Page d'accueil // SnT // Publications

Publications

In press

Alves Martins, W., Shankar, B., & Ottersten, B. (in press). Oversampled DFT-Modulated Biorthogonal Filter Banks: Perfect Reconstruction Designs and Multiplierless Approximations. IEEE Transactions on Circuits and Systems. II, Express Briefs.
Arora, A., Tsinos, C., Shankar, B., Chatzinotas, S., & Ottersten, B. (in press). Hybrid Analog-Digital Precoding Design for Satellite Systems. Proc. 37th International Communications Satellite Systems Conference (ICSSC'19).
Arora, A., Tsinos, C., Shankar, B., Chatzinotas, S., & Ottersten, B. (in press). Hybrid Transceivers Design for Large-Scale Antenna Arrays Using Majorization-Minimization Algorithms. IEEE Transactions on Signal Processing.
Arora, A., Tsinos, C., Shankar, B., Chatzinotas, S., & Ottersten, B. (in press). Majorization-Minimization Algorithms for Analog Beamforming with Large-Scale Antenna Arrays. Proc. 7th IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2019.
Arora, A., Tsinos, C., Shankar, B., Chatzinotas, S., & Ottersten, B. (in press). MM-Based Solution for Partially Connected Hybrid Transceivers with Large Scale Antenna Arrays. Proc. 2019 IEEE Global Communications Conference (GLOBECOM).
Askarpour, M., Menghi, C., Belli, G., Bersani, M., & Pelliccione, P. (in press). Mind the gap: Robotic Mission Planning Meets Software Engineering. Proceedings of the 8th International Conference on Formal Methods in Software Engineering.
Clarisó, R., Gonzalez Perez, C. A., & Cabot, J. (in press). Smart Bound Selection for the Verification of UML/OCL Class Diagrams. IEEE Transactions on Software Engineering.
Emara, K. A. A. E.-S. (in press). Safety-aware Location Privacy in VANET: Evaluation and Comparison. IEEE Transactions on Vehicular Technology.
Gaaloul, K., Menghi, C., Nejati, S., Briand, L., & Wolfe, D. (in press). Mining Assumptions for Software Components using Machine Learning. Proceedings of the The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Gildas, A., Muhammed, A. B., Ioana, B., Srdjan, Č., Gerhard, H., Süleyman, K., Chong, H. K., Cédric, L., Benjamin, M., Jorge, M., Alberto, P., Kasper, R., Dave, S., Aslan, T., Trujillo Rasua, R., & Serge, V. (in press). Security of Distance−Bounding: A Survey. ACM Computing Surveys.
Hajri, I., Göknil, A., Pastore, F., & Briand, L. (in press). Automating System Test Case Classification and Prioritization for Use Case-Driven Testing in Product Lines. Empirical Software Engineering.
Joroughi, V. (in press). Joint Precoding and On-Board Beamforming for Multiple gateway Multibeam Satellite Systems. Submitted to IEEE Journal on Selected topic in Communication (JSAC).
Khan, N., Ahmad, T., Patel, A., & State, R. (in press). Blockchain Governance: An Overview and Prediction of Optimal Strategies Using Nash Equilibrium. 3rd AUE International Research Conference. Springer.
McKay, B., Schweitzer, P., & Schweitzer, P. (in press). Competition Numbers, Quasi-Line Graphs and Holes. SIAM Journal on Discrete Mathematics.
Mengali, A., Shankar, B., & Ottersten, B. (in press). Exploring Different Receiver Structures for Radio over FSO Systems with Signal Dependent Noise. Proceedings of Globecom 2017.
Menghi, C., Bersani, M., Rossi, M., & San Pietro, P. (in press). Model Checking MITL formulae on Timed Automata: a Logic-Based Approach. ACM Transactions on Computational Logic.
Menghi, C., Rizzi, A. M., & Bernasconi, A. (in press). Integrating Topological Proofs with Model Checking to Instrument Iterative Design. Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020.
Menghi, C., Tsigkanos, C., Pelliccione, P., Ghezzi, C., & Berger, T. (in press). Specification Patterns for Robotic Missions. IEEE Transactions on Software Engineering.
Mestel, D. (in press). Widths of regular and context-free languages. 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019).
Nguyen, H. V., Nguyen, V. D., Dobre, O. A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Shin, O.-S. (in press). On the Spectral and Energy Efficiencies of Full-Duplex Cell-Free Massive MIMO. IEEE Journal on Selected Areas in Communications.
Nguyen, T.-V., Nguyen, V. D., Costa, D. B. D., & An, B. (in press). Hybrid User Pairing for Spectral and Energy Efficiencies in Multiuser MISO-NOMA Networks with SWIPT. IEEE Transactions on Communications.
Paul, S., Su, C., Pang, J., & Mizera, A. (in press). An efficient approach towards the source-target control of Boolean networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Platbrood, L., Capitanescu, F., Merckx, C., Crisciu, H., & Wehenkel, L. (in press). A Generic Approach for Solving Nonlinear-Discrete Security-Constrained Optimal Power Flow Problems in Large-Scale Systems. IEEE Transactions on Power Systems.
Rosich, A., Sarrate, R., & Nejjari, F. (in press). On-line model-based fault detection and isolation for PEM fuel cell stack systems. Applied Mathematical Modelling.
Rossi, A., & Lenzini, G. (in press). Transparency by Design in Data-Informed Research: a Collection of Information Design Patterns. Computer Law and Security Report.
Rossi, A., & Lenzini, G. (in press). Which Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography. Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST). Springer.
Smyth, M., Benyon, D., McCall, R., O'Neill, S., & Carroll, F. (in press). Patterns of Place: An Integrated Approach for the Design and Evaluation of Real and Virtual Environments. In M., Lombard, J., Freeman, W., Ijesslsteijn, & J., Schwaevitz (Eds.), Immersed in Media: Presence Theory, Measurement and Technology (1). London, UK: Springer.
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (in press). Selecting Fault Revealing Mutants. Empirical Software Engineering.
Torre, D., Abualhaija, S., Sabetzadeh, M., Briand, L., Baetens, K., Goes, P., & Forastier, S. (in press). An AI-assisted Approach for Checking the Completeness of Privacy Policies Against GDPR. in Proceedings of the 28th IEEE International Requirements Engineering Conference (RE’20).
Torre, D., Labiche, Y., Genero, M., Elaasar, M., & Menghi, C. (in press). UML Consistency Rules:a Case Study with Open-Source UML Models. Proceedings of the 8th International Conference on Formal Methods in Software Engineering.

2020

Cherenkova, K., Aouada, D., & Gusev, G. (2020, October). PVDeConv: Point-Voxel Deconvolution for Autoencoding CAD Construction in 3D. Paper presented at IEEE International Conference on Image Processing, virtual, virtual.
Alferez, M., Pastore, F., Sabetzadeh, M., Briand, L., & Riccardi, J.-R. (2020). Bridging the Gap between Requirements Modeling and Behavior-driven Development. Proceedings of 22nd IEEE / ACM International Conference on Model Driven Engineering Languages and Systems (MODELS).
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2020). Energy-efficient deployment in wireless edge caching. Wireless Edge Caching: Modeling, Analysis, and Optimization. London, UK: Cambridge University Press.
Heffron, R., Körner, M.-F., Wagner, J., Weibelzahl, M., & Fridgen, G. (2020, July 01). Industrial demand-side flexibility: A key element of a just energy transition and industrial development. Applied Energy.
Ben Abdessalem, R., Panichella, A., Nejati, S., Briand, L., & Stifter, T. (2020). Automated Repair of Feature Interaction Failures in Automated Driving Systems. Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020).
Bezzaoucha, S., & Voos, H. (2020, July). A short Survey on the Cyber Security in Control Systems. Paper presented at International Conference on Event-Based Control Systems, Stockholm, Sweden.
Abualhaija, S., Arora, C., Sabetzadeh, M., Briand, L., & Traynor, M. (2020, June 29). Automated Demarcation of Requirements in Textual Specifications: A Machine Learning-Based Approach. Empirical Software Engineering.
He, J., Kong, L., Frondelius, T., Silven, O., & Juntti, M. (2020, June 19). Decision Triggered Data Transmission and Collection in Industrial Internet of Things. 2020 IEEE Wireless Communications and Networking Conference (WCNC).
Kolbe, N. (2020). A Formal Approach to Ontology Recommendation for Enhanced Interoperability in Open IoT Ecosystems. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Theobald, M., Barnaghi, P., Kubler, S., & Zaslavsky, A.
Cassagnes, C., Trestioreanu, L. A., Joly, C., & State, R. (2020, June 08). The rise of eBPF for non-intrusive performance monitoring. IEEE Xplore, 7.
Boualouache, A., Soua, R., & Engel, T. (2020). Toward an SDN-based Data Collection Scheme for Vehicular Fog Computing. IEEE International Conference on Communications ICC'2020.
Nguyen, V. H., Nguyen, V. D., Dobre, O. A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Shin, O.-S. (2020). A Novel Heap-based Pilot Assignment for Full Duplex Cell-Free Massive MIMO with Zero-Forcing. IEEE International Conference on Communications (pp. 1-6). NJ: Institute of Electrical and Electronics Engineers (IEEE).
Gautam, S., Lagunas, E., Kisseleff, S., Chatzinotas, S., & Ottersten, B. (2020, June). Successive Convex Approximation for Transmit Power Minimization in SWIPT-Multicast Systems. Paper presented at International Conference on Communications (IEEE ICC’20), Dublin, Ireland.
Keogh, J. G., Dube, L., Rejeb, A., Hand, K. J., Khan, N., & Dean, K. (2020). The Future Food Chain: Digitization as an Enabler of Society 5.0. Building the Future of Food Safety Technology, 1st Edition, Blockchain and Beyond. Elsevier.
Keogh, J. G., Rejeb, A., Khan, N., Dean, K., & Hand, K. J. (2020). Blockchain and GS1 Standards in the Food Chain: A Review of the Possibilities and Challenges. Building the Future of Food Safety Technology, 1st Edition, Blockchain and Beyond. Elsevier.
Khan, N., Kchouri, B., Yatoo, N. A., Kräussl, Z., Patel, A., & State, R. (2020, June). Tokenization of Sukuk: Ethereum Case Study. Global Finance Journal.
Soua, R., Palattella, M. R., Stemper, A., & Engel, T. (2020). Enhancing CoAP Group Communication to Support mMTC Over Satellite Networks. IEEE International Conference on Communications (ICC).
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2020). GOING DEEPER WITH NEURAL NETWORKS WITHOUT SKIP CONNECTIONS. IEEE International Conference on Image Processing (ICIP 2020), Abu Dhabi, UAE, Oct 25–28, 2020.
Gautam, S., Krivochiza, J., Haqiqatnejad, A., Chatzinotas, S., & Ottersten, B. (2020, May 29). Boosting SWIPT via Symbol-Level Precoding. Paper presented at 21st IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (IEEE SPAWC 2020), Virtual Conference.
Pastore, F., Micucci, D., Guzman, M., & Mariani, L. (2020, May 29). TkT: Automatic Inference of Timed and Extended Pushdown Automata. IEEE Transactions on Software Engineering.
Wang, C., Pastore, F., Göknil, A., & Briand, L. (2020, May 29). Automatic Generation of Acceptance Test Cases from Use Case Specifications: an NLP-based Approach. IEEE Transactions on Software Engineering.
Vukotic, I. (2020). Formal Framework for Verifying Implementations of Byzantine Fault-Tolerant Protocols Under Various Models. Unpublished doctoral thesis, University of Luxembourg, ​Esch sur Alzette, ​​Luxembourg.
Jury: Esteves-Verissimo, P. (Promotor), Ryan, P. Y. A., Volp, M., Merz, S., Rushby, J., Rahli, V., & Correia, M.
Esteves-Verissimo, P., Decouchant, J., Volp, M., Esfahani, A., & Graczyk, R. (2020). PriLok:Citizen-protecting distributed epidemic tracing. Eprint/Working paper retrieved from https://arxiv.org/abs/2005.04519.
Camino, R. D., Hammerschmidt, C., & State, R. (2020). Minority Class Oversampling for Tabular Data with Deep Generative Models. Eprint/Working paper retrieved from https://arxiv.org/abs/2005.03773.
Nguyen, V. D., Duong, T. Q., & Vien, Q.-T. (2020, May 06). Emerging Techniques and Applications for 5G Networks and Beyond. Mobile Networks and Applications.
Pinto Gouveia, I., Volp, M., & Esteves-Verissimo, P. (2020). Behind the Last Line of Defense -- Surviving SoC Faults and Intrusions. Eprint/Working paper retrieved from https://arxiv.org/abs/2005.04096.
Alves Martins, W., Spano, D., Chatzinotas, S., & Ottersten, B. (2020). 'Faster-than-Nyquist Signaling via Spatiotemporal Symbol-Level Precoding for Multi-User MISO Redundant Transmissions. International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2020), Barcelona 4-8 May 2020.
Boualouache, A., Soua, R., & Engel, T. (2020). SDN-based Misbehavior Detection System for Vehicular Networks. 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring).
Danoy, G., Pang, J., & Sutcliffe. (2020). Proceedings of the 6th Global Conference on Artificial Intelligence (GCAI 2020). 6th Global Conference on Artificial Intelligence. Easychair.
Dias, T., Alves Martins, W., & Biscainho, L. W. (2020). Multichannel Source Separation Using Time-Deconvolutive CNMF. Journal of Communication and Information Systems, 35(1), 103-112.
Fernandes, M. (2020). Reconciling data privacy with sharing in next-generation genomic workflows. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Lagunas, E., Perez-Neira, A., Lagunas, M. A., & Vazquez, M. A. (2020). Transmit Beamforming Design with Received-Interference Power Constraints: The Zero-Forcing Relaxation. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), Barcelona, Spain, May 2020.
Lei, L., Lagunas, E., Yuan, Y., Kibria, M., Chatzinotas, S., & Ottersten, B. (2020). Deep Learning for Beam Hopping in Multibeam Satellite Systems. IEEE 91st Vehicular Technology Conference (VTC2020-Spring).
Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. 42nd ACM/IEEE International Conference on Software Engineering (ICSE).
Mahon, S., Varrette, S., Plugaru, V., Pinel, F., & Bouvry, P. (2020). Performance Analysis of Distributed and Scalable Deep Learning. 20th IEEE/ACM Intl. Symp. on Cluster, Cloud and Internet Computing (CCGrid'20) (pp. 760--766). Melbourne, Australia: IEEE/ACM.
Shin, S. Y., Nejati, S., Sabetzadeh, M., Briand, L., Arora, C., & Zimmer, F. (2020). Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach. Proceedings of the 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'20).
Vu, T. X., Trinh, A. V., Chatzinotas, S., & Tran, X. N. (2020, May). Cache-aided full-duplex: Delivery time analysis and optimization. Wireless Networks.
Kolbe, N., Vandenbussche, P.-Y., Kubler, S., & Le Traon, Y. (2020). LOVBench: Ontology Ranking Benchmark. Proceedings of The Web Conference 2020 (WWW '20).
Soltana, G., Sabetzadeh, M., & Briand, L. (2020). Practical Constraint Solving for Generating System Test Data. ACM Transactions on Software Engineering and Methodology, 29(2), 11:1-11:48.
Ostrev, D. (2020). Deniable encryption, authentication, and key exchange. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/42816.
Drasch, B. J., Fridgen, G., Manner-Romberg, T., Nolting, F. M., & Radszuwill, S. (2020, March 13). The token’s secret: the two-faced financial incentive of the token economy. Electronic Markets.
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2020). Robust SINR-Constrained Symbol-Level Multiuser Precoding With Imperfect Channel Knowledge. IEEE Transactions on Signal Processing, 68(1), 1837-1852.
Korrai, P., Lagunas, E., Sharma, S. K., Bandi, A., Chatzinotas, S., & Ottersten, B. (2020, March 03). A RAN Resource Slicing Mechanism for Multiplexing of eMBB and URLLC Services in OFDMA based 5G Wireless Networks. IEEE Access.
Bui, V.-P., Nguyen, V. D., Nguyen, H., Dobre, O., & Shin, O. S. (2020). Optimization of Rate Fairness in Multi-Pair Wireless-Powered Relaying System. IEEE Communications Letters, 24(03), 603 - 607.
Oyedotun, O., Aouada, D., & Ottersten, B. (2020). Structured Compression of Deep Neural Networks with Debiased Elastic Group LASSO. IEEE 2020 Winter Conference on Applications of Computer Vision (WACV 20), Aspen, Colorado, US, March 2–5, 2020.
Ai, Y., Mathur, A., Kong, L., & Cheffena, M. (2020, March). Effective Throughput Analysis of α-η-κ-μ Fading Channels. IEEE Access, 57363-57371.
Lagunas, E., Tsinos, C., Sharma, S. K., & Chatzinotas, S. (2020, March). 5G Cellular and Fixed Satellite Service Spectrum Coexistence in C-Band. IEEE Access.
Mai, X. P., Pastore, F., Goknil, A., & Briand, L. (2020). Metamorphic Security Testing for Web Systems. IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020. IEEE.
Sharma, S. K., Woungang, I., Anpalagan, A., & Chatzinotas, S. (2020, March). Towards Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues and Future Directions. IEEE Access.
Esmaeilzadeh Dilmaghani, S., Brust, M. R., Danoy, G., Cassagnes, N., Pecero, J., & Bouvry, P. (2020). Privacy and Security of Big Data in AI Systems:A Research and Standards Perspective. 2019 IEEE International Conference on Big Data (Big Data), 9-12 December 2019. IEEE.
Castillo Lopez, M., Ludivig, P., Sajadi-Alamdari, S. A., Sanchez Lopez, J. L., Olivares Mendez, M. A., & Voos, H. (2020). A Real-Time Approach for Chance-Constrained Motion Planning with Dynamic Obstacles. IEEE Robotics and Automation Letters, 5(2), 3620 - 3625.
Antoniadis, N., Cordy, M., Sifaleras, A., & Le Traon, Y. (2020). Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach. Communications in Computer and Information Science (pp. 269-281). Springer, Cham.
Gautam, S. (2020). DESIGN AND OPTIMIZATION OF SIMULTANEOUS WIRELESS INFORMATION AND POWER TRANSFER SYSTEMS. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor), Ottersten, B. (Promotor), Olivares Mendez, M. A., Vandendorpe, L., & Clerckx, B.
Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2020). Identifying Unintended Harms of Cybersecurity Measures. Proceedings of ECRIME 2019. Institute of Electrical and Electronics Engineers.
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. (2020). Exploring the Monero Peer-to-Peer Network. In T., Cao, J., Yu, J., Decouchant, X., Luo, & P., Verissimo, Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020.
Hao, Y., Jiao, L., Li, C., Meier, W., Todo, Y., & Wang, Q. (2020, February). Links between Division Property and Other Cube Attack Variants. IACR Transactions on Symmetric Cryptology, (1).
Hu, K., Wang, Q., & Wang, M. (2020, February). Finding Bit-Based Division Property for Ciphers with Complex Linear Layers. IACR Transactions on Symmetric Cryptology, (1).
Pinel, F., Yin, J.-X., Hundt, C., Kieffer, E., Varrette, S., Bouvry, P., & See, S. (2020, February). Evolving a Deep Neural Network Training Time Estimator. Communications in Computer and Information Science.
Rossi, A., & Lenzini, G. (2020). Making the Case for Evidence-based Standardization of Data Privacy and Data Protection Visual Indicators. Journal of Open Access to Law (JOAL), 8(1).
Shabayek, A. E. R., Aouada, D., Cherenkova, K., & Gusev, G. (2020). Towards Automatic CAD Modeling from 3D Scan Sketch based Representation. Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2020), GRAPP (pp. 392-398).
Symeonidis, I., & Lenzini, G. (2020). Systematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging. International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2020). An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving. IEEE Transactions on Software Engineering, 46(2), 163--195.
Zollinger, M.-L., Roenne, P., & Ryan, P. (2020). Short paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme. International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting.
Ibrahim, A. A. Z. A. (2020). PERFORMANCE EVALUATION AND MODELLING OF SAAS WEB SERVICES IN THE CLOUD. Unpublished doctoral thesis, University of Luxembourg, ​Esch-sur-Alzette, ​​Luxembourg.
Jury: Bouvry, P. (Promotor), Sorger, U., Varrette, S., Kliazovich, D., & EL-Ghazali, T.
Robinet, F., Demeules, A., Frank, R., Varisteas, G., & Hundt, C. (2020, January 10). Leveraging Privileged Information to Limit Distraction in End-to-End Lane Following. 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).
Trestioreanu, L. A., Cassagnes, C., & State, R. (2020). Deep dive into Interledger: Understanding the Interledger ecosystem - Part 4. Luxembourg, Luxembourg.
Jafarnejad, S. (2020). Machine Learning-based Methods for Driver Identification and Behavior Assessment: Applications for CAN and Floating Car Data. Unpublished doctoral thesis, University of Luxembourg, ​Esch-sur-Alzette, ​​Luxembourg.
Jury: Engel, T. (Promotor), Viti, F., Castignani, G., Wahlström, J., & Fiore, M.
Yakubov, A., Shbair, W., Khan, N., State, R., Medinger, C., & Hilger, J. (2020). BlockPGP: A Blockchain-based Framework for PGP Key Servers. International Journal of Networking and Computing, 10(1), 1-24.
Tsinos, C., Chatzinotas, S., & Ottersten, B. (2020, January 01). Hybrid Analog-Digital Transceiver Designs for Multi-User MIMO mmWave Cognitive Radio Systems. IEEE Transactions on Cognitive Communications and Networking.
Tsinos, C., Domouchtsidis, S., Chatzinotas, S., & Ottersten, B. (2020, January 01). Symbol Level Precoding with Low Resolution DACs for Constant Envelope OFDM MU-MIMO Systems. IEEE Access.
Hao, Y., Leander, G., Meier, W., Todo, Y., & Wang, Q. (2020). Modeling for Three-Subset Division Property without Unknown Subset and Improved Cube Attacks. 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Croatia 10-14 May 2020.
PATWARY, M., NAWAZ, S. J., RAHMAN, M. A., Sharma, S. K., RASHID, M. M., & BARNES, S. (2020, January). The Potential Short- and Long-Term Disruptions and Transformative Impacts of 5G and Beyond Wireless Networks: Lessons Learnt from the Development of a 5G Testbed Environment. IEEE Access.
Rossi, A., & Palmirani, M. (2020). What's in an Icon? Promises and Pitfalls of Data Protection Iconography. In R., Leenes, D., Hallinan, S., Gutwirth, & P., de Hert (Eds.), Data Protection and Privacy: Data Protection and Democracy (pp. 59 - 92). Oxford: Hart Publishing.
Turcanu, I., Salvo, P., Baiocchi, A., Cuomo, F., & Engel, T. (2020, January). A Multi-Hop Broadcast Wave Approach for Floating Car Data Collection in Vehicular Networks. Vehicular Communications.
Udovenko, A. (2020). Optimized Collision Search for STARK-Friendly Hash Challenge Candidates. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/42379.
Bettaieb, S., Shin, S. Y., Sabetzadeh, M., Briand, L., Garceau, M., & Meyers, A. (2020). Using Machine Learning to Assist with the Selection of Security Controls During Security Assessment. Empirical Software Engineering, 25(4), 2550–2582.
Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., & Trujillo Rasua, R. (2020). Attribute evaluation on attack trees with incomplete information. Computers and Security, 88(101630).
Chiara, P. G. (2020). Security and Privacy in Resource-Constrained Devices. CEUR Workshop Proceedings, 2598, 1-11.
Cornejo Olivares, O. E., Briola, D., Micucci, D., & Mariani, L. (2020). In-The-Field Monitoring of Functional Calls: Is It Feasible? Journal of Systems and Software, 110523.
Damodaran, A. S. S., & Rial, A. (2020). UC Updatable Databases and Applications. 12th International Conference on Cryptology.
Damodaran, A. S. S., & Rial, A. (2020). Unlinkable Updatable Databases and Oblivious Transfer with Access Control. 25th Australasian Conference on Information Security and Privacy.
Ferreira Torres, C., Steichen, M., Norvill, R., Fiz Pontiveros, B., Jonker, H., & Mauw, S. (2020). ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), October 5–9, 2020, Taipei, Taiwan.
Ferreira Torres, C., Steichen, M., & State, R. (2020). Towards Usable Protection Against Honeypots. IEEE International Conference on Blockchain and Cryptocurrency, Toronto, Canada 3-6 May 2020.
Gadyatskaya, O., & Mauw, S. (2020). Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (pp. 7-19). Springer.
Gao, J., li, L., Bissyande, T. F. D. A., & Klein, J. (2020). Understanding the Evolution of Android App Vulnerabilities. IEEE Transactions on Reliability.
Gaudín, A., Madruga, G., Rodríguez, C., Iturriaga, S., Nesmachnow, S., Paz, C., Danoy, G., Bouvry, P., Crespo-Mariño, J. L., & Meneses-Rojas, E. (2020). Autonomous Flight of Unmanned Aerial Vehicles Using Evolutionary Algorithms. High Performance Computing (pp. 337--352). Cham: Springer International Publishing.
Genç, Z. A., & Lenzini, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress.
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2020). Adversarial Embedding: A robust and elusive Steganography and Watermarking technique. Paper presented at IEEE Symposium on Security and Privacy.
Ghamizi, S., Rwemalika, R., Cordy, M., Le Traon, Y., & Papadakis, M. (2020). Pandemic Simulation and Forecasting of exit strategies:Convergence of Machine Learning and EpidemiologicalModels. University of Luxembourg.
Ghorbel, E., Demisse, G., Aouada, D., & Ottersten, B. (2020). Fast Adaptive Reparametrization (FAR) with Application to Human Action Recognition. IEEE Signal Processing Letters.
Guggenmos, F., Lockl, J., Rieger, A., & Fridgen, G. (2020). How to Develop a GDPR-Compliant Blockchain Solution for Cross-Organizational Workflow Management: Evidence from the German Asylum Procedure. Proceedings of the Hawaii International Conference on System Sciences 2020.
Haqiqatnejad, A., Shahbazpanahi, S., & Ottersten, B. (2020). A Worst-Case Performance Optimization Based Design Approach to Robust Symbol-Level Precoding for Downlink MU-MIMO. IEEE Global Conference on Signal and Information Processing (GlobalSIP), Ottawa 11-14 November 2019. IEEE.
He, J., Wymeersch, H., Kong, L., Silven, O., & Juntti, M. (2020). Large Intelligent Surface for Positioning in Millimeter Wave MIMO Systems. 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring).
Khan, N., & Nassar, M. (2020). A Look into Privacy-Preserving Blockchains. IEEE BCA @AICCSA 2019 - Workshop on Blockchain and it's Applications.
Lagraa, S., & State, R. (2020). Process mining-based approach for investigating malicious login events. EEE/IFIP Network Operations and Management Symposium.
Li, A., Spano, D., Krivochiza, J., Domouchtsidis, S., Tsinos, C., Masouros, C., Chatzinotas, S., Li, Y., Vucetic, B., & Ottersten, B. (2020). Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions. IEEE Communications Surveys and Tutorials, 22(2), 796-839.
Mai, X. P., Göknil, A., Pastore, F., & Briand, L. (2020). SMRL: A Metamorphic Security Testing Tool for Web Systems. 2020 IEEE/ACM 42nd International Conference on Software Engineering.
Menghi, C., Nejati, S., Briand, L., & Yago, I. P. (2020). Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification. Proceedings of the 42nd International Conference on Software Engineering.
Pang, J., & Zhang, C. (2020). Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018). Science of Computer Programming, 187, 102375.
Papadopoulos, K., Ghorbel, E., Oyedotun, O., Aouada, D., & Ottersten, B. (2020). DeepVI: A Novel Framework for Learning Deep View-Invariant Human Action Representations using a Single RGB Camera. IEEE International Conference on Automatic Face and Gesture Recognition, Buenos Aires 18-22 May 2020.
Roenne, P., Atashpendar, A., Kristian, G., & Ryan, P. (2020). Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC. Springer.
Samir, A., El Ioini, N., Fronza, I., Hamid, R. B., Van, L., & Pahl, C. (2020). Anomaly Detection and Analysis for Reliability Management Clustered Container Architectures. International Journal on Advances in Systems and Measurements, 12(3\&4), 247--264.
Sleimi, A., Ceci, M., Sabetzadeh, M., Briand, L., & Dann, J. (2020). Automated Recommendation of Templates for Legal Requirements. Proceedings of the 28th IEEE International Requirements Engineering Conference (RE'20).
Spagnuelo, D., Bartolini, C., & Lenzini, G. (2020). Qualifying and Measuring Transparency: A Medical Data System Case Study. Computers and Security.
Stojkovski, B., & Lenzini, G. (2020). Evaluating ambiguity of privacy indicators in a secure email app. In M., Loreti & L., Spalazzi (Eds.), Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (pp. 223--234). CEUR-WS.org.
Sun, Z., Zhang, J., Harman, M., Papadakis, M., & Zhang, L. (2020). Automatic Testing and Improvement of Machine Translation. International Conference on Software Engineering (ICSE).
Tato, A., Andrenacci, S., Lagunas, E., Chatzinotas, S., & Mosquera, C. (2020). Link Adaptation and SINR errors in Practical Multicast Multibeam Satellite Systems with Linear Precoding. International Journal of Satellite Communications and Networking.
Tessaro Lunardi, W., Birgin, E. G., Ronconi, D. P., & Voos, H. (2020). Metaheuristics for the Online Printing Shop Scheduling Problem - Supplementary Material.
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (2020). Selecting fault revealing mutants. Empirical Software Engineering.
Ul Haq, F., Shin, D., Nejati, S., & Briand, L. (2020). Comparing Offline and Online Testing of Deep Neural Networks: An Autonomous Car Case Study. 13th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020. IEEE.
Vazquez Sandoval, I., Atashpendar, A., & Lenzini, G. (2020). Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets. Proceedings of the 17th International Joint Conference on e-Business and Telecommunications.
Vu, T. X., Chatzinotas, S., Ottersten, B., & Trinh, A. V. (2020). Full-Duplex Enabled Mobile Edge Caching: From Distributed to Cooperative Caching. IEEE Transactions on Wireless Communications.
Vu, T. X., Chatzinotas, S., ShahbazPanahi, S., & Ottersten, B. (2020). Joint Power Allocation and Access Point Selection for Cell-free Massive MIMO. IEEE International Conference on Communications.
Vu, T. X., Poirier, Y., Chatzinotas, S., Maturo, N., Grotz, J., & Roelens, F. (2020). Modeling and Implementation of 5G Edge Caching over Satellite. International Journal of Satellite Communications and Networking.

2019

Amalio, N., Briand, L., & Kelsen, P. (2019, December 28). An experimental scrutiny of visual design modelling: VCL up against UML+OCL. Empirical Software Engineering.
Liu, K. (2019). Deep Pattern Mining for Program Repair. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Bissyande, T. F. D. A., Kim, D., Klein, J., Zeller, A., & Lo, D.
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (2019, December 18). Selecting fault revealing mutants. Empirical Software Engineering, 1-54.
Querol Borras, J., Perez, A., & Camps, A. (2019). A Review of RFI Mitigation Techniques in Microwave Radiometry. Remote Sensing, 11(24), 3042.
Sedighi, S., Mishra, K. V., Shankar, B., & Ottersten, B. (2019). Localization Performance of 1-Bit Passive Radars in NB-IoT Applications. In S., Sedighi, K. V., Mishra, B., Shankar, & B., Ottersten, Localization Performance of 1-Bit Passive Radars in NB-IoT Applications. CA, USA: IEEE.
Kibria, M., Lagunas, E., Maturo, N., Spano, D., Al-Hraishawi, H., & Chatzinotas, S. (2019). Carrier Aggregation in Multi-Beam High Throughput Satellite Systems. Carrier Aggregation in Multi-Beam High Throughput Satellite Systems.
van Dam, T., & Francis, O. (2019, December 10). Absolute Gravity and Uplift in the Yellowstone Caldera. Paper presented at American Geophysical Union Fall Meeting 2019, San Francisco, USA.
Bandi, A., Shankar, B., Chatzinotas, S., & Ottersten, B. (2019). Joint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications. In A., Bandi, B., Shankar, S., Chatzinotas, & B., Ottersten, Joint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications. Waikoloa, Hawaii (HI): IEEE.
Iannillo, A. K., Cotroneo, D., Natella, R., & Rosiello, S. (2019, December 05). Dependability Assessment of the Android OS Through Fault Injection. IEEE Transaction on Reliability.
Changaival, B. (2019). Graph-based Algorithms for Smart Mobility Planning and Large-scale Network Discovery. Unpublished doctoral thesis, University of Luxembourg, ​Esch-sur-Alzette, ​​Luxembourg.
Jury: Bouvry, P. (Promotor), Sorger, U., Guinand, F., Danoy, G., & Lavangnananda, K.
Kaushik, A., Tsinos, C., Vlachos, E., & Thompson, J. (2019, December 01). Energy Efficient Bit Allocation and Hybrid Combining for Millimeter Wave MIMO Systems. GLOBECOM.
Adel Musallam, M., Baptista, R., Al Ismaeil, K., & Aouada, D. (2019). Temporal 3D Human Pose Estimation for Action Recognition from Arbitrary Viewpoints. 6th Annual Conf. on Computational Science & Computational Intelligence, Las Vegas 5-7 December 2019. Conference Publishing Services.
Bartolini, C., Lenzini, G., & Robaldo, L. (2019). The DAta Protection REgulation COmpliance Model. IEEE Security and Privacy, 17(6), 37-45.
Cheng, H., Dinu, D.-D., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things. In M., Laurent & T., Giannetsos (Eds.), Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 103-119). Springer Verlag.
Cordy, M., & Legay, A. (2019). Verification and abstraction of real-time variability-intensive systems. International Journal on Software Tools for Technology Transfer, 21(6), 635-649.
Damodaran, A. S. S., Dubovitskaya, M., & Rial, A. (2019). UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing. Progress in Cryptology – INDOCRYPT 2019 (pp. 273-296).
Gautam, S., Lagunas, E., Bandi, A., Chatzinotas, S., Sharma, S. K., Vu, T. X., Kisseleff, S., & Ottersten, B. (2019, December). Multigroup Multicast Precoding for Energy Optimization in SWIPT Systems with Heterogeneous Users. IEEE Communications Society Magazine.
Gil-Pons, R., Ramirez Cruz, Y., Trujillo-Rasua, R., & Yero, I. G. (2019). Distance-based vertex identification in graphs: The outer multiset dimension. Applied Mathematics and Computation, 363, 124612.
Jan, S., Panichella, A., Arcuri, A., & Briand, L. (2019). Search-based Multi-Vulnerability Testing of XML Injections in Web Applications. Empirical Software Engineering, 24(6), 3696–3729.
Mayouche, A., Spano, D., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2019, December). Machine learning for physical-layer security: Attacks and SLP Countermeasures for Multiantenna Downlink Systems. 2019 IEEE Global Communications Conference.
Varrette, S., Pinel, F., Kieffer, E., Danoy, G., & Bouvry, P. (2019). Automatic Software Tuning of Parallel Programs for Energy-Aware Executions. Proc. of 13th Intl. Conf. on Parallel Processing and Applied Mathematics (PPAM 2019). Bialystok, Poland: Springer Verlag.
Varrette, S., & Sulaiman, I. F. (2019). EU-ASEAN High Performance Computing (HPC) Study Expert Mapping of ASEAN policy orientations and related HPC research infrastructures. European Union - Enhanced Regional EU-ASEAN Dialogue Instrument" (E-READI).
Wang, M., & Voos, H. (2019). Safer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments. Safer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments.
Mouline, L. (2019). TOWARDS A MODELLING FRAMEWORK WITH TEMPORAL AND UNCERTAIN DATA FOR ADAPTIVE SYSTEMS. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Barais, O. (Promotor), Navet, N., Wimmer, M., Collet, P., & Bourcier, J.
Cimarelli, C., Cazzato, D., Olivares Mendez, M. A., & Voos, H. (2019). A case study on the impact of masking moving objects on the camera pose regression with CNNs. 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (pp. 1--8).
Beierle, C., Biryukov, A., & Udovenko, A. (2019, November 19). On degree-d zero-sum sets of full rank. Cryptography and Communications, 1-26.
Beunardeau, M., El Orche, F. E., Maimut, D., Naccache, D., Roenne, P., & Ryan, P. (2019). Authenticated Key Distribution: When the Coupon Collector is Your Enemy. Innovative Security Solutions for Information Technology and Communications. Springer.
de La Cadena Ramos, A. W., Mitseva, A., Pennekamp, J., Hiller, J., Lanze, F., Engel, T., Wehrle, K., & Panchenko, A. (2019, November 11). POSTER: Traffic Splitting to Counter Website Fingerprinting. Poster session presented at 26th ACM Conference on Computer and Communications Security (CCS '19), London, United Kingdom.
Huang, Q., Lin, M., Zhu, W.-P., Chatzinotas, S., & Alouini, M.-S. (2019, November 11). Performance Analysis of Integrated Satellite-Terrestrial Multiantenna Relay Networks with Multiuser Scheduling. IEEE Transactions on Aerospace and Electronic Systems, 1-1.
Mauw, S., Smith, Z. D., Trujillo Rasua, R., & Toro Pozo, J. L. (2019). Post-collusion security and distance bounding. Post-collusion security and distance bounding.
Bommaraveni, S., Vu, T., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2019, November 03). Active Content Popularity Learning via Query-by-Committee for Edge Caching. Paper presented at The 53ND ANNUAL ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, Nov. 2019, Asilomar Hotel and Conference Ground, Pacific Grove, California, USA.
Samir Labib, N., Danoy, G., Musial, J., Brust, M. R., & Bouvry, P. (2019). Internet of Unmanned Aerial Vehicles—A Multilayer Low-Altitude Airspace Model for Distributed UAV Traffic Management. Sensors, 19(21), 22.
Sedighi, S., Shankar, B., Mishra, K. V., & Ottersten, B. (2019). Optimum Design for Sparse FDA-MIMO Automotive Radar. In S., Sedighi, B., Shankar, K. V., Mishra, & B., Ottersten, Optimum Design for Sparse FDA-MIMO Automotive Radar. CA, USA: IEEE.
Tran Dinh, H., Vu, T. X., Chatzinotas, S., & Ottersten, B. (2019, November 03). Energy-efficient Trajectory Design for UAV-enabled Wireless Communications with Latency Constraints. Paper presented at THE 53ND ANNUAL ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, NOV. 2019, Asilomar Hotel and Conference Grounds, Pacific Grove, California, USA.
Menghi, C., Spoletini, P., Chechik, M., & Ghezzi, C. (2019). A verification-driven framework for iterative design of controllers. Formal Aspects of Computing, 31, 459-502.
Merlano Duncan, J. C., Querol Borras, J., Maturo, N., Krivochiza, J., Spano, D., Norshahida, S., Martinez Marrero, L., Chatzinotas, S., & Ottersten, B. (2019, November 01). Hardware Precoding Demonstration in Multi-Beam UHTS Communications under Realistic Payload Characteristics. Proceedings of the 37th International Communications Satellite Systems Conference.
Biryukov, A., Feher, D., & Vitto, G. (2019). Privacy Aspects and Subliminal Channels in Zcash. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Securit.
Dumas, J.-G., Lafourcade, P., Tichit, A., & Varrette, S. (2019). Les blockchains en 50 questions: comprendre le fonctionnement et les enjeux de cette technologie innovante (2eme). Dunod.
Kang, H. J., Bissyande, T. F. D. A., & David, L. (2019). Assessing the Generalizability of code2vec Token Embeddings. Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (pp. 1-12).
Khan, N., Ahmad, T., & State, R. (2019). Feasibility of Stellar as a Blockchain-based Micropayment System. Springer SmartBlock 2019 - 2nd International Conference on Smart Blockchain. Springer.
Kisseleff, S., Maturo, N., Chatzinotas, S., Fanebust, H., Rislow, B., Kansanen, K., Arzel, M., & Haugli, H. C. (2019). User Terminal Wideband Modem for Very High Throughput Satellites. 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019.
Kisseleff, S., Shankar, B., Spano, D., & Gayrard, J.-D. (2019). A New Optimization Tool for Mega-Constellation Design and its Application to Trunking Systems. 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019.
Montori, F., Cortesi, E., Bedogni, L., Capponi, A., Fiandrino, C., & Bononi, L. (2019). CrowdSenSim 2.0: a Stateful Simulation Platform for Mobile Crowdsensing in Smart Cities. MSWIM '19: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami Beach, FL, USA, 2019. New York, NY: Association for Computing Machinery.
Rahimi, R., Shahbazpanahi, S., & Ottersten, B. (2019). Characterization of the MSE Region under a Total Power Budget for Asynchronous Two-Way Relay Networks. The Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, 3-6 November 2019.
Samir Labib, N., Danoy, G., Musial, J., Brust, M. R., & Bouvry, P. (2019). A Multilayer Low-Altitude Airspace Model for UAV Traffic Management. In N., Samir Labib, G., Danoy, J., Musial, M. R., Brust, & P., Bouvry, 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (pp. 57-63). ACM.
Sánchez, C., Schneider, G., Ahrendt, W., Bartocci, E., Bianculli, D., Colombo, C., Falcone, Y., Francalanza, A., Krstic, S., Lourenço, J., Nickovic, D., Pace, G. J., Rufino, J., Signoles, J., Traytel, D., & Weiss, A. (2019). A Survey of Challenges for Runtime Verification from Advanced Application Domains (Beyond Software). Formal Methods in System Design, 54(3), 279-335.
Seredynski, M., & Viti, F. (2019, November). Towards Dynamic Zero Emission Zone Management for Plug-in Hybrid Buses. Paper presented at ITS World Congress.
Boualouache, A., Soua, R., & Engel, T. (2019). VPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks. 38th IEEE International Performance Computing and Communications Conference (IPCCC).
Charlier, J. H. J. (2019). From Persistent Homology to Reinforcement Learning with Applications for Retail Banking. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: State, R. (Promotor), Gurbani, V. (Promotor), Ottersten, B., Aouada, D., & Hilger, J.
Fernandes, M., Decouchant, J., Volp, M., M. Couto, F., & Verissimo, P. (2019, October 22). Privacy-Preserving Processing of Filtered DNA Reads. Paper presented at ​​6th International Workshop on ​Genome Privacy and Security.
Du, M. (2019). Towards Optimal Real-Time Bidding Strategies for Display Advertising. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: State, R. (Promotor), Ottersten, B., Gurbani, V., Brorsson, M. H., & Valtchev, P.
Fotiadis, G., & Konstantinou, E. (2019). TNFS Resistant Families of Pairing-Friendly Elliptic Curves. Theoretical Computer Science, 800, 73-89.
Lenzini, G., & Petrocchi, M. (2019). Modelling of Railways Signalling System Requirements by Controlled Natural Languages: A Case Study. From Software Engineering to Formal Methods and Tools, and Back (pp. 502-518). Springer, Cham.
Natoli, C., Yu, J., Gramoli, V., & Verissimo, P. (2019). Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure. Eprint/Working paper retrieved from https://arxiv.org/pdf/1908.08316.pdf.
Tawakuli, A., Kaiser, D., & Engel, T. (2019, October 08). Big Automotive Data Preprocessing: A Three Stages Approach. Poster session presented at ACM Computer Science in Cars Symposium.
Rinaldi, G., Adamsky, F., Soua, R., Baiocchi, A., & Engel, T. (2019). Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection. 10th International Conference on Networks of the Future (NoF).
Camino, R. D., Ferreira Torres, C., Baden, M., & State, R. (2019). A Data Science Approach for Honeypot Detection in Ethereum. Eprint/Working paper retrieved from https://arxiv.org/abs/1910.01449.
Otberdout, N., Kacem, A., Daoudi, M., Ballihi, L., & Berreti, S. (2019, October 03). Automatic Analysis of Facial Expressions Based on Deep Covariance Trajectories. IEEE Transactions on Neural Networks and Learning Systems.
Bezzaoucha, S., & Voos, H. (2019). On the Event-based Attack-tolerant Control: A Polytopic Representation. In S., Bezzaoucha, International Conference on Automation, Control and Robots.
Bezzaoucha, S., & Voos, H. (2019). Simultaneous State and False-Data Injection Attacks Reconstruction for NonLinear Systems: an LPV Approach. In S., Bezzaoucha, International Conference on Automation, Control and Robots.
Boualouache, A., Soua, R., & Engel, T. (2019). SDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks. 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19).
Decouchant, J., Boutet, A., Yu, J., & Verissimo, P. (2019, October). P3LS : Plausible Deniability for Practical Privacy-Preserving Live Streaming. Paper presented at 38th International Symposium on Reliable Distributed Systems (SRDS 2019).
Martinez Marrero, L., Merlano Duncan, J. C., Querol, J., Chatzinotas, S., Camps Carmona, A. J., & Ottersten, B. (2019, October). EFFECTS OF MULTIPLE OSCILLATOR PHASE NOISE IN PRECODING PERFORMANCE. Paper presented at 37th International Communications Satellite Systems Conference (ICSSC2019), Okinawa, Japan.
Oumaziz, M., Falleri, J.-R., Blanc, X., Bissyande, T. F. D. A., & Klein, J. (2019). Handling duplicates in Dockerfiles families: Learning from experts. 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 524-535). IEEE.
Rivera, S., Lagraa, S., Iannillo, A. K., & State, R. (2019, October). Auto-encoding Robot State against Sensor Spoofing Attacks. International Symposium on Software Reliability Engineering.
Samir Labib, N., Brust, M. R., Danoy, G., & Bouvry, P. (2019). Trustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and Privacy. In N., Samir Labib, M. R., Brust, G., Danoy, & P., Bouvry, Trustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and Privacy (pp. 1-7). IEEE.
Zollinger, M.-L., Distler, V., Roenne, P., Ryan, P., Lallemand, C., & Koenig, V. (2019). User Experience Design for E-Voting: How mental models align with security mechanisms. Electronic Voting.
Bandi, A., Shankar, B., Chatzinotas, S., & Ottersten, B. (2019, September 30). A Joint Solution for Scheduling and Precoding in Multiuser MISO Downlink Channels. IEEE Transactions on Wireless Communications.
Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). An industrial study on the differences between pre-release and post-release bugs. Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (pp. 11). IEEE.
Querol Borras, J., Perez, A., Munoz-Martin, J. F., & Camps, A. (2019, September 26). Real-time Radio Frequency Interference Detection and Mitigation with the Front-End GNSS Interference eXcisor (FENIX). Paper presented at RFI 2019 Coexisting with Radio Frequency Interference, Toulouse, France.
Di Maio, A., Palattella, M. R., & Engel, T. (2019). Performance Analysis of MANET Routing Protocols in Urban VANETs. Lecture Notes in Computer Science (volume 11803). Springer.
Di Maio, A., Palattella, M. R., & Engel, T. (2019). Multi-flow congestion-aware routing in software-defined vehicular networks. 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) Proceedings.
Saint, A. F. A., Shabayek, A. E. R., Cherenkova, K., Gusev, G., Aouada, D., & Ottersten, B. (2019). BODYFITR: Robust Automatic 3D Human Body Fitting. Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP). IEEE.
Steichen, M. (2019). Access Control Mechanisms Reconsidered with Blockchain Technologies. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: State, R. (Promotor).
Titcheu Chekam, T. (2019). Assessment and Improvement of the Practical Use of Mutation for Automated Software Testing. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J., Papadakis, M., Demeyer, S., & Tonella, P.
Mostaani, A., Simeone, O., Chatzinotas, S., & Ottersten, B. (2019). Learning-based Physical Layer Communications for Multiagent Collaboration. In A., Mostaani, O., Simeone, S., Chatzinotas, & B., Ottersten, PIMRC 2019 Proceedings. Istanbul, Turkey: IEEE.
Pejo, B. (2019). Integrity and Confidentiality Problems of Outsourcing. Unpublished doctoral thesis, University of Luxembourg, ​Esch/Alzette, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Le Traon, Y., Tang, Q., Claudia, D., & Melek, O.
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2019, September 05). Wireless Multi-group Multicast Precoding with Selective RF Energy Harvesting. Paper presented at 27th European Signal Processing Conference (EUSIPCO’19), A Coruña, Spain.
Alves Martins, W., Cruz-Roldán, F., Moonen, M., & Diniz, P. (2019). Intersymbol and Intercarrier Interference in OFDM Transmissions Through Highly Dispersive Channels. Proc. of the 27th European Signal Processing Conference (EUSIPCO-2019) (pp. 1-5).
Biryukov, A., & García-Alfaro. (2019). Cryptocurrencies and Blockchain Technology. Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops (Lecture Notes in Computer Science 11737, pp. 173 - 400). Springer.
Charlier, J. H. J., Ormazabal, G., State, R., & Hilger, J. (2019, September). MQLV: Optimal Policy of Money Management in Retail Banking with Q-Learning. Proceedings of the Fourth Workshop on MIning DAta for financial applicationS (MIDAS 2019) co-located with the 2019 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2019).
Charlier, J. H. J., Petit, F., Ormazabal, G., State, R., & Hilger, J. (2019, September). Visualization of AE's Training on Credit Card Transactions with Persistent Homology. Proceedings of the International Workshop on Applications of Topological Data Analysis In conjunction with ECML PKDD 2019.
Cordy, M., & Lazreg, S. (2019). Automated evaluation of embedded-system design alternatives. Proceedings of the 23rd International Systems and Software Product Line Conference, SPLC 2019, Volume A, Paris, France, September 9-13, 2019 (pp. 52:1).
Dias, T., Biscainho, L. W., & Alves Martins, W. (2019). Time-Deconvolutive CNMF for Multichannel Blind Source Separation. Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (pp. 1-5).
Iqbal, M. Z., Sartaj, H., khan, M. U., Ul Haq, F., & Qaisar, I. (2019, September). A Model-Based Testing Approach for Cockpit Display Systems of Avionics. International Conference on Model Driven Engineering Languages and Systems.
Lei, L., Vu, T. X., Xiang, L., Zhang, X., Chatzinotas, S., & Ottersten, B. (2019). Optimal Resource Allocation for NOMA-Enabled Cache Replacement and Content Delivery. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2019).
Lei, L., You, L., He, Q., Vu, T. X., Chatzinotas, S., Yuan, D., & Ottersten, B. (2019, September). Learning-Assisted Optimization for Energy-Efficient Scheduling in Deadline-Aware NOMA Systems. IEEE Transactions on Green Communications and Networking.
Lei, L., You, L., Yang, Y., Yuan, D., Chatzinotas, S., & Ottersten, B. (2019, September). Load Coupling and Energy Optimization in Multi-Cell and Multi-Carrier NOMA Networks. IEEE Transactions on Vehicular Technology.
Lewenfus, G., Alves Martins, W., Chatzinotas, S., & Ottersten, B. (2019). On the Use of Vertex-Frequency Analysis for Anomaly Detection in Graph Signals. Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (pp. 1-5).
Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2019). Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior. IEEE Transactions on Software Engineering, 45(9), 919-944.
Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2019). Robust active attacks on social graphs. Data Mining and Knowledge Discovery, 33(5), 1357-1392.
Mishra, K. V., Shankar, B., Koivunen, V., Ottersten, B., & Vorobyov, S. (2019). Toward Millimeter-Wave Joint Radar Communications: A Signal Processing Perspective. IEEE Signal Processing Magazine, 36(5), 100-114.
Torre, D., Soltana, G., Sabetzadeh, M., Briand, L., Auffinger, Y., & Goes, P. (2019). Using Models to Enable Compliance Checking against the GDPR: An Experience Report. Proceedings of the IEEE / ACM 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS 19) (pp. 1-11). ACM/IEEE.
Wang, A., Lei, L., Lagunas, E., Pérez-Neira, A. I., Chatzinotas, S., & Ottersten, B. (2019). On Fairness Optimization for NOMA-Enabled Multi-Beam Satellite Systems. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 2019.
Yuan, Y., Vu, T. X., Lei, L., Chatzinotas, S., & Ottersten, B. (2019). Joint User Grouping and Power Allocation for MISO Systems: Learning to Schedule. IEEE European Signal Processing Conference 2019.
Merlano Duncan, J. C., Querol Borras, J., Camps, A., Chatzinotas, S., & Ottersten, B. (2019, August 31). ARCHITECTURES AND SYNCHRONIZATION TECHNIQUES FOR COHERENT DISTRIBUTED REMOTE SENSING SYSTEMS. 2019 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).
Zhang, X., Nakhai, M. R., Zheng, G., Lambotharan, S., & Ottersten, B. (2019). Calibrated Learning for Online Distributed Power Allocation in Small-Cell Networks. IEEE Transactions on Communications, 67(11), 8124 - 8136.
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2019). An Approximate Solution for Symbol-Level Multiuser Precoding Using Support Recovery. IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes 2-5 July 2019. IEEE.
Patout, P.-A., & Cordy, M. (2019). Towards context-aware automated writing evaluation systems. Proceedings of the 1st ACM SIGSOFT International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, EASEAI@ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, August 26, 2019 (pp. 17-20).
Cimarelli, C., Cazzato, D., Olivares Mendez, M. A., & Voos, H. (2019). Faster Visual-Based Localization with Mobile-PoseNet. International Conference on Computer Analysis of Images and Patterns (pp. 219--230).
Kepe, T. R., Almeida, E. C., Alves, M. A. Z., & Meira, J. A. (2019). Database Processing-in-Memory: A Vision. Database Processing-in-Memory: A Vision (pp. 418-428).
Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. (2019, August). A Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers. Paper presented at Second PQC Standardization Conference, Santa Barbara, CA.
Karadeniz, O. Ö., & Schiffner, S. (2019, August). Get to know your geek: towards a sociological understanding. Data for Better Living: AI and Privacy.
Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering.
Krivochiza, J., Merlano Duncan, J. C., Chatzinotas, S., & Ottersten, B. (2019, August). M-QAM Modulation Symbol-Level Precoding for Power Minimization: Closed-Form Solution. Paper presented at 16th International Symposium on Wireless Communication Systems ISWCS2019.
Li, L., Riom, T., Bissyande, T. F. D. A., Wang, H., Klein, J., & Le Traon, Y. (2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175.
Menghi, C., Nejati, S., Gaaloul, K., & Briand, L. (2019). Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors. Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE ’19) (pp. 27-38). ACM.
Kaushik, A., Thompson, J., Vlachos, E., Tsinos, C., & Chatzinotas, S. (2019, July 29). Dynamic RF Chain Selection for Energy Efficient and Low Complexity Hybrid Beamforming in Millimeter Wave MIMO Systems. IEEE Transactions on Green Communications and Networking, 886 - 900.
Barboza da Silva, F., & Alves Martins, W. (2019, July 25). Semi-blind Data-Selective and Multiple Threshold Volterra Adaptive Filtering. Circuits, Systems, and Signal Processing, 1-24.
Trestioreanu, L. A., Cassagnes, C., & State, R. (2019). Deep dive into Interledger: Understanding the Interledger ecosystem - Part 3. Luxembourg, Luxembourg.
de La Cadena Ramos, A. W., Kaiser, D., Mitseva, A., Panchenko, A., & Engel, T. (2019). Analysis of Multi-path Onion Routing-based Anonymization Networks. Data and Applications Security and Privacy XXXIII, 2019.
Kong, P., li, L., Gao, J., Bissyande, T. F. D. A., & Klein, J. (2019, July 15). Mining Android Crash Fixes in the Absence of Issue- and Change-Tracking Systems. Paper presented at The 28th International Symposium on Software Testing and Analysis, Beijing, China.
Trestioreanu, L. A., Cassagnes, C., & State, R. (2019). Deep dive into Interledger: Understanding the Interledger ecosystem - Part 2. Luxembourg, Luxembourg.
Trestioreanu, L. A., Cassagnes, C., & State, R. (2019). Deep dive into Interledger: Understanding the Interledger ecosystem - Part 1. Luxembourg, Luxembourg.
Hurier, M. (2019). Creating better ground truth to further understand Android malware: A large scale mining approach based on antivirus labels and malicious artifacts. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J., Bissyande, T. F. D. A., Lalande, J.-F., & Octeau, D.
Ibrahim, A. A. Z. A., Varrette, S., & Niessen, F. (2019). Best Practices for Cloud Migration and Service Level Agreement Compliances. Capellen, Luxembourg: DELL EMC.
Norvill, R., Fiz Pontiveros, B., State, R., & Cullen, A. (2019, July 01). Standardising smart contracts: Automatically inferring ERC standards. Proceedings of 2019 IEEE International Conference on Blockchain and Cryptocurrency.
Arora, C., Sabetzadeh, M., & Briand, L. (2019). An Empirical Study on the Potential Usefulness of Domain Models for Completeness Checking of Requirements. Empirical Software Engineering, 24(4), 2509–2539.
Boufaied, C., Bianculli, D., & Briand, L. (2019). A Model-driven Approach to Trace Checking of Temporal Properties with Aggregations. Journal of Object Technology, 18(2), 15:1-21.
Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. Information Systems Security and Privacy (pp. 125-151). Cham: Springer International Publishing.
KianiHarchehgani, S., Shahbazpanahi, S., Dong, M., & Boudeau, G. (2019). Joint Power Allocation and Distributed Beamforming Design for Multi-Carrier Asynchronous Two-Way Relay Networks. IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2019, Cannes, July 2019.
Lei, L., Yaxiong, Y., Vu, T. X., Chatzinotas, S., & Ottersten, B. (2019). Learning-Based Resource Allocation: Efficient Content Delivery Enabled by Convolutional Neural Network. IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2019.
Liu, K., Koyuncu, A., Kim, D., & Bissyande, T. F. D. A. (2019). TBar: Revisiting Template-based Automated Program Repair. 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA).
Mohamed, M., Shabayek, A. E. R., El-Gayyar, M., & Nassar, H. (2019). An adaptive framework for real-time data reduction in AMI. Journal of King Saud University - Computer and Information Sciences, 31(3), 392-402.
Pejo, B., Tang, Q., & Biczók, G. (2019, July). Together or Alone: The Price of Privacy in Collaborative Learinig. Proceedings on Privacy Enhancing Technologies.
Rial, A. (2019). A conditional access system with revocation for mobile pay-TV systems revisited. Information Processing Letters, 147, 6-9.
Esmaeilzadeh Dilmaghani, S., Brust, M. R., Piyatumrong, A., Danoy, G., & Bouvry, P. (2019). Link Definition ameliorating Community Detection in Collaboration Networks. Frontiers in Big Data, 2, 22.
Steichen, M., Ferreira Torres, C., Fiz Pontiveros, B., & State, R. (2019). Whispering Botnet Command and Control Instructions. 2nd Crypto Valley Conference on Blockchain Technology, Zug 24-26 June 2019.
Trestioreanu, L. A., Cassagnes, C., & State, R. (2019). Deep dive into Interledger: Understanding the Interledger ecosystem. Luxembourg, Luxembourg.
Chen, L., Xu, C., Tian, H., Xiang, H., Iñiguez, J., Yang, Y., & Bellaiche, L. (2019). Electric-Field Control of Magnetization, Jahn-Teller Distortion, and Orbital Ordering in Ferroelectric Ferromagnets. PHYSICAL REVIEW LETTERS, 122(24).
Quintanar Guzman, S. (2019). Nonlinear Observation and Control of a Lightweight Robotic Manipulator Actuated by Shape Memory Alloy (SMA) Wires. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Darouach, M. (Promotor), Hadji-Minaglou, J.-R., Alma, M., Ferreira, A., & Astorga Zaragoza, C. M.
Charlier, J. H. J., State, R., & Hilger, J. (2019, June). PHom-GeM: Persistent Homology for Generative Models. The 6th Swiss Conference on Data Science.
Fernandes, M., Decouchant, J., Volp, M., Couto, F., & Verissimo, P. (2019, June). DNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment. IEEE Journal of Biomedical and Health Informatics.
Sanchez Lopez, J. L., Sampedro, C., Cazzato, D., & Voos, H. (2019). Deep learning based semantic situation awareness system for multirotor aerial robots using LIDAR. 2019 International Conference on Unmanned Aircraft Systems (ICUAS) (2019, pp. 899-908).
Vu, T. X., Lei, L., Chatzinotas, S., & Ottersten, B. (2019). Machine Learning based Antenna Selection and Power Allocation in Multi-user MISO Systems. 2019 IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
Vu, T. X., Lei, L., Chatzinotas, S., Ottersten, B., & Trinh, A. V. (2019, June). On the Successful Delivery Probability of Full-Duplex-Enabled Mobile Edge Caching. IEEE Communications Letters.
Xiang, L., Ng, D. W. K., Ge, X., Ding, Z., Wong, V. W. S., & Schober, R. (2019). Cache-Aided Nonorthogonal Multiple Access: The Two-User Case. IEEE Journal on Selected Topics in Signal Processing, 13(3), 436-451.
Yu, J., Au, M. H. A., & Verissimo, P. (2019, June). Re-thinking untraceability in the CryptoNote-style blockchain. Paper presented at IEEE Computer Security Foundations Symposium (CSF) 2019.
Fotiadis, G., & Martindale, C. (2019). Optimal TNFS-secure pairings on elliptic curves with composite embedding degree. Eprint/Working paper retrieved from https://eprint.iacr.org/2019/555.
Duflo, G., Kieffer, E., Brust, M. R., Danoy, G., & Bouvry, P. (2019). A GP Hyper-Heuristic Approach for Generating TSP Heuristics. 33rd IEEE International Parallel & Distributed Processing Symposium (IPDPS 2019).
Kisseleff, S., Chatzinotas, S., & Ottersten, B. (2019). Ultrareliable SWIPT using Unscheduled Short Packet Transmissions. IEEE International Conference on Communications (ICC), B5G-URLLC Workshop, Shanghai, May 2019.
Biryukov, A. (2019, May 18). White-Box and Asymmetrically Hard Crypto Design. Paper presented at Whibox, workshop affiliated with Eurocrypt'2019, Darmstadt, Germany.
Fiz Pontiveros, B., Steichen, M., & State, R. (2019, May 17). Mint Centrality: A Centrality Measure for the Bitcoin Transaction Graph. Poster session presented at IEEE International Conference on Blockchain and Cryptocurrency, Luxembourg.
Yan, X., An, K., Liang, T., Zheng, G., Ding, Z., Chatzinotas, S., & Liu, Y. (2019). The Application of Power-Domain Non-Orthogonal Multiple Access in Satellite Communication Networks. IEEE Access, 7, 63531 - 63539.
Ben Abdessalem (helali), R. (2019). Effective Testing Of Advanced Driver Assistance Systems Using Evolutionary Algorithms And Machine Learning. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S. (Promotor), Sabetzadeh, M., Baudry, B., & Borg, M.
Lopez Becerra, J. M. (2019). PROVABLE SECURITY ANALYSIS FOR THE PASSWORD AUTHENTICATED KEY EXCHANGE PROBLEM. Unpublished doctoral thesis, University of Luxembourg, ​Esch-Uelzecht, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Ostrev, D. (Promotor), Coron, J.-S., Abdalla, M., & Kremer, S.
Norvill, R., Steichen, M., Shbair, W., & State, R. (2019). Demo: Blockchain for the Simplification and Automation of KYC Result Sharing. IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019). IEEE Xplore.
Oyedotun, O., Aouada, D., & Ottersten, B. (2019, May 14). Learning to Fuse Latent Representations for Multimodal Data. Poster session presented at 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom.
Shbair, W., Steichen, M., Francois, J., & State, R. (2019). BlockZoom: Large-Scale Blockchain Testbed. IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019). IEEE Xplore.
Baptista, R., Ghorbel, E., Papadopoulos, K., Demisse, G., Aouada, D., & Ottersten, B. (2019). VIEW-INVARIANT ACTION RECOGNITION FROM RGB DATA VIA 3D POSE ESTIMATION. IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, 12–17 May 2019.
Charlier, J. H. J., State, R., & Hilger, J. (2019, May). Predicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment. 32nd Canadian Conference on Artificial Intelligence Proceedings.
Cordy, M., Legay, A., Lazreg, S., & Collet, P. (2019). Towards sampling and simulation-based analysis of featured weighted automata. Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (pp. 61-64).
Hu, L., Tian, Y., Yang, J., Taleb, T., Xiang, L., & Hao, Y. (2019, May). Ready Player One: UAV Clustering based Multi-Task Offloading for Vehicular VR/AR Gaming. IEEE Network.
Huang, Q., Zhu, W.-P., Chatzinotas, S., & Alouini, M.-S. A. (2019). Outage Performance of Integrated Satellite-Terrestrial Relay Networks with Opportunistic Scheduling. ICC 2019 - 2019 IEEE International Conference on Communications (ICC). IEEE.
Iannillo, A. K.* , Natella, R.* , & Cotroneo, D.* . (2019, May). Evolutionary Fuzzing of Android OS Vendor System Services. Empirical Software Engineering.
* These authors have contributed equally to this work.
Lazreg, S., Cordy, M., Collet, P., Heymans, P., & Mosser, S. (2019). Multifaceted automated analyses for variability-intensive embedded systems. Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (pp. 854-865).
Liu, K., Kim, D., Bissyande, T. F. D. A., Kim, T., Kim, K., Koyuncu, A., Kim, S., & Le Traon, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE.
Mai, X. P., Pastore, F., Goknil, A., & Briand, L. (2019). MCP: A Security Testing Tool Driven by Requirements. 2019 IEEE/ACM 41st International Conference on Software Engineering.
Mazalli, N., Andrenacci, S., & Chatzinotas, S. (2019). Non-Intrusive Cognitive Measurement for the Amplitude Response of Wideband Transponders. International Conference on Communications. IEEE.
Nagashima Ferreira, T., Alves Martins, W., Lima, M., & Diniz, P. (2019). Convex Combination of Constraint Vectors for Set-membership Affine Projection Algorithms. Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 4858-4862).
Rivera, S., Lagraa, S., State, R., Nita-Rotaru, C., & Becker, S. (2019). ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications. IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019.
Rosalie, M., Etancelin, J.-M., Fabbri, A., & Guinand, F. (2019). DACYCLEM: A decentralized algorithm for maximizing coverage and lifetime in a mobile wireless sensor network. Ad Hoc Networks, 87.
Sharma, S. K., & Wang, X. (2019, May). Towards Massive Machine Type Communications in Ultra-Dense Cellular IoT Networks: Current Issues and Machine Learning-Assisted Solutions. IEEE Communications Surveys and Tutorials.
Symeonidis, I., Schroers, J., Mustafa A. Mustafa, M. A., & Biczok, G. (2019). Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Services. Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Services.
Yang, Y., Pesavento, M., Eldar, Y. C., & Ottersten, B. (2019). Parallel coordinate descent algorithms for sparse phase retrieval. Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP).
Yang, Y., Pesavento, M., Luo, Z.-Q., & Ottersten, B. (2019). Inexact Block Coordinate Descent Algorithms for Nonsmooth Nonconvex Optimization. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/39480.
Manukyan, A., Olivares Mendez, M. A., Geist, M., & Voos, H. (2019). Deep Reinforcement Learning based Continuous Control for Multicopter Systems. International Conference on Control, Decision and Information CoDIT, Paris 23-26 April 2019. IEEE.
Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE.
Hammes, C., Shankar, B., & Ottersten, B. (2019, April 22). Closed Form Discrete Unimodular MIMO Waveform Design Using Block Circulant Decomposition. Poster session presented at 2019 IEEE Radar Conference (RadarConf), Boston, MA.
Msadek, M. N., Soua, R., & Engel, T. (2019). IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis. The IEEE Wireless Communications and Networking Conference (WCNC).
Zhang, X., Nakhai, Zheng, G., Lambotharan, S., & Ottersten, B. (2019). A Calibrated Learning Approach to Distributed Power Allocation in Small Cell Networks. ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). United States: IEEE.
Tessaro Lunardi, W., Voos, H., & Cherri, L. H. (2019). An Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem. 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (pp. 8).
Udovenko, A. N. (2019). Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models. Unpublished doctoral thesis, University of Luxembourg, ​Esch-sur-Alzette, ​​Luxembourg.
Jury: Biryukov, A. (Promotor), Coron, J.-S., Gregor, L., Matthieu, R., & Müller, V.
Bezzaoucha, S., & Voos, H. (2019). Stability Analysis of Power Networks under Cyber-Physical Attacks: an LPV-Descriptor Approach. In S., Bezzaoucha, International Conference on Control, Decision and Information Technologies.
Distler, V., Zollinger, M.-L., Lallemand, C., Roenne, P., Ryan, P., & Koenig, V. (2019, April). Security – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019).
Du, M., Hammerschmidt, C., Varisteas, G., State, R., Brorsson, M. H., & Zhang, Z. (2019). Time Series Modeling of Market Price in Real-Time Bidding. 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning.
Emeras, J., Varrette, S., Plugaru, V., & Bouvry, P. (2019). Amazon Elastic Compute Cloud (EC2) versus In-House HPC Platform: A Cost Analysis. IEEE Transactions on Cloud Computing, 7(2), 456-468.
Gautam, S., Lagunas, E., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2019, April). Pricing Perspective for SWIPT in OFDM-based Multi-User Wireless Cooperative Systems. Paper presented at 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakech, Morocco.
Jan, S., Panichella, A., Arcuri, A., & Briand, L. (2019). Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications. IEEE Transactions on Software Engineering, 45(4), 335-362.
Joroughi, V., Shankar, B., Maleki, S., Chatzinotas, S., Grotz, J., & Ottersten, B. (2019). Robust Precoding Techniques for Multibeam Mobile Satellite Systems. 2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE.
Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2019, April). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process.
Nawaz, S. J., Sharma, S. K., Wyne, S., Patwary, M., & ASADUZZAMAN, M. (2019, April). Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future. IEEE Access.
Palattella, M. R., Soua, R., Abdelmajid, K., & Engel, T. (2019). Fog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks. The 34th ACM Symposium On Applied Computing (SAC.
Sharma, S. K., & Wang, X. (2019). Collaborative Distributed Q-Learning for RACH Congestion Minimization in Cellular IoT Networks. IEEE Communications Letters, 23(4), 600-603.
Guo, K., An, K., Zhang, Huang, Y., Guo, D., Zheng, G., & Chatzinotas, S. (2019). On the Performance of the Uplink Satellite Multiterrestrial Relay Networks With Hardware Impairments and Interference. IEEE Systems Journal, 13(3), 2297 - 2308.
Derrmann, T., Frank, R., Viti, F., & Engel, T. (2019, March 26). How Road and Mobile Networks Correlate: Estimating Urban Traffic Using Handovers. IEEE Transactions on Intelligent Transportation Systems.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2019, March 20). Tackling Large-Scale and Combinatorial Bi-level Problems with a Genetic Programming Hyper-heuristic. IEEE Transactions on Evolutionary Computation.
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2019, March 18). Relay Selection and Resource Allocation for SWIPT in Multi-User OFDMA Systems. IEEE Transactions on Wireless Communications.
Beierle, C., Leander, G., Moradi, A., & Rasoolzadeh, S. (2019). CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Transactions on Symmetric Cryptology, 2019(1), 5-45.
Geraud, R., Naccache, D., & Rosie, R. (2019). Robust Encryption, Extended. In M., Matsui (Ed.), The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings (pp. 25). Springer.
Kozhaya, D., Decouchant, J., & Verissimo, P. (2019). RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast. IEEE Transactions on Computers, 68(3).
Varisteas, G., Frank, R., Sajadi Alamdari, S. A., Voos, H., & State, R. (2019). Evaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly. 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019. IEEE.
Cruz-Roldán, F., Alves Martins, W., Sergio Ramirez Diniz, P., & Moonen, M. (2019). Achievable Data Rate of DCT-based Multicarrier Modulation Systems. IEEE Transactions on Wireless Communications, 18(3), 1739 - 1749.
Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2019). On Identifying and Explaining Similarities in Android Apps. Journal of Computer Science and Technology, 34(2), 437-455.
Camino, R. D., Hammerschmidt, C., & State, R. (2019). Improving Missing Data Imputation with Deep Generative Models. Eprint/Working paper retrieved from https://arxiv.org/abs/1902.10666.
Falk, E., Toth, V., Knaff, A., & State, R. (2019, February 27). A Tale of Location-Based User Authentication. IEEE BigComp2019 - The 6th IEEE International Conference on Big Data and Smart Computing.
Li, L., Bissyande, T. F. D. A., & Klein, J. (2019, February 26). Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering.
Esmaeilzadeh Dilmaghani, S., Piyatumrong, A., Bouvry, P., & Brust, M. R. (2019, February 25). Transforming Collaboration Data into Network Layers for Enhanced Analytics. Paper presented at International Conference on Optimization and Learning.
Gao, J., Li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2019). Should You Consider Adware as Malware in Your Study? 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering.
Liu, K., Koyuncu, A., Dongsun, K., & Bissyande, T. F. D. A. (2019). AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019). Hangzhou, China: IEEE.
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2019). Robust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty. IEEE Global Communications Conference (GLOBECOM), Abu Dhabi 9-13 December 2018.
Amand, B., Cordy, M., Heymans, P., Acher, M., Temple, P., & Jézéquel, J.-M. (2019). Towards Learning-Aided Configuration in 3D Printing: Feasibility Study and Application to Defect Prediction. Proceedings of the 13th International Workshop on Variability Modelling of Software-Intensive Systems, VAMOS 2019, Leuven, Belgium, February 06-08, 2019 (pp. 7:1-7:9).
Arora, C., Sabetzadeh, M., Nejati, S., & Briand, L. (2019). An Active Learning Approach for Improving the Accuracy of Automated Domain Model Extraction. ACM Transactions on Software Engineering and Methodology, 28(1).
Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (2019, February). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology.
Gautam, S., Vu, T. X., Chatzinotas, S., & Ottersten, B. (2019). Simultaneous Wireless Information and Power Transfer in UDN with Caching Architecture. In T., Duong, X., Chu, & H., Suraweera, Ultra-Dense Networks for 5G and Beyond - Modelling, Analysis, and Applications. West Sussex, UK: John Wiley & Sons, Limited.
Ghorbel, E., Papadopoulos, K., Baptista, R., Pathak, H., Demisse, G., Aouada, D., & Ottersten, B. (2019). A View-invariant Framework for Fast Skeleton-based Action Recognition Using a Single RGB Camera. 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Prague, 25-27 February 2018.
Lagraa, S., Cailac, M., Rivera, S., Beck, F., & State, R. (2019). Real-time attack detection on robot cameras: A self-driving car application. International Conference on Robotic Computing.
Lagraa, S., Chen, Y., & François, J. (2019, February). Deep mining port scans from darknet. International Journal of Network Management.
Rivera, S., Lagraa, S., & State, R. (2019). ROSploit: Cybersecurity tool for ROS. International Conference on Robotic Computing.
Rubin, I., Baiocchi, A., Sunyoto, Y., & Turcanu, I. (2019). Traffic Management and Networking for Autonomous Vehicular Highway Systems. Ad Hoc Networks, 83, 125-148.
Hammes, C. (2019). ADAPTIVE WAVEFORM DESIGN FRAMEWORK FOR MIMO RADAR UNDER PRACTICAL CONSTRAINTS. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Shankar, B. (Promotor), Voos, H., Ottersten, B., Gini, F., & Schröder, U.
Duflo, G., Kieffer, E., Danoy, G., & Bouvry, P. (2019, January 29). GP hyper-heuristic for the travelling salesman problem. Paper presented at OLA'2019 Int. Conference on Optimization and Learning, Bangkok, Thailand.
Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2019, January 29). Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems. EAI Endorsed Transactions on Security and Safety.
Akash, M., Symeonidis, I., A. Mustafa, M., Preneel, B., & Zhang, R. (2019, January 24). SC2Share: Smart Contract for Secure Car Sharing. International Conference on Information Systems Security and Privacy (ICISSP).
Atashpendar, A. (2019). From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Cremers, C., Ding, J., & Roenne, P.
Kiouche, A. E., Amrouche, K., Seba, H., & Lagraa, S. (2019, January 23). Une nouvelle approche pour la détection d’anomalies dans les flux de graphes hétérogènes. EGC.
Kieffer, E. (2019). Co-evolutionary Hybrid Bi-level Optimization. Unpublished doctoral thesis, University of Luxembourg, ​Esch-sur-Alzette, ​​Luxembourg.
Fiz Pontiveros, B. (2019). A Transaction’s Journey: Transactional Enhancements for Public Blockchain-based Distributed Ledgers. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: State, R. (Promotor).
Hajri, I. (2019). Supporting Change in Product Lines Within the Context of Use Case-driven Development and Testing. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Goknil, A. (Promotor), Nejati, S., Egyed, A., Gnesi, S., & Pastore, F.
Polge, J., Robert, J., & Le Traon, Y. (2019). Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era. 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019.
Munoz-Salinas, R., Sarmadi, H., Cazzato, D., & Medina-Carnicer, R. (2019). Flexible body scanning without template models. Signal Processing, 154, 350-362.
Bouvry, P., Varrette, S., Wasim, M. U., Ibrahim, A. A. Z. A., Besseron, X., & Trinh, T. A. (2019). Security, reliability and regulation compliance in Ultrascale Computing System. In A. Y., Zomaya, J., Carretero (Ed.), & E., Jeannot (Ed.), Ultrascale Computing Systems (pp. 65-83). IET.
Oleksiak, A., Lefèvre, L., Alonso, P., Da Costa, G., De Maio, V., Frasheri, N., Garcia, V. M., Guerrero, J., Lafond, S., Lastovetsky, A. L., Manumachu, R. R., Muite, B., Orgerie, A.-C., Piatek, W., Pierson, J.-M., Prodan, R., Stolf, P., Sheme, E., & Varrette, S. (2019). Energy aware ultrascale systems. In J., Carretero, E., Jeannot, & A. Y., Zomaya (Eds.), Ultrascale Computing Systems (pp. 127-188). IET.
Palattella, M. R., Soua, R., Stemper, A., & Engel, T. (2019, January). Aggregation of MQTT Topics over Integrated Satellite Terrestrial Networks. ACM SIGMETRICS Performance Evaluation Review.
Abualhaija, S., Arora, C., Sabetzadeh, M., Briand, L., & Vaz, E. (2019). A Machine Learning-Based Approach for Demarcating Requirements in Textual Specifications. 27th IEEE International Requirements Engineering Conference (RE'19).
Alaee-Kerahroodi, M. (2019). A Coordinate Descent Framework to Joint Design of MPSK Sequences and Receive Filter Weights in MIMO Radar Systems. 2019 IEEE Radar Conference (RadarConf).
Alaee-Kerahroodi, M., Mishra, K. V., Shankar, M. R. B., & Ottersten, B. (2019). Discrete-Phase Sequence Design for Coexistence of MIMO Radar and MIMO Communications. 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (pp. 1--5).
Alaee-Kerahroodi, M., Modarres-Hashemi, M., & Naghsh, M. M. (2019). Designing Sets of Binary Sequences for MIMO Radar Systems. IEEE Transactions on Signal Processing, 67(13), 3347--3360.
Alaee-Kerahroodi, M., Sedighi, S., MR, B. S., & Ottersten, B. (2019). Designing (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function. ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 4295--4299).
Alaee-Kerahroodi, M., Shankar, B., Mishra, K. V., & Ottersten, B. (2019). Meeting the Lower Bound on Designing Set of Unimodular Sequences with Small Aperiodic/Periodic ISL. 2019 20th International Radar Symposium (IRS) (pp. 1--13).
Alnoman, A., Sharma, S. K., Ejaz, W., & Anpalagan, A. (2019). Emerging Edge Computing Technologies for Distributed IoT Systems. IEEE Network.
Amrouche, F., Lagraa, S., Kaiafas, G., & State, R. (2019). Graph-based malicious login events investigation. In F., Amrouche, S., Lagraa, G., Kaiafas, & R., State, 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019).
Arcelli, F., Walter, B., Ampatzoglou, A., Palomba, F., Perrouin, G., Acher, M., Cordy, M., & Devroey, X. (Eds.). (2019). Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation. ACM.
Ardito, A., Abelllo, R., Aroumont, A., Baldi, M., Barbaglio, F., Chiaraluce, F., Comoretto, G., Finocchiaro, S., Graziani, A., Maguire, P., Marti, S., Maturo, N., Mercolino, M., Quibus, L., & Vanhoenacker-Janvier, D. (2019). Off-line Correlator for Antenna Array Over Long Baselines. 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC).
Baldi, M., Bertinelli, M., Chiaraluce, F., da Silva, P. F., Garello, R., Maturo, N., Monica, N., Palomo, J. M., Paolini, E., Prata, R., Simone, L., & Urrutia, C. (2019). Theoretical Analysis and Implementation of Effective Receivers for Telecommand Space Links. 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC).
Baldi, M., Maturo, N., Ricciutelli, G., & Chiaraluce, F. (2019). Physical layer security over fading wiretap channels through classic coded transmissions with finite block length and discrete modulation. Physical Communication.
Baptista, R., Ghorbel, E., Shabayek, A. E. R., Moissenet, F., Aouada, D., Douchet, A., André, M., Pager, J., & Bouilland, S. (2019). Home Self-Training: Visual Feedback for Assisting Physical Activity for Stroke Survivors. Computer Methods and Programs in Biomedicine.
Bartel, A., Klein, J., & Le Traon, Y. (2019). Désérialisation Java : Une brève introduction au ROP de haut niveau. Multi-System & Internet Security Cookbook, 101.
Bartel, A., Klein, J., & Le Traon, Y. (2019). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Transactions on Information Forensics and Security.
Bartolini, C., & Lenzini, G. (2019). Sistemi Medici e Conformità Legale. Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione, XLI(1/2019), 225-242.
Bartolini, C., Lenzini, G., & Santos, C. (2019). An Agile Approach to Validate a Formal Representation of the GDPR. JSAI International Symposium on Artificial Intelligence, 11717.
Bartolini, C., Lenzini, G., & Santos, C. (2019). An Agile Approach to Validate a Formal Representation of the GDPR. JSAI International Symposium on Artificial Intelligence, 11717.
Baudin, A., Paul, S., Su, C., & Pang, J. (2019). Controlling large Boolean networks with single-step perturbations. Bioinformatics, 35(14), 558-i567.
Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (2019). Alzette: A 64-bit ARX-box. Eprint/Working paper retrieved from https://eprint.iacr.org/2019/1378.
Belardinelli, F., Jamroga, W., Kurpiewski, D., Malvone, V., & Murano, A. (2019). Strategy Logic with Simple Goals: Tractable Reasoning about Strategies. Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (pp. 88--94).
Benedick, P.-L., Robert, J., & Le Traon, Y. (2019). TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0. Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society.
Bereyhi, A., Asaad, S., Müller, R. R., & Chatzinotas, S. (2019). RLS Waveform Adaptation for Massive MIMO Systems with Nonlinear Front-End. IEEE International Workshop on Signal Processing Advances in Wireless Communication. IEEE.
Bettaieb, S., Shin, S. Y., Sabetzadeh, M., Briand, L., Nou, G., & Garceau, M. (2019). Decision Support for Security-Control Identification Using Machine Learning. International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019.
Beullens, W., Beyne, T., Udovenko, A., & Vitto, G. (2019). Cryptanalysis of the Legendre PRF and generalizations. Eprint/Working paper retrieved from https://eprint.iacr.org/2019/1357.
Bezzaoucha, S., & Voos, H. (2019). New Trends in Observer-based Control: An Introduction to Design Approaches and Engineering Applications, Chapter 13: Observer-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems. New Trends in Observer-based Control: An Introduction to Design Approaches and Engineering Applications, Chapter 13: Observer-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems. Elsevier.
Biryukov, A., & Feher, D. (2019). Portrait of a Miner in a Landscape. IEEE INFOCOM 2019 Workshop Proceedings.
Biryukov, A., & Feher, D. (2019). Privacy and Linkability of Mining in Zcash. 2019 IEEE Conference on Communications and Network Security (CNS). IEEE.
Biryukov, A., & Feher, D. (2019). ReCon: Sybil-Resistant Consensus from Reputation. Pervasive and Mobile Computing.
Biryukov, A., & Tikhomirov, S. (2019). Deanonymization and linkability of cryptocurrency transactions based on network analysis. Proceedings of 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
Biryukov, A., & Tikhomirov, S. (2019). Security and Privacy of Mobile Wallet Users in Bitcoin, Dash, Monero, and Zcash. Pervasive and Mobile Computing.
Biryukov, A., & Tikhomirov, S. (2019). Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains. IEEE INFOCOM 2019 Workshop Proceedings.
Bulling, N., Jamroga, W., & Popovici, M. (2019). Reasoning about Strategic Abilities: Agents with Truly Perfect Recall. ACM Transactions on Computational Logic, 20(2), 10:1--10:46.
Camenisch, J., Dubovitskaya, M., & Rial, A. (2019). Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/39423.
Cardoso Dos Santos, L., Groszschädl, J., & Biryukov, A. (2019). FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms. Smart Card Research and Advanced Applications, 18th International Conference.
Cazzato, D., Castro, S. M., Agamennoni, O., Fernández, G., & Voos, H. (2019). A non-invasive tool for attention-deficit disorder analysis based on gaze tracks. Proceedings of the 2nd International Conference on Applications of Intelligent Systems (pp. 1--6).
Cazzato, D., Cimarelli, C., Sanchez Lopez, J. L., Olivares Mendez, M. A., & Voos, H. (2019). Real-Time Human Head Imitation for Humanoid Robots. Proceedings of the 2019 3rd International Conference on Artificial Intelligence and Virtual Reality (pp. 65--69).
Cazzato, D., Leo, M., Carcagnì, P., Cimarelli, C., & Voos, H. (2019). Understanding and Modelling Human Attention for Soft Biometrics Purposes. AIVR 2019: Proceedings of the 2019 3rd International Conference on Artificial Intelligence and Virtual Reality.
Cazzato, D., Leo, M., Carcagni, P., Distante, C., Lorenzo-Navarro, J., & Voos, H. (2019). Video Indexing Using Face Appearance and Shot Transition Detection. Proceedings of the IEEE International Conference on Computer Vision Workshops (pp. 0--0).
Cazzato, D., Olivares Mendez, M. A., Sanchez Lopez, J. L., & Voos, H. (2019). Vision-Based Aircraft Pose Estimation for UAVs Autonomous Inspection without Fiducial Markers. IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society (pp. 5642--5648).
Changaival, B., Danoy, G., Kliazovich, D., Guinand, F., Brust, M. R., Musial, J., Lavangnananda, K., & Bouvry, P. (2019). Toward Real-world Vehicle Placement Optimization in Round-trip Carsharing. Proceedings of the Genetic and Evolutionary Computation Conference (pp. 1138--1146). New York, NY, USA: ACM.
Chen, B.-H., Li, C.-T., Chuang, K.-T., Pang, J., & Zhang, Y. (2019). An active learning-based approach for location-aware acquaintance inference. Knowledge and Information Systems, 59(3), 539-569.
Cordy, M., Devroey, X., Legay, A., Perrouin, G., Classen, A., Heymans, P., Schobbens, P.-Y., & Raskin, J.-F. (2019). A Decade of Featured Transition Systems. From Software Engineering to Formal Methods and Tools, and Back - Essays Dedicated to Stefania Gnesi on the Occasion of Her 65th Birthday (pp. 285-312).
Cordy, M., Muller, S., Papadakis, M., & Le Traon, Y. (2019). Search-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems. ACM SIGSOFT International Symposium on Software Testing and Analysis.
Coron, J.-S., & Gini, A. (2019). Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. Journal of Mathematical Cryptology.
Cotroneo, D., De Simone, L., Iannillo, A. K., Natella, R., Rosiello, S., & Bidokhti, N. (2019). Analyzing the Context of Bug-Fixing Changes in the OpenStack Cloud Computing Platform. 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE).
de Faria Junior, H., Tessaro Lunardi, W., & Voos, H. (2019). A parallel multi-population biased random-key genetic algorithm for electric distribution network reconfiguration. The Genetic and Evolutionary Computation Conference - GECCO'19.
Derbez, P., Lallemand, V., & Udovenko, A. (2019). Cryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition. In K. G., Patterson & D., Stebila (Eds.), Selected Areas in Cryptography -- SAC 2019 (pp. 124-145). Cham: Springer International Publishing.
Du, M., Cowen-Rivers, A. I., Wen, Y., Sakulwongtana, P., Wang, J., Brorsson, M. H., & State, R. (2019). Know Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation. Proceedings of the 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019).
Feraidooni, M. M., Alaee-Kerahroodi, M., Imani, S., & Gharavian, D. (2019). Designing Set of Binary Sequences and Space-Time Receive Filter for Moving Targets in Colocated MIMO Radar Systems. 2019 20th International Radar Symposium (IRS) (pp. 1--10).
Ferreira Torres, C., Steichen, M., Norvill, R., & Jonker, H. (2019). ÆGIS: Smart Shielding of Smart Contracts. Poster session presented at CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security.
Ferreira Torres, C., Steichen, M., & State, R. (2019). The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. USENIX Security Symposium, Santa Clara, 14-16 August 2019.
Fiscarelli, A. M., Brust, M. R., Danoy, G., & Bouvry, P. (2019). A Memory-Based Label Propagation Algorithm for Community Detection. Complex Networks and Their Applications VII. Springer International Publishing.
Gao, J., Kong, P., Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Negative Results on Mining Crypto-API Usage Rules in Android Apps. Proceedings of the 16th International Conference on Mining Software Repositories.
Gao, J., Li, Bissyande, T. F. D. A., & Klein, J. (2019). On the Evolution of Mobile App Complexity. Proceedings of 2019 24th International Conference on Engineering of Complex Computer Systems.
Genç, Z. A., Lenzini, G., & Ryan, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer.
Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. Proceedings of the Third Central European Cybersecurity Conference. New York, US: ACM.
Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, USA: ACM.
Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer.
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2019). Automated Search for Configurations of Deep Neural Network Architectures. Automated Search for Configurations of Convolutional Neural Network Architectures.
Gorski III, S. A., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., & Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks inAndroid’s Middleware. ACM.
Iannillo, A. K., & State, R. (2019). A Proposal for Security Assessment of Trustzone-M based Software. 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE).
Iovino, V., & Visconti, I. (2019). Non-interactive Zero Knowledge Proofs in the Random Oracle Model. Codes, Cryptology and Information Security (pp. 118-141). Springer, Cham.
Jamroga, W., Knapik, M. L., Kurpiewski, D., & Mikulski, L. (2019). Approximate Verification of Strategic Abilities under Imperfect Information. Artificial Intelligence, 277.
Jamroga, W., & Knapik, M. (2019). Some Things are Easier for the Dumb and the Bright Ones (Beware the Average!). Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (pp. 1734--1740).
Jamroga, W., Malvone, V., & Murano, A. (2019). Natural Strategic Ability. Artificial Intelligence, 277.
Jamroga, W., Malvone, V., & Murano, A. (2019). Natural Strategic Ability under Imperfect Information. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 962--970). IFAAMAS.
Jamroga, W., Roenne, P., Ryan, P., & Stark, P. B. (2019). Risk-Limiting Tallies. Electronic Voting: Proceedings of E-Vote-ID (pp. 183--199).
Javed, A., Yousefnezhad, N., Robert, J., Heljanko, K., & Främling, K. (2019). Access Time Improvement Framework for Standardized IoT Gateways. Proceedings of IEEE International Conference on Pervasive Computing and Communications.
Jayakody, N., Imran, M. A., Chatzinotas, S., & Hassan, S. A. (2019). Editorial on energy-aware future-networked smart cities. Physical Communication, 33, 151-152.
Jenzsch, S., Höhn, S., & Hochgeschwender, N. (2019). Conversational Interfaces for Explainable AI: A Human-Centered Approach. Proceedings of EXTRAAMAS 2019 (pp. 1-14).
Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). An Empirical Study on Vulnerability Prediction of Open-Source Software Releases. Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities. Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Jorge Mendes Spelta, M., & Alves Martins, W. (2019). Normalized LMS Algorithm and Data-selective Strategies for Adaptive Graph Signal Estimation. Signal Processing.
Joroughi, V., Kibria, M., Lagunas, E., Shankar, B., Chatzinotas, S., Grotz, J., Maleki, S., & Ottersten, B. (2019). Deploying Dynamic On-Board Signal Processing Schemes for Multibeam Satellite Systems. Deploying Dynamic On-Board Signal Processing Schemes for Multibeam Satellite Systems.
Kaiafas, G., Hammerschmidt, C., Lagraa, S., & State, R. (2019). Auto Semi-supervised Outlier Detection for Malicious Authentication Events. ECML PKDD 2019 Workshops.
Kaiafas, G., Hammerschmidt, C., Lagraa, S., & State, R. (2019). An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles. In G., Kaiafas, C., Hammerschmidt, & R., State, 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019). Piscataway, NY: Institute of Electrical and Electronics Engineers.
Khan, N., Ahmad, T., & State, R. (2019). Blockchain-based Micropayment Systems: Economic Impact. ACM IDEAS '19 Proceedings of the 23rd International Database Engineering & Applications Symposium.
Khan, N., & Ouaich, R. (2019). Feasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects. Springer Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development) (pp. 129-139). Springer, Cham.
Khan, N., & State, R. (2019). Lightning Network: A Comparative Review of Transaction Fees and Data Analysis. Springer Blockchain and Applications (pp. 11-18). Springer.
Kibria, M., Lagunas, E., Maturo, N., Spano, D., & Chatzinotas, S. (2019). Precoded Cluster Hopping in Multi-Beam High Throughput Satellite Systems. Proceedings-IEEE Global Communications Conference (IEEE Globecom), Hawaii, 2019.
Knapik, M., André, É., Petrucci, L., Jamroga, W., & Penczek, W. (2019). Timed ATL: Forget Memory, Just Count. Journal of Artificial Intelligence Research, 66, 197--223.
Kodheli, O., Andrenacci, S., Maturo, N., Chatzinotas, S., & Zimmer, F. (2019). An Uplink UE Group-Based Scheduling Technique for 5G mMTC Systems Over LEO Satellite. IEEE Access.
Kodheli, O., Maturo, N., Andrenacci, S., Chatzinotas, S., & Zimmer, F. (2019). Link budget analysis for satellite-based narrowband IoT systems. Paper presented at 18th International Conference on Ad Hoc Networks and Wireless (AdHoc-Now 2019), Luxembourg.
Kolbe, N., Kubler, S., & Le Traon, Y. (2019). Popularity-driven Ontology Ranking using Qualitative Features. The Semantic Web - ISWC 2019.
Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2019). Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. ACM Computing Surveys.
Korrai, P., Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2019). Slicing based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks. Slicing based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks.
Korrai, P., Lagunas, E., Sharma, S. K., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2019). Margin-based Active Online Learning Techniques for Cooperative Spectrum Sharing in CR Networks. International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), Poznan, Poland, June 2019. Springer.
Kreutz, D., Yu, J., Ramos, F. M. V., & Verissimo, P. (2019). ANCHOR: logically-centralized security for Software-Defined Networks. Eprint/Working paper retrieved from https://arxiv.org/abs/1711.03636.
Krivochiza, J., Merlano Duncan, J. C., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2019). FPGA Acceleration for Computationally Efficient Symbol-Level Precoding in Multi-User Multi-Antenna Communication Systems. IEEE Access.
Kuhn, C., Beck, M., Schiffner, S., Jorswieck, E., & Strufe, T. (2019). On privacy notions in anonymous communication. Proceedings on Privacy Enhancing Technologies, 2019(2), 105--125.
Kurpiewski, D., Jamroga, W., & Knapik, M. L. (2019). STV: Model Checking for Strategies under Imperfect Information. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 2372--2374). IFAAMAS.
Kurpiewski, D., Knapik, M. L., & Jamroga, W. (2019). On Domination and Control in Strategic Ability. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 197--205). IFAAMAS.
Kurpiewski, D., Knapik, M., & Jamroga, W. (2019). On Domination and Control in Strategic Ability (Extended Abstract). Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC).
Lagunas, E., Lei, L., Chatzinotas, S., & Ottersten, B. (2019). Power and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks. IEEE Wireless Communications and Networking Conference, Marrakech, Morocco, April 2019.
Lagunas, E., Lei, L., Chatzinotas, S., & Ottersten, B. (2019). Satellite Links Integrated in 5G SDN-enabled Backhaul Networks: An Iterative Joint Power and Flow Assignment. European Signal Processing Conference (EUSIPCO), A Coruna, Spain, Sept. 2019.
Larregui, J. I., Cazzato, D., & Castro, S. M. (2019). An image processing pipeline to segment iris for unconstrained cow identification system. Open Computer Science, 9(1), 145--159.
Leong, C., Abhayendra, S., Papadakis, M., Le Traon, Y., & Micco, J. (2019). Assessing Transition-based Test Selection Algorithms at Google. International Conference on Software Engineering (ICSE).
Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2019). On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy. E-Business and Telecommunications - 2019, 173-198.
Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (2019). An offline dictionary attack against zkPAKE protocol. An offline dictionary attack against zkPAKE protocol. Springer.
Mandon, H., Su, C., Haar, S., Pang, J., & Paulevé, L. (2019). Sequential reprogramming of Boolean networks made practical. Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (pp. 3-19). Springer.
Mandon, H., Su, C., Pang, J., Paul, S., Haar, S., & Pauleve, L. (2019). Algorithms for the Sequential Reprogramming of Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16(5), 1610-1619.
Maturo, N., Merlano Duncan, J. C., Krivochiza, J., Querol Borras, J., Spano, D., Chatzinotas, S., & Ottersten, B. (2019). Demonstrator of Precoding Technique for a Multi-Beams Satellite System. 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (pp. 1-8).
Menghi, C., Tsigkanos, C., Berger, T., & Pelliccione, P. (2019). PsALM: specification of dependable robotic missions. Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings (pp. 99-102).
Mestel, D. (2019). Quantifying information flow in interactive systems. 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2019). Taming asynchrony for attractor detection in large Boolean networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16(1), 31-42.
Mizera, A., Pang, J., & Yuan, Q. (2019). GPU-accelerated steady-state computation of large probabilistic Boolean networks. Formal Aspects of Computing, 31(1), 27-46.
Molina, F., Cornejo, C., Degiovanni, R. G., Regis, G., Castro, P. F., Aguirre, N., & Frias, M. F. (2019). An evolutionary approach to translating operational specifications into declarative specifications. Science of Computer Programming, 181, 47--63.
Molina, F., Degiovanni, R. G., Ponzio, P., Regis, G., Aguirre, N., & Frias, M. F. (2019). Training binary classifiers as data structure invariants. Proceedings of the 41st International Conference on Software Engineering ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (pp. 759 - 770).
Musial, J., Kieffer, E., Guzek, M., Danoy, G., Wagle, S. S., Bouvry, P., & Blazewicz, J. (2019). Cloud Brokering with Bundles: Multi-objective Optimization of Services Selection. Foundations of Computing and Decision Sciences.
Nejati, S., gaaloul, K., Menghi, C., Briand, L., Foster, S., & Wolfe, D. (2019). Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models. Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Ostrev, D. (2019). Composable, Unconditionally Secure Message Authentication without any Secret Key. 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019. IEEE.
Ostrev, D. (2019). An introduction to the theory of unconditionally secure message authentication using the constructive cryptography framework. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/39497.
Padhye, R., Lemieux, C., Sen, K., Papadakis, M., & Le Traon, Y. (2019). Semantic Fuzzing with Zest. ACM SIGSOFT International Symposium on Software Testing and Analysis.
Pang, J., & Sun, J. (Eds.). (2019). Proceedings of the 24th International Conference on Engineering of Complex Computer Systems. IEEE.
Papadopoulos, K., Demisse, G., Ghorbel, E., Antunes, M., Aouada, D., & Ottersten, B. (2019). Localized Trajectories for 2D and 3D Action Recognition. Sensors.
Papadopoulos, K., Ghorbel, E., Baptista, R., Aouada, D., & Ottersten, B. (2019). Two-stage RGB-based Action Detection using Augmented 3D Poses. 18th International Conference on Computer Analysis of Images and Patterns SALERNO, 3-5 SEPTEMBER, 2019.
Paverd, A., Volp, M., Brasser, F., Schunter, M., N Asokan, Sadeghi, A.-R., Verissimo, P., Steininger, A., & Holz, T. (2019). Sustainable Security and Safety: Challenges and Opportunities. OpenAccess Series in Informatics (OASIcs), 73.
Pennekamp, J., Hiller, J., Reuter, S., de La Cadena Ramos, A. W., Mitseva, A., Henze, M., Engel, T., Wehrle, K., & Panchenko, A. (2019). Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. Poster session presented at 27th IEEE International Conference on Network Protocols (ICNP '19), Chicago, USA.
Perez, A., Vazquez, M., Shankar, B., Maleki, S., & Chatzinotas, S. (2019). Signal Processing for High-Throughput Satellites: Challenges in New Interference-Limited Scenarios. IEEE Signal Processing Magazine.
Pérez-Neira, A. L., Vazquez, M. A., Shankar, B., Maleki, S., & Chatzinotas, S. (2019). Signal Processing for high Throughput Satellite Systems: Challenges for new interference Limited Scenarios. Signal Processing.
Plazar, Q., Acher, M., Perrouin, G., Devroey, X., & Cordy, M. (2019). Uniform Sampling of SAT Solutions for Configurable Systems: Are We There Yet? 12th IEEE Conference on Software Testing, Validation and Verification, ICST 2019, Xi'an, China, April 22-27, 2019 (pp. 240-251).
Raei, E., Alaeekerahroodi, M., Shankar, B., & Ottersten, B. (2019). Designing MPSK Sequences and Doppler Filter Bank in Cognitive Radar Systems. International Radar Conference, france, Toulon 23-27 September, 2019.
Rial, A. (2019). UC Updatable Non-Hiding Committed Database with Efficient Zero-Knowledge Proofs. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/39421.
Robaldo, L., Bartolini, C., Lenzini, G., Rossi, A., Palmirani, M., & Martoni, M. (2019). Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base. Journal of Logic, Language and Information.
Rossi, A., Ducato, R., Haapio, H., & Passera, S. (2019). Legal Design Patterns: Towards A New Language for Legal Information Design. In E., Schweighofer, F., Kummer, & A., Saarenpää (Eds.), 22nd International Legal Infomatics Symposium IRIS 2019.
Rossi, A., Ducato, R., Haapio, H., & Passera, S. (2019). When Design Met Law: Design Patterns for Information Transparency. Droit de la Consommation, (1).
Rossi, A., & Haapio, H. (2019). Proactive Legal Design: Embedding Values in the Design of Legal Artefacts. In E., Schweighofer, F., Kummer, & A., Saarenpää (Eds.), International Legal Infomatics Symposium IRIS 2019 (pp. 537–544).
Rossi, A., Lenzini, G., Koenig, V., & Bongard, K. (2019). Dark Patterns: Deception or Simply Bad Design? Poster session presented at ESORICS, Luxembourg.
Rossi, A., & Palmirani, M. (2019). DaPIS: an Ontology-Based Data Protection Icon Set. In G., Peruginelli & S., Faro (Eds.), Knowledge of the Law in the Big Data Age (pp. 181 - 195). IOS Press.
Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). On the Evolution of Keyword-Driven Test Suites. 12th IEEE International Conference on Software Testing, Verification and Validation.
Samir, A., & Pahl, C. (2019). Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models. The Fourth IEEE International Conference on Fog and Mobile Edge Computing. Rome, Italy: IEEE Computer Society.
Samir, A., & Pahl, C. (2019). A Controller Architecture for Anomaly Detection, Root Cause Analysis and Self-Adaptation for Cluster Architectures. In A., Samir, The Eleventh International Conference on Adaptive and Self-Adaptive Systems and Applications (pp. 75--83). Venice, Italy: IARIA.
Samir, A., & Pahl, C. (2019). DLA: Detecting and Localizing Anomalies in Containerized Microservice Architectures Using Markov Models. In A., Samir, the 7th International Conference on Future Internet of Things and Cloud. Istanbul, Turkey: IEEE Computer Society.
Schmitt, X., Kubler, S., Robert, J., Papadakis, M., & Le Traon, Y. (2019). A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate. International Conference on Social Networks Analysis, Management and Security.
Scolati, R., Fronza, I., Ioini, N. E., Samir, A., & Reza, H. (2019). A Containerized Big Data Streaming Architecture for Edge Cloud Computing on Clustered Single-Board Devices. In A., Samir, A Containerized Big Data Streaming Architecture for Edge Cloud Computing on Clustered Single-Board Devices (pp. 1--25). Springer.
Sedighi, S., Shankar, B., & Ottersten, B. (2019). An Asymptotically Efficient Weighted Least Squares Estimator for Co-Array-Based DoA Estimation. IEEE Transactions on Signal Processing.
Shin, D., Yoo, S., Papadakis, M., & Bae, D.-H. (2019). Empirical Evaluation of Mutation-based Test Prioritization Techniques. Software Testing, Verification and Reliability, 29(1-2).
Sleimi, A., Ceci, M., Sannier, N., Sabetzadeh, M., Briand, L., & Dann, J. (2019). A Query System for Extracting Requirements-related Information from Legal Texts. Proceedings of the 27th IEEE International Requirements Engineering Conference (RE'19), pp. 319-329.
Stojkovski, B., Vazquez Sandoval, I., & Lenzini, G. (2019). Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system. 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops.
Su, C., Paul, S., & Pang, J. (2019). Controlling large Boolean networks with temporary and permanent perturbations. Proceedings of the 23rd International Symposium on Formal Methods (FM'19) (pp. 707-724). Springer.
Su, C., Paul, S., & Pang, J. (2019). Scalable control of asynchronous Boolean networks. Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (pp. 362-367). Springer.
Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2019). Mart: A Mutant Generation Tool for LLVM. In T., Titcheu Chekam, M., Papadakis, & Y., Le Traon, Mart: A Mutant Generation Tool for LLVM.
Turcanu, I., Adamsky, F., & Engel, T. (2019). Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks. IEEE 90th Vehicular Technology Conference (VTC2019-Fall).
Turcanu, I., Engel, T., & Sommer, C. (2019). Fog Seeding Strategies for Information-Centric Heterogeneous Vehicular Networks. 11th IEEE Vehicular Networking Conference (VNC 2019). Los Angeles, CA, USA: IEEE.
Varisteas, G., & Frank, R. (2019). JUNIOR, A Research Platform for Connected and Automated Driving. Proceedings of 2019 IEEE Vehicular Networking Conference.
Vazquez Sandoval, I., & Lenzini, G. (2019). A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. Emerging Technologies for Authorization and Authentication. Springer.
Vu, T. X., Lei, L., Chatzinotas, S., Ottersten, B., & Vu, T. A. (2019). Energy Efficient Design for Coded Caching Delivery Phase. 2019 IEEE International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom).
Vu, T. X., Vu, T. A., Lei, L., Chatzinotas, S., & Ottersten, B. (2019). Linear Precoding Design for Cache-aided Full-duplex Networks. 2019 IEEE Wireless Communications and Networking Conference (WCNC).
Vukotic, I., Rahli, V., & Verissimo, P. (2019). Asphalion: Trustworthy Shielding Against Byzantine Faults. In I., Vukotic, V., Rahli, & P., Verissimo, Asphalion: Trustworthy Shielding Against Byzantine Faults.
Wang, C., Pastore, F., & Briand, L. (2019). Oracles for Testing Software Timeliness with Uncertainty. ACM Transactions on Software Engineering and Methodology, 28(1).
Wang, Q., Hao, H., Todo, Y., Li, C., Takanori, I., & Meier, W. (2019). Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Transactions on Computers, 68(10), 1470-1486.
Wei, X., Xiang, L., Cottatellucci, L., Jiang, T., & Schober, R. (2019). Cache-Aided Massive MIMO: Linear Precoding Design and Performance Analysis. Proc. IEEE ICC 2019.
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2019). Energy efficiency optimization in MIMO interference channels: A successive pseudoconvex approximation approach. IEEE Transactions on Signal Processing.
Yang, Y., Pesavento, M., Luo, Z.-Q., & Ottersten, B. (2019). Inexact Block Coordinate Descent Algorithms for Nonsmooth Nonconvex Optimization. IEEE Transactions on Signal Processing, 1-1.
Yazdanpanah, V., Dastani, M., Alechina, N., Logan, B., & Jamroga, W. (2019). Strategic Responsibility Under Imperfect Information. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 592--600). IFAAMAS.
Yu, J., Kozhaya, D., Decouchant, J., & Verissimo, P. (2019). RepuCoin: Your Reputation is Your Power. IEEE Transactions on Computers.
Yuan, Q., Mizera, A., Pang, J., & Qu, H. (2019). A new decomposition-based method for detecting attractors in synchronous Boolean networks. Science of Computer Programming, 180, 18-35.
Zhang, J., Xu, H., Xiang, L., & Yang, J. (2019). On the Application of Directional Antennas in Multi-Tier Unmanned Aerial Vehicle Networks. IEEE Access, 7, 132095-132110.
Zhong, Z., Zhang, Y., & Pang, J. (2019). A graph-based approach to explore relationship between hashtags and images. Proceedings of the 20th International Conference on Web Information System Engineering (pp. 473-488). springer.

2018

Beierle, C., Canteaut, A., & Leander, G. (2018). Nonlinear Approximations in Cryptanalysis Revisited. IACR Transactions on Symmetric Cryptology, 2018(4), 80-101.
Domouchtsidis, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018, December 13). Symbol-Level Precoding for Low Complexity Transmitter Architectures in Large-Scale Antenna Array Systems. IEEE Transactions on Wireless Communications ( Early Access ), 1-1.
Karpenko, A., Kinnunen, T., Madhikermi, M., Robert, J., Främling, K., Dave, B., & Nurminen, A. (2018, December 13). Data Exchange Interoperability in IoT Ecosystem for Smart Parking and EV Charging. Sensors.
Rwemalika, R., Kintis, M., Papadakis, M., & Le Traon, Y. (2018, December 11). Can we automate away the main challenges of end-to-end testing? Paper presented at The 17th Belgium-Netherlands Software Evolution Workshop, Delft, Netherlands.
Beierle, C., Biryukov, A., & Udovenko, A. (2018). On Degree-d Zero-Sum Sets of Full Rank. Eprint/Working paper retrieved from https://eprint.iacr.org/2018/1194.pdf.
Liu, K., Koyuncu, A., Kim, K., Kim, D., & Bissyande, T. F. D. A. (2018). LSRepair: Live Search of Fix Ingredients for Automated Program Repair. 25th Asia-Pacific Software Engineering Conference (APSEC).
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, December 03). Nonlinear Model Predictive Control for Ecological Driver Assistance Systems in Electric Vehicles. Robotics and Autonomous Systems.
Fiscarelli, A. M., Brust, M. R., Danoy, G., & Bouvry, P. (2018). A Memory-Based Label Propagation Algorithm for Community Detection. In L. M., Aiello, C., Cherifi, H., Cherifi, R., Lambiotte, L., Pietro, & L. M., Rocha, Complex Networks and Their Applications VII (7, pp. 171-182). Cham, Switzerland: Springer.
Arcuri, A. (2018). Test Suite Generation with the Many Independent Objective (MIO) Algorithm. Information and Software Technology, 104(December), 195-206.
Campos, J., Ge, Y., Albunian, N., Fraser, G., Eler, M., & Arcuri, A. (2018). An Empirical Evaluation of Evolutionary Algorithms for Unit Test Suite Generation. Information and Software Technology, 104(December), 207-235.
Ferreira Torres, C., Schütte, J., & State, R. (2018). Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018.
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018, December). Sequential Resource Distribution Technique for Multi-User OFDM-SWIPT based Cooperative Networks. Paper presented at IEEE Global Communications Conference (IEEE GLOBECOM), Abu Dhabi, UAE.
Gautam, S., Lagunas, E., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2018, December). QoS-Constrained Sum-Harvested Energy Maximization in OFDMA-based Wireless Cooperative Networks. Paper presented at IEEE International Conference on Advanced Networks and Telecommunications Systems (IEEE ANTS'18), Indore, India.
Ghatpande, S., Groszschädl, J., & Liu, Z. (2018). A Family of Lightweight Twisted Edwards Curves for the Internet of Things. In O., Blazy & C. Y., Yeun (Eds.), Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (pp. 193-206). Springer Verlag.
Joroughi, V., Shankar, B., Maleki, S., Chatzinotas, S., Grotz, J., & Ottersten, B. (2018). Robust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System. Robust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System.
Krivochiza, J., Merlano Duncan, J. C., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018, December). Closed-Form Solution for Computationally Efficient Symbol-Level Precoding. Paper presented at IEEE Global Communications Conference 2018, Abu Dhabi, UAE.
Lei, L., You, L., Yang, Y., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Power and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks. IEEE Global Communications Conference (GLOBECOM) 2018.
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive convex approximation algorithms for sparse signal estimation with nonconvex regularizations. IEEE Journal of Selected Topics in Signal Processing, 12(6), 1286-1302.
Yakubov, A., Shbair, W., & State, R. (2018). BlockPGP: A Blockchain-based Framework for PGP Key Servers. The Sixth International Symposium on Computing and Networking (November 27-30, 2018). Hida Takayama, Japan: IEEE Xplore.
Lopez Becerra, J. M., Roenne, P., Ryan, P., & Sala, P. (2018). HoneyPAKEs. Security Protocols XXVI: Lecture Notes in Computer Science (pp. 63-77). Springer International Publishing.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, November 27). Ecological Advanced Driver Assistance System for Optimal Energy Management in Electric Vehicles. IEEE Intelligent Transportation Systems Magazine.
Bandi, A., Shankar, B., Chatzinotas, S., & Ottersten, B. (2018). A Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels. In A., Bandi, B., Shankar, S., maleki, S., Chatzinotas, & B., Ottersten, 6th IEEE Global Conference on Signal and Information Processing, November 26–29, 2018 Anaheim, California, USA (pp. 1-5). Anaheim, California, USA: IEEE.
Bartolini, C., Lenzini, G., & Santos, C. (2018, November 12). An Interdisciplinary Methodology to Validate Formal Representations of Legal Text Applied to the GDPR. Paper presented at Twelfth International Workshop on Juris-informatics (JURISIN 2018), Yokohama, Japan.
Khan, N. (2018, November 04). FAST: A MapReduce Consensus for High Performance Blockchains. ACM BlockSys'18 Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems.
Atashpendar, A., Policharla, G. V., Roenne, P., & Ryan, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (pp. 104-120). Springer.
Mund, S., Frank, R., Varisteas, G., & State, R. (2018). Visualizing the Learning Progress of Self-Driving Cars. 21st International Conference on Intelligent Transportation Systems (pp. 2358-2363). IEEE.
Baptista, R., Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation-Based Abnormal Motion Detection using 3D Skeletons. IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA).
Biryukov, A., & Udovenko, A. (2018). Attacks and Countermeasures for White-box Designs. In T., Peyrin & S., Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing.
Charlier, J. H. J., Falk, E., State, R., & Hilger, J. (2018, November). User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition. Proceedings of 2018 IEEE International Conference on Data Mining Workshops (ICDMW).
Cheng, H., Dinu, D.-D., & Groszschädl, J. (2018). Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers. In J.-L., Lanet & C., Toma (Eds.), Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (pp. 273-287). Springer Verlag.
Dong, F., Wang, H., Li, L., Guo, Y., Bissyande, T. F. D. A., Liu, T., Xu, G., & Klein, J. (2018). FraudDroid: Automated Ad Fraud Detection for Android Apps. ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268).
Fletcher, S., De Vries, M., & Max, C. (2018). Die technische Mündigkeit von Schüler/-innen zum Ende der Sek. I im internationalen Vergleich – Entwicklung eines Testwerkinstruments und erste Ergebnisse. Journal of Technical Education, 6(4).
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Power Minimizer Symbol-Level Precoding: A Closed-Form Sub-Optimal Solution. IEEE Signal Processing Letters, 25(11), 1730-1734.
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-Level Precoding Design Based on Distance Preserving Constructive Interference Regions. IEEE Transactions on Signal Processing, 66(22), 5817-5832.
Joroughi, V., Lagunas, E., Andrenacci, S., Maturo, N., Chatzinotas, S., Grotz, J., & Ottersten, B. (2018). Deploying Joint Beamforming and Precoding in Multibeam Satellite Networks with Time Variant Traffic. IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, California, USA.
Msadek, M. N., Soua, R., Ladid, L., & Engel, T. (2018). Advancing the Security of Trustworthy Self-IoT (Position Paper). International Conference on Smart Applications, Communications and Networking (SmartNets).
Vazquez Sandoval, I., Lenzini, G., & Stojkovski, B. (2018). A Protocol to Strengthen Password-Based Authentication. Emerging Technologies for Authorization and Authentication (pp. 38-46).
Lopez Becerra, J. M., Ostrev, D., & Skrobot, M. (2018). Forward Secrecy for SPAKE2. In J., Baek & S., Willy (Eds.), Provable Security (pp. 366-384). Springer International Publishing.
Mengali, A. (2018). Link Optimization in Future Generation Satellite Systems. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Shankar, B. (Promotor), Nejati, S., Alagha, N., Luise, M., & Liolis, K.
Wang, J. (2018). Privacy-preserving Recommender Systems Facilitated By The Machine Learning Approach. Unpublished doctoral thesis, University of Luxembourg, ​Esch-sur-Alzette, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Tang, Q., DOMINGO-FERRER, J., & PALAMIDESSI, C.
Pilgun, A., Gadyatskaya, O., Dashevskyi, S., Zhauniarovich, Y., & Kushniarou, A. (2018, October 15). DEMO: An Effective Android Code Coverage Tool. Poster session presented at Conference on Computer and Communications Security.
Samir Labib, N., Liu, C., Esmaeilzadeh Dilmaghani, S., Brust, M., Danoy, G., & Bouvry, P. (2018). White Paper: Data Protection and Privacy in Smart ICT - Scientific Research and Technical Standardization (1.0). Luxembourg: ILNAS.
Fotiadis, G., & Martindale, C. (2018). Optimal TNFS-secure pairings on elliptic curves with even embedding degree. Eprint/Working paper retrieved from https://eprint.iacr.org/2018/969.
Jimenez, M., Titcheu Chekam, T., Cordy, M., Papadakis, M., Kintis, M., Le Traon, Y., & Harman, M. (2018, October 11). Are mutants really natural? A study on how “naturalness” helps mutant selection. Proceedings of 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18).
Jimenez, M. (2018). Evaluating Vulnerability Prediction Models. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Kelsen, P., Papadakis, M., Sarro, F., & Blanc, X.
Artiga, X., Pérez-Neira, Baranda, Lagunas, E., Chatzinotas, S., Zetik, R., Gorski, P., Ntougias, K., Pérez, D., & Ziaragkas, G. (2018, October). Shared Access Satellite-Terrestrial Reconfigurable Backhaul Network Enabled by Smart Antennas at MmWave Band. IEEE Network.
Dashevskyi, S., Gadyatskaya, O., Pilgun, A., & Yury, Z. (2018, October). The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. Poster session presented at The 25th ACM Conference on Computer and Communications Security, Toronto, Canada.
Dou, W., Bianculli, D., & Briand, L. (2018). Model-Driven Trace Diagnostics for Pattern-based Temporal Specifications. Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (pp. 277-288). New York, USA: ACM.
Gonzalez Perez, C. A., Varmazyar, M., Nejati, S., Briand, L., & isasi, Y. (2018). Enabling Model Testing of Cyber-Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18).
Jhawar, R., Lounis, K., Mauw, S., & Ramirez Cruz, Y. (2018). Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library. In S., Katsikas & C., Alcaraz (Eds.), Security and Trust Management. STM 2018 (pp. 85-101). Springer.
Kreutz, D., Yu, J., Verissimo, P., Ramos, F., & Magalhaes, C. (2018). The KISS principle in Software-Defined Networking: a framework for secure communications. IEEE Security & Privacy Magazine, 16(05), 60-70.
Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223).
Merlano Duncan, J. C., Krivochiza, J., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018, October). Hardware Demonstration of Precoded Communications in Multi-Beam UHTS Systems. Paper presented at 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada.
Pejo, B., Tang, Q., & Gergely, B. (2018, October). The Price of Privacy in Collaborative Learning. Poster session presented at The 25th ACM Conference on Computer and Communications Security, Toronto, Canada.
Roenne, P., Ryan, P., & Zollinger, M.-L. (2018). Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/37857.
Sedighi, S., Shankar, B., & Ottersten, B. (2018, October). A Statistically Efficient Estimator for Co-array Based DoA Estimation. Poster session presented at The Asilomar Conference on Signals, Systems, and Computers.
Shin, S. Y., Chaouch, K., Nejati, S., Sabetzadeh, M., Briand, L., & Zimmer, F. (2018). HITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18).
Soua, R., Palattella, M. R., & Engel, T. (2018). IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks. IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks.
Vu, T. X., Maturo, N., Vupalla, S., Chatzinotas, S., Grotz, J., & Alagha, N. (2018, October). Efficient 5G Edge Caching Over Satellite. Paper presented at 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls.
Wang, J., Arriaga, A., Tang, Q., & Ryan, P. (2018, October). Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. Poster session presented at the 2018 ACM SIGSAC Conference.
Kubler, S., Derigent, W., Voisin, A., Robert, J., Le Traon, Y., & Herrera Viedma, E. (2018, September 27). Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index. Knowledge-Based Systems.
Annaiyan, A. (2018). Collision-Free Navigation of Small UAVs in Complex Urban Environment. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor).
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018). TUNA: TUning Naturalness-based Analysis. 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018.
Fröhlich, A. A., Scheffel, M. R., Kozhaya, D., & Verissimo, P. (2018, September 19). Byzantine Resilient Protocol for the IoT. IEEE Internet of Things Journal.
Bandi, A. (2018). Sparsity-Aided Low-Implementation cost based On-Board beamforming Design for High Throughput Satellite Systems. In A., Bandi, V., Joroughi, B., Shankar, J., grotz, & B., Ottersten, 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC),Berlin, Sept. 10-12, 2018 (pp. 1-6).
Bavle, H., Sanchez Lopez, J. L., de la Puente, P., Rodriguez-Ramos, A., Sampedro, C., & Campoy, P. (2018). Fast and Robust Flight Altitude Estimation of Multirotor UAVs in Dynamic Unstructured Environments Using 3D Point Cloud Sensors. Aerospace, 5(3).
Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018, September 03). Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability, 1-22.
Appelt, D., Nguyen, D. C., Panichella, A., & Briand, L. (2018). A Machine Learning-Driven Evolutionary Approach for Testing Web Application Firewalls. IEEE Transactions on Reliability, 67(3), 733-757.
Basili, V., Briand, L., Bianculli, D., Nejati, S., Pastore, F., & Sabetzadeh, M. (2018). Software Engineering Research and Industry: A Symbiotic Relationship to Foster Impact. IEEE Software, 35(5), 44-49.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2018). Model-driven Run-time Enforcement of Complex Role-based Access Control Policies. Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (pp. 248-258). New York, USA: ACM.
Gerard, B., Bezzaoucha, S., Voos, H., & Darouach, M. (2018). Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks. Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks.
Glauner, P. (2018). Künstliche Intelligenz - die nächste Revolution (The Artificial Intelligence Revolution). In P., Plugmann, Innovationsumgebungen gestalten: Impulse für Start-ups und etablierte Unternehmen im globalen Wettbewerb. Springer.
Jafarnejad, S., Castignani, G., & Engel, T. (2018). Revisiting Gaussian Mixture Models for Driver Identification. Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018).
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018, September). On the impact of tokenizer and parameters on N-gram based Code Analysis. Paper presented at 34th IEEE International Conference on Software Maintenance and Evolution (ICSME'18), Madrid, Spain.
Liu, K., Kim, D., Koyuncu, A., Li, L., Bissyande, T. F. D. A., & Le Traon, Y. (2018). A Closer Look at Real-World Patches. 34th IEEE International Conference on Software Maintenance and Evolution (ICSME).
Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Automated Identification of Desynchronisation Attacks on Shared Secrets. Automated Identification of Desynchronisation Attacks on Shared Secrets. Springer.
Mouline, L., Benelallam, A., Fouquet, F., Bourcier, J., & Barais, O. (2018). A Temporal Model for Interactive Diagnosis of Adaptive Systems. In L., Mouline, A., Benelallam, F., Fouquet, J., Bourcier, & O., Barais, 2018 IEEE International Conference on Autonomic Computing (ICAC).
Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2018). Experimental validation of adaptive control for a Shape Memory Alloy actuated lightweight robotic arm. ASME 2018 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems, San Antonio 10-12 September 2018.
Tessaro Lunardi, W., Voos, H., & Cherri, L. H. (2018). An Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem. 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (pp. 8).
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Parallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression. Proc. 26th European Signal Processing Conference.
Bezzaoucha, S., & Voos, H. (2018, August 29). A Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach. Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018.
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-Level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels. International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata 25-28 June 2018.
Lagraa, S., Charlier, J. H. J., & State, R. (2018, August 20). Knowledge Discovery Approach from Blockchain, Crypto-currencies, and Financial Stock Exchanges. Poster session presented at 2018 ACM SIGKDD International Conference on Knowledge Discovery and Data mining conference (KDD 2018).
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018, August). Resource Allocation and Relay Selection for Multi-User OFDM-Based Cooperative Networks with SWIPT. Paper presented at IEEE 15th Int. Symp. on Wireless Comm. Systems 2018 (ISWCS’18), Lisbon, Portugal.
Ibrahim, A. A. Z. A., Wasim, M. U., Varrette, S., & Bouvry, P. (2018). PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services. Mobile Information Systems, 2018(1351386).
Lei, L., Chang, Z., Hu, Y., Ristaniemi, T., Yuan, Y., & Chatzinotas, S. (2018). Energy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems. IEEE/CIC International Conference on Communications in China (ICCC 2018).
Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2018). Anonymising social graphs in the presence of active attackers. Transactions on Data Privacy, 11(2), 169-198.
Sleimi, A., Sannier, N., Sabetzadeh, M., Briand, L., & Dann, J. (2018). Automated Extraction of Semantic Legal Metadata Using Natural Language Processing. the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (pp. 124-135).
Atashpendar, A., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. Eprint/Working paper retrieved from https://arxiv.org/abs/1807.11609.
Steichen, M., Fiz Pontiveros, B., Norvill, R., Shbair, W., & State, R. (2018). Blockchain-Based, Decentralized Access Control for IPFS. The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (pp. 1499-1506). Halifax, Canada: IEEE.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018). Stochastic Optimum Energy Management for Advanced Transportation Network. 15th IFAC Symposium on Control in Transportation Systems CTS 2018 (pp. 317-322). Savona, Italy: Elsevier.
Dentler, J. E. (2018). Real-time Model Predictive Control for Aerial Manipulation. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Hadji-Minaglou, J.-R., Kannan, S., Antonelli, G., & Kayacan, E.
Mazzali, N., Boumard, S., Kinnunen, J., Shankar, B., Kiviranta, M., & Alagha, N. (2018, July 10). Enhancing mobile services with DVB-S2X superframing. International Journal of Satellite Communications and Networking, 1-25.
Norvill, R., Fiz Pontiveros, B., State, R., & Cullen, A. (2018, July 09). Visual emulation for Ethereum's virtual machine. NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
Arora, A., Maleki, S., Shankar, B., Grotz, J., & Ottersten, B. (2018). Interference Localization On-Board the Satellite Using Drift Induced Virtual Array. Proc. 2018 International Conference on Signal Processing and Communications (SPCOM).
Camino, R. D., Hammerschmidt, C., & State, R. (2018, July). Generating Multi-Categorical Samples with Generative Adversarial Networks. Paper presented at ICML 2018 workshop on Theoretical Foundations and Applications of Deep Generative Models, Stockholm, Sweden.
Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. IEEE Transactions on Communications, 66(6), 3108-3121.
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Configuring use case models in product families. Software & Systems Modeling, 17(3), 939-971.
Hammes, C., Shankar, B., & Ottersten, B. (2018, July). Block Circulant Decomposition of Cross-Correlation Matrix for Transmit MIMO Beamforming. Poster session presented at 10th IEEE SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP.
Lei, L., Vu, T. X., You, L., Fowler, S., & Yuan, D. (2018). Efficient Minimum-Energy Scheduling with Machine-Learning based Predictions for Multiuser MISO Systems. 2018 IEEE International Conference on Communications (ICC).
Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM.
Sedighi, S., Shankar, B., Maleki, S., & Ottersten, B. (2018, July). CONSISTENT LEAST SQUARES ESTIMATOR FOR CO-ARRAY-BASED DOA ESTIMATION. Poster session presented at THE TENTH IEEE SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP.
Shin, S. Y., Nejati, S., Sabetzadeh, M., Briand, L., & Zimmer, F. (2018). Test Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach. Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18). New York, USA: ACM.
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive convex approximation algorithms for sparse signal estimation with nonconvex regularizations. Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop.
You, L., Yuan, D., Lei, L., Sun, S., Chatzinotas, S., & Ottersten, B. (2018, July). Resource Optimization With Load Coupling in Multi-Cell NOMA. IEEE Transactions on Wireless Communications.
Spano, D. (2018). Advanced Symbol-level Precoding Schemes for Interference Exploitation in Multi-antenna Multi-user Wireless Communications. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor), Lenzini, G., Ottersten, B., Wong, K.-K., & Krause, J.
Bezzaoucha, S., Voos, H., Davila, J., & Bejarano, J. (2018, June 27). A Decoupling Approach to Design Observers for Polytopic Takagi-Sugeno Models Subject to Unknown Inputs. Proceedings of the 2018 American Control Conference.
Camino, R. D. (2018, June 27). GAN Applications with Discrete Data. Poster session presented at 2nd Data Science Summer School (DS3), Paris, France.
Gerard, B., Bezzaoucha, S., Voos, H., & Darouach, M. (2018, June 27). Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection. Proceedings of the 2018 American Control Conference.
Cao, T., Yu, J., Decouchant, J., & Verissimo, P. (2018, June 25). Revisiting Network-Level Attacks on Blockchain Network. Paper presented at DSN Workshop on Byzantine Consensus and Resilient Blockchains.
Benedick, P.-L., Robert, J., Le Traon, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a performance analysis. O-MI/O-DF vs. MQTT: a performance analysis.
Signorello, S. (2018). A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks. Unpublished doctoral thesis, University of Luxembourg University of Lorraine, ​Luxembourg Nancy, ​​Luxembourg France.
Jury: State, R. (Promotor), Festor, O. (Promotor), Rodošek, G., Engel, T., Palattella, M. R., François, J., & Laurent, M.
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Highway Network Block with Gates Constraints for Training Very Deep Networks. 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop, June 18-22, 2018. Utah, US.
Demisse, G., Papadopoulos, K., Aouada, D., & Ottersten, B. (2018). Pose Encoding for Robust Skeleton-Based Action Recognition. CVPRW: Visual Understanding of Humans in Crowd Scene, Salt Lake City, Utah, June 18-22, 2018.
Bartel, A., Klein, J., & Le Traon, Y. (2018). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks (TR-SNT-2018-3). Université du Luxembourg.
Lei, L., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018). NOMA Aided Interference Management for Full-Duplex Self-Backhauling HetNets. IEEE Communications Letters, 22(8), 1696-1699.
Laskaris, G., Seredynski, M., & Viti, F. (2018, June 12). Improving Public Transport Service Regularity using Cooperative Driver Advisory Systems. Paper presented at 2nd Symposium on Management of Future Motorway and Urban Traffic Systems, Ispra, Italy.
Adamsky, F., Retunskaia, T., Schiffner, S., & Engel, T. (2018). POSTER: WLAN Device Fingerprinting using Channel State Information (CSI). 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec).
Castillo Lopez, M., Sajadi Alamdari, S. A., Sanchez Lopez, J. L., Olivares Mendez, M. A., & Voos, H. (2018). Model Predictive Control for Aerial Collision Avoidance in Dynamic Environments. 26th Mediterranean Conference on Control and Automation (MED), Zadar, Croatia, 19-22 June 2018.
Chang, Z., Lei, L., Zhou, Z., Mao, S., & Ristaniemi, T. (2018, June). Learn to Cache: Machine Learning for Network Edge Caching in the Big Data Era. IEEE Wireless Communications.
Derrmann, T., Frank, R., Engel, T., & Viti, F. (2018, June). Using mobile phone data for urban network state estimation. Paper presented at 2nd Symposium on Management of Future motorway and urban Traffic Systems, Ispra, Italy.
Giotti, D., Lamorte, L., Soua, R., Palattella, M. R., & Engel, T. (2018). Performance Analysis of CoAP under Satellite Link Disruption. Performance Analysis of CoAP under Satellite Link Disruption.
Krivochiza, J., Merlano Duncan, J. C., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018). Computationally and Energy Efficient Symbol-Level Precoding Communications Demonstrator. Physical Communication, 28, 108-115.
Krüger, K., Volp, M., & Fohler, G. (2018). Vulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems. LIPIcs-Leibniz International Proceedings in Informatics, 106, 22:1--22:17.
Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018). Carrier Allocation for 5G Integrated Satellite-Terrestrial Backhaul Networks. International Conference on Communications (ICT), Saint-Malo, France, June 2018.
Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (2018, June). An Offline Dictionary Attack Against zkPAKE Protocol. Poster session presented at WiSec2018, Stockholm, Sweden.
Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2018). Adaptive control for a lightweight robotic arm actuated by a Shape Memory Allow wire. 16th International Conference on New Actuators, Bremen 25-27 June 2018.
Sanchez Lopez, J. L., Olivares Mendez, M. A., Castillo Lopez, M., & Voos, H. (2018). Towards trajectory planning from a given path for multirotor aerial robots trajectory tracking. 2018 International Conference on Unmanned Aircraft Systems (ICUAS), Dallas 12-15 June 2018. Dallas, USA.
Tessaro Lunardi, W., Cherri, L. H., & Voos, H. (2018). A Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints. 17th International Conference on Artificial Intelligence and Soft Computing, Zakopane, Poland, June 3-7, 2018.
Tessaro Lunardi, W., & Voos, H. (2018). An Extended Flexible Job Shop Scheduling Problem with Parallel Operations. ACM SIGAPP Applied Computing Review, 18(2), 46-56.
Vazquez Sandoval, I., & Lenzini, G. (2018). Experience report: How to extract security protocols’ specifications from C libraries. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (pp. 719-724). IEEE.
Vu, T. X., Chatzinotas, S., Ottersten, B., & Duong, T. Q. (2018). Energy Minimization for Cache-Assisted Content Delivery Networks With Wireless Backhaul. IEEE Wireless Communications Letters, 7(3), 332 - 335.
Baptista, R., Ghorbel, E., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Key-Skeleton Based Feedback Tool for Assisting Physical Activity. 2018 Zooming Innovation in Consumer Electronics International Conference (ZINC), 30-31 May 2018.
Volp, M., & Verissimo, P. (2018, May 29). Intrusion-Tolerant Autonomous Driving. Proceedings of 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC).
Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. International Conference on Software Engineering (ICSE 2018).
Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., & Alexandrov, Y. (2018, May 27). SmartCheck: Static Analysis of Ethereum Smart Contracts. Paper presented at 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, Gothenburg, Sweden.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2018). A Competitive Approach for Bi-Level Co-Evolution. 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).
Symeonidis, I. (2018). Analysis and Design of Privacy-Enhancing Information Sharing Systems. Unpublished doctoral thesis, KU Leuven, ​Leuven, ​​Belgium.
Jury: Preneel, B. (Promotor).
Di Maio, A., Soua, R., Palattella, M. R., & Engel, T. (2018). ROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs. ROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs.
Abu Shaban, Z., Mehrpouyan, H., Shankar, B., & Ottersten, B. (2018). Reduced complexity satellite broadcast receiver with interference mitigation in correlated noise. International Journal of Satellite Communications and Networking, 36(5).
Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018, May 14). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382.
Biryukov, A., Khovratovich, D., & Tikhomirov, S. (2018, May 09). Privacy-preserving KYC on Ethereum. Paper presented at 1st ERCIM Blockchain Workshop 2018, Amsterdam, The Netherlands.
Gonzalez Perez, C. A., Varmazyar, M., Nejati, S., Briand, L., & Isasi, Y. (2018). A SysML-Based Methodology for Model Testing of Cyber-Physical Systems (TR-SNT-2018-2). Luxembourg, Luxembourg: University of Luxembourg.
Bianculli, D., Medvidović, N., & Rosenblum, D. R. (Eds.). (2018). 40 editions of ICSE: the ruby anniversary celebration. self-published.
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Change Impact Analysis for Evolving Configuration Decisions in Product Line Use Case Models. Journal of Systems and Software, 139, 211-237.
Lei, L., You, L., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Efficient Resource Optimization in Wireless Networks: A Deep-Learning Assisted Approach. 2018 INFORMS Telecommunications Conference.
Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM.
Liu, C., Varrette, S., Brust, M. R., Danoy, G., & Bouvry, P. (2018, May). A Standardized Broker Model in Smart Cities. Poster session presented at 17th Annual STS Conference Graz 2018 Critical Issues in Science, Technology and Society Studies, Graz, Austria.
Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS.
Samir Labib, N., Brust, M. R., Danoy, G., & Bouvry, P. (2018, May). On Standardised UAV Localisation and Tracking Systems in Smart Cities. Poster session presented at 17th Annual STS Conference Graz 2018 Critical Issues in Science, Technology and Society Studies.
Vazquez, M.-A., Shankar, B., Kourogiorgas, C., Arapoglou, P.-D., Icolari, V., Chatzinotas, S., Panagopoulos, A., & Perez-Neira, A. (2018). Precoding, Scheduling and Link Adaptation in Mobile Interactive Multibeam Satellite Systems. IEEE Journal on Selected Areas In Communications, 36(5), 971 - 980.
Vu, T. X., Lei, L., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2018). Energy-efficient design for latency-tolerant content delivery networks. 2018 IEEE Wireless Communications and Networking Conference (WCNC).
Vu, T. X., Lei, L., Vuppala, S., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2018). Latency Minimization for Content Delivery Networks with Wireless Edge Caching. 2018 IEEE International Conference on Communications (ICC).
Xue, J., Biswas, S., Cirik, A. C., Du, H., Yang, Y., Ratnarajah, T., & Sellathurai, M. (2018). Transceiver design of optimum wirelessly powered full-duplex MIMO IoT devices. IEEE Transactions on Communications, 66(5), 1955 - 1969.
Wang, Q., Hao, Y., Todo, Y., Li, C., Isobe, T., & Meier, W. (2018). Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. 38th Annual International Cryptology Conference (CRYPTO 2018), Santa Barbara 19-23 Aug 2018 (pp. 275-305). Springer.
Sajadi Alamdari, S. A. (2018). Stochastic Model Predictive Control for Eco-Driving Assistance Systems in Electric Vehicles. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Hadji-Minaglou, J.-R. (Promotor), Darouach, M. (Promotor), Viti, F., & Wang, M.
Dentler, J. E., Rosalie, M., Danoy, G., Bouvry, P., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2018, April 20). Collision Avoidance Effects on the Mobility of a UAV Swarm Using Chaotic Ant Colony with Model Predictive Control. Journal of Intelligent \& Robotic Systems, 1-17.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). PAPR Minimization through Spatio-temporal Symbol-level Precoding for the Non-linear Multi-user MISO Channel. 2018 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018).
Joroughi, V., Shankar, B., Maleki, S., Chatzinotas, S., Grotz, J., & Ottersten, B. (2018). Designing Joint Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System. IEEE WCNC 2018.
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018, April 17). Optimal Relay Selection Strategy for Joint Data and Energy Transfer in Wireless Systems. Paper presented at 2018 IEEE Wireless Communications and Networking Conference (WCNC): IEEE WCNC2018 Student Program, Barcelona, Spain.
Gautam, S., Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018, April 16). Joint Wireless Information and Energy Transfer in Cache-assisted Relaying Systems. Paper presented at 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.
Vuppala, S., Vu, T. X., Gautam, S., Chatzinotas, S., & Ottersten, B. (2018, April 16). Cache-Aided Millimeter Wave Ad-Hoc Networks. Paper presented at 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.
Mouline, L., Benelallam, A., Hartmann, T., Fouquet, F., Bourcier, J., Morin, B., & Barais, O. (2018, April 09). Enabling Temporal-Aware Contexts for Adaptative Distributed Systems. SAC 2018: SAC 2018: Symposium on Applied Computing , April 9--13, 2018, Pau, France.
Sanchez Lopez, J. L., Wang, M., Olivares Mendez, M. A., Molina, M., & Voos, H. (2018, April 07). A Real-Time 3D Path Planning Solution for Collision-Free Navigation of Multirotor Aerial Robots in Dynamic Environments. Journal of Intelligent and Robotic Systems.
Thome, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Bianculli, D. (Promotor), Sabetzadeh, M., Denaro, G., & Gorla, A.
Alodeh, M., Spano, D., Kalantari, A., Tsinos, C., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2018, April). Symbol-level and Multicast Precoding for Multiuser Multiantenna Downlink: A State-of-the-art, Classification and Challenges. IEEE Communications Surveys and Tutorials.
Charlier, J. H. J., & State, R. (2018). Non-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network for Smart Contracts Profiling. International Journal of Computer & Software Engineering, 3(1).
Fouquet, F., Hartmann, T., Mosser, S., & Cordy, M. (2018). Enabling lock-free concurrent workers over temporal graphs composed of multiple time-series. 33rd Annual ACM Symposium on Applied Computing (SAC'18).
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Constructive Interference for Generic Constellations. IEEE Signal Processing Letters, 25(4), 586-590.
Le Corre, Y., Groszschädl, J., & Dinu, D.-D. (2018). Micro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In J., Fan & B., Gierlichs, Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (pp. 82-98). Springer.
Le Corre, Y., Groszschädl, J., & Dinu, D.-D. (2018). Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In J., Fan & B., Gierlichs, Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (pp. 82-98). Springer Verlag.
Matthiesen, B., Yang, Y., & Jorswieck, E. (2018). Optimization of weighted individual energy efficiencies in interference networks. Proc. IEEE Wireless Communications and Networking Conference.
Rahli, V., Vukotic, I., Volp, M., & Verissimo, P. (2018). Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq. ESOP 2018.
Tessaro Lunardi, W., & Voos, H. (2018). Comparative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization. 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 9 - 13, 2018.
Wang, Q., Grassi, L., & Rechberger, C. (2018). Zero-Sum Partitions of PHOTON Permutations. In N. P., Smart (Ed.), Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018 Proceedings (pp. 279-299). Springer.
Yang, Y., & Pesavento, M. (2018). Energy efficiency in MIMO interference channels: Social optimality and max-min fairness. Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal.
Yang, Y., & Pesavento, M. (2018). A parallel best-response algorithm with exact line search for nonconvex sparsity-regularized rank minimization. Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal.
Vuppala, S., Vu, T. X., Gautam, S., Chatzinotas, S., & Ottersten, B. (2018, March 25). Cache-Aided Millimeter Wave Ad-Hoc Networks with Contention-Based Content Delivery. IEEE Transactions on Communications.
Liu, B., Nejati, S., Lucia, L., & Briand, L. (2018). Effective Fault Localization of Automotive Simulink Models: Achieving the Trade-Off between Test Oracle Effort and Fault Localization Accuracy. Empirical Software Engineering, 24(1), 444-490.
Toader, B., Moawad, A., Fouquet, F., Hartmann, T., Popescu, M., & Viti, F. (2018). A New Modelling Framework over Temporal Graphs for Collaborative Mobility Recommendation Systems. A New Modelling Framework over Temporal Graphs for Collaborative Mobility Recommendation Systems.
Politis, C. (2018). Spectrum Monitoring Algorithms for Wireless and Satellite Communications. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg City, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor).
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). Symbol-Level Precoding for the Nonlinear Multiuser MISO Downlink Channel. IEEE Transactions on Signal Processing, 66(5), 1331 - 1345.
Alferez, M., Acher, M., Galindo, J., Baudry, B., & Benavides, D. (2018, March). Modeling Variability in the Video Domain: Language and Experience Report. Software Quality Journal.
Jafarnejad, S., Castignani, G., & Engel, T. (2018). Non-intrusive Distracted Driving Detection Based on Driving Sensing Data. 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2018).
Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. 21st International Conference on Extending Database Technology.
Shamshiri, Rojas, Gazzola, Fraser, McMinn, Mariani, & Arcuri, A. (2018). Random or Evolutionary Search for Object-Oriented Test Suite Generation? Software Testing, Verification & Reliability, 28(4), 1660.
Spano, D., Chatzinotas, S., Andrenacci, S., Krause, J., & Ottersten, B. (2018, March). Per-antenna Power Minimization in Symbol-level Precoding for the Multi-beam Satellite Downlink. International Journal of Satellite Communications and Networking.
Ruan, M., Titcheu Chekam, T., Zhai, E., Li, Z., Liu, Y., E, J., Cui, Y., & Xu, H. (2018). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE Transactions on Parallel and Distributed Systems, PP(99), 1-1.
Kieffer, E., Rosalie, M., Danoy, G., & Bouvry, P. (2018, February 26). Bayesian optimization to enhance coverage performance of a swarm of UAV with chaotic dynamics. Paper presented at International Workshop on Optimization and Learning: Challenges and Applications (OLA 2018), Alicante, Spain.
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). IMPROVING THE CAPACITY OF VERY DEEP NETWORKS WITH MAXOUT UNITS. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing.
Fotiadis, G., & Konstantinou, E. (2018). Generating Pairing-Friendly Elliptic Curve Parameters Using Sparse Families. Journal of Mathematical Cryptology, 12(2), 83-99.
Cazzato, D., Dominio, F., Manduchi, R., & Castro, S. (2018, February 07). Real-time gaze estimation via pupil center tracking. Paladyn. Journal of Behavioral Robotics.
Atashpendar, A., Beunardeau, M., Connolly, A., Géraud, R., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. Eprint/Working paper retrieved from https://arxiv.org/abs/1802.00703.
Panichella, A., Kifetew, F., & Tonella, P. (2018). Automated Test Case Generation as a Many-Objective Optimisation Problem with Dynamic Selection of the Targets. IEEE Transactions on Software Engineering, 44(2), 122 - 158.
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2018). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Electron Markets, 28(1), 53-75.
Fiz Pontiveros, B., Norvill, R., & State, R. (2018, February). Recycling Smart Contracts: Compression of the Ethereum Blockchain. Proceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018.
Liu, Z., Choo, K.-K. R., & Groszschädl, J. (2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine, 56(2), 158-162.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018, February). Edge-Caching Wireless Networks: Performance Analysis and Optimization. IEEE Transactions on Wireless Communications.
Biryukov, A., Dinu, D.-D., Le Corre, Y., & Udovenko, A. (2018). Optimal First-Order Boolean Masking for Embedded IoT Devices. CARDIS 2017: Smart Card Research and Advanced Applications (pp. 22-41). Springer, Cham.
Li, D. (2018). Transforming Time Series for Efficient and Accurate Classification. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J., Bissyande, T. F. D. A., Lin, J., & Geist, M.
Kubler, S., Robert, J., Neumaier, S., Umbrich, J., & Le Traon, Y. (2018, January 01). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly.
Afzal, H., Aouada, D., Mirbach, B., & Ottersten, B. (2018, January). Full 3D Reconstruction of Non-Rigidly Deforming Objects. ACM Transactions on Multimedia Computing, Communications, & Applications.
Baptista, R., Antunes, M., Aouada, D., & Ottersten, B. (2018). Anticipating Suspicious Actions using a Small Dataset of Action Templates. 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP).
Charlier, J. H. J., State, R., & Hilger, J. (2018). Non-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling. In J., Charlier, R., State, & J., Hilger, 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (pp. 74-81). IEEE Computer Society Conference Publishing Services (CPS).
Gadyatskaya, O., & Trujillo Rasua, R. (2018). New Directions in Attack Tree Research: Catching up with Industrial Needs. In S., Mauw, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer.
Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39.
Adamsky, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Di Giorgio, A., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proenca, J., Pucci, P., Rosa, L., & Soua, R. (2018). Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach. Elsevier International Journal of Critical Infrastructure Protection.
Alaee-Kerahroodi, M., Modarres-Hashemi, M., Naghsh, M. M. N., Shankar, B., & Ottersten, B. (2018). Binary Sequences set with small ISL for MIMO radar systems. 2018 26th European Signal Processing Conference (EUSIPCO). IEEE.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). User Selection for symbol-level multigroup multicasting precoding in the downlink of MISO channels. 2018 IEEE International Conference on Communications (ICC). IEEE.
An, K., Liang, T., Zheng, G., Yan, X., Li, Y., & Chatzinotas, S. (2018). Performance Limits of Cognitive Uplink FSS and Terrestrial FS for Ka-Band. IEEE Transactions on Aerospace and Electronic Systems.
Andrenacci, S., Duncan, J. C. M., Krivochiza, J., & Chatzinotas, S. (2018). Satellite Multi-Beam Precoding Hardware Demonstrator, Satellite Communications in the 5G Era. IET.
Antoniou, G., Baryannis, G., Batsakis, S., Governatori, G., Robaldo, L., Siragusa, G., & Tachmazidis, I. (2018). Legal Reasoning and Big Data: Opportunities and Challenges. Legal Reasoning and Big Data: Opportunities and Challenges.
Arcuri, A. (2018). Evaluating Search-Based Techniques With Statistical Tests. The Search-Based Software Testing (SBST) Workshop.
Arcuri, A. (2018). EvoMaster: Evolutionary Multi-context Automated System Test Generation. IEEE Conference on Software Testing, Validation and Verification.
Arcuri, A. (2018). An Experience Report On Applying Software Testing Academic Results In Industry: We Need Usable Automated Test Generation. Empirical Software Engineering, 23(4).
Bana, G., Chadha, R., & Eeralla, A. (2018). Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker. Computer Security (pp. 350–372).
Baniasadi, Z., Parent, X., Max, C., & Creamer, M. (2018). A Model for Regulating of Ethical Preferences in Machine Ethics. Proceedings of International Conference on Human-Computer Interaction, 481-506.
Barragán-Ramírez, G. A., Estrada-Moreno, A., Ramirez Cruz, Y., & Rodríguez-Velázquez, J. A. (2018). The Local Metric Dimension of the Lexicographic Product of Graphs. Bulletin of the Malaysian Mathematical Sciences Society.
Bartel, A. (2018). Exploitation du CVE-2015-4843. Multi-System & Internet Security Cookbook, 95.
Bartel, A., & Doe, J. (2018). Twenty years of Escaping the Java Sandbox. Phrack.
Bartel, A., Klein, J., & Le Traon, Y. (2018). Désérialisation Java : Une brève introduction. Multi-System & Internet Security Cookbook, 100.
Bartel, A., Klein, J., & Le Traon, Y. (2018). Fini le Bac à Sable. Avec le CVE-2017-3272, devenez un grand! Multi-System & Internet Security Cookbook, 97.
Bartolini, C., Santos, C., & Ullrich, C. (2018). Property and the Cloud. Computer Law & Security Report.
Ben Abdessalem (helali), R., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Vision-Based Control Systems Using Learnable Evolutionary Algorithms. Proceedings of the 40th International Conference on Software Engineering (ICSE 2018). ACM.
Ben Abdessalem (helali), R., Panichella, A., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Autonomous Cars for Feature Interaction Failures using Many-Objective Search. Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018).
Bezzaoucha, S., Voos, H., & Darouach, M. (2018). Attack-tolerant Control and Observer-based Trajectory Tracking for Cyber-Physical Systems. European Journal of Control.
Bickford, M., Cohen, L., Constable, R., & Rahli, V. (2018). Computability Beyond Church-Turing via Choice Sequences. LICS 2018.
Blanchet, B., & Smyth, B. (2018). Automated reasoning for equivalences in the applied pi calculus with barriers. Journal of Computer Security, 26(3), 367--422.
Cao, J., Li, Y., & Pang, J. (2018). L-CMP: an automatic learning-based parameterized verification tool. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (pp. 892-895). ACM.
Cazzato, D., Leo, M., Distante, C., Crifaci, G., Bernava, G. M., Ruta, L., Pioggia, G., & Castro, S. (2018). An Ecological Visual Exploration Tool to Support the Analysis of Visual Processing Pathways in Children with Autism Spectrum Disorders. Journal of Imaging.
Chang, Z., Lei, L., Zhang, H., Ristaniemi, T., Chatzinotas, S., Ottersten, B., & Han, Z. (2018). Energy-Efficient and Secure Resource Allocation for Multiple-Antenna NOMA with Wireless Power Transfer. IEEE Transactions on Green Communications and Networking.
Chen, J., Hossain, M. S., Brust, M. R., & Johnson, N. (2018). A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism. International Conference on Decision and Game Theory for Security.
Chothia, T., Ruiter, J. D., & Smyth, B. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.
Dashevskyi, S., Brucker, A. D., & Massacci, F. (2018). A Screening Test for Disclosed Vulnerabilities in FOSS Components. IEEE Transactions on Software Engineering, 1-1.
Decouchant, J., Fernandes, M., Volp, M., Couto, F. M., & Verissimo, P. (2018). Accurate filtering of privacy-sensitive information in raw genomic data. Journal of Biomedical Informatics.
Delavernhe, F., Saber, T., Papadakis, M., & Ventresque, A. (2018). A Hybrid Algorithm for Multi-objective Test Case Selection in Regression Testing. IEEE CONGRESS ON EVOLUTIONARY COMPUTATION.
Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation Based 3D Facial Expression Representation. ACM Transactions on Multimedia Computing, Communications, & Applications.
Dentler, J. E., Kannan, S., Bezzaoucha, S., Olivares-Mendez, M. A., & Voos, H. (2018). Model predictive cooperative localization control of multiple UAVs using potential function sensor constraints. Autonomous Robots, 1--26.
Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2018). Model-based mutant equivalence detection using automata language equivalence and simulations. Journal of Systems and Software.
Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (2018). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering.
Dokhanchi, S. H., Shankar, B., Stifter, T., & Ottersten, B. (2018). OFDM-based automotive joint radar-communication system. 2018 IEEE Radar Conference (RadarConf18). IEEE.
Dokhanchi, S. H., Shankar, B., Stifter, T. S., & Ottersten, B. (2018). Multicarrier phase modulated continuous waveform for automotive joint radar-communication system. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE.
Dominico, S., Almeida, E. C., Meira, J. A., & Alves, M. A. Z. (2018). An Elastic Multi-Core Allocation Mechanism for Database Systems. International Conference on Data Engineering (ICDE).
Domouchtsidis, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018). 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE.
Erata, F., Göknil, A., Kurtev, I., & Tekinerdogan, B. (2018). AlloyInEcore: Embedding of First-Order Relational Logic into Meta-Object Facility for Automated Model Reasoning. 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018).
Ferreira Torres, C., & Jonker, H. (2018). Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications. 23rd European Symposium on Research in Computer Security, Barcelona, Spain, September 3-7, 2018.
Fiz Pontiveros, B., Norvill, R., & State, R. (2018). Monitoring the transaction selection policy of Bitcoin mining pools. NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
Fraser, G., Rojas, J., & Arcuri, A. (2018). EvoSuite at the SBST 2018 Tool Competition. 2018 ACM/IEEE 11th International Workshop on Search-Based Software Testing.
Gao, J., Li, L., Pingfan, K., Tegawendé F., B., & Jacques, K. (2018). On Vulnerability Evolution in Android Apps. Poster session presented at ICSE.
Garousi, V., Felderer, M., Karapıçak, Ç. M., & Yılmaz, U. (2018). What we know about testing embedded software. IEEE Software, 35(4), 62-69.
Gautam, S., Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018). Cache-aided Simultaneous Wireless Information and Power Transfer (SWIPT) with Relay Selection. IEEE Journal on Selected Areas In Communications.
Genç, Z. A. (2018). Crypren Decryptor.
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing.
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer.
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. Advances in Cybersecurity 2018.
Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. Proceedings of the 4th International Conference on Information Systems Security and Privacy.
Gharanjik, A., Mishra, K. V., Shankar, B., & Ottersten, B. (2018). Learning-based rainfall estimation via communication satellite links. 2018 IEEE Statistical Signal Processing Workshop (SSP). IEEE.
Ghorbel, E., Boonaert, J., Boutteau, R., Lecoeuche, S., & Savatier, X. (2018). An extension of kernel learning methods using a modified Log-Euclidean distance for fast and accurate skeleton-based Human Action Recognition. Computer Vision and Image Understanding, 175, 32--43.
Ghorbel, E., Boutteau, R., Boonaert, J., Savatier, X., & Lecoeuche, S. (2018). Kinematic Spline Curves: A temporal invariant descriptor for fast action recognition. Image and Vision Computing, 77, 60--71.
Giudotti, A., Vanelli-Coralli, A., Conti, M., Andrenacci, S., Chatzinotas, S., Maturo, N., Evans, B., Awoseyila, A., Ugolini, T., Foggi, L., Gaudio, N., Alagha, N., & Cioni, S. (2018). Architectures and Key Technical Challenges for 5G Systems Incorporating Satellites. IEEE Transactions on Vehicular Technology.
Glauner, P., Meira, J. A., & State, R. (2018). Detection of Irregular Power Usage using Machine Learning. Paper presented at IEEE Conference on Innovative Smart Grid Technologies, Asia (ISGT Asia 2018), Singapore.
Glauner, P., Meira, J. A., & State, R. (2018). Machine Learning for Data-Driven Smart Grid Applications. Paper presented at IEEE Conference on Innovative Smart Grid Technologies, Asia (ISGT Asia 2018), Singapore.
Glauner, P., & State, R. (2018). Introduction to Machine Learning for Power Engineers. Paper presented at 10th IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC 2018), Kota Kinabalu, Malaysia.
Glauner, P., State, R., Valtchev, P., & Duarte, D. (2018). On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage. Proceedings 13th International FLINS Conference on Data Science and Knowledge Engineering for Sensing Decision Support (FLINS 2018).
Glauner, P., Valtchev, P., & State, R. (2018). Impact of Biases in Big Data. Proceedings of the 26th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2018).
Hochgeschwender, N., Biggs, G., & Voos, H. (2018). A Reference Architecture for Deploying Component-based Robot Software and Comparison with Existing Tools. Proceedings of the IEEE International Conference on Robotic Computing. IEEE.
Hooshiary, A., Azmi, P., Mokari, N., & Maleki, S. (2018). Optimal Channel Selection for Simultaneous RF Energy Harvesting and Data Transmission in Cognitive Radio Networks. Transactions on Emerging Telecommunications Technologies.
Jimenez, M., Le Traon, Y., & Papadakis, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. IEEE International Working Conference on Source Code Analysis and Manipulation.
Jordanou, J. P., Camponogara, E., Antonelo, E. A., & S. de Aguiar, M. A. (2018). Nonlinear Model Predictive Control of an Oil Well with Echo State Networks. IFAC-PapersOnLine, 51, 13 - 18.
Joroughi, V., Lagunas, E., Andrenacci, S., Maturo, N., Chatzinotas, S., & Ottersten, B. (2018). Deploying Joint Beamhopping and Precoding in Multibeam Satellite Networks. Global Conference on Signal and Information Processing (GlobalSIP). IEEE.
Joroughi, V., Shankar, B., Maleki, S., Chatzinotas, S., & Grotz, J. (2018). Precoder Design for Multibeam Mobile Satellite Systems. Proceedings of IEEE Asilomar Conference on Signals, Systems and Computers.
Joroughi, V., Shankar, B., Maleki, S., Chatzinotas, S., Grotz, J., & Ottersten, B. (2018). On-Board Precoding in a Multiple Gateway Multibeam Satellite System. Proceedings of IEEE VTC Fall 2018.
Kaiafas, G., Varisteas, G., Lagraa, S., & State, R. (2018). Detecting Malicious Authentication Events Trustfully. In G., Kaiafas, G., Varisteas, S., Lagraa, & R., State, IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World.
Kardaş, S., & Genç, Z. A. (2018). Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols. Wireless Personal Communications, 98(1), 1135-1154.
Kayhan, F., Haqiqatnejad, A., Grotz, J., & Alagha, N. (2018). Symbol vs Block Level Precoding in Multi-beam Satellite Systems. Symbol vs Block Level Precoding in Multi-beam Satellite Systems. IET.
Khan, N., Lahmadi, A., Francois, J., & State, R. (2018). Towards a Management Plane for Smart Contracts: Ethereum Case Study. NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., Malevris, N., & Le Traon, Y. (2018). How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empirical Software Engineering.
Kodheli, O., Andrenacci, S., Maturo, N., Chatzinotas, S., & Zimmer, F. (2018). Resource Allocation Approach for Differential Doppler Reduction in NB-IoT over LEO Satellite. 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 10-12 September 2018.
Lagunas, E., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018). Cross-Layer Forward Packet Scheduling for Emerging Precoded Broadband Multibeam Satellite System. 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 10-12 September 2018.
Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018). 2018 25th International Conference on Telecommunications (ICT). 2018 25th International Conference on Telecommunications (ICT). IEEE.
Lagunas, E., Marques, A. G., Chatzinotas, S., & Ottersten, B. (2018). Graph Similarity based on Graph Fourier Distances. European Signal Processing Conference (EUSIPCO), Rome, Italy, 3-7 September 2018.
Lambert, C., Fernandes, M., Decouchant, J., & Verissimo, P. (2018). MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX. Paper presented at 37th IEEE International Symposium on Reliable Distributed Systems.
Lauvås, P., & Arcuri, A. (2018). Recent Trends in Software Testing Education: A Systematic Literature Review. UDIT (The Norwegian Conference on Didactics in IT education).
Li, Y., Duan, K., Jansen, D., Pang, J., Zhang, L., Lv, Y., & Cai, S. (2018). An Automatic Proving Approach to Parameterized Verification. ACM Transactions on Computational Logic, 19(4), 1-27.
Lin, Z., Lin, M., Ouyang, J., Zhu, W.-P., & Chatzinotas, S. (2018). Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks. IEEE Signal Processing Letters.
Liu, K., Kim, D., Bissyande, T. F. D. A., Yoo, S., & Le Traon, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering.
Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Systems. 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18).
Mai, X. P., Göknil, A., Shar, L. K., Pastore, F., Briand, L., & Shaame, S. (2018). Modeling Security and Privacy Requirements: a Use Case-Driven Approach. Information and Software Technology, 100, 165-182.
Mai, X. P., Pastore, F., Göknil, A., & Briand, L. (2018). A Natural Language Programming Approach for Requirements-based Security Testing. 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018). IEEE.
Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology.
Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2018). Conditional adjacency anonymity in social graphs under active attacks. Knowledge and Information Systems.
Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Distance-Bounding Protocols: Verification without Time and Location. Proceedings of IEEE Symposium on Security and Privacy (SP), San Francisco 21-23 May 2018. NY: IEEE Computer Society.
Max, C. (2018). An activity theoretical research lens on inquiry-based learning. In M. J., de Vries, S., Fletcher, S., Kruse, P., Labudde, M., Lang, I., Mammes, C., Max, D., Münk, B., Nicholl, J., Strobel, & M., Winterbottom, Research in Technology Education: International Approaches (pp. 147-168). Münster, Germany: Waxmann.
Mesit, J., Brust, M. R., & Bouvry, P. (2018). Lightweight Key Agreement for Wireless Sensor Networks. 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
Messaoudi, S., Panichella, A., Bianculli, D., Briand, L., & Sasnauskas, R. (2018). A Search-based Approach for Accurate Identification of Log Message Formats. Proceedings of the 26th IEEE/ACM International Conference on Program Comprehension (ICPC ’18) (pp. 167-177). ACM.
Meyer, M., Quaglia, E. A., & Smyth, B. (2018). Attacks against GSMA's M2M Remote Provisioning. FC'18: 22nd International Conference on Financial Cryptography and Data Security. Springer.
Mirto, C., Yu, J., Rahli, V., & Verissimo, P. (2018). Probabilistic Formal Methods Applied to Blockchain’s Consensus Protocol. Paper presented at DSN Workshop on Byzantine Consensus and Resilient Blockchains.
Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2018). ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 277-284). Springer Science & Business Media B.V.
Mizera, A., Pang, J., Su, C., & Yuan, Q. (2018). ASSA-PBN: A Toolbox for Probabilistic Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15(4), 1203-1216.
Mizera, A., Pang, J., & Yuan, Q. (2018). Reviving the two-state Markov chain approach. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15(5), 1525-1537.
Neveu, E., Popov, P., Hoffmann, A., Migliosi, A., Besseron, X., Danoy, G., Bouvry, P., & Grudinin, S. (2018). RapidRMSD: Rapid determination of RMSDs corresponding to motions of flexible molecules. Bioinformatics.
Olszewski, M. A., Meder, J. A. A., Kieffer, E., Bleuse, R., Rosalie, M., Danoy, G., & Bouvry, P. (2018). Visualizing the Template of a Chaotic Attractor. 26th International Symposium on Graph Drawing and Network Visualization (GD 2018).
Ostaszewski, M., Kieffer, E., Danoy, G., Schneider, R., & Bouvry, P. (2018). Clustering approaches for visual knowledge exploration in molecular interaction networks. BMC bioinformatics, 19(1), 308.
Ostrev, D., & Vidick, T. (2018). Entanglement of Approximate Quantum Strategies in XOR Games. Quantum Information and Computation, 18(7&8), 0617–0631.
Palmirani, M., Bartolini, C., Martoni, M., Robaldo, L., & Rossi, A. (2018). Legal Ontology for Modelling GDPR Concepts and Norms. JURIX 2018 proceedings.
palmirani, M., Martoni, M., Rossi, A., Bartolini, C., & Robaldo, L. (2018). PrOnto: Privacy Ontology for Legal Reasoning. International Conference on Electronic Government and the Information Systems Perspective.
Palomba, F., Panichella, A., Zaidman, A., Oliveto, R., & De Lucia, A. (2018). The Scent of a Smell: An Extensive Comparison between Textual and Structural Smells. IEEE Transactions on Software Engineering, 44(10), 977-1000.
Pang, J., Zhang, C., He, J., & Weng, J. (Eds.). (2018). Proceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering. IEEE Computer Society.
Papadakis, M., Titcheu Chekam, T., & Le Traon, Y. (2018). Mutant Quality Indicators. 13th International Workshop on Mutation Analysis (MUTATION'18).
Papadopoulos, K., Antunes, M., Aouada, D., & Ottersten, B. (2018). A Revisit of Action Detection using Improved Trajectories. IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, Alberta, Canada, 15–20 April 2018.
Paul, S., Pang, J., & Su, C. (2018). On the Full Control of Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 313-317). Springer Science & Business Media B.V.
Paul, S., Pang, J., & Su, C. (2018). Towards the Existential Control of Boolean Networks: A Preliminary Report. Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (pp. 142-149). Springer Science & Business Media B.V.
Paul, S., Su, C., Pang, J., & Mizera, A. (2018). A Decomposition-based Approach towards the Control of Boolean Networks. Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM.
Pena, E. H. M., Falk, E., Meira, J. A., & Almeida, E. C. (2018). Mind Your Dependencies for Semantic Query Optimization. Journal of Information and Data Management.
Perera, T. D. P., Jayakody, D. N., Sharma, S. K., Chatzinotas, S., & Li, J. (2018). Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges. IEEE Communications Surveys and Tutorials, 20(1), 264-302.
Pinto Costa, A., Charpiot, L., Rodriguez Lera, F. J., Ziafati, P., Nazarikhorram, A., van der Torre, L., & Steffgen, G. (2018). More Attention and Less Repetitive and Stereotyped Behaviors using a Robot with Children with Autism. 27th IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN 2018, Nanjing, China, August 27-31, 2018.
Politis, C., Kalantari, A., Maleki, S., & Chatzinotas, S. (2018). On-board interference detection and localization for SATCOM, Satellite Communications in the 5G Era. IET.
Politis, C., Maleki, S., Merlano Duncan, J. C., Krivochiza, J., Chatzinotas, S., & Ottersten, B. (2018). SDR Implementation of a Testbed for Real-Time Interference Detection with Signal Cancellation. IEEE Access.
Quaglia, E. A., & Smyth, B. (2018). Authentication with weaker trust assumptions for voting systems. AFRICACRYPT'18: 10th International Conference on Cryptology in Africa. Springer.
Quaglia, E. A., & Smyth, B. (2018). Secret, verifiable auctions from elections. Theoretical Computer Science, 730, 44--92.
Rahli, V., Cohen, L., & Bickford, M. (2018). A Verified Theorem Prover Backend Supported by a Monotonic Library. LPAR 2018.
Rezazad, M., Brust, M. R., Akbari, M., Bouvry, P., & Cheung, N.-M. (2018). Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning. Advances in Intelligent Systems and Computing.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2018). Chaos-enhanced mobility models for multilevel swarms of UAVs. Swarm and Evolutionary Computation.
Saint, A. F. A., Ahmed, E., Shabayek, A. E. R., Cherenkova, K., Gusev, G., Aouada, D., & Ottersten, B. (2018). 3DBodyTex: Textured 3D Body Dataset. 2018 Sixth International Conference on 3D Vision (3DV 2018).
Schiffner, S., Berendt, B., Siil, T., Degeling, M., Riemann, R., Schaub, F., Wuyts, K., Attoresi, M., Gürses, S., Klabunde, A., Polonetsky, J., Sadeh, N., & Zanfir-Fortuna, G. (2018). Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation : A transatlantic initiative. In N., Tsouroulas, K., Rannenberg, & M., Medina (Ed.), proceedings of the Annual Privacy Forum 2018.
Shaat, M., Lagunas, E., Pérez-Neira, A., & Chatzinotas, S. (2018). Integrated Terrestrial-Satellite Wireless Backhauling: Resource Management and Benefits for 5G. IEEE Vehicular Technology Magazine.
Shankar, B., Joroughi, V., Maleki, S., Chatzinotas, S., & Grotz, J. (2018). On-Board Precoding in a Multiple Gateway Multibeam Satellite System. Paper presented at SYMPOSIUM ON COMMUNICATIONS AND VEHICULAR TECHNOLOGY IN THE BENELUX.
Sharma, S. K., Bogale, T. E., le, L. B., Chatzinotas, S., Wang, X., & Ottersten, B. (2018). Dynamic Spectrum Sharing in 5G Wireless Networks With Full-Duplex Technology: Recent Advances and Research Challenges. IEEE Communications Surveys and Tutorials, 20(1), 674 - 707.
Sharma, S. K., Chatzinotas, S., & Arapoglou, P.-D. (Eds.). (2018). Satellite Communications in the 5G Era. IET.
Shbair, W., Steichen, M., François, J., & State, R. (2018). Blockchain Orchestration and Experimentation Framework: A Case Study of KYC. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018.
Smyth, B. (2018). Verifiability of Helios Mixnet. Voting'18: 3rd Workshop on Advances in Secure Electronic Voting. Springer.
Soltana, G., Sannier, N., Sabetzadeh, M., & Briand, L. (2018). Model-Based Simulation of Legal Policies: Framework, Tool Support, and Validation. Software & Systems Modeling, 17(3), 851-883.
Soua, R., Turcanu, I., Adamsky, F., Führer, D., & Engel, T. (2018). Multi-Access Edge Computing for Vehicular Networks: a Position Paper. 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelligent Transportation Systems.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). Faster-than-Nyquist Signaling through Spatio-temporal Symbol-level Precoding for the Multiuser MISO Downlink Channel. IEEE Transactions on Wireless Communications.
Spano, D., Chatzinotas, S., & Ottersten, B. (2018). Sequential spatio-temporal symbol-level precoding enabling faster-than-Nyquist signaling for multi-user MISO systems. 2018 26th European Signal Processing Conference (EUSIPCO) (pp. 827-831). IEEE.
Symeonidis, I., Biczók, G., Shirazi, F., Pérez-Solà, C., Schroers, J., & Preneel, B. (2018). Collateral damage of Facebook third-party applications: a comprehensive study. Computers & Security, 77, 179 - 208.
Szalay, Z., Tettamanti, T., Esztergár-Kiss, D., Varga, I., & Bartolini, C. (2018). Development of a test track for driverless cars: vehicle design, track configuration, and liability considerations. Periodica Polytechnica Transportation Engineering, 46(1), 29-35.
Talha, S. A. W., Hammouche, M., Ghorbel, E., Fleury, A., & Ambellouis, S. (2018). Features and Classification Schemes for View-Invariant and Real-Time Human Action Recognition. IEEE Transactions on Cognitive and Developmental Systems, 10(4), 894--902.
Tato, A., Andrenacci, S., Chatzinotas, S., & Mosquera, C. (2018). Link Adaptation and CSI Detection Errors in Multibeam Satellite Systems with Linear Precoding. 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC). IEEE.
Tervo, O., Tran, L.-N., Pennanen, H., Chatzinotas, S., Ottersten, B., & Juntti, M. (2018). Energy-Efficient Multicell Multigroup Multicasting With Joint Beamforming and Antenna Selection. IEEE Transactions on Signal Processing.
Tervo, O., Trant, L.-N., Chatzinotas, S., Ottersten, B., & Juntti, M. (2018). Multigroup Multicast Beamforming and Antenna Selection with Rate-Splitting in Multicell Systems. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2018). Security Slicing for Auditing Common Injection Vulnerabilities. Journal of Systems and Software, 137(March, 2018), 766-783.
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2018). Constrained bayesian active learning of linear classifier. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE.
Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018). Hybrid analog-digital transceiver designs for mmwave amplify-and-forward relaying systems. 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE.
Tsinos, C., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2018). Symbol-level precoding with low resolution DACs for large-scale array MU-MIMO systems. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE.
Tsinos, C., & Ottersten, B. (2018). An efficient algorithm for unit-modulus quadratic programs with application in beamforming for wireless sensor networks. IEEE Signal Processing Letters.
Varisteas, G., Avanesov, T., & State, R. (2018). Distributed C++-Python embedding for fast predictions and fast prototyping. Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning.
Vuppala, S., Sellathurai, M., & Chatzinotas, S. (2018). Optimal Deployment of Base Stations in Cognitive Satellite Terrestrial Networks. 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC). IEEE.
Wang, C., Pastore, F., & Briand, L. (2018). Automated Generation of Constraints from Use Case Specifications to Support System Testing. Proceedings of the 11th IEEE Conference on Software Testing, Validation and Verification.
Wang, J., Sun, J., Yuan, Q., & Pang, J. (2018). Learning probabilistic models for model checking: an evolutionary approach and an empirical study. International Journal on Software Tools for Technology Transfer, 20(6), 689-704.
Wang, M., Voos, H., & Su, D. (2018). Robust Online Obstacle Detection and Tracking for Collision-free Navigation of Multirotor UAVs in Complex Environments. 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Singapore 18-21 November 2018 (pp. 1228 - 1234).
Xu, T. A., Adamsky, F., Turcanu, I., Soua, R., Köbel, C., Engel, T., & Baiocchi, A. (2018). Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet. Poster session presented at IEEE Vehicular Networking Conference (VNC) 2018.
Yakubov, A., Shbair, W., Wallbom, A., Sanda, D., & State, R. (2018). A Blockchain-Based PKI Management Framework. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018, Tapei, Tawain 23-27 April 2018.
Yu, J., Ryan, M., & Cremers, C. (2018). DECIM: Detecting Endpoint Compromise In Messaging. IEEE Transactions on Information Forensics & Security.
Z. Lin, M. Lin, J. Ouyang, W. Zhu, & Chatzinotas, S. (2018). Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks. IEEE Signal Processing Letters.
Zhang, Y., Humbert, M., Rahman, T., Li, C.-T., Pang, J., & Backes, M. (2018). Tagvisor: A privacy advisor for sharing hashtags. Proceedings of The Web Conference 2018 (WWW'18) (pp. 287-296). ACM Press.
Zhu, Panichella, A., & Zaidman, A. (2018). An Investigation of Compression Techniques to Speed up Mutation Testing. Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018.
Zollinger, M.-L. (2018). Selene User Interface.

2017

Changaival, B., Rosalie, M., Danoy, G., Lavangnananda, K., & Bouvry, P. (2017). Chaotic Traversal (CHAT): Very Large Graphs Traversal Using Chaotic Dynamics. International Journal of Bifurcation and Chaos, 27(14), 1750215.
Seo, H., Liu, Z., Park, T., Kwon, H., Lee, S., & Kim, H. (2017). Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.
Fotiadis, G., & Konstantinou, E. (2017). Ordinary Pairing-Friendly Genus 2 Hyperelliptic Curves with Absolutely Simple Jacobians. International Conference on Mathematical Aspects of Computer and Information Sciences (pp. 409-424). Springer.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2017, December 21). Constrained Bayesian Active Learning of Interference Channels in Cognitive Radio Networks. IEEE Journal of Selected Topics in Signal Processing.
Bianculli, D., & Krstic, S. (2017). On the Risk of Tool Over-tuning in Runtime Verification Competitions. Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (pp. 37-40). EasyChair.
Dou, W., Bianculli, D., & Briand, L. (2017). TemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties. Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (pp. 64-70). EasyChair.
Falk, E., Fiz Pontiveros, B., Repcek, S., Hommes, S., State, R., & Sasnauskas, R. (2017, December 07). VSOC - A Virtual Security Operating Center. Global Communications.
Lacasse, R.-M., Lambert, B., & Khan, N. (2017, December 05). Blockchain Technology - Arsenal for a Shariah-Compliant Financial Ecosystem. Journal of Business and Economics.
Lopez Becerra, J. M., Iovino, V., Ostrev, D., Sala, P., & Skrobot, M. (2017). Tightly-Secure PAK(E). Cryptology and Network Security. Springer.
Meng, W., Lee, W., Liu, Z., Su, C., & Li, Y. (2017). Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.
Xinwei, G., Li, L., Jintai, D., Jiqiang, L., Rv, S., & Liu, Z. (2017). Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. The 13th International Conference on Information Security Practice and Experience - ISPEC 2017.
Cornelius, G. P., Hochgeschwender, N., & Voos, H. (2017). Model-Driven Interaction Design for Social Robots. 4th International Workshop on Model-driven Robot Software Engineering, Marburg, Germany, 2017. Springer.
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Frӓmling, K. (2017). Combined Use of Lifecycle Management and IoT in Smart Cities. Combined Use of Lifecycle Management and IoT in Smart Cities.
Kalantari, A., Fittipaldi, M., Chatzinotas, S., Vu, T. X., & Ottersten, B. (2017, December). Cache-Assisted Hybrid Satellite-Terrestrial Backhauling for 5G Cellular Networks. Proceedings of IEEE Global Communications Conference.
Kayhan, F. (2017). On low complexity detection for QAM isomorphic constellations. In F., Kayhan, On low compelxity detection for QAM isomorphic constellations.
Küttler, M., Roitzsch, M., Hamann, C.-J., & Volp, M. (2017, December). Probabilistic Analysis of Low-Criticality Execution. Paper presented at Workshop on Mixed Criticality Systems 2017 co-located with RTSS 2017.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2017, December). Symbol-level Precoding for the Non-linear Multiuser MISO Downlink Channel. IEEE Transactions on Signal Processing.
Volp, M., Kozhaya, D., & Verissimo, P. (2017, December). Facing the Safety-Security Gap in RTES: the Challenge of Timeliness. Paper presented at 2nd Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS 2017) co-located with RTSS 2017.
Wang, Z., Cao, Z., Cui, Y., & Yang, Y. (2017). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. Proc. 60th IEEE Global Communications Conference.
Wyner, A., & Casini, G. (Eds.). (2017). Legal Knowledge and Information Systems - JURIX 2017: The Thirtieth Annual Conference. IOS Press BV.
Yang, Y., & Pesavento, M. (2017). Energy efficient transmission in MIMO interference channels with QoS constraints. Proc. 8th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing.
You, L., Lei, L., Yuan, D., Sun, S., Chatzinotas, S., & Ottersten, B. (2017). A Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource. 2017 IEEE Global Communications Conference (GLOBECOM).
Faye, S., Cantelmo, G., Tahirou, I., Derrmann, T., Viti, F., & Engel, T. (2017). Demo: MAMBA: A Platform for Personalised Multimodal Trip Planning.
Faye, S., Jafarnejad, S., Costamagna, J., Castignani, G., & Engel, T. (2017, November 27). Poster: Characterizing Driving Behaviors Through a Car Simulation Platform. Poster session presented at 2017 IEEE Vehicular Networking Conference (VNC), Turin, Italy.
Bartolini, C., & Lenzini, G. (2017, November 25). Law and the software development life cycle. Paper presented at IALT Annual Conference, Dunboyne, Ireland.
Roldán, J. J., Olivares Mendez, M. A., del Cerro, J., & Barrientos, A. (2017, November 23). Analyzing and improving multi-robot missions by using process mining. Autonomous Robots.
Castillo Lopez, M., Olivares Mendez, M. A., & Voos, H. (2017). Evasive Maneuvering for UAVs: An MPC Approach. ROBOT'2017 - Third Iberian Robotics Conference, Sevilla, Spain, 2017.
Cornelius, G. P., Hochgeschwender, N., Voos, H., Olivares Mendez, M. A., Caire, P., Volp, M., & Verissimo, P. (2017). A Perspective of Security for Mobile Service Robots. Iberian Robotics Conference, Seville, Spain, 2017.
Falk, E. (2017). Big Data Architectures For Robust Systems. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H., Ormazabal, G., State, R., Engel, T., & Gurbani, V.
Castrillon, J., Lieber, M., Klueppelholz, S., Volp, M., Asmussen, N., Assmann, U., Baader, F., Baier, C., Fettweis, G., & Froehlich, J. (2017). A Hardware/Software Stack for Heterogeneous Systems. IEEE Transactions on Multi-Scale Computing Systems, PP(99), 1.
Kolbe, N., Robert, J., Kubler, S., & Le Traon, Y. (2017). PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.
Schmitz, S. (2017). Internetdelikte und die Herausforderungen des Forum Shoppings. Eprint/Working paper retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3065887.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017). Observer-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems. 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, November 2017.
Charlier, J. H. J., State, R., & Hilger, J. (2017). Modeling Smart Contracts Activities: A Tensor based Approach. In J., Charlier, R., State, & J., Hilger, Proceedings of 2017 Future Technologies Conference (FTC), 29-30 November 2017, Vancouver, Canada (pp. 49-55). IEEE.
Dinu, D.-D., Groszschädl, J., & Le Corre, Y. (2017). Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares. In P. Q., Nguyen & J., Zhou, Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (pp. 39-57). Springer Verlag.
Du, M., Sassioui, R., Varisteas, G., State, R., Brorsson, M., & Cherkaoui, O. (2017). Improving Real-Time Bidding Using a Constrained Markov Decision Process. Proceedings of the 13th International Conference on Advanced Data Mining and Applications (pp. 711-726). Springer.
Falk, E., Charlier, J. H. J., & State, R. (2017). Your Moves, Your Device: Establishing Behavior Profiles Using Tensors. Advanced Data Mining and Applications - 13th International Conference, ADMA 2017 (pp. 460-474).
Hommes, S., Valtchev, P., Blaiech, K., Hamadi, S., Cherkaoui, O., & State, R. (2017). Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation. Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation. IEEE.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017, November). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science & Technology.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Deadzone-Quadratic Penalty Function for Predictive Extended Cruise Control with Experimental Validation. ROBOT 2017: Third Iberian Robotics Conference, Sevilla, Spain 22-24 November 2017.
Vu, T. X., Chatzinotas, S., Ottersten, B., & Duong, T. Q. (2017, November). Energy Minimization for Cache-assisted Content Delivery Networks with Wireless Backhaul. IEEE Wireless Communications Letters.
Signorello, S., Marchal, S., François, J., Festor, O., & State, R. (2017, October 30). Advanced Interest Flooding Attacks in Named-Data Networking. Paper presented at The 16th IEEE International Symposium on Network Computing and Applications (NCA 2017), Cambridge, MA, USA.
Hammerschmidt, C. (2017). Learning Finite Automata via Flexible State-Merging and Applications in Networking. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: State, R. (Promotor), Verwer, S. (Promotor), Sorger, U., Engel, T., & Francois, J.
Appelt, D., Panichella, A., & Briand, L. (2017). Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks. The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 339-350). IEEE.
Demisse, G. (2017). Deformation Based Curved Shape Representation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Sabetzadeh, M., Fofi, D., Aouada, D., & Berretti, S.
Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings (TR-SNT-2017-5). SnT.
Haqiqatnejad, A., & Kayhan, F. (2017). Unified Satellite and Terrestrial ACM Design. International Communications Satellite Systems Conference (ICSSC), Trieste 16-19 October 2017.
Gharanjik, A., Kmieciak, J., Shankar, B., & Ottersten, B. (2017). Coverage Extension via Side-Lobe Transmission in Multibeam Satellite System. 23rd Ka and Broadband Communications Conference.
Soltana, G. (2017). A Model-Based Framework for Legal Policy Simulation and Compliance Checking. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Sabetzadeh, M. (Promotor), Klein, J., & Cabot, J.
Vuppala, S., Chatzinotas, S., & Ottersten, B. (2017, October 13). Secrecy Analysis of Random Wireless Networks with Multiple Eavesdroppers. Proceedings of IEEE Inter. Symp. on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada.
Lenzini, G., Samir, O., Roenne, P., Ryan, P., Geng, Y., Noh, J., & Lagerwall, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. Proc. of the 9th IEEE Workshop on Information Forensics and Security.
Alagha, N., Kayhan, F., & Montorsi, G. (2017, October). Optimized non-orthogonal multiplexing in Peak Power Limited Channels. Paper presented at 35th AIAA International Communications Satellite Systems Conference (ICSSC).
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2017). Automated Extraction and Clustering of Requirements Glossary Terms. IEEE Transactions on Software Engineering, 43(10), 918-945.
Bronzi, W., Faye, S., Frank, R., & Engel, T. (2017, October). Characterizing Driving Environments Through Bluetooth Discovery. Paper presented at The 8th International Conference on ICT Convergence - ICTC 2017.
Derrmann, T., Frank, R., Viti, F., & Engel, T. (2017, October). Estimating Urban Road Traffic States Using Mobile Network Signaling Data. Abstract book of the 20th International Conference on Intelligent Transportation Systems.
Gautam, S., Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2017). Relay Selection Strategies for SWIPT-Enabled Cooperative Wireless Systems. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017.
Hammerschmidt, C., Garcia, S., Verwer, S., & State, R. (2017, October). Reliable Machine Learning for Networking: Key Concerns and Approaches. Poster session presented at The 42nd IEEE Conference on Local Computer Networks (LCN), Singapore, Singapore.
Jordanou, J. P., Antonelo, E. A., Camponogara, E., & S. de Aguiar, M. A. (2017). Recurrent Neural Network based control of an Oil Well. Brazilian Symposium on Intelligent Automation, Porto Alegre 1-4 October 2017 (pp. 924-931).
Mengali, A., Lyras, N. K., Shankar, B., Kourogiorgas, C. I., Panagopoulos, A. D., & Liolis, K. (2017). Optical Feeder Links Study towards Future Generation MEO VHTS Systems. Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC).
Merlano Duncan, J. C., Krivochiza, J., Andrenacci, S., Chatzinotas, S., Ottersten, B., & Krivochiza, J. (2017, October). Computationally Efficient Symbol-Level Precoding Communications Demonstrator. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
Popleteev, A. (2017). Please Stand By: TV-based indoor localization. 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-2017).
Popleteev, A. (2017). Wi-Fi butterfly effect in indoor localization: The impact of imprecise ground truth and small-scale fading. 14th IEEE Workshop on Positioning, Navigation and Communications (WPNC-2017).
Saint, A. F. A., Shabayek, A. E. R., Aouada, D., Ottersten, B., Cherenkova, K., & Gusev, G. (2017). Towards Automatic Human Body Model Fitting to a 3D Scan. In N., D'APUZZO (Ed.), Proceedings of 3DBODY.TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct. 2017 (pp. 274-280). Ascona, Switzerland: Hometrica Consulting.
van der Elst, L., Quintanar Guzman, S., & Hadji-Minaglou, J.-R. (2017). Design of an Electromechanical Prosthetic Finger using Shape Memory Alloy Wires. IEEE 5th International Symposium on Robotics and Intelligent Sensors, Ottawa, Canada, 5-7 October 2017.
Volp, M., Decouchant, J., Lambert, C., Fernandes, M., & Verissimo, P. (2017, October). Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information. Paper presented at SysTEX 2017.
Hochgeschwender, N. (2017). Model-Based Specification, Deployment and Adaptation of Robot Perception Systems. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Nicolas, N., Gerhard, K., Herman, B., & Pierre, K.
Molina, M., Frau, P., Maraval, D., Sanchez Lopez, J. L., Bavle, H., & Campoy, P. (2017). Human-Robot Cooperation in Surface Inspection Aerial Missions. 2017 International Micro Air Vehicle Conference and Flight Competition (IMAV), Toulouse, France, 18-21 Septembre 2017.
Shin, S. Y. (2017). Specification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract). Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017). CEUR-WS.org.
Panichella, A., Kifetew, F., & Tonella, P. (2017). LIPS vs MOSA: a Replicated Empirical Study on Automated Test Case Generation. International Symposium on Search Based Software Engineering (SSBSE) 2017. Springer.
Bardini Idalino, T., Pierina Brustolin Spagnuelo, D., & Everson Martina, J. (2017). Private Verification of Access on Medical Data: An Initial Study. Private Verification of Access on Medical Data: An Initial Study.
Benelallam, A., Hartmann, T., Mouline, L., Fouquet, F., Bourcier, J., Barais, O., & Le Traon, Y. (2017). Raising Time Awareness in Model-Driven Engineering. 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp. 181-188). Springer.
Briand, L., Bianculli, D., Nejati, S., Pastore, F., & Sabetzadeh, M. (2017). The Case for Context-Driven Software Engineering Research. IEEE Software, 34(5), 72-75.
Charlier, J. H. J., Lagraa, S., State, R., & Francois, J. (2017). Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining. Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), Skopje, Macedonia, September 18, 2017 (pp. 31-42).
Dou, W., Bianculli, D., & Briand, L. (2017). A Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties. Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ).
Gadyatskaya, O., Ravi, J., Mauw, S., Trujillo Rasua, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G., Livraga & C. J., Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer.
Glauner, P., Meira, J. A., State, R., & Mano, R. (2017, September). Introduction to Detection of Non-Technical Losses using Data Analytics. Paper presented at 7th IEEE Conference on Innovative Smart Grid Technologies, Europe (ISGT Europe 2017), Torino, Italy.
Glauner, P., Migliosi, A., Meira, J. A., Valtchev, P., State, R., & Bettinger, F. (2017). Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses? Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017).
Li, L. (2017). Mining AndroZoo: A Retrospect. The International Conference on Software Maintenance and Evolution (ICSME).
Popleteev, A. (2017). AmbiLoc: A year-long dataset of FM, TV and GSM fingerprints for ambient indoor localization. 8th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2017).
Sannier, N., Adedjouma, M., Sabetzadeh, M., Briand, L., Dann, J., Hisette, M., & Thill, P. (2017). Legal Markup Generation in the Large: An Experience Report. the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (pp. 302-311).
Sannier, N., Sabetzadeh, M., & Briand, L. (2017). From RELAW Research to Practice: Reflections on an Ongoing Technology Transfer Project. the IEEE 25th International Requirements Engineering Conference, Lisbon, Portugal, 4-8 September 2017 (pp. 204-208).
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2017). JoanAudit: A Tool for Auditing Common Injection Vulnerabilities. 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. ACM.
Verwer, S. E., & Hammerschmidt, C. (2017). flexfringe: A Passive Automaton Learning Package. Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on.
Jan, S. (2017). Automated and Effective Security Testing for XML-based Vulnerabilities. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S., Pastore, F., Armando, A., Gorla, A., & Panichella, A.
Lei, L., You, L., Dai, G., Vu, T. X., Yuan, D., & Chatzinotas, S. (2017). A Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNet. IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017.
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2017). Implementation and validation of an event-based real-time nonlinear model predictive control framework with ROS interface for single and multi-robot systems. 2017 IEEE Conference on Control Technology and Applications (CCTA) (pp. 1000-1006).
Liu, Z., Longa, P., Pereira, G., Reparaz, O., & Seo, H. (2017). FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. In N., Homma & W., Fischer (Ed.), International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (pp. 665-686).
Quintanar Guzman, S., Kannan, S., Aguilera Gonzalez, A., Olivares Mendez, M. A., & Voos, H. (2017, August 25). Operational space control of a lightweight robotic arm actuated by shape memory alloy wires: A comparative study. Journal of Intelligent Material Systems & Structures.
Oyedotun, O., Demisse, G., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Facial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent Representations. 2017 IEEE International Conference on Computer Vision Workshop (ICCVW).
Oyedotun, O., & Khashman, A. (2017, August 15). Prototype Incorporated Emotional Neural Network (PI-EmNN). IEEE Transactions on Neural Networks and Learning Systems.
Rosalie, M., Brust, M. R., Danoy, G., Chaumette, S., & Bouvry, P. (2017). Coverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics. IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (pp. 113-118).
Liu, Z., Järvinen, K., Liu, W., & Seo, H. (2017). Multiprecision Multiplication on ARMv8. IEEE 24th Symposium on Computer Arithmetic - ARITH24 (pp. 10-17).
Casini, G., & Meyer, T. (2017). Belief Change in a Preferential Non-Monotonic Framework. Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (pp. 929-935). International Joint Conferences on Artificial Intelligence.
Falk, E., Gurbani, V. K., & State, R. (2017). Query-able Kafka: An agile data analytics pipeline for mobile wireless networks. Proceedings of the 43rd International Conference on Very Large Data Bases 2017, 10, 1646-1657.
Hammerschmidt, C., State, R., & Verwer, S. (2017, August). Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms. Poster session presented at Human in the Loop Machine Learning Workshop at the International Conference on Machine Learning, Sydney, Australia.
Hammes, C., Shankar, B., Nijsure, Y., Spielmann, T., & Ottersten, B. (2017). Random Phase Center Motion Technique for Enhanced Angle-Doppler Discrimination Using MIMO Radars. European Signal Processing Conference (EUSIPCO) 2017.
Popleteev, A. (2017). Indoor localization using ambient FM radio RSS fingerprinting: A 9-month study. 17th IEEE International Conference on Computer and Information Technology (CIT-2017).
Zuo, C., Shao, J., Liu, Z., Ling, Y., & Wei, G. (2017). Hidden-Token Searchable Public-Key Encryption. The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17.
Merlano Duncan, J. C., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Wang, X. (2017, July 31). Multi-antenna based one-bit spatio-temporal wideband sensing for cognitive radio networks. Proceedings of IEEE International Conference on Communications (ICC) 2017, 1-7.
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Training Very Deep Networks via Residual Learning with Stochastic Input Shortcut Connections. 24th International Conference on Neural Information Processing, Guangzhou, China, November 14–18, 2017.
Roldán, J. J., Peña-Tapia, E., Martín-Barrio, A., Olivares Mendez, M. A., Del Cerro, J., & Barrientos, A. (2017). Multi-Robot Interfaces and Operator Situational Awareness: Study of the Impact of Immersion and Prediction. Sensors, 17(8 1720).
Rosalie, M., Dentler, J. E., Danoy, G., Bouvry, P., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2017). Area exploration with a swarm of UAVs combining deterministic Chaotic Ant Colony Mobility with position MPC. 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (pp. 1392-1397).
Wang, C. (2017). Automated requirements-driven testing of embedded systems based on use case specifications and timed automata. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Pastore, F. (Promotor), Sabetzadeh, M., Nejati, S., Legeard, B., & Denaro, G.
Di Maio, A., Soua, R., Palattella, M. R., Engel, T., & Rizzo, G. (2017). A centralized approach for setting floating content parameters in VANETs. A centralized approach for setting floating content parameters in VANETs.
Tsakmalis, A. (2017). Active Learning in Cognitive Radio Networks. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor), Ottersten, B. (Promotor), Perez-Neira, A. I. (Promotor), State, R., & Marques, A. G.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Risk-averse Stochastic Nonlinear Model Predictive Control for Real-time Safety-critical Systems. The 20th World Congress of the International Federation of Automatic Control, IFAC 2017 World Congress, Toulouse, France, 9-14 July 2017. Toulouse, France.
Kubler, S., Derigent, W., Voisin, A., Robert, J., & Le Traon, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices.
Chaib Draa, K. (2017). Observation and Control of Anaerobic Digestion Processes for Improved Biogas Production. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Darouach, M. (Promotor), Hansen, J., Alma, M., Boutat, D., & Zhang, P.
Mai, X. P., Göknil, A., Shar, L. K., & Briand, L. (2017). Modeling Security and Privacy Requirements for Mobile Applications: a Use Case-driven Approach (TR-SNT-2017-3). SnT, University of Luxembourg.
Meng, W., Lee, W., Au, M. H., & Liu, Z. (2017). Exploring Effect of Location Number on Map-Based Graphical Password Authentication. 22nd Australasian Conference on Information Security and Privacy - ACISP2017.
Barragan-Ramirez, G., Estrada-Moreno, A., Ramirez Cruz, Y., & Rodriguez-Velazquez, J. A. (2017). The Simultaneous Local Metric Dimension of Graph Families. Symmetry, 9(8).
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, July). On the Unknown Input Functional Observer Design via Polytopic Lyapunov Function: Application to a Quadrotor Aerial Robots Landing. IFAC-PapersOnLine.
Chaib Draa, K., & Voos, H. (2017). An LMI-Based H_infty Discrete-Time Nonlinear State Observer Design for an Anaerobic Digestion Model. World Congress of the International Federation of Automatic Control, Toulouse 9-14 July 2017.
Chaib Draa, K., Voos, H., Alma, M., Zemouche, A., & Darouach, M. (2017). LMI-Based H_infty Nonlinear State Observer Design for Anaerobic Digestion Model. IEEE Mediterranean Conference on Control and Automation, Valletta 3-6 July 2017.
Di Nardo, D., Pastore, F., & Briand, L. (2017). Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes. ACM Transactions on Software Engineering & Methodology, 26(1), 1-40.
Hartmann, T., Fouquet, F., Jimenez, M., Rouvoy, R., & Le Traon, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering.
Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings.
Kolbe, N., Zaslavsky, A., Kubler, S., Robert, J., & Le Traon, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. Modeling and Using Context.
Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2017, July). Impact of Tool Support in Patch Construction. Paper presented at 2017 International Symposium on Software Testing & Analysis (ISSTA).
Kuhrmann, M., Diebold, P., Münch, J., Tell, P., Garousi, V., Felderer, M., Trektere, K., McCaffery, F., Linssen, O., Hanser, E., & Christian, P. (2017). Hybrid software and system development in practice: Waterfall, scrum, and beyond. Proceedings of International Conference on Software and Systems Process (ICSSP).
Lagunas, E., Lei, L., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). Power Allocation for In-Band Full-Duplex Self-Backhauling. International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017.
Liu, B. (2017). AUTOMATED DEBUGGING AND FAULT LOCALIZATION OF MATLAB/SIMULINK MODELS. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S. (Promotor), Klein, J., Pastore, F., Trapp, M., & Di Penta, M.
Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2017). Modelling Metrics for Transparency in Medical Systems. Proceedings of TrustBus 2017.
Sharma, S. K., Papazafeiropoulos, A., Chatzinotas, S., Wang, X., & Ratnarajah, T. (2017). Impact of residual transceiver impairments on MMSE filtering performance of Rayleigh-product MIMO channels. Proc. IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2017).
Spano, D., Alodeh, M., Chatzinotas, S., Krause, J., & Ottersten, B. (2017). Spatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink. IEEE SPAWC 2017.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2017). Interference Constraint Active Learning with Uncertain Feedback for Cognitive Radio Networks. IEEE Transactions on Wireless Communications, 16(7), 4654-4668.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017, July). Energy-Efficient Design for Edge-caching Wireless Networks: When is Coded-caching beneficial? Proceedings of IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Biryukov, A., Feher, D., & Khovratovich, D. (2017). Guru: Universal Reputation Module for Distributed Consensus Protocols. Luxembourg, Luxembourg: University of Luxembourg.
Cantelmo, G., Viti, F., & Derrmann, T. (2017, June 28). Effectiveness of the Two-Step Dynamic Demand Estimation model on large networks. Proceedings of 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Fast Stochastic Non-linear Model Predictive Control for Electric Vehicle Advanced Driver Assistance Systems. 13th IEEE International Conference on Vehicular Electronics and Safety, Vienna, Austria 27-28 June 2017 (pp. 91-96).
Derrmann, T., Frank, R., Engel, T., & Viti, F. (2017). How Mobile Phone Handovers reflect Urban Mobility: A Simulation Study. Proceedings of the 5th IEEE Conference on Models and Technologies for Intelligent Transportation Systems.
Bouvry, P., Chaumette, S., Danoy, G., Guerrini, G., Jurquet, G., Kuwertz, A., Müller, W., Rosalie, M., Sander, J., & Segor, F. (2017). ASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques. DroNet'17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (pp. 17-20). New York, NY, USA: ACM.
Yang, Y., & Sabella, D. (2017). Mobile network energy efficiency optimization in MIMO multi-cell systems. Proc. 5th International Workshop on Cloud Technologies and Energy Efficiency in Mobile Communication Networks.
Garousi, V., Felderer, M., Fernandes, J., Pfahl, D., & Mäntylä, M. (2017). Industry-academia collaborations in software engineering: an empirical analysis of challenges, patterns and anti-patterns in research projects. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 224-229). ACM.
Garousi, V., Felderer, M., Kuhrmann, M., & Herkiloğlu, K. (2017). What industry wants from academia in software testing? Hearing practitioners’ opinions. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 65-69). ACM Digital Library.
Raulamo-Jurvanen, P., Mäntylä, M., & Garousi, V. (2017). Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE 2017) (pp. 21-30). ACM.
Atashpendar, A., Roenne, P., Ostrev, D., & Ryan, P. (2017, June 14). Deniability in Quantum Cryptography. Poster session presented at The 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), Paris, France.
Manukyan, A., Olivares Mendez, M. A., Geist, M., & Voos, H. (2017). Real time degradation identification of UAV using machine learning techniques. International Conference on Unmanned Aircraft Systems ICUAS. Miami, USA, 2017. IEEE.
Atashpendar, A., Dorronsoro, B., Danoy, G., & Bouvry, P. (2017, June 10). A Scalable Parallel Cooperative Coevolutionary PSO Algorithm for Multi-objective Optimization. Journal of Parallel & Distributed Computing.
Gautam, S., & P, U. (2017, June 04). Relay Selection and Transceiver Design for Joint Wireless Information and Energy Transfer in Cooperative Networks. Paper presented at 2017 IEEE 85th Vehicular Technology Conference: VTC2017, Sydney, Australia.
Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307.
Fotiadis, G. (2017). Constructing Suitable Parameters for Pairing-Based Cryptography. Unpublished doctoral thesis, University of the Aegean, ​Karlovasi Samos, ​​Greece.
Jury: Konstantinou, E. (Promotor), Kontogeorgis, A. (Promotor), Rizomiliotis, P. (Promotor), Gritzalis, S., Poulakis, D., Garefalakis, T., & Stamatiou, Y. C.
Artiga, X., Vázquez, M. Á., Pérez-Neira, A., Tsinos, C., Lagunas, E., Chatzinotas, S., Ramireddy, V., Steinmetz, C., Zetik, R., Ntougias, K., Ntaikos, D., & Papadias, C. (2017). Spectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka Band. European Conference on Networks and Communications (EuCNC), June 2017.
Biryukov, A., Dinu, D.-D., & Le Corre, Y. (2017). Side-Channel Attacks meet Secure Network Protocols. In D., Gollmann, A., Miyaji, & H., Kikuchi (Eds.), Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (pp. 435-454). Springer Verlag.
Biryukov, A., & Perrin, L. P. (2017). State of the Art in Lightweight Symmetric Cryptography. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/31319.
Garousi, V., & Felderer, M. (2017). Experience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 170-179). ACM.
Koesdwiady, A., Soua, R., Karray, F., & Kamel, M. S. (2017). Recent Trends in Driver Safety Monitoring Systems: State of the Art and Challenges. IEEE Transactions on Vehicular Technology, 66(6), 4550-4563.
Krüger, K., Fohler, G., & Volp, M. (2017, June). Improving Security for Time-Triggered Real-Time Systems against Timing Inference Based Attacks by Schedule Obfuscation. Paper presented at Work-in-Progress Proceedings ECRTS'17.
Popleteev, A. (2017, June). Poster: Impact of ground truth errors on Wi-Fi localization accuracy. Poster session presented at 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys-2017).
Radhakrishnan, I., Soua, R., Palattella, M. R., & Engel, T. (2017). An Efficient Service Channel Allocation Scheme in SDN-enabled VANETs. An Efficient Service Channel Allocation Scheme in SDN-enabled VANETs.
You, I., Lenzini, G., & De Santis, A. (Eds.). (2017). Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Systems Journal, 11(2).
Bartolini, C., & Lenzini, G. (2017). Human Rights in the era of Information and Communication Technology. Paper presented at - Belval, Luxembourg.
Hartmann, T., Moawad, A., Fouquet, F., & Le Traon, Y. (2017, May 29). The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. Software & Systems Modeling.
Titcheu Chekam, T., Papadakis, M., Le Traon, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. International Conference on Software Engineering (ICSE 2017).
Di Nucci, D., Palomba, F., Prota, A., Panichella, A., Zaidman, A., & De Lucia, A. (2017). PETrA: a software-based tool for estimating the energy profile of Android applications. 39th International Conference on Software Engineering (ICSE) 2017 (pp. 3-6). ACM.
Panichella, A., & Urko, R. (2017). Java Unit Testing Tool Competition — Fifth Round. 10th International Workshop on Search- Based Software Testing (SBST) 2017. IEEE.
Bandi, A., & Murthy, C. (2017). Structured Sparse Recovery Algorithms for Data Decoding in Media Based Modulation. International Conference on Communications, Paris 21-25 May 2017 (pp. 1-6).
Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. MSR 2017.
Blaiech, K., Hamadi, S., Hommes, S., Valtchev, P., Cherkaoui, O., & State, R. (2017). Rule Compilation in Multi-Tenant Networks. Rule Compilation in Multi-Tenant Networks (pp. 97-98). Beijing, China: IEEE.
Dominico, S., Almeida, E. C. D., & Meira, J. A. (2017, May 15). A PetriNet Mechanism for OLAP in NUMA. Poster session presented at Thirteenth International Workshop on Data Management on New Hardware (DaMoN 2017).
Krivochiza, J., Kalantari, A., Chatzinotas, S., Ottersten, B., & Krivochiza, J. (2017). Low Complexity Symbol-Level Design for Linear Precoding Systems. In R., Heusdens & J. H., Weber, PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (pp. 117). Delft, Netherlands: Delft University of Technology.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, May). A contribution to Cyber-Security of Networked Control Systems: an Event-based Control Approach. Proceedings of 2017 3rd International Conference on Event-Based Control, Communication and Signal Processing (EBCCSP 2017).
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, May). Unknown Input Functional Observers Design for Polytopic Discrete Time Systems. Proceedings of 6th IEEE International Conference on Systems and Control (ICSC) 2017.
Cacciatore, G., Fiandrino, C., Kliazovich, D., Granelli, F., & Bouvry, P. (2017). Cost analysis of Smart Lighting Solutions for Smart Cities. IEEE International Conference on Communications (ICC), Paris, France, 2017.
Capponi, A., Fiandrino, C., Kliazovich, D., & Bouvry, P. (2017). Energy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities. 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing.
Chaib Draa, K., Voos, H., Alma, M., Zemouche, A., & Darouach, M. (2017). LMI-Based Discrete-Time Nonlinear State Observer for an Anaerobic Digestion Model. IEEE International Conference on Systems and Control, Batna 7-9 May 2017.
Falk, E., Camino, R. D., State, R., & Gurbani, V. K. (2017). On non-parametric models for detecting outages in the mobile network. Integrated Network and Service Management 2017 (pp. 1139-1142).
Gurbani, V. K., Kushnir, D., Mendiratta, V. B., Phadke, C., Falk, E., & State, R. (2017). Detecting and predicting outages in mobile networks with log data. IEEE International Conference on Communications, ICC 2017 (pp. 1-7).
Hammes, C., Nijsure, Y., Shankar, B., Schröder, U., & Ottersten, B. (2017). Discrimination of Angle-Doppler Signatures using Arbitrary Phase Center Motion for MIMO Radars. IEEE Radar Conf 2017.
Lagunas, E., Maleki, S., Lei, L., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2017). Carrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks. ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017.
Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (2017, May). The Multi-Generation Repackaging Hypothesis. Poster session presented at The 39th International Conference on Software Engineering.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017, May). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, May). Understanding Android App Piggybacking. Poster session presented at The 39th International Conference on Software Engineering.
Liu, Z., Groszschädl, J., Hu, Z., Järvinen, K., Wang, H., & Verbauwhede, I. (2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Transactions on Computers, 66(5), 773-785.
Liu, Z., Lei, L., Zhang, N., Kang, G., & Chatzinotas, S. (2017, May). Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems. IEEE Access.
Soltani, M., Panichella, A., & van Deursen, A. (2017). A Guided Genetic Algorithm for Automated Crash Reproduction. Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). ACM.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2017). Search-driven String Constraint Solving for Vulnerability Detection. Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). ACM.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017, May). On the Diversity of Partial Relaying Cooperation with Relay Selection in Finite-SNR Regime. IEEE International Conference on Communications.
Vu, T. X., Duhamel, P., Chatzinotas, S., & Ottersten, B. (2017, May). Finite-SNR analysis for partial relaying cooperation with channel coding and opportunistic relay selection. EURASIP Journal on Advances in Signal Processing.
Vu, T. X., Trinh, A. V., Chatzinotas, S., & Ottersten, B. (2017, May). Spectral-Efficient Model for Multiuser Massive MIMO: Exploiting User Velocity. IEEE international Conference on Communications.
Wang, J., & Tang, Q. (2017). Differentially Private Neighborhood-based Recommender Systems. IFIP Information Security & Privacy Conference (pp. 14). Springer.
Perrin, L. P. (2017). Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Biryukov, A. (Promotor), Coron, J.-S., Gilbert, H., Leander, G., & Müller, V.
Biryukov, A., Khovratovich, D., & Tikhomirov, S. (2017, April 07). Findel: Secure Derivative Contracts for Ethereum. Paper presented at 1st Workshop on Trusted Smart Contracts (In Association with Financial Cryptography and Data Security 2017), Sliema, Malta.
Iovino, V., Rial, A., Roenne, P., & Ryan, P. (2017). Using Selene to Verify your Vote in JCJ. Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17).
Pejo, B., & Tang, Q. (2017). To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification. Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017. New York, United States of America: ACM.
Arend, B., Sunnen, P., & Caire, P. (2017). Investigating Breakdowns in Human Robot Interaction: A Conversation Analysis Guided Single Case Study of a Human-NAO Communication in a Museum Environment. International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, 11(5), 839-845.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. The 32nd ACM Symposium on Applied Computing (SAC 2017).
Mouline, L., Hartmann, T., Fouquet, F., Le Traon, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L., Mouline, T., Hartmann, F., Fouquet, Y., Le Traon, J., Bourcier, & O., Barais, Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming. Brussels, Belgium: ACM.
Shamir, A., Biryukov, A., & Perrin, L. P. (2017). Summary of an Open Discussion on IoT and Lightweight Cryptography. Proceedings of Early Symmetric Crypto workshop, 2017. Luxembourg, Luxembourg: University of Luxembourg.
Shin, S. Y., Brun, Y., Balasubramanian, H., Henneman, P. L., & Osterweil, L. J. (2017, March 27). Discrete-Event Simulation and Integer Linear Programming for Constraint-Aware Resource Scheduling. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Kintis, M., Papadakis, M., Jia, Y., Malevris, N., Le Traon, Y., & Harman, M. (2017, March 20). Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Transactions on Software Engineering.
Yang, Y., & Pesavento, M. (2017). A unified successive pseudoconvex approximation framework. IEEE Transactions on Signal Processing, 65(13), 3313 - 3328.
Liu, Z., Kang, G., Lei, L., Zhang, N., & Zhang, S. (2017). Power Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA. IEEE Wireless Communications and Networking Conference (WCNC), 2017 (pp. 1-6).
Wang, C., Pastore, F., & Briand, L. (2017). System Testing of Timing Requirements based on Use Cases and Timed Automata. 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017.
Zhu, Q., Panichella, A., & Zaidman, A. (2017). Speeding-Up Mutation Testing via Data Compression and State Infection. IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2017 (pp. 103-109). IEEE.
Lopez Becerra, J. M., Iovino, V., & Skrobot, M. (2017, March 09). On the Relation Between SIM and IND-RoR Security Models for PAKEs. Paper presented at Grande Region Security and Reliability Day 2017, Luxembourg Ville, Luxembourg.
Derigent, W., Voisin, A., Thomas, A., Kubler, S., & Robert, J. (2017). Application of Measurement-Based AHP to Product-Driven System Control. In T., Borangiu, Service Orientation in Holonic and Multi-Agent Manufacturing (Studies in Computational Intelligence, pp. 249-258). Springer.
Alodeh, M., Spano, D., Chatzinotas, S., & Ottersten, B. (2017). Faster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels. The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing.
Capponi, A., Fiandrino, C., Kliazovich, D., Bouvry, P., & Giordano, S. (2017, March). A Cost-Effective Distributed Framework for Data Collection in Cloud-based Mobile Crowd Sensing Architectures. IEEE Transactions on Sustainable Computing.
Hajri, I., Göknil, A., & Briand, L. (2017). A Change Management Approach in Product Lines for Use Case-Driven Development and Testing. 23rd International Working Conference on Requirements Engineering: Foundation for software Quality (REFSQ 2017).
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2017). Incremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions. 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (pp. 3-21).
Raitza, M., Kumar, A., Volp, M., Walter, D., Trommer, J., Mikolajick, T., & Weber, W. M. (2017, March). Exploiting Transistor-Level Reconfiguration to Optimize Combinational Circuits on the Example of a Conditional Sum Adder. Paper presented at Design, Automation and Test in Europe (DATE 2017), Lausanne, Switzerland.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2017). Impact du mécanisme chaotique sur l’optimisation d’un modèle de mobilité pour un essaim de drones devant réaliser une couverture de zone. In E., Falcon, M., Lefranc, F., Pétrélis, & C.-T., Pham (Eds.), Comptes-rendus de la 20e Rencontre du Non Linéaire (pp. 79-84). Saint Etienne du Rouvray, France: Non-Linéaire Publications.
Dentler, J. E. (2017). denmpc.
Toader, B., Sprumont, F., Faye, S., Viti, F., & Popescu, M. (2017). Usage of Smartphone Data to Derive an Indicator for Collaborative Mobility between Individuals. ISPRS International Journal of Geo-Information, 6(3), 62.
Di Nucci, D., Palomba, F., Prota, A., Panichella, A., Zaidman, A., & De Lucia, A. (2017). Software-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable? Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017). IEEE.
Palomba, F., Di Nucci, D., Panichella, A., Zaidman, A., & De Lucia, A. (2017). Lightweight Detection of Android-specific Code Smells: the aDoctor Project. Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017). IEEE.
Kubler, S., Robert, J., Främling, K., Hefnawy, A., Cherifi, C., & Bouras, A. (2017). Open IoT Ecosystem for Sporting Event Management. IEEE Access, 5(1), 7064-7079.
Ben Nasr, S., Bécan, G., Acher, M., Ferreira Filho, J. B., Sannier, N., Baudry, B., & Davril, J.-M. (2017). Automated extraction of product comparison matrices from informal product descriptions. Journal of Systems and Software, 124, 82-103.
Fiandrino, C., Capponi, A., Cacciatore, G., Kliazovich, D., Sorger, U., Bouvry, P., Kantarci, B., Granelli, F., & Giordano, S. (2017, February). CrowdSenSim: a Simulation Platform for Mobile Crowdsensing in Realistic Urban Environments. IEEE Access.
Duarte, J., Kalogeiton, E., Soua, R., Manzo, G., Palattella, M. R., Di Maio, A., Braun, T., Engel, T., Villas, L., & Rizzo, G. (2017, January 26). A Multi-Pronged Approach to Adaptive and Context Aware Content Dissemination in VANETs. Mobile Networks and Applications, 1-13.
Chenal, M. (2017). Key-Recovery Attacks Against Somewhat Homomorphic Encryption Schemes. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Tang, Q. (Promotor), Coron, J.-S., Ding, J., & Buchmann, J.
Delerue Arriaga, A. (2017). Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Coron, J.-S., Tang, Q., Abdalla, M., & Naccache, D.
Skrobot, M. (2017). On Composability and Security of Game-based Password-Authenticated Key Exchange. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Lancrenon, J., Cremers, C., & Ding, J.
Biryukov, A., Udovenko, A., & Velichkov, V. (2017). Analysis of the NORX Core Permutation. Eprint/Working paper retrieved from https://eprint.iacr.org/2017/034.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, January). A New Polytopic Approach for the Unknown Input Functional Observer Design. International Journal of Control.
Fagerholm, F., Sanchez Guinea, A., Mäenpää, H., & Münch, J. (2017). The RIGHT model for Continuous Experimentation. Journal of Systems and Software, 123, 292-305.
Giurgiu, A., & Lallemang, T. (2017, January). The General Data Protection Regulation: A New Opportunity and Challenge for the Banking Sector. Ace Magazine et Archives Online : Fiscalité, Comptabilité, Audit, Droit des Affaires au Luxembourg, (1), 3-15.
Kannan, S., Sajadi Alamdari, S. A., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2017). Model predictive control for cooperative control of space robots. Model predictive control for cooperative control of space robots (pp. 020068). AIP Publishing.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, January). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics & Security.
Perrin, L. P., & Udovenko, A. (2017). Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog. IACR Transactions on Symmetric Cryptology, 2016(2), 99-124.
Ajani, G., Boella, G., Di Caro, L., Robaldo, L., Humphreys, L., Praduroux, S., Rossi, P., & Violato, A. (2017). The European Legal Taxonomy Syllabus: A multi-lingual, multi-level ontology framework to untangle the web of European legal terminology. Applied Ontology.
Almasi, M., Hemmati, H., Fraser, G., Arcuri, A., & Benefelds, J. (2017). An Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application. ACM/IEEE International Conference on Software Engineering (ICSE).
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2017). Symbol-Level Multiuser MISO Precoding for Multi-level Adaptive Modulation. IEEE Transactions on Wireless Communications.
Annaiyan, A., Olivares Mendez, M. A., & Voos, H. (2017). Real-time graph-based SLAM in unknown environments using a small UAV. 2017 International Conference on Unmanned Aircraft Systems (ICUAS); Miami 13-16 June 2017 (pp. 1118-1123).
Antonelo, E. A., Camponogara, E., & Foss, B. (2017). Echo State Networks for Data-driven Downhole Pressure Estimation in Gas-lift Oil Wells. Neural Networks, 85, 106--117.
Antonelo, E. A., Flesch, C., & Filipe, S. (2017). Reservoir Computing for Detection of Steady State in Performance Tests of Compressors. Neurocomputing.
Antonelo, E. A., & State, R. (2017). Recurrent Dynamical Projection for Time series-based Fraud detection. ICANN 2017, Part II, LNCS 10614.
Arcuri, A. (2017). Many Independent Objective (MIO) Algorithm for Test Suite Generation. Symposium on Search-Based Software Engineering (SSBSE).
Arcuri, A. (2017). RESTful API Automated Test Case Generation. IEEE International Conference on Software Quality, Reliability & Security (QRS).
Arcuri, A., Fraser, G., & Just, R. (2017). Private API Access and Functional Mocking in Automated Unit Test Generation. IEEE International Conference on Software Testing, Verification and Validation (ICST).
Backes, M., Humbert, M., Pang, J., & Zhang, Y. (2017). walk2friends: Inferring Social Links from Mobility Profiles. Proceedings of the 24th ACM International Conference on Computer and Communications Security (pp. 1943-1957). ACM Press.
Bana, G. (2017). Models of Objective Chance: An Analysis through Examples. Making it Formally Explicit (pp. 43-60). Springer.
Baptista, R., Antunes, M., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Flexible Feedback System for Posture Monitoring and Correction. IEEE International Conference on Image Information Processing (ICIIP).
Baptista, R., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2017). Video-Based Feedback for Assisting Physical Activity. 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP).
Bartel, A. (2017). Architecture 64 bits / aslr: quelles conséquences pour les exploits 32 bits? Étude de cas avec Java et le CVE-2010-0842. Multi-System & Internet Security Cookbook, 89.
Bartolini, C. (2017). Software Testing Techniques Revisited for OWL Ontologies. In S., Hammoudi, L., Ferreira Pires, B., Selic, & P., Desfray (Eds.), Model-Driven Engineering and Software Development (pp. 132-153). Springer International Publishing.
Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2017). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In T., Bosse & B., Bredeweg (Eds.), Communications in Computer and Information Science (pp. 47-62). Springer International Publishing.
Bartolini, C., Muthuri, R., & Cristiana, S. (2017). Using Ontologies to Model Data Protection Requirements in Workflows. In M., Otake, S., Kurahashi, Y., Ota, K., Satoh, & D., Bekki (Eds.), New Frontiers in Artificial Intelligence (pp. 233-248). Springer International Publishing.
Bartolini, C., Tettamanti, T., & István, V. (2017). Critical features of autonomous road transport from the perspective of technological regulation and law. Transportation Research Procedia, 27, 791-798.
Ben Fadhel, A. (2017). Comprehensive Specification and Efficient Enforcement of Role-based Access Control Policies using a Model-driven Approach. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Bianculli, D. (Promotor), Klein, J., Balzarotti, D., & Steimann, F.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017). Chapter 4:A Survey on The Polytopic Takagi-Sugeno Approach: Application to the Inverted Pendulum. The Inverted Pendulum: From Theory to New Innovations in Control and Robotics. The Institution of Engineering and Technology IET-publishing.
Biesmans, W., Balasch, J., Rial, A., Preneel, B., & Verbauwhede, I. (2017). Private Mobile Pay-TV From Priced Oblivious Transfer. IEEE Transactions on Information Forensics & Security.
Bohrer, B., Rahli, V., Vukotic, I., Volp, M., & Platzer, A. (2017). Formally Verified Differential Dynamic Logic. CPP 2017.
Booth, R., Casini, G., Meyer, T., & Varzinczak, I. (2017). Extending Typicality for Description Logics. University of Luxembourg.
Booth, R., Casini, G., & Varzinczak, I. (Eds.). (2017). DARe-17 - Proceedings of the Fourth International Workshop on Defeasible and Ampliative Reasoning. CEUR Workshop Proceedings.
Brugali, D., & Hochgeschwender, N. (2017). Managing the Functional Variability of Robotic Perception Systems. Proceedings of the IEEE International Conference on Robotic Computing.
Brust, M. R., Danoy, G., Bouvry, P., Gashi, D., Pathak, H., & Goncalves, M. P. (2017). Defending Against Intrusion of Malicious UAVs with Networked UAV Defense Swarms. 42nd IEEE Conference on Local Computer Networks. IEEE Computer Society.
Brust, M. R., Zurad, M., Hentges, L. P., Gomes, L., Danoy, G., & Bouvry, P. (2017). Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering. CYBCONF 2017-12-13 09:39:53 +0000 2017-12-13 09:39:53 +0000. IEEE.
Camino, R. D., State, R., Montero, L., & Valtchev, P. (2017). Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017).
Campos, J., Ge, Y., Fraser, G., Eler, M., & Arcuri, A. (2017). An Empirical Evaluation of Evolutionary Algorithms for Test Suite Generation. Symposium on Search-Based Software Engineering (SSBSE).
Castignani, G., Derrmann, T., Frank, R., & Engel, T. (2017). Smartphone-based Adaptive Driving Maneuver Detection: A large-scale Evaluation Study. IEEE Transactions on Intelligent Transportation Systems.
Changaival, B., & Rosalie, M. (2017). Exploring chaotic dynamics by partition of bifurcation diagram. Proceeding of Workshop on Advance in Nonlinear Complex Systems and Applications (WANCSA) (pp. 7-8).
Cogo, V. V., Bessani, A., Couto, F. M., Gama-Carvalho, M., Fernandes, M., & Verissimo, P. (2017). How can photo sharing inspire sharing genomes? 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017.
Correa Bahnsen, A., Villegas, S., Aouada, D., & Ottersten, B. (2017). Fraud Detection by Stacking Cost-Sensitive Decision Trees. Data Science for Cyber-Security (DSCS), London 25-27 September.
De Caro, A.* , Iovino, V.* , & O'Neill, A.* . (2017). Receiver and Sender Deniable Functional Encryption. IET Information Security.
* These authors have contributed equally to this work.
Demisse, G., Aouada, D., & Ottersten, B. (2017). Deformation Based Curved Shape Representation. IEEE Transactions on Pattern Analysis & Machine Intelligence.
Derrmann, T., Frank, R., & Viti, F. (2017). Towards Estimating Urban Macroscopic Fundamental Diagrams From Mobile Phone Signaling Data: A Simulation Study. Poster session presented at TRB 96th Annual Meeting, Washington, D.C, USA.
Desmedt, Y., Iovino, V., Persiano, G., & Visconti, I. (2017). Controlled Homomorphic Encryption: Definition and Construction. FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2017). Automata Language Equivalence vs. Simulations for Model-based Mutant Equivalence: An Empirical Evaluation. 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017).
Dong, N., Jonker, H., & Pang, J. (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers & Security, 65, 405-432.
Erata, F., Göknil, A., Tekinerdogan, B., & Kardas, G. (2017). A Tool for Automated Reasoning about Traces Based on Configurable Formal Semantics. 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)) (pp. 959-963).
Esfahani, A., Mantas, G., Matischek, R., Saghezchi, F. B., Rodriguez, J., Bicaku, A., Maksuti, S., Tauber, M. G., Schmittner, C., & Bastos, J. (2017). A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment. IEEE Internet of Things Journal, 6(1), 288-296.
Faye, S., Bronzi, W., Tahirou, I., & Engel, T. (2017). Characterizing User Mobility Using Mobile Sensing Systems. International Journal of Distributed Sensor Networks, 13(8).
Faye, S., Louveton, N., Jafarnejad, S., Kryvchenko, R., & Engel, T. (2017). An Open Dataset for Human Activity Analysis using Smart Devices.
Fernandes, M., Decouchant, J., Couto, F. M., & Verissimo, P. (2017). Cloud-Assisted Read Alignment and Privacy. 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017.
Fiz Pontiveros, B., Hommes, S., & State, R. (2017). Confirmation Delay Prediction of Transactions in the Bitcoin Network. Advances in Computer Science and Ubiquitous Computing.
Fotiadis, G., & Konstantinou, E. (2017). Pairing-Friendly Elliptic Curves Resistant to TNFS Attacks. Paper presented at 7th International Conference on Algebraic Informatics, Kalamata, Greece.
Fraser, G., Rojas, J. M., Campos, J., & Arcuri, A. (2017). EVOSUITE at the SBST 2017 Tool Competition. IEEE/ACM International Workshop on Search-Based Software Testing (SBST).
Gajrani, J., Li, L., Laxmi, V., Tripathi, M., Singh Gaur, M., & Conti, M. (2017). POSTER: Detection of Information Leaks via Reflection in Android Apps. The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017).
Galetzka, M., & Glauner, P. (2017). A Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons. Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP.
Garousi, V., Afzal, W., Çağlar, A., Işık, İ. B., Baydan, B., Çaylak, S., Boyraz, A. Z., Yolaçan, B., & Herkiloğlu, K. (2017). Comparing automated visual GUI testing tools: an industrial case study. Proceedings of International Workshop on Automated Software Testing (A-TEST).
Garousi, V., & Yıldırım, E. (2017). Introducing automated GUI testing and observing its benefits: an industrial case study in the context of law-practice management software. Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM).
Genç, Z. A., Kardaş, S., & Kiraz. (2017). Examination of a New Defense Mechanism: Honeywords. Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice. Springer.
Genç, Z. A., Lenzini, G., & Ryan, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press.
Ghanavati, S., Van Zee, M., & Bex, F. (2017). Argumentation-based Methodology for Goal-oriented Requirements Language (GRL). Proceedings of the 10th International i* Workshop co-located with the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), Essen, Germany, June 12-13, 2017.
Gharanjik, A., Shankar, B., Zimmer, F., & Ottersten, B. (2017). Centralized Rainfall Estimation using Carrier-to-Noise of Satellite Communication Links. IEEE Journal on Selected Areas In Communications.
Ghorbel, E. (2017). Fast and accurate human action recognition using RGB-D cameras. Unpublished doctoral thesis, Normandie Université, ​​France.
Giustolisi, R., Iovino, V., & Lenzini, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R., Giustolisi, V., Iovino, & G., Lenzini, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS.
Glauner, P., Dahringer, N., Puhachov, O., Meira, J. A., Valtchev, P., State, R., & Duarte, D. (2017). Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations. Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017).
Glauner, P., Du, M., Paraschiv, V., Boytsov, A., Lopez Andrade, I., Meira, J. A., Valtchev, P., & State, R. (2017). The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study. Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017).
Glauner, P., Meira, J. A., Valtchev, P., State, R., & Bettinger, F. (2017). The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey. International Journal of Computational Intelligence Systems, 10(1), 760-775.
Goncalves Almeida Antunes, M., Barreto, J. P., Aouada, D., & Ottersten, B. (2017). Unsupervised Vanishing Point Detection and Camera Calibration from a Single Manhattan Image with Radial Distortion. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.
Goodman, D., Varisteas, G., & Harris, T. (2017). Pandia: comprehensive contention-sensitive thread placement. Proceedings of the Twelfth European Conference on Computer Systems (pp. 254-269). New York, USA: ACM.
Havrikov, N., Gambi, A., Zeller, A., Arcuri, A., & Galeotti, J. P. (2017). Generating Unit Tests with Structured System Interactions. IEEE/ACM International Workshop on Automation of Software Test (AST).
He, S., Wang, J., Huang, Y., Ottersten, B., & Hong, W. (2017). Codebook-Based Hybrid Precoding for Millimeter Wave Multiuser Systems. IEEE Transactions on Signal Processing, 65(20), 5289-5304.
Huynen, J.-L., & Lenzini, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. Proceedings of the 3rd International Conference on Information Systems Security and Privacy.
Iovino, V., Tang, Q., & Zebrowski, K. (2017). On the power of Public-key Function-Private Functional Encryption. IET Information Security.
Jafarnejad, S., Castignani, G., & Engel, T. (2017). Towards a Real-Time Driver Identification Mechanism Based on Driving Sensing Data. 20th International Conference on Intelligent Transportation Systems (ITSC) (pp. 7).
Jan, S., Nguyen, D. C., Andrea, A., & Briand, L. (2017). A Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications. 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017.
Jayakody, Chatzinotas, S., Thompson, & Durrani (Eds.). (2017). Wireless Information and Power Transfer: A New Paradigm for Green Communications. Springer.
Jhawar, R., & Mauw, S. (2017). Model-driven situational awareness for moving target defense. In M., Scanlon & N.-A., Le-Khac (Eds.), Proc. 16th European Conference on Cyber Warfare and Security (pp. 184-192). ACPI.
Jimenez, M., Cordy, M., Kintis, M., Titcheu Chekam, T., Le Traon, Y., & Papadakis, M. (2017). On the Naturalness of Mutants. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/35014.
Kalantari, A., Tsinos, C., Soltanalian, M., Chatzinotas, S., Ma, W.-K., & Ottersten, B. (2017). MIMO directional modulation M-QAM precoding for transceivers performance enhancement. MIMO directional modulation M-QAM precoding for transceivers performance enhancement.
Kalantari, A., Tsinos, C., Soltanalian, M., Chatzinotas, S., Ma, W.-K., & Ottersten, B. (2017). Spatial peak power minimization for relaxed phase M-PSK MIMO directional modulation transmitter. Spatial peak power minimization for relaxed phase M-PSK MIMO directional modulation transmitter.
Kannan, S., Bezzaoucha, S., Quintanar Guzman, S., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2017). Hierarchical control of aerial manipulation vehicle. AIP Conference Proceedings, 1798(1), 020069.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2017). Modelling and Performance Analysis of Cognitive Radio Systems from a Deployment Perspective. Handbook of Cognitive Radio. Springer.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). Bayesian Optimization Approach of General Bi-level Problems. Proceedings of the Genetic and Evolutionary Computation Conference Companion (pp. 1614-1621). New York, USA: ACM.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). A new Co-evolutionary Algorithm Based on Constraint Decomposition. IPDPS. IEEE Computer Society.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). A new modeling approach for the biobjective exact optimization of satellite payload configuration. International Transactions in Operational Research.
Kremer, P., Dentler, J. E., Kannan, S., & Voos, H. (2017). Cooperative localization of unmanned aerial vehicles in ROS - The Atlas node. 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).
Kreutz, D., Verissimo, P., Magalhaes, C., & Ramos, F. M. V. (2017). The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure.
Kubler, S., Robert, J., Umbrich, J., Neumaier, S., & Le Traon, Y. (2017). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly.
Lagraa, S., François, J., Lahmadi, A., Minier, M., Hammerschmidt, C., & State, R. (2017). BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows. CSNet 2017 Conference Proceedings.
Lagunas, E., Monica, N., Pau, C., Montse, N., Ricardo, G., & Genis, F. (2017). Position Estimation for IR-UWB Systems: DPE, Multi-TOA approach and their Compressive Sensing-based Modeling. Positioning and Navigation in Complex Environments. PA, USA: IGI Global Hershey.
Lagunas, E., & Rugini, L. (2017). Performance of Compressive Sensing Based Energy Detection. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, 8-13 October 2017.
Laurent, T., Papadakis, M., Kintis, M., Henard, C., Le Traon, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. 10th IEEE International Conference on Software Testing, Verification and Validation.
Lei, L., Lagunas, E., Maleki, S., He, Q., Chatzinotas, S., & Ottersten, B. (2017). Energy Optimization for Full-Duplex Self-Backhauled HetNet with Non-Orthogonal Multiple Access. International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, July 2017.
Lemanska, M., Rodríguez-Velázquez, A., & Trujillo Rasua, R. (2017). Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. Fundamenta Informaticae, 152(3), 273-287.
Li, L., Bissyande, T. F. D. A., & Klein, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology.
Li, L., Dong, N., Pang, J., Sun, J., Bai, G., Liu, Y., & Dong, J. S. (2017). A verification framework for stateful security protocols. Proceedings of the 19th International Conference on Formal Engineering Methods (pp. 262-280). Springer Science & Business Media B.V.
Liu, B., Lucia, L., Nejati, S., & Briand, L. (2017). Improving Fault Localization for Simulink Models using Search-Based Testing and Prediction Models. 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017).
Loise, T., Devroey, X., Perrouin, G., Papadakis, M., & Heymans, P. (2017). Towards Security-aware Mutation Testing. The 12th International Workshop on Mutation Analysis (Mutation 2017).
Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS.
Manzo, G., Soua, R., Di Maio, A., Engel, T., Palattella, M. R., & Rizzo, G. (2017). Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario. Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario.
Matinnejad, R., Nejati, S., & Briand, L. (2017). Automated Testing of Hybrid Simulink/Stateflow Controllers: Industrial Case Studies. Proceedings of 11TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2017) (pp. 938-943). ACM.
Meira, J. A., Glauner, P., State, R., Valtchev, P., Dolberg, L., Bettinger, F., & Duarte, D. (2017). Distilling Provider-Independent Data for General Detection of Non-Technical Losses. Power and Energy Conference, Illinois 23-24 February 2017.
Milner, K., Cremers, C., Yu, J., & Ryan, M. (2017). Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. 30th IEEE Computer Security Foundations Symposium.
Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2017). A new decomposition method for attractor detection in large synchronous Boolean networks. Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (pp. 232-249). Springer Science & Business Media B.V.
Nanda, R., Di Caro, L., Boella, G., Konstantinov, H., Tyankov, T., Traykov, D., Hristov, H., Costamagna, F., Humphreys, L., Robaldo, L., & Romano, M. (2017). A Unifying Similarity Measure for Automated Identification of National Implementations of European Union Directives. A Unifying Similarity Measure for Automated Identification of National Implementations of European Union Directives.
Nanda, R., Siragusa, G., Di caro, L., Theobald, M., Boella, G., Robaldo, L., & Costamagna, F. (2017). Concept Recognition in European and National Law. proc. of The 30th international conference on Legal Knowledge and Information Systems (JURIX 2017).
Nguyen, Jayakody, Chatzinotas, S., Thompson, & Li. (2017). Self-Powered Two-Way Cognitive Relay Networks: Protocol Design and Performance Analysis. IEEE Access.
Norvill, R., Fiz Pontiveros, B., State, R., Awan, I., & Cullen, A. (2017). Automated labeling of unknown contracts in Ethereum. Computer Communication and Networks (ICCCN), 2017 26th International Conference on.
Özkan, R., Garousi, V., & Betin-Can, A. (2017). Multi-objective regression test selection in practice: an empirical study in the defense software industry. Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM).
Pang, J., & Zhang, Y. (2017). DeepCity: A Feature Learning Framework for Mining Location Check-Ins. Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (pp. 652-655). AAAI.
Pang, J., & Zhang, Y. (2017). Quantifying location sociality. Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (pp. 145-154). ACM Press.
Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Le Traon, Y., & Harman, M. (2017). Mutation Testing Advances: An Analysis and Survey. Advances in Computers. Elsevier.
Papadopoulos, K., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2017). Enhanced Trajectory-based Action Recognition using Human Pose. IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017.
Papazafeiropoulos, A., Sharma, S. K., Ratnarajah, T., & Chatzinotas, S. (2017). Impact of Residual Additive Transceiver Hardware Impairments on Rayleigh-Product MIMO Channels with Linear Receivers: Exact and Asymptotic Analyses. IEEE Transactions on Communications.
Papazafeiropoulos, Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2017). Ergodic Capacity Analysis of Amplify-and-Forward Dual-Hop MIMO Relay Systems with Residual Transceiver Hardware Impairments: Conventional and Large System Limits. IEEE Transactions on Vehicular Technology.
Politis, C., Maleki, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2017). Weak Interference Detection with Signal Cancellation in Satellite Communications. The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017.
Politis, C., Maleki, S., Tsinos, C., Liolis`, K., Chatzinotas, S., & Ottersten, B. (2017). Simultaneous Sensing and Transmission for Cognitive Radios with Imperfect Signal Cancellation. IEEE Transactions on Wireless Communications.
Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2017). Observer design for Lightweight Robotic arm actuated by Shape Memory Alloy (SMA) wire. In S., Quintanar Guzman, S., Kannan, H., Voos, M., Darouach, & M., Alma, 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, 16-17 November 2017.
Rahli, V., & Bickford, M. (2017). Validating Brouwer's Continuity Principle for Numbers Using Named Exceptions. Mathematical Structures in Computer Science.
Rahli, V., Bickford, M., & Constable, R. (2017). Bar Induction: The Good, the Bad, and the Ugly. Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS).
Rahli, V., Guaspari, D., Bickford, M., & Constable, R. (2017). EventML: Specification, Verification, and Implementation of Crash-Tolerant State Machine Replication Systems. Science of Computer Programming.
Rial, A. (2017). Issuer-Free Oblivious Transfer with Access Control Revisited. Information Processing Letters.
Riestock, M., Engelhard, F., Zug, S., & Hochgeschwender, N. (2017). Exploring Gridmap-based Interfaces for the Remote Control of UAVs under Bandwidth Limitations. Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction.
Riestock, M., Engelhard, F., Zug, S., & Hochgeschwender, N. (2017). User Study on Remotely Controlled UAVs with Focus on Interfaces and Data Link Quality. IEEE/RAS International Conference on Intelligent Robots and Systems.
Robaldo, L., & Sun, X. (2017). On the Complexity of Input/Output Logic. Journal of Applied Logic.
Robaldo, L., & Sun, X. (2017). Reified Input/Output logic: Combining Input/Output logic and Reification to represent norms coming from existing legislation. Journal of Logic & Computation.
Rocchetto, M. (2017). Towards Formal Security Analysis of Industrial Control Systems. Towards Formal Security Analysis of Industrial Control Systems.
Sannier, N., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2017). An Automated Framework for Detection and Resolution of Cross References in Legal Texts. Requirements Engineering, 22(2), 215-237.
Sedighi, S., Shankar, B., Maleki, S., & Ottersten, B. (2017). Multi-Target Localization in Asynchronous MIMO Radars Using Sparse Sensing. Paper presented at IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), Curaçao, Dutch Antilles, Netherland.
Shabayek, A. E. R., Aouada, D., Saint, A. F. A., & Ottersten, B. (2017). DEFORMATION TRANSFER OF 3D HUMAN SHAPES AND POSES ON MANIFOLDS. IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017.
Shabayek, A. E. R., Baptista, R., Papadopoulos, K., Demisse, G., Oyedotun, O., Antunes, M., Aouada, D., Ottersten, B., Anastassova, M., Boukallel, M., Panëels, S., Randall, G., André, M., Douchet, A., Bouilland, S., & Ortiz Fernandez, L. (2017). STARR - Decision SupporT and self-mAnagement system for stRoke survivoRs Vision based Rehabilitation System. European Project Space on Networks, Systems and Technologies (pp. 69-80). SciTePress.
Sharma, Bogale, Le, Chatzinotas, S., Wang, & Ottersten, B. (2017). Dynamic Spectrum Sharing in 5G Wireless Networks with Full-Duplex Technology: Recent Advances and Research Challenges. IEEE Communications Surveys and Tutorials.
Sharma, S. K., Lagunas, E., Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). Spectral coexistence for next generation wireless backhaul networks. Access, Fronthaul and Backhaul Networks for 5G and Beyond. Institution of Engineering and Technology.
Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search.
Soltana, G., Sabetzadeh, M., & Briand, L. (2017). Synthetic Data Generation for Statistical Testing. 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE'17) (pp. 872-882). IEEE.
Steichen, M., Hommes, S., & State, R. (2017). ChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow. ChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow.
Sun, X., & Robaldo, L. (2017). Norm-based deontic logic for access control, some computational results. Future Generation Computer Systems.
Symeonidis, I., Aly, A., Mustafa, M. A., Mennink, B., Dhooghe, S., Preneel, B., Foley, S. N., Gollmann, D., & Snekkenes, E. (2017). SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision. In I., Symeonidis, Computer Security -- ESORICS 2017 (22). Cham: Springer International Publishing.
Tervo, O., Pennanen, H., Chatzinotas, S., Ottersten, B., & Juntti, M. (2017). Multi-cell interference coordination for multigroup multicast transmission. 2017 European Conference on Networks and Communications (EuCNC).
Tervo, O., Tran, L. N., Chatzinotas, S., Juntti, M., & Ottersten, B. (2017). Energy-efficient joint unicast and multicast beamforming with multi-antenna user terminals. 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Tervo, O., Tran, L. N., Pennanen, H., Chatzinotas, S., Juntti, M., & Ottersten, B. (2017). Energy-efficient coordinated multi-cell multi-group multicast beamforming with antenna selection. 2017 IEEE International Conference on Communications Workshops (ICC).
Tervo, Pennanen, Christopoulos, Chatzinotas, S., Juntti, & Ottersten. (2017). Distributed Optimization for Coordinated Multi-cell Multigroup Multicast Beamforming: Power Minimization and SINR Balancing. IEEE Transactions on Signal Processing.
Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). On the energy-efficiency of hybrid analog-digital transceivers for large antenna array systems. On the energy-efficiency of hybrid analog-digital transceivers for large antenna array systems.
Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). On the Energy-Efficiency of Hybrid Analog-Digital Transceivers for Single- and Multi-carrier Large Antenna Array Systems. IEEE Journal on Selected Areas In Communications.
Tüysüz, A., Meyer, F., Steichen, M., Zwyssig, C., & Kolar, J. W. (2017). Advanced Cooling Methods for High-Speed Electrical Machines. IEEE Transactions on Industry Applications.
van der Torre, L., & Van Zee, M. (2017). Rational Enterprise Architecture. Advances in Artificial Intelligence: From Theory to Practice - 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, Arras, France, June 27-30, 2017, Proceedings, Part I.
Verissimo, P., Volp, M., Decouchant, J., & Rocha, F. (2017). Meeting the Challenges of Critical and Extreme Dependability and Security. Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing (pp. 92-97).
Volp, M., Rocha, F., Decouchant, J., Yu, J., & Verissimo, P. (2017). Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. Twenty-fifth International Workshop on Security Protocols.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017). Coded Caching and Storage Planning in Heterogeneous Networks. 2017 IEEE Wireless Communications and Networking Conference (WCNC).
Vu, T. X., Nguyen, Hieu Duy, Quek, Tony Q.S., & Sun, Sumei. (2017). Adaptive Cloud Radio Access Networks: Compression and Optimization. IEEE Transactions on Signal Processing, 65(1), 228-241.
Wang, J., Sun, J., Yuan, Q., & Pang, J. (2017). Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (pp. 3-21). Springer.
Wang, Y., Qin, Z., Pang, J., Zhang, Y., & Jin, X. (2017). Semantic annotation for places in LBSN through graph embedding. Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM'17 (pp. 2343-2346). ACM Press.
Wasim, M. U. (2017). Attacks and protection for Intellectual Property Rights, Privacy, and Contracts in the Cloud. Paper presented at ICT International Doctoral School, Trento, Italy.
Wasim, M. U. (2017). Communication Strategies for Next-Generation of University based Science Parks. Paper presented at Training Workshop on Marketing and Communications for Science Parks, Bangkok, Thailand.
Wasim, M. U. (2017). Intellectual Property Rights infringement in the Cloud. Paper presented at 4th International Workshop on New Models, Algorithms and Simulation Tools for Cloud Computing, Cloud Brokering, Internet Shopping, and e-Commerce Trading, Luxembourg, Luxembourg.
Wasim, M. U., Ibrahim, A. A. Z. A., Bouvry, P., & Limba, T. (2017). Law as a Service (LaaS): Enabling Legal Protection over a Blockchain Network. 14th International Conference on Smart Cities: Improving Quality of Life using ICT & IoT (HONET-ICT 17), October 09-11, Irbid Jordan.
Wasim, M. U., Ibrahim, A. A. Z. A., Bouvry, P., & Limba, T. (2017). Self-Regulated Multi-criteria Decision Analysis: An Autonomous Brokerage-Based Approach for Service Provider Ranking in the Cloud. 9th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2017), December 11-14, Hong Kong China.
Yang, X., Lo, D., Li, L., Xia, X., Bissyande, T. F. D. A., & Klein, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology.
Yu, J., & Ryan, M. (2017). Chapter 7: Evaluating web PKIs. Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017. Morgan Kaufmann.
Yu, J., Ryan, M., & Chen, L. (2017). Authenticating compromisable storage systems. The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
zhang, Y., Ni, M., Han, W., & Pang, J. (2017). Does #like4like indeed provoke more likes? Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) (pp. 179-186). ACM.
Ziafati, P., Rodriguez Lera, F. J., Pinto Costa, A., Nazarikhorram, A., & van der Torre, L. (2017). ProCRob Architecture for Personalized Social Robotics. Paper presented at Workshop R4L @HRI 2017.
Ziaragkas, G., Poziopoulou, G., Núñez-Martínez, J., Baranda Hortigüela, J., Moreno, I., Tsinos, C., Maleki, S., Sharma, S. K., Alodeh, M., & Chatzinotas, S. (2017). SANSA - Hybrid Terrestrial-Satellite Backhaul Network: Scenarios, Use cases, KPIs, Architecture, Network and Physical Layer Techniques. International Journal of Satellite Communications and Networking.

2016

Kannan, S., Quintanar Guzman, S., Bezzaoucha, S., Olivares Mendez, M. A., & Voos, H. (2016). Adaptive Control of Hysteretic Robotic arm in Operational Space. 5th International Conference on Mechatronics and Control Engineering ICMCE, venice, Italy, 2016 (pp. 92-96).
Ibrahim, A. A. Z. A., Kliazovich, D., Bouvry, P., & OLEKSIAK, A. (2016). Using Virtual Desktop Infrastructure to Improve Power Efficiency in Grinfy System. IEEE 8th International Conference on Cloud Computing Technology and Science(CloudCom), Luxembourg 2016 (pp. 85-89).
Volp, M., Lackorzynski, A., Decouchant, J., Rahli, V., Rocha, F., & Verissimo, P. (2016, December 12). Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control. Paper presented at 1st Workshop on System Software for Trusted Execution (SysTEX '16), Trento, Italy.
Wagle, S. S., Guzek, M., & Bouvry, P. (2016). Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers. Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (pp. 8).
Wang, J., & Tang, Q. (2016). A Probabilistic View of Neighborhood-based Recommendation Methods. ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE.
Glauner, P., & State, R. (2016, December 09). Deep Learning on Big Data Sets in the Cloud with Apache Spark and Google TensorFlow. Paper presented at 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016), Shanghai, China.
Derrmann, T., Faye, S., Frank, R., & Engel, T. (2016, December 08). Poster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity. Poster session presented at IEEE Vehicular Networking Conference (VNC) 2016, Columbus, Ohio, USA.
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). A tracking error control approach for model predictive position control of a quadrotor with time varying reference. IEEE International Conference on Robotics and Biomimetics ROBIO, Qingdao, China, 2016.
Di Maio, A., Palattella, M. R., Soua, R., Lamorte, L., Vilajosana, X., Alonso-Zarate, J., & Engel, T. (2016). Enabling SDN in VANETs: What is the Impact on Security? Sensors, 16(12), 2077.
Aguilera Gonzalez, A., Voos, H., & Darouach, M. (2016). States and unknown input estimation via non-linear sliding mode high-gain observers for a glucose-insulin system. IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES), Kuala Lumpur, Malaysia, 2016 (pp. 388-393).
Kubler, S., Robert, J., Hefnawy, A., Cherifi, C., Bouras, A., & Främling, K. (2016). IoT-based Smart Parking System for Sporting Event Management. Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 104-114). New York, USA: ACM New York.
Arriaga, A., Iovino, V., & Tang, Q. (2016). Updatable Functional Encryption. Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology (pp. 347-363). Springer.
Bronzi, W., Derrmann, T., Castignani, G., & Engel, T. (2016). Towards Characterizing Bluetooth Discovery in a Vehicular Context. Vehicular Networking Conference (VNC), 2016 IEEE.
Capponi, A., Fiandrino, C., Franck, C., Sorger, U., Kliazovich, D., & Bouvry, P. (2016). Assessing Performance of Internet of Things-based Mobile Crowdsensing Systems for Sensing as a Service Applications in Smart Cities. 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H., Cheon & T., Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag.
Du, M., State, R., Brorsson, M., & Avanesov, T. (2016). Behavior Profiling for Mobile Advertising. Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (pp. 302-307). ACM.
Fiandrino, C., Kantarci, B., Anjomshoa, F., Kliazovich, D., Bouvry, P., & Matthews, J. (2016). Sociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms. IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 2016.
Hammerschmidt, C., Verwer, S., Lin, Q., & State, R. (2016, December). Interpreting Finite Automata for Sequential Data. Interpretable Machine Learning for Complex Systems: NIPS 2016 workshop proceedings.
Hochgeschwender, N., Schneider, S., Voos, H., Bruyninckx, H., & Kraetzschmar, G. (2016). Graph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time Adaptation. IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (pp. 83-90).
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. 2016 Asia-Pacific Software Engineering Conference (APSEC).
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). Optimality Results on the Security of Lookup-Based Protocols. In G. P., Hancke & K., Markantonakis (Eds.), Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (pp. 137-150). Springer.
Popleteev, A. (2016). Indoor positioning and floor plan based ground truth: Can you really click where you are? 15th International Conference on Mobile and Ubiquitious Multimedia (MUM-2016).
Pouryazdan, M., Fiandrino, C., Kantarci, B., Kliazovich, D., Soyata, T., & Bouvry, P. (2016). Game-Theoretic Recruitment of Sensing Service Providers for Trustworthy Cloud-Centric Internet-of-Things (IoT) Applications. IEEE Global Communications Conference (GLOBECOM) Workshops: Fifth International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA).
Rial, A. (2016, December). On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data. Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom).
Seo, H., Liu, Z., Groszschädl, J., & Kim, H. (2016). Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. Security and Communication Networks, 9(18), 5401-5411.
Soltanalian, M., Mysore, R. B. S., & Ottersten, B. (2016). Reliability problems and Pareto-optimality in cognitive radar (Invited paper). Signal Processing Conference (EUSIPCO), 2016 24th European. IEEE.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2016). Per-antenna Power Minimization in Symbol-Level Precoding. IEEE GLOBECOM 2016.
Yang, Y., & Pesavento, M. (2016). A parallel algorithm for energy efficiency maximization in massive MIMO networks. Proc. 2016 IEEE Global Communications Conference.
Li, L. (2016). Boosting Static Security Analysis of Android Apps through Code Instrumentation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J. (Promotor), Briand, L., Bissyande, T. F. D. A., Zhang, X., & Backes, M.
Codeca, L. (2016). Dynamic Vehicular Routing in Urban Environments. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor).
Adebayo, K. J., Di Caro, L., Boella, G., & Bartolini, C. (2016, November 15). An approach to information retrieval and question answering in the legal domain. Paper presented at Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN), Kanagawa, Japan.
Faye, S., Tahirou, I., & Engel, T. (2016). Demo Abstract: Human Mobility Profiling Using Privacy-Friendly Wi-Fi and Activity Traces. Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016).
Volp, M., Klüppelholz, S., Castrillon, J., Härtig, H., Asmussen, N., Assmann, U., Baader, F., Baier, C., Fettweis, G., Fröhlich, J., Goens, A., Haas, S., Habich, D., Hasler, M., Huismann, I., Karnagel, T., Karol, S., Lehner, W., Leuschner, L., Lieber, M., Ling, S., Märcker, S., Mey, J., Nagel, W., Nöthen, B., Penaloza, R., Raitza, M., Stiller, J., Ungethüm, A., & Voigt, A. (2016, November 14). The Orchestration Stack: The Impossible Task of Designing Software for Unknown Future Post-CMOS Hardware. Paper presented at 1ST INTERNATIONAL WORKSHOP ON POST-MOORE’S ERA SUPERCOMPUTING (PMES), Salt Lake City, USA.
Ibrahim, A. A. Z. A., Bouvry, P., Kliazovich, D., & OLEKSIAK, A. (2016). Virtual Desktop Infrastructures: architecture, survey and green aspects proof of concept. 7th INTERNATIONAL GREEN and SUSTAINABLE COMPUTING CONFERENCE (1st RE-HPC workshop), Hangzhou, China (November 2016).
Pejo, B., & Tang, Q. (2016, November 03). Game-Theoretic Framework for Integrity Verification in Computation Outsourcing. Poster session presented at Decision and Game Theory for Security (GameSec), New York, United States of America.
Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2016). A Framework to Reason about the Legal Compliance of Security Standards. Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN).
Bartolini, C., Lenzini, G., & Robaldo, L. (2016). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC).
Gharanjik, A., Shankar, B., Soltanalian, M., & Ottersten, B. (2016). Max-min transmit beamforming via iterative regularization. 50th Asilomar Conference on Signals, Systems and Computers, November 2016.
Göknil, A., Kurtev, I., & van den Berg, K. (2016). A Rule-based Approach for Evolution of AADL Models based on Changes in Functional Requirements. The workshop on Sustainable Architecture: Global Collaboration, Requirements, Analysis (SAGRA) at the 10th European Conference on Software Architecture (ECSA).
Hajri, I. (2016). Supporting Change in Product Lines within the Context of Use Case-Driven Development and Testing. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (DS@FSE 2016) (pp. 1082-1084).
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2016). PUMConf: A Tool to Configure Product Specific Use Case and Domain Models in a Product Line. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (pp. 1008-1012).
Hammerschmidt, C., Marchal, S., Pellegrino, G., State, R., & Verwer, S. (2016, November). Efficient Learning of Communication Profiles from IP Flow Records. Poster session presented at The 41st IEEE Conference on Local Computer Networks (LCN).
Khan, N. A., Baig, F., Nawaz, S. J., Rehman, N. U., & Sharma, S. K. (2016, November). Analysis of Power Quality Signals Using An Adaptive Time-Frequency Distribution. Energies.
Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016, November). Transparent Medical Data Systems. Journal of Medical Systems.
Rial, A., Danezis, G., & Kohlweiss, M. (2016, November). Privacy-preserving smart metering revisited. International Journal of Information Security.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2016). From Random Process to Chaotic Behavior in Swarms of UAVs. DIVANet '16 Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications (pp. 9-15). New York, USA: ACM.
Tang, Q., & Wang, J. (2016, November). Privacy-preserving Friendship-based Recommender Systems. IEEE Transactions on Dependable and Secure Computing.
Al Ismaeil, K., Aouada, D., Solignac, T., Mirbach, B., & Ottersten, B. (2016). Real-Time Enhancement of Dynamic Depth Videos with Non-Rigid Deformations. IEEE Transactions on Pattern Analysis & Machine Intelligence, 39(10), 2045-2059.
Fiandrino, C. (2016). Energy-efficient Communications in Cloud, Mobile Cloud and Fog Computing. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Bouvry, P. (Promotor), Kliazovich, D. (Promotor), Zampunieris, D., Seredynski, F., & Giaccone, P.
Popleteev, A., Arshadaghghaleh, H., & Lutkovski, V. (2016). Small-scale positioning using digital compasses. International Congress on Computer Science: Information Systems and Technologies (CSIST-2016). Minsk, Belarus: BSU.
Christopoulos, D., Pennanen, H., Chatzinotas, S., & Ottersten, B. (2016). Multicast multigroup precoding for frame-based multi-gateway satellite communications. Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), 2016 8th. IEEE.
Dou, W. (2016). A Model-Driven Approach to Offline Trace Checking of Temporal Properties. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Bianculli, D. (Promotor), State, R., Sabetzadeh, M., Pautasso, C., & Furia, C. A.
Tabatabaei, M. (2016). GAMES AND STRATEGIES IN ANALYSIS OF SECURITY PROPERTIES. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Jamroga, W. (Promotor), van der Torre, L., Teague, V., & Schneider, S.
Alodeh, M., Spano, D., Chatzinotas, S., & Ottersten, B. (2016). Peak Power Minimization in Symbol-level Precoding for Cognitive MISO Downlink Channels. IEEE Digital Signal Processing Conference.
Arora, C. (2016). AUTOMATED ANALYSIS OF NATURAL-LANGUAGE REQUIREMENTS USING NATURAL LANGUAGE PROCESSING. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Sabetzadeh, M. (Promotor), Le Traon, Y., Gorschek, T., Sawyer, P., & Nejati, S.
Glauner, P., & State, R. (2016, October 09). Load Forecasting with Artificial Intelligence on Big Data. Paper presented at Sixth IEEE Conference on Innovative Smart Grid Technologies, Europe (ISGT Europe 2016), Ljubljana, Slovenia.
Amin, B., Mansoor, B., Junaid Nawaz, S., Sharma, S. K., & Patwary, M. N. (2016, October). Compressed Sensing of Sparse Multipath MIMO Channels with Superimposed Training Sequence. Wireless Personal Communications.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2016). Extracting Domain Models from Natural-Language Requirements: Approach and Industrial Evaluation. 19th International Conference on Model Driven Engineering Languages and Systems, Saint-Malo 2-7 October 2016.
Caldeira Lima, A., Rocha, F., Volp, M., & Verissimo, P. (2016). Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems. Proceedings of the Second ACM Workshop on Cyber-Physical Systems Security and PrivaCy.
Faye, S., & Engel, T. (2016). Understanding User Daily Mobility Using Mobile and Wearable Sensing Systems. Proceedings of the 2016 International Conference on Information and Communications Technology Convergence - ICTC 2016.
Hammerschmidt, C., Loos, B. L., Verwer, S., & State, R. (2016, October). Flexible State-Merging for learning (P)DFAs in Python. Paper presented at The 13th International Conference on Grammatical Inference.
Hammerschmidt, C., Marchal, S., State, R., & Verwer, S. (2016, October). Behavioral Clustering of Non-Stationary IP Flow Record Data. Poster session presented at 12th International Conference on Network and Service Management.
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2016). Co-evolutionary approach based on constraint decomposition. Co-evolutionary approach based on constraint decomposition.
Kubler, S., Robert, J., William, D., Alexandre, V., & Le Traon, Y. (2016). A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications. Expert Systems with Applications, 65, 398--422.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. The 15th International Symposium on Intelligent Data Analysis.
Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
Mengali, A., Kayhan, F., Shankar, B., & Ottersten, B. (2016). Exploiting diversity in future generation satellite systems with optical feeder links. 34th AIAA ICSSC.
Mitseva, A., Panchenko, A., Lanze, F., Henze, M., Wehrle, K., & Engel, T. (2016, October). POSTER: Fingerprinting Tor Hidden Services. Poster session presented at 23rd ACM Conference on Computer and Communications Security, Vienna, Austria.
Patwary, M., Sharma, S. K., Chatzinotas, S., Chen, Y., Abdel-Maguid, M., Abd-Alhameed, R., Noras, J., & Ottersten, B. (2016). Universal Intelligent Small Cell for Next Generation Cellular Networks. Digital Communications and Networks, 2(4), 167–174.
Pellegrino, G., Hammerschmidt, C., Lin, Q., & Verwer, S. (2016, October). Learning Deterministic Finite Automata from Infinite Alphabets. Paper presented at The 13th International Conference on Grammatical Inference.
Popleteev, A. (2016). HIPS: Human-based indoor positioning system. Proceedings of the 7th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2016).
Popleteev, A. (2016). Indoor positioning using ambient radio signals: Data acquisition platform for a long-term study. Proceedings of the IEEE 13th Workshop on Positioning, Navigation and Communications (WPNC-2016). IEEE.
Pranjic, V., Mazzali, N., Emiliani, L., & Shankar, B. (2016). Return Link Optimized Resource Allocation for Satellite Communications in the Ku/Ka-Band. Proceedings on the 22nd Ka and Broadband Communications Conference and the 34th AIAA International Communications Satellite Systems Conference (ICSSC).
Sciarrone, A., Fiandrino, C., Bisio, I., Lavagetto, F., Kliazovich, D., & Bouvry, P. (2016). Smart Probabilistic Fingerprinting for Indoor Localization over Fog Computing Platforms. IEEE 5th International Conference on Cloud Networking (CloudNet), Pisa, Italy.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Terminal-side interference mitigation for spectral coexistence of satellite and terrestrial systems in non-exclusive Ka-band. 34th AIAA International Communications Satellite Systems Conference.
Kolbe, N., Zaslavsky, A., Kubler, S., & Robert, J. (2016). Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste. Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste (NEW2AN/ruSMART 2016, LNCS 9870 proceedings). Nungambakkam, India: Springer.
Soua, R., Kalogeiton, E., Manzo, G., Duarte, J. M., Palattella, M. R., Di Maio, A., Braun, T., Engel, T., Villas, L. A., & Rizzo, G. A. (2016). SDN coordination for CCN and FC content dissemination in VANETs. Proceedings of the 8th International Conference on Ad Hoc Networks (ADHOCNETS), Ottawa, ON, Canada (pp. 26-27). Springer.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2016). Centralized Power Control in Cognitive Radio Networks Using Modulation and Coding Classification Feedback. IEEE Transactions on Cognitive Communications and Networking, 2(3).
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). A real-time model predictive position control with collision avoidance for commercial low-cost quadrotors. IEEE Multi-Conference on Systems and Control (MSC 2016), Buenos Aires, Argentina, 2016 (pp. 519-525).
Bouvry, P., Chaumette, S., Danoy, G., Guerrini, G., Jurquet, G., Kuwertz, A., Müller, W., Rosalie, M., & Sander, J. (2016). Using Heterogeneous Multilevel Swarms of UAVs and High-Level Data Fusion to Support Situation Management in Surveillance Scenarios. 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, MFI 2016.
Pourmoghaddaslangroudi, A., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Cognitive Interference Management Techniques for the Spectral Co-existence of GSO and NGSO Satellites. International Conference on Wireless and Satellite Systems (WiSATS, formerly PSATS), Cardiff, UK, Sep 2016.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2016). On the Performance Analysis of Underlay Cognitive Radio Systems: A Deployment Perspective. IEEE Transactions on Cognitive Communications and Networking, 2(3), 273 - 287.
Afzal, H. (2016). FULL 3D RECONSTRUCTION OF DYNAMIC NON-RIGID SCENES: ACQUISITION AND ENHANCEMENT. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Aouada, D. (Promotor), Mirbach, B. (Promotor), van der Torre, L., & Fofi, D.
Manukyan, A., Olivares Mendez, M. A., Bissyande, T. F. D. A., Voos, H., & Le Traon, Y. (2016, September 06). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016.
Chaib Draa, K., Voos, H., Alma, M., & Darouach, M. (2016). Invariant Observer Applied to Anaerobic Digestion Model. IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany, 2016.
Derrmann, T., Frank, R., Faye, S., Castignani, G., & Engel, T. (2016). Towards Privacy-Neutral Travel Time Estimation from Mobile Phone Signalling Data. Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2).
Faye, S., Louveton, N., Gheorghe, G., & Engel, T. (2016). A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 7(3).
Galindo, D., Groszschädl, J., Liu, Z., Vadnala, P. K., & Venkatesh, S. V. (2016). Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, 6(3), 229-238.
Henarejos, P., Pérez Neira, A., Mazzali, N., & Mosquera, C. (2016). Advanced Signal Processing Techniques for Fixed and Mobile Satellite Communications. Proceedings on 8th Advanced Satellite Multimedia Systems Conference and 14th Signal Processing for Space Communications Workshop.
Kalantari, A., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016). Frequency of Arrival-based Interference Localization Using a Single Satellite. 8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2016). Performance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels. 2016 IEEE 84th Vehicular Technology Conference: VTC2016-Fall. IEEE.
Kayhan, F. (2016). QAM to Circular Isomorphic Constellations. 8th Advanced Satellite Multimedia Systems Conference (ASMS/SPSC), Palma de Mallorca, Spain, 2016.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering & Knowledge Engineering, 26(9&10), 1361–1377.
Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). Reflection-Aware Static Analysis of Android Apps. The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6).
Mengali, A., Kayhan, F., Shankar, B., & Ottersten, B. (2016). Low Complexity Transmit Processing for Multibeam Satellite Systems with Non-Linear Channels. Proceedings of ASMS Conference.
Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2016). Metrics for Transparency. Proceedings of DPM 2016 and QASA 2016.
Quintanar Guzman, S., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). Operational Space Control of a Lightweight Robotic Arm Actuated By Shape Memory Alloy (SMA) Wires. ASME 2016 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems, Vermont 28-30 September 2016.
Rodes, L., Kaushik, A., Sharma, S. K., Chatzinotas, S., & Jondral, F.