Latest publications
Recent publications by the Division of Network and Systems Engineering.
The latest publications from NSE
[1]
X. Yan, S. Razavikia and C. Fischione,
"Multi-Symbol Digital AirComp via Modulation Design and Power Adaptation,"
IEEE Communications Letters, vol. 30, pp. 602-606, 2026.
[2]
Z. Li et al.,
"Sensing Line of Sight Perturbations in 6 GHz Wi-Fi using Channel Model based Features,"
IEEE Sensors Journal, 2026.
[3]
H. Jin and P. Papadimitratos,
"Accountable, Scalable and DoS-resilient Secure Vehicular Communication,"
Computers & Security, vol. 156, 2025.
[4]
K. Hammar et al.,
"Adaptive Security Response Strategies Through Conjectural Online Learning,"
IEEE Transactions on Information Forensics and Security, vol. 20, pp. 4055-4070, 2025.
[5]
K. Shi et al.,
"Age-of-Information and Latency Minimization for Cache-enabled Mobile Crowdsensing Networks,"
IEEE Transactions on Vehicular Technology, 2025.
[6]
C. Linse and J. Lilliesköld,
"Agile in the realm of bureaucracy : old habits die hard,"
in R&D Management 2025 : Innovation and Biodiversity, 2025.
[7]
E. Rencelj Ling and M. Ekstedt,
"Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph Generation,"
in Proceedings 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025, pp. 578-585.
[8]
H. Li et al.,
"AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons,"
in PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, pp. 8-13.
[9]
C. Linse and J. Lilliesköld,
"Barriers to deploying agile methods in established product development organizations,"
IEEE Engineering Management Review, 2025.
[10]
A. Ben Ameur et al.,
"Cache Allocation in Multi-Tenant Edge Computing : An Online Model-Based Reinforcement Learning Approach,"
IEEE Transactions on Cloud Computing, vol. 13, no. 2, pp. 459-472, 2025.
[11]
X. Liu, C. Chen and C. Fischione,
"Cell-Free ISAC Systems : Learning-Based Channel Estimation and Coordinated Beamforming,"
IEEE Transactions on Cognitive Communications and Networking, 2025.
[12]
Z. Zhou, H. Jin and P. Papadimitratos,
"Clogging DoS Resilient Bootstrapping of Efficient V2V Validation,"
in 40th Annual ACM Symposium On Applied Computing, 2025, pp. 1857-1866.
[13]
O. Stenhammar et al.,
"Clustering of Geographical Segments for Predictive Quality of Service of Connected Vehicles,"
IEEE Transactions on Vehicular Technology, 2025.
[14]
M. Spanghero and P. Papadimitratos,
"Consumer INS coupled with carrier phase measurements for GNSS spoofing detection,"
in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[15]
X. Liu and C. Fischione,
"Coordinated Beamforming for Multi-cell ISAC using Graph Neural Networks,"
IEEE Transactions on Wireless Communications, 2025.
[16]
Y. Huang et al.,
"Demystifying Molecular Data-Driven Detection With Explainable Artificial Intelligence,"
IEEE Wireless Communications Letters, vol. 14, no. 6, pp. 1753-1757, 2025.
[17]
H. Sun et al.,
"Enhancing Low-Latency and High-Reliability Data Forwarding for In-Vehicle Time-Sensitive Networks,"
IEEE Transactions on Vehicular Technology, vol. 74, no. 8, pp. 11868-11881, 2025.
[18]
Y. Fu et al.,
"Enhancing Mobile Crowdsensing Efficiency: A Coverage-Aware Resource Allocation Approach,"
in 2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings, 2025.
[19]
H. Sasahara et al.,
"Green Routing Game : Pollution-Aware Mixed Fleet Logistics With Shared Charging Facilities,"
IEEE Transactions on Automatic Control, pp. 1-14, 2025.
[20]
W. Liu and P. Papadimitratos,
"Guardian Positioning System (GPS) for Location Based Services,"
in WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, pp. 88-99.
[21]
X. Huang et al.,
"Heterogeneous Receptors-Based Molecule Harvesting in MC : Analysis for ISI Mitigation and Energy Efficiency,"
IEEE Transactions on Communications, vol. 73, no. 3, pp. 1621-1637, 2025.
[22]
S. M. Azimi Abarghouyi et al.,
"Hierarchical Federated ADMM,"
IEEE Networking Letters, vol. 7, no. 1, pp. 11-15, 2025.
[23]
S. M. Azimi Abarghouyi et al.,
"Hierarchical Federated ADMM,"
IEEE NETWORKING LETTERS, vol. 7, no. 1, pp. 11-15, 2025.
[24]
S. M. Azimi Abarghouyi et al.,
"Hierarchical Federated ADMM,"
IEEE NETWORKING LETTERS, vol. 7, no. 1, pp. 11-15, 2025.
[25]
C. Aknesil et al.,
"Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks,"
in Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, 2025, pp. 129-134.
[26]
M. Z. Naseer, V. Fodor and M. Ekstedt,
"Informed Defense : How Attacker Profiles Transform Vulnerability Assessments,"
in Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025, 2025, pp. 453-460.
[27]
H. Zhang et al.,
"Integrated Sensing and Communication for 6G Holographic Digital Twins,"
IEEE wireless communications, vol. 32, no. 2, pp. 104-112, 2025.
[28]
Y. Huang et al.,
"Interference-Resilient Optical Wireless Positioning via Machine Learning-Enhanced Subset Filtering,"
in Proceedings of the 51st European Conference on Optical Communication, 2025.
[29]
K. Hammar and R. Stadler,
"Intrusion Tolerance as a Two-Level Game,"
in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[30]
W. Johan, A. Hussain and P. Papadimitratos,
"Jailbreaking Large Language Models Through Content Concretization,"
in GameSec 2025 : 16th Conference on Game Theory and AI for Security, 2025.
[31]
K. Shi et al.,
"Joint System Latency and Data Freshness Optimization for Cache-Enabled Mobile Crowdsensing Networks,"
in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 4166-4172.
[32]
Y. K. Tun et al.,
"Joint UAV Deployment and Resource Allocation in THz-Assisted MEC-Enabled Integrated Space-Air-Ground Networks,"
IEEE Transactions on Mobile Computing, vol. 24, no. 5, pp. 3794-3808, 2025.
[33]
A. W. S. Jaber and G. Colo,
"LB-MDP-CL : A Reinforcement Learning and Co-evolutionary Approach for Optimizing Responses in Multi-Step Cyberattacks,"
in Proceedings 2025 23rd Mediterranean Communication and Computer Networking Conference (MedComNet), 2025.
[34]
S. Alhazbi et al.,
"LLMs Have Rhythm : Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis,"
IEEE Open Journal of the Communications Society, vol. 6, pp. 5050-5071, 2025.
[35]
X. Huang, H. Hellström and C. Fischione,
"Low-Complexity OTFS-Based Over-the-Air Computation Design for Time-Varying Channels,"
IEEE Transactions on Wireless Communications, vol. 24, no. 3, pp. 2483-2497, 2025.
[36]
J. Jeong et al.,
"Majority Vote Compressed Sensing for Over-the-Air Histogram Estimation,"
in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 5742-5748.
[37]
L. Fernandez and G. Karlsson,
"Measuring the Impact of Fuzzing Activity in Networking Software,"
in 40TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2025, pp. 1746-1748.
[38]
S. Hussein, C. Enyioha and C. Fischione,
"Multiple Receiver Over-the-Air Computation for Wireless Networked Control Systems,"
in 2025 IEEE 64th Conference on Decision and Control (CDC), 2025, pp. 509-514.
[39]
A. Javeed, V. Fodor and G. Dán,
"PERX : Energy-aware O-RAN Service Orchestration with Pairwise Performance Profiling,"
in IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2025, 2025.
[40]
S. Mostafavi et al.,
"Predictability of Performance in Communication Networks Under Markovian Dynamics,"
IEEE Transactions on Vehicular Technology, 2025.
[41]
K. Kazari, A. Kanellopoulos and G. Dán,
"Quickest Detection of Adversarial Attacks Against Correlated Equilibria,"
in Thirty-Ninth AAAI Conference On Artificial Intelligence, AAAI-25, VOL 39 NO 13, 2025, pp. 13961-13968.
[42]
C. Linse and J. Lilliesköld,
"Reaching for the stars of grasping for straws? : Exploring reasons for adopting agile methods in development of complex mechatronic products,"
in EURAM 2025 : Managing with purpose, 2025.
[43]
O. Stenhammar et al.,
"Real-Time Network Digital Twin : Experimental Setup for Proof of Concept,"
IEEE wireless communications, vol. 32, no. 3, pp. 114-121, 2025.
[44]
X. Yan, S. Razavikia and C. Fischione,
"ReMAC : Digital Multiple Access Computing by Repeated Transmissions,"
IEEE Transactions on Communications, 2025.
[45]
B. Hu et al.,
"Resource Allocation Optimisation for Low-Altitude Economy-Enabled IoT Networks,"
in 2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings, 2025.
[46]
M. Byrd Victorica, G. Dán and H. Sandberg,
"SpaNN : Detecting Multiple Adversarial Patches on CNNs by Spanning Saliency Thresholds,"
in Proceedings - 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, 2025, pp. 459-478.
[47]
S. Razavikia, J. M. B. da Silva Jr and C. Fischione,
"SumComp : Coding for Digital Over-the-Air Computation via the Ring of Integers,"
IEEE Transactions on Communications, vol. 73, no. 2, pp. 752-767, 2025.
[48]
F. Nasrabadi, R. Künnemann and H. Nemati,
"Symbolic Parallel Composition for Multi-language Protocol Verification,"
in Proceedings - 2025 IEEE 38th Computer Security Foundations Symposium, CSF 2025, 2025, pp. 378-393.
[49]
S. Daei et al.,
"Timely and Painless Breakups : Off-the-Grid Blind Message Recovery and Users' Demixing,"
IEEE Transactions on Information Theory, vol. 71, no. 7, pp. 5226-5257, 2025.
[50]
A. M. Hussain, N. Abughanam and P. Papadimitratos,
"Towards a Lightweight Edge AI-based Radio Frequency Fingerprinting,"
in 2025 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2025, pp. 1540-1545.