Latest publications
Recent publications by the Division of Network and Systems Engineering.
The latest publications from NSE
[1]
M. Spanghero and P. Papadimitratos,
"Consumer INS coupled with carrier phase measurements for GNSS spoofing detection,"
in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[2]
K. Hammar and R. Stadler,
"Intrusion Tolerance as a Two-Level Game,"
in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[3]
Z. Liao et al.,
"A Bibliometric Analysis of Scientific Publications on Eating Disorder Prevention in the Past Three Decades,"
Nutrients, vol. 16, no. 8, 2024.
[4]
O. Stenhammar, G. Fodor and C. Fischione,
"A Comparison of Neural Networks for Wireless Channel Prediction,"
IEEE wireless communications, vol. 31, no. 3, pp. 235-241, 2024.
[5]
F. S. Samani and R. Stadler,
"A Framework for Dynamically Meeting Performance Objectives on a Service Mesh,"
IEEE Transactions on Network and Service Management, vol. 21, no. 6, pp. 5992-6007, 2024.
[6]
V. Engström, G. Nebbione and M. Ekstedt,
"A Metalanguage for Dynamic Attack Graphs and Lazy Generation,"
in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[7]
H. Teixeira De Castro et al.,
"A Model-based Approach for Assessing the Security of Cyber-Physical Systems,"
in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[8]
X. Yan, S. Razavikia and C. Fischione,
"A Novel Channel Coding Scheme for Digital Multiple Access Computing,"
in ICC 2024 - IEEE International Conference on Communications, 2024, pp. 3851-3857.
[9]
E. Shereen, K. Kazari and G. Dán,
"A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control,"
IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[10]
S. G. E. Gökstorp et al.,
"Anomaly Detection in Security Logs using Sequence Modeling,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[11]
S. Razavikia, J. M. Barros da Silva Jr. and C. Fischione,
"Blind Federated Learning via Over-the-Air q-QAM,"
IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 19570-19586, 2024.
[12]
E. Santos Escriche et al.,
"Channel-Centric Spatio-Temporal Graph Networks for Network-based Intrusion Detection,"
in 2024 IEEE Conference on Communications and Network Security, CNS 2024, 2024.
[13]
A. Hasselberg et al.,
"Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge,"
in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[14]
O. Stenhammar, G. Fodor and C. Fischione,
"Clustered Predictive Quality of Service for Connected Vehicles Using Federated Learning,"
in 2024 IEEE International Conference on Communications Workshops, ICC Workshops 2024, 2024, pp. 626-631.
[15]
Y. K. Tun et al.,
"Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach,"
IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[16]
F. S. Samani et al.,
"Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network Environment,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[17]
S. M. Azimi-Abarghouyi and L. R. Varshney,
"Compute-Update Federated Learning : A Lattice Coding Approach,"
IEEE Transactions on Signal Processing, vol. 72, pp. 5213-5227, 2024.
[18]
R. S. Patil, I. Källman and V. Fodor,
"DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization,"
in 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, pp. 466-473.
[19]
S. Katsikeas et al.,
"Development and validation of coreLang : A threat modeling language for the ICT domain,"
Computers & security (Print), vol. 146, 2024.
[20]
F. Heiding et al.,
"Devising and Detecting Phishing Emails Using Large Language Models,"
IEEE Access, vol. 12, pp. 42131-42146, 2024.
[21]
F. Tütüncüoglu et al.,
"Dynamic Time-of-Use Pricing for Serverless Edge Computing with Generalized Hidden Parameter Markov Decision Processes,"
in Proceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems, ICDCS 2024, 2024, pp. 668-679.
[22]
S. Katsikeas et al.,
"Empirical evaluation of a threat modeling language as a cybersecurity assessment tool,"
Computers & security (Print), vol. 140, 2024.
[23]
O. Viberg et al.,
"Exploring teachers' (future) digital assessment practices in higher education: Instrument and model development,"
British Journal of Educational Technology, 2024.
[24]
A. Mahmoudi et al.,
"FedCau : A Proactive Stop Policy for Communication and Computation Efficient Federated Learning,"
IEEE Transactions on Wireless Communications, vol. 23, no. 9, pp. 11076-11093, 2024.
[25]
S. M. Azimi Abarghouyi and L. R. Varshney,
"Federated Learning via Lattice Joint Source-Channel Coding,"
in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 1623-1628.
[26]
G. Karlsson,
"From Campus to Boot Camp-Lessons from Extramural Teaching in Cybersecurity,"
in EDUCON 2024 - IEEE Global Engineering Education Conference, Proceedings, 2024.
[27]
M. Bokaei et al.,
"Harmonic retrieval using weighted lifted-structure low-rank matrix completion,"
Signal Processing, vol. 216, 2024.
[28]
Y. You, Q. Xu and C. Fischione,
"Hierarchical Online Game-Theoretic Framework for Real-Time Energy Trading in Smart Grid,"
IEEE Transactions on Smart Grid, vol. 15, no. 2, pp. 1634-1645, 2024.
[29]
S. M. Azimi Abarghouyi and V. Fodor,
"Hierarchical Over-the-Air Federated Learning with Awareness of Interference and Data Heterogeneity,"
in 2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024.
[30]
Y. Kim, G. Dán and Q. Zhu,
"Human-in-the-loop cyber intrusion detection using active learning,"
IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8658-8672, 2024.
[31]
X. Huang, H. Hellström and C. Fischione,
"Interference Cancellation for OTFS-Based Over-the-Air Computation,"
in 2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, pp. 469-474.
[32]
K. Hammar and R. Stadler,
"Intrusion tolerance for networked systems through two-level feedback control,"
in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, 2024, pp. 338-352.
[33]
X. Wang and R. Stadler,
"IT Intrusion Detection Using Statistical Learning and Testbed Measurements,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[34]
F. Tütüncüoğlu and G. Dán,
"Joint Resource Management and Pricing for Task Offloading in Serverless Edge Computing,"
IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 7438-7452, 2024.
[35]
Y. M. Park et al.,
"Joint Trajectory and Resource Optimization of MEC-Assisted UAVs in Sub-THz Networks : A Resources-Based Multi-Agent Proximal Policy Optimization DRL With Attention Mechanism,"
IEEE Transactions on Vehicular Technology, vol. 73, no. 2, pp. 2003-2016, 2024.
[36]
Q. Wang et al.,
"Knowledge-Enhanced Physical Layer Authentication for Mobile Devices,"
IEEE transactions on consumer electronics, vol. 70, no. 4, pp. 7436-7448, 2024.
[37]
C. Sun et al.,
"Layer-wise Efficient Federated Learning with Distributed Clustering and D2D Communications,"
in 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024, 2024, pp. 831-835.
[38]
K. Hammar and R. Stadler,
"Learning Near-Optimal Intrusion Responses Against Dynamic Attackers,"
IEEE Transactions on Network and Service Management, vol. 21, no. 1, pp. 1158-1177, 2024.
[39]
C. Chen and J. Zhang,
"Machine Learning Enhanced Near-Field Secret Key Generation for Extremely Large-Scale MIMO,"
in 2024 IEEE International Conference on Machine Learning for Communication and Networking, ICMLCN 2024, 2024, pp. 183-188.
[40]
S. M. Azimi Abarghouyi and H. S. Dhillon,
"Matérn cluster process with holes at the cluster centers,"
Statistics and Probability Letters, vol. 204, 2024.
[41]
F. Shahabsamani, K. Hammar and R. Stadler,
"Online Policy Adaptation for Networked Systems using Rollout,"
in IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024, Seoul, South Korea, 2024.
[42]
F. S. Samani, K. Hammar and R. Stadler,
"Online Policy Adaptation for Networked Systems using Rollout,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[43]
S. M. Azimi Abarghouyi and L. Tassiulas,
"Over-the-Air Federated Learning via Weighted Aggregation,"
IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 18240-18253, 2024.
[44]
H. Hellström et al.,
"Over-the-Air Histogram Estimation,"
in ICC 2024 - IEEE International Conference on Communications, 2024, pp. 4717-4722.
[45]
R. Thobaben, N. Schroen and C. Fischione,
"Performance of Codebook-Aware Jamming Attacks,"
in 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024, 2024, pp. 206-210.
[46]
W. Liu and P. Papadimitratos,
"Position-based Rogue Access Point Detection,"
in Proceedings - 9th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024, 2024, pp. 436-442.
[47]
N. Korotkova, J. Lilliesköld and E. Hetemi,
"Pursuing Openness in the Digital Age : Insights from Client–Contractor Knowledge Collaboration at the Project Front End,"
International Journal of Project Management, vol. 42, no. 1, pp. 102564-102564, 2024.
[48]
S. Al-Hazbi et al.,
"Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities,"
in 20th International Wireless Communications and Mobile Computing Conference, IWCMC 2024, 2024, pp. 824-829.
[49]
F. Tütüncüoglu and G. Dán,
"Sample-efficient Learning for Edge Resource Allocation and Pricing with BNN Approximators,"
in IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024, 2024.
[50]
S. M. Azimi Abarghouyi and V. Fodor,
"Scalable Hierarchical Over-the-Air Federated Learning,"
IEEE Transactions on Wireless Communications, vol. 23, no. 8, pp. 8480-8496, 2024.