Latest publications

Recent publications by the Division of Network and Systems Engineering.

The latest publications from NSE

[1]
J. M. Barros da Silva Jr. et al., "1-bit Phase Shifters for Large-Antenna Full-Duplex mmWave Communications," IEEE Transactions on Wireless Communications, 2020.
[2]
H. S. Ghadikolaei et al., "A Hybrid Model-based and Data-driven Approach to Spectrum Sharing in mmWave Cellular Networks," IEEE Transactions on Cognitive Communications and Networking, 2020.
[3]
H. Shokri-Ghadikolaei and S. Magnússon, "Communication-efficient Variance-reduced Stochastic Gradient Descent," in 21st IFAC World Congress, 2020.
[4]
S. Josilo and G. Dán, "Computation Offloading Scheduling for Periodic Tasks in Mobile Edge Computing," IEEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 667-680, 2020.
[5]
S. Josilo and G. Dán, "Computation Offloading Scheduling for Periodic Tasks in Mobile Edge Computing," IEEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 667-680, 2020.
[6]
A. Mahmoudi, H. Shokri-Ghadikolaei and C. Fischione, "Cost-efficient Distributed Optimization In Machine Learning Over Wireless Networks," in IEEE International conference on communications, 2020.
[7]
X. Jiang et al., "Delay Optimization for Industrial Wireless Control Systems Based on Channel Characterization," IEEE Transactions on Industrial Informatics, vol. 16, no. 9, pp. 5855-5865, 2020.
[8]
S. Kavosi, S. Hacks and R. Lagerström, "Divergence Between Conceptual Business Process Management and its Practical Business Improvement Implementation : A Comparative Study," in IEEE 22nd Conference on Business Informatics (CBI) Workshops, 2020, pp. 65-70.
[9]
S. Saritas, S. Yuksel and S. Gezici, "Dynamic signaling games with quadratic criteria under Nash and Stackelberg equilibria," Automatica, vol. 115, 2020.
[10]
M. Zeng and V. Fodor, "Dynamic Spectrum Sharing for Load Balancing in Multi-Cell Mobile Edge Computing," IEEE Wireless Communications Letters, vol. 9, no. 2, pp. 189-193, 2020.
[11]
J. M. Barros da Silva Jr. et al., "Energy Efficient Full-Duplex Networks," in Green Communications for Energy-Efficient Wireless Systems and Networks, H. Suraweera, J. Yang, A. Zappone, J. S. Thompson Ed., : The Institution of Engineering and Technology (IET), 2020.
[13]
E. Shereen et al., "Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation," IEEE Transactions on Instrumentation and Measurement, vol. 69, no. 6, pp. 3412-3427, 2020.
[14]
S. Josilo and G. Dán, "Joint Wireless and Edge Computing Resource Management with Dynamic Network Slice Selection," IEEE/ACM Transactions on Networking, 2020.
[15]
H. Ghauch, "Machine Learning for Spectrum Sharing in Millimeter‐Wave Cellular Networks," in Machine Learning for Future Wireless Communications, Fa‐Long Luo Ed., : John Wiley & Sons, 2020, pp. 45-62.
[16]
A. Mahmoudi, H. Shokri-Ghadikolaei and C. Fischione, "Machine Learning over Networks: Co-design of Distributed Optimization and Communications," in IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, 2020.
[17]
E. Shereen and G. Dán, "Model-Based and Data-Driven Detectors for Time Synchronization Attacks Against PMUs," IEEE Journal on Selected Areas in Communications, vol. 38, no. 1, pp. 169-179, 2020.
[18]
Q. He, D. Yuan and A. Ephremides, "Optimal Scheduling for Emptying a Wireless Network : Solution Characterization, Applications, Including Deadline Constraints," IEEE Transactions on Information Theory, vol. 66, no. 3, pp. 1882-1892, 2020.
[19]
K. Zhang, M. Spanghero and P. Papadimitratos, "Protecting GNSS-based Services using Time Offset Validation," in 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS), 4-20-2020 to 4-23-2020, 2020, pp. 575-583.
[20]
F. Heiding et al., "Securing IoT devices using Geographic and Continuous Login Blocking : A honeypot study," in Proceedings of the 6th International Conference on Information Systems Security and Privacy2020, 2020.
[21]
L. Turchet et al., "The Internet of Audio Things: state-of-the-art, vision, and challenges," IEEE Internet of Things Journal, 2020.
[22]
W. Xiong, F. Krantz and R. Lagerström, "Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept," in Communications in Computer and Information Science : Information Systems Security and Privacy, : Springer, 2020, pp. 272-287.
[23]
R. Lagerström, W. Xiong and M. Ekstedt, "Threat modeling and attack simulations of smart cities : A literature review and explorative study," in ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, pp. 369-376.
[24]
R. Du, H. Shokri-Ghadikolaei and C. Fischione, "Wirelessly-Powered Sensor Networks : Power Allocation for Channel Estimation and Energy Beamforming," IEEE Transactions on Wireless Communications, vol. 19, no. 5, pp. 2987-3002, 2020.
[25]
M. Välja et al., "A Framework for Automatic IT Architecture Modeling : Applying Truth Discovery," Complex Systems Informatics and Modeling Quarterly, no. 20, 2019.
[26]
P. Zhao et al., "A Game Theoretic Approach to Uplink Pilot and Data Power Control in Multi-Cell Multi-User MIMO Systems," IEEE Transactions on Vehicular Technology, vol. 68, no. 9, pp. 8707-8720, 2019.
[27]
R. Lagerström et al., "A Methodology for Operationalizing Enterprise IT Architecture and Evaluating its Modifiability," International Journal of Complex Systems Informatics and Modeling Quarterly (CSIMQ), vol. 19, pp. 75-98, 2019.
[28]
X. Jiang et al., "A Simplified Interference Model for Outdoor Millimeter-waveNetworks," Mobile Networks and Applications, vol. 24, no. 3, pp. 983-990, 2019.
[29]
W. Xiong et al., "A Study of Security Vulnerabilities and Software Weaknesses in Vehicles," in Nordic Conference on Secure IT Systems, : Springer, 2019, pp. 204-218.
[30]
Y. Xu, H. Shokri Ghadikolaei and C. Fischione, "Adaptive Distributed Association in Time-Variant Millimeter Wave Networks," IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 459-472, 2019.
[31]
S. Saritas et al., "Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach," in 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings, 2019, pp. 439-458.
[33]
H. Ghauch et al., "Compressive Sensing with Applications to Millimeter-wave Architectures," in 2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, pp. 7834-7838.
[34]
M. Zeng et al., "Computation Rate Maximization for Wireless Powered Mobile Edge Computing with NOMA," in Proceedings 20th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2019), 2019.
[35]
X. Mao et al., "Conceptual Abstraction of Attack Graphs : a Use Case of securiCAD," in Graphical Models for Security. GraMSec 2019., 2019, pp. 186-202.
[36]
S. Hacks et al., "Creating MAL Instances Using ArchiMate on the Example of Attacks on Power Plants and Power Grids," in Proceeding of the 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC), 2019.
[37]
S. Hacks et al., "Creating Meta Attack Language Instances using ArchiMate : Applied to Electric Power and Energy System Cases," in 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC), 2019, pp. 88-97.
[38]
A. Shalaginov, I. Kotsiuba and A. Iqbal, "Cybercrime Investigations in the Era of Smart Applications : Way Forward Through Big Data," in Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019, 2019, pp. 4309-4314.
[39]
T. Li et al., "Data collection and node counting by opportunistic communication," in 2019 IFIP Networking Conference, IFIP Networking 2019, 2019.
[40]
S. Josilo and G. Dan, "Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems," IEEE/ACM Transactions on Networking, vol. 27, no. 1, pp. 85-97, 2019.
[41]
F. S. Samani et al., "Demonstration : Predicting Distributions of Service Metrics," in 2019 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019, pp. 745-746.
[43]
A. Tolli et al., "Distributed Coordinated Transmission with Forward-Backward Training for 5G Radio Access," IEEE Communications Magazine, vol. 57, no. 1, pp. 58-64, 2019.
[44]
H. Jin and P. Papadimitratos, "DoS-resilient cooperative beacon verification for vehicular communication systems," Ad hoc networks, vol. 90, 2019.
[45]
Z. Li and G. Dán, "Dynamic Cheap Talk for Robust Adversarial Learning," in 10th International Conference on Decision and Game Theory for Security, GameSec 2019, 2019, pp. 297-309.
[46]
S. Khosravi, H. Shokri-Ghadikolaei and M. Petrova, "Efficient Beamforming for Mobile mmWave Networks," in The International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks WiOpt 2019, 2019.
[47]
F. S. Samani, H. Zhang and R. Stadler, "Efficient Learning on High-dimensional Operational Data," in 15th International Conference on Network and Service Management, CNSM 2019, 2019.
[48]
F. S. Samani, H. Zhang and R. Stadler, "Efficient Learning on High-dimensional Operational Data," in 15th International Conference on Network and Service Management, CNSM 2019, 2019.
[49]
S. T. Kouyoumdjieva and G. Karlsson, "Experimental Evaluation of Precision of a Proximity-based Indoor Positioning System," in 2019 15th Annual Conference on Wireless On-demand Network Systems and Services, WONS 2019 - Proceedings, 2019, pp. 130-137.
[50]
G. Lee et al., "Fog-Assisted Aggregated Synchronization Scheme for Mobile Cloud Storage Applications," IEEE Access, vol. 7, pp. 56852-56863, 2019.
Full list in the KTH publications portal
Page responsible:Web editors at EECS
Belongs to: Network and Systems Engineering
Last changed: Jan 15, 2020