Latest publications
Recent publications by the Division of Network and Systems Engineering.
The latest publications from NSE
[1]
E. Shereen, K. Kazari and G. Dán,
"A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control,"
IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[2]
A. Hasselberg et al.,
"Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge,"
in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[3]
Y. K. Tun et al.,
"Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach,"
IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[4]
F. Heiding et al.,
"Devising and Detecting Phishing Emails Using Large Language Models,"
IEEE Access, vol. 12, pp. 42131-42146, 2024.
[5]
S. Katsikeas et al.,
"Empirical evaluation of a threat modeling language as a cybersecurity assessment tool,"
Computers & security (Print), vol. 140, 2024.
[6]
M. Bokaei et al.,
"Harmonic retrieval using weighted lifted-structure low-rank matrix completion,"
Signal Processing, vol. 216, 2024.
[7]
Y. You, Q. Xu and C. Fischione,
"Hierarchical Online Game-Theoretic Framework for Real-Time Energy Trading in Smart Grid,"
IEEE Transactions on Smart Grid, vol. 15, no. 2, pp. 1634-1645, 2024.
[8]
S. M. Azimi Abarghouyi and H. S. Dhillon,
"Matérn cluster process with holes at the cluster centers,"
Statistics and Probability Letters, vol. 204, 2024.
[9]
N. Korotkova, J. Lilliesköld and E. Hetemi,
"Pursuing Openness in the Digital Age : Insights from Client–Contractor Knowledge Collaboration at the Project Front End,"
International Journal of Project Management, vol. 42, no. 1, pp. 102564-102564, 2024.
[10]
T. Nguyen Dang et al.,
"A Contract-Theory-Based Incentive Mechanism for UAV-Enabled VR-Based Services in 5G and Beyond,"
IEEE Internet of Things Journal, vol. 10, no. 18, pp. 16465-16479, 2023.
[11]
L. Varawala et al.,
"A generalised approach for efficient computation of look ahead security constrained optimal power flow,"
European Journal of Operational Research, 2023.
[12]
L. Varawala et al.,
"A pricing mechanism to jointly mitigate market power and environmental externalities in electricity markets,"
Energy Economics, vol. 121, pp. 106646-106646, 2023.
[13]
S. Raavikanti, S. Hacks and S. Katsikeas,
"A Recommender Plug-in for Enterprise Architecture Models,"
in Proceedings of the 25th International Conference on Enterprise Information Systems - Volume 2, ICEIS 2023, 2023, pp. 474-480.
[14]
D. Weinberg et al.,
"A Review of Reinforcement Learning for Controlling Building Energy Systems From a Computer Science Perspective,"
Sustainable cities and society, vol. 89, 2023.
[15]
C. Linse and J. Lilliesköld,
"A space for action : Ambiguity as abasis for creativity and innovation,"
in 30th IPDMC: Innovation and Product Development Management Conference, Lecco, Italy, June 7-9, 2023, 2023.
[16]
S. S. Mostafavi et al.,
"Active Queue Management with Data-Driven Delay Violation Probability Predictors,"
in GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, pp. 6371-6376.
[17]
E. Shereen, K. Kazari and G. Dán,
"Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids,"
in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, 2023.
[18]
V. Sachidananda et al.,
"APTer : Towards the Investigation of APT Attribution,"
in Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023, 2023.
[19]
S. Daei et al.,
"Blind Asynchronous Goal-Oriented Detection for Massive Connectivity,"
in 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023, 2023, pp. 167-174.
[20]
M. Balliu et al.,
"Challenges of Producing Software Bill of Materials for Java,"
IEEE Security and Privacy, vol. 21, no. 6, pp. 12-23, 2023.
[21]
S. Razavikia, J. M. B. Da Silva and C. Fischione,
"ChannelComp : A General Method for Computation by Communications,"
IEEE Transactions on Communications, pp. 1-1, 2023.
[22]
S. Razavikia, J. M. Barros da Silva Jr. and C. Fischione,
"Computing Functions Over-the-Air Using Digital Modulations,"
in ICC 2023 : IEEE International Conference on Communications: Sustainable Communications for Renaissance, 2023, pp. 5780-5786.
[23]
K. Kazari, E. Shereen and G. Dán,
"Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning,"
in Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, 2023, pp. 162-170.
[24]
P. S. Aung et al.,
"Deep Reinforcement Learning based Spectral Efficiency Maximization in STAR-RIS-Assisted Indoor Outdoor Communication,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[25]
K. Kim et al.,
"Deep Reinforcement Learning for Channel Estimation in RIS-Aided Wireless Networks,"
IEEE Communications Letters, vol. 27, no. 8, pp. 2053-2057, 2023.
[26]
F. S. Samani, K. Hammar and R. Stadler,
"Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[27]
L. X. Nguyen et al.,
"Dependency Tasks Offloading and Communication Resource Allocation in Collaborative UAV Networks : A Metaheuristic Approach,"
IEEE Internet of Things Journal, vol. 10, no. 10, pp. 9062-9076, 2023.
[28]
M. Spanghero and P. Papadimitratos,
"Detecting GNSS misbehavior leveraging secure heterogeneous time sources,"
in IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023, 2023.
[29]
P. Shahrivar, S. Millar and E. Shereen,
"Detecting Web Application DAST Attacks with Machine Learning,"
in Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023, 2023.
[30]
R. Ramakrishna et al.,
"Differential Privacy for Class-Based Data : A Practical Gaussian Mechanism,"
IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5096-5108, 2023.
[31]
K. Hammar and R. Stadler,
"Digital Twins for Security Automation,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[32]
F. Liljeblad, J. Lilliesköld and E. Hetemi,
"Digitalization in an academic organization : Insights from a case study at a Swedish university,"
in European Academy of Management Conference (EURAM) 2023, Dublin, Ireland, 14-16 June 2023, 2023.
[33]
Y. Xu et al.,
"Distributed Assignment With Load Balancing for DNN Inference at the Edge,"
IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1053-1065, 2023.
[34]
C. Barreto et al.,
"Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime,"
Computers & security (Print), vol. 131, pp. 1-16, 2023.
[35]
L. Zou et al.,
"Energy Efficient Leaderless Softwarized UAV Network: Joint Intelligent User Association and Resource Allocation Design,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[36]
E. Rencelj Ling and M. Ekstedt,
"Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data,"
SN Computer Science, vol. 4, no. 3, 2023.
[37]
R. Bourgerie and T. Zanouda,
"Fault Detection in Telecom Networks Using Bi-Level Federated Graph Neural Networks,"
in 2023 IEEE International Conference on Data Mining Workshops (ICDMW), 2023, pp. 1608-1617.
[38]
H. Hellström, V. Fodor and C. Fischione,
"Federated Learning Over-the-Air by Retransmissions,"
IEEE Transactions on Wireless Communications, pp. 1-1, 2023.
[39]
S. Kant et al.,
"Federated Learning Using Three-Operator ADMM,"
IEEE Journal on Selected Topics in Signal Processing, vol. 17, no. 1, pp. 205-221, 2023.
[40]
S. M. Azimi Abarghouyi, H. S. Dhillon and L. Tassiulas,
"Fundamentals of Clustered Molecular Nanonetworks,"
IEEE Transactions on Molecular, Biological, and Multi-Scale Communications, vol. 9, no. 2, pp. 135-145, 2023.
[41]
F. Liljeblad and J. Lilliesköld,
"How Prepared are Universities for Digitalization?,"
in 2nd International Symposium on Digital Transformation August 21-23, 2023, Växjö, Sweden, 2023.
[42]
D. P. Sousa et al.,
"Leakage detection in water distribution networks using machine-learning strategies,"
Water Science and Technology : Water Supply, vol. 23, no. 3, pp. 1115-1126, 2023.
[43]
J. Qadir et al.,
"Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme,"
IEEE Access, vol. 11, pp. 68301-68315, 2023.
[44]
S. Razavikia et al.,
"Off-the-grid Blind Deconvolution and Demixing,"
in GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, pp. 7604-7610.
[45]
S. Ranaweera et al.,
"On the Convergence of Inexact Gradient Descent With Controlled Synchronization Steps,"
IEEE Signal Processing Letters, vol. 30, pp. 703-707, 2023.
[46]
H. Abeynanda et al.,
"On the Primal Feasibility in Dual Decomposition Methods Under Additive and Bounded Errors,"
IEEE Transactions on Signal Processing, vol. 71, pp. 655-669, 2023.
[47]
F. Tutuncuoglu, S. Josilo and G. Dán,
"Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing,"
IEEE/ACM Transactions on Networking, vol. 31, no. 2, pp. 695-709, 2023.
[48]
Z. Chen et al.,
"Over-the-Air Computation for Distributed Systems : Something Old and Something New,"
IEEE Network, vol. 37, no. 5, pp. 240-246, 2023.
[49]
E. Süren et al.,
"PatrIoT : practical and agile threat research for IoT,"
International Journal of Information Security, vol. 22, no. 1, pp. 213-233, 2023.
[50]
F. Heiding et al.,
"Penetration testing of connected households,"
Computers & security (Print), vol. 126, 2023.