Skip to main content
To KTH's start page

Latest publications

Recent publications by the Division of Network and Systems Engineering.

The latest publications from NSE

[1]
H. Jin and P. Papadimitratos, "Accountable, Scalable and DoS-resilient Secure Vehicular Communication," Computers & Security, vol. 156, 2025.
[2]
K. Hammar et al., "Adaptive Security Response Strategies Through Conjectural Online Learning," IEEE Transactions on Information Forensics and Security, vol. 20, pp. 4055-4070, 2025.
[3]
C. Linse and J. Lilliesköld, "Agile in the realm of bureaucracy : old habits die hard," in R&D Management 2025 : Innovation and Biodiversity, 2025.
[4]
E. Rencelj Ling and M. Ekstedt, "Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph Generation," in Proceedings 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025, pp. 578-585.
[5]
A. Ben Ameur et al., "Cache Allocation in Multi-Tenant Edge Computing : An Online Model-Based Reinforcement Learning Approach," IEEE Transactions on Cloud Computing, vol. 13, no. 2, pp. 459-472, 2025.
[6]
Z. Zhou, H. Jin and P. Papadimitratos, "Clogging DoS Resilient Bootstrapping of Efficient V2V Validation," in 40th Annual ACM Symposium On Applied Computing, 2025, pp. 1857-1866.
[7]
O. Stenhammar et al., "Clustering of Geographical Segments for Predictive Quality of Service of Connected Vehicles," IEEE Transactions on Vehicular Technology, 2025.
[8]
M. Spanghero and P. Papadimitratos, "Consumer INS coupled with carrier phase measurements for GNSS spoofing detection," in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[9]
F. Tütüncüoglu et al., "COPES: Contention-aware Pricing and Service Placement in Serverless Edge Computing," IEEE Transactions on Mobile Computing, 2025.
[10]
Y. Huang et al., "Demystifying Molecular Data-Driven Detection With Explainable Artificial Intelligence," IEEE Wireless Communications Letters, vol. 14, no. 6, pp. 1753-1757, 2025.
[11]
H. Sasahara et al., "Green Routing Game : Pollution-Aware Mixed Fleet Logistics With Shared Charging Facilities," IEEE Transactions on Automatic Control, pp. 1-14, 2025.
[12]
W. Liu and P. Papadimitratos, "Guardian Positioning System (GPS) for Location Based Services," in WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, pp. 88-99.
[13]
X. Huang et al., "Heterogeneous Receptors-Based Molecule Harvesting in MC : Analysis for ISI Mitigation and Energy Efficiency," IEEE Transactions on Communications, vol. 73, no. 3, pp. 1621-1637, 2025.
[14]
S. M. Azimi Abarghouyi et al., "Hierarchical Federated ADMM," IEEE Networking Letters, vol. 7, no. 1, pp. 11-15, 2025.
[15]
C. Aknesil et al., "Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks," in Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, 2025, pp. 129-134.
[16]
M. Z. Naseer, V. Fodor and M. Ekstedt, "Informed Defense : How Attacker Profiles Transform Vulnerability Assessments," in Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025, 2025, pp. 453-460.
[17]
H. Zhang et al., "Integrated Sensing and Communication for 6G Holographic Digital Twins," IEEE wireless communications, vol. 32, no. 2, pp. 104-112, 2025.
[18]
K. Hammar and R. Stadler, "Intrusion Tolerance as a Two-Level Game," in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[19]
Y. K. Tun et al., "Joint UAV Deployment and Resource Allocation in THz-Assisted MEC-Enabled Integrated Space-Air-Ground Networks," IEEE Transactions on Mobile Computing, vol. 24, no. 5, pp. 3794-3808, 2025.
[20]
S. Alhazbi et al., "LLMs Have Rhythm : Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis," IEEE Open Journal of the Communications Society, vol. 6, pp. 5050-5071, 2025.
[21]
X. Huang, H. Hellström and C. Fischione, "Low-Complexity OTFS-Based Over-the-Air Computation Design for Time-Varying Channels," IEEE Transactions on Wireless Communications, vol. 24, no. 3, pp. 2483-2497, 2025.
[22]
L. Fernandez and G. Karlsson, "Measuring the Impact of Fuzzing Activity in Networking Software," in 40TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2025, pp. 1746-1748.
[23]
S. Mostafavi et al., "Predictability of Performance in Communication Networks Under Markovian Dynamics," IEEE Transactions on Vehicular Technology, 2025.
[25]
O. Stenhammar et al., "Real-Time Network Digital Twin : Experimental Setup for Proof of Concept," IEEE wireless communications, vol. 32, no. 3, pp. 114-121, 2025.
[26]
M. Byrd Victorica, G. Dán and H. Sandberg, "SpaNN : Detecting Multiple Adversarial Patches on CNNs by Spanning Saliency Thresholds," in Proceedings - 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, 2025, pp. 459-478.
[27]
S. Razavikia, J. M. B. da Silva Jr and C. Fischione, "SumComp : Coding for Digital Over-the-Air Computation via the Ring of Integers," IEEE Transactions on Communications, vol. 73, no. 2, pp. 752-767, 2025.
[28]
F. Nasrabadi, R. Künnemann and H. Nemati, "Symbolic Parallel Composition for Multi-language Protocol Verification," in Proceedings - 2025 IEEE 38th Computer Security Foundations Symposium, CSF 2025, 2025, pp. 378-393.
[29]
A. Pérez-Neira et al., "Waveforms for Computing Over the Air: A groundbreaking approach that redefines data aggregation," IEEE signal processing magazine (Print), vol. 42, no. 2, pp. 57-77, 2025.
[30]
D. Umsonst et al., "A Bayesian Nash Equilibrium-Based Moving Target Defense Against Stealthy Sensor Attacks," IEEE Transactions on Automatic Control, vol. 69, no. 3, pp. 1659-1674, 2024.
[32]
O. Stenhammar, G. Fodor and C. Fischione, "A Comparison of Neural Networks for Wireless Channel Prediction," IEEE wireless communications, vol. 31, no. 3, pp. 235-241, 2024.
[33]
F. S. Samani and R. Stadler, "A Framework for Dynamically Meeting Performance Objectives on a Service Mesh," IEEE Transactions on Network and Service Management, vol. 21, no. 6, pp. 5992-6007, 2024.
[34]
V. Engström, G. Nebbione and M. Ekstedt, "A Metalanguage for Dynamic Attack Graphs and Lazy Generation," in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[35]
H. Teixeira De Castro et al., "A Model-based Approach for Assessing the Security of Cyber-Physical Systems," in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[36]
X. Yan, S. Razavikia and C. Fischione, "A Novel Channel Coding Scheme for Digital Multiple Access Computing," in ICC 2024 - IEEE International Conference on Communications, 2024, pp. 3851-3857.
[37]
E. Shereen, K. Kazari and G. Dán, "A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control," IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[38]
G. L. Rajora et al., "A review of asset management using artificial intelligence-based machine learning models : Applications for the electric power and energy system," IET Generation, Transmission & Distribution, vol. 18, no. 12, pp. 2155-2170, 2024.
[39]
Y. Guo et al., "Age-of-Information and Energy Optimization in Digital Twin Edge Networks," in GLOBECOM 2024 - 2024 IEEE Global Communications Conference, 2024, pp. 3194-3200.
[40]
S. G. E. Gökstorp et al., "Anomaly Detection in Security Logs using Sequence Modeling," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[41]
S. Razavikia, J. M. Barros da Silva Jr. and C. Fischione, "Blind Federated Learning via Over-the-Air q-QAM," IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 19570-19586, 2024.
[42]
E. Santos Escriche et al., "Channel-Centric Spatio-Temporal Graph Networks for Network-based Intrusion Detection," in 2024 IEEE Conference on Communications and Network Security, CNS 2024, 2024.
[43]
S. Razavikia, J. M. B. Da Silva and C. Fischione, "ChannelComp : A General Method for Computation by Communications," IEEE Transactions on Communications, vol. 72, no. 2, pp. 692-706, 2024.
[44]
A. Hasselberg et al., "Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge," in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[45]
O. Stenhammar, G. Fodor and C. Fischione, "Clustered Predictive Quality of Service for Connected Vehicles Using Federated Learning," in 2024 IEEE International Conference on Communications Workshops, ICC Workshops 2024, 2024, pp. 626-631.
[46]
Y. K. Tun et al., "Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach," IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[47]
S. Hussein et al., "Communication-Efficient Distributed Computing via Matrix Factorization," in Conference Record of the 58th Asilomar Conference on Signals, Systems and Computers, ACSSC 2024, 2024, pp. 1453-1460.
[48]
F. S. Samani et al., "Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network Environment," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[49]
S. M. Azimi-Abarghouyi and L. R. Varshney, "Compute-Update Federated Learning : A Lattice Coding Approach," IEEE Transactions on Signal Processing, vol. 72, pp. 5213-5227, 2024.
[50]
T. Li et al., "Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games," in 2024 IEEE 63rd Conference on Decision and Control, CDC 2024, 2024, pp. 6780-6785.
Full list in the KTH publications portal