Skip to main content
To KTH's start page To KTH's start page

Latest publications

Recent publications by the Division of Network and Systems Engineering.

The latest publications from NSE

[1]
E. Shereen, K. Kazari and G. Dán, "A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control," IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[2]
A. Hasselberg et al., "Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge," in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[3]
Y. K. Tun et al., "Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach," IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[4]
F. Heiding et al., "Devising and Detecting Phishing Emails Using Large Language Models," IEEE Access, vol. 12, pp. 42131-42146, 2024.
[5]
S. Katsikeas et al., "Empirical evaluation of a threat modeling language as a cybersecurity assessment tool," Computers & security (Print), vol. 140, 2024.
[6]
M. Bokaei et al., "Harmonic retrieval using weighted lifted-structure low-rank matrix completion," Signal Processing, vol. 216, 2024.
[7]
Y. You, Q. Xu and C. Fischione, "Hierarchical Online Game-Theoretic Framework for Real-Time Energy Trading in Smart Grid," IEEE Transactions on Smart Grid, vol. 15, no. 2, pp. 1634-1645, 2024.
[8]
S. M. Azimi Abarghouyi and H. S. Dhillon, "Matérn cluster process with holes at the cluster centers," Statistics and Probability Letters, vol. 204, 2024.
[9]
N. Korotkova, J. Lilliesköld and E. Hetemi, "Pursuing Openness in the Digital Age : Insights from Client–Contractor Knowledge Collaboration at the Project Front End," International Journal of Project Management, vol. 42, no. 1, pp. 102564-102564, 2024.
[10]
T. Nguyen Dang et al., "A Contract-Theory-Based Incentive Mechanism for UAV-Enabled VR-Based Services in 5G and Beyond," IEEE Internet of Things Journal, vol. 10, no. 18, pp. 16465-16479, 2023.
[11]
[12]
L. Varawala et al., "A pricing mechanism to jointly mitigate market power and environmental externalities in electricity markets," Energy Economics, vol. 121, pp. 106646-106646, 2023.
[13]
S. Raavikanti, S. Hacks and S. Katsikeas, "A Recommender Plug-in for Enterprise Architecture Models," in Proceedings of the 25th International Conference on Enterprise Information Systems - Volume 2, ICEIS 2023, 2023, pp. 474-480.
[15]
C. Linse and J. Lilliesköld, "A space for action : Ambiguity as abasis for creativity and innovation," in 30th IPDMC: Innovation and Product Development Management Conference, Lecco, Italy, June 7-9, 2023, 2023.
[16]
S. S. Mostafavi et al., "Active Queue Management with Data-Driven Delay Violation Probability Predictors," in GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, pp. 6371-6376.
[17]
E. Shereen, K. Kazari and G. Dán, "Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids," in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, 2023.
[18]
V. Sachidananda et al., "APTer : Towards the Investigation of APT Attribution," in Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023, 2023.
[19]
S. Daei et al., "Blind Asynchronous Goal-Oriented Detection for Massive Connectivity," in 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023, 2023, pp. 167-174.
[20]
M. Balliu et al., "Challenges of Producing Software Bill of Materials for Java," IEEE Security and Privacy, vol. 21, no. 6, pp. 12-23, 2023.
[21]
S. Razavikia, J. M. B. Da Silva and C. Fischione, "ChannelComp : A General Method for Computation by Communications," IEEE Transactions on Communications, pp. 1-1, 2023.
[22]
S. Razavikia, J. M. Barros da Silva Jr. and C. Fischione, "Computing Functions Over-the-Air Using Digital Modulations," in ICC 2023 : IEEE International Conference on Communications: Sustainable Communications for Renaissance, 2023, pp. 5780-5786.
[23]
K. Kazari, E. Shereen and G. Dán, "Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning," in Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, 2023, pp. 162-170.
[24]
P. S. Aung et al., "Deep Reinforcement Learning based Spectral Efficiency Maximization in STAR-RIS-Assisted Indoor Outdoor Communication," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[25]
K. Kim et al., "Deep Reinforcement Learning for Channel Estimation in RIS-Aided Wireless Networks," IEEE Communications Letters, vol. 27, no. 8, pp. 2053-2057, 2023.
[26]
F. S. Samani, K. Hammar and R. Stadler, "Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[27]
L. X. Nguyen et al., "Dependency Tasks Offloading and Communication Resource Allocation in Collaborative UAV Networks : A Metaheuristic Approach," IEEE Internet of Things Journal, vol. 10, no. 10, pp. 9062-9076, 2023.
[28]
M. Spanghero and P. Papadimitratos, "Detecting GNSS misbehavior leveraging secure heterogeneous time sources," in IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023, 2023.
[29]
P. Shahrivar, S. Millar and E. Shereen, "Detecting Web Application DAST Attacks with Machine Learning," in Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023, 2023.
[30]
R. Ramakrishna et al., "Differential Privacy for Class-Based Data : A Practical Gaussian Mechanism," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5096-5108, 2023.
[31]
K. Hammar and R. Stadler, "Digital Twins for Security Automation," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[32]
F. Liljeblad, J. Lilliesköld and E. Hetemi, "Digitalization in an academic organization : Insights from a case study at a Swedish university," in European Academy of Management Conference (EURAM) 2023, Dublin, Ireland, 14-16 June 2023, 2023.
[33]
Y. Xu et al., "Distributed Assignment With Load Balancing for DNN Inference at the Edge," IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1053-1065, 2023.
[34]
C. Barreto et al., "Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime," Computers & security (Print), vol. 131, pp. 1-16, 2023.
[35]
L. Zou et al., "Energy Efficient Leaderless Softwarized UAV Network: Joint Intelligent User Association and Resource Allocation Design," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[36]
E. Rencelj Ling and M. Ekstedt, "Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data," SN Computer Science, vol. 4, no. 3, 2023.
[37]
R. Bourgerie and T. Zanouda, "Fault Detection in Telecom Networks Using Bi-Level Federated Graph Neural Networks," in 2023 IEEE International Conference on Data Mining Workshops (ICDMW), 2023, pp. 1608-1617.
[38]
H. Hellström, V. Fodor and C. Fischione, "Federated Learning Over-the-Air by Retransmissions," IEEE Transactions on Wireless Communications, pp. 1-1, 2023.
[39]
S. Kant et al., "Federated Learning Using Three-Operator ADMM," IEEE Journal on Selected Topics in Signal Processing, vol. 17, no. 1, pp. 205-221, 2023.
[40]
S. M. Azimi Abarghouyi, H. S. Dhillon and L. Tassiulas, "Fundamentals of Clustered Molecular Nanonetworks," IEEE Transactions on Molecular, Biological, and Multi-Scale Communications, vol. 9, no. 2, pp. 135-145, 2023.
[41]
F. Liljeblad and J. Lilliesköld, "How Prepared are Universities for Digitalization?," in 2nd International Symposium on Digital Transformation August 21-23, 2023, Växjö, Sweden, 2023.
[42]
D. P. Sousa et al., "Leakage detection in water distribution networks using machine-learning strategies," Water Science and Technology : Water Supply, vol. 23, no. 3, pp. 1115-1126, 2023.
[43]
J. Qadir et al., "Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme," IEEE Access, vol. 11, pp. 68301-68315, 2023.
[44]
S. Razavikia et al., "Off-the-grid Blind Deconvolution and Demixing," in GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, pp. 7604-7610.
[45]
S. Ranaweera et al., "On the Convergence of Inexact Gradient Descent With Controlled Synchronization Steps," IEEE Signal Processing Letters, vol. 30, pp. 703-707, 2023.
[46]
H. Abeynanda et al., "On the Primal Feasibility in Dual Decomposition Methods Under Additive and Bounded Errors," IEEE Transactions on Signal Processing, vol. 71, pp. 655-669, 2023.
[47]
F. Tutuncuoglu, S. Josilo and G. Dán, "Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing," IEEE/ACM Transactions on Networking, vol. 31, no. 2, pp. 695-709, 2023.
[48]
Z. Chen et al., "Over-the-Air Computation for Distributed Systems : Something Old and Something New," IEEE Network, vol. 37, no. 5, pp. 240-246, 2023.
[49]
E. Süren et al., "PatrIoT : practical and agile threat research for IoT," International Journal of Information Security, vol. 22, no. 1, pp. 213-233, 2023.
[50]
F. Heiding et al., "Penetration testing of connected households," Computers & security (Print), vol. 126, 2023.
Full list in the KTH publications portal