Latest publications
Recent publications by the Division of Network and Systems Engineering.
The latest publications from NSE
[1]
H. Jin and P. Papadimitratos,
"Accountable, Scalable and DoS-resilient Secure Vehicular Communication,"
Computers & Security, vol. 156, 2025.
[2]
K. Hammar et al.,
"Adaptive Security Response Strategies Through Conjectural Online Learning,"
IEEE Transactions on Information Forensics and Security, vol. 20, pp. 4055-4070, 2025.
[3]
C. Linse and J. Lilliesköld,
"Agile in the realm of bureaucracy : old habits die hard,"
in R&D Management 2025 : Innovation and Biodiversity, 2025.
[4]
M. Spanghero and P. Papadimitratos,
"Consumer INS coupled with carrier phase measurements for GNSS spoofing detection,"
in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[5]
F. Tütüncüoglu et al.,
"COPES: Contention-aware Pricing and Service Placement in Serverless Edge Computing,"
IEEE Transactions on Mobile Computing, 2025.
[6]
H. Sasahara et al.,
"Green Routing Game : Pollution-Aware Mixed Fleet Logistics With Shared Charging Facilities,"
IEEE Transactions on Automatic Control, pp. 1-14, 2025.
[7]
X. Huang et al.,
"Heterogeneous Receptors-Based Molecule Harvesting in MC : Analysis for ISI Mitigation and Energy Efficiency,"
IEEE Transactions on Communications, vol. 73, no. 3, pp. 1621-1637, 2025.
[8]
S. M. Azimi Abarghouyi et al.,
"Hierarchical Federated ADMM,"
IEEE Networking Letters, vol. 7, no. 1, pp. 11-15, 2025.
[9]
H. Zhang et al.,
"Integrated Sensing and Communication for 6G Holographic Digital Twins,"
IEEE wireless communications, vol. 32, no. 2, pp. 104-112, 2025.
[10]
K. Hammar and R. Stadler,
"Intrusion Tolerance as a Two-Level Game,"
in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[11]
Y. K. Tun et al.,
"Joint UAV Deployment and Resource Allocation in THz-Assisted MEC-Enabled Integrated Space-Air-Ground Networks,"
IEEE Transactions on Mobile Computing, vol. 24, no. 5, pp. 3794-3808, 2025.
[12]
S. Alhazbi et al.,
"LLMs Have Rhythm : Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis,"
IEEE Open Journal of the Communications Society, vol. 6, pp. 5050-5071, 2025.
[13]
X. Huang, H. Hellström and C. Fischione,
"Low-Complexity OTFS-Based Over-the-Air Computation Design for Time-Varying Channels,"
IEEE Transactions on Wireless Communications, vol. 24, no. 3, pp. 2483-2497, 2025.
[14]
S. Mostafavi et al.,
"Predictability of Performance in Communication Networks Under Markovian Dynamics,"
IEEE Transactions on Vehicular Technology, 2025.
[15]
C. Linse and J. Lilliesköld,
"Reaching for the stars of grasping for straws? : Exploring reasons for adopting agile methods in development of complex mechatronic products,"
in EURAM 2025 : Managing with purpose, 2025.
[16]
O. Stenhammar et al.,
"Real-Time Network Digital Twin : Experimental Setup for Proof of Concept,"
IEEE wireless communications, vol. 32, no. 3, pp. 114-121, 2025.
[17]
M. Byrd Victorica, G. Dán and H. Sandberg,
"SpaNN : Detecting Multiple Adversarial Patches on CNNs by Spanning Saliency Thresholds,"
in Proceedings - 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, 2025, pp. 459-478.
[18]
S. Razavikia, J. M. B. da Silva Jr and C. Fischione,
"SumComp : Coding for Digital Over-the-Air Computation via the Ring of Integers,"
IEEE Transactions on Communications, vol. 73, no. 2, pp. 752-767, 2025.
[19]
D. Umsonst et al.,
"A Bayesian Nash Equilibrium-Based Moving Target Defense Against Stealthy Sensor Attacks,"
IEEE Transactions on Automatic Control, vol. 69, no. 3, pp. 1659-1674, 2024.
[20]
Z. Liao et al.,
"A Bibliometric Analysis of Scientific Publications on Eating Disorder Prevention in the Past Three Decades,"
Nutrients, vol. 16, no. 8, 2024.
[21]
O. Stenhammar, G. Fodor and C. Fischione,
"A Comparison of Neural Networks for Wireless Channel Prediction,"
IEEE wireless communications, vol. 31, no. 3, pp. 235-241, 2024.
[22]
F. S. Samani and R. Stadler,
"A Framework for Dynamically Meeting Performance Objectives on a Service Mesh,"
IEEE Transactions on Network and Service Management, vol. 21, no. 6, pp. 5992-6007, 2024.
[23]
V. Engström, G. Nebbione and M. Ekstedt,
"A Metalanguage for Dynamic Attack Graphs and Lazy Generation,"
in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[24]
H. Teixeira De Castro et al.,
"A Model-based Approach for Assessing the Security of Cyber-Physical Systems,"
in ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[25]
X. Yan, S. Razavikia and C. Fischione,
"A Novel Channel Coding Scheme for Digital Multiple Access Computing,"
in ICC 2024 - IEEE International Conference on Communications, 2024, pp. 3851-3857.
[26]
E. Shereen, K. Kazari and G. Dán,
"A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control,"
IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[27]
G. L. Rajora et al.,
"A review of asset management using artificial intelligence-based machine learning models : Applications for the electric power and energy system,"
IET Generation, Transmission & Distribution, vol. 18, no. 12, pp. 2155-2170, 2024.
[28]
Y. Guo et al.,
"Age-of-Information and Energy Optimization in Digital Twin Edge Networks,"
in GLOBECOM 2024 - 2024 IEEE Global Communications Conference, 2024, pp. 3194-3200.
[29]
S. G. E. Gökstorp et al.,
"Anomaly Detection in Security Logs using Sequence Modeling,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[30]
S. Razavikia, J. M. Barros da Silva Jr. and C. Fischione,
"Blind Federated Learning via Over-the-Air q-QAM,"
IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 19570-19586, 2024.
[31]
E. Santos Escriche et al.,
"Channel-Centric Spatio-Temporal Graph Networks for Network-based Intrusion Detection,"
in 2024 IEEE Conference on Communications and Network Security, CNS 2024, 2024.
[32]
S. Razavikia, J. M. B. Da Silva and C. Fischione,
"ChannelComp : A General Method for Computation by Communications,"
IEEE Transactions on Communications, vol. 72, no. 2, pp. 692-706, 2024.
[33]
A. Hasselberg et al.,
"Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge,"
in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[34]
O. Stenhammar, G. Fodor and C. Fischione,
"Clustered Predictive Quality of Service for Connected Vehicles Using Federated Learning,"
in 2024 IEEE International Conference on Communications Workshops, ICC Workshops 2024, 2024, pp. 626-631.
[35]
Y. K. Tun et al.,
"Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach,"
IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[36]
S. Hussein et al.,
"Communication-Efficient Distributed Computing via Matrix Factorization,"
in Conference Record of the 58th Asilomar Conference on Signals, Systems and Computers, ACSSC 2024, 2024, pp. 1453-1460.
[37]
F. S. Samani et al.,
"Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network Environment,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[38]
S. M. Azimi-Abarghouyi and L. R. Varshney,
"Compute-Update Federated Learning : A Lattice Coding Approach,"
IEEE Transactions on Signal Processing, vol. 72, pp. 5213-5227, 2024.
[39]
T. Li et al.,
"Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games,"
in 2024 IEEE 63rd Conference on Decision and Control, CDC 2024, 2024, pp. 6780-6785.
[40]
R. S. Patil, I. Källman and V. Fodor,
"DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization,"
in 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, pp. 466-473.
[41]
S. Katsikeas et al.,
"Development and validation of coreLang : A threat modeling language for the ICT domain,"
Computers & security (Print), vol. 146, 2024.
[42]
F. Heiding et al.,
"Devising and Detecting Phishing Emails Using Large Language Models,"
IEEE Access, vol. 12, pp. 42131-42146, 2024.
[43]
F. Tütüncüoglu et al.,
"Dynamic Time-of-Use Pricing for Serverless Edge Computing with Generalized Hidden Parameter Markov Decision Processes,"
in Proceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems, ICDCS 2024, 2024, pp. 668-679.
[44]
C. Linse et al.,
"Education Infrastructure for Inter-organizational University Collaborations,"
SEFI Journal of Engineering Education Advancement, vol. 1, no. 1, pp. 53-79, 2024.
[45]
C. Linse et al.,
"Education Infrastructure for Inter-organizational University Collaborations,"
SEFI Journal of Engineering Education Advancement, vol. 1, no. 1, pp. 53-79, 2024.
[46]
S. Katsikeas et al.,
"Empirical evaluation of a threat modeling language as a cybersecurity assessment tool,"
Computers & security (Print), vol. 140, 2024.
[47]
O. Viberg et al.,
"Exploring teachers' (future) digital assessment practices in higher education: Instrument and model development,"
British Journal of Educational Technology, vol. 55, no. 6, pp. 2597-2616, 2024.
[48]
A. Mahmoudi et al.,
"FedCau : A Proactive Stop Policy for Communication and Computation Efficient Federated Learning,"
IEEE Transactions on Wireless Communications, vol. 23, no. 9, pp. 11076-11093, 2024.
[49]
S. M. Azimi Abarghouyi and L. R. Varshney,
"Federated Learning via Lattice Joint Source-Channel Coding,"
in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 1623-1628.
[50]
G. Karlsson,
"From Campus to Boot Camp-Lessons from Extramural Teaching in Cybersecurity,"
in EDUCON 2024 - IEEE Global Engineering Education Conference, Proceedings, 2024.