Hoppa till huvudinnehållet
Till KTH:s startsida

Publikationer av György Dán

Refereegranskade

Artiklar

[1]
E. Shereen, K. Kazari och G. Dán, "A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control," IEEE Transactions on Smart Grid, vol. 15, no. 1, s. 959-972, 2024.
[2]
Y. K. Tun et al., "Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach," IEEE Transactions on Vehicular Technology, vol. 73, no. 1, s. 1491-1496, 2024.
[3]
Y. Kim, G. Dán och Q. Zhu, "Human-in-the-loop cyber intrusion detection using active learning," IEEE Transactions on Information Forensics and Security, vol. 19, s. 8658-8672, 2024.
[4]
F. Tütüncüoğlu och G. Dán, "Joint Resource Management and Pricing for Task Offloading in Serverless Edge Computing," IEEE Transactions on Mobile Computing, vol. 23, no. 6, s. 7438-7452, 2024.
[6]
[7]
F. Tutuncuoglu, S. Josilo och G. Dán, "Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing," IEEE/ACM Transactions on Networking, vol. 31, no. 2, s. 695-709, 2023.
[9]
L. Varawala et al., "A Scalable Formulation for Look-Ahead Security-Constrained Optimal Power Flow," IEEE Transactions on Control of Network Systems, vol. 9, no. 1, s. 138-150, 2022.
[10]
G. P. Koudouridis, Q. He och G. Dán, "An architecture and performance evaluation framework for artificial intelligence solutions in beyond 5G radio access networks," EURASIP Journal on Wireless Communications and Networking, vol. 2022, no. 1, 2022.
[12]
E. Shereen, R. Ramakrishna och G. Dán, "Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing," IEEE Transactions on Smart Grid, vol. 13, no. 4, s. 3241-3254, 2022.
[13]
S. Josilo och G. Dán, "Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection," IEEE/ACM Transactions on Networking, vol. 30, no. 4, s. 1865-1878, 2022.
[14]
F. Tutuncuoglu och G. Dán, "Optimal Service Caching and Pricing in Edge Computing : a Bayesian Gaussian Process Bandit Approach," IEEE Transactions on Mobile Computing, s. 1-15, 2022.
[16]
S. Josilo och G. Dán, "Joint Management of Wireless and Computing Resources for Computation Offloading in Mobile Edge Clouds," IEEE Transactions on Cloud Computing, vol. 9, no. 4, s. 1507-1520, 2021.
[17]
[18]
M. Delcourt et al., "Time-Synchronization Attack Detection in Unbalanced Three-Phase Systems," IEEE Transactions on Smart Grid, vol. 12, no. 5, s. 4460-4470, 2021.
[19]
Q. He et al., "A Meta-Learning Scheme for Adaptive Short-Term Network Traffic Prediction," IEEE Journal on Selected Areas in Communications, vol. 38, no. 10, s. 2271-2283, 2020.
[20]
S. Josilo och G. Dán, "Computation Offloading Scheduling for Periodic Tasks in Mobile Edge Computing," IEEE/ACM Transactions on Networking, vol. 28, no. 2, s. 667-680, 2020.
[21]
E. Shereen et al., "Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation," IEEE Transactions on Instrumentation and Measurement, vol. 69, no. 6, s. 3412-3427, 2020.
[22]
E. Shereen och G. Dán, "Model-Based and Data-Driven Detectors for Time Synchronization Attacks Against PMUs," IEEE Journal on Selected Areas in Communications, vol. 38, no. 1, s. 169-179, 2020.
[23]
P. Zhao et al., "A Game Theoretic Approach to Uplink Pilot and Data Power Control in Multi-Cell Multi-User MIMO Systems," IEEE Transactions on Vehicular Technology, vol. 68, no. 9, s. 8707-8720, 2019.
[24]
S. Josilo och G. Dan, "Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems," IEEE/ACM Transactions on Networking, vol. 27, no. 1, s. 85-97, 2019.
[25]
[26]
Q. He, G. Dán och V. Fodor, "Joint Assignment and Scheduling for Minimizing Age of Correlated Information," IEEE/ACM Transactions on Networking, vol. 27, no. 5, s. 1887-1900, 2019.
[27]
S. Josilo och G. Dán, "Joint Management of Wireless and Computing Resources for Computation Offloading in Mobile Edge Clouds," IEEE Transactions on Cloud Computing, s. 1-14, 2019.
[28]
S. Josilo och G. Dán, "Selfish Decentralized Computation Offloading for Mobile Cloud Computing in Dense Wireless Networks," IEEE Transactions on Mobile Computing, vol. 18, no. 1, s. 207-220, 2019.
[29]
P. Zhao och G. Dán, "A Benders Decomposition Approach for Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds," IEEE Transactions on Network and Service Management, vol. 15, no. 4, s. 1460-1472, 2018.
[30]
P. Zhao et al., "A Game Theoretic Approach to Setting the Pilot Power Ratio in Multi-User MIMO Systems," IEEE Transactions on Communications, vol. 66, no. 3, s. 999-1012, 2018.
[31]
Y. Liu et al., "A Taxonomy for the Security Assessment of IP-Based Building Automation Systems : The Case of Thread," IEEE Transactions on Industrial Informatics, vol. 14, no. 9, s. 4113-4123, 2018.
[32]
A. Araldo, G. Dán och D. Rossi, "Caching Encrypted Content Via Stochastic Cache Partitioning," IEEE/ACM Transactions on Networking, vol. 26, no. 1, s. 548-561, 2018.
[33]
E. Eriksson, G. DánDán och V. Fodor, "Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks," IEEE transactions on circuits and systems for video technology (Print), vol. 28, no. 11, s. 3288-3299, 2018.
[34]
S. Barreto et al., "Undetectable PMU Timing-Attack on Linear State-Estimation by UsingRank-1 Approximation," IEEE Transactions on Smart Grid, vol. 9, no. 4, s. 3530-3542, 2018.
[35]
I. Jang et al., "A Proxy-Based Collaboration System to Minimize Content Download Time and Energy Consumption," IEEE Transactions on Mobile Computing, vol. 16, no. 8, s. 2105-2117, 2017.
[36]
S. Pack, G. Dán och K. Singh, "Editorial : Recent Advances in Heterogeneous Networking for Quality, Reliability, Security and Robustness," Mobile Networks and Applications, vol. 22, no. 5, s. 845-847, 2017.
[37]
I. Jang et al., "Joint Optimization of Service Function Placement and Flow Distribution for Service Function Chaining," IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, s. 2532-2541, 2017.
[38]
H. Li, G. Dán och K. Nahrstedt, "Portunes plus : Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging," IEEE Transactions on Smart Grid, vol. 8, no. 5, s. 2305-2313, 2017.
[39]
H. Al-Zubaidy et al., "Reliable Video Streaming With Strict Playout Deadline in Multihop Wireless Networks," IEEE transactions on multimedia, vol. 19, no. 10, s. 2238-2251, 2017.
[40]
M. R. Asghar et al., "Smart Meter Data Privacy : A Survey," IEEE Communications Surveys and Tutorials, vol. 19, no. 4, s. 2820-2835, 2017.
[41]
P. -. Ho et al., "Special Section on Mobile Content Delivery Networks," Computer Communications, vol. 99, 2017.
[42]
I. Jang et al., "The Software-Defined Vehicular Cloud : A New Level of Sharing the Road," IEEE Vehicular Technology Magazine, vol. 12, no. 2, s. 78-88, 2017.
[43]
V. Pacifici, F. Lehrieder och G. Dán, "Cache Bandwidth Allocation for P2P File Sharing Systems to Minimize Inter-ISP Traffic," IEEE/ACM Transactions on Networking, vol. 24, no. 1, s. 437-448, 2016.
[44]
V. Pacifici och G. Dán, "Coordinated Selfish Distributed Caching for Peering Content-centric Networks," IEEE/ACM Transactions on Networking, vol. PP, no. 99, s. 1-12, 2016.
[45]
V. Pacifici och G. Dán, "Distributed Caching Algorithms for Interconnected Operator CDNs," IEEE Journal on Selected Areas in Communications, vol. 35, no. 2, s. 380-391, 2016.
[46]
E. Eriksson, G. Dán och V. Fodor, "Predictive Distributed Visual Analysis for Video in Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 15, no. 7, s. 1743-1756, 2016.
[47]
E. Hochschorner, G. Dan och Å. Moberg, "Carbon footprint of movie distribution via the internet : a Swedish case study," Journal of Cleaner Production, vol. 87, s. 197-207, 2015.
[48]
G. Dán, M. A. Khan och V. Fodor, "Characterization of SURF and BRISK interest point distribution for distributed feature extraction in visual sensor networks," IEEE transactions on multimedia, vol. 17, no. 5, s. 591-602, 2015.
[49]
A. Redondi et al., "Cooperative image analysis in visual sensor networks," Ad hoc networks, vol. 28, s. 38-51, 2015.
[50]
O. Vuković och G. Dán, "Security of Fully Distributed Power System State Estimation : Detection and Mitigation of Data Integrity Attacks," IEEE Journal on Selected Areas in Communications, vol. 32, no. 7, s. 1500-1508, 2014.
[51]
G. Dán och N. Carlsson, "Centralized and distributed protocols for tracker-based dynamic swarm management," IEEE/ACM Transactions on Networking, vol. 21, no. 1, s. 297-310, 2013.
[52]
F. Lehrieder et al., "Caching for BitTorrent-Like P2P Systems: A Simple Fluid Model and Its Implications," IEEE/ACM Transactions on Networking, vol. 20, no. 4, s. 1176-1189, 2012.
[53]
G. Dán et al., "Challenges in Power System Information Security," IEEE Security and Privacy, vol. 10, no. 4, s. 62-70, 2012.
[54]
V. Pacifici och G. Dán, "Convergence in Player-Specific Graphical Resource Allocation Games," IEEE Journal on Selected Areas in Communications, vol. 30, no. 11, s. 2190-2199, 2012.
[55]
O. Vuković et al., "Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation," IEEE Journal on Selected Areas in Communications, vol. 30, no. 6, s. 1108-1118, 2012.
[56]
G. Dán, "Cache-to-Cache : Could ISPs Cooperate to Decrease Peer-to-Peer Content Distribution Costs?," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 9, s. 1469-1482, 2011.
[57]
G. Dán et al., "Interaction Patterns between P2P Content Distribution Systems and ISPs," IEEE Communications Magazine, vol. 49, no. 5, s. 222-230, 2011.
[58]
G. Dán och V. Fodor, "Stability and performance of overlay multicast systems employing forward error correction," Performance evaluation (Print), vol. 67, no. 2, s. 80-101, 2010.
[59]
G. Dán och V. Fodor, "Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 10, s. 1499-1511, 2009.
[60]
I. Chatzidrossos, G. Dán och V. Fodor, "Delay and playout probability trade-off in mesh-based peer-to-peer streaming with delayed buffer map updates," Peer-to-Peer Networking and Applications, vol. 3, no. 3, s. 208-221, 2009.
[61]
G. Dán, V. Fodor och G. Karlsson, "Robust source-channel coding for real-time multimedia," Multimedia Systems, vol. 13, no. 5-6, s. 363-377, 2008.
[62]
V. Fodor och G. Dán, "Resilience in live peer-to-peer streaming," IEEE Communications Magazine, vol. 45, no. 6, s. 116-123, 2007.
[63]
G. Dán, V. Fodor och G. Karlsson, "On the effects of the packet size distribution on FEC performance," Computer Networks, vol. 50, no. 8, s. 1104-1129, 2006.
[64]
G. Dán, V. Fodor och G. Karlsson, "On the effects of the packet size distribution on the packet loss process," Telecommunications Systems, vol. 32, no. 1, s. 31-53, 2006.
[65]

Konferensbidrag

[66]
S. G. E. Gökstorp et al., "Anomaly Detection in Security Logs using Sequence Modeling," i Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[67]
A. Hasselberg et al., "Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge," i 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, s. 41-48.
[68]
F. Tütüncüoglu et al., "Dynamic Time-of-Use Pricing for Serverless Edge Computing with Generalized Hidden Parameter Markov Decision Processes," i Proceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems, ICDCS 2024, 2024, s. 668-679.
[69]
F. Tütüncüoglu och G. Dán, "Sample-efficient Learning for Edge Resource Allocation and Pricing with BNN Approximators," i IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024, 2024.
[70]
S. S. Mostafavi et al., "Active Queue Management with Data-Driven Delay Violation Probability Predictors," i GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, s. 6371-6376.
[71]
E. Shereen, K. Kazari och G. Dán, "Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids," i 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, 2023.
[72]
K. Kazari, E. Shereen och G. Dán, "Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning," i Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, 2023, s. 162-170.
[73]
Y. K. Tun och G. Dán, "RIS-Assisted UAV-Enabled JSAC System : Joint Radio Resource and Phase Shift Optimization Framework," i 2023 IEEE Globecom Workshops, GC Wkshps 2023, 2023, s. 763-768.
[74]
Y. K. Tun och G. Dán, "Sum-Rate Maximization in Integrated Space-Air-Ground Networks under Backhaul Capacity Constraints," i GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, s. 6255-6260.
[75]
Y. Kim och G. Dán, "An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness," i 2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, s. 154-162.
[76]
E. Poorhadi, E. Troubitsyna och G. Dán, "Analysing the Impact of Security Attacks on Safety Using SysML and Event-B," i MODEL-BASED SAFETY AND ASSESSMENT, IMBSA 2022, 2022, s. 170-185.
[77]
H. Sasahara et al., "Green Routing Game : Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs," i 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, s. 6358-6363.
[78]
R. Ramakrishna och G. Dán, "Inferring Class-Label Distribution in Federated Learning," i AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022, 2022, s. 45-56.
[79]
S. Saritas et al., "Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication : A Game Theoretic Study," i ICC 2021 - IEEE International Conference on Communications, 2021.
[80]
S. S. Mostafavi, G. Dán och J. Gross, "Data-Driven End-to-End Delay Violation Probability Prediction with Extreme Value Mixture Models," i 6th ACM/IEEE Symposium on Edge Computing, SEC 2021, 2021, s. 416-422.
[81]
E. Poorhadi, E. Troubitsyna och G. Dán, "Formal Modelling of the Impact of Cyber Attacks on Railway Safety," i Computer Safety, Reliability, And Security (SAFECOMP 2021), 2021, s. 117-127.
[82]
M. Törngren et al., "Industrial Edge-based Cyber-Physical Systems - Application Needs and Concerns for Realization," i 6th ACM/IEEE Symposium on Edge Computing, SEC 2021, 2021, s. 409-415.
[83]
Y. Guo och G. Dán, "Message from the workshop co-chairs," i Proceedings - 2021 IEEE 41st International Conference on Distributed Computing Systems Workshops, ICDCSW 2021, 2021.
[84]
F. Tutuncuoglu och G. Dán, "Optimal Pricing for Service Caching and Task Offloading in Edge Computing," i 17Th Conference On Wireless On-Demand Network Systems And Services (WONS 2022), 2021.
[85]
Q. He, G. Koudouridis och G. Dán, "A Comparison of Machine and Statistical Time Series Learning for Encrypted Traffic Prediction," i IEEE International Conference on Computing, Networking and Communications (ICNC), 2020.
[86]
Z. Li, G. Dán och D. Liu, "A Game Theoretic Analysis of LQG Control under Adversarial Attack," i 2020 59th IEEE Conference on Decision and Control (CDC), 2020, s. 1632-1639.
[87]
P. Sena et al., "Caching Policies over Unreliable Channels," i 2020 18th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (wiopt), 2020.
[88]
E. Poorhadi, E. Troubitsyna och G. Dán, "Formalising the Impact of Security Attacks on IoT Safety," i SAFECOMP 2020: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020, s. 69-81.
[89]
E. Shereen och G. Dán, "Network-aware Mitigation of Undetectable PMU Time Synchronization Attacks," i 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020, 2020, s. 1-7.
[90]
S. Saritas, G. Dán och H. Sandberg, "Passive Fault-tolerant Estimation under Strategic Adversarial Bias," i 2020 American Control Conference (ACC), 2020, s. 4644-4651.
[91]
Q. He, G. Dán och G. Koudouridis, "Semi-Persistent Scheduling for 5G Downlink based on Short-Term Traffic Prediction," i 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, 2020.
[92]
S. Saritas et al., "Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach," i 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings, 2019, s. 439-458.
[93]
Z. Li och G. Dán, "Dynamic Cheap Talk for Robust Adversarial Learning," i 10th International Conference on Decision and Game Theory for Security, GameSec 2019, 2019, s. 297-309.
[94]
E. Shereen et al., "Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1," i Proceedings of 2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS, 2019.
[95]
Q. He, G. Dán och V. Fodor, "On Emptying a Wireless Network with Minimum-Energy under Age Constraints," i INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019, 2019, s. 668-673.
[96]
P. Zhao och G. Dán, "Scheduling Parallel Migration of Virtualized Services under Time Constraints in Mobile Edge Clouds," i Proceedings of the 31st International Teletraffic Congress, ITC 2019, 2019, s. 28-36.
[97]
G. Dán och R. Mazumdar, "Welcome Message from the Technical Program Co-Chairs," i Proceedings of the 31st International Teletraffic Congress, ITC 2019, 2019.
[98]
S. Josilo och G. Dán, "Wireless and Computing Resource Allocation for Selfish Computation Offloading in Edge Computing," i IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, s. 2467-2475.
[99]
E. Shereen och G. Dán, "Correlation-based Detection of PMU Time Synchronization Attacks," i 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, 2018.
[100]
S. Josilo och G. Dán, "Decentralized Scheduling for Offloading of Periodic Tasks in Mobile Edge Computing," i IFIP NETWORKING 2018, 2018, s. 469-477.
[101]
S. Josilo och G. Dán, "Joint Allocation of Computing and Wireless Resources to Autonomous Devices in Mobile Edge Computing," i MECOMM 2018 - Proceedings of the 2018 Workshop on Mobile Edge Communications, Part of SIGCOMM 2018, 2018.
[102]
Q. He, G. Dán och V. Fodor, "Minimizing Age of Correlated Information for Wireless Camera Networks," i IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, s. 547-552.
[103]
S. Josilo och G. Dán, "Poster Abstract : Decentralized Fog Computing Resource Management for Offloading of Periodic Tasks," i IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018.
[104]
P. Zhao och G. Dán, "Time Constrained Service-aware Migration of Virtualized Services for Mobile Edge Computing," i Proceedings of the 30th International Teletraffic Congress, ITC 2018, 2018, s. 64-72.
[105]
S. Barreto et al., "A Continuum of Undetectable Timing-Attacks on PMU-based Linear State-Estimation," i 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017, 2017, s. 473-479.
[106]
S. Josilo och G. Dán, "A Game Theoretic Analysis of Selfish Mobile Computation Offloading," i IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017.
[107]
P. Danielis et al., "Dynamic Flow Migration for Delay Constrained Traffic in Software-Defined Networks," i IEEE Global Telecommunications Conference 2017 (GLOBECOM 2017), 2017.
[108]
P. Zhao och G. Dán, "Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds," i 2017 IFIP Networking Conference (IFIP NETWORKING) and Workshops, 2017.
[109]
V. Pacifici, S. Josilo och G. Dán, "Distributed Algorithms for Content Caching in Mobile Backhaul Networks," i Proceedings of the 28th International Teletraffic Congress, ITC 2016, 2016, s. 313-321.
[110]
M. Rodrigues, G. Dán och M. Gallo, "Enabling transparent caching in LTE mobile backhaul networks with SDN," i Proceedings - IEEE INFOCOM, 2016, s. 724-729.
[111]
E. Eriksson, G. Dán och V. Fodor, "Radio and Computational Resource Management for Fog Computing Enabled Wireless Camera Networks," i Proc. of IEEE GlobeCom Workshop on Internet of Everything, 2016.
[112]
A. Araldo, G. Dan och D. Rossi, "Stochastic Dynamic Cache Partitioning for Encrypted Content Delivery," i Proceedings of the 28th International Teletraffic Congress, ITC 2016, 2016, s. 139-147.
[113]
E. Eriksson, G. Dán och V. Fodor, "Algorithms for Distributed Feature Extraction in Multi-camera Visual Sensor Networks," i Proceedings of 2015 14th IFIP Networking Conference, IFIP Networking 2015, 2015.
[114]
L. Gkatzikis et al., "Clustered Content Replication for Hierarchical Content Delivery Networks," i 2015 IEEE International Conference On Communications (ICC), 2015, s. 5872-5877.
[115]
H. Sandberg, G. Dan och R. Thobaben, "Differentially private state estimation in distribution networks with smart meters," i Proceedings of the IEEE Conference on Decision and Control, 2015, s. 4492-4498.
[117]
E. Eriksson, V. Pacifici och G. Dán, "Efficient Distribution of Visual Processing Tasks in Multi-camera Visual Sensor Networks," i Multimedia & Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, s. 1-6.
[118]
H. Li, G. Dán och K. Nahrstedt, "Lynx : Authenticated Anonymous Real-Time Reporting of Electric Vehicle Information," i 2015 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2015, s. 599-604.
[119]
H. M. Al-Zubaidy, G. Dán och V. Fodor, "Performance of in-network processing for visual analysis in wireless sensor networks," i Proceedings of 2015 14th IFIP Networking Conference, IFIP Networking 2015, 2015.
[120]
H. Li, G. Dán och K. Nahrstedt, "Proactive key dissemination-based fast authentication for in-motion inductive EV charging," i 2015 IEEE International Conference on Communications (ICC), 2015, s. 795-801.
[121]
L. Baroffio et al., "Demo : Enabling image analysis tasks in visual sensor networks," i Proceedings of the 8th ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC 2014, 2014, s. a46.
[122]
G. Dán och N. Carlsson, "Dynamic Content Allocation for Cloud-assisted Service of Periodic Workloads," i INFOCOM, 2014 Proceedings IEEE, 2014, s. 853-861.
[123]
A. Redondi et al., "Enabling Visual Analysis in Wireless Sensor Networks," i 2014 IEEE International Conference on Image Processing (ICIP), 2014, s. 3408-3410.
[124]
N. M. Torrisi et al., "Peekaboo : A gray hole attack on encrypted SCADA communication using traffic analysis," i 5th IEEE International Conference on Smart Grid Communications 2014 (SmartGridComm 2014) in Venice, Italy, 2014, s. 902-907.
[125]
J. Li et al., "Performance analysis of local caching replacement policies for internet video streaming services," i 2014 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014, 2014, s. 341-348.
[126]
H. Li, G. Dán och K. Nahrstedt, "Portunes : Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging," i IEEE Intl. Conference on Smart Grid Communications (SmartGridComm); Venice, Italy, 3-6 Nov. 2014, 2014.
[127]
E. Eriksson, G. Dán och V. Fodor, "Prediction-based Load Control and Balancing for Feature Extraction in Visual Sensor Networks," i 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2014; Florence; Italy; 4 May 2014 through 9 May 2014, 2014, s. 674-678.
[128]
E. Eriksson, G. Dán och V. Fodor, "Real-time Distributed Visual Feature Extraction from Video in Sensor Networks," i Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014, 2014.
[129]
A. Teixeira et al., "Security of smart distribution grids : Data integrity attacks on integrated volt/VAR control and countermeasures," i American Control Conference (ACC), 2014, 2014, s. 4372-4378.
[130]
R. Thobaben, G. Dán och H. Sandberg, "Wiretap Codes for Secure Multi-Party Computation," i Globecom Workshops (GC Wkshps), 2014, 2014.
[131]
M. A. Khan, G. Dán och V. Fodor, "Characterization of SURF Interest Point Distribution for Visual Processing in Sensor Networks," i 2013 18th International Conference on Digital Signal Processing, DSP 2013, 2013.
[132]
G. Dán et al., "Cloud Computing for the Power Grid : From Service Composition to Assured Clouds," i Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), June 2013, 2013.
[133]
O. Vuković, G. Dán och R. Bobba, "Confidentiality-preserving Obfuscation for Cloud-based Power System Contingency Analysis," i 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, s. 432-437.
[134]
V. Pacifici och G. Dán, "Content-peering Dynamics of Autonomous Caches in a Content-centric Network," i 2013 Proceedings IEEE Infocom, 2013, s. 1079-1087.
[135]
O. Vuković och G. Dán, "Detection and Localization of Targeted Attacks on Fully Distributed Power System State Estimation," i 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, s. 390-395.
[136]
H. Li, G. Dán och K. Nahrstedt, "FADEC : Fast authentication for dynamic electric vehicle charging," i 2013 IEEE Conference on Communications and Network Security, CNS 2013, 2013, s. 369-370.
[137]
O. Vuković och G. Dán, "On the Security of Distributed Power System State Estimation under Targeted Attacks," i Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013, s. 666-672.
[138]
G. Dán et al., "SELINDA : A Secure, Scalable and Light-Weight Data Collection Protocol for Smart Grids," i 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, s. 480-485.
[139]
V. Pacifici och G. Dán, "Stable Content-peering of Autonomous Systems in a Content-centric Network," i 9th Swedish National Computer Networking Workshop (SNCNW),Lund, June 3-4,2013, 2013.
[140]
D. Carra et al., "Topic 7 : Peer-to-peer computing (Introduction)," i Lecture Notes in Computer Science, 2013, s. 353.
[141]
N. Carlsson et al., "A longitudinal characterization of local and global BitTorrent workload dynamics," i 13th International Conference on Passive and Active Measurement (PAM), 2012, 2012, s. 252-262.
[142]
V. Pacifici, F. Lehrieder och G. Dán, "Cache Capacity Allocation for BitTorrent-like Systems to Minimize Inter-ISP Traffic," i IEEE  International Conference on Computer Communications (INFOCOM), 2012, 2012, s. 1512-1520.
[143]
G. Andersson et al., "Cyber-security of SCADA systems," i 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012, 2012, s. 6175543.
[144]
I. Filippini et al., "Non-cooperative RSU Deployment in Vehicular Networks," i 9th Annual Conference on Wireless On-demand Network Systems and Services (WONS), 2012, 2012, s. 79-82.
[145]
A. Teixeira et al., "Optimal Power Flow : Closing the Loop over Corrupted Data," i 2012 American Control Conference (ACC), 2012, s. 3534-3540.
[146]
I. Chatzidrossos och G. Dán, "Playout Adaptation in Peer-to-Peer Systems Under Churn," i 2012 19th International Packet Video Workshop, PV 2012, 2012, s. 119-124.
[147]
N. Carlsson et al., "Tradeoffs in cloud and peer-assisted content delivery systems," i 2012 IEEE 12th International Conference on Peer-to-Peer Computing, P2P 2012, 2012, s. 249-260.
[149]
V. Pacifici och G. Dán, "A Game Theoretic Analysis of Selfish Content Replication on Graphs," i 7th Swedish National Computer Networking Workshop (SNCNW), 2011, 2011.
[150]
C. Casetti et al., "Context-aware information dissemination in vehicular networks," i EURO-NGI Conf. Next Gener. Internet Networks, NGI - Proc., 2011.
[151]
G. Dán, N. Carlsson och I. Chatzidrossos, "Efficient and Highly Available Peer Discovery: A Case for Independent Trackers and Gossiping," i IEEE Conference on Peer-to-peer Computing, 2011, s. 290-299.
[153]
O. Vuković, G. Dán och G. Karlsson, "On the Trade-off between Relationship Anonymity and Communication Overhead in Anonymity Networks," i IEEE International Conference on Communications, 2011.
[154]
F. Lehrieder, V. Pacifici och G. Dán, "On the benefits of P2P cache capacity allocation," i Proceedings of the 2011 23rd International Teletraffic Congress, ITC 2011, 2011, s. 312-313.
[155]
V. Pacifici och G. Dán, "Selfish Content Replication on Graphs," i ITC '11 Proceedings of the 23rd International Teletraffic Congress, 2011, s. 119-126.
[156]
V. Vukadinovic och G. Dán, "Multicast Scheduling for Scalable Video Streaming in Wireless Networks," i ACM Multimedia Systems (MMSys), 2010.
[157]
G. Dán och N. Carlsson, "Power-law revisited : A Large Scale Measurement Study of P2P Content Popularity," i Proceedings of the 9th International Workshop on Peer-to-Peer Systems, IPTPS 2010, 2010.
[158]
I. Chatzidrossos, G. Dán och V. Fodor, "Server Guaranteed Cap : an incentive mechanism for maximizing streaming quality in heterogeneous overlays," i NETWORKING 2010, PROCEEDINGS, 2010, s. 315-326.
[159]
G. Dán och H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," i 2010 1st IEEE International Conference on Smart Grid Communications, SmartGridComm 2010, 2010, s. 214-219.
[160]
F. Lehrieder et al., "The impact of caching on BitTorrent-like peer-to-peer systems," i 2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010, 2010.
[161]
G. Dán och N. Carlsson, "Dynamic Swarm Management for Improved BitTorrent Performance," i International Workshop on Peer-to-peer Systems, 2009.
[162]
G. Dán, "Cooperative Caching and Relaying Strategies for Peer-to-peer Content Delivery," i International Workshop on Peer-to-peer Systems, 2008.
[163]
G. Dán och V. Fodor, "Delay bounds and scalability for overlay multicast," i AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, s. 227-239.
[164]
G. Dán och V. Fodor, "An analytical study of Low Delay Multi-tree-based Overlay Multicast," i P2P-TV '07 Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 2007, s. 352-357.
[165]
G. Dán, V. Fodor och I. Chatzidrossos, "On the performance of multiple-tree-based peer-to-peer live streaming," i INFOCOM 2007, VOLS 1-5, 2007, s. 2556-2560.
[166]
G. Dán, V. Fodor och I. Chatzidrossos, "Streaming performance in multiple-tree-based overlays," i NETWORKING 2007: Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Proceedings, 2007, s. 617-627.
[167]
G. Dán, V. Fodor och G. Karlsson, "A rate-distortion based comparison of media-dependent FEC and MDC for real-time audio," i 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, s. 1002-1007.
[168]
G. Dán, V. Fodor och G. Karlsson, "On the asymptotic behavior of end-point-based multicast streaming," i 2006 International Zurich Seminar on Communications : Access - Transmission - Networking, Proceedings, 2006, s. 66-69.
[169]
G. Dán et al., "On the performance of error-resilient end-point-based multicast streaming," i 2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, s. 160-168.
[170]
G. Dán, V. Fodor och G. Karlsson, "On the stability of end-point-based multimedia streaming," i NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, s. 678-690.
[171]
G. Dán, V. Fodor och G. Karlsson, "Are multiple descriptions better than one?," i NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, s. 684-696.
[172]
G. Dán, V. Fodor och G. Karlsson, "Packet size distribution : An aside?," i QUALITY OF SERVICE IN MULTISERVICE IP NETWORKS, PROCEEDINGS, 2005, s. 75-87.
[173]
G. Dán, V. Fodor och G. Karlsson, "Analysis of the Packet Loss Process for Multimedia Traffic," i Intl. Conference on Telecommunication Systems Modeling and Analysis, 2004.
[174]
G. Dán och V. Fodor, "Quality differentiation with source shaping and forward error correction," i Interactive Multimedia On Next Generation Networks, 2003, s. 222-233.
[175]
G. Dán och V. Fodor, "On the efficiency of shaping live video streams," i Proceedings of the 2002  international symposium on performance evaluation of computer and telecommunications systems, 2002.
[176]
A. M. Dán, G. Dán och S. M. Rios, "Improved Method for Flicker Evaluation," i Conference on  Electric Power Engineering, 1999.

Icke refereegranskade

Konferensbidrag

[177]
E. Hochschorner, Å. Moberg och G. Dán, "LCA of IPTV and Peer-to-peer," i Nordic Life Cycle Association, Helsingfors, 2011.

Kapitel i böcker

[178]
S. Santas et al., "Continuous authentication security games," i Game Theory and Machine Learning for Cyber Security, : Wiley, 2021, s. 180-203.
[179]
G. Dán, K. C. Sou och H. Sandberg, "Power-system state-estimation security : Attacks and protection schemes," i Smart Grid Communications and Networking, : Cambridge University Press, 2010, s. 388-412.

Avhandlingar

[180]
G. Dan, "Internet Video Transmission," Doktorsavhandling Stockholm : KTH, 2006.
[181]
G. Dán, "Traffic Control for VBR Video in Packet Switched Networks," Licentiatavhandling Kista : Mikroelektronik och informationsteknik, Trita-IMIT-LCN. AVH, 04:01, 2004.
Senaste synkning med DiVA:
2024-11-20 00:12:06