Skip to main content
Back to KTH start page

Publications by György Dán

Peer reviewed

Articles

[1]
E. Shereen, K. Kazari and G. Dán, "A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control," IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[2]
Y. K. Tun et al., "Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach," IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[3]
F. Tütüncüoğlu and G. Dán, "Joint Resource Management and Pricing for Task Offloading in Serverless Edge Computing," IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 7438-7452, 2024.
[5]
[6]
F. Tutuncuoglu, S. Josilo and G. Dán, "Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing," IEEE/ACM Transactions on Networking, vol. 31, no. 2, pp. 695-709, 2023.
[8]
L. Varawala et al., "A Scalable Formulation for Look-Ahead Security-Constrained Optimal Power Flow," IEEE Transactions on Control of Network Systems, vol. 9, no. 1, pp. 138-150, 2022.
[9]
G. P. Koudouridis, Q. He and G. Dán, "An architecture and performance evaluation framework for artificial intelligence solutions in beyond 5G radio access networks," EURASIP Journal on Wireless Communications and Networking, vol. 2022, no. 1, 2022.
[11]
E. Shereen, R. Ramakrishna and G. Dán, "Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing," IEEE Transactions on Smart Grid, vol. 13, no. 4, pp. 3241-3254, 2022.
[12]
S. Josilo and G. Dán, "Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection," IEEE/ACM Transactions on Networking, vol. 30, no. 4, pp. 1865-1878, 2022.
[13]
F. Tutuncuoglu and G. Dán, "Optimal Service Caching and Pricing in Edge Computing : a Bayesian Gaussian Process Bandit Approach," IEEE Transactions on Mobile Computing, pp. 1-15, 2022.
[15]
S. Josilo and G. Dán, "Joint Management of Wireless and Computing Resources for Computation Offloading in Mobile Edge Clouds," IEEE Transactions on Cloud Computing, vol. 9, no. 4, pp. 1507-1520, 2021.
[16]
[17]
M. Delcourt et al., "Time-Synchronization Attack Detection in Unbalanced Three-Phase Systems," IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 4460-4470, 2021.
[18]
Q. He et al., "A Meta-Learning Scheme for Adaptive Short-Term Network Traffic Prediction," IEEE Journal on Selected Areas in Communications, vol. 38, no. 10, pp. 2271-2283, 2020.
[19]
S. Josilo and G. Dán, "Computation Offloading Scheduling for Periodic Tasks in Mobile Edge Computing," IEEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 667-680, 2020.
[20]
E. Shereen et al., "Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation," IEEE Transactions on Instrumentation and Measurement, vol. 69, no. 6, pp. 3412-3427, 2020.
[21]
E. Shereen and G. Dán, "Model-Based and Data-Driven Detectors for Time Synchronization Attacks Against PMUs," IEEE Journal on Selected Areas in Communications, vol. 38, no. 1, pp. 169-179, 2020.
[22]
P. Zhao et al., "A Game Theoretic Approach to Uplink Pilot and Data Power Control in Multi-Cell Multi-User MIMO Systems," IEEE Transactions on Vehicular Technology, vol. 68, no. 9, pp. 8707-8720, 2019.
[23]
S. Josilo and G. Dan, "Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems," IEEE/ACM Transactions on Networking, vol. 27, no. 1, pp. 85-97, 2019.
[24]
[25]
Q. He, G. Dán and V. Fodor, "Joint Assignment and Scheduling for Minimizing Age of Correlated Information," IEEE/ACM Transactions on Networking, vol. 27, no. 5, pp. 1887-1900, 2019.
[26]
S. Josilo and G. Dán, "Joint Management of Wireless and Computing Resources for Computation Offloading in Mobile Edge Clouds," IEEE Transactions on Cloud Computing, pp. 1-14, 2019.
[27]
S. Josilo and G. Dán, "Selfish Decentralized Computation Offloading for Mobile Cloud Computing in Dense Wireless Networks," IEEE Transactions on Mobile Computing, vol. 18, no. 1, pp. 207-220, 2019.
[28]
P. Zhao and G. Dán, "A Benders Decomposition Approach for Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds," IEEE Transactions on Network and Service Management, vol. 15, no. 4, pp. 1460-1472, 2018.
[29]
P. Zhao et al., "A Game Theoretic Approach to Setting the Pilot Power Ratio in Multi-User MIMO Systems," IEEE Transactions on Communications, vol. 66, no. 3, pp. 999-1012, 2018.
[30]
Y. Liu et al., "A Taxonomy for the Security Assessment of IP-Based Building Automation Systems : The Case of Thread," IEEE Transactions on Industrial Informatics, vol. 14, no. 9, pp. 4113-4123, 2018.
[31]
A. Araldo, G. Dán and D. Rossi, "Caching Encrypted Content Via Stochastic Cache Partitioning," IEEE/ACM Transactions on Networking, vol. 26, no. 1, pp. 548-561, 2018.
[32]
E. Eriksson, G. DánDán and V. Fodor, "Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks," IEEE transactions on circuits and systems for video technology (Print), vol. 28, no. 11, pp. 3288-3299, 2018.
[33]
S. Barreto et al., "Undetectable PMU Timing-Attack on Linear State-Estimation by UsingRank-1 Approximation," IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 3530-3542, 2018.
[34]
I. Jang et al., "A Proxy-Based Collaboration System to Minimize Content Download Time and Energy Consumption," IEEE Transactions on Mobile Computing, vol. 16, no. 8, pp. 2105-2117, 2017.
[35]
S. Pack, G. Dán and K. Singh, "Editorial : Recent Advances in Heterogeneous Networking for Quality, Reliability, Security and Robustness," Mobile Networks and Applications, vol. 22, no. 5, pp. 845-847, 2017.
[36]
I. Jang et al., "Joint Optimization of Service Function Placement and Flow Distribution for Service Function Chaining," IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2532-2541, 2017.
[37]
H. Li, G. Dán and K. Nahrstedt, "Portunes plus : Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging," IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2305-2313, 2017.
[38]
H. Al-Zubaidy et al., "Reliable Video Streaming With Strict Playout Deadline in Multihop Wireless Networks," IEEE transactions on multimedia, vol. 19, no. 10, pp. 2238-2251, 2017.
[39]
M. R. Asghar et al., "Smart Meter Data Privacy : A Survey," IEEE Communications Surveys and Tutorials, vol. 19, no. 4, pp. 2820-2835, 2017.
[40]
P. -. Ho et al., "Special Section on Mobile Content Delivery Networks," Computer Communications, vol. 99, 2017.
[41]
I. Jang et al., "The Software-Defined Vehicular Cloud : A New Level of Sharing the Road," IEEE Vehicular Technology Magazine, vol. 12, no. 2, pp. 78-88, 2017.
[42]
V. Pacifici, F. Lehrieder and G. Dán, "Cache Bandwidth Allocation for P2P File Sharing Systems to Minimize Inter-ISP Traffic," IEEE/ACM Transactions on Networking, vol. 24, no. 1, pp. 437-448, 2016.
[43]
V. Pacifici and G. Dán, "Coordinated Selfish Distributed Caching for Peering Content-centric Networks," IEEE/ACM Transactions on Networking, vol. PP, no. 99, pp. 1-12, 2016.
[44]
V. Pacifici and G. Dán, "Distributed Caching Algorithms for Interconnected Operator CDNs," IEEE Journal on Selected Areas in Communications, vol. 35, no. 2, pp. 380-391, 2016.
[45]
E. Eriksson, G. Dán and V. Fodor, "Predictive Distributed Visual Analysis for Video in Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 15, no. 7, pp. 1743-1756, 2016.
[46]
E. Hochschorner, G. Dan and Å. Moberg, "Carbon footprint of movie distribution via the internet : a Swedish case study," Journal of Cleaner Production, vol. 87, pp. 197-207, 2015.
[47]
G. Dán, M. A. Khan and V. Fodor, "Characterization of SURF and BRISK interest point distribution for distributed feature extraction in visual sensor networks," IEEE transactions on multimedia, vol. 17, no. 5, pp. 591-602, 2015.
[48]
A. Redondi et al., "Cooperative image analysis in visual sensor networks," Ad hoc networks, vol. 28, pp. 38-51, 2015.
[49]
O. Vuković and G. Dán, "Security of Fully Distributed Power System State Estimation : Detection and Mitigation of Data Integrity Attacks," IEEE Journal on Selected Areas in Communications, vol. 32, no. 7, pp. 1500-1508, 2014.
[50]
G. Dán and N. Carlsson, "Centralized and distributed protocols for tracker-based dynamic swarm management," IEEE/ACM Transactions on Networking, vol. 21, no. 1, pp. 297-310, 2013.
[51]
F. Lehrieder et al., "Caching for BitTorrent-Like P2P Systems: A Simple Fluid Model and Its Implications," IEEE/ACM Transactions on Networking, vol. 20, no. 4, pp. 1176-1189, 2012.
[52]
G. Dán et al., "Challenges in Power System Information Security," IEEE Security and Privacy, vol. 10, no. 4, pp. 62-70, 2012.
[53]
V. Pacifici and G. Dán, "Convergence in Player-Specific Graphical Resource Allocation Games," IEEE Journal on Selected Areas in Communications, vol. 30, no. 11, pp. 2190-2199, 2012.
[54]
O. Vuković et al., "Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation," IEEE Journal on Selected Areas in Communications, vol. 30, no. 6, pp. 1108-1118, 2012.
[55]
G. Dán, "Cache-to-Cache : Could ISPs Cooperate to Decrease Peer-to-Peer Content Distribution Costs?," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 9, pp. 1469-1482, 2011.
[56]
G. Dán et al., "Interaction Patterns between P2P Content Distribution Systems and ISPs," IEEE Communications Magazine, vol. 49, no. 5, pp. 222-230, 2011.
[57]
G. Dán and V. Fodor, "Stability and performance of overlay multicast systems employing forward error correction," Performance evaluation (Print), vol. 67, no. 2, pp. 80-101, 2010.
[58]
G. Dán and V. Fodor, "Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 10, pp. 1499-1511, 2009.
[59]
I. Chatzidrossos, G. Dán and V. Fodor, "Delay and playout probability trade-off in mesh-based peer-to-peer streaming with delayed buffer map updates," Peer-to-Peer Networking and Applications, vol. 3, no. 3, pp. 208-221, 2009.
[60]
G. Dán, V. Fodor and G. Karlsson, "Robust source-channel coding for real-time multimedia," Multimedia Systems, vol. 13, no. 5-6, pp. 363-377, 2008.
[61]
V. Fodor and G. Dán, "Resilience in live peer-to-peer streaming," IEEE Communications Magazine, vol. 45, no. 6, pp. 116-123, 2007.
[62]
G. Dán, V. Fodor and G. Karlsson, "On the effects of the packet size distribution on FEC performance," Computer Networks, vol. 50, no. 8, pp. 1104-1129, 2006.
[63]
G. Dán, V. Fodor and G. Karlsson, "On the effects of the packet size distribution on the packet loss process," Telecommunications Systems, vol. 32, no. 1, pp. 31-53, 2006.
[64]

Conference papers

[65]
S. G. E. Gökstorp et al., "Anomaly Detection in Security Logs using Sequence Modeling," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[66]
A. Hasselberg et al., "Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge," in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[67]
F. Tütüncüoglu et al., "Dynamic Time-of-Use Pricing for Serverless Edge Computing with Generalized Hidden Parameter Markov Decision Processes," in Proceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems, ICDCS 2024, 2024, pp. 668-679.
[68]
F. Tütüncüoglu and G. Dán, "Sample-efficient Learning for Edge Resource Allocation and Pricing with BNN Approximators," in IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024, 2024.
[69]
S. S. Mostafavi et al., "Active Queue Management with Data-Driven Delay Violation Probability Predictors," in GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, pp. 6371-6376.
[70]
E. Shereen, K. Kazari and G. Dán, "Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids," in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, 2023.
[71]
K. Kazari, E. Shereen and G. Dán, "Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning," in Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, 2023, pp. 162-170.
[72]
Y. K. Tun and G. Dán, "RIS-Assisted UAV-Enabled JSAC System : Joint Radio Resource and Phase Shift Optimization Framework," in 2023 IEEE Globecom Workshops, GC Wkshps 2023, 2023, pp. 763-768.
[73]
Y. K. Tun and G. Dán, "Sum-Rate Maximization in Integrated Space-Air-Ground Networks under Backhaul Capacity Constraints," in GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, pp. 6255-6260.
[74]
Y. Kim and G. Dán, "An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness," in 2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, pp. 154-162.
[75]
E. Poorhadi, E. Troubitsyna and G. Dán, "Analysing the Impact of Security Attacks on Safety Using SysML and Event-B," in MODEL-BASED SAFETY AND ASSESSMENT, IMBSA 2022, 2022, pp. 170-185.
[76]
H. Sasahara et al., "Green Routing Game : Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs," in 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, pp. 6358-6363.
[77]
R. Ramakrishna and G. Dán, "Inferring Class-Label Distribution in Federated Learning," in AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022, 2022, pp. 45-56.
[78]
S. Saritas et al., "Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication : A Game Theoretic Study," in ICC 2021 - IEEE International Conference on Communications, 2021.
[79]
S. S. Mostafavi, G. Dán and J. Gross, "Data-Driven End-to-End Delay Violation Probability Prediction with Extreme Value Mixture Models," in 6th ACM/IEEE Symposium on Edge Computing, SEC 2021, 2021, pp. 416-422.
[80]
E. Poorhadi, E. Troubitsyna and G. Dán, "Formal Modelling of the Impact of Cyber Attacks on Railway Safety," in Computer Safety, Reliability, And Security (SAFECOMP 2021), 2021, pp. 117-127.
[81]
M. Törngren et al., "Industrial Edge-based Cyber-Physical Systems - Application Needs and Concerns for Realization," in 6th ACM/IEEE Symposium on Edge Computing, SEC 2021, 2021, pp. 409-415.
[82]
Y. Guo and G. Dán, "Message from the workshop co-chairs," in Proceedings - 2021 IEEE 41st International Conference on Distributed Computing Systems Workshops, ICDCSW 2021, 2021.
[83]
F. Tutuncuoglu and G. Dán, "Optimal Pricing for Service Caching and Task Offloading in Edge Computing," in 17Th Conference On Wireless On-Demand Network Systems And Services (WONS 2022), 2021.
[84]
Q. He, G. Koudouridis and G. Dán, "A Comparison of Machine and Statistical Time Series Learning for Encrypted Traffic Prediction," in IEEE International Conference on Computing, Networking and Communications (ICNC), 2020.
[85]
Z. Li, G. Dán and D. Liu, "A Game Theoretic Analysis of LQG Control under Adversarial Attack," in 2020 59th IEEE Conference on Decision and Control (CDC), 2020, pp. 1632-1639.
[86]
P. Sena et al., "Caching Policies over Unreliable Channels," in 2020 18th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (wiopt), 2020.
[87]
E. Poorhadi, E. Troubitsyna and G. Dán, "Formalising the Impact of Security Attacks on IoT Safety," in SAFECOMP 2020: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020, pp. 69-81.
[88]
E. Shereen and G. Dán, "Network-aware Mitigation of Undetectable PMU Time Synchronization Attacks," in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020, 2020, pp. 1-7.
[89]
S. Saritas, G. Dán and H. Sandberg, "Passive Fault-tolerant Estimation under Strategic Adversarial Bias," in 2020 American Control Conference (ACC), 2020, pp. 4644-4651.
[90]
Q. He, G. Dán and G. Koudouridis, "Semi-Persistent Scheduling for 5G Downlink based on Short-Term Traffic Prediction," in 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, 2020.
[91]
S. Saritas et al., "Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach," in 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings, 2019, pp. 439-458.
[92]
Z. Li and G. Dán, "Dynamic Cheap Talk for Robust Adversarial Learning," in 10th International Conference on Decision and Game Theory for Security, GameSec 2019, 2019, pp. 297-309.
[93]
E. Shereen et al., "Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1," in Proceedings of 2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS, 2019.
[94]
Q. He, G. Dán and V. Fodor, "On Emptying a Wireless Network with Minimum-Energy under Age Constraints," in INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019, 2019, pp. 668-673.
[95]
P. Zhao and G. Dán, "Scheduling Parallel Migration of Virtualized Services under Time Constraints in Mobile Edge Clouds," in Proceedings of the 31st International Teletraffic Congress, ITC 2019, 2019, pp. 28-36.
[96]
G. Dán and R. Mazumdar, "Welcome Message from the Technical Program Co-Chairs," in Proceedings of the 31st International Teletraffic Congress, ITC 2019, 2019.
[97]
S. Josilo and G. Dán, "Wireless and Computing Resource Allocation for Selfish Computation Offloading in Edge Computing," in IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, pp. 2467-2475.
[98]
E. Shereen and G. Dán, "Correlation-based Detection of PMU Time Synchronization Attacks," in 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, 2018.
[99]
S. Josilo and G. Dán, "Decentralized Scheduling for Offloading of Periodic Tasks in Mobile Edge Computing," in IFIP NETWORKING 2018, 2018, pp. 469-477.
[100]
S. Josilo and G. Dán, "Joint Allocation of Computing and Wireless Resources to Autonomous Devices in Mobile Edge Computing," in MECOMM 2018 - Proceedings of the 2018 Workshop on Mobile Edge Communications, Part of SIGCOMM 2018, 2018.
[101]
Q. He, G. Dán and V. Fodor, "Minimizing Age of Correlated Information for Wireless Camera Networks," in IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, pp. 547-552.
[102]
S. Josilo and G. Dán, "Poster Abstract : Decentralized Fog Computing Resource Management for Offloading of Periodic Tasks," in IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018.
[103]
P. Zhao and G. Dán, "Time Constrained Service-aware Migration of Virtualized Services for Mobile Edge Computing," in Proceedings of the 30th International Teletraffic Congress, ITC 2018, 2018, pp. 64-72.
[104]
S. Barreto et al., "A Continuum of Undetectable Timing-Attacks on PMU-based Linear State-Estimation," in 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017, 2017, pp. 473-479.
[105]
S. Josilo and G. Dán, "A Game Theoretic Analysis of Selfish Mobile Computation Offloading," in IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017.
[106]
P. Danielis et al., "Dynamic Flow Migration for Delay Constrained Traffic in Software-Defined Networks," in IEEE Global Telecommunications Conference 2017 (GLOBECOM 2017), 2017.
[107]
P. Zhao and G. Dán, "Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds," in 2017 IFIP Networking Conference (IFIP NETWORKING) and Workshops, 2017.
[108]
V. Pacifici, S. Josilo and G. Dán, "Distributed Algorithms for Content Caching in Mobile Backhaul Networks," in Proceedings of the 28th International Teletraffic Congress, ITC 2016, 2016, pp. 313-321.
[109]
M. Rodrigues, G. Dán and M. Gallo, "Enabling transparent caching in LTE mobile backhaul networks with SDN," in Proceedings - IEEE INFOCOM, 2016, pp. 724-729.
[110]
E. Eriksson, G. Dán and V. Fodor, "Radio and Computational Resource Management for Fog Computing Enabled Wireless Camera Networks," in Proc. of IEEE GlobeCom Workshop on Internet of Everything, 2016.
[111]
A. Araldo, G. Dan and D. Rossi, "Stochastic Dynamic Cache Partitioning for Encrypted Content Delivery," in Proceedings of the 28th International Teletraffic Congress, ITC 2016, 2016, pp. 139-147.
[112]
E. Eriksson, G. Dán and V. Fodor, "Algorithms for Distributed Feature Extraction in Multi-camera Visual Sensor Networks," in Proceedings of 2015 14th IFIP Networking Conference, IFIP Networking 2015, 2015.
[113]
L. Gkatzikis et al., "Clustered Content Replication for Hierarchical Content Delivery Networks," in 2015 IEEE International Conference On Communications (ICC), 2015, pp. 5872-5877.
[114]
H. Sandberg, G. Dan and R. Thobaben, "Differentially private state estimation in distribution networks with smart meters," in Proceedings of the IEEE Conference on Decision and Control, 2015, pp. 4492-4498.
[116]
E. Eriksson, V. Pacifici and G. Dán, "Efficient Distribution of Visual Processing Tasks in Multi-camera Visual Sensor Networks," in Multimedia & Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pp. 1-6.
[117]
H. Li, G. Dán and K. Nahrstedt, "Lynx : Authenticated Anonymous Real-Time Reporting of Electric Vehicle Information," in 2015 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2015, pp. 599-604.
[118]
H. M. Al-Zubaidy, G. Dán and V. Fodor, "Performance of in-network processing for visual analysis in wireless sensor networks," in Proceedings of 2015 14th IFIP Networking Conference, IFIP Networking 2015, 2015.
[119]
H. Li, G. Dán and K. Nahrstedt, "Proactive key dissemination-based fast authentication for in-motion inductive EV charging," in 2015 IEEE International Conference on Communications (ICC), 2015, pp. 795-801.
[120]
L. Baroffio et al., "Demo : Enabling image analysis tasks in visual sensor networks," in Proceedings of the 8th ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC 2014, 2014, p. a46.
[121]
G. Dán and N. Carlsson, "Dynamic Content Allocation for Cloud-assisted Service of Periodic Workloads," in INFOCOM, 2014 Proceedings IEEE, 2014, pp. 853-861.
[122]
A. Redondi et al., "Enabling Visual Analysis in Wireless Sensor Networks," in 2014 IEEE International Conference on Image Processing (ICIP), 2014, pp. 3408-3410.
[123]
N. M. Torrisi et al., "Peekaboo : A gray hole attack on encrypted SCADA communication using traffic analysis," in 5th IEEE International Conference on Smart Grid Communications 2014 (SmartGridComm 2014) in Venice, Italy, 2014, pp. 902-907.
[124]
J. Li et al., "Performance analysis of local caching replacement policies for internet video streaming services," in 2014 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014, 2014, pp. 341-348.
[125]
H. Li, G. Dán and K. Nahrstedt, "Portunes : Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging," in IEEE Intl. Conference on Smart Grid Communications (SmartGridComm); Venice, Italy, 3-6 Nov. 2014, 2014.
[126]
E. Eriksson, G. Dán and V. Fodor, "Prediction-based Load Control and Balancing for Feature Extraction in Visual Sensor Networks," in 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2014; Florence; Italy; 4 May 2014 through 9 May 2014, 2014, pp. 674-678.
[127]
E. Eriksson, G. Dán and V. Fodor, "Real-time Distributed Visual Feature Extraction from Video in Sensor Networks," in Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014, 2014.
[128]
A. Teixeira et al., "Security of smart distribution grids : Data integrity attacks on integrated volt/VAR control and countermeasures," in American Control Conference (ACC), 2014, 2014, pp. 4372-4378.
[129]
R. Thobaben, G. Dán and H. Sandberg, "Wiretap Codes for Secure Multi-Party Computation," in Globecom Workshops (GC Wkshps), 2014, 2014.
[130]
M. A. Khan, G. Dán and V. Fodor, "Characterization of SURF Interest Point Distribution for Visual Processing in Sensor Networks," in 2013 18th International Conference on Digital Signal Processing, DSP 2013, 2013.
[131]
G. Dán et al., "Cloud Computing for the Power Grid : From Service Composition to Assured Clouds," in Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), June 2013, 2013.
[132]
O. Vuković, G. Dán and R. Bobba, "Confidentiality-preserving Obfuscation for Cloud-based Power System Contingency Analysis," in 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, pp. 432-437.
[133]
V. Pacifici and G. Dán, "Content-peering Dynamics of Autonomous Caches in a Content-centric Network," in 2013 Proceedings IEEE Infocom, 2013, pp. 1079-1087.
[134]
O. Vuković and G. Dán, "Detection and Localization of Targeted Attacks on Fully Distributed Power System State Estimation," in 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, pp. 390-395.
[135]
H. Li, G. Dán and K. Nahrstedt, "FADEC : Fast authentication for dynamic electric vehicle charging," in 2013 IEEE Conference on Communications and Network Security, CNS 2013, 2013, pp. 369-370.
[136]
O. Vuković and G. Dán, "On the Security of Distributed Power System State Estimation under Targeted Attacks," in Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013, pp. 666-672.
[137]
G. Dán et al., "SELINDA : A Secure, Scalable and Light-Weight Data Collection Protocol for Smart Grids," in 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, pp. 480-485.
[138]
V. Pacifici and G. Dán, "Stable Content-peering of Autonomous Systems in a Content-centric Network," in 9th Swedish National Computer Networking Workshop (SNCNW),Lund, June 3-4,2013, 2013.
[139]
D. Carra et al., "Topic 7 : Peer-to-peer computing (Introduction)," in Lecture Notes in Computer Science, 2013, p. 353.
[140]
N. Carlsson et al., "A longitudinal characterization of local and global BitTorrent workload dynamics," in 13th International Conference on Passive and Active Measurement (PAM), 2012, 2012, pp. 252-262.
[141]
V. Pacifici, F. Lehrieder and G. Dán, "Cache Capacity Allocation for BitTorrent-like Systems to Minimize Inter-ISP Traffic," in IEEE  International Conference on Computer Communications (INFOCOM), 2012, 2012, pp. 1512-1520.
[142]
G. Andersson et al., "Cyber-security of SCADA systems," in 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012, 2012, p. 6175543.
[143]
I. Filippini et al., "Non-cooperative RSU Deployment in Vehicular Networks," in 9th Annual Conference on Wireless On-demand Network Systems and Services (WONS), 2012, 2012, pp. 79-82.
[144]
A. Teixeira et al., "Optimal Power Flow : Closing the Loop over Corrupted Data," in 2012 American Control Conference (ACC), 2012, pp. 3534-3540.
[145]
I. Chatzidrossos and G. Dán, "Playout Adaptation in Peer-to-Peer Systems Under Churn," in 2012 19th International Packet Video Workshop, PV 2012, 2012, pp. 119-124.
[146]
N. Carlsson et al., "Tradeoffs in cloud and peer-assisted content delivery systems," in 2012 IEEE 12th International Conference on Peer-to-Peer Computing, P2P 2012, 2012, pp. 249-260.
[148]
V. Pacifici and G. Dán, "A Game Theoretic Analysis of Selfish Content Replication on Graphs," in 7th Swedish National Computer Networking Workshop (SNCNW), 2011, 2011.
[149]
C. Casetti et al., "Context-aware information dissemination in vehicular networks," in EURO-NGI Conf. Next Gener. Internet Networks, NGI - Proc., 2011.
[150]
G. Dán, N. Carlsson and I. Chatzidrossos, "Efficient and Highly Available Peer Discovery: A Case for Independent Trackers and Gossiping," in IEEE Conference on Peer-to-peer Computing, 2011, pp. 290-299.
[152]
O. Vuković, G. Dán and G. Karlsson, "On the Trade-off between Relationship Anonymity and Communication Overhead in Anonymity Networks," in IEEE International Conference on Communications, 2011.
[153]
F. Lehrieder, V. Pacifici and G. Dán, "On the benefits of P2P cache capacity allocation," in Proceedings of the 2011 23rd International Teletraffic Congress, ITC 2011, 2011, pp. 312-313.
[154]
V. Pacifici and G. Dán, "Selfish Content Replication on Graphs," in ITC '11 Proceedings of the 23rd International Teletraffic Congress, 2011, pp. 119-126.
[155]
V. Vukadinovic and G. Dán, "Multicast Scheduling for Scalable Video Streaming in Wireless Networks," in ACM Multimedia Systems (MMSys), 2010.
[156]
G. Dán and N. Carlsson, "Power-law revisited : A Large Scale Measurement Study of P2P Content Popularity," in Proceedings of the 9th International Workshop on Peer-to-Peer Systems, IPTPS 2010, 2010.
[157]
I. Chatzidrossos, G. Dán and V. Fodor, "Server Guaranteed Cap : an incentive mechanism for maximizing streaming quality in heterogeneous overlays," in NETWORKING 2010, PROCEEDINGS, 2010, pp. 315-326.
[158]
G. Dán and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in 2010 1st IEEE International Conference on Smart Grid Communications, SmartGridComm 2010, 2010, pp. 214-219.
[159]
F. Lehrieder et al., "The impact of caching on BitTorrent-like peer-to-peer systems," in 2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010, 2010.
[160]
G. Dán and N. Carlsson, "Dynamic Swarm Management for Improved BitTorrent Performance," in International Workshop on Peer-to-peer Systems, 2009.
[161]
G. Dán, "Cooperative Caching and Relaying Strategies for Peer-to-peer Content Delivery," in International Workshop on Peer-to-peer Systems, 2008.
[162]
G. Dán and V. Fodor, "Delay bounds and scalability for overlay multicast," in AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, pp. 227-239.
[163]
G. Dán and V. Fodor, "An analytical study of Low Delay Multi-tree-based Overlay Multicast," in P2P-TV '07 Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 2007, pp. 352-357.
[164]
G. Dán, V. Fodor and I. Chatzidrossos, "On the performance of multiple-tree-based peer-to-peer live streaming," in INFOCOM 2007, VOLS 1-5, 2007, pp. 2556-2560.
[165]
G. Dán, V. Fodor and I. Chatzidrossos, "Streaming performance in multiple-tree-based overlays," in NETWORKING 2007: Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Proceedings, 2007, pp. 617-627.
[166]
G. Dán, V. Fodor and G. Karlsson, "A rate-distortion based comparison of media-dependent FEC and MDC for real-time audio," in 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, pp. 1002-1007.
[167]
G. Dán, V. Fodor and G. Karlsson, "On the asymptotic behavior of end-point-based multicast streaming," in 2006 International Zurich Seminar on Communications : Access - Transmission - Networking, Proceedings, 2006, pp. 66-69.
[168]
G. Dán et al., "On the performance of error-resilient end-point-based multicast streaming," in 2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, pp. 160-168.
[169]
G. Dán, V. Fodor and G. Karlsson, "On the stability of end-point-based multimedia streaming," in NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, pp. 678-690.
[170]
G. Dán, V. Fodor and G. Karlsson, "Are multiple descriptions better than one?," in NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, pp. 684-696.
[171]
G. Dán, V. Fodor and G. Karlsson, "Packet size distribution : An aside?," in QUALITY OF SERVICE IN MULTISERVICE IP NETWORKS, PROCEEDINGS, 2005, pp. 75-87.
[172]
G. Dán, V. Fodor and G. Karlsson, "Analysis of the Packet Loss Process for Multimedia Traffic," in Intl. Conference on Telecommunication Systems Modeling and Analysis, 2004.
[173]
G. Dán and V. Fodor, "Quality differentiation with source shaping and forward error correction," in Interactive Multimedia On Next Generation Networks, 2003, pp. 222-233.
[174]
G. Dán and V. Fodor, "On the efficiency of shaping live video streams," in Proceedings of the 2002  international symposium on performance evaluation of computer and telecommunications systems, 2002.
[175]
A. M. Dán, G. Dán and S. M. Rios, "Improved Method for Flicker Evaluation," in Conference on  Electric Power Engineering, 1999.

Non-peer reviewed

Conference papers

[176]
E. Hochschorner, Å. Moberg and G. Dán, "LCA of IPTV and Peer-to-peer," in Nordic Life Cycle Association, Helsingfors, 2011.

Chapters in books

[177]
S. Santas et al., "Continuous authentication security games," in Game Theory and Machine Learning for Cyber Security, : Wiley, 2021, pp. 180-203.
[178]
G. Dán, K. C. Sou and H. Sandberg, "Power-system state-estimation security : Attacks and protection schemes," in Smart Grid Communications and Networking, : Cambridge University Press, 2010, pp. 388-412.

Theses

[179]
G. Dan, "Internet Video Transmission," Doctoral thesis Stockholm : KTH, 2006.
[180]
G. Dán, "Traffic Control for VBR Video in Packet Switched Networks," Licentiate thesis Kista : Mikroelektronik och informationsteknik, Trita-IMIT-LCN. AVH, 04:01, 2004.
Latest sync with DiVA:
2024-10-06 01:30:44