted or at least cancelable during all stages of storage,
transmission and verification. As templates are stored on clients in encrypted form and
decryption keys reside on bank's authentication server, original plaintext templates are
unavailable to an adversary if the phone gets lost or stolen. The system employs public key
cryptography and pseudorandom number generator on small-sized templates, thus not
suffering from severe computational costs like systems that employ homomorphic
encryption. System is also general, as it does do not depend on specific cryptographic
algorithms. Having in mind that modern smartphones have iris scanners or at least high-
quality front cameras, and that no severe computational drawbacks exist, one may
conclude that the proposed authentication framework is highly applicable in mobile
banking authentication.
PB  - Budapest : Óbuda University
T2  - Acta Polytechnica Hungarica
T1  - Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics
VL  - 16
IS  - 1
SP  - 45
EP  - 62
DO  - 10.12700/APH.16.1.2019.1.3
ER  - 
@article{
author = "Maček, Nemanja and Adamović, Saša and Milosavljević, Milan and Jovanović, Miloš and Gnjatović, Milan and Trenkić, Branimir",
year = "2019",
abstract = "This paper presents an approach to designing secure modular authentication
framework based on iris biometrics and its’ implementation into mobile banking scenario.
The system consists of multiple clients and an authentication server. Client, a smartphone
with accompanying application, is used to capture biometrics, manage auxiliary data and
create and store encrypted cancelable templates. Bank’s authentication server manages
encryption keys and provides the template verification service. Proposed system keeps
biometric templates encrypted or at least cancelable during all stages of storage,
transmission and verification. As templates are stored on clients in encrypted form and
decryption keys reside on bank's authentication server, original plaintext templates are
unavailable to an adversary if the phone gets lost or stolen. The system employs public key
cryptography and pseudorandom number generator on small-sized templates, thus not
suffering from severe computational costs like systems that employ homomorphic
encryption. System is also general, as it does do not depend on specific cryptographic
algorithms. Having in mind that modern smartphones have iris scanners or at least high-
quality front cameras, and that no severe computational drawbacks exist, one may
conclude that the proposed authentication framework is highly applicable in mobile
banking authentication.",
publisher = "Budapest : Óbuda University",
journal = "Acta Polytechnica Hungarica",
title = "Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics",
volume = "16",
number = "1",
pages = "45-62",
doi = "10.12700/APH.16.1.2019.1.3"
}
Maček, N., Adamović, S., Milosavljević, M., Jovanović, M., Gnjatović, M.,& Trenkić, B.. (2019). Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics. in Acta Polytechnica Hungarica
Budapest : Óbuda University., 16(1), 45-62.
https://doi.org/10.12700/APH.16.1.2019.1.3
Maček N, Adamović S, Milosavljević M, Jovanović M, Gnjatović M, Trenkić B. Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics. in Acta Polytechnica Hungarica. 2019;16(1):45-62.
doi:10.12700/APH.16.1.2019.1.3 .
Maček, Nemanja, Adamović, Saša, Milosavljević, Milan, Jovanović, Miloš, Gnjatović, Milan, Trenkić, Branimir, "Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics" in Acta Polytechnica Hungarica, 16, no. 1 (2019):45-62,
https://doi.org/10.12700/APH.16.1.2019.1.3 . .
7

Assessing the Children’s Receptivity to the Robot MARKO

Tasevski, Jovica; Gnjatović, Milan; Borovac, Branislav

(Budapest : Óbuda University, 2018)

TY  - JOUR
AU  - Tasevski, Jovica
AU  - Gnjatović, Milan
AU  - Borovac, Branislav
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/1518
AB  - This paper presents an experimental assessment of the children’s receptivity to
the human-like conversational robot MARKO. It reports on a production of a corpus that is
composed of recordings of interaction between children, with cerebral palsy and similar
movement disorders, and MARKO, in realistic therapeutic settings. Twenty-nine children
participated in this study: 17 of them were recruited from among patients with cerebral
palsy and similar movement disorders, and 12 healthy. Approximately 222 minutes of
session time was recorded. All dialogues were transcribed, and nonverbal acts were
annotated. A control group of 15 children (14 with cerebral palsy, one with spina bifida)
was also included. The evaluation of the corpus showed that the positive effects go beyond
social triggering – the children not only positively responded to MARKO, but also
experienced increased motivation and engagement in therapy.
PB  - Budapest : Óbuda University
T2  - Acta Polytechnica Hungarica
T1  - Assessing the Children’s Receptivity to the Robot MARKO
VL  - 15
IS  - 5
SP  - 47
EP  - 66
DO  - 10.12700/APH.15.5.2018.5.4
ER  - 
@article{
author = "Tasevski, Jovica and Gnjatović, Milan and Borovac, Branislav",
year = "2018",
abstract = "This paper presents an experimental assessment of the children’s receptivity to
the human-like conversational robot MARKO. It reports on a production of a corpus that is
composed of recordings of interaction between children, with cerebral palsy and similar
movement disorders, and MARKO, in realistic therapeutic settings. Twenty-nine children
participated in this study: 17 of them were recruited from among patients with cerebral
palsy and similar movement disorders, and 12 healthy. Approximately 222 minutes of
session time was recorded. All dialogues were transcribed, and nonverbal acts were
annotated. A control group of 15 children (14 with cerebral palsy, one with spina bifida)
was also included. The evaluation of the corpus showed that the positive effects go beyond
social triggering – the children not only positively responded to MARKO, but also
experienced increased motivation and engagement in therapy.",
publisher = "Budapest : Óbuda University",
journal = "Acta Polytechnica Hungarica",
title = "Assessing the Children’s Receptivity to the Robot MARKO",
volume = "15",
number = "5",
pages = "47-66",
doi = "10.12700/APH.15.5.2018.5.4"
}
Tasevski, J., Gnjatović, M.,& Borovac, B.. (2018). Assessing the Children’s Receptivity to the Robot MARKO. in Acta Polytechnica Hungarica
Budapest : Óbuda University., 15(5), 47-66.
https://doi.org/10.12700/APH.15.5.2018.5.4
Tasevski J, Gnjatović M, Borovac B. Assessing the Children’s Receptivity to the Robot MARKO. in Acta Polytechnica Hungarica. 2018;15(5):47-66.
doi:10.12700/APH.15.5.2018.5.4 .
Tasevski, Jovica, Gnjatović, Milan, Borovac, Branislav, "Assessing the Children’s Receptivity to the Robot MARKO" in Acta Polytechnica Hungarica, 15, no. 5 (2018):47-66,
https://doi.org/10.12700/APH.15.5.2018.5.4 . .
18

Hybrid methodological approach to context-dependent speech recognition

Mišković, Dragiša; Gnjatović, Milan; Štrbac, Perica; Trenkić, Branimir; Jakovljević, Nikša; Delić, Vlado

(London : SAGE Publications, 2017)

TY  - JOUR
AU  - Mišković, Dragiša
AU  - Gnjatović, Milan
AU  - Štrbac, Perica
AU  - Trenkić, Branimir
AU  - Jakovljević, Nikša
AU  - Delić, Vlado
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/1520
AB  - Although the importance of contextual information in speech recognition has been acknowledged for a long time now, it
has remained clearly underutilized even in state-of-the-art speech recognition systems. This article introduces a novel,
methodologically hybrid approach to the research question of context-dependent speech recognition in human–machine
interaction. To the extent that it is hybrid, the approach integrates aspects of both statistical and representational
paradigms. We extend the standard statistical pattern-matching approach with a cognitively inspired and analytically
tractable model with explanatory power. This methodological extension allows for accounting for contextual information
which is otherwise unavailable in speech recognition systems, and using it to improve post-processing of recognition
hypotheses. The article introduces an algorithm for evaluation of recognition hypotheses, illustrates it for concrete
interaction domains, and discusses its implementation within two prototype conversational agents.
PB  - London : SAGE Publications
T2  - International Journal of Advanced Robotic Systems
T1  - Hybrid methodological approach to context-dependent speech recognition
VL  - 14
IS  - 1
DO  - 10.1177/1729881416687131
ER  - 
@article{
author = "Mišković, Dragiša and Gnjatović, Milan and Štrbac, Perica and Trenkić, Branimir and Jakovljević, Nikša and Delić, Vlado",
year = "2017",
abstract = "Although the importance of contextual information in speech recognition has been acknowledged for a long time now, it
has remained clearly underutilized even in state-of-the-art speech recognition systems. This article introduces a novel,
methodologically hybrid approach to the research question of context-dependent speech recognition in human–machine
interaction. To the extent that it is hybrid, the approach integrates aspects of both statistical and representational
paradigms. We extend the standard statistical pattern-matching approach with a cognitively inspired and analytically
tractable model with explanatory power. This methodological extension allows for accounting for contextual information
which is otherwise unavailable in speech recognition systems, and using it to improve post-processing of recognition
hypotheses. The article introduces an algorithm for evaluation of recognition hypotheses, illustrates it for concrete
interaction domains, and discusses its implementation within two prototype conversational agents.",
publisher = "London : SAGE Publications",
journal = "International Journal of Advanced Robotic Systems",
title = "Hybrid methodological approach to context-dependent speech recognition",
volume = "14",
number = "1",
doi = "10.1177/1729881416687131"
}
Mišković, D., Gnjatović, M., Štrbac, P., Trenkić, B., Jakovljević, N.,& Delić, V.. (2017). Hybrid methodological approach to context-dependent speech recognition. in International Journal of Advanced Robotic Systems
London : SAGE Publications., 14(1).
https://doi.org/10.1177/1729881416687131
Mišković D, Gnjatović M, Štrbac P, Trenkić B, Jakovljević N, Delić V. Hybrid methodological approach to context-dependent speech recognition. in International Journal of Advanced Robotic Systems. 2017;14(1).
doi:10.1177/1729881416687131 .
Mišković, Dragiša, Gnjatović, Milan, Štrbac, Perica, Trenkić, Branimir, Jakovljević, Nikša, Delić, Vlado, "Hybrid methodological approach to context-dependent speech recognition" in International Journal of Advanced Robotic Systems, 14, no. 1 (2017),
https://doi.org/10.1177/1729881416687131 . .
4