Skip to main content
To KTH's start page

Latest publications

Recent publications by the Division of Network and Systems Engineering.

The latest publications from NSE

[1]
M. Spanghero and P. Papadimitratos, "Consumer INS coupled with carrier phase measurements for GNSS spoofing detection," in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[2]
K. Hammar and R. Stadler, "Intrusion Tolerance as a Two-Level Game," in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[4]
O. Stenhammar, G. Fodor and C. Fischione, "A Comparison of Neural Networks for Wireless Channel Prediction," IEEE wireless communications, vol. 31, no. 3, pp. 235-241, 2024.
[5]
F. S. Samani and R. Stadler, "A Framework for Dynamically Meeting Performance Objectives on a Service Mesh," IEEE Transactions on Network and Service Management, vol. 21, no. 6, pp. 5992-6007, 2024.
[6]
V. Engström, G. Nebbione and M. Ekstedt, "A Metalanguage for Dynamic Attack Graphs and Lazy Generation," in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[7]
H. Teixeira De Castro et al., "A Model-based Approach for Assessing the Security of Cyber-Physical Systems," in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[8]
X. Yan, S. Razavikia and C. Fischione, "A Novel Channel Coding Scheme for Digital Multiple Access Computing," in ICC 2024 - IEEE International Conference on Communications, 2024, pp. 3851-3857.
[9]
E. Shereen, K. Kazari and G. Dán, "A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control," IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[10]
S. G. E. Gökstorp et al., "Anomaly Detection in Security Logs using Sequence Modeling," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[11]
S. Razavikia, J. M. Barros da Silva Jr. and C. Fischione, "Blind Federated Learning via Over-the-Air q-QAM," IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 19570-19586, 2024.
[12]
E. Santos Escriche et al., "Channel-Centric Spatio-Temporal Graph Networks for Network-based Intrusion Detection," in 2024 IEEE Conference on Communications and Network Security, CNS 2024, 2024.
[13]
A. Hasselberg et al., "Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge," in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[14]
O. Stenhammar, G. Fodor and C. Fischione, "Clustered Predictive Quality of Service for Connected Vehicles Using Federated Learning," in 2024 IEEE International Conference on Communications Workshops, ICC Workshops 2024, 2024, pp. 626-631.
[15]
Y. K. Tun et al., "Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach," IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[16]
F. S. Samani et al., "Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network Environment," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[17]
S. M. Azimi-Abarghouyi and L. R. Varshney, "Compute-Update Federated Learning : A Lattice Coding Approach," IEEE Transactions on Signal Processing, vol. 72, pp. 5213-5227, 2024.
[18]
R. S. Patil, I. Källman and V. Fodor, "DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization," in 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, pp. 466-473.
[19]
S. Katsikeas et al., "Development and validation of coreLang : A threat modeling language for the ICT domain," Computers & security (Print), vol. 146, 2024.
[20]
F. Heiding et al., "Devising and Detecting Phishing Emails Using Large Language Models," IEEE Access, vol. 12, pp. 42131-42146, 2024.
[21]
F. Tütüncüoglu et al., "Dynamic Time-of-Use Pricing for Serverless Edge Computing with Generalized Hidden Parameter Markov Decision Processes," in Proceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems, ICDCS 2024, 2024, pp. 668-679.
[22]
S. Katsikeas et al., "Empirical evaluation of a threat modeling language as a cybersecurity assessment tool," Computers & security (Print), vol. 140, 2024.
[24]
A. Mahmoudi et al., "FedCau : A Proactive Stop Policy for Communication and Computation Efficient Federated Learning," IEEE Transactions on Wireless Communications, vol. 23, no. 9, pp. 11076-11093, 2024.
[25]
S. M. Azimi Abarghouyi and L. R. Varshney, "Federated Learning via Lattice Joint Source-Channel Coding," in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 1623-1628.
[26]
G. Karlsson, "From Campus to Boot Camp-Lessons from Extramural Teaching in Cybersecurity," in EDUCON 2024 - IEEE Global Engineering Education Conference, Proceedings, 2024.
[27]
M. Bokaei et al., "Harmonic retrieval using weighted lifted-structure low-rank matrix completion," Signal Processing, vol. 216, 2024.
[28]
Y. You, Q. Xu and C. Fischione, "Hierarchical Online Game-Theoretic Framework for Real-Time Energy Trading in Smart Grid," IEEE Transactions on Smart Grid, vol. 15, no. 2, pp. 1634-1645, 2024.
[29]
S. M. Azimi Abarghouyi and V. Fodor, "Hierarchical Over-the-Air Federated Learning with Awareness of Interference and Data Heterogeneity," in 2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024.
[30]
Y. Kim, G. Dán and Q. Zhu, "Human-in-the-loop cyber intrusion detection using active learning," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8658-8672, 2024.
[31]
X. Huang, H. Hellström and C. Fischione, "Interference Cancellation for OTFS-Based Over-the-Air Computation," in 2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, pp. 469-474.
[32]
K. Hammar and R. Stadler, "Intrusion tolerance for networked systems through two-level feedback control," in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, 2024, pp. 338-352.
[33]
X. Wang and R. Stadler, "IT Intrusion Detection Using Statistical Learning and Testbed Measurements," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[34]
F. Tütüncüoğlu and G. Dán, "Joint Resource Management and Pricing for Task Offloading in Serverless Edge Computing," IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 7438-7452, 2024.
[36]
Q. Wang et al., "Knowledge-Enhanced Physical Layer Authentication for Mobile Devices," IEEE transactions on consumer electronics, vol. 70, no. 4, pp. 7436-7448, 2024.
[37]
C. Sun et al., "Layer-wise Efficient Federated Learning with Distributed Clustering and D2D Communications," in 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024, 2024, pp. 831-835.
[38]
K. Hammar and R. Stadler, "Learning Near-Optimal Intrusion Responses Against Dynamic Attackers," IEEE Transactions on Network and Service Management, vol. 21, no. 1, pp. 1158-1177, 2024.
[39]
C. Chen and J. Zhang, "Machine Learning Enhanced Near-Field Secret Key Generation for Extremely Large-Scale MIMO," in 2024 IEEE International Conference on Machine Learning for Communication and Networking, ICMLCN 2024, 2024, pp. 183-188.
[40]
S. M. Azimi Abarghouyi and H. S. Dhillon, "Matérn cluster process with holes at the cluster centers," Statistics and Probability Letters, vol. 204, 2024.
[41]
F. Shahabsamani, K. Hammar and R. Stadler, "Online Policy Adaptation for Networked Systems using Rollout," in IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024, Seoul, South Korea, 2024.
[42]
F. S. Samani, K. Hammar and R. Stadler, "Online Policy Adaptation for Networked Systems using Rollout," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[43]
S. M. Azimi Abarghouyi and L. Tassiulas, "Over-the-Air Federated Learning via Weighted Aggregation," IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 18240-18253, 2024.
[44]
H. Hellström et al., "Over-the-Air Histogram Estimation," in ICC 2024 - IEEE International Conference on Communications, 2024, pp. 4717-4722.
[45]
R. Thobaben, N. Schroen and C. Fischione, "Performance of Codebook-Aware Jamming Attacks," in 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024, 2024, pp. 206-210.
[46]
W. Liu and P. Papadimitratos, "Position-based Rogue Access Point Detection," in Proceedings - 9th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024, 2024, pp. 436-442.
[47]
N. Korotkova, J. Lilliesköld and E. Hetemi, "Pursuing Openness in the Digital Age : Insights from Client–Contractor Knowledge Collaboration at the Project Front End," International Journal of Project Management, vol. 42, no. 1, pp. 102564-102564, 2024.
[48]
S. Al-Hazbi et al., "Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities," in 20th International Wireless Communications and Mobile Computing Conference, IWCMC 2024, 2024, pp. 824-829.
[49]
F. Tütüncüoglu and G. Dán, "Sample-efficient Learning for Edge Resource Allocation and Pricing with BNN Approximators," in IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024, 2024.
[50]
S. M. Azimi Abarghouyi and V. Fodor, "Scalable Hierarchical Over-the-Air Federated Learning," IEEE Transactions on Wireless Communications, vol. 23, no. 8, pp. 8480-8496, 2024.
Full list in the KTH publications portal