Latest publications
Recent publications by the Division of Network and Systems Engineering.
The latest publications from NSE
[1]
S. M. Azimi Abarghouyi and V. Fodor,
"A Hierarchical Federated Learning Approach for Internet of Things,"
IEEE Internet of Things Journal, 2026.
[2]
X. Liu, C. Chen and C. Fischione,
"Cell-Free ISAC Systems : Learning-Based Channel Estimation and Coordinated Beamforming,"
IEEE Transactions on Cognitive Communications and Networking, vol. 12, pp. 4702-4715, 2026.
[3]
X. Liu and C. Fischione,
"Coordinated Beamforming for Multi-cell ISAC using Graph Neural Networks,"
IEEE Transactions on Wireless Communications, vol. 25, pp. 5876-5889, 2026.
[4]
C. Barreto and U. Franke,
"Cyber Insurance, Software Diversity, and AI Coders,"
Communications of the ACM, vol. 69, no. 2, pp. 20-23, 2026.
[5]
X. Yan, S. Razavikia and C. Fischione,
"Multi-Symbol Digital AirComp via Modulation Design and Power Adaptation,"
IEEE Communications Letters, vol. 30, pp. 602-606, 2026.
[6]
H. Abeynanda, C. Weeraddana and C. Fischione,
"On the Characteristics of the Conjugate Function Enabling Effective Dual Decomposition Methods,"
IEEE Transactions on Signal Processing, 2026.
[7]
Z. Li et al.,
"Sensing Line of Sight Perturbations in 6 GHz Wi-Fi using Channel Model based Features,"
IEEE Sensors Journal, vol. 26, no. 3, pp. 5181-5194, 2026.
[8]
H. Jin and P. Papadimitratos,
"Accountable, Scalable and DoS-resilient Secure Vehicular Communication,"
Computers & Security, vol. 156, 2025.
[9]
K. Hammar et al.,
"Adaptive Security Response Strategies Through Conjectural Online Learning,"
IEEE Transactions on Information Forensics and Security, vol. 20, pp. 4055-4070, 2025.
[10]
K. Shi et al.,
"Age-of-Information and Latency Minimization for Cache-enabled Mobile Crowdsensing Networks,"
IEEE Transactions on Vehicular Technology, 2025.
[11]
C. Linse and J. Lilliesköld,
"Agile in the realm of bureaucracy : old habits die hard,"
in R&D Management 2025 : Innovation and Biodiversity, 2025.
[12]
B. Sun et al.,
"AoI-Based Optimal Transmission Scheduling for Multiprocess Remote Estimation,"
IEEE Transactions on Automatic Control, vol. 70, no. 11, pp. 7245-7260, 2025.
[13]
E. Rencelj Ling and M. Ekstedt,
"Application and Evaluation of a Substation Threat Modeling Language for Automatic Attack Graph Generation,"
in Proceedings 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025, pp. 578-585.
[14]
H. Li et al.,
"AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons,"
in PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, pp. 8-13.
[15]
C. Linse and J. Lilliesköld,
"Barriers to deploying agile methods in established product development organizations,"
IEEE Engineering Management Review, 2025.
[16]
A. Ben Ameur et al.,
"Cache Allocation in Multi-Tenant Edge Computing : An Online Model-Based Reinforcement Learning Approach,"
IEEE Transactions on Cloud Computing, vol. 13, no. 2, pp. 459-472, 2025.
[17]
Z. Zhou, H. Jin and P. Papadimitratos,
"Clogging DoS Resilient Bootstrapping of Efficient V2V Validation,"
in 40th Annual ACM Symposium On Applied Computing, 2025, pp. 1857-1866.
[18]
O. Stenhammar et al.,
"Clustering of Geographical Segments for Predictive Quality of Service of Connected Vehicles,"
IEEE Transactions on Vehicular Technology, vol. 74, no. 11, pp. 18049-18064, 2025.
[19]
M. Spanghero and P. Papadimitratos,
"Consumer INS coupled with carrier phase measurements for GNSS spoofing detection,"
in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[20]
K. S. Tharakan and C. Fischione,
"Decentralized Fairness Aware Multi Task Federated Learning for VR Network,"
in IEEE Global Communications Conference, Taipei, Taiwan, 8–12 Dec 2025, 2025, pp. 1-5.
[21]
Y. Huang et al.,
"Demystifying Molecular Data-Driven Detection With Explainable Artificial Intelligence,"
IEEE Wireless Communications Letters, vol. 14, no. 6, pp. 1753-1757, 2025.
[22]
Y. Kim and G. Dán,
"Dynamic Alert Prioritization for Real-Time Situational Awareness : A Hidden Markov Model Framework With Active Learning,"
IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 6, pp. 6913-6928, 2025.
[23]
H. Sun et al.,
"Enhancing Low-Latency and High-Reliability Data Forwarding for In-Vehicle Time-Sensitive Networks,"
IEEE Transactions on Vehicular Technology, vol. 74, no. 8, pp. 11868-11881, 2025.
[24]
Y. Fu et al.,
"Enhancing Mobile Crowdsensing Efficiency: A Coverage-Aware Resource Allocation Approach,"
in 2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings, 2025.
[25]
H. Sasahara et al.,
"Green Routing Game : Pollution-Aware Mixed Fleet Logistics With Shared Charging Facilities,"
IEEE Transactions on Automatic Control, vol. 70, no. 7, pp. 4330-4343, 2025.
[26]
W. Liu and P. Papadimitratos,
"Guardian Positioning System (GPS) for Location Based Services,"
in WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, pp. 88-99.
[27]
X. Huang et al.,
"Heterogeneous Receptors-Based Molecule Harvesting in MC : Analysis for ISI Mitigation and Energy Efficiency,"
IEEE Transactions on Communications, vol. 73, no. 3, pp. 1621-1637, 2025.
[28]
S. M. Azimi Abarghouyi et al.,
"Hierarchical Federated ADMM,"
IEEE NETWORKING LETTERS, vol. 7, no. 1, pp. 11-15, 2025.
[29]
C. Aknesil et al.,
"Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks,"
in Proceedings - 2025 IEEE 55th International Symposium on Multiple-Valued Logic, ISMVL 2025, 2025, pp. 129-134.
[30]
M. Z. Naseer, V. Fodor and M. Ekstedt,
"Informed Defense : How Attacker Profiles Transform Vulnerability Assessments,"
in Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025, 2025, pp. 453-460.
[31]
H. Zhang et al.,
"Integrated Sensing and Communication for 6G Holographic Digital Twins,"
IEEE wireless communications, vol. 32, no. 2, pp. 104-112, 2025.
[32]
Y. Huang et al.,
"Interference-Resilient Optical Wireless Positioning via Machine Learning-Enhanced Subset Filtering,"
in Proceedings of the 51st European Conference on Optical Communication, 2025.
[33]
K. Hammar and R. Stadler,
"Intrusion Tolerance as a Two-Level Game,"
in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[34]
W. Johan, A. Hussain and P. Papadimitratos,
"Jailbreaking Large Language Models Through Content Concretization,"
in GameSec 2025 : 16th Conference on Game Theory and AI for Security, 2025.
[35]
K. Shi et al.,
"Joint System Latency and Data Freshness Optimization for Cache-Enabled Mobile Crowdsensing Networks,"
in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 4166-4172.
[36]
Y. K. Tun et al.,
"Joint UAV Deployment and Resource Allocation in THz-Assisted MEC-Enabled Integrated Space-Air-Ground Networks,"
IEEE Transactions on Mobile Computing, vol. 24, no. 5, pp. 3794-3808, 2025.
[37]
A. W. S. Jaber and G. Colo,
"LB-MDP-CL : A Reinforcement Learning and Co-evolutionary Approach for Optimizing Responses in Multi-Step Cyberattacks,"
in Proceedings 2025 23rd Mediterranean Communication and Computer Networking Conference (MedComNet), 2025.
[38]
S. Alhazbi et al.,
"LLMs Have Rhythm : Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis,"
IEEE Open Journal of the Communications Society, vol. 6, pp. 5050-5071, 2025.
[39]
X. Huang, H. Hellström and C. Fischione,
"Low-Complexity OTFS-Based Over-the-Air Computation Design for Time-Varying Channels,"
IEEE Transactions on Wireless Communications, vol. 24, no. 3, pp. 2483-2497, 2025.
[40]
J. Jeong et al.,
"Majority Vote Compressed Sensing for Over-the-Air Histogram Estimation,"
in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 5742-5748.
[41]
L. Fernandez and G. Karlsson,
"Measuring the Impact of Fuzzing Activity in Networking Software,"
in 40TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2025, pp. 1746-1748.
[42]
S. Hussein, C. Enyioha and C. Fischione,
"Multiple Receiver Over-the-Air Computation for Wireless Networked Control Systems,"
in 2025 IEEE 64th Conference on Decision and Control (CDC), 2025, pp. 509-514.
[43]
K. Hammar and T. Li,
"Online Incident Response Planning under Model Misspecification through Bayesian Learning and Belief Quantization,"
in Proceedings of the 18th ACM Workshop on Artificial Intelligence and Security, AISec 2025, 2025, pp. 40-51.
[44]
A. Javeed, V. Fodor and G. Dán,
"PERX : Energy-aware O-RAN Service Orchestration with Pairwise Performance Profiling,"
in IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2025, 2025.
[45]
S. Mostafavi et al.,
"Predictability of Performance in Communication Networks Under Markovian Dynamics,"
IEEE Transactions on Vehicular Technology, vol. 74, no. 11, pp. 17924-17943, 2025.
[46]
K. Kazari, A. Kanellopoulos and G. Dán,
"Quickest Detection of Adversarial Attacks Against Correlated Equilibria,"
in Thirty-Ninth AAAI Conference On Artificial Intelligence, AAAI-25, VOL 39 NO 13, 2025, pp. 13961-13968.
[47]
C. Linse and J. Lilliesköld,
"Reaching for the stars of grasping for straws? : Exploring reasons for adopting agile methods in development of complex mechatronic products,"
in EURAM 2025 : Managing with purpose, 2025.
[48]
O. Stenhammar et al.,
"Real-Time Network Digital Twin : Experimental Setup for Proof of Concept,"
IEEE wireless communications, vol. 32, no. 3, pp. 114-121, 2025.
[49]
X. Yan, S. Razavikia and C. Fischione,
"ReMAC : Digital Multiple Access Computing by Repeated Transmissions,"
IEEE Transactions on Communications, vol. 73, no. 10, pp. 8965-8979, 2025.
[50]
B. Hu et al.,
"Resource Allocation Optimisation for Low-Altitude Economy-Enabled IoT Networks,"
in 2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings, 2025.