Home // SnT // Publications

Publications

In press

Arcuri, A. (in press). Test Suite Generation with the Many Independent Objective (MIO) Algorithm. Information and Software Technology.
Arora, C., Sabetzadeh, M., Nejati, S., & Briand, L. (in press). An Active Learning Approach for Improving the Accuracy of Automated Domain Model Extraction. ACM Transactions on Software Engineering and Methodology.
Barragán-Ramírez, G. A., Estrada-Moreno, A., Ramirez Cruz, Y., & Rodríguez-Velázquez, J. A. (in press). The Local Metric Dimension of the Lexicographic Product of Graphs. Bulletin of the Malaysian Mathematical Sciences Society.
Bezzaoucha, S., Voos, H., & Darouach, M. (in press). Attack-tolerant Control and Observer-based Trajectory Tracking for Cyber-Physical Systems. European Journal of Control.
Campos, J., Ge, Y., Albunian, N., Fraser, G., Eler, M., & Arcuri, A. (in press). An Empirical Evaluation of Evolutionary Algorithms for Unit Test Suite Generation. Information and Software Technology.
Clarisó, R., Gonzalez Perez, C. A., & Cabot, J. (in press). Smart Bound Selection for the Verification of UML/OCL Class Diagrams. IEEE Transactions on Software Engineering.
Emara, K. A. A. E.-S. (in press). Safety-aware Location Privacy in VANET: Evaluation and Comparison. IEEE Transactions on Vehicular Technology.
Garousi, V., Felderer, M., Karapıçak, Ç. M., & Yılmaz, U. (in press). What we know about testing embedded software. IEEE Software.
Gildas, A., Muhammed, A. B., Ioana, B., Srdjan, Č., Gerhard, H., Süleyman, K., Chong, H. K., Cédric, L., Benjamin, M., Jorge, M., Alberto, P., Kasper, R., Dave, S., Aslan, T., Trujillo Rasua, R., & Serge, V. (in press). Security of Distance−Bounding: A Survey. ACM Computing Surveys.
Jan, S., Panichella, A., Arcuri, A., & Briand, L. (in press). Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications. IEEE Transactions on Software Engineering.
Joroughi, V. (in press). Joint Precoding and On-Board Beamforming for Multiple gateway Multibeam Satellite Systems. Submitted to IEEE Journal on Selected topic in Communication (JSAC).
McKay, B., Schweitzer, P., & Schweitzer, P. (in press). Competition Numbers, Quasi-Line Graphs and Holes. SIAM Journal on Discrete Mathematics.
Mengali, A., Shankar, B., & Ottersten, B. (in press). Exploring Different Receiver Structures for Radio over FSO Systems with Signal Dependent Noise. Proceedings of Globecom 2017.
Palomba, F., Panichella, A., Zaidman, A., Oliveto, R., & De Lucia, A. (in press). The Scent of a Smell: An Extensive Comparison between Textual and Structural Smells. IEEE Transactions on Software Engineering.
Platbrood, L., Capitanescu, F., Merckx, C., Crisciu, H., & Wehenkel, L. (in press). A Generic Approach for Solving Nonlinear-Discrete Security-Constrained Optimal Power Flow Problems in Large-Scale Systems. IEEE Transactions on Power Systems.
Rosich, A., Sarrate, R., & Nejjari, F. (in press). On-line model-based fault detection and isolation for PEM fuel cell stack systems. Applied Mathematical Modelling.
Shamshiri, Rojas, Gazzola, Fraser, McMinn, Mariani, & Arcuri, A. (in press). Random or Evolutionary Search for Object-Oriented Test Suite Generation? Software Testing, Verification & Reliability.
Shin, D., Yoo, S., Papadakis, M., & Bae, D.-H. (in press). Empirical Evaluation of Mutation-based Test Prioritization Techniques. Software Testing, Verification and Reliability.
Smyth, M., Benyon, D., McCall, R., O'Neill, S., & Carroll, F. (in press). Patterns of Place: An Integrated Approach for the Design and Evaluation of Real and Virtual Environments. In M., Lombard, J., Freeman, W., Ijesslsteijn, & J., Schwaevitz (Eds.), Immersed in Media: Presence Theory, Measurement and Technology (1). London, UK: Springer.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (in press). An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving. IEEE Transactions on Software Engineering.
Wagle, S. S., Guzek, M., & Bouvry, P. (in press). Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers. Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (pp. 8).
Wang, C., Pastore, F., & Briand, L. (in press). Oracles for Testing Software Timeliness with Uncertainty. ACM Transactions on Software Engineering and Methodology.
Zhu, Panichella, A., & Zaidman, A. (in press). An Investigation of Compression Techniques to Speed up Mutation Testing. Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018.

2019

Rubin, I., Baiocchi, A., Sunyoto, Y., & Turcanu, I. (2019). Traffic Management and Networking for Autonomous Vehicular Highway Systems. Ad Hoc Networks, 83, 125-148.

2018

Liu, K., Koyuncu, A., Kim, K., Kim, D., & Bissyande, T. F. D. A. (2018, December 07). LSRepair: Live Search of Fix Ingredients for Automated Program Repair. Paper presented at 25th Asia-Pacific Software Engineering Conference, Nara, Japan.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, December 03). Nonlinear Model Predictive Control for Ecological Driver Assistance Systems in Electric Vehicles. Robotics and Autonomous Systems.
Ferreira Torres, C., Schütte, J., & State, R. (2018). Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018.
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018, December). Sequential Resource Distribution Technique for Multi-User OFDM-SWIPT based Cooperative Networks. Paper presented at IEEE Global Communications Conference (IEEE GLOBECOM), Abu Dhabi, UAE.
Krivochiza, J., Merlano Duncan, J. C., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018, December). Closed-Form Solution for Computationally Efficient Symbol-Level Precoding. Paper presented at IEEE Global Communications Conference 2018, Abu Dhabi, UAE.
Lei, L., You, L., Yang, Y., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Power and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks. IEEE Global Communications Conference (GLOBECOM) 2018.
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive convex approximation algorithms for sparse signal estimation with nonconvex regularizations. IEEE Journal of Selected Topics in Signal Processing, 12(6), 1-19.
Yakubov, A., Shbair, W., & State, R. (2018). BlockPGP: A Blockchain-based Framework for PGP Key Servers. The Sixth International Symposium on Computing and Networking (November 27-30, 2018). Hida Takayama, Japan: IEEE Xplore.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, November 27). Ecological Advanced Driver Assistance System for Optimal Energy Management in Electric Vehicles. IEEE Intelligent Transportation Systems Magazine.
Bandi, A. (2018). A Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels. In A., Bandi, B., Shankar, S., maleki, S., Chatzinotas, & B., Ottersten, 6th IEEE Global Conference on Signal and Information Processing, November 26–29, 2018 Anaheim, California, USA (pp. 1-5). Anaheim, California, USA: IEEE.
Khan, N. (2018). FAST: A MapReduce Consensus for High Performance Blockchains. In N., Khan, Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems. New York, USA: ACM.
Atashpendar, A., Policharla, G. V., Roenne, P., & Ryan, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Springer.
Mund, S., Frank, R., Varisteas, G., & State, R. (2018). Visualizing the Learning Progress of Self-Driving Cars. 21st International Conference on Intelligent Transportation Systems (pp. 2358-2363). IEEE.
Baptista, R., Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation-Based Abnormal Motion Detection using 3D Skeletons. IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA).
Biryukov, A., & Udovenko, A. (2018). Attacks and Countermeasures for White-box Designs. In T., Peyrin & S., Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing.
Charlier, J. H. J., Falk, E., State, R., & Hilger, J. (2018, November). User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition. 2018 IEEE International Conference on Data Mining Workshops (ICDMW).
Fletcher, S., De Vries, M., & Max, C. (2018). Die technische Mündigkeit von Schüler/-innen zum Ende der Sek. I im internationalen Vergleich – Entwicklung eines Testwerkinstruments und erste Ergebnisse. Journal of Technical Education, 6(4).
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). PowerMinimizer Symbol-Level Precoding: A Closed-Form Sub-Optimal Solution. IEEE Signal Processing Letters, 25(11), 1730-1734.
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-Level Precoding Design Based on Distance Preserving Constructive Interference Regions. IEEE Transactions on Signal Processing, 66(22), 5817-5832.
Msadek, M. N., Soua, R., Ladid, L., & Engel, T. (2018). Advancing the Security of Trustworthy Self-IoT (Position Paper). International Conference on Smart Applications, Communications and Networking (SmartNets).
Lopez Becerra, J. M., Ostrev, D., & Skrobot, M. (2018). Forward Secrecy for SPAKE2. In J., Baek & S., Willy (Eds.), Provable Security (pp. 366-384). Springer International Publishing.
Wang, J. (2018). Privacy-preserving Recommender Systems Facilitated By The Machine Learning Approach. Unpublished doctoral thesis, University of Luxembourg, ​Esch-sur-Alzette, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Tang, Q., DOMINGO-FERRER, J., & PALAMIDESSI, C.
Pilgun, A., Gadyatskaya, O., Dashevskyi, S., Zhauniarovich, Y., & Kushniarou, A. (2018, October 15). DEMO: An Effective Android Code Coverage Tool. Poster session presented at Conference on Computer and Communications Security.
Samir Labib, N., Liu, C., Dilmaghani, S., Brust, M., Danoy, G., & Bouvry, P. (2018). White Paper: Data Protection and Privacy in Smart ICT - Scientific Research and Technical Standardization (1.0). Luxembourg: ILNAS.
Jimenez, M., Titcheu Chekam, T., Cordy, M., Papadakis, M., Kintis, M., Le Traon, Y., & Harman, M. (2018, October 11). Are mutants really natural? A study on how “naturalness” helps mutant selection. 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18).
Jimenez, M. (2018). Evaluating Vulnerability Prediction Models. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Kelsen, P., Papadakis, M., Sarro, F., & Blanc, X.
Artiga, X., Pérez-Neira, Baranda, Lagunas, E., Chatzinotas, S., Zetik, R., Gorski, P., Ntougias, K., Pérez, D., & Ziaragkas, G. (2018, October). Shared Access Satellite-Terrestrial Reconfigurable Backhaul Network Enabled by Smart Antennas at MmWave Band. IEEE Network.
Bouvry, P., Varrette, S., Wasim, M. U., Ibrahim, A. A. Z. A., Besseron, X., & Trinh, T. A. (2018). Security, reliability and regulation compliance in Ultrascale Computing System. In J., Carretero & E., Jeannot (Eds.), Ultrascale Computing Systems. IET.
Dashevskyi, S., Gadyatskaya, O., Pilgun, A., & Yury, Z. (2018, October). The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. Poster session presented at The 25th ACM Conference on Computer and Communications Security, Toronto, Canada.
Dou, W., Bianculli, D., & Briand, L. (2018). Model-Driven Trace Diagnostics for Pattern-based Temporal Specifications. Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018). New York, USA: ACM.
Gonzalez Perez, C. A., Varmazyar, M., Nejati, S., Briand, L., & isasi, Y. (2018). Enabling Model Testing of Cyber-Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18).
Jhawar, R., Lounis, K., Mauw, S., & Ramirez Cruz, Y. (2018). Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library. In S., Katsikas & C., Alcaraz (Eds.), Security and Trust Management. STM 2018 (pp. 85-101). Springer.
Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223).
Merlano Duncan, J. C., Krivochiza, J., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018, October). Hardware Demonstration of Precoded Communications in Multi-Beam UHTS Systems. Paper presented at 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada.
Pejo, B., Tang, Q., & Gergely, B. (2018, October). The Price of Privacy in Collaborative Learning. Poster session presented at The 25th ACM Conference on Computer and Communications Security, Toronto, Canada.
Sedighi, S., Shankar, B., & Ottersten, B. (2018, October). A Statistically Efficient Estimator for Co-array Based DoA Estimation. Poster session presented at The Asilomar Conference on Signals, Systems, and Computers.
Shin, S. Y., Chaouch, K., Nejati, S., Sabetzadeh, M., Briand, L., & Zimmer, F. (2018). HITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18).
Soua, R., Palattella, M. R., & Engel, T. (2018). IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks. IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks.
Vu, T. X., Maturo, N., Vupalla, S., Chatzinotas, S., Grotz, J., & Alagha, N. (2018, October). Efficient 5G Edge Caching Over Satellite. Paper presented at 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls.
Wang, J., Arriaga, A., Tang, Q., & Ryan, P. (2018, October). Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. Poster session presented at the 2018 ACM SIGSAC Conference.
Yang, Y., Pesavento, M., Eldar, Y. C., & Ottersten, B. (2018). Parallel coordinate descent algorithms for sparse phase retrieval. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/37388.
Kubler, S., Derigent, W., Voisin, A., Robert, J., Le Traon, Y., & Herrera Viedma, E. (2018, September 27). Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index. Knowledge-Based Systems.
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018). TUNA: TUning Naturalness-based Analysis. 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018.
Bandi, A. (2018). Sparsity-Aided Low-Implementation cost based On-Board beamforming Design for High Throughput Satellite Systems. In A., Bandi, V., Joroughi, B., Shankar, J., grotz, & B., Ottersten, 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC),Berlin, Sept. 10-12, 2018 (pp. 1-6).
Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018, September 03). Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability, 1-22.
Appelt, D., Nguyen, C. D., Panichella, A., & Briand, L. (2018). A Machine Learning-Driven Evolutionary Approach for Testing Web Application Firewalls. IEEE Transactions on Reliability, 67(3), 733-757.
Basili, V., Briand, L., Bianculli, D., Nejati, S., Pastore, F., & Sabetzadeh, M. (2018). Software Engineering Research and Industry: A Symbiotic Relationship to Foster Impact. IEEE Software, 35(5), 44-49.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2018). Model-driven Run-time Enforcement of Complex Role-based Access Control Policies. Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (pp. 11). New York, USA: ACM.
Gerard, B., Bezzaoucha, S., Voos, H., & Darouach, M. (2018). Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks. Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks.
Glauner, P. (2018). Künstliche Intelligenz - die nächste Revolution (The Artificial Intelligence Revolution). In P., Plugmann, Innovationsumgebungen gestalten: Impulse für Start-ups und etablierte Unternehmen im globalen Wettbewerb. Springer.
Jafarnejad, S., Castignani, G., & Engel, T. (2018). Revisiting Gaussian Mixture Models for Driver Identification. Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018).
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018, September). On the impact of tokenizer and parameters on N-gram based Code Analysis. Paper presented at 34th IEEE International Conference on Software Maintenance and Evolution (ICSME'18), Madrid, Spain.
Liu, K., Kim, D., Koyuncu, A., Li, L., Bissyande, T. F. D. A., & Le Traon, Y. (2018, September). A Closer Look at Real-World Patches. Paper presented at 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain.
Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018, September). Automated Identification of Desynchronisation Attacks on Shared Secrets. European Symposium on Research in Computer Security.
Mouline, L., Benelallam, A., Fouquet, F., Bourcier, J., & Barais, O. (2018). A Temporal Model for Interactive Diagnosis of Adaptive Systems. In L., Mouline, A., Benelallam, F., Fouquet, J., Bourcier, & O., Barais, 2018 IEEE International Conference on Autonomic Computing (ICAC).
Tessaro Lunardi, W., Voos, H., & Cherri, L. H. (2018). An Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem. 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (pp. 8).
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Parallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression. Proc. 26th European Signal Processing Conference.
Bezzaoucha, S., & Voos, H. (2018, August 29). A Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach. Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018.
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-Level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels. International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata 25-28 June 2018.
Lagraa, S., Charlier, J. H. J., & State, R. (2018, August 20). Knowledge Discovery Approach from Blockchain, Crypto-currencies, and Financial Stock Exchanges. Poster session presented at 2018 ACM SIGKDD International Conference on Knowledge Discovery and Data mining conference (KDD 2018).
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018, August). Resource Allocation and Relay Selection for Multi-User OFDM-Based Cooperative Networks with SWIPT. Paper presented at IEEE 15th Int. Symp. on Wireless Comm. Systems 2018 (ISWCS’18), Lisbon, Portugal.
Ibrahim, A. A. Z. A., Wasim, M. U., Varrette, S., & Bouvry, P. (2018). PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services. Mobile Information Systems, 2018(1351386).
Lei, L., Chang, Z., Hu, Y., Ristaniemi, T., Yuan, Y., & Chatzinotas, S. (2018). Energy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems. IEEE/CIC International Conference on Communications in China (ICCC 2018).
Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2018). Anonymising social graphs in the presence of active attackers. Transactions on Data Privacy, 11(2), 169-198.
Sleimi, A., Sannier, N., Sabetzadeh, M., Briand, L., & Dann, J. (2018). Automated Extraction of Semantic Legal Metadata Using Natural Language Processing. the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018.
Atashpendar, A., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. Eprint/Working paper retrieved from https://arxiv.org/abs/1807.11609.
Steichen, M., Fiz Pontiveros, B., Norvill, R., Shbair, W., & State, R. (2018). Blockchain-Based, Decentralized Access Control for IPFS. The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (pp. 1499-1506). Halifax, Canada: IEEE.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018). Stochastic Optimum Energy Management for Advanced Transportation Network. 15th IFAC Symposium on Control in Transportation Systems CTS 2018 (pp. 317-322). Savona, Italy: Elsevier.
Dentler, J. E. (2018). Real-time Model Predictive Control for Aerial Manipulation. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Hadji-Minaglou, J.-R., Kannan, S., Antonelli, G., & Kayacan, E.
Mazzali, N., Boumard, S., Kinnunen, J., Shankar, B., Kiviranta, M., & Alagha, N. (2018, July 10). Enhancing mobile services with DVB-S2X superframing. International Journal of Satellite Communications and Networking, 1-25.
Norvill, R., Fiz Pontiveros, B., State, R., & Cullen, A. (2018, July 09). Visual emulation for Ethereum's virtual machine. NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
Arora, A., Maleki, S., Shankar, B., Grotz, J., & Ottersten, B. (2018). Interference Localization On-Board the Satellite Using Drift Induced Virtual Array. Proc. 2018 International Conference on Signal Processing and Communications (SPCOM).
Camino, R. D., Hammerschmidt, C., & State, R. (2018, July). Generating Multi-Categorical Samples with Generative Adversarial Networks. Paper presented at ICML 2018 workshop on Theoretical Foundations and Applications of Deep Generative Models, Stockholm, Sweden.
Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. IEEE Transactions on Communications, 66(6), 3108-3121.
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Configuring use case models in product families. Software & Systems Modeling, 17(3), 939-971.
Hammes, C., Shankar, B., & Ottersten, B. (2018, July). Block Circulant Decomposition of Cross-Correlation Matrix for Transmit MIMO Beamforming. Poster session presented at 10th IEEE SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP.
Lei, L., Vu, T. X., You, L., Fowler, S., & Yuan, D. (2018). Efficient Minimum-Energy Scheduling with Machine-Learning based Predictions for Multiuser MISO Systems. 2018 IEEE International Conference on Communications (ICC).
Sedighi, S., Shankar, B., Maleki, S., & Ottersten, B. (2018, July). CONSISTENT LEAST SQUARES ESTIMATOR FOR CO-ARRAY-BASED DOA ESTIMATION. Poster session presented at THE TENTH IEEE SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP.
Shin, S. Y., Nejati, S., Sabetzadeh, M., Briand, L., & Zimmer, F. (2018). Test Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach. Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18). New York, USA: ACM.
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive convex approximation algorithms for sparse signal estimation with nonconvex regularizations. Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop.
You, L., Yuan, D., Lei, L., Sun, S., Chatzinotas, S., & Ottersten, B. (2018, July). Resource Optimization With Load Coupling in Multi-Cell NOMA. IEEE Transactions on Wireless Communications.
Spano, D. (2018). Advanced Symbol-level Precoding Schemes for Interference Exploitation in Multi-antenna Multi-user Wireless Communications. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor), Lenzini, G., Ottersten, B., Wong, K.-K., & Krause, J.
Bezzaoucha, S., Voos, H., Davila, J., & Bejarano, J. (2018, June 27). A Decoupling Approach to Design Observers for Polytopic Takagi-Sugeno Models Subject to Unknown Inputs. Proceedings of the 2018 American Control Conference.
Gerard, B., Bezzaoucha, S., Voos, H., & Darouach, M. (2018, June 27). Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection. Proceedings of the 2018 American Control Conference.
Benedick, P.-L., Robert, J., Le Traon, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a performance analysis. O-MI/O-DF vs. MQTT: a performance analysis.
Signorello, S. (2018). A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks. Unpublished doctoral thesis, University of Luxembourg University of Lorraine, ​Luxembourg Nancy, ​​Luxembourg France.
Jury: State, R. (Promotor), Festor, O. (Promotor), Rodošek, G., Engel, T., Palattella, M. R., François, J., & Laurent, M.
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Highway Network Block with Gates Constraints for Training Very Deep Networks. 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop, June 18-22, 2018. Utah, US.
Demisse, G., Papadopoulos, K., Aouada, D., & Ottersten, B. (2018). Pose Encoding for Robust Skeleton-Based Action Recognition. CVPRW: Visual Understanding of Humans in Crowd Scene, Salt Lake City, Utah, June 18-22, 2018.
Bartel, A., Klein, J., & Le Traon, Y. (2018). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks (TR-SNT-2018-3). Université du Luxembourg.
Lei, L., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018). NOMA Aided Interference Management for Full-Duplex Self-Backhauling HetNets. IEEE Communications Letters, 22(8), 1696-1699.
Adamsky, F., Retunskaia, T., Schiffner, S., & Engel, T. (2018). POSTER: WLAN Device Fingerprinting using Channel State Information (CSI). 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec).
Castillo Lopez, M., Sajadi Alamdari, S. A., Sanchez Lopez, J. L., Olivares Mendez, M. A., & Voos, H. (2018). Model Predictive Control for Aerial Collision Avoidance in dynamic environments. 26th Mediterranean Conference on Control and Automation (MED), Zadar, Croatia, 19-22 June 2018.
Chang, Z., Lei, L., Zhou, Z., Mao, S., & Ristaniemi, T. (2018, June). Learn to Cache: Machine Learning for Network Edge Caching in the Big Data Era. IEEE Wireless Communications.
Giotti, D., Lamorte, L., Soua, R., Palattella, M. R., & Engel, T. (2018). Performance Analysis of CoAP under Satellite Link Disruption. Performance Analysis of CoAP under Satellite Link Disruption.
Krivochiza, J., Merlano Duncan, J. C., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018). Computationally and Energy Efficient Symbol-Level Precoding Communications Demonstrator. Physical Communication, 28, 108-115.
Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018). Carrier Allocation for 5G Integrated Satellite-Terrestrial Backhaul Networks. International Conference on Communications (ICT), Saint-Malo, France, June 2018.
Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (2018, June). An Offline Dictionary Attack Against zkPAKE Protocol. Poster session presented at WiSec2018, Stockholm, Sweden.
Tessaro Lunardi, W., Cherri, L. H., & Voos, H. (2018). A Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints. 17th International Conference on Artificial Intelligence and Soft Computing, Zakopane, Poland, June 3-7, 2018.
Tessaro Lunardi, W., & Voos, H. (2018). An Extended Flexible Job Shop Scheduling Problem with Parallel Operations. ACM SIGAPP Applied Computing Review, 18(2), 46-56.
Vazquez Sandoval, I., & Lenzini, G. (2018). Experience report: How to extract security protocols’ specifications from C libraries. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE.
Baptista, R., Ghorbel, E., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Key-Skeleton Based Feedback Tool for Assisting Physical Activity. 2018 Zooming Innovation in Consumer Electronics International Conference (ZINC), 30-31 May 2018.
Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. International Conference on Software Engineering (ICSE 2018).
Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., & Alexandrov, Y. (2018, May 27). SmartCheck: Static Analysis of Ethereum Smart Contracts. Paper presented at 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, Gothenburg, Sweden.
Symeonidis, I. (2018). Analysis and Design of Privacy-Enhancing Information Sharing Systems. Unpublished doctoral thesis, KU Leuven, ​Leuven, ​​Belgium.
Jury: Preneel, B. (Promotor).
Di Maio, A., Soua, R., Palattella, M. R., & Engel, T. (2018). ROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs. ROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs.
Abu Shaban, Z., Mehrpouyan, H., Shankar, B., & Ottersten, B. (2018). Reduced complexity satellite broadcast receiver with interference mitigation in correlated noise. International Journal of Satellite Communications and Networking, 36(5).
Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018, May 14). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382.
Biryukov, A., Khovratovich, D., & Tikhomirov, S. (2018, May 09). Privacy-preserving KYC on Ethereum. Paper presented at 1st ERCIM Blockchain Workshop 2018, Amsterdam, The Netherlands.
Gonzalez Perez, C. A., Varmazyar, M., Nejati, S., Briand, L., & Isasi, Y. (2018). A SysML-Based Methodology for Model Testing of Cyber-Physical Systems (TR-SNT-2018-2). Luxembourg, Luxembourg: University of Luxembourg.
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Change Impact Analysis for Evolving Configuration Decisions in Product Line Use Case Models. Journal of Systems and Software, 139, 211-237.
Lei, L., You, L., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Efficient Resource Optimization in Wireless Networks: A Deep-Learning Assisted Approach. 2018 INFORMS Telecommunications Conference.
Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM.
Liu, C., Varrette, S., Brust, M., Danoy, G., & Bouvry, P. (2018, May). A Standardized Broker Model in Smart Cities. Poster session presented at 17th Annual STS Conference Graz 2018 Critical Issues in Science, Technology and Society Studies, Graz, Austria.
Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS.
Samir Labib, N., Brust, M., Danoy, G., & Bouvry, P. (2018, May). On Standardised UAV Localisation and Tracking Systems in Smart Cities. Poster session presented at 17th Annual STS Conference Graz 2018 Critical Issues in Science, Technology and Society Studies.
Vazquez, M.-A., Shankar, B., Kourogiorgas, C., Arapoglou, P.-D., Icolari, V., Chatzinotas, S., Panagopoulos, A., & Perez-Neira, A. (2018). Precoding, Scheduling and Link Adaptation in Mobile Interactive Multibeam Satellite Systems. IEEE Journal on Selected Areas In Communications, 36(5), 971 - 980.
Vu, T. X., Lei, L., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2018). Energy-efficient design for latency-tolerant content delivery networks. 2018 IEEE Wireless Communications and Networking Conference (WCNC).
Vu, T. X., Lei, L., Vuppala, S., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2018). Latency Minimization for Content Delivery Networks with Wireless Edge Caching. 2018 IEEE International Conference on Communications (ICC).
Xue, J., Biswas, S., Cirik, A. C., Du, H., Yang, Y., Ratnarajah, T., & Sellathurai, M. (2018). Transceiver design of optimum wirelessly powered full-duplex MIMO IoT devices. IEEE Transactions on Communications, 66(5), 1955 - 1969.
Wang, Q., Hao, Y., Todo, Y., Li, C., Isobe, T., & Meier, W. (2018). Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. 38th Annual International Cryptology Conference, Santa Barbara 19-23 Aug 2018 (pp. 275-305). Springer.
Sajadi Alamdari, S. A. (2018). Stochastic Model Predictive Control for Eco-Driving Assistance Systems in Electric Vehicles. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Hadji-Minaglou, J.-R. (Promotor), Darouach, M. (Promotor), Viti, F., & Wang, M.
Dentler, J. E., Rosalie, M., Danoy, G., Bouvry, P., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2018, April 20). Collision Avoidance Effects on the Mobility of a UAV Swarm Using Chaotic Ant Colony with Model Predictive Control. Journal of Intelligent \& Robotic Systems, 1-17.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). PAPR Minimization through Spatio-temporal Symbol-level Precoding for the Non-linear Multi-user MISO Channel. 2018 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018).
Joroughi, V., Shankar, B., Maleki, S., Chatzinotas, S., Grotz, J., & Ottersten, B. (2018). Designing Joint Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System. IEEE WCNC 2018.
Gautam, S., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018, April 17). Optimal Relay Selection Strategy for Joint Data and Energy Transfer in Wireless Systems. Paper presented at 2018 IEEE Wireless Communications and Networking Conference (WCNC): IEEE WCNC2018 Student Program, Barcelona, Spain.
Gautam, S., Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018, April 16). Joint Wireless Information and Energy Transfer in Cache-assisted Relaying Systems. Paper presented at 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.
Vuppala, S., Vu, T. X., Gautam, S., Chatzinotas, S., & Ottersten, B. (2018, April 16). Cache-Aided Millimeter Wave Ad-Hoc Networks. Paper presented at 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.
Mouline, L., Benelallam, A., Hartmann, T., Fouquet, F., Bourcier, J., Morin, B., & Barais, O. (2018, April 09). Enabling Temporal-Aware Contexts for Adaptative Distributed Systems. SAC 2018: SAC 2018: Symposium on Applied Computing , April 9--13, 2018, Pau, France.
Thome, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Bianculli, D. (Promotor), Sabetzadeh, M., Denaro, G., & Gorla, A.
Ostrev, D. (2018). Composable, Unconditionally Secure Message Authentication without any Secret Key. Eprint/Working paper retrieved from https://arxiv.org/abs/1804.01797.
Alodeh, M., Spano, D., Kalantari, A., Tsinos, C., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2018, April). Symbol-level and Multicast Precoding for Multiuser Multiantenna Downlink: A State-of-the-art, Classification and Challenges. IEEE Communications Surveys and Tutorials.
Charlier, J. H. J., & State, R. (2018). Non-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network for Smart Contracts Profiling. International Journal of Computer & Software Engineering, 3(1).
Fouquet, F., Hartmann, T., Mosser, S., & Cordy, M. (2018). Enabling lock-free concurrent workers over temporal graphs composed of multiple time-series. 33rd Annual ACM Symposium on Applied Computing (SAC'18).
Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Constructive Interference for Generic Constellations. IEEE Signal Processing Letters, 25(4), 586-590.
Le Corre, Y., Groszschädl, J., & Dinu, D.-D. (2018). Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In J., Fan & B., Gierlichs, Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (pp. 82-98). Springer Verlag.
Matthiesen, B., Yang, Y., & Jorswieck, E. (2018). Optimization of weighted individual energy efficiencies in interference networks. Proc. IEEE Wireless Communications and Networking Conference.
Rahli, V., Vukotic, I., Volp, M., & Verissimo, P. (2018). Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq. ESOP 2018.
Tessaro Lunardi, W., & Voos, H. (2018). Comparative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization. 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 9 - 13, 2018.
Wang, Q., Grassi, L., & Rechberger, C. (2018). Zero-Sum Partitions of PHOTON Permutations. In N. P., Smart (Ed.), Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018 Proceedings (pp. 279-299). Springer.
Yang, Y., & Pesavento, M. (2018). Energy efficiency in MIMO interference channels: Social optimality and max-min fairness. Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal.
Yang, Y., & Pesavento, M. (2018). A parallel best-response algorithm with exact line search for nonconvex sparsity-regularized rank minimization. Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal.
Vuppala, S., Vu, T. X., Gautam, S., Chatzinotas, S., & Ottersten, B. (2018, March 25). Cache-Aided Millimeter Wave Ad-Hoc Networks with Contention-Based Content Delivery. IEEE Transactions on Communications.
Politis, C. (2018). Spectrum Monitoring Algorithms for Wireless and Satellite Communications. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg City, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor).
Alferez, M., Acher, M., Galindo, J., Baudry, B., & Benavides, D. (2018, March). Modeling Variability in the Video Domain: Language and Experience Report. Software Quality Journal.
Jafarnejad, S., Castignani, G., & Engel, T. (2018). Non-intrusive Distracted Driving Detection Based on Driving Sensing Data. 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2018).
Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. 21st International Conference on Extending Database Technology.
Spano, D., Chatzinotas, S., Andrenacci, S., Krause, J., & Ottersten, B. (2018, March). Per-antenna Power Minimization in Symbol-level Precoding for the Multi-beam Satellite Downlink. International Journal of Satellite Communications and Networking.
Ruan, M., Titcheu Chekam, T., Zhai, E., Li, Z., Liu, Y., E, J., Cui, Y., & Xu, H. (2018). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE Transactions on Parallel and Distributed Systems, PP(99), 1-1.
Kieffer, E., Rosalie, M., Danoy, G., & Bouvry, P. (2018, February 26). Bayesian optimization to enhance coverage performance of a swarm of UAV with chaotic dynamics. Paper presented at International Workshop on Optimization and Learning: Challenges and Applications (OLA 2018), Alicante, Spain.
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). IMPROVING THE CAPACITY OF VERY DEEP NETWORKS WITH MAXOUT UNITS. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing.
Atashpendar, A., Beunardeau, M., Connolly, A., Géraud, R., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. Eprint/Working paper retrieved from https://arxiv.org/abs/1802.00703.
Panichella, A., Kifetew, F., & Tonella, P. (2018). Automated Test Case Generation as a Many-Objective Optimisation Problem with Dynamic Selection of the Targets. IEEE Transactions on Software Engineering, 44(2), 122 - 158.
Fiz Pontiveros, B., Norvill, R., & State, R. (2018, February). Recycling Smart Contracts: Compression of the Ethereum Blockchain. Proceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018.
Liu, Z., Choo, K.-K. R., & Groszschädl, J. (2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine, 56(2), 158-162.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018, February). Edge-Caching Wireless Networks: Performance Analysis and Optimization. IEEE Transactions on Wireless Communications.
Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Energy efficiency optimization in MIMO interference channels: A successive pseudoconvex approximation approach. Eprint/Working paper retrieved from https://arxiv.org/abs/1802.06750.
Li, D. (2018). Transforming Time Series for Efficient and Accurate Classification. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J., Bissyande, T. F. D. A., Lin, J., & Geist, M.
Kubler, S., Robert, J., Neumaier, S., Umbrich, J., & Le Traon, Y. (2018, January 01). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly.
Afzal, H., Aouada, D., Mirbach, B., & Ottersten, B. (2018, January). Full 3D Reconstruction of Non-Rigidly Deforming Objects. ACM Transactions on Multimedia Computing, Communications, & Applications.
Baptista, R., Antunes, M., Aouada, D., & Ottersten, B. (2018). Anticipating Suspicious Actions using a Small Dataset of Action Templates. 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP).
Charlier, J. H. J., State, R., & Hilger, J. (2018). Non-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling. In J., Charlier, R., State, & J., Hilger, 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (pp. 74-81). IEEE Computer Society Conference Publishing Services (CPS).
Gadyatskaya, O., & Trujillo Rasua, R. (2018). New Directions in Attack Tree Research: Catching up with Industrial Needs. In S., Mauw, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer.
Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39.
Adamsky, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Di Giorgio, A., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proenca, J., Pucci, P., Rosa, L., & Soua, R. (2018). Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach. Elsevier International Journal of Critical Infrastructure Protection.
Arcuri, A. (2018). Evaluating Search-Based Techniques With Statistical Tests. The Search-Based Software Testing (SBST) Workshop.
Arcuri, A. (2018). EvoMaster: Evolutionary Multi-context Automated System Test Generation. IEEE Conference on Software Testing, Validation and Verification.
Arcuri, A. (2018). An Experience Report On Applying Software Testing Academic Results In Industry: We Need Usable Automated Test Generation. Empirical Software Engineering, 23(4).
Bana, G., Chadha, R., & Eeralla, A. (2018). Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker. Computer Security (pp. 350–372).
Baniasadi, Z., Parent, X., Max, C., & Creamer, M. (2018). A Model for Regulating of Ethical Preferences in Machine Ethics. Proceedings of International Conference on Human-Computer Interaction, 481-506.
Bartolini, C., Santos, C., & Ullrich, C. (2018). Property and the Cloud. Computer Law & Security Report.
Ben Abdessalem (helali), R., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Vision-Based Control Systems Using Learnable Evolutionary Algorithms. Proceedings of the 40th International Conference on Software Engineering (ICSE 2018). ACM.
Ben Abdessalem (helali), R., Panichella, A., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Autonomous Cars for Feature Interaction Failures using Many-Objective Search. Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018).
Bickford, M., Cohen, L., Constable, R., & Rahli, V. (2018). Computability Beyond Church-Turing via Choice Sequences. LICS 2018.
Blanchet, B., & Smyth, B. (2018). Automated reasoning for equivalences in the applied pi calculus with barriers. Journal of Computer Security, 26(3), 367--422.
Cao, J., Li, Y., & Pang, J. (2018). L-CMP: an automatic learning-based parameterized verification tool. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (pp. 892-895). ACM.
Chang, Z., Lei, L., Zhang, H., Ristaniemi, T., Chatzinotas, S., Ottersten, B., & Han, Z. (2018). Energy-Efficient and Secure Resource Allocation for Multiple-Antenna NOMA with Wireless Power Transfer. IEEE Transactions on Green Communications and Networking.
Dashevskyi, S., Brucker, A. D., & Massacci, F. (2018). A Screening Test for Disclosed Vulnerabilities in FOSS Components. IEEE Transactions on Software Engineering, 1-1.
Decouchant, J., Fernandes, M., Volp, M., Couto, F. M., & Verissimo, P. (2018). Accurate filtering of privacy-sensitive information in raw genomic data. Journal of Biomedical Informatics.
Delavernhe, F., Saber, T., Papadakis, M., & Ventresque, A. (2018). A Hybrid Algorithm for Multi-objective Test Case Selection in Regression Testing. IEEE CONGRESS ON EVOLUTIONARY COMPUTATION.
Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation Based 3D Facial Expression Representation. ACM Transactions on Multimedia Computing, Communications, & Applications.
Dentler, J. E., Kannan, S., Bezzaoucha, S., Olivares-Mendez, M. A., & Voos, H. (2018). Model predictive cooperative localization control of multiple UAVs using potential function sensor constraints. Autonomous Robots, 1--26.
Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2018). Model-based mutant equivalence detection using automata language equivalence and simulations. Journal of Systems and Software.
Dominico, S., Almeida, E. C., Meira, J. A., & Alves, M. A. Z. (2018). An Elastic Multi-Core Allocation Mechanism for Database Systems. International Conference on Data Engineering (ICDE).
Erata, F., Göknil, A., Kurtev, I., & Tekinerdogan, B. (2018). AlloyInEcore: Embedding of First-Order Relational Logic into Meta-Object Facility for Automated Model Reasoning. 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018).
Ferreira Torres, C., & Jonker, H. (2018). Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications. 23rd European Symposium on Research in Computer Security, Barcelona, Spain, September 3-7, 2018.
Fiz Pontiveros, B., Norvill, R., & State, R. (2018). Monitoring the transaction selection policy of Bitcoin mining pools. NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
Fraser, G., Rojas, J., & Arcuri, A. (2018). EvoSuite at the SBST 2018 Tool Competition. 2018 ACM/IEEE 11th International Workshop on Search-Based Software Testing.
Gautam, S., Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018). Cache-aided Simultaneous Wireless Information and Power Transfer (SWIPT) with Relay Selection. IEEE Journal on Selected Areas In Communications.
Genç, Z. A. (2018). Crypren Decryptor.
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings (1st ed, pp. 385-401). Cham, Switzerland: Springer International Publishing.
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In C., Giuffrida, S., Bardin, & G., Blanc (Eds.), Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018) (pp. 234-255). Springer International Publishing.
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. Advances in Cybersecurity 2018.
Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. Proceedings of the 4th International Conference on Information Systems Security and Privacy.
Glauner, P., Meira, J. A., & State, R. (2018). Detection of Irregular Power Usage using Machine Learning. Paper presented at IEEE Conference on Innovative Smart Grid Technologies, Asia (ISGT Asia 2018), Singapore.
Glauner, P., Meira, J. A., & State, R. (2018). Machine Learning for Data-Driven Smart Grid Applications. Paper presented at IEEE Conference on Innovative Smart Grid Technologies, Asia (ISGT Asia 2018), Singapore.
Glauner, P., & State, R. (2018). Introduction to Machine Learning for Power Engineers. Paper presented at 10th IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC 2018), Kota Kinabalu, Malaysia.
Glauner, P., State, R., Valtchev, P., & Duarte, D. (2018). On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage. Proceedings 13th International FLINS Conference on Data Science and Knowledge Engineering for Sensing Decision Support (FLINS 2018).
Glauner, P., Valtchev, P., & State, R. (2018). Impact of Biases in Big Data. Proceedings of the 26th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2018).
Hochgeschwender, N., Biggs, G., & Voos, H. (2018). A Reference Architecture for Deploying Component-based Robot Software and Comparison with Existing Tools. Proceedings of the IEEE International Conference on Robotic Computing. IEEE.
Hooshiary, A., Azmi, P., Mokari, N., & Maleki, S. (2018). Optimal Channel Selection for Simultaneous RF Energy Harvesting and Data Transmission in Cognitive Radio Networks. Transactions on Emerging Telecommunications Technologies.
Jimenez, M., Le Traon, Y., & Papadakis, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. IEEE International Working Conference on Source Code Analysis and Manipulation.
Jordanou, J. P., Camponogara, E., Antonelo, E. A., & S. de Aguiar, M. A. (2018). Nonlinear Model Predictive Control of an Oil Well with Echo State Networks. IFAC-PapersOnLine, 51, 13 - 18.
Kaiafas, G., Varisteas, G., Lagraa, S., & State, R. (2018). Detecting Malicious Authentication Events Trustfully. In G., Kaiafas, G., Varisteas, S., Lagraa, & R., State, IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World.
Khan, N., Lahmadi, A., Francois, J., & State, R. (2018). Towards a Management Plane for Smart Contracts: Ethereum Case Study. In N., Khan, Towards a Management Plane for Smart Contracts:Ethereum Case Study. Taipei, Taiwan: IEEE.
Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., Malevris, N., & Le Traon, Y. (2018). How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empirical Software Engineering.
Kodheli, O., Andrenacci, S., Maturo, N., Chatzinotas, S., & Zimmer, F. (2018). Resource Allocation Approach for Differential Doppler Reduction in NB-IoT over LEO Satellite. 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 10-12 September 2018.
Lagunas, E., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018). Cross-Layer Forward Packet Scheduling for Emerging Precoded Broadband Multibeam Satellite System. 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 10-12 September 2018.
Lagunas, E., Marques, A. G., Chatzinotas, S., & Ottersten, B. (2018). Graph Similarity based on Graph Fourier Distances. European Signal Processing Conference (EUSIPCO), Rome, Italy, 3-7 September 2018.
Lambert, C., Fernandes, M., Decouchant, J., & Verissimo, P. (2018). MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX. Paper presented at 37th IEEE International Symposium on Reliable Distributed Systems.
Lauvås, P., & Arcuri, A. (2018). Recent Trends in Software Testing Education: A Systematic Literature Review. UDIT (The Norwegian Conference on Didactics in IT education).
Lin, Z., Lin, M., Ouyang, J., Zhu, W.-P., & Chatzinotas, S. (2018). Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks. IEEE Signal Processing Letters.
Liu, B., Nejati, S., Lucia, L., & Briand, L. (2018). Effective Fault Localization of Automotive Simulink Models: Achieving the Trade-Off between Test Oracle Effort and Fault Localization Accuracy. Empirical Software Engineering, 47.
Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Systems. 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18).
Mai, X. P., Göknil, A., Shar, L. K., Pastore, F., Briand, L., & Shaame, S. (2018). Modeling Security and Privacy Requirements: a Use Case-Driven Approach. Information and Software Technology, 100, 165-182.
Mai, X. P., Pastore, F., Göknil, A., & Briand, L. (2018). A Natural Language Programming Approach for Requirements-based Security Testing. In X. P., Mai, F., Pastore, A., Göknil, & L., Briand, A Natural Language Programming Approach for Requirements-based Security Testing. IEEE.
Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology.
Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2018). Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior. IEEE Transactions on Software Engineering, 25.
Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Distance-Bounding Protocols: Verification without Time and Location. IEEE Security and Privacy.
Max, C. (2018). An activity theoretical research lens on inquiry-based learning. In M. J., de Vries, S., Fletcher, S., Kruse, P., Labudde, M., Lang, I., Mammes, C., Max, D., Münk, B., Nicholl, J., Strobel, & M., Winterbottom, Research in Technology Education: International Approaches (pp. 147-168). Münster, Germany: Waxmann.
Messaoudi, S., Panichella, A., Bianculli, D., Briand, L., & Sasnauskas, R. (2018). A Search-based Approach for Accurate Identification of Log Message Formats. Proceedings of the 26th IEEE/ACM International Conference on Program Comprehension (ICPC ’18). ACM.
Meyer, M., Quaglia, E. A., & Smyth, B. (2018). Attacks against GSMA's M2M Remote Provisioning. FC'18: 22nd International Conference on Financial Cryptography and Data Security. Springer.
Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2018). ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 277-284). Springer Science & Business Media B.V.
Mizera, A., Pang, J., Su, C., & Yuan, Q. (2018). ASSA-PBN: A Toolbox for Probabilistic Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15(4), 1203-1216.
Mizera, A., Pang, J., & Yuan, Q. (2018). Reviving the two-state Markov chain approach. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Neveu, E., Popov, P., Hoffmann, A., Migliosi, A., Besseron, X., Danoy, G., Bouvry, P., & Grudinin, S. (2018). RapidRMSD: Rapid determination of RMSDs corresponding to motions of flexible molecules. Bioinformatics.
Ostaszewski, M., Kieffer, E., Danoy, G., Schneider, R., & Bouvry, P. (2018). Clustering approaches for visual knowledge exploration in molecular interaction networks. BMC bioinformatics, 19(1), 308.
Ostrev, D., & Vidick, T. (2018). Entanglement of Approximate Quantum Strategies in XOR Games. Quantum Information and Computation, 18(7&8), 0617–0631.
Palmirani, M., Bartolini, C., Martoni, M., Robaldo, L., & Rossi, A. (2018). Legal Ontology for Modelling GDPR Concepts and Norms. JURIX 2018 proceedings.
palmirani, M., Martoni, M., Rossi, A., Bartolini, C., & Robaldo, L. (2018). PrOnto: Privacy Ontology for Legal Reasoning. International Conference on Electronic Government and the Information Systems Perspective.
Pang, J., Zhang, C., He, J., & Weng, J. (Eds.). (2018). Proceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering. IEEE Computer Society.
Papadakis, M., Titcheu Chekam, T., & Le Traon, Y. (2018). Mutant Quality Indicators. 13th International Workshop on Mutation Analysis (MUTATION'18).
Papadopoulos, K., Antunes, M., Aouada, D., & Ottersten, B. (2018). A Revisit of Action Detection using Improved Trajectories. IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, Alberta, Canada, 15–20 April 2018.
Papazafeiropoulos, A., Sharma, S., Ratnarajah, T., & Chatzinotas, S. (2018). ‘Impact of Residual Additive Transceiver Hardware Impairments on RayleighProduct MIMO Channels With Linear Receivers: Exact and Asymptotic Analyses. IEEE Transactions on Communications.
Paul, S., Pang, J., & Su, C. (2018). On the Full Control of Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 313-317). Springer Science & Business Media B.V.
Paul, S., Pang, J., & Su, C. (2018). Towards the Existential Control of Boolean Networks: A Preliminary Report. Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (pp. 142-149). Springer Science & Business Media B.V.
Paul, S., Su, C., Pang, J., & Mizera, A. (2018). A Decomposition-based Approach towards the Control of Boolean Networks. Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM.
Perera, T. D. P., Jayakody, D. N., Sharma, S. K., Chatzinotas, S., & Li, J. (2018). Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges. IEEE Communications Surveys and Tutorials, 20(1), 264-302.
Politis, C., Maleki, S., Merlano Duncan, J. C., Krivochiza, J., Chatzinotas, S., & Ottersten, B. (2018). SDR Implementation of a Testbed for Real-Time Interference Detection with Signal Cancellation. IEEE Access.
Quaglia, E. A., & Smyth, B. (2018). Authentication with weaker trust assumptions for voting systems. AFRICACRYPT'18: 10th International Conference on Cryptology in Africa. Springer.
Quaglia, E. A., & Smyth, B. (2018). Secret, verifiable auctions from elections. Theoretical Computer Science, 730, 44--92.
Rahli, V., Cohen, L., & Bickford, M. (2018). A Verified Theorem Prover Backend Supported by a Monotonic Library. LPAR 2018.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2018). Chaos-enhanced mobility models for multilevel swarms of UAVs. Swarm and Evolutionary Computation.
Saint, A. F. A., Ahmed, E., Shabayek, A. E. R., Cherenkova, K., Gusev, G., Aouada, D., & Ottersten, B. (2018). 3DBodyTex: Textured 3D Body Dataset. 2018 Sixth International Conference on 3D Vision (3DV 2018).
Schiffner, S., Berendt, B., Siil, T., Degeling, M., Riemann, R., Schaub, F., Wuyts, K., Attoresi, M., Gürses, S., Klabunde, A., Polonetsky, J., Sadeh, N., & Zanfir-Fortuna, G. (2018). Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation : A transatlantic initiative. In N., Tsouroulas, K., Rannenberg, & M., Medina (Ed.), proceedings of the Annual Privacy Forum 2018.
Shaat, M., Lagunas, E., Pérez-Neira, A., & Chatzinotas, S. (2018). Integrated Terrestrial-Satellite Wireless Backhauling: Resource Management and Benefits for 5G. IEEE Vehicular Technology Magazine.
Sharma, S. K., Chatzinotas, S., & Arapoglou, P.-D. (Eds.). (2018). Satellite Communications in the 5G Era. IET.
Shbair, W., Steichen, M., François, J., & State, R. (2018). Blockchain Orchestration and Experimentation Framework: A Case Study of KYC. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018.
Smyth, B. (2018). Verifiability of Helios Mixnet. Voting'18: 3rd Workshop on Advances in Secure Electronic Voting. Springer.
Soltana, G., Sannier, N., Sabetzadeh, M., & Briand, L. (2018). Model-Based Simulation of Legal Policies: Framework, Tool Support, and Validation. Software & Systems Modeling, 17(3), 851-883.
Soua, R., Turcanu, I., Adamsky, F., Führer, D., & Engel, T. (2018). Multi-Access Edge Computing for Vehicular Networks: a Position Paper. 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelligent Transportation Systems.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). Faster-than-Nyquist Signaling through Spatio-temporal Symbol-level Precoding for the Multiuser MISO Downlink Channel. IEEE Transactions on Wireless Communications.
Symeonidis, I., Biczók, G., Shirazi, F., Pérez-Solà, C., Schroers, J., & Preneel, B. (2018). Collateral damage of Facebook third-party applications: a comprehensive study. Computers & Security, 77, 179 - 208.
Szalay, Z., Tettamanti, T., Esztergár-Kiss, D., Varga, I., & Bartolini, C. (2018). Development of a test track for driverless cars: vehicle design, track configuration, and liability considerations. Periodica Polytechnica Transportation Engineering, 46(1), 29-35.
Tervo, O., Tran, L.-N., Pennanen, H., Chatzinotas, S., Ottersten, B., & Juntti, M. (2018). Energy-Efficient Multicell Multigroup Multicasting With Joint Beamforming and Antenna Selection. IEEE Transactions on Signal Processing.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2018). Security Slicing for Auditing Common Injection Vulnerabilities. Journal of Systems and Software, 137(March, 2018), 766-783.
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018.
Tsinos, C., & Ottersten, B. (2018). An efficient algorithm for unit-modulus quadratic programs with application in beamforming for wireless sensor networks. IEEE Signal Processing Letters.
Vazquez Sandoval, I., Lenzini, G., & Stojkovski, B. (2018). A Protocol to Strengthen Password-Based Authentication. Emerging Technologies for Authorization and Authentication - ESORICS 2018 International Workshops.
Wang, C., Pastore, F., & Briand, L. (2018). Automated Generation of Constraints from Use Case Specifications to Support System Testing. Proceedings of the 11th IEEE Conference on Software Testing, Validation and Verification.
Wang, J., Sun, J., Yuan, Q., & Pang, J. (2018). Learning probabilistic models for model checking: an evolutionary approach and an empirical study. International Journal on Software Tools for Technology Transfer, 20(6), 689-704.
Xu, T. A., Adamsky, F., Turcanu, I., Soua, R., Köbel, C., Engel, T., & Baiocchi, A. (2018). Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet. Poster session presented at IEEE Vehicular Networking Conference (VNC) 2018.
Yakubov, A., Shbair, W., Wallbom, A., Sanda, D., & State, R. (2018). A Blockchain-Based PKI Management Framework. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018, Tapei, Tawain 23-27 April 2018.
Z. Lin, M. Lin, J. Ouyang, W. Zhu, & Chatzinotas, S. (2018). Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks. IEEE Signal Processing Letters.
Zhang, Y., Humbert, M., Rahman, T., Li, C.-T., Pang, J., & Backes, M. (2018). Tagvisor: A privacy advisor for sharing hashtags. Proceedings of The Web Conference 2018 (WWW'18) (pp. 287-296). ACM Press.

2017

Changaival, B., Rosalie, M., Danoy, G., Lavangnananda, K., & Bouvry, P. (2017). Chaotic Traversal (CHAT): Very Large Graphs Traversal Using Chaotic Dynamics. International Journal of Bifurcation and Chaos, 27(14), 1750215.
Seo, H., Liu, Z., Park, T., Kwon, H., Lee, S., & Kim, H. (2017). Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2017, December 21). Constrained Bayesian Active Learning of Interference Channels in Cognitive Radio Networks. IEEE Journal of Selected Topics in Signal Processing.
Bianculli, D., & Krstic, S. (2017). On the Risk of Tool Over-tuning in Runtime Verification Competitions. Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (pp. 37-40). EasyChair.
Dou, W., Bianculli, D., & Briand, L. (2017). TemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties. Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (pp. 64-70). EasyChair.
Falk, E., Fiz Pontiveros, B., Repcek, S., Hommes, S., State, R., & Sasnauskas, R. (2017, December 07). VSOC - A Virtual Security Operating Center. Global Communications.
Lacasse, R.-M., Lambert, B., & Khan, N. (2017, December 05). Blockchain Technology - Arsenal for a Shariah-Compliant Financial Ecosystem. Journal of Business and Economics.
Lopez Becerra, J. M., Iovino, V., Ostrev, D., Sala, P., & Skrobot, M. (2017). Tightly-Secure PAK(E). Cryptology and Network Security. Springer.
Meng, W., Lee, W., Liu, Z., Su, C., & Li, Y. (2017). Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.
Xinwei, G., Li, L., Jintai, D., Jiqiang, L., Rv, S., & Liu, Z. (2017). Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. The 13th International Conference on Information Security Practice and Experience - ISPEC 2017.
Cornelius, G. P., Hochgeschwender, N., & Voos, H. (2017). Model-Driven Interaction Design for Social Robots. 4th International Workshop on Model-driven Robot Software Engineering, Marburg, Germany, 2017. Springer.
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Frӓmling, K. (2017). Combined Use of Lifecycle Management and IoT in Smart Cities. Combined Use of Lifecycle Management and IoT in Smart Cities.
Kalantari, A., Fittipaldi, M., Chatzinotas, S., Vu, T. X., & Ottersten, B. (2017, December). Cache-Assisted Hybrid Satellite-Terrestrial Backhauling for 5G Cellular Networks. Proceedings of IEEE Global Communications Conference.
Kayhan, F. (2017). On low complexity detection for QAM isomorphic constellations. In F., Kayhan, On low compelxity detection for QAM isomorphic constellations.
Küttler, M., Roitzsch, M., Hamann, C.-J., & Volp, M. (2017, December). Probabilistic Analysis of Low-Criticality Execution. Paper presented at Workshop on Mixed Criticality Systems 2017 co-located with RTSS 2017.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2017, December). Symbol-level Precoding for the Non-linear Multiuser MISO Downlink Channel. IEEE Transactions on Signal Processing.
Volp, M., Kozhaya, D., & Verissimo, P. (2017, December). Facing the Safety-Security Gap in RTES: the Challenge of Timeliness. Paper presented at 2nd Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS 2017) co-located with RTSS 2017.
Wang, Z., Cao, Z., Cui, Y., & Yang, Y. (2017). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. Proc. 60th IEEE Global Communications Conference.
Wyner, A., & Casini, G. (Eds.). (2017). Legal Knowledge and Information Systems - JURIX 2017: The Thirtieth Annual Conference. IOS Press BV.
Yang, Y., & Pesavento, M. (2017). Energy efficient transmission in MIMO interference channels with QoS constraints. Proc. 8th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing.
You, L., Lei, L., Yuan, D., Sun, S., Chatzinotas, S., & Ottersten, B. (2017). A Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource. 2017 IEEE Global Communications Conference (GLOBECOM).
Faye, S., Cantelmo, G., Tahirou, I., Derrmann, T., Viti, F., & Engel, T. (2017). Demo: MAMBA: A Platform for Personalised Multimodal Trip Planning.
Faye, S., Jafarnejad, S., Costamagna, J., Castignani, G., & Engel, T. (2017, November 27). Poster: Characterizing Driving Behaviors Through a Car Simulation Platform. Poster session presented at 2017 IEEE Vehicular Networking Conference (VNC), Turin, Italy.
Bartolini, C., & Lenzini, G. (2017, November 25). Law and the software development life cycle. Paper presented at IALT Annual Conference, Dunboyne, Ireland.
Roldán, J. J., Olivares Mendez, M. A., del Cerro, J., & Barrientos, A. (2017, November 23). Analyzing and improving multi-robot missions by using process mining. Autonomous Robots.
Castillo Lopez, M., Olivares Mendez, M. A., & Voos, H. (2017). Evasive Maneuvering for UAVs: An MPC Approach. ROBOT'2017 - Third Iberian Robotics Conference, Sevilla, Spain, 2017.
Cornelius, G. P., Hochgeschwender, N., Voos, H., Olivares Mendez, M. A., Caire, P., Volp, M., & Verissimo, P. (2017). A Perspective of Security for Mobile Service Robots. Iberian Robotics Conference, Seville, Spain, 2017.
Falk, E. (2017). Big Data Architectures For Robust Systems. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H., Ormazabal, G., State, R., Engel, T., & Gurbani, V.
Castrillon, J., Lieber, M., Klueppelholz, S., Volp, M., Asmussen, N., Assmann, U., Baader, F., Baier, C., Fettweis, G., & Froehlich, J. (2017). A Hardware/Software Stack for Heterogeneous Systems. IEEE Transactions on Multi-Scale Computing Systems, PP(99), 1.
Kolbe, N., Robert, J., Kubler, S., & Le Traon, Y. (2017). PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.
Schmitz, S. (2017). Internetdelikte und die Herausforderungen des Forum Shoppings. Eprint/Working paper retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3065887.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017). Observer-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems. 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, November 2017.
Charlier, J. H. J., State, R., & Hilger, J. (2017). Modeling Smart Contracts Activities: A Tensor based Approach. In J., Charlier, R., State, & J., Hilger, Proceedings of 2017 Future Technologies Conference (FTC), 29-30 November 2017, Vancouver, Canada (pp. 49-55). IEEE.
Dinu, D.-D., Groszschädl, J., & Le Corre, Y. (2017). Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares. In P. Q., Nguyen & J., Zhou, Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (pp. 39-57). Springer Verlag.
Falk, E., Charlier, J. H. J., & State, R. (2017). Your Moves, Your Device: Establishing Behavior Profiles Using Tensors. Advanced Data Mining and Applications - 13th International Conference, ADMA 2017 (pp. 460-474).
Hommes, S., Valtchev, P., Blaiech, K., Hamadi, S., Cherkaoui, O., & State, R. (2017). Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation. Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation. IEEE.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017, November). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science & Technology.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Deadzone-Quadratic Penalty Function for Predictive Extended Cruise Control with Experimental Validation. ROBOT 2017: Third Iberian Robotics Conference, Sevilla, Spain 22-24 November 2017.
Vu, T. X., Chatzinotas, S., Ottersten, B., & Duong, T. Q. (2017, November). Energy Minimization for Cache-assisted Content Delivery Networks with Wireless Backhaul. IEEE Wireless Communications Letters.
Signorello, S., Marchal, S., François, J., Festor, O., & State, R. (2017, October 30). Advanced Interest Flooding Attacks in Named-Data Networking. Paper presented at The 16th IEEE International Symposium on Network Computing and Applications (NCA 2017), Cambridge, MA, USA.
Hammerschmidt, C. (2017). Learning Finite Automata via Flexible State-Merging and Applications in Networking. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: State, R. (Promotor), Verwer, S. (Promotor), Sorger, U., Engel, T., & Francois, J.
Appelt, D., Panichella, A., & Briand, L. (2017). Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks. The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 339-350). IEEE.
Demisse, G. (2017). Deformation Based Curved Shape Representation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Sabetzadeh, M., Fofi, D., Aouada, D., & Berretti, S.
Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings (TR-SNT-2017-5). SnT.
Haqiqatnejad, A., & Kayhan, F. (2017). Unified Satellite and Terrestrial ACM Design. International Communications Satellite Systems Conference (ICSSC), Trieste 16-19 October 2017.
Gharanjik, A., Kmieciak, J., Shankar, B., & Ottersten, B. (2017). Coverage Extension via Side-Lobe Transmission in Multibeam Satellite System. 23rd Ka and Broadband Communications Conference.
Soltana, G. (2017). A Model-Based Framework for Legal Policy Simulation and Compliance Checking. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Sabetzadeh, M. (Promotor), Klein, J., & Cabot, J.
Vuppala, S., Chatzinotas, S., & Ottersten, B. (2017, October 13). Secrecy Analysis of Random Wireless Networks with Multiple Eavesdroppers. Proceedings of IEEE Inter. Symp. on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada.
Lenzini, G., Samir, O., Roenne, P., Ryan, P., Geng, Y., Noh, J., & Lagerwall, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. Proc. of the 9th IEEE Workshop on Information Forensics and Security.
Alagha, N., Kayhan, F., & Montorsi, G. (2017, October). Optimized non-orthogonal multiplexing in Peak Power Limited Channels. Paper presented at 35th AIAA International Communications Satellite Systems Conference (ICSSC).
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2017). Automated Extraction and Clustering of Requirements Glossary Terms. IEEE Transactions on Software Engineering, 43(10), 918-945.
Bronzi, W., Faye, S., Frank, R., & Engel, T. (2017, October). Characterizing Driving Environments Through Bluetooth Discovery. Paper presented at The 8th International Conference on ICT Convergence - ICTC 2017.
Derrmann, T., Frank, R., Viti, F., & Engel, T. (2017, October). Estimating Urban Road Traffic States Using Mobile Network Signaling Data. Abstract book of the 20th International Conference on Intelligent Transportation Systems.
Gautam, S., Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2017). Relay Selection Strategies for SWIPT-Enabled Cooperative Wireless Systems. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017.
Hammerschmidt, C., Garcia, S., Verwer, S., & State, R. (2017, October). Reliable Machine Learning for Networking: Key Concerns and Approaches. Poster session presented at The 42nd IEEE Conference on Local Computer Networks (LCN), Singapore, Singapore.
Jordanou, J. P., Antonelo, E. A., Camponogara, E., & S. de Aguiar, M. A. (2017). Recurrent Neural Network based control of an Oil Well. Brazilian Symposium on Intelligent Automation, Porto Alegre 1-4 October 2017 (pp. 924-931).
Mengali, A., Lyras, N. K., Shankar, B., Kourogiorgas, C. I., Panagopoulos, A. D., & Liolis, K. (2017). Optical Feeder Links Study towards Future Generation MEO VHTS Systems. Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC).
Merlano Duncan, J. C., Krivochiza, J., Andrenacci, S., Chatzinotas, S., Ottersten, B., & Krivochiza, J. (2017, October). Computationally Efficient Symbol-Level Precoding Communications Demonstrator. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
Popleteev, A. (2017). Please Stand By: TV-based indoor localization. 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-2017).
Popleteev, A. (2017). Wi-Fi butterfly effect in indoor localization: The impact of imprecise ground truth and small-scale fading. 14th IEEE Workshop on Positioning, Navigation and Communications (WPNC-2017).
Saint, A. F. A., Shabayek, A. E. R., Aouada, D., Ottersten, B., Cherenkova, K., & Gusev, G. (2017). Towards Automatic Human Body Model Fitting to a 3D Scan. In N., D'APUZZO (Ed.), Proceedings of 3DBODY.TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct. 2017 (pp. 274-280). Ascona, Switzerland: Hometrica Consulting.
van der Elst, L., Quintanar Guzman, S., & Hadji-Minaglou, J.-R. (2017). Design of an Electromechanical Prosthetic Finger using Shape Memory Alloy Wires. IEEE 5th International Symposium on Robotics and Intelligent Sensors, Ottawa, Canada, 5-7 October 2017.
Volp, M., Decouchant, J., Lambert, C., Fernandes, M., & Verissimo, P. (2017, October). Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information. Paper presented at SysTEX 2017.
Hochgeschwender, N. (2017). Model-Based Specification, Deployment and Adaptation of Robot Perception Systems. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Nicolas, N., Gerhard, K., Herman, B., & Pierre, K.
Molina, M., Frau, P., Maraval, D., Sanchez Lopez, J. L., Bavle, H., & Campoy, P. (2017). Human-Robot Cooperation in Surface Inspection Aerial Missions. 2017 International Micro Air Vehicle Conference and Flight Competition (IMAV), Toulouse, France, 18-21 Septembre 2017.
Shin, S. Y. (2017). Specification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract). Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017). CEUR-WS.org.
Panichella, A., Kifetew, F., & Tonella, P. (2017). LIPS vs MOSA: a Replicated Empirical Study on Automated Test Case Generation. International Symposium on Search Based Software Engineering (SSBSE) 2017. Springer.
Bardini Idalino, T., Pierina Brustolin Spagnuelo, D., & Everson Martina, J. (2017). Private Verification of Access on Medical Data: An Initial Study. Private Verification of Access on Medical Data: An Initial Study.
Benelallam, A., Hartmann, T., Mouline, L., Fouquet, F., Bourcier, J., Barais, O., & Le Traon, Y. (2017). Raising Time Awareness in Model-Driven Engineering. 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp. 181-188). Springer.
Briand, L., Bianculli, D., Nejati, S., Pastore, F., & Sabetzadeh, M. (2017). The Case for Context-Driven Software Engineering Research. IEEE Software, 34(5), 72-75.
Charlier, J. H. J., Lagraa, S., State, R., & Francois, J. (2017). Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining. Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), Skopje, Macedonia, September 18, 2017 (pp. 31-42).
Dou, W., Bianculli, D., & Briand, L. (2017). A Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties. Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ).
Gadyatskaya, O., Ravi, J., Mauw, S., Trujillo Rasua, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G., Livraga & C. J., Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer.
Glauner, P., Meira, J. A., State, R., & Mano, R. (2017, September). Introduction to Detection of Non-Technical Losses using Data Analytics. Paper presented at 7th IEEE Conference on Innovative Smart Grid Technologies, Europe (ISGT Europe 2017), Torino, Italy.
Glauner, P., Migliosi, A., Meira, J. A., Valtchev, P., State, R., & Bettinger, F. (2017). Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses? Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017).
Li, L. (2017). Mining AndroZoo: A Retrospect. The International Conference on Software Maintenance and Evolution (ICSME).
Popleteev, A. (2017). AmbiLoc: A year-long dataset of FM, TV and GSM fingerprints for ambient indoor localization. 8th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2017).
Sannier, N., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2017). Legal Markup Generation in the Large: An Experience Report. the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017.
Sannier, N., Sabetzadeh, M., & Briand, L. (2017). From RELAW Research to Practice: Reflections on an Ongoing Technology Transfer Project. the IEEE 25th International Requirements Engineering Conference, Lisbon, Portugal, 4-8 September 2017 (pp. 204-208).
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2017). JoanAudit: A Tool for Auditing Common Injection Vulnerabilities. 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. ACM.
Verwer, S. E., & Hammerschmidt, C. (2017). flexfringe: A Passive Automaton Learning Package. Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on.
Jan, S. (2017). Automated and Effective Security Testing for XML-based Vulnerabilities. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S., Pastore, F., Armando, A., Gorla, A., & Panichella, A.
Lei, L., You, L., Dai, G., Vu, T. X., Yuan, D., & Chatzinotas, S. (2017). A Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNet. IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017.
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2017). Implementation and validation of an event-based real-time nonlinear model predictive control framework with ROS interface for single and multi-robot systems. 2017 IEEE Conference on Control Technology and Applications (CCTA) (pp. 1000-1006).
Liu, Z., Longa, P., Pereira, G., Reparaz, O., & Seo, H. (2017). FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. In N., Homma & W., Fischer (Ed.), International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (pp. 665-686).
Quintanar Guzman, S., Kannan, S., Aguilera Gonzalez, A., Olivares Mendez, M. A., & Voos, H. (2017, August 25). Operational space control of a lightweight robotic arm actuated by shape memory alloy wires: A comparative study. Journal of Intelligent Material Systems & Structures.
Oyedotun, O., Demisse, G., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Facial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent Representations. 2017 IEEE International Conference on Computer Vision Workshop (ICCVW).
Oyedotun, O., & Khashman, A. (2017, August 15). Prototype Incorporated Emotional Neural Network (PI-EmNN). IEEE Transactions on Neural Networks and Learning Systems.
Rosalie, M., Brust, M., Danoy, G., Chaumette, S., & Bouvry, P. (2017). Coverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics. IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (pp. 113-118).
Liu, Z., Järvinen, K., Liu, W., & Seo, H. (2017). Multiprecision Multiplication on ARMv8. IEEE 24th Symposium on Computer Arithmetic - ARITH24 (pp. 10-17).
Casini, G., & Meyer, T. (2017). Belief Change in a Preferential Non-Monotonic Framework. Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (pp. 929-935). International Joint Conferences on Artificial Intelligence.
Falk, E., Gurbani, V. K., & State, R. (2017). Query-able Kafka: An agile data analytics pipeline for mobile wireless networks. Proceedings of the 43rd International Conference on Very Large Data Bases 2017, 10, 1646-1657.
Hammerschmidt, C., State, R., & Verwer, S. (2017, August). Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms. Poster session presented at Human in the Loop Machine Learning Workshop at the International Conference on Machine Learning, Sydney, Australia.
Hammes, C., Shankar, B., Nijsure, Y., Spielmann, T., & Ottersten, B. (2017). Random Phase Center Motion Technique for Enhanced Angle-Doppler Discrimination Using MIMO Radars. European Signal Processing Conference (EUSIPCO) 2017.
Popleteev, A. (2017). Indoor localization using ambient FM radio RSS fingerprinting: A 9-month study. 17th IEEE International Conference on Computer and Information Technology (CIT-2017).
Zuo, C., Shao, J., Liu, Z., Ling, Y., & Wei, G. (2017). Hidden-Token Searchable Public-Key Encryption. The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17.
Merlano Duncan, J. C., Krishna Sharma, S., Chatzinotas, S., Ottersten, B., & Wang, X. (2017, July 31). Multi-antenna based one-bit spatio-temporal wideband sensing for cognitive radio networks. Proceedings of IEEE International Conference on Communications (ICC) 2017, 1-7.
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Training Very Deep Networks via Residual Learning with Stochastic Input Shortcut Connections. 24th International Conference on Neural Information Processing, Guangzhou, China, November 14–18, 2017.
Roldán, J. J., Peña-Tapia, E., Martín-Barrio, A., Olivares Mendez, M. A., Del Cerro, J., & Barrientos, A. (2017). Multi-Robot Interfaces and Operator Situational Awareness: Study of the Impact of Immersion and Prediction. Sensors, 17(8 1720).
Rosalie, M., Dentler, J. E., Danoy, G., Bouvry, P., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2017). Area exploration with a swarm of UAVs combining deterministic Chaotic Ant Colony Mobility with position MPC. 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (pp. 1392-1397).
Wang, C. (2017). Automated requirements-driven testing of embedded systems based on use case specifications and timed automata. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Pastore, F. (Promotor), Sabetzadeh, M., Nejati, S., Legeard, B., & Denaro, G.
Di Maio, A., Soua, R., Palattella, M. R., Engel, T., & Rizzo, G. (2017). A centralized approach for setting floating content parameters in VANETs. A centralized approach for setting floating content parameters in VANETs.
Tsakmalis, A. (2017). Active Learning in Cognitive Radio Networks. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor), Ottersten, B. (Promotor), Perez-Neira, A. I. (Promotor), State, R., & Marques, A. G.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Risk-averse Stochastic Nonlinear Model Predictive Control for Real-time Safety-critical Systems. The 20th World Congress of the International Federation of Automatic Control, IFAC 2017 World Congress, Toulouse, France, 9-14 July 2017. Toulouse, France.
Kubler, S., Derigent, W., Voisin, A., Robert, J., & Le Traon, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices.
Chaib Draa, K. (2017). Observation and Control of Anaerobic Digestion Processes for Improved Biogas Production. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Darouach, M. (Promotor), Hansen, J., Alma, M., Boutat, D., & Zhang, P.
Mai, X. P., Göknil, A., Shar, L. K., & Briand, L. (2017). Modeling Security and Privacy Requirements for Mobile Applications: a Use Case-driven Approach (TR-SNT-2017-3). SnT, University of Luxembourg.
Meng, W., Lee, W., Au, M. H., & Liu, Z. (2017). Exploring Effect of Location Number on Map-Based Graphical Password Authentication. 22nd Australasian Conference on Information Security and Privacy - ACISP2017.
Barragan-Ramirez, G., Estrada-Moreno, A., Ramirez Cruz, Y., & Rodriguez-Velazquez, J. A. (2017). The Simultaneous Local Metric Dimension of Graph Families. Symmetry, 9(8).
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, July). On the Unknown Input Functional Observer Design via Polytopic Lyapunov Function: Application to a Quadrotor Aerial Robots Landing. IFAC-PapersOnLine.
Chaib Draa, K., & Voos, H. (2017). An LMI-Based H_infty Discrete-Time Nonlinear State Observer Design for an Anaerobic Digestion Model. World Congress of the International Federation of Automatic Control, Toulouse 9-14 July 2017.
Chaib Draa, K., Voos, H., Alma, M., Zemouche, A., & Darouach, M. (2017). LMI-Based H_infty Nonlinear State Observer Design for Anaerobic Digestion Model. IEEE Mediterranean Conference on Control and Automation, Valletta 3-6 July 2017.
Di Nardo, D., Pastore, F., & Briand, L. (2017). Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes. ACM Transactions on Software Engineering & Methodology, 26(1), 1-40.
Hartmann, T., Fouquet, F., Jimenez, M., Rouvoy, R., & Le Traon, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering.
Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings.
Kolbe, N., Zaslavsky, A., Kubler, S., Robert, J., & Le Traon, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. Modeling and Using Context.
Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2017, July). Impact of Tool Support in Patch Construction. Paper presented at 2017 International Symposium on Software Testing & Analysis (ISSTA).
Kuhrmann, M., Diebold, P., Münch, J., Tell, P., Garousi, V., Felderer, M., Trektere, K., McCaffery, F., Linssen, O., Hanser, E., & Christian, P. (2017). Hybrid software and system development in practice: Waterfall, scrum, and beyond. Proceedings of International Conference on Software and Systems Process (ICSSP).
Lagunas, E., Lei, L., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). Power Allocation for In-Band Full-Duplex Self-Backhauling. International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017.
Liu, B. (2017). AUTOMATED DEBUGGING AND FAULT LOCALIZATION OF MATLAB/SIMULINK MODELS. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S. (Promotor), Klein, J., Pastore, F., Trapp, M., & Di Penta, M.
Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2017). Modelling Metrics for Transparency in Medical Systems. Proceedings of TrustBus 2017.
Spano, D., Alodeh, M., Chatzinotas, S., Krause, J., & Ottersten, B. (2017). Spatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink. IEEE SPAWC 2017.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2017). Interference Constraint Active Learning with Uncertain Feedback for Cognitive Radio Networks. IEEE Transactions on Wireless Communications, 16(7), 4654-4668.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017, July). Energy-Efficient Design for Edge-caching Wireless Networks: When is Coded-caching beneficial? Proceedings of IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Biryukov, A., Feher, D., & Khovratovich, D. (2017). Guru: Universal Reputation Module for Distributed Consensus Protocols. Luxembourg, Luxembourg: University of Luxembourg.
Cantelmo, G., Viti, F., & Derrmann, T. (2017, June 28). Effectiveness of the Two-Step Dynamic Demand Estimation model on large networks. Proceedings of 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Fast Stochastic Non-linear Model Predictive Control for Electric Vehicle Advanced Driver Assistance Systems. 13th IEEE International Conference on Vehicular Electronics and Safety, Vienna, Austria 27-28 June 2017 (pp. 91-96).
Derrmann, T., Frank, R., Engel, T., & Viti, F. (2017). How Mobile Phone Handovers reflect Urban Mobility: A Simulation Study. Proceedings of the 5th IEEE Conference on Models and Technologies for Intelligent Transportation Systems.
Bouvry, P., Chaumette, S., Danoy, G., Guerrini, G., Jurquet, G., Kuwertz, A., Müller, W., Rosalie, M., Sander, J., & Segor, F. (2017). ASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques. DroNet'17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (pp. 17-20). New York, NY, USA: ACM.
Yang, Y., & Sabella, D. (2017). Mobile network energy efficiency optimization in MIMO multi-cell systems. Proc. 5th International Workshop on Cloud Technologies and Energy Efficiency in Mobile Communication Networks.
Garousi, V., Felderer, M., Fernandes, J., Pfahl, D., & Mäntylä, M. (2017). Industry-academia collaborations in software engineering: an empirical analysis of challenges, patterns and anti-patterns in research projects. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 224-229). ACM.
Garousi, V., Felderer, M., Kuhrmann, M., & Herkiloğlu, K. (2017). What industry wants from academia in software testing? Hearing practitioners’ opinions. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 65-69). ACM Digital Library.
Raulamo-Jurvanen, P., Mäntylä, M., & Garousi, V. (2017). Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE 2017) (pp. 21-30). ACM.
Atashpendar, A., Roenne, P., Ostrev, D., & Ryan, P. (2017, June 14). Deniability in Quantum Cryptography. Poster session presented at The 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), Paris, France.
Manukyan, A., Olivares Mendez, M. A., Geist, M., & Voos, H. (2017). Real time degradation identification of UAV using machine learning techniques. International Conference on Unmanned Aircraft Systems ICUAS. Miami, USA, 2017. IEEE.
Atashpendar, A., Dorronsoro, B., Danoy, G., & Bouvry, P. (2017, June 10). A Scalable Parallel Cooperative Coevolutionary PSO Algorithm for Multi-objective Optimization. Journal of Parallel & Distributed Computing.
Gautam, S., & P, U. (2017, June 04). Relay Selection and Transceiver Design for Joint Wireless Information and Energy Transfer in Cooperative Networks. Paper presented at 2017 IEEE 85th Vehicular Technology Conference: VTC2017, Sydney, Australia.
Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307.
Artiga, X., Vázquez, M. Á., Pérez-Neira, A., Tsinos, C., Lagunas, E., Chatzinotas, S., Ramireddy, V., Steinmetz, C., Zetik, R., Ntougias, K., Ntaikos, D., & Papadias, C. (2017). Spectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka Band. European Conference on Networks and Communications (EuCNC), June 2017.
Biryukov, A., Dinu, D.-D., & Le Corre, Y. (2017). Side-Channel Attacks meet Secure Network Protocols. In D., Gollmann, A., Miyaji, & H., Kikuchi (Eds.), Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (pp. 435-454). Springer Verlag.
Biryukov, A., & Perrin, L. P. (2017). State of the Art in Lightweight Symmetric Cryptography. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/31319.
Garousi, V., & Felderer, M. (2017). Experience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 170-179). ACM.
Koesdwiady, A., Soua, R., Karray, F., & Kamel, M. S. (2017). Recent Trends in Driver Safety Monitoring Systems: State of the Art and Challenges. IEEE Transactions on Vehicular Technology, 66(6), 4550-4563.
Krüger, K., Fohler, G., & Volp, M. (2017, June). Improving Security for Time-Triggered Real-Time Systems against Timing Inference Based Attacks by Schedule Obfuscation. Paper presented at Work-in-Progress Proceedings ECRTS'17.
Popleteev, A. (2017, June). Poster: Impact of ground truth errors on Wi-Fi localization accuracy. Poster session presented at 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys-2017).
Radhakrishnan, I., Soua, R., Palattella, M. R., & Engel, T. (2017). An Efficient Service Channel Allocation Scheme in SDN-enabled VANETs. An Efficient Service Channel Allocation Scheme in SDN-enabled VANETs.
You, I., Lenzini, G., & De Santis, A. (Eds.). (2017). Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Systems Journal, 11(2).
Bartolini, C., & Lenzini, G. (2017). Human Rights in the era of Information and Communication Technology. Paper presented at - Belval, Luxembourg.
Hartmann, T., Moawad, A., Fouquet, F., & Le Traon, Y. (2017, May 29). The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. Software & Systems Modeling.
Titcheu Chekam, T., Papadakis, M., Le Traon, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. International Conference on Software Engineering (ICSE 2017).
Di Nucci, D., Palomba, F., Prota, A., Panichella, A., Zaidman, A., & De Lucia, A. (2017). PETrA: a software-based tool for estimating the energy profile of Android applications. 39th International Conference on Software Engineering (ICSE) 2017 (pp. 3-6). ACM.
Panichella, A., & Urko, R. (2017). Java Unit Testing Tool Competition — Fifth Round. 10th International Workshop on Search- Based Software Testing (SBST) 2017. IEEE.
Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. MSR 2017.
Blaiech, K., Hamadi, S., Hommes, S., Valtchev, P., Cherkaoui, O., & State, R. (2017). Rule Compilation in Multi-Tenant Networks. Rule Compilation in Multi-Tenant Networks (pp. 97-98). Beijing, China: IEEE.
Dominico, S., Almeida, E. C. D., & Meira, J. A. (2017, May 15). A PetriNet Mechanism for OLAP in NUMA. Poster session presented at Thirteenth International Workshop on Data Management on New Hardware (DaMoN 2017).
Krivochiza, J., Kalantari, A., Chatzinotas, S., Ottersten, B., & Krivochiza, J. (2017). Low Complexity Symbol-Level Design for Linear Precoding Systems. In R., Heusdens & J. H., Weber, PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (pp. 117). Delft, Netherlands: Delft University of Technology.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, May). A contribution to Cyber-Security of Networked Control Systems: an Event-based Control Approach. Proceedings of 2017 3rd International Conference on Event-Based Control, Communication and Signal Processing (EBCCSP 2017).
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, May). Unknown Input Functional Observers Design for Polytopic Discrete Time Systems. Proceedings of 6th IEEE International Conference on Systems and Control (ICSC) 2017.
Cacciatore, G., Fiandrino, C., Kliazovich, D., Granelli, F., & Bouvry, P. (2017). Cost analysis of Smart Lighting Solutions for Smart Cities. IEEE International Conference on Communications (ICC), Paris, France, 2017.
Capponi, A., Fiandrino, C., Kliazovich, D., & Bouvry, P. (2017). Energy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities. 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing.
Chaib Draa, K., Voos, H., Alma, M., Zemouche, A., & Darouach, M. (2017). LMI-Based Discrete-Time Nonlinear State Observer for an Anaerobic Digestion Model. IEEE International Conference on Systems and Control, Batna 7-9 May 2017.
Falk, E., Camino, R. D., State, R., & Gurbani, V. K. (2017). On non-parametric models for detecting outages in the mobile network. Integrated Network and Service Management 2017 (pp. 1139-1142).
Gurbani, V. K., Kushnir, D., Mendiratta, V. B., Phadke, C., Falk, E., & State, R. (2017). Detecting and predicting outages in mobile networks with log data. IEEE International Conference on Communications, ICC 2017 (pp. 1-7).
Hammes, C., Nijsure, Y., Shankar, B., Schröder, U., & Ottersten, B. (2017). Discrimination of Angle-Doppler Signatures using Arbitrary Phase Center Motion for MIMO Radars. IEEE Radar Conf 2017.
Lagunas, E., Maleki, S., Lei, L., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2017). Carrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks. ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017.
Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (2017, May). The Multi-Generation Repackaging Hypothesis. Poster session presented at The 39th International Conference on Software Engineering.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017, May). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, May). Understanding Android App Piggybacking. Poster session presented at The 39th International Conference on Software Engineering.
Liu, Z., Groszschädl, J., Hu, Z., Järvinen, K., Wang, H., & Verbauwhede, I. (2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Transactions on Computers, 66(5), 773-785.
Liu, Z., Lei, L., Zhang, N., Kang, G., & Chatzinotas, S. (2017, May). Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems. IEEE Access.
Soltani, M., Panichella, A., & van Deursen, A. (2017). A Guided Genetic Algorithm for Automated Crash Reproduction. Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). ACM.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2017). Search-driven String Constraint Solving for Vulnerability Detection. Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). ACM.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017, May). On the Diversity of Partial Relaying Cooperation with Relay Selection in Finite-SNR Regime. IEEE International Conference on Communications.
Vu, T. X., Duhamel, P., Chatzinotas, S., & Ottersten, B. (2017, May). Finite-SNR analysis for partial relaying cooperation with channel coding and opportunistic relay selection. EURASIP Journal on Advances in Signal Processing.
Vu, T. X., Trinh, A. V., Chatzinotas, S., & Ottersten, B. (2017, May). Spectral-Efficient Model for Multiuser Massive MIMO: Exploiting User Velocity. IEEE international Conference on Communications.
Wang, J., & Tang, Q. (2017). Differentially Private Neighborhood-based Recommender Systems. IFIP Information Security & Privacy Conference (pp. 14). Springer.
Perrin, L. P. (2017). Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Biryukov, A. (Promotor), Coron, J.-S., Gilbert, H., Leander, G., & Müller, V.
Biryukov, A., Khovratovich, D., & Tikhomirov, S. (2017, April 07). Findel: Secure Derivative Contracts for Ethereum. Paper presented at 1st Workshop on Trusted Smart Contracts (In Association with Financial Cryptography and Data Security 2017), Sliema, Malta.
Iovino, V., Rial Duran, A., Roenne, P., & Ryan, P. (2017). Using Selene to Verify your Vote in JCJ. Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17).
Pejo, B., & Tang, Q. (2017). To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification. Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017. New York, United States of America: ACM.
Arend, B., Sunnen, P., & Caire, P. (2017). Investigating Breakdowns in Human Robot Interaction: A Conversation Analysis Guided Single Case Study of a Human-NAO Communication in a Museum Environment. International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, 11(5), 839-845.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. The 32nd ACM Symposium on Applied Computing (SAC 2017).
Mouline, L., Hartmann, T., Fouquet, F., Le Traon, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L., Mouline, T., Hartmann, F., Fouquet, Y., Le Traon, J., Bourcier, & O., Barais, Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming. Brussels, Belgium: ACM.
Shamir, A., Biryukov, A., & Perrin, L. P. (2017). Summary of an Open Discussion on IoT and Lightweight Cryptography. Proceedings of Early Symmetric Crypto workshop, 2017. Luxembourg, Luxembourg: University of Luxembourg.
Shin, S. Y., Brun, Y., Balasubramanian, H., Henneman, P. L., & Osterweil, L. J. (2017, March 27). Discrete-Event Simulation and Integer Linear Programming for Constraint-Aware Resource Scheduling. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Kintis, M., Papadakis, M., Jia, Y., Malevris, N., Le Traon, Y., & Harman, M. (2017, March 20). Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Transactions on Software Engineering.
Yang, Y., & Pesavento, M. (2017). A unified successive pseudoconvex approximation framework. IEEE Transactions on Signal Processing, 65(13), 3313 - 3328.
Liu, Z., Kang, G., Lei, L., Zhang, N., & Zhang, S. (2017). Power Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA. IEEE Wireless Communications and Networking Conference (WCNC), 2017 (pp. 1-6).
Wang, C., Pastore, F., & Briand, L. (2017). System Testing of Timing Requirements based on Use Cases and Timed Automata. 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017.
Zhu, Q., Panichella, A., & Zaidman, A. (2017). Speeding-Up Mutation Testing via Data Compression and State Infection. IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2017 (pp. 103-109). IEEE.
Lopez Becerra, J. M., Iovino, V., & Skrobot, M. (2017, March 09). On the Relation Between SIM and IND-RoR Security Models for PAKEs. Paper presented at Grande Region Security and Reliability Day 2017, Luxembourg Ville, Luxembourg.
Derigent, W., Voisin, A., Thomas, A., Kubler, S., & Robert, J. (2017). Application of Measurement-Based AHP to Product-Driven System Control. In T., Borangiu, Service Orientation in Holonic and Multi-Agent Manufacturing (Studies in Computational Intelligence, pp. 249-258). Springer.
Alodeh, M., Spano, D., Chatzinotas, S., & Ottersten, B. (2017). Faster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels. The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing.
Capponi, A., Fiandrino, C., Kliazovich, D., Bouvry, P., & Giordano, S. (2017, March). A Cost-Effective Distributed Framework for Data Collection in Cloud-based Mobile Crowd Sensing Architectures. IEEE Transactions on Sustainable Computing.
Hajri, I., Göknil, A., & Briand, L. (2017). A Change Management Approach in Product Lines for Use Case-Driven Development and Testing. 23rd International Working Conference on Requirements Engineering: Foundation for software Quality (REFSQ 2017).
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2017). Incremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions. 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (pp. 3-21).
Raitza, M., Kumar, A., Volp, M., Walter, D., Trommer, J., Mikolajick, T., & Weber, W. M. (2017, March). Exploiting Transistor-Level Reconfiguration to Optimize Combinational Circuits on the Example of a Conditional Sum Adder. Paper presented at Design, Automation and Test in Europe (DATE 2017), Lausanne, Switzerland.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2017). Impact du mécanisme chaotique sur l’optimisation d’un modèle de mobilité pour un essaim de drones devant réaliser une couverture de zone. In E., Falcon, M., Lefranc, F., Pétrélis, & C.-T., Pham (Eds.), Comptes-rendus de la 20e Rencontre du Non Linéaire (pp. 79-84). Saint Etienne du Rouvray, France: Non-Linéaire Publications.
Dentler, J. E. (2017). denmpc.
Toader, B., Sprumont, F., Faye, S., Viti, F., & Popescu, M. (2017). Usage of Smartphone Data to Derive an Indicator for Collaborative Mobility between Individuals. ISPRS International Journal of Geo-Information, 6(3), 62.
Di Nucci, D., Palomba, F., Prota, A., Panichella, A., Zaidman, A., & De Lucia, A. (2017). Software-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable? Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017). IEEE.
Palomba, F., Di Nucci, D., Panichella, A., Zaidman, A., & De Lucia, A. (2017). Lightweight Detection of Android-specific Code Smells: the aDoctor Project. Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017). IEEE.
Kubler, S., Robert, J., Främling, K., Hefnawy, A., Cherifi, C., & Bouras, A. (2017). Open IoT Ecosystem for Sporting Event Management. IEEE Access, 5(1), 7064-7079.
Ben Nasr, S., Bécan, G., Acher, M., Ferreira Filho, J. B., Sannier, N., Baudry, B., & Davril, J.-M. (2017). Automated extraction of product comparison matrices from informal product descriptions. Journal of Systems and Software, 124, 82-103.
Fiandrino, C., Capponi, A., Cacciatore, G., Kliazovich, D., Sorger, U., Bouvry, P., Kantarci, B., Granelli, F., & Giordano, S. (2017, February). CrowdSenSim: a Simulation Platform for Mobile Crowdsensing in Realistic Urban Environments. IEEE Access.
Duarte, J., Kalogeiton, E., Soua, R., Manzo, G., Palattella, M. R., Di Maio, A., Braun, T., Engel, T., Villas, L., & Rizzo, G. (2017, January 26). A Multi-Pronged Approach to Adaptive and Context Aware Content Dissemination in VANETs. Mobile Networks and Applications, 1-13.
Chenal, M. (2017). Key-Recovery Attacks Against Somewhat Homomorphic Encryption Schemes. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Tang, Q. (Promotor), Coron, J.-S., Ding, J., & Buchmann, J.
Delerue Arriaga, A. (2017). Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Coron, J.-S., Tang, Q., Abdalla, M., & Naccache, D.
Skrobot, M. (2017). On Composability and Security of Game-based Password-Authenticated Key Exchange. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Lancrenon, J., Cremers, C., & Ding, J.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017, January). A New Polytopic Approach for the Unknown Input Functional Observer Design. International Journal of Control.
Fagerholm, F., Sanchez Guinea, A., Mäenpää, H., & Münch, J. (2017). The RIGHT model for Continuous Experimentation. Journal of Systems and Software, 123, 292-305.
Giurgiu, A., & Lallemang, T. (2017, January). The General Data Protection Regulation: A New Opportunity and Challenge for the Banking Sector. Ace Magazine et Archives Online : Fiscalité, Comptabilité, Audit, Droit des Affaires au Luxembourg, (1), 3-15.
Kannan, S., Sajadi Alamdari, S. A., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2017). Model predictive control for cooperative control of space robots. Model predictive control for cooperative control of space robots (pp. 020068). AIP Publishing.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, January). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics & Security.
Perrin, L. P., & Udovenko, A. (2017). Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog. IACR Transactions on Symmetric Cryptology, 2016(2), 99-124.
Ajani, G., Boella, G., Di Caro, L., Robaldo, L., Humphreys, L., Praduroux, S., Rossi, P., & Violato, A. (2017). The European Legal Taxonomy Syllabus: A multi-lingual, multi-level ontology framework to untangle the web of European legal terminology. Applied Ontology.
Almasi, M., Hemmati, H., Fraser, G., Arcuri, A., & Benefelds, J. (2017). An Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application. ACM/IEEE International Conference on Software Engineering (ICSE).
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2017). Symbol-Level Multiuser MISO Precoding for Multi-level Adaptive Modulation. IEEE Transactions on Wireless Communications.
Annaiyan, A., Olivares Mendez, M. A., & Voos, H. (2017). Real-time graph-based SLAM in unknown environments using a small UAV. 2017 International Conference on Unmanned Aircraft Systems (ICUAS); Miami 13-16 June 2017 (pp. 1118-1123).
Antonelo, E. A., Camponogara, E., & Foss, B. (2017). Echo State Networks for Data-driven Downhole Pressure Estimation in Gas-lift Oil Wells. Neural Networks, 85, 106--117.
Antonelo, E. A., Flesch, C., & Filipe, S. (2017). Reservoir Computing for Detection of Steady State in Performance Tests of Compressors. Neurocomputing.
Antonelo, E. A., & State, R. (2017). Recurrent Dynamical Projection for Time series-based Fraud detection. ICANN 2017, Part II, LNCS 10614.
Arcuri, A. (2017). Many Independent Objective (MIO) Algorithm for Test Suite Generation. Symposium on Search-Based Software Engineering (SSBSE).
Arcuri, A. (2017). RESTful API Automated Test Case Generation. IEEE International Conference on Software Quality, Reliability & Security (QRS).
Arcuri, A., Fraser, G., & Just, R. (2017). Private API Access and Functional Mocking in Automated Unit Test Generation. IEEE International Conference on Software Testing, Verification and Validation (ICST).
Backes, M., Humbert, M., Pang, J., & Zhang, Y. (2017). walk2friends: Inferring Social Links from Mobility Profiles. Proceedings of the 24th ACM International Conference on Computer and Communications Security (pp. 1943-1957). ACM Press.
Bana, G. (2017). Models of Objective Chance: An Analysis through Examples. Making it Formally Explicit (pp. 43-60). Springer.
Baptista, R., Antunes, M., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Flexible Feedback System for Posture Monitoring and Correction. IEEE International Conference on Image Information Processing (ICIIP).
Baptista, R., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2017). Video-Based Feedback for Assisting Physical Activity. 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP).
Bartolini, C. (2017). Software Testing Techniques Revisited for OWL Ontologies. In S., Hammoudi, L., Ferreira Pires, B., Selic, & P., Desfray (Eds.), Model-Driven Engineering and Software Development (pp. 132-153). Springer International Publishing.
Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2017). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In T., Bosse & B., Bredeweg (Eds.), Communications in Computer and Information Science (pp. 47-62). Springer International Publishing.
Bartolini, C., Muthuri, R., & Cristiana, S. (2017). Using Ontologies to Model Data Protection Requirements in Workflows. In M., Otake, S., Kurahashi, Y., Ota, K., Satoh, & D., Bekki (Eds.), New Frontiers in Artificial Intelligence (pp. 233-248). Springer International Publishing.
Bartolini, C., Tettamanti, T., & István, V. (2017). Critical features of autonomous road transport from the perspective of technological regulation and law. Transportation Research Procedia, 27, 791-798.
Ben Fadhel, A. (2017). Comprehensive Specification and Efficient Enforcement of Role-based Access Control Policies using a Model-driven Approach. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Bianculli, D. (Promotor), Klein, J., Balzarotti, D., & Steimann, F.
Bezzaoucha, S., Voos, H., & Darouach, M. (2017). Chapter 4:A Survey on The Polytopic Takagi-Sugeno Approach: Application to the Inverted Pendulum. The Inverted Pendulum: From Theory to New Innovations in Control and Robotics. The Institution of Engineering and Technology IET-publishing.
Biesmans, W., Balasch, J., Rial Duran, A., Preneel, B., & Verbauwhede, I. (2017). Private Mobile Pay-TV From Priced Oblivious Transfer. IEEE Transactions on Information Forensics & Security.
Bohrer, B., Rahli, V., Vukotic, I., Volp, M., & Platzer, A. (2017). Formally Verified Differential Dynamic Logic. CPP 2017.
Booth, R., Casini, G., Meyer, T., & Varzinczak, I. (2017). Extending Typicality for Description Logics. University of Luxembourg.
Booth, R., Casini, G., & Varzinczak, I. (Eds.). (2017). DARe-17 - Proceedings of the Fourth International Workshop on Defeasible and Ampliative Reasoning. CEUR Workshop Proceedings.
Brugali, D., & Hochgeschwender, N. (2017). Managing the Functional Variability of Robotic Perception Systems. Proceedings of the IEEE International Conference on Robotic Computing.
Brust, M., Danoy, G., Bouvry, P., Gashi, D., Pathak, H., & Goncalves, M. P. (2017). Defending Against Intrusion of Malicious UAVs with Networked UAV Defense Swarms. 42nd IEEE Conference on Local Computer Networks. IEEE Computer Society.
Brust, M., Zurad, M., Hentges, L. P., Gomes, L., Danoy, G., & Bouvry, P. (2017). Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering. CYBCONF 2017-12-13 09:39:53 +0000 2017-12-13 09:39:53 +0000. IEEE.
Camino, R. D., State, R., Montero, L., & Valtchev, P. (2017). Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017).
Campos, J., Ge, Y., Fraser, G., Eler, M., & Arcuri, A. (2017). An Empirical Evaluation of Evolutionary Algorithms for Test Suite Generation. Symposium on Search-Based Software Engineering (SSBSE).
Castignani, G., Derrmann, T., Frank, R., & Engel, T. (2017). Smartphone-based Adaptive Driving Maneuver Detection: A large-scale Evaluation Study. IEEE Transactions on Intelligent Transportation Systems.
Changaival, B., & Rosalie, M. (2017). Exploring chaotic dynamics by partition of bifurcation diagram. Proceeding of Workshop on Advance in Nonlinear Complex Systems and Applications (WANCSA) (pp. 7-8).
Cogo, V. V., Bessani, A., Couto, F. M., Gama-Carvalho, M., Fernandes, M., & Verissimo, P. (2017). How can photo sharing inspire sharing genomes? 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017.
Correa Bahnsen, A., Villegas, S., Aouada, D., & Ottersten, B. (2017). Fraud Detection by Stacking Cost-Sensitive Decision Trees. Data Science for Cyber-Security (DSCS), London 25-27 September.
De Caro, A.* , Iovino, V.* , & O'Neill, A.* . (2017). Receiver and Sender Deniable Functional Encryption. IET Information Security.
* These authors have contributed equally to this work.
Demisse, G., Aouada, D., & Ottersten, B. (2017). Deformation Based Curved Shape Representation. IEEE Transactions on Pattern Analysis & Machine Intelligence.
Derrmann, T., Frank, R., & Viti, F. (2017). Towards Estimating Urban Macroscopic Fundamental Diagrams From Mobile Phone Signaling Data: A Simulation Study. Poster session presented at TRB 96th Annual Meeting, Washington, D.C, USA.
Desmedt, Y., Iovino, V., Persiano, G., & Visconti, I. (2017). Controlled Homomorphic Encryption: Definition and Construction. FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Dong, N., Jonker, H., & Pang, J. (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers & Security, 65, 405-432.
Du, M., Sassioui, R., Varisteas, G., State, R., Brorsson, M., & Cherkaoui, O. (2017). Improving Real-Time Bidding Using a Constrained Markov Decision Process. Advanced Data Mining and Applications (pp. 711-726). Springer.
Erata, F., Göknil, A., Tekinerdogan, B., & Kardas, G. (2017). A Tool for Automated Reasoning about Traces Based on Configurable Formal Semantics. 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)) (pp. 959-963).
Faye, S., Bronzi, W., Tahirou, I., & Engel, T. (2017). Characterizing User Mobility Using Mobile Sensing Systems. International Journal of Distributed Sensor Networks, 13(8).
Faye, S., Louveton, N., Jafarnejad, S., Kryvchenko, R., & Engel, T. (2017). An Open Dataset for Human Activity Analysis using Smart Devices.
Fernandes, M., Decouchant, J., Couto, F. M., & Verissimo, P. (2017). Cloud-Assisted Read Alignment and Privacy. 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017.
Fiz Pontiveros, B., Hommes, S., & State, R. (2017). Confirmation Delay Prediction of Transactions in the Bitcoin Network. Advances in Computer Science and Ubiquitous Computing.
Fraser, G., Rojas, J. M., Campos, J., & Arcuri, A. (2017). EVOSUITE at the SBST 2017 Tool Competition. IEEE/ACM International Workshop on Search-Based Software Testing (SBST).
Gajrani, J., Li, L., Laxmi, V., Tripathi, M., Singh Gaur, M., & Conti, M. (2017). POSTER: Detection of Information Leaks via Reflection in Android Apps. The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017).
Galetzka, M., & Glauner, P. (2017). A Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons. Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP.
Garousi, V., Afzal, W., Çağlar, A., Işık, İ. B., Baydan, B., Çaylak, S., Boyraz, A. Z., Yolaçan, B., & Herkiloğlu, K. (2017). Comparing automated visual GUI testing tools: an industrial case study. Proceedings of International Workshop on Automated Software Testing (A-TEST).
Garousi, V., & Yıldırım, E. (2017). Introducing automated GUI testing and observing its benefits: an industrial case study in the context of law-practice management software. Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM).
Genç, Z. A., Kardaş, S., & Kiraz. (2017). Examination of a New Defense Mechanism: Honeywords. Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice. Springer.
Genç, Z. A., Lenzini, G., & Ryan, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press.
Ghanavati, S., Van Zee, M., & Bex, F. (2017). Argumentation-based Methodology for Goal-oriented Requirements Language (GRL). Proceedings of the 10th International i* Workshop co-located with the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), Essen, Germany, June 12-13, 2017.
Gharanjik, A., Shankar, B., Zimmer, F., & Ottersten, B. (2017). Centralized Rainfall Estimation using Carrier-to-Noise of Satellite Communication Links. IEEE Journal on Selected Areas In Communications.
Giustolisi, R., Iovino, V., & Lenzini, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R., Giustolisi, V., Iovino, & G., Lenzini, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS.
Glauner, P., Dahringer, N., Puhachov, O., Meira, J. A., Valtchev, P., State, R., & Duarte, D. (2017). Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations. Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017).
Glauner, P., Du, M., Paraschiv, V., Boytsov, A., Lopez Andrade, I., Meira, J. A., Valtchev, P., & State, R. (2017). The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study. Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017).
Glauner, P., Meira, J. A., Valtchev, P., State, R., & Bettinger, F. (2017). The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey. International Journal of Computational Intelligence Systems, 10(1), 760-775.
Goncalves Almeida Antunes, M., Barreto, J. P., Aouada, D., & Ottersten, B. (2017). Unsupervised Vanishing Point Detection and Camera Calibration from a Single Manhattan Image with Radial Distortion. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.
Goodman, D., Varisteas, G., & Harris, T. (2017). Pandia: comprehensive contention-sensitive thread placement. Proceedings of the Twelfth European Conference on Computer Systems (pp. 254-269). New York, USA: ACM.
Havrikov, N., Gambi, A., Zeller, A., Arcuri, A., & Galeotti, J. P. (2017). Generating Unit Tests with Structured System Interactions. IEEE/ACM International Workshop on Automation of Software Test (AST).
He, S., Wang, J., Huang, Y., Ottersten, B., & Hong, W. (2017). Codebook-Based Hybrid Precoding for Millimeter Wave Multiuser Systems. IEEE Transactions on Signal Processing, 65(20), 5289-5304.
Huynen, J.-L., & Lenzini, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. Proceedings of the 3rd International Conference on Information Systems Security and Privacy.
Iovino, V., Tang, Q., & Zebrowski, K. (2017). On the power of Public-key Function-Private Functional Encryption. IET Information Security.
Jafarnejad, S., Castignani, G., & Engel, T. (2017). Towards a Real-Time Driver Identification Mechanism Based on Driving Sensing Data. 20th International Conference on Intelligent Transportation Systems (ITSC) (pp. 7).
Jan, S., Nguyen, D. C., Andrea, A., & Briand, L. (2017). A Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications. 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017.
Jayakody, Chatzinotas, S., Thompson, & Durrani (Eds.). (2017). Wireless Information and Power Transfer: A New Paradigm for Green Communications. Springer.
Jhawar, R., & Mauw, S. (2017). Model-driven situational awareness for moving target defense. In M., Scanlon & N.-A., Le-Khac (Eds.), Proc. 16th European Conference on Cyber Warfare and Security (pp. 184-192). ACPI.
Jimenez, M., Cordy, M., Kintis, M., Titcheu Chekam, T., Le Traon, Y., & Papadakis, M. (2017). On the Naturalness of Mutants. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/35014.
Kalantari, A., Tsinos, C., Soltanalian, M., Chatzinotas, S., Ma, W.-K., & Ottersten, B. (2017). MIMO directional modulation M-QAM precoding for transceivers performance enhancement. MIMO directional modulation M-QAM precoding for transceivers performance enhancement.
Kalantari, A., Tsinos, C., Soltanalian, M., Chatzinotas, S., Ma, W.-K., & Ottersten, B. (2017). Spatial peak power minimization for relaxed phase M-PSK MIMO directional modulation transmitter. Spatial peak power minimization for relaxed phase M-PSK MIMO directional modulation transmitter.
Kannan, S., Bezzaoucha, S., Quintanar Guzman, S., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2017). Hierarchical control of aerial manipulation vehicle. AIP Conference Proceedings, 1798(1), 020069.
Kardaş, S., & Genç, Z. A. (2017). Security attacks and enhancements to chaotic map-based RFID authentication protocols. Wireless Personal Communications.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2017). Modelling and Performance Analysis of Cognitive Radio Systems from a Deployment Perspective. Handbook of Cognitive Radio. Springer.
Khan, N., & Ouaich, R. (2017). Feasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects. AUEIRC Proceeedings. Springer.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). Bayesian Optimization Approach of General Bi-level Problems. Proceedings of the Genetic and Evolutionary Computation Conference Companion (pp. 1614-1621). New York, USA: ACM.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). A new Co-evolutionary Algorithm Based on Constraint Decomposition. IPDPS. IEEE Computer Society.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). A new modeling approach for the biobjective exact optimization of satellite payload configuration. International Transactions in Operational Research.
Kremer, P., Dentler, J. E., Kannan, S., & Voos, H. (2017). Cooperative localization of unmanned aerial vehicles in ROS - The Atlas node. 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).
Kreutz, D., Verissimo, P., Magalhaes, C., & Ramos, F. M. V. (2017). The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure.
Kreutz, D., Yu, J., Ramos, F. M. V., & Verissimo, P. (2017). ANCHOR: logically-centralized security for Software-Defined Networks. Eprint/Working paper retrieved from https://arxiv.org/abs/1711.03636.
Kubler, S., Robert, J., Umbrich, J., Neumaier, S., & Le Traon, Y. (2017). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly.
Lagraa, S., François, J., Lahmadi, A., Minier, M., Hammerschmidt, C., & State, R. (2017). BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows. CSNet 2017 Conference Proceedings.
Lagunas, E., Monica, N., Pau, C., Montse, N., Ricardo, G., & Genis, F. (2017). Position Estimation for IR-UWB Systems: DPE, Multi-TOA approach and their Compressive Sensing-based Modeling. Positioning and Navigation in Complex Environments. PA, USA: IGI Global Hershey.
Lagunas, E., & Rugini, L. (2017). Performance of Compressive Sensing Based Energy Detection. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, 8-13 October 2017.
Laurent, T., Papadakis, M., Kintis, M., Henard, C., Le Traon, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. 10th IEEE International Conference on Software Testing, Verification and Validation.
Lei, L., Lagunas, E., Maleki, S., He, Q., Chatzinotas, S., & Ottersten, B. (2017). Energy Optimization for Full-Duplex Self-Backhauled HetNet with Non-Orthogonal Multiple Access. International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, July 2017.
Lemanska, M., Rodríguez-Velázquez, A., & Trujillo Rasua, R. (2017). Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. Fundamenta Informaticae, 152(3), 273-287.
Li, L., Bissyande, T. F. D. A., & Klein, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology.
Li, L., Dong, N., Pang, J., Sun, J., Bai, G., Liu, Y., & Dong, J. S. (2017). A verification framework for stateful security protocols. Proceedings of the 19th International Conference on Formal Engineering Methods (pp. 262-280). Springer Science & Business Media B.V.
Liu, B., Lucia, L., Nejati, S., & Briand, L. (2017). Improving Fault Localization for Simulink Models using Search-Based Testing and Prediction Models. 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017).
Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS.
Manzo, G., Soua, R., Di Maio, A., Engel, T., Palattella, M. R., & Rizzo, G. (2017). Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario. Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario.
Matinnejad, R., Nejati, S., & Briand, L. (2017). Automated Testing of Hybrid Simulink/Stateflow Controllers: Industrial Case Studies. Proceedings of 11TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2017) (pp. 938-943). ACM.
Meira, J. A., Glauner, P., State, R., Valtchev, P., Dolberg, L., Bettinger, F., & Duarte, D. (2017). Distilling Provider-Independent Data for General Detection of Non-Technical Losses. Power and Energy Conference, Illinois 23-24 February 2017.
Milner, K., Cremers, C., Yu, J., & Ryan, M. (2017). Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. 30th IEEE Computer Security Foundations Symposium.
Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2017). A new decomposition method for attractor detection in large synchronous Boolean networks. Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (pp. 232-249). Springer Science & Business Media B.V.
Nanda, R., Di Caro, L., Boella, G., Konstantinov, H., Tyankov, T., Traykov, D., Hristov, H., Costamagna, F., Humphreys, L., Robaldo, L., & Romano, M. (2017). A Unifying Similarity Measure for Automated Identification of National Implementations of European Union Directives. A Unifying Similarity Measure for Automated Identification of National Implementations of European Union Directives.
Nanda, R., Siragusa, G., Di caro, L., Theobald, M., Boella, G., Robaldo, L., & Costamagna, F. (2017). Concept Recognition in European and National Law. proc. of The 30th international conference on Legal Knowledge and Information Systems (JURIX 2017).
Nguyen, Jayakody, Chatzinotas, S., Thompson, & Li. (2017). Self-Powered Two-Way Cognitive Relay Networks: Protocol Design and Performance Analysis. IEEE Access.
Norvill, R., Fiz Pontiveros, B., State, R., Awan, I., & Cullen, A. (2017). Automated labeling of unknown contracts in Ethereum. Computer Communication and Networks (ICCCN), 2017 26th International Conference on.
Özkan, R., Garousi, V., & Betin-Can, A. (2017). Multi-objective regression test selection in practice: an empirical study in the defense software industry. Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM).
Pang, J., & Zhang, Y. (2017). DeepCity: A Feature Learning Framework for Mining Location Check-Ins. Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (pp. 652-655). AAAI.
Pang, J., & Zhang, Y. (2017). Quantifying location sociality. Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (pp. 145-154). ACM Press.
Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Le Traon, Y., & Harman, M. (2017). Mutation Testing Advances: An Analysis and Survey. Advances in Computers. Elsevier.
Papadopoulos, K., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2017). Enhanced Trajectory-based Action Recognition using Human Pose. IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017.
Papazafeiropoulos, Sharma, Chatzinotas, S., & Ottersten, B. (2017). Ergodic Capacity Analysis of Amplify-and-Forward Dual-Hop MIMO Relay Systems with Residual Transceiver Hardware Impairments: Conventional and Large System Limits. IEEE Transactions on Vehicular Technology.
Papazafeiropoulos, Sharma, Chatzinotas, S., & Ratnarajah. (2017). Impact of Residual Additive Transceiver Hardware Impairments on Rayleigh-Product MIMO Channels with Linear Receivers: Exact and Asymptotic Analyses. IEEE Transactions on Communications.
Politis, C., Maleki, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2017). Weak Interference Detection with Signal Cancellation in Satellite Communications. The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017.
Politis, C., Maleki, S., Tsinos, C., Liolis`, K., Chatzinotas, S., & Ottersten, B. (2017). Simultaneous Sensing and Transmission for Cognitive Radios with Imperfect Signal Cancellation. IEEE Transactions on Wireless Communications.
Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2017). Observer design for Lightweight Robotic arm actuated by Shape Memory Alloy (SMA) wire. In S., Quintanar Guzman, S., Kannan, H., Voos, M., Darouach, & M., Alma, 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, 16-17 November 2017.
Rahli, V., & Bickford, M. (2017). Validating Brouwer's Continuity Principle for Numbers Using Named Exceptions. Mathematical Structures in Computer Science.
Rahli, V., Bickford, M., & Constable, R. (2017). Bar Induction: The Good, the Bad, and the Ugly. Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS).
Rahli, V., Guaspari, D., Bickford, M., & Constable, R. (2017). EventML: Specification, Verification, and Implementation of Crash-Tolerant State Machine Replication Systems. Science of Computer Programming.
Rial Duran, A. (2017). Issuer-Free Oblivious Transfer with Access Control Revisited. Information Processing Letters.
Riestock, M., Engelhard, F., Zug, S., & Hochgeschwender, N. (2017). Exploring Gridmap-based Interfaces for the Remote Control of UAVs under Bandwidth Limitations. Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction.
Riestock, M., Engelhard, F., Zug, S., & Hochgeschwender, N. (2017). User Study on Remotely Controlled UAVs with Focus on Interfaces and Data Link Quality. IEEE/RAS International Conference on Intelligent Robots and Systems.
Robaldo, L., & Sun, X. (2017). On the Complexity of Input/Output Logic. Journal of Applied Logic.
Robaldo, L., & Sun, X. (2017). Reified Input/Output logic: Combining Input/Output logic and Reification to represent norms coming from existing legislation. Journal of Logic & Computation.
Rocchetto, M. (2017). Towards Formal Security Analysis of Industrial Control Systems. Towards Formal Security Analysis of Industrial Control Systems.
Sannier, N., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2017). An Automated Framework for Detection and Resolution of Cross References in Legal Texts. Requirements Engineering, 22(2), 215-237.
Sedighi, S., Shankar, B., Maleki, S., & Ottersten, B. (2017). Multi-Target Localization in Asynchronous MIMO Radars Using Sparse Sensing. Paper presented at IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), Curaçao, Dutch Antilles, Netherland.
Shabayek, A. E. R., Aouada, D., Saint, A. F. A., & Ottersten, B. (2017). DEFORMATION TRANSFER OF 3D HUMAN SHAPES AND POSES ON MANIFOLDS. IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017.
Sharma, Bogale, Le, Chatzinotas, S., Wang, & Ottersten, B. (2017). Dynamic Spectrum Sharing in 5G Wireless Networks with Full-Duplex Technology: Recent Advances and Research Challenges. IEEE Communications Surveys and Tutorials.
Sharma, S. K., Lagunas, E., Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). Spectral coexistence for next generation wireless backhaul networks. Access, Fronthaul and Backhaul Networks for 5G and Beyond. Institution of Engineering and Technology.
Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search.
Soltana, G., Sabetzadeh, M., & Briand, L. (2017). Synthetic Data Generation for Statistical Testing. 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE'17) (pp. 872-882). IEEE.
Steichen, M., Hommes, S., & State, R. (2017). ChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow. ChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow.
Sun, X., & Robaldo, L. (2017). Norm-based deontic logic for access control, some computational results. Future Generation Computer Systems.
Symeonidis, I., Aly, A., Mustafa, M. A., Mennink, B., Dhooghe, S., Preneel, B., Foley, S. N., Gollmann, D., & Snekkenes, E. (2017). SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision. In I., Symeonidis, Computer Security -- ESORICS 2017 (22). Cham: Springer International Publishing.
Tervo, O., Pennanen, H., Chatzinotas, S., Ottersten, B., & Juntti, M. (2017). Multi-cell interference coordination for multigroup multicast transmission. 2017 European Conference on Networks and Communications (EuCNC).
Tervo, O., Tran, L. N., Chatzinotas, S., Juntti, M., & Ottersten, B. (2017). Energy-efficient joint unicast and multicast beamforming with multi-antenna user terminals. 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Tervo, O., Tran, L. N., Pennanen, H., Chatzinotas, S., Juntti, M., & Ottersten, B. (2017). Energy-efficient coordinated multi-cell multi-group multicast beamforming with antenna selection. 2017 IEEE International Conference on Communications Workshops (ICC).
Tervo, Pennanen, Christopoulos, Chatzinotas, S., Juntti, & Ottersten. (2017). Distributed Optimization for Coordinated Multi-cell Multigroup Multicast Beamforming: Power Minimization and SINR Balancing. IEEE Transactions on Signal Processing.
Toader, B., Moawad, A., Fouquet, F., Hartmann, T., Popescu, M., & Viti, F. (2017). A New Modelling Framework over Temporal Graphs for Collaborative Mobility Recommendation Systems. Paper presented at IEEE 20th International Conference on Intelligent Transportation Systems, Yokohama, Japan.
Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). On the energy-efficiency of hybrid analog-digital transceivers for large antenna array systems. On the energy-efficiency of hybrid analog-digital transceivers for large antenna array systems.
Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). On the Energy-Efficiency of Hybrid Analog-Digital Transceivers for Single- and Multi-carrier Large Antenna Array Systems. IEEE Journal on Selected Areas In Communications.
Tüysüz, A., Meyer, F., Steichen, M., Zwyssig, C., & Kolar, J. W. (2017). Advanced Cooling Methods for High-Speed Electrical Machines. IEEE Transactions on Industry Applications.
van der Torre, L., & Van Zee, M. (2017). Rational Enterprise Architecture. Advances in Artificial Intelligence: From Theory to Practice - 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, Arras, France, June 27-30, 2017, Proceedings, Part I.
Volp, M., Rocha, F., Decouchant, J., Yu, J., & Verissimo, P. (2017). Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. Twenty-fifth International Workshop on Security Protocols.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017). Coded Caching and Storage Planning in Heterogeneous Networks. 2017 IEEE Wireless Communications and Networking Conference (WCNC).
Vu, T. X., Nguyen, Hieu Duy, Quek, Tony Q.S., & Sun, Sumei. (2017). Adaptive Cloud Radio Access Networks: Compression and Optimization. IEEE Transactions on Signal Processing, 65(1), 228-241.
Wang, J., Sun, J., Yuan, Q., & Pang, J. (2017). Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (pp. 3-21). Springer.
Wang, Y., Qin, Z., Pang, J., Zhang, Y., & Jin, X. (2017). Semantic annotation for places in LBSN through graph embedding. Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM'17 (pp. 2343-2346). ACM Press.
Wasim, M. U. (2017). Attacks and protection for Intellectual Property Rights, Privacy, and Contracts in the Cloud. Paper presented at ICT International Doctoral School, Trento, Italy.
Wasim, M. U. (2017). Communication Strategies for Next-Generation of University based Science Parks. Paper presented at Training Workshop on Marketing and Communications for Science Parks, Bangkok, Thailand.
Wasim, M. U. (2017). Intellectual Property Rights infringement in the Cloud. Paper presented at 4th International Workshop on New Models, Algorithms and Simulation Tools for Cloud Computing, Cloud Brokering, Internet Shopping, and e-Commerce Trading, Luxembourg, Luxembourg.
Wasim, M. U., Ibrahim, A. A. Z. A., Bouvry, P., & Limba, T. (2017). Law as a Service (LaaS): Enabling Legal Protection over a Blockchain Network. 14th International Conference on Smart Cities: Improving Quality of Life using ICT & IoT (HONET-ICT 17), October 09-11, Irbid Jordan.
Wasim, M. U., Ibrahim, A. A. Z. A., Bouvry, P., & Limba, T. (2017). Self-Regulated Multi-criteria Decision Analysis: An Autonomous Brokerage-Based Approach for Service Provider Ranking in the Cloud. 9th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2017), December 11-14, Hong Kong China.
Yang, X., Lo, D., Li, L., Xia, X., Bissyande, T. F. D. A., & Klein, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology.
Yu, J., & Ryan, M. (2017). Chapter 7: Evaluating web PKIs. Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017. Morgan Kaufmann.
Yu, J., Ryan, M., & Chen, L. (2017). Authenticating compromisable storage systems. The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
Yu, J., Ryan, M., & Cremers, C. (2017). DECIM: Detecting Endpoint Compromise In Messaging. IEEE Transactions on Information Forensics & Security.
zhang, Y., Ni, M., Han, W., & Pang, J. (2017). Does #like4like indeed provoke more likes? Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) (pp. 179-186). ACM.
Ziafati, P., Rodriguez Lera, F. J., Pinto Costa, A., Nazarikhorram, A., & van der Torre, L. (2017). ProCRob Architecture for Personalized Social Robotics. Paper presented at Workshop R4L @HRI 2017.
Ziaragkas, G., Poziopoulou, G., Núñez-Martínez, J., Baranda Hortigüela, J., Moreno, I., Tsinos, C., Maleki, S., Sharma, S. K., Alodeh, M., & Chatzinotas, S. (2017). SANSA - Hybrid Terrestrial-Satellite Backhaul Network: Scenarios, Use cases, KPIs, Architecture, Network and Physical Layer Techniques. International Journal of Satellite Communications and Networking.

2016

Kannan, S., Quintanar Guzman, S., Bezzaoucha, S., Olivares Mendez, M. A., & Voos, H. (2016). Adaptive Control of Hysteretic Robotic arm in Operational Space. 5th International Conference on Mechatronics and Control Engineering ICMCE, venice, Italy, 2016 (pp. 92-96).
Ibrahim, A. A. Z. A., Kliazovich, D., Bouvry, P., & OLEKSIAK, A. (2016). Using Virtual Desktop Infrastructure to Improve Power Efficiency in Grinfy System. IEEE 8th International Conference on Cloud Computing Technology and Science(CloudCom), Luxembourg 2016 (pp. 85-89).
Volp, M., Lackorzynski, A., Decouchant, J., Rahli, V., Rocha, F., & Verissimo, P. (2016, December 12). Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control. Paper presented at 1st Workshop on System Software for Trusted Execution (SysTEX '16), Trento, Italy.
Wang, J., & Tang, Q. (2016). A Probabilistic View of Neighborhood-based Recommendation Methods. ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE.
Glauner, P., & State, R. (2016, December 09). Deep Learning on Big Data Sets in the Cloud with Apache Spark and Google TensorFlow. Paper presented at 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016), Shanghai, China.
Derrmann, T., Faye, S., Frank, R., & Engel, T. (2016, December 08). Poster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity. Poster session presented at IEEE Vehicular Networking Conference (VNC) 2016, Columbus, Ohio, USA.
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). A tracking error control approach for model predictive position control of a quadrotor with time varying reference. IEEE International Conference on Robotics and Biomimetics ROBIO, Qingdao, China, 2016.
Di Maio, A., Palattella, M. R., Soua, R., Lamorte, L., Vilajosana, X., Alonso-Zarate, J., & Engel, T. (2016). Enabling SDN in VANETs: What is the Impact on Security? Sensors, 16(12), 2077.
Aguilera Gonzalez, A., Voos, H., & Darouach, M. (2016). States and unknown input estimation via non-linear sliding mode high-gain observers for a glucose-insulin system. IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES), Kuala Lumpur, Malaysia, 2016 (pp. 388-393).
Kubler, S., Robert, J., Hefnawy, A., Cherifi, C., Bouras, A., & Främling, K. (2016). IoT-based Smart Parking System for Sporting Event Management. Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 104-114). New York, USA: ACM New York.
Arriaga, A., Iovino, V., & Tang, Q. (2016). Updatable Functional Encryption. Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology (pp. 347-363). Springer.
Bronzi, W., Derrmann, T., Castignani, G., & Engel, T. (2016). Towards Characterizing Bluetooth Discovery in a Vehicular Context. Vehicular Networking Conference (VNC), 2016 IEEE.
Capponi, A., Fiandrino, C., Franck, C., Sorger, U., Kliazovich, D., & Bouvry, P. (2016). Assessing Performance of Internet of Things-based Mobile Crowdsensing Systems for Sensing as a Service Applications in Smart Cities. 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
Du, M., State, R., Brorsson, M., & Avanesov, T. (2016). Behavior Profiling for Mobile Advertising. Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (pp. 302-307). ACM.
Fiandrino, C., Kantarci, B., Anjomshoa, F., Kliazovich, D., Bouvry, P., & Matthews, J. (2016). Sociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms. IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 2016.
Hammerschmidt, C., Verwer, S., Lin, Q., & State, R. (2016, December). Interpreting Finite Automata for Sequential Data. Interpretable Machine Learning for Complex Systems: NIPS 2016 workshop proceedings.
Hochgeschwender, N., Schneider, S., Voos, H., Bruyninckx, H., & Kraetzschmar, G. (2016). Graph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time Adaptation. IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (pp. 83-90).
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. 2016 Asia-Pacific Software Engineering Conference (APSEC).
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). Optimality Results on the Security of Lookup-Based Protocols. In G. P., Hancke & K., Markantonakis (Eds.), Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (pp. 137-150). Springer.
Popleteev, A. (2016). Indoor positioning and floor plan based ground truth: Can you really click where you are? 15th International Conference on Mobile and Ubiquitious Multimedia (MUM-2016).
Pouryazdan, M., Fiandrino, C., Kantarci, B., Kliazovich, D., Soyata, T., & Bouvry, P. (2016). Game-Theoretic Recruitment of Sensing Service Providers for Trustworthy Cloud-Centric Internet-of-Things (IoT) Applications. IEEE Global Communications Conference (GLOBECOM) Workshops: Fifth International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA).
Rial, A. (2016, December). On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data. Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom).
Seo, H., Liu, Z., Groszschädl, J., & Kim, H. (2016). Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. Security and Communication Networks, 9(18), 5401-5411.
Soltanalian, M., Mysore, R. B. S., & Ottersten, B. (2016). Reliability problems and Pareto-optimality in cognitive radar (Invited paper). Signal Processing Conference (EUSIPCO), 2016 24th European. IEEE.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2016). Per-antenna Power Minimization in Symbol-Level Precoding. IEEE GLOBECOM 2016.
Yang, Y., & Pesavento, M. (2016). A parallel algorithm for energy efficiency maximization in massive MIMO networks. Proc. 2016 IEEE Global Communications Conference.
Li, L. (2016). Boosting Static Security Analysis of Android Apps through Code Instrumentation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J. (Promotor), Briand, L., Bissyande, T. F. D. A., Zhang, X., & Backes, M.
Codeca, L. (2016). Dynamic Vehicular Routing in Urban Environments. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor).
Adebayo, K. J., Di Caro, L., Boella, G., & Bartolini, C. (2016, November 15). An approach to information retrieval and question answering in the legal domain. Paper presented at Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN), Kanagawa, Japan.
Faye, S., Tahirou, I., & Engel, T. (2016). Demo Abstract: Human Mobility Profiling Using Privacy-Friendly Wi-Fi and Activity Traces. Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016).
Volp, M., Klüppelholz, S., Castrillon, J., Härtig, H., Asmussen, N., Assmann, U., Baader, F., Baier, C., Fettweis, G., Fröhlich, J., Goens, A., Haas, S., Habich, D., Hasler, M., Huismann, I., Karnagel, T., Karol, S., Lehner, W., Leuschner, L., Lieber, M., Ling, S., Märcker, S., Mey, J., Nagel, W., Nöthen, B., Penaloza, R., Raitza, M., Stiller, J., Ungethüm, A., & Voigt, A. (2016, November 14). The Orchestration Stack: The Impossible Task of Designing Software for Unknown Future Post-CMOS Hardware. Paper presented at 1ST INTERNATIONAL WORKSHOP ON POST-MOORE’S ERA SUPERCOMPUTING (PMES), Salt Lake City, USA.
Ibrahim, A. A. Z. A., Bouvry, P., Kliazovich, D., & OLEKSIAK, A. (2016). Virtual Desktop Infrastructures: architecture, survey and green aspects proof of concept. 7th INTERNATIONAL GREEN and SUSTAINABLE COMPUTING CONFERENCE (1st RE-HPC workshop), Hangzhou, China (November 2016).
Pejo, B., & Tang, Q. (2016, November 03). Game-Theoretic Framework for Integrity Verification in Computation Outsourcing. Poster session presented at Decision and Game Theory for Security (GameSec), New York, United States of America.
Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2016). A Framework to Reason about the Legal Compliance of Security Standards. Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN).
Bartolini, C., Lenzini, G., & Robaldo, L. (2016). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC).
Gharanjik, A., Shankar, B., Soltanalian, M., & Ottersten, B. (2016). Max-min transmit beamforming via iterative regularization. 50th Asilomar Conference on Signals, Systems and Computers, November 2016.
Göknil, A., Kurtev, I., & van den Berg, K. (2016). A Rule-based Approach for Evolution of AADL Models based on Changes in Functional Requirements. The workshop on Sustainable Architecture: Global Collaboration, Requirements, Analysis (SAGRA) at the 10th European Conference on Software Architecture (ECSA).
Hajri, I. (2016). Supporting Change in Product Lines within the Context of Use Case-Driven Development and Testing. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (DS@FSE 2016) (pp. 1082-1084).
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2016). PUMConf: A Tool to Configure Product Specific Use Case and Domain Models in a Product Line. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (pp. 1008-1012).
Hammerschmidt, C., Marchal, S., Pellegrino, G., State, R., & Verwer, S. (2016, November). Efficient Learning of Communication Profiles from IP Flow Records. Poster session presented at The 41st IEEE Conference on Local Computer Networks (LCN).
Khan, N. A., Baig, F., Nawaz, S. J., Rehman, N. U., & Sharma, S. K. (2016, November). Analysis of Power Quality Signals Using An Adaptive Time-Frequency Distribution. Energies.
Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016, November). Transparent Medical Data Systems. Journal of Medical Systems.
Rial, A., Danezis, G., & Kohlweiss, M. (2016, November). Privacy-preserving smart metering revisited. International Journal of Information Security.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2016). From Random Process to Chaotic Behavior in Swarms of UAVs. DIVANet '16 Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications (pp. 9-15). New York, USA: ACM.
Tang, Q., & Wang, J. (2016, November). Privacy-preserving Friendship-based Recommender Systems. IEEE Transactions on Dependable and Secure Computing.
Al Ismaeil, K., Aouada, D., Solignac, T., Mirbach, B., & Ottersten, B. (2016). Real-Time Enhancement of Dynamic Depth Videos with Non-Rigid Deformations. IEEE Transactions on Pattern Analysis & Machine Intelligence, 39(10), 2045-2059.
Fiandrino, C. (2016). Energy-efficient Communications in Cloud, Mobile Cloud and Fog Computing. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Bouvry, P. (Promotor), Kliazovich, D. (Promotor), Zampunieris, D., Seredynski, F., & Giaccone, P.
Popleteev, A., Arshadaghghaleh, H., & Lutkovski, V. (2016). Small-scale positioning using digital compasses. International Congress on Computer Science: Information Systems and Technologies (CSIST-2016). Minsk, Belarus: BSU.
Christopoulos, D., Pennanen, H., Chatzinotas, S., & Ottersten, B. (2016). Multicast multigroup precoding for frame-based multi-gateway satellite communications. Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), 2016 8th. IEEE.
Dou, W. (2016). A Model-Driven Approach to Offline Trace Checking of Temporal Properties. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Bianculli, D. (Promotor), State, R., Sabetzadeh, M., Pautasso, C., & Furia, C. A.
Tabatabaei, M. (2016). GAMES AND STRATEGIES IN ANALYSIS OF SECURITY PROPERTIES. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Jamroga, W. (Promotor), van der Torre, L., Teague, V., & Schneider, S.
Alodeh, M., Spano, D., Chatzinotas, S., & Ottersten, B. (2016). Peak Power Minimization in Symbol-level Precoding for Cognitive MISO Downlink Channels. IEEE Digital Signal Processing Conference.
Arora, C. (2016). AUTOMATED ANALYSIS OF NATURAL-LANGUAGE REQUIREMENTS USING NATURAL LANGUAGE PROCESSING. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Sabetzadeh, M. (Promotor), Le Traon, Y., Gorschek, T., Sawyer, P., & Nejati, S.
Glauner, P., & State, R. (2016, October 09). Load Forecasting with Artificial Intelligence on Big Data. Paper presented at Sixth IEEE Conference on Innovative Smart Grid Technologies, Europe (ISGT Europe 2016), Ljubljana, Slovenia.
Amin, B., Mansoor, B., Junaid Nawaz, S., Sharma, S. K., & Patwary, M. N. (2016, October). Compressed Sensing of Sparse Multipath MIMO Channels with Superimposed Training Sequence. Wireless Personal Communications.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2016). Extracting Domain Models from Natural-Language Requirements: Approach and Industrial Evaluation. 19th International Conference on Model Driven Engineering Languages and Systems, Saint-Malo 2-7 October 2016.
Caldeira Lima, A., Rocha, F., Volp, M., & Verissimo, P. (2016). Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems. Proceedings of the Second ACM Workshop on Cyber-Physical Systems Security and PrivaCy.
Faye, S., & Engel, T. (2016). Understanding User Daily Mobility Using Mobile and Wearable Sensing Systems. Proceedings of the 2016 International Conference on Information and Communications Technology Convergence - ICTC 2016.
Hammerschmidt, C., Loos, B. L., Verwer, S., & State, R. (2016, October). Flexible State-Merging for learning (P)DFAs in Python. Paper presented at The 13th International Conference on Grammatical Inference.
Hammerschmidt, C., Marchal, S., State, R., & Verwer, S. (2016, October). Behavioral Clustering of Non-Stationary IP Flow Record Data. Poster session presented at 12th International Conference on Network and Service Management.
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2016). Co-evolutionary approach based on constraint decomposition. Co-evolutionary approach based on constraint decomposition.
Kubler, S., Robert, J., William, D., Alexandre, V., & Le Traon, Y. (2016). A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications. Expert Systems with Applications, 65, 398--422.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. The 15th International Symposium on Intelligent Data Analysis.
Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
Mengali, A., Kayhan, F., Shankar, B., & Ottersten, B. (2016, October). Exploiting diversity in future generation satellite systems with optical feeder links. Proceedings of the 34TH AIAA INTERNATIONAL COMMUNICATIONS SATELLITE SYSTEMS CONFERENCE.
Mitseva, A., Panchenko, A., Lanze, F., Henze, M., Wehrle, K., & Engel, T. (2016, October). POSTER: Fingerprinting Tor Hidden Services. Poster session presented at 23rd ACM Conference on Computer and Communications Security, Vienna, Austria.
Patwary, M., Sharma, S. K., Chatzinotas, S., Chen, Y., Abdel-Maguid, M., Abd-Alhameed, R., Noras, J., & Ottersten, B. (2016). Universal Intelligent Small Cell for Next Generation Cellular Networks. Digital Communications and Networks, 2(4), 167–174.
Pellegrino, G., Hammerschmidt, C., Lin, Q., & Verwer, S. (2016, October). Learning Deterministic Finite Automata from Infinite Alphabets. Paper presented at The 13th International Conference on Grammatical Inference.
Popleteev, A. (2016). HIPS: Human-based indoor positioning system. Proceedings of the 7th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2016).
Popleteev, A. (2016). Indoor positioning using ambient radio signals: Data acquisition platform for a long-term study. Proceedings of the IEEE 13th Workshop on Positioning, Navigation and Communications (WPNC-2016). IEEE.
Pranjic, V., Mazzali, N., Emiliani, L., & Shankar, B. (2016). Return Link Optimized Resource Allocation for Satellite Communications in the Ku/Ka-Band. Proceedings on the 22nd Ka and Broadband Communications Conference and the 34th AIAA International Communications Satellite Systems Conference (ICSSC).
Sciarrone, A., Fiandrino, C., Bisio, I., Lavagetto, F., Kliazovich, D., & Bouvry, P. (2016). Smart Probabilistic Fingerprinting for Indoor Localization over Fog Computing Platforms. IEEE 5th International Conference on Cloud Networking (CloudNet), Pisa, Italy.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Terminal-side interference mitigation for spectral coexistence of satellite and terrestrial systems in non-exclusive Ka-band. 34th AIAA International Communications Satellite Systems Conference.
Kolbe, N., Zaslavsky, A., Kubler, S., & Robert, J. (2016). Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste. Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste (NEW2AN/ruSMART 2016, LNCS 9870 proceedings). Nungambakkam, India: Springer.
Soua, R., Kalogeiton, E., Manzo, G., Duarte, J. M., Palattella, M. R., Di Maio, A., Braun, T., Engel, T., Villas, L. A., & Rizzo, G. A. (2016). SDN coordination for CCN and FC content dissemination in VANETs. Proceedings of the 8th International Conference on Ad Hoc Networks (ADHOCNETS), Ottawa, ON, Canada (pp. 26-27). Springer.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2016). Centralized Power Control in Cognitive Radio Networks Using Modulation and Coding Classification Feedback. IEEE Transactions on Cognitive Communications and Networking, 2(3).
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). A real-time model predictive position control with collision avoidance for commercial low-cost quadrotors. IEEE Multi-Conference on Systems and Control (MSC 2016), Buenos Aires, Argentina, 2016 (pp. 519-525).
Bouvry, P., Chaumette, S., Danoy, G., Guerrini, G., Jurquet, G., Kuwertz, A., Müller, W., Rosalie, M., & Sander, J. (2016). Using Heterogeneous Multilevel Swarms of UAVs and High-Level Data Fusion to Support Situation Management in Surveillance Scenarios. 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, MFI 2016.
Pourmoghaddaslangroudi, A., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Cognitive Interference Management Techniques for the Spectral Co-existence of GSO and NGSO Satellites. International Conference on Wireless and Satellite Systems (WiSATS, formerly PSATS), Cardiff, UK, Sep 2016.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2016). On the Performance Analysis of Underlay Cognitive Radio Systems: A Deployment Perspective. IEEE Transactions on Cognitive Communications and Networking, 2(3), 273 - 287.
Afzal, H. (2016). FULL 3D RECONSTRUCTION OF DYNAMIC NON-RIGID SCENES: ACQUISITION AND ENHANCEMENT. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Aouada, D. (Promotor), Mirbach, B. (Promotor), van der Torre, L., & Fofi, D.
Manukyan, A., Olivares Mendez, M. A., Bissyande, T. F. D. A., Voos, H., & Le Traon, Y. (2016, September 06). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016.
Chaib Draa, K., Voos, H., Alma, M., & Darouach, M. (2016). Invariant Observer Applied to Anaerobic Digestion Model. IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany, 2016.
Derrmann, T., Frank, R., Faye, S., Castignani, G., & Engel, T. (2016). Towards Privacy-Neutral Travel Time Estimation from Mobile Phone Signalling Data. Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2).
Faye, S., Louveton, N., Gheorghe, G., & Engel, T. (2016). A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 7(3).
Galindo, D., Groszschädl, J., Liu, Z., Vadnala, P. K., & Venkatesh, S. V. (2016). Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, 6(3), 229-238.
Henarejos, P., Pérez Neira, A., Mazzali, N., & Mosquera, C. (2016). Advanced Signal Processing Techniques for Fixed and Mobile Satellite Communications. Proceedings on 8th Advanced Satellite Multimedia Systems Conference and 14th Signal Processing for Space Communications Workshop.
Kalantari, A., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016). Frequency of Arrival-based Interference Localization Using a Single Satellite. 8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2016). Performance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels. 2016 IEEE 84th Vehicular Technology Conference: VTC2016-Fall. IEEE.
Kayhan, F. (2016). QAM to Circular Isomorphic Constellations. 8th Advanced Satellite Multimedia Systems Conference (ASMS/SPSC), Palma de Mallorca, Spain, 2016.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering & Knowledge Engineering, 26(9&10), 1361–1377.
Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). Reflection-Aware Static Analysis of Android Apps. The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6).
Mengali, A., Kayhan, F., Shankar, B., & Ottersten, B. (2016). Low Complexity Transmit Processing for Multibeam Satellite Systems with Non-Linear Channels. Proceedings of ASMS Conference.
Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2016). Metrics for Transparency. Proceedings of DPM 2016 and QASA 2016.
Quintanar Guzman, S., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). Operational Space Control of a Lightweight Robotic Arm Actuated By Shape Memory Alloy (SMA) Wires. ASME 2016 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems, Vermont 28-30 September 2016.
Rodes, L., Kaushik, A., Sharma, S. K., Chatzinotas, S., & Jondral, F. (2016). Square-Law Selector and Square-Law Combiner for Cognitive Radio Systems: An Experimental Study. IEEE 84th Vehicular Technology Conference: VTC2016-Fall.
Schwickart, T. K., Voos, H., Hadji-Minaglou, J.-R., & Darouach, M. (2016). A Fast Model-Predictive Speed Controller for Minimised Charge Consumption of Electric Vehicles. Asian Journal of Control, 18(5).
Sharma, S. K., Bogale, T. E., Chatzinotas, S., Wang, X., & Le, L. B. (2016). Physical Layer Aspects of Wireless IoT. 13th International Symposium on Wireless Communication Systems.
Spano, D., Chatzinotas, S., Krause, J., & Ottersten, B. (2016). Symbol-Level Precoding with Per-antenna Power Constraints for the Multi-beam Satellite Downlink. 8th Advanced Satellite Multimedia Systems Conference (ASMS).
Tessaro Lunardi, W., Amaral, L., Marczak, S., Hessel, F., & Voos, H. (2016). Automated Decision Support IoT Framework. IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany, 2016.
Zhauniarovich, Y., & Gadyatskaya, O. (2016). Small changes, big changes: an updated view on the Android permission system. Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings (pp. 346-367). Springer.
Matinnejad, R. (2016). AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), & Nejati, S.
Nachtigall, N. (2016). Domain Completeness of Model Transformations and Synchronisations. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Hermann, F. (Promotor), König, B. (Promotor), Braatz, B. (Promotor), Sasnauskas, R. (Promotor), & Sorger, U.
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2016). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In J., Altmann, G. C., Silaghi, & O. F., Rana (Eds.), Economics of Grids, Clouds, Systems, and Services (pp. 281-295). Cham, Switzerland: Springer International Publishing.
Camenisch, J., Dubovitskaya, M., & Rial, A. (2016). UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. Advances in Cryptology – CRYPTO 2016 (pp. 208-239). Springer Berlin Heidelberg.
Liu, B., Lucia, L., Nejati, S., Briand, L., & Bruckmann, T. (2016). Simulink Fault Localisation: an Iterative Statistical Debugging Approach. Software Testing, Verification & Reliability, 26(6), 431-459.
Goncalves Almeida Antunes, M., Barreto, J. P., & Nunes, U. (2016, August). Piecewise-Planar Reconstruction using Two Views. Image and Vision Computing.
Jimenez, M., Papadakis, M., Bissyande, T. F. D. A., & Klein, J. (2016). Profiling Android Vulnerabilities. 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society.
Kalantari, A., Soltanalian, M., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016, August). Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security. IEEE Journal of Selected Topics in Signal Processing.
Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016, August). Compressive Sensing Based Energy Detector. European Signal Processing Conference (EUSIPCO).
Sanchez Guinea, A., Nain, G., & Le Traon, Y. (2016). A systematic review on the engineering of software for ubiquitous systems. Journal of Systems and Software, 118, 251-276.
Signorello, S., Palattella, M. R., & Grieco, L. A. (2016). Security Challenges in future NDN-Enabled VANETs. In the Proceedings of the 3rd International Workshop on the Emerging Future Internet and Network Security (EFINS 2016) - IEEE TrustCom-16.
Steffens, C., Yang, Y., & Pesavento, M. (2016). Multidimensional sparse recovery for MIMO channel parameter estimation. Proc. 24th European Signal Processing Conference.
Pan, L. (2016, July 28). Composite Learning: An Efficient Way of Parameter Estimation in Adaptive Control. Paper presented at The 35th Chinese Control Conference, 2016 Chengdu. China, China.
Pan, L., Voos, H., & Darouach, M. (2016). A Generalized Interaction Wake Model with Its Variation for Control in Wind Farms. 35th Chinese Control Conference, Chengdu. China, 2016 (pp. 8759-8764).
Hamadi, S., Blaiech, K., Valtchev, P., Cherkaoui, O., & State, R. (2016). Compiling packet forwarding rules for switch pipelined architecture. IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
Perrin, L. P., Udovenko, A., & Biryukov, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In M., Robshaw & J., Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (pp. 93-122). Berlin, Germany: Springer Berlin Heidelberg.
Jan, S., Nguyen, D. C., & Briand, L. (2016). Automated and Effective Testing of Web Services for XML Injection Attacks. ISSTA'16-The International Symposium on Software Testing and Analysis, Saarbrücken 18-20 July 2016 (pp. 12-23).
Faye, S., & Chaudet, C. (2016). Characterizing the Topology of an Urban Wireless Sensor Network for Road Traffic Management. IEEE Transactions on Vehicular Technology, 65(7), 5720-5725.
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Främling, K. (2016). Lifecycle Management in the Smart City Context: Smart Parking Use-Case. 13th IFIP International Conference on Product Lifecycle Management, Columbia SC 10-13 July 2016 (Springer book Advanced ICT series). Springer.
Gharanjik, A., Shankar, B., Soltanalian, M., & Ottersten, B. (2016). An Iterative Approach to Nonconvex QCQP with Applications in Signal Processing. 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM) (pp. 1-5). IEEE.
Bayar, B., Sajadi Alamdari, S. A., Viti, F., & Voos, H. (2016). An Extended Cooperative Adaptive Cruise Control (CACC) Algorithm for Efficient Energy Consumption & Traffic Density Formulation. Traffic Flow Theory and Characteristics Committee (AHB45) 2016 Summer Meeting, Sydney, Australia, 2016.
Kannan, S., Quintanar Guzman, S., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2016). Control of Aerial Manipulation Vehicle in Operational Space. 8th International Conference on Electronics, Computers and Artificial Intelligence, Ploiesti, Romania, 30 June-02 July 2016.
Quintanar Guzman, S., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). Lightweight robotic arm actuated by Shape Memory Alloy (SMA) Wires. 8th International Conference on Electronics, Computers and Artificial Intelligence, Ploiesti, Romania, 30 June-02 July 2016.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2016). Joint Compression and Feedback of CSI in Correlated multiuser MISO Channels. The 17th IEEE International workshop on Signal Processing advances in Wireless Communications.
Atashpendar, A., Dorronsoro, B., Danoy, G., & Bouvry, P. (2016). A Parallel Cooperative Coevolutionary SMPSO Algorithm for Multi-objective Optimization. IEEE International Conference on High Performance Computing Simulation (HPCS) (pp. 713–720).
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2016). Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks. Eprint/Working paper retrieved from https://arxiv.org/abs/1607.07656.
Gheorghe, G., Louveton, N., Martin, B., Viraize, B., Mougin, L., Faye, S., & Engel, T. (2016). Heat is in the Eye of the Beholder: Towards Better Authenticating on Smartglasses. Proceedings of the 9th International Conference on Human System Interaction (HSI'16).
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2016). Performance analysis of hybrid cognitive radio systems with imperfect channel knowledge. Communications (ICC), 2016 IEEE International Conference on. IEEE.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016).
Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. 12th International Conference on Machine Learning and Data Mining (MLDM 2016).
Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps. The 2016 International Symposium on Software Testing and Analysis.
Papazafeiropoulos, A., Sharma, S. K., Chatzinotas, S., Ratnarajah, T., & Ottersten, B. (2016). Impact of Transceiver Hardware Impairments on the Ergodic Channel Capacity for Rayleigh-Product MIMO Channels. Proceedings of IEEE SPAWC 2016.
Pecci, I., Martin, B., Kacem, I., Maamria, I., Faye, S., Louveton, N., Gheorghe, G., & Engel, T. (2016). Not a Tile Out of Place: Toward Creating Context-Dependent User Interfaces on Smartglasses. Proceedings of the 9th International Conference on Human System Interaction (HSI'16).
Pennanen, H., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2016). Distributed coordinated beamforming for multi-cell multigroup multicast systems. Communications (ICC), 2016 IEEE International Conference on. IEEE.
Derrmann, T., Faye, S., Frank, R., & Engel, T. (2016, June 30). LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity. Paper presented at Mobile Tartu 2016, Tartu, Estonia.
Huynen, J.-L. (2016). Socio-Technical Aspects of Security Analysis. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Lenzini, G. (Promotor), & Koenig, V. (Promotor).
Kubler, S., Buda, A., Robert, J., & Främling, K. (2016). Building Lifecycle Management System for Enhanced Closed Loop Collaboration. 13th IFIP International Conference on Product Lifecycle Management (PLM16) (Springer book Advanced ICT series). Springer.
Decouchant, J., Ben Mokhtar, S., Petit, A., & Quéma, V. (2016, June 28). PAG: Private and Accountable Gossip. Paper presented at IEEE International Conference on Distributed Computing Systems, Nara, Japan.
Madhikermi, M., Kubler, S., Robert, J., Buda, A., & Främling, K. (2016, June 28). Data Quality Assessment of Maintenance Reporting Procedures. Expert Systems with Applications.
Ibrahim, A. A. Z. A., Kliazovich, D., & Bouvry, P. (2016). On Service Level Agreement Assurance in Cloud Computing Data Centers. IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, USA (June 2016) (pp. 921-926).
Pejo, B., Tang, Q., & Wang, H. (2016, June 27). Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. Paper presented at 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, United States of America.
Rosalie, M. (2016). Templates and subtemplates of Rössler attractors from a bifurcation diagram. Journal of Physics A: Mathematical and Theoretical, 49(31), 315101.
Demisse, G., Aouada, D., & Ottersten, B. (2016). Similarity Metric For Curved Shapes In Euclidean Space. IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016.
Appelt, D. (2016). Automated Security Testing of Web-Based Systems Against SQL Injection Attacks. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nguyen, D. C. (Promotor), Klein, J., Pretschner, A., & Vieira, M.
Bayar, B., Sajadi Alamdari, S. A., Viti, F., & Voos, H. (2016). Impact of Different Spacing Policies for Adaptive Cruise Control on Traffic and Energy Consumption of Electric Vehicles. 24th Mediterranean Conference on Control and Automation (MED), Athens, Greece, 2016.
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016). A Modularization Approach for Nonlinear Model Predictive Control of Distributed Fast Systems. 24th Mediterranean Conference on Control and Automation (MED), Athens, Greece, June 21-24, 2016 (pp. 292-297).
Naghsh, M. M., Soltanalian, M., Stoica, P., Masjedi, M., & Ottersten, B. (2016). Efficient sum-rate maximization for medium-scale MIMO AF-relay networks. IEEE Transactions on Wireless Communications, 15(9), 6400 - 6411.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2016). Nonlinear Model Predictive Extended Eco-Cruise Control for Battery Electric Vehicles. 24th Mediterranean Conference on Control and Automation (MED), Athens, Greece, 2016 (pp. 467-472).
Zhang, J., Huang, Y., Wang, J., Ottersten, B., & Yang, L. (2016). Per-antenna constant envelope precoding and antenna subset selection: A geometric approach. IEEE Transactions on Signal Processing, 64(23), 6089 - 6104.
Le, H. T., Nguyen, D. C., & Briand, L. (2016). ReACP: A Semi-Automated Framework for Reverse-engineering and Testing of Access Control Policies of Web Applications (978-2-87971-034-1).
Neshvad, S. (2016). Topology and Parameter Estimation in Power Systems Though Inverter Based Broadband Stimulations. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Sachau, J. (Promotor), Engel, T., Chatzinotas, S., Jostock, M., & Stevens, S.
Kubler, S., Robert, J., Le Traon, Y., Umbrich, J., & Neumaier, S. (2016). Open Data Portal Quality Comparison using AHP. Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 397-407). New York, USA: ACM.
Signorello, S., State, R., François, J., & Festor, O. (2016, June 06). NDN.p4: Programming Information-Centric data-planes. Proceedings of the IEEE International Workshop on Open-Source Software Networking at NetSoft2016.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2016). GemRBAC-DSL: a High-level Specification Language for Role-based Access Control Policies. 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM.
Bezzaoucha, S., Voos, H., & Darouach, M. (2016). On the Unknown Input Functional Observers Design: a Polytopic Takagi-Sugeno Approach. 24th Mediterranean Conference on Control and Automation (MED), Athens, Greece, 2016 (pp. 31-37).
Bezzaoucha, S., Voos, H., & Darouach, M. (2016). A Polytopic Approach for the Nonlinear Unknown Input Functional Observers Design: Application to a Quadrotor Aerial Robots Landing. 2016 European Control Conference (ECC), Aalborg, Denmark (pp. 1146-1152).
Biryukov, A., Dinu, D.-D., & Groszschädl, J. (2016). Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. In M., Manulis, A.-R., Sadeghi, & S., Schneider (Eds.), Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (pp. 537-557). Springer Verlag.
Emeras, J., Varrette, S., & Bouvry, P. (2016). Amazon Elastic Compute Cloud (EC2) vs. in-House HPC Platform: a Cost Analysis. Proc. of the 9th IEEE Intl. Conf. on Cloud Computing (CLOUD 2016). San Francisco, USA: IEEE Computer Society.
Freis, S., Olivares Mendez, M. A., & Viti, F. (2016). Estimating speed profiles from aerial vision - A comparison of regression based sampling techniques. Proceedings of the IEEE 24th Mediterranean Conference on Control and Automation. IEEE.
Kubler, S., Främling, K., & Zaslavsky, A. (2016). IoT Platforms Initiative. In O., Vermesan & P., Friess (Eds.), Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds (River Publishers Series in Communications, pp. 265-292). Gistrup, Denmark: River Publishers.
Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2016). Watch out for This Commit! A Study of Influential Software Changes (TR-SnT-2016-6). SnT.
Marosin, D., Van Zee, M., & Ghanavati, S. (2016, June). Formalizing and Modeling Enterprise Architecture (EA) Principles with Goal-oriented Requirements Language (GRL). Proceedings of the 28th International Conference on Advanced Information System Engineering (CAiSE16).
Schwickart, T. K., Voos, H., Darouach, M., & Bezzaoucha, S. (2016). A Flexible Move Blocking Strategy to Speed up Model-Predictive Control while Retaining a High Tracking Performance. 2016 European Control Conference (ECC), Aalborg, Denmark (pp. 764-769).
Skrobot, M., Lancrenon, J., & Tang, Q. (2016). Two More Efficient Variants of the J-PAKE Protocol. ACNS 2016.
Teubner, D., Wesslein, A.-K., Roenne, P., Veith, M., Frings, C., & Paulus, M. (2016, June). Is a visuo-haptic differentiation of zebra mussel and quagga mussel based on a single external morphometric shell character possible? Aquatic Invasions.
Pan, L. (2016, May 28). Robustness Analysis of Composite Adaptive Robot Control. Paper presented at Control and Decision Conference (CCDC), 2016 28th China.
Pan, L., Voos, H., & Darouach, M. (2016). Generalized Wake Interaction Models and Optimal Control in Wind Farms. 28th Control and Decision Conference (CCDC), China, 2016 (pp. 6020-6025).
Arend, B., & Caire, P. (2016). Humans and Robots in Dialogue?! Paper presented at Humans and Robots in Dialogue?!, Luxembourg, Luxembourg.
Ibrahim, A. A. Z. A., Kliazovich, D., & Bouvry, P. (2016). Service Level Agreemnet Assurance between Cloud Services Providers and CLoud Customers. In E., Butterfield (Ed.), P., Kellenberger (Ed.), & L., Harris (Other coll.), Proceedings of 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing CCGrid 2016 (pp. 588-591). Cartagena, Colombia: IEEE Computer Society.
Di Maio, A., Bevilacqua, V., Marino, F., Dimauro, G., Girardi, F., & Guarini, A. (2016). A novel approach to evaluate blood parameters using computer vision techniques. Medical Measurements and Applications (MeMeA), 2016 IEEE International Symposium on (pp. 1-6). IEEE.
Bessani, A., Neves, N. F., Verissimo, P., Wagner, D., Fonseca, A., Rui, S., Luz, P., & Correia, M. (2016, May 13). JITeR: Just-in-time application-layer routing. Computer Networks, (104), 122-136.
Gharanjik, A. (2016). TRANSMISSION OPTIMIZATION FOR HIGH THROUGHPUT SATELLITE SYSTEMS. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Bengtssson, M. (Promotor), Grotz, J., Ma, W.-K., & Sellathurai, M.
Yang, Y., Marius, P., Mengyi, Z., & Daniel, P. (2016). An online parallel algorithm for recursive estimation of sparse signals. IEEE Transactions on Signal and Information Processing over Networks, 2(3), 290-305.
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA: ACM.
Becker, H., Kaushik, A., Sharma, S. K., Chatzinotas, S., & Jondral, F. (2016). Experimental Study of an Underlay Cognitive Radio System: Model Validation and Demonstration. Proceedings of CROWNCOM 2016.
Bersani, M. M., Bianculli, D., Ghezzi, C., Krstic, S., & San Pietro, P. (2016). Efficient Large-scale Trace Checking Using MapReduce. Proceedings of the 38th International Conference on Software Engineering (ICSE 2016) (pp. 888-898).
Briand, L., Nejati, S., Sabetzadeh, M., & Bianculli, D. (2016). Testing the Untestable: Model Testing of Complex Software-Intensive Systems. Proceedings of the 38th International Conference on Software Engineering (ICSE 2016) Companion (pp. 789-792). ACM.
Dhakal, P., Garello, R., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). On the Error Performance Bound of Ordered Statistics Decoding of Linear Block Codes. Proceedings of International Conference on Communications (ICC). IEEE.
Dhakal, P., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Riviello, D. (2016). Effect of Primary User Traffic on Largest Eigenvalue Based Spectrum Sensing Technique. Proceedings of International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM).
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2016). Network Coding-based Content Distribution in Cellular Access Networks. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2016). Performance Analysis of Hybrid Cognitive Radio Systems with Imperfect Channel Knowledge. Proceedings of International Conference on Communications (ICC).
Li, L. (2016). Boosting Static Analysis of Android Apps through Code Instrumentation. The Doctoral Symposium of 38th International Conference on Software Engineering (ICSE-DS 2016).
Mansoor, B., Nawaz, S. J., Amin, B., Sharma, S. K., & Patwary, M. (2016). Superimposed Training based Estimation of Sparse MIMO Channels for Emerging Wireless Networks. Proceedings of ICT 2016.
Mazzali, N., Kayhan, F., & Shankar, B. (2016). Four-Dimensional Constellations for Dual-Polarized Satellite Communications. Proceedings on IEEE International Conference on Communications.
Mengali, A., Shankar, B., & Ottersten, B. (2016). Joint Predistortion and PAPR Reduction in Multibeam Satellite Systems. Proceedings of IEEE ICC 2016.
Naghsh, M. M., Soltanalian, M., Stoica, P., Masjedi, M., & Ottersten, B. (2016). Rate optimization for massive MIMO relay networks: A minorization-maximization approach. Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on. IEEE.
Papazafeiropoulos, A., Sharma, S. K., & Chatzinotas, S. (2016, May). MMSE Filtering Performance of DH-AF Massive MIMO Relay Systems with Residual Transceiver Impairments. Proceedings of IEEE ICC 2016.
Ruiu, P., Bianco, A., Fiandrino, C., Giaccone, P., & Kliazovich, D. (2016). Power Comparison of Cloud Data Center Architectures. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016.
Shankar, B., Maleki, S., Zheng, G., Awoseyila, A., Evans, B., & Ottersten, B. (2016). GEO Satellite Feeder links and Terrestrial Full-Duplex Small Cells: A case for Coexistence. Proceedings of 83rd IEEE VTC (Spring 2016).
Biryukov, A., Perrin, L. P., & Udovenko, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In C. J.-S., Fischlin, Marc (Ed.), Advances in Cryptology – EUROCRYPT 2016 (pp. 372-402). Springer Berlin Heidelberg.
Brühl, M., Sauer, D. U., & Hadji-Minaglou, J.-R. (2016, April 26). Experimental Lifetime Investigation of Series Connected Li-ion Cells at Different Operation Strategies. Poster session presented at Battery Conference 2016, Münster, Germany.
Di Nardo, D. (2016). Model-Based Test Automation Strategies for Data Processing Systems. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor).
Kalantari, A. (2016). SIGNAL PROCESSING FOR PHYSICAL LAYER SECURITY WITH APPLICATION IN SATELLITE COMMUNICATIONS. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Chatzinotas, S. (Promotor), Viti, F., Vandendorpe, L., & Krause, J.
Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT.
Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT.
Asmussen, N., Volp, M., Nöthen, B., Härtig, H., & Fettweis, G. (2016). M3: A Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores. Architectural Support for Programming Languages and Operating Systems (ASPLOS). Atlanta, GA, USA.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2016). GemRBAC-DSL: a High-level Specification Language for Role-based Access Control Policies (TR-SNT-2016-4). SnT Centre - University of Luxembourg.
Faye, S., Louveton, N., Gheorghe, G., & Engel, T. (2016). Toward a Characterization of Human Activities using Smart Devices: A Micro/Macro Approach. Proceedings of the 7th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World.
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Klein, J., & Le Traon, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126).
Kieffer, E., Danoy, G., & Bouvry, P. (2016, April). On Bi-level approach for Scheduling problems. Paper presented at New Challenges in Scheduling Theory.
Kracheel, M. (2016). Changing Commuter Behaviour through Gamification. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Martin, R. (Promotor), Koenig, V., McCall, R., Walz, S., & Viti, F.
Li, L., Li, D., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016).
Mizera, A., Pang, J., & Yuan, Q. (2016). Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks. Proceedings of the 31st ACM Symposium on Applied Computing. ACM.
Titcheu Chekam, T., Ennan, Z., Zhenhua, L., Yong, C., & Kui, R. (2016). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE International Conference on Computer Communications, San Francisco, CA 10-15 April 2016 (pp. 9). IEEE Xplore®.
Van Zee, M., & Doder, D. (2016). AGM-Style Revision of Beliefs and Intentions from a Database Perspective (Preliminary Version). Proceedings of the 16th International Workshop on Non-Monotonic Reasoning.
Geng, Y., Noh, J., Drevensek-Olenik, I., Rupp, R., Lenzini, G., & Lagerwall, J. (2016). High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication. Scientific Reports, 6(26840), 1-8.
Soltanalian, M., Gharanjik, A., Shankar, B., & Ottersten, B. (2016). Grab-n-Pull: An Optimization Framework for Fairness-Achieving Networks. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2016.
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016, March 16). A class of precomputation-based distance-bounding protocols. Paper presented at Grande Region Security and Reliability Day 2016, Nancy, France.
Verissimo, P., & Decouchant, J. (2016, March 16). The big data deluge in biomedicine: addressing the privacy vs. sharing dilemma. Paper presented at Grande Region Security and Reliability Day, Nancy, France.
Gonzalez-Herrera, I., Bourcier, J., Daubert, E., Rudametkin, W., Barais, O., Fouquet, F., Jézéquel, J.-M., & Baudry, B. (2016, March 15). ScapeGoat: Spotting abnormal resource usage in component-based reconfigurable software systems. Journal of Systems and Software.
Olivares Mendez, M. A., Sanchez-Lopez, J. L., Jimenez, F., Campoy, P., Sajadi Alamdari, S. A., & Voos, H. (2016). Vision-Based Steering Control, Speed Assistance and Localization for Inner-CityVehicles. Sensors, 16(3), 362.
Appelt, D., Nguyen, D. C., & Briand, L. (2016). Automated Testing of Web Application Firewalls (TR-SnT-2016-1).
Ben Fadhel, A., Bianculli, D., Briand, L., & Hourte, B. (2016). A model-driven approach to representing and checking RBAC contextual policies. Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016) (pp. 243-253).
Biryukov, A., Leurent, G., & Perrin, L. P. (2016). Cryptanalysis of Feistel Networks with Secret Round Functions. In O., Dunkelman & L., Keliher (Eds.), Selected Areas in Cryptography -- SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (pp. 102-121). Springer International Publishing.
Gao, N., Darouach, M., Voos, H., & Alma, M. (2016). New unified H-infinity dynamic observer design for linear systems with unknown inputs. Automatica, 65, 43-52.
Kalantari, A., Soltanalian, M., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016). Secure M-PSK Communication via Directional Modulation. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Kim, S.* , & Kim, D.* . (2016). Automatic Identifier Inconsistency Detection Using Code Dictionary. Empirical Software Engineering, 21(2), 565-604.
* These authors have contributed equally to this work.
Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Compressive Sensing based Target Counting and Localization Exploiting Joint Sparsity. Proc. IEEE ICASSP 2016.
Lancrenon, J. (2016). On Password-Authenticated Key Exchange Security Modeling. In F., Stajano, S., Mjolsnes, G., Jenkinson, & P., Thorsheim (Eds.), Technology and practice of passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings. Springer.
Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. The 2016 IEEE International Conference on Industrial Technology (ICIT 2016).
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12).
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5).
Perez Urquidi, J. M., Lancrenon, J., Khader, D., & Chen, L. (2016). Attribute-Based Signatures with Controllable Linkability. In M., Yung, J., Zhang, & Z., Yang (Eds.), Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (pp. 114-129). Springer.
Pérez-Neira, A. I., Veciana, J. M., Vazquez, M. A., & Lagunas, E. (2016, March). Distributed Power Control with Received Power Constraints for Time-Area-Spectrum Licenses. Signal Processing.
Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016, March). Patient-Centred Transparency Requirements for Medical Data Sharing Systems. Proceedings of the 4th World Conference on Information Systems and Technologies.
Rizzo, G., Palattella, M. R., Braun, T., & Engel, T. (2016). Content and Context Aware Strategies for QoS Support in VANETs. Proc. of Int. Conf. on Advanced Information Networking and Applications (AINA-2016).
Rogstad, E., & Briand, L. (2016). Clustering Deviations for Black Box Regression Testing of Database Applications. IEEE Transactions on Reliability, 65(1), 4-18.
Sannier, N., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2016). Automated Classification of Legal Cross References Based on Semantic Intent. 22nd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'16).
Tricoire, M., Barais, O., Leduc, M., Bourcier, J., Fouquet, F., Nain, G., Mouline, L., Sunyé, G., & Morin, B. (2016). KevoreeJS: Enabling dynamic software reconfigurations in the Browser. WICSA/CompArch 2016 Proceedings.
Vu, T. X., Nguyen, T. V., & Quek, T. Q. S. (2016). Power Optimization With BLER Constraint for Wireless Fronthauls in C-RAN. IEEE Communications Letters, 20(3), 602 - 605.
Bartolini, C. (2016, February 19). Mutating OWLs: semantic mutation testing for ontologies. Paper presented at International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn (AMARETTO), in conjunction with the 4th International Conference on Model-Driven Engineering and Software Development (MODELSWARD), Rome, Italy.
Yang, Y., Scutari, G., Palomar, D., & Pesavento, M. (2016). A parallel decomposition method for nonconvex stochastic multi-agent optimization problems. IEEE Transactions on Signal Processing, 64(11), 2949-2964.
Bartolini, C. (2016, February 03). Ontology mutation testing. Paper presented at ILIAS seminar, Luxembourg, Luxembourg.
Bartolini, C., & Siry, L. (2016). The right to be forgotten in the light of the consent of the data subject. Computer Law & Security Report, 32(2).
Biryukov, A., & Khovratovich, D. (2016). Equihash: asymmetric proof-of-work based on the Generalized Birthday problem. Proceedings of NDSS 2016 (pp. 13).
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2016, February). Sensing-Throughput Tradeoff for Interweave Cognitive Radio System: A Deployment-Centric Viewpoint. IEEE Transactions on Wireless Communications.
Panchenko, A., Lanze, F., Zinnen, A., Henze, M., Pennekamp, J., Wehrle, K., & Engel, T. (2016). Website Fingerprinting at Internet Scale. Proceedings of the 23rd Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS 2016).
Glauner, P., & State, R. (2016, January 19). Deep Learning Concepts from Theory to Practice. Paper presented at FinTech R&D Innovation Conference, Luxembourg, Luxembourg.
Neshvad, S., Margossian, H., & Sachau, J. (2016, January 13). Topology and Parameter Estimation in Power Systems through Inverter Based Broadband Stimulations. IET Generation, Transmission & Distribution.
Moawad, A. (2016). Towards Ambient Intelligent Applications Using Models@run.time And Machine Learning For Context-Awareness. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Navet, N., Fouquet, F., Rouvoy, R., & Sahraoui, H.
Dave, B., Kubler, S., Främling, K., & Koskela, L. (2016). Opportunities for enhanced lean construction management using Internet of Things standards. Automation in Construction, 61, 86-97.
Octeau, D., Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., & Le Traon, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. The 43rd Symposium on Principles of Programming Languages (POPL 2016).
Sharma, S. K., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2016, January). Application of Compressive Sensing in Cognitive Radio Communications: A Survey. IEEE COMMUNICATION SURVEYS & TUTORIALS.
Sharma, S. K., Patwary, M., & Chatzinotas, S. (2016). Multiple Access Techniques for Next Generation Wireless: Recent Advances and Future Perspectives. EAI Endorsed Transactions on Wireless Spectrum, 2(7).
Adamsky, F. (2016). Analysis of Bandwidth Attacks in a Bittorrent Swarm. Unpublished doctoral thesis, City University London, ​London, ​​Great Britain.
Adebayo, K., Di Caro, L., Robaldo, L., & Boella, G. (2016). Textual Inference with Deep Learning Technique. Proc. of the 28th Annual Benelux Conference on Artificial Intelligence (BNAIC2016).
Al Ismaeil, K., Aouada, D., Mirbach, B., & Ottersten, B. (2016). Enhancement of Dynamic Depth Scenes by Upsampling for Precise Super-Resolution (UP-SR). Computer Vision and Image Understanding.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2016). Energy-Efficient Symbol-Level Precoding in Multiuser MISO Based on Relaxed Detection Region. IEEE Transactions on Wireless Communications.
Ambrossio, D. A., Parent, X., & van der Torre, L. (2016). Cumulative Aggregation. Deontic Logic and Normative Systems.
Ambrossio, D. A., Parent, X., & van der Torre, L. (2016). A Representation Theorem for Abstract Cumulative Aggregation. 978-2-87971-152-2/TR-SNT-2016-5.
Andrenacci, S., Chatzinotas, S., Vanelli-Coralli, A., Cioni, S., Ginesi, A., & Ottersten, B. (2016). Exploiting orthogonality in DVB-S2X through time pre-compensation. Proceedings of 2016 8th Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop.
Andrenacci, S., Spano, D., Christopoulos, D., Chatzinotas, S., Krause, J., & Ottersten, B. (2016). Optimized Link Adaptation for DVB-S2X Precoded Waveforms based on SNIR Estimation. Asilomar Conference on Signals, Systems, and Computers 2016.
Arcuri, A., & Fraser, G. (2016). Java Enterprise Edition Support in Search-Based JUnit Test Generation. Java Enterprise Edition Support in Search-Based JUnit Test Generation.
Arcuri, A., Jose, C., & Gordon, F. (2016). Unit Test Generation During Software Development: EvoSuite Plugins for Maven, IntelliJ and Jenkins. IEEE International Conference on Software Testing, Verification and Validation (ICST).
Bana, G. (2016). On the Formal Consistency of the Principal Principle. Philosophy of Science.
Bana, G., & Okada, M. (2016). Semantics for “Enough-Certainty" and Fitting’s Embedding of Classical Logic in S4. Proceedings of the 25th EACSL Annual Conference on Computer Science Logic (pp. 34:1–34:18).
Ben Abdessalem (helali), R., Nejati, S., Briand, L., & Stifter, T. (2016). Testing Advanced Driver Assistance Systems using Multi-objective Search and Neural Networks. International Conference on Automated Software Engineering (ASE 2016) (pp. 63-74). ACM.
bikakis, A., Caire, P., clark, K., Cornelius, G. P., ma, J., miller, R., russo, A., & Voos, H. (2016). Collaborative Explanation and Response in Assisted Living Environments Enhanced with Humanoid Robots. 8th International Conference on Agents and Artificial Intelligence, ICAART, Rome, Italy, 2016.
Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2016). Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. IEEE European Symposium on Security and Privacy (pp. 292-302).
Biryukov, A., Khovratovich, D., & Perrin, L. P. (2016). Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Transactions on Symmetric Cryptology, 2016(2), 226-247.
Biryukov, A., Velichkov, V., & Le Corre, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. Fast Software Encryption - FSE 2016.
Boella, G., Di Caro, L., Humphreys, L., Robaldo, L., Rossi, P., & van der Torre, L. (2016). Eunomos, a legal document and knowledge management system for the Web to provide relevant, reliable and up-to-date information on the Law. Artificial Intelligence & Law.
Caire, P., Moawad, A., Efthymiou, V., bikakis, A., & Le Traon, Y. (2016). Privacy Challenges in Ambient Intelligence Systems. Journal of Ambient Intelligence and Smart Environments.
Ceccato, M., Nguyen, D. C., Appelt, D., & Briand, L. (2016). SOFIA: An Automated Security Oracle for Black-Box Testing of SQL-Injection Vulnerabilities. Proceedings of the 31th IEEE/ACM International Conference on Automated Software Engineering.
Chatzinotas, S., Evans, B., Guidotti, A., Icolari, V., Lagunas, E., Maleki, S., Sharma, S. K., Tarchi, D., Thompson, P., & Vanelli-Coralli, A. (2016). Cognitive approaches to enhance spectrum availability for satellite systems. International Journal of Satellite Communications and Networking.
Christopoulos, D., Andrenacci, S., Spano, D., Chatzinotas, S., Krause, J., & Ottersten, B. (2016). Multibeam joint processing satellites: cooperative relays, high above. Advanced Relay Technologies in Next Generation Wireless Communication, Telecommunications. Institution of Engineering and Technology.
Codeca, L., Frank, R., Faye, S., & Engel, T. (2016). Luxembourg SUMO Traffic (LuST) Scenario: Traffic Demand Evaluation. IEEE Intelligent Transportation Systems Magazine.
Correa Bahnsen, A., Aouada, D., Stojanovic, A., & Ottersten, B. (2016). Feature Engineering Strategies for Credit Card Fraud Detection. Expert Systems with Applications, 51, 134–142.
Creutzig, T., Hikida, Y., & Roenne, P. (2016). Correspondences between WZNW models and CFTs with W-algebra symmetry. JHEP, 02, 048.
De Caro, A.* , & Iovino, V.* . (2016). On the Power of Rewinding Simulators in Functional Encryption. Designs, Codes and Cryptography.
* These authors have contributed equally to this work.
De caro, A., Iovino, V., & O'Neill, A. (2016). Deniable Functional Encryption. Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (1, pp. 27). Springer.
Delerue Arriaga, A., Barbosa, M., & Farshim, P. (2016). Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. In O., Dunkelman & S. K., Sanadhya (Eds.), Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Springer.
Delerue Arriaga, A., Iovino, V., & Tang, Q. (2016). Updatable Functional Encryption. Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers. Springer.
Di Maio, A., & Bevilacqua, V. (2016). A computer vision and control algorithm to follow a human target in a generic environment using a drone. Lecture Notes in Computer Science, Intelligent Computing Theories and Application (pp. 192-202). Springer.
Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H., Cheon & T., Takagi (Eds.), Advances in Cryptology - ASIACRYPT 2016 (pp. 484-513). Springer Berlin Heidelberg.
Dolberg, L., François, J., Chowdhury, S. R., Ahmed, R., Boutaba, R., & Engel, T. (2016). A Generic Framework to Support Application-Level Flow Management in Software-Defined Networks. Conference on Network Softwarization (Netsoft).
Domin, K., Symeonidis, I., & Marin, E. (2016). Security Analysis of the Drone Communication Protocol: Fuzzing the MAVLink protocol. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/37613.
Emara, K. A. A. E.-S. (2016). Poster: PREXT: Privacy Extension for Veins VANET Simulator. Poster session presented at IEEE Vehicular Networking Conference (VNC), Columbus, Ohio, Ohio, USA.
Emeras, J., Besseron, X., Varrette, S., Bouvry, P., & Peters, B. (2016). HPC or the Cloud: a cost study over an XDEM Simulation. Proc. of the 7th International Supercomputing Conference in Mexico (ISUM 2016). Puebla, México.
Fan, Y., Nowaczyk, S. L., Rögnvaldsson, T., & Antonelo, E. A. (2016). Predicting Air Compressor Failures with Echo State Networks. Third European Conference of the Prognostics and Health Management Society 2016, Bilbao, Spain, 5-8 July, 2016.
Ferreira, A., & Lenzini, G. (2016). Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP). Springer.
Ferreira Torres, C., & Trujillo Rasua, R. (2016). The Fréchet/Manhattan distance and the trajectory anonymisation problem. Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science). Springer.
Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M., & Trujillo Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. IFIP Working Conference on The Practice of Enterprise Modeling (pp. 326-334).
Gadyatskaya, O. (2016). How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. Proc. of GraMSec 2015. Springer.
Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., & Poulsen, D. B. (2016). Modelling Attack-defense Trees Using Timed Automata. Proc. of FORMATS. Springer.
Gadyatskaya, O., Harpes, C., Mauw, S., Muller, C., & Muller, S. (2016). Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. Proc. of GraMSec. Springer.
Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., & Trujillo Rasua, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer.
Gadyatskaya, O., Labunets, K., & Paci, F. (2016). Towards Empirical Evaluation of Automated Risk Assessment Methods. Risks and Security of Internet and Systems. Springer.
Gadyatskaya, O., Lezza, A.-L., & Zhauniarovich, Y. (2016). Evaluation of Resource-based App Repackaging Detection in Android. Proc. of NordSec. Springer.
Gallegos-Garcia, G., Iovino, V., Roenne, P., & Ryan, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. Eprint/Working paper retrieved from http://eprint.iacr.org/2016/975.
Giorgione, G., Viti, F., & Seredynski, M. (2016). Robust control strategy for minimising energy consumption of electric buses using cooperative ITS technology. Paper presented at 28th European Conference on Operational Research, Poznan.
Giurgiu, A., & Larsen, T. (2016). Roles and Powers of National Data Protection Authorities Moving from Directive 95/46/EC to the GDPR: Stronger and More ‘European’ DPAs as Guardians of Consistency? European Data Protection Law Review, 2(3), 342 - 352.
Giustolisi, R., Iovino, V., & Rønne, P. (2016). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. Financial Cryptography and Data Security, FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Springer.
Glauner, P. (2016). Deep Learning For Smile Recognition. Proceedings of the 12th International FLINS Conference (FLINS 2016).
Glauner, P. (2016). Detecting Electricity Theft. Poster session presented at Machine Learning Summer School, Cadiz, Spain.
Glauner, P., Boechat, A., Dolberg, L., State, R., Bettinger, F., Rangoni, Y., & Duarte, D. (2016). Large-Scale Detection of Non-Technical Losses in Imbalanced Data Sets. Proceedings of the Seventh IEEE Conference on Innovative Smart Grid Technologies (ISGT 2016).
Glauner, P., Meira, J. A., Dolberg, L., State, R., Bettinger, F., Rangoni, Y., & Duarte, D. (2016). Neighborhood Features Help Detecting Non-Technical Losses in Big Data Sets. Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing Applications and Technologies (BDCAT 2016).
Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2016). A Revisit to Human Action Recognition from Depth Sequences: Guided SVM-Sampling for Joint Selection. IEEE Winter Conference on Applications of Computer Vision (WACV), 2016.
Goncalves Almeida Antunes, M., Baptista, R., Demisse, G., Aouada, D., & Ottersten, B. (2016). Visual and human-interpretable feedback for assisting physical activity. European Conference on Computer Vision (ECCV) Workshop on Assistive Computer Vision and Robotics Amsterdam.
Gonzalez-Herrera, I., Bourcier, J., Rudametkin, W., Barais, O., & Fouquet, F. (2016). Squirrel: Architecture Driven Resource Management. 31st Annual ACM Symposium on Applied Computing (SAC'16).
Gordon, F., & Arcuri, A. (2016). EvoSuite at the SBST 2016 Tool Competition. The 9th International Workshop on SEARCH-BASED SOFTWARE TESTING (SBST).
Gottmann, S., Nachtigall, N., Ermel, C., Hermann, F., & Engel, T. (2016). Towards the Propagation of Model Updates along different Views in Multi-View Models. Proceedings of the 5th International Workshop on Bidirectional Transformations, 1571, 45-60.
Haus, M., Emara, K. A. A. E.-S., & Ott, J. (2016). Privacy-Preserving Proximity Services. Munich, Germany: Technische Universität München.
Hedge, G., Yang, Y., Steffens, C., & Pesavento, M. (2016). Parallel low-complexity $M$-PSK Detector for large-scale MIMO systems. Proc. 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop.
Henard, C., Papadakis, M., Harman, M., Jia, Y., & Le Traon, Y. (2016). Comparing White-box and Black-box Test Prioritization. 38th International Conference on Software Engineering (ICSE'16).
Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer.
Iovino, V., Tang, Q., & Zebrowski, K. (2016). On the power of Public-key Function-Private Functional Encryption. 15th International Conference on Cryptology and Network Security. Springer Seciurity and Cryptology.
Jamroga, W., & Tabatabaei, M. (2016). Information Security as Strategic (In)effectivity. 12th International Workshop on Security and Trust Management (STM), 2016.
Jamroga, W., & Tabatabaei, M. (2016). Preventing Coercion in E-Voting: Be Open and Commit. Proceedings of the 12th International Joint Conference on Electronic Voting (E-Vote-ID).
Jhawar, R., Lounis, K., & Mauw, S. (2016). A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management.
Jhawar, R., Mauw, S., & Zakiuddin, I. (2016). Automating Cyber Defense Response Using Attack-Defence Trees and Game Theory. The 15th European Conference on Cyber Warfare and Security (pp. 163-172).
Kannan, S., Bezzaoucha, S., Quintanar Guzman, S., Olivares Mendez, M. A., & Voos, H. (2016). Adaptive Control of Robotic arm with Hysteretic Joint. 4th International Conference on Control, Mechatronics and Automation (ICCMA'16), Barcelona, Spain 2016 (pp. 46-50). ACM.
Kannan, S., Sajadi Alamdari, S. A., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2016). Model Predictive Control for Spacecraft Rendezvous. 4th International Conference on Control, Mechatronics and Automation ICCMA '16, Barcelona, Spain, 2016 (pp. 121-125). Barcelona, Spain: ACM.
Kayhan, F. (2016). High Order APSK Constellation Design for Next Generation Satellite Communication. Paper presented at 34th AIAA International Communications Satellite Systems Conferences (ICSSC).
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2016). Hybrid mobility model with pheromones for UAV detection task. Hybrid mobility model with pheromones for UAV detection task.
Kieffer, E., Guzek, M., Danoy, G., Bouvry, P., & Nagih, A. (2016). A Novel Co-evolutionary Approach for Constrained Genetic Algorithms. Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion (pp. 47--48). New York, NY, USA: ACM.
Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., & Malevris, N. (2016). Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study. International Working Conference on Source Code Analysis and Manipulation (SCAM'16).
Kliazovich, D., Pecero, J. E., Tchernykh, A., Bouvry, P., khan, S. U., & Zomaya, A. Y. (2016). CA-DAG: Modeling Communication-Aware Applications for Scheduling in Cloud Computing. Journal of Grid Computing, 14(1), 23-39.
Lagunas, E., Maleki, S., Chatzinotas, S., Soltanalian, M., Perez-Neira, A. I., & Ottersten, B. (2016). Power and Rate Allocation in Cognitive Satellite Uplink Networks. IEEE International Conference on Communications, ICC 2016.
Lenzini, G., Mauw, S., & Ouchani, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G., Barthe & E., Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag.
Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. The 20th International Systems and Software Product Line Conference (SPLC 2016).
Li, Y., Duan, K., Lv, L., Pang, J., & Cai, S. (2016). A novel approach to parameterized verification of cache coherence protocols. Proceedings of the 34th IEEE International Conference on Computer Design (pp. 560-567). IEEE Computer Society.
Lin, Q., Hammerschmidt, C., Pellegrino, G., & Verwer, S. (2016). Short-term Time Series Forecasting with Regression Automata. Poster session presented at ACM SIGKDD 2016 Workshop on Mining and Learning from Time Series (MiLeTS).
Liu, B., Lucia, L., Nejati, S., Briand, L., & Bruckmann, T. (2016). Localizing Multiple Faults in Simulink Models. 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016).
Louveton, N., Mccall, R., Koenig, V., Avanesov, T., & Engel, T. (2016). Driving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction. Applied Ergonomics, 54, 196-204.
Machalek, A., & Dunlop, D. (2016). Collaboration Web - Social Computing Technology for Emergency Data Interoperability. Paper presented at ACCSE2016, The First International Conference on Advances in Computation, Communications and Services, Valencia, Spain.
Machalek, A., Dunlop, D., Balogh, Z., Gatial, E., & Hluchy, L. (2016). REDIRNET – Emergency Responder Data Interoperability Network. Paper presented at IEEE-INDIN 2016 - 14th International Conference on Industrial Informatics, Poitiers, France.
Machalek, A., Dunlop, D., Simon, C., & Hoben, R. (2016). Visual Public Protection Disaster Relief and Critical Infrastructure. Paper presented at VISUAL 2016 - The First International Conference on Applications and Systems of Visual Paradigms, Barcelona, Spain.
Maleki, S., Ciblat, P., Chatzinotas, S., Shankar, B., & Ottersten, B. (2016). Cooperative Estimation of Power and Direction of Transmission for a Directive Source. IEEE Transactions on Cognitive Communications and Networking.
Maleki, S., Ciblat, P., Shankar, B., Chatzinotas, S., & Ottersten, B. (2016). Power and Direction of Transmission Estimation for a Directive Source: Identifiability Analysis and Estimation Algorithm. 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM).
Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings.
Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings.
Matinnejad, R., Nejati, S., Briand, L., & Bruckamnn, T. (2016). SimCoTest: A Test Suite Generation Tool for Simulink/Stateflow Controllers. Proceedings of the 38th International Conference on Software Engineering, 585--588.
Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2016). Automated Test Suite Generation for Time-Continuous Simulink Models. Proceedings of the 38th International Conference on Software Engineering, 595-606.
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). A Class of Precomputation-based Distance-bounding Protocols. Proceedings of the 1st IEEE European Symposium on Security and Privacy.
Mauw, S., Trujillo Rasua, R., & Xuan, B. (2016). Counteracting active attacks in social network graphs. Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science, pp. 233--248). Springer.
Max, C. (2016). Elementary science and education within the Luxembourg educational system. In M. J., De Vries, S., Fletcher, S., Kruse, P., Labudde, M., Lang, I., Mammes, C., Max, D., Münk, B., Nicholl, J., Strobel, & M., Winterbottom (Eds.), Technology Education Today – International Perspectives (pp. 75-106). Münster, Germany: Waxmann.
Meira, J. A., Almeira, E. C. D., Kim, D., Filho, E. R. L., & Le Traon, Y. (2016). “Overloaded!” — A Model-based Approach to Database Stress Testing. International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016.
Merz, S., Pang, J., & Dong, J. S. (2016). Editorial (ICFEM 14 special issue, part I). Formal Aspects of Computing, 28(3), 343-344.
Mizera, A., Pang, J., & Yuan, Q. (2016). ASSA-PBN 2.0: A software tool for probabilistic Boolean networks. Proceedings of 14th International Conference on Computational Methods in Systems Biology (pp. 309-315). Berlin, Germany: Springer.
Mizera, A., Pang, J., & Yuan, Q. (2016). Fast simulation of probabilistic Boolean networks. Proceedings of 14th International Conference on Computational Methods in Systems Biology (pp. 216-231). Berlin, Germany: Springer.
Mizera, A., Pang, J., & Yuan, Q. (2016). GPU-accelerated steady-state analysis of probabilistic Boolean networks. Poster session presented at 14th International Conference on Computational Methods in Systems Biology.
Muthuri, R., Boella, G., Hulstijn, J., & Humphreys, L. (2016). Argumentation-Based Legal Requirements Engineering: The Role of Legal Interpretation in Requirements Acquisition. Requirements Engineering Conference Workshops (REW), IEEE International.
Nejati, S., Sabetzadeh, M., Arora, C., Briand, L., & Mandoux, F. (2016). Automated Change Impact Analysis between SysML Models of Requirements and Design. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Seattle 13-18 November 2016 (pp. 242--253). ACM.
Ni, M., Zhang, Y., Han, W., & Pang, J. (2016). An Empirical Study on User Access Control in Online Social Networks. Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16) (pp. 13-23). ACM.
Palattella, M. R., Dohler, M., Grieco, L. A., Rizzo, G., Torsen, J., Engel, T., & Ladid, L. (2016). Internet of Things in the 5G Era: Enablers, Architecture and Business Models. IEEE Journal on Selected Areas In Communications.
Pang, J., & Stoelinga, M. (2016). Selected and extended papers from ACM SVT 2014. Science of Computer Programming.
Pang, J., Zablotskaia, P., & Zhang, Y. (2016). On impact of weather on human mobility in cities. Proceedings of the 17th International Conference on Web Information System Engineering (pp. 247-256). Springer Science & Business Media B.V.
Perrin, L. P., & Udovenko, A. (2016). Algebraic Insights into the Secret Feistel Network. In T., Peyrin (Ed.), Fast Software Encryption - 23rd International Workshop, FSE 2016, Bochum, March 20-23, 2016 (pp. 378-398). Springer-Verlag Berlin Heidelberg.
Piro, G., Signorello, S., Palattella, M. R., Grieco, L. A., Boggia, G., & Engel, T. (2016). Understanding the Social impact of ICN: between myth and reality. Springer AI & Society: Journal of Knowledge, Culture and Communication.
Politis, C., Maleki, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2016). Harmful Interference Threshold and Energy Detector for On-Board Interference Detection. 22nd Ka and Broadband Communications Conference 2016.
Politis, C., Maleki, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2016). On-board the Satellite Interference Detection with Imperfect Signal Cancellation. 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Pourmoghaddaslangroudi, A., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). On the apectral coexistence of GSO and NGSO FSS systems: power control mechanisms and a methodology for inter-site distance determination. International Journal of Satellite Communications and Networking.
Rahli, V. (2016). Exercising Nuprl's Open-Endedness. The 5th International Congress on Mathematical Software.
Rahli, V., & Bickford, M. (2016). A Nominal Exploration of Intuitionism. The 5th ACM SIGPLAN Conference on Certified Programs and Proofs (CPP 2016).
Rahli, V., Wells, J., Pirie, J., & Kamareddine, F. (2016). Skalpel: A Constraint-Based Type Error Slicer for Standard ML. Journal of Symbolic Computation.
Ralha, R., Falcão, G., Amaro, J., Mota, V., Goncalves Almeida Antunes, M., Barreto, J. P., & Nunes, U. (2016). Parallel refinement of slanted 3D reconstruction using dense stereo induced from symmetry. Journal of Real-Time Image Processing.
Robaldo, L., & Sun, X. (2016). Reified Input/Output logic - a position paper. proceedings of Workshop on Artificial Intelligence for Justice (AI4J), collocated at the 22nd European Conference on Artificial Intelligence (ECAI 2016).
Robert, J., Kubler, S., & Le Traon, Y. (2016). Micro-billing framework for IoT: Research & Technological foundations. International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria.
Robert, J., Kubler, S., Le Traon, Y., & Främling, K. (2016). O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis.
Rocchetto, M., & Tippenhauer, N. (2016). CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
Rocchetto, M., & Tippenhauer, N. (2016). On Attacker Models and Profiles for Cyber-Physical Systems. On Attacker Models and Profiles for Cyber-Physical Systems.
Rocco, I., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2016). RGB-D and Thermal Sensor Fusion. 11th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP).
Roenne, P. (2016). JCJ with Improved Verifiability Guarantees. Paper presented at E-Vote-ID.
Rogstad, E., & Briand, L. (2016). Cost-effective Strategies for the Regression Testing of Database Applications: Case study and Lessons Learned. Journal of Systems and Software, 113, 257–274.
Rojas, J. M., Fraser, G., & Arcuri, A. (2016). Seeding Strategies in Search-Based Unit Test Generation. SOFTWARE TESTING, VERIFICATION AND RELIABILITY (STVR).
Rojas, J. M., Vivanti, M., Arcuri, A., & Fraser, G. (2016). A Detailed Investigation of the Effectiveness of Whole Test Suite Generation. Empirical Software Engineering.
Rosalie, M., Danoy, G., Bouvry, P., & Chaumette, S. (2016). UAV Multilevel Swarms for Situation Management. Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use (pp. 49--52). New York, NY, USA: ACM.
Santaca, K., Cristani, M., Rocchetto, M., & Viganò, L. (2016). A Topological Categorization of Agents for the Definition of Attack States in Multi-Agent Systems. A Topological Categorization of Agents for the Definition of Attack States in Multi-Agent Systems.
Schiffner, S., Serna, J., Ikonomou, D., & Rannenberg, K. (Eds.). (2016). Privacy Technologies and Policy: 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings. Springer.
Sharma, S. K., Bogale, T. E., Le, L. B., Chatzinotas, S., Wang, X., & Ottersten, B. (2016). Two-phase concurrent sensing and transmission scheme for full duplex cognitive radio. IEEE 84th Vehicular Technology Conference. IEEE.
Soltana, G., Sabetzadeh, M., & Briand, L. (2016). Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simulation. 24th IEEE International Conference on Requirements Engineering (RE'16) (pp. 303-312). IEEE.
Soussi, M. E., Vu, T. X., Nguyen, H. N., Duhamel, P., Alberge, F., & Vandendorpe, L. (2016). Semi-orthogonal MARC with half duplex relaying: A backward compatible cooperative network with interference channels. 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
sun, X., & Robaldo, L. (2016). Ali Baba and Thief, Norm Emergence in Games. Paper presented at International Conference on Principles and Practice of Multi-Agent Systems (PRIMA 2016).
Sun, X., & Robaldo, L. (2016). Norm Creation in Proposition Control Games. Proceedings of the 1st Chinese Conference on Logic and Argumentation (CLAR 2016), Hangzhou, China, April 2-3, 2016.
Symeonidis, I., Mustafa, M. A., & Preneel, B. (2016). Keyless car sharing system: A security and privacy analysis. In I., Symeonidis, IEEE International Smart Cities Conference, ISC2 2016, Trento Italy, September 12-15, 2016.
Symeonidis, I., Shirazi, F., Biczók, G., Pérez-Solà, C., & Preneel, B. (2016). Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence. In I., Symeonidis, ICT Systems Security and Privacy Protection. Cham: Springer International Publishing.
Symeonidis, I., Tsormpatzoudi, P., & Preneel, B. (2016). Collateral Damage of Online Social Network Applications. In I., Symeonidis, Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21 2016.
Tabatabaei, M., Jamroga, W., & Ryan, P. (2016). Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. The International Workshop on AI for Privacy and Security (PrAISe), 2016.
Trujillo Rasua, R., & Yero, I. G. (2016). Characterizing 1-metric antidimensional trees and unicyclic graphs. Computer Journal, 59(8), 1264--1273.
Trujillo Rasua, R., & Yero, I. G. (2016). k-Metric antidimension: A privacy measure for social graphs. Information Sciences, 328, 403--417.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2016). Active Interference Constraint Learning with Uncertain Feedback for Cognitive Radio Networks. Proceedings of IEEE International Conference on Communications (ICC) 2016.
Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016). Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems. Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems.
Van Zee, M., Bex, F., & Ghanavati, S. (2016). RationalGRL: A Framework for Rationalizing Goal Models Using Argument Diagrams. 35th International Conference on Conceptual Modeling (ER'2016).
Van Zee, M., & Doder, D. (2016). AGM-Style Revision of Beliefs and Intentions. Proceedings of the 22nd European Conference on Artificial Intelligence (ECAI'16).
Van Zee, M., Marosin, D., Bex, F., & Ghanavati, S. (2016). The RationalGRL toolset for Goal Models and Argument Diagrams. Proceedings of the 6th International Conference on Computational Models of Argument (COMMA'16).
Vazquez, M., Perez-Neira, A., Christopoulos, D., Chatzinotas, S., Ottersten, B., Arapoglou, P., Ginesi, A., & Taricco, G. (2016). Precoding in Multibeam Satellite Communications: Present and Future Challenges. IEEE Wireless Communications Letters, 23(6), 88-95.
Vu, T. X., Nguyen, H. D., Quek, T. Q. S., & Sun, S. (2016). Fronthaul compression and optimization for cloud radio access networks. 2016 IEEE International Conference on Communications (ICC).
Wagle, S. S., Guzek, M., Bouvry, P., & Bisdorff, R. (2016). Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers. In IEEE, 2016 IEEE 9th International Conference on Cloud Computing (pp. 529-536). US: IEEE.
Yu, J., Cheval, V., & Ryan, M. (2016). DTKI: A New Formalized PKI with Verifiable Trusted Parties. The Computer Journal, 59(11), 1695--1713.
Yuan, Q., Qu, H., Pang, J., & Mizera, A. (2016). Improving BDD-based attractor detection for synchronous Boolean networks. SCIENCE CHINA Information Sciences, 59(8), 080101:1-080101:16.
Zhou, L., Zhang, Y., Pang, J., & Li, C.-T. (2016). Modeling city locations as complex networks: An initial study. Proceedings of the 5th International Workshop on Complex Networks and their Applications (pp. 735-747). Springer Science & Business Media B.V.
Zotkiewicz, M., Guzek, M., Kliazovich, D., & Bouvry, P. (2016). Minimum Dependencies Energy-Efficient Scheduling in Data Centers. IEEE Transactions on Parallel & Distributed Systems.

2015

Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318.
Schwickart, T. K. (2015). Energy-Efficient Driver Assistance System for Electric Vehicles Using Model-Predictive Control. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Hadji-Minaglou, J.-R., Darouach, M., Engel, T., & Boutat, D.
Olivares Mendez, M. A., Fu, C., Ludivig, P., Bissyande, T. F. D. A., Kannan, S., Zurad, M., Annaiyan, A., Voos, H., & Campoy, P. (2015). Towards an Autonomous Vision-Based Unmanned Aerial System against Wildlife Poachers. Sensors, 15(12), 29861.
Margossian, H. (2015). Distribution Network Line Protection in the Presence of Distributed Generation. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Sachau, J. (Promotor), Deconinck, G. (Promotor), Engel, T., Cappelle, J., Stevens, S., & Jostock, M.
Masouros, C., & Zheng, G. (2015). IEEE Global Telecommunications Conference. Power Efficient Downlink Beamforming Optimization by Exploiting Interference.
Pan, L. (2015). Composite Learning Control With Application to Inverted Pendulums. In IEEE Conference Publications (Ed.), IEEE International Conference - Chinese Automation Congress (CAC), 2015 (IEEE Conference Publications, pp. 232-236).
Pan, L., Voos, H., & Darouach, M. (2015). A Class of Improved Wake Interaction Model for the Coordinated Control of Wind Farms. In IEEE Conference Publications (Ed.), IEEE International Chinese Automation Congress (CAC), 2015 (IEEE Conference Publications, pp. 1322-1327). IEEE Conference Publications.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Constructive Interference through Symbol Level Precoding for Multi-level Modulation. IEEE Global communications conference.
Biryukov, A., & Khovratovich, D. (2015). Tradeoff Cryptanalysis of Memory-Hard Functions. 21st International Conference on the Theory and Application of Cryptology and Information Security. Springer.
Bissyande, T. F. D. A., Ouoba, J., Ahmat, D., Ouédraogo, F., Béré, C., Bikienga, M., Sere, A., Dandjinou, M., & Sié, O. (2015). Vulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso. 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries.
Codeca, L., Frank, R., & Engel, T. (2015). Luxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research. Proceedings of the 7th IEEE Vehicular Networking Conference (pp. 1-8).
Correa Bahnsen, A., Aouada, D., Stojanovic, A., & Ottersten, B. (2015). Detecting Credit Card Fraud using Periodic Features. IEEE International Conference on Machine Learning and Applications.
DI ALESIO, S., Briand, L., Nejati, S., & GOTLIEB, A. (2015). Combining Genetic Algorithms and Constraint Programming to Support Stress Testing of Task Deadlines. ACM Transactions on Software Engineering & Methodology, 25(1).
Jafarnejad, S., Codeca, L., Bronzi, W., Frank, R., & Engel, T. (2015). A Car Hacking Experiment: When Connectivity meets Vulnerability. Globecom Workshops (GC Wkshps), 2015 IEEE. IEEE.
Papazafeiropoulos, A., Sharma, S. K., & Chatzinotas, S. (2015). Impact of Transceiver Impairments on the Capacity of Dual-Hop Relay Massive MIMO Systems. Proceedings of IEEE Globecom 2015.
Ragona, C., Fiandrino, C., Kliazovich, D., Granelli, F., & Bouvry, P. (2015). Energy-Efficient Computation Offloading for Wearable Devices and Smartphones in Mobile Cloud Computing. IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 2015.
Viti, F., & Cantelmo, G. (2015, December). A Markov chain dynamic model for trip generation and distribution based on CDR. Periodica Polytechnica.
Wagle, S. S., Guzek, M., Bouvry, P., & Bisdorff, R. (2015). An Evaluation Model for Selecting Cloud Services from Commercially Available Cloud Providers. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 1-8).
Atashpendar, A., Roscoe, B., & Ryan, P. (2015). Information Leakage due to Revealing Randomly Selected Bits. Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (pp. 325-341). Springer.
Castignani, G., Derrmann, T., Frank, R., & Engel, T. (2015, November 24). Validation study of risky event classification using driving pattern factors. Paper presented at Communications and Vehicular Technology in the Benelux (SCVT), 2015 IEEE Symposium on, Luxembourg, Luxembourg.
Faye, S., & Chaudet, C. (2015). Connectivity Analysis of Wireless Sensor Networks Deployments in Smart Cities. Proceedings of the 22nd IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT 2015).
Bartolini, C. (2015, November 12). Data Protection. Paper presented at ITxLaw project closing event, Turin, Italy.
Decouchant, J. (2015). Collusions and Privacy in Rational-Resilient Gossip. Unpublished doctoral thesis, Grenoble University, ​Grenoble, ​​France.
Jury: Quéma, V. (Promotor), Ben Mokhtar, S. (Promotor), de Palma, N., Réveillère, L., Tixeuil, S., & Rivière, É.
Kubler, S., Holmström, J., Främling, K., & Turkama, P. (2015). Technological Theory of Cloud Manufacturing. In T., Borangiu (Ed.), Service Orientation in Holonic and Multi Agent Manufacturing and Robotics (Studies in Computational Intelligence). Springer.
Biryukov, A., Khovratovich, D., Dinu, D.-D., & Josefsson, S. (2015). The memory-hard Argon2 password hash function (Network Working Group / Internet-Draft). IETF.
Alodeh, M. (2015). Interference in Multiple-antenna Communications: From Channel Estimation to Exploitation. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Verissimo, P., Chatzinotas, S., Jorswieck, E., & Bolcskei, H.
Correa Bahnsen, A., Aouada, D., & Ottersten, B. (2015). Example-Dependent Cost-Sensitive Decision Trees. Expert Systems with Applications, 42(19), 6609-6619.
Bartolini, C., Muthuri, R., & Cristiana, S. (2015, November). Using Ontologies to Model Data Protection Requirements in Workflows. Paper presented at Ninth International Workshop on Juris-informatics (JURISIN 2015).
Di Nardo, D., Pastore, F., Arcuri, A., & Briand, L. (2015). Evolutionary Robustness Testing of Data Processing Systems using Models and Data Mutation. Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (pp. 126-137).
Faye, S., Frank, R., & Engel, T. (2015, November). Adaptive Activity and Context Recognition using Multimodal Sensors in Smart Devices. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Mobile Computing, Applications, and Services.
Faye, S., Frank, R., & Engel, T. (2015). SWIPE: Monitoring Human Dynamics using Smart Devices. Proceedings of the 7th International Conference on Mobile Computing, Applications and Services (MobiCASE '15).
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Mouelhi, T., Klein, J., & Le Traon, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Panchenko, A. (2015). On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds. Proceedings of the 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet 2015). ACM.
Cogo, V. V., Bessani, A., Couto, F. M., & Verissimo, P. (2015, October 12). A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data. Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 101-110.
Allix, K. (2015). Challenges and Outlook in Machine Learning-based Malware Detection for Android. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J., Bissyande, T. F. D. A., Cavallaro, L., & Rossow, C.
Gniewek, A. (2015). LEGAL CHALLENGES FACING CLOUD COMPUTING – A STUDY OF RELEVANT CONCEPTS IN CURRENT AND FUTURE EU DATA PROTECTION LAW. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Cole, M. (Promotor), Poillot, E., Walden, I., Schiltz, J.-L., & Zeno-Zencovich, V.
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2015). Applying Product Line Use Case Modeling in an Industrial Automotive Embedded System: Lessons Learned and a Refined Approach. 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS), September 30 - October 2, 2015, Ottawa, ON, Canada (pp. 338-347).
Giurgiu, A., Boulet, G., & De Hert, P. (2015, October). EU’s One-Stop-Shop Mechanism: Thinking Transnational. Privacy Laws & Business. International Report, 16-18.
Grzybek, A., Danoy, G., Bouvry, P., & Seredynski, M. (2015). Mitigating flash crowd effect using connected vehicle technology. Vehicular Communications, 2(4).
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015). Impact of Terrain Aware Interference Modeling on the Throughput of Cognitive Ka-Band Satellite Systems. Ka and Broadband Communications Conference (KaConf), Bologna, Italy, Oct 2015.
Laurent, T., Ventresque, A., Papadakis, M., Henard, C., & Le Traon, Y. (2015). Assessing and Improving the Mutation Testing Practice of PIT. Eprint/Working paper retrieved from https://hal.archives-ouvertes.fr/hal-01252099v2.
Nesmachnow, S., Dorronsoro, B., Talbi, E.-G., & Bouvry, P. (2015). Metaheuristics for the Virtual Machine Mapping Problem in Clouds. Informatica, Lith. Acad. Sci, 26(1), 111-134.
Nguyen, P., Yskout, K., Heyman, T., Klein, J., Scandariato, R., & Le Traon, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems.
Piazza, R., Shankar, B., & Ottersten, B. (2015). Multi-gateway Data Predistortion for Non-linear Satellite Channels. IEEE Transactions on Communications, 63(10), 3789 - 3802.
Spano, D., Christopoulos, D., Andrenacci, S., Chatzinotas, S., Ottersten, B., & Krause, J. (2015). Total degradation analysis of precoded signals onto non-linear satellite channels. 21st Ka Conference.
Wagle, S. S., Guzek, M., & Bouvry, P. (2015). Cloud Service Providers Ranking Based on Service Delivery and Consumer Experience. 2015 IEEE 4th International Conference on Cloud Networking (CloudNet) (pp. 209-212).
Wang, J., & Tang, Q. (2015, October). Recommender Systems and their Security Concerns. Paper presented at iacr.
Ziafati, P., dastani, M., meyer, J.-J., van der Torre, L., & Voos, H. (2015). Retalis Language for Information Engineering in Autonomous Robot Software. IfCoLog Journal of Logics and their Applications, 2(2), 85.
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2015). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Economics of Grids, Clouds, Systems, and Services. Springer.
Iovino, V., & Żebrowski, K. (2015, September 11). Mergeable Functional Encryption. Paper presented at 16th Italian Conference on Theoretical Computer Science (ICTCS), Firenze, Italy.
Bartolini, C., & Muthuri, R. (2015, September 10). Reconciling Data Protection Rights and Obligations: An Ontology of the Forthcoming EU Regulation. Paper presented at Workshop on Language and Semantic Technology for Legal Domain (LST4LD), Hissar, Bulgaria.
Jasim, I., Plapper, P., & Voos, H. (2015). Gaussian Filtering for Enhanced Impedance Parameters Identification in Robotic Assembly Processes. 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015), Luxembourg 8-11 September 2015.
Jasim, I., Plapper, P., & Voos, H. (2015). Model-Free Robust Adaptive Control for Flexible Rubber Objects Manipulation. 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015), Luxembourg 8-11 September 2015. IEEE.
Pan, L., Voos, H., Li, Y., & Darouach, M. (2015). A Wake Interaction Model for the Coordinated Control of Wind Farms. Emerging Technologies & Factory Automation (ETFA), 2015 IEEE 20th Conference on (pp. 1-7). IEEE.
Al Ismaeil, K. (2015). Super-Resolution Approaches for Depth Video Enhancement. Unpublished doctoral thesis, University of Luxembourg, ​Bertrange, ​​Luxembourg.
Jury: Ottersten, B. (Promotor).
Arora, C., Sabetzadeh, M., Göknil, A., Briand, L., & Zimmer, F. (2015). NARCIA: An Automated Tool for Change Impact Analysis in Natural Language Requirements. 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Bergamo 30 August - 4 September 2015 (pp. 962-965).
Ben Nasr, S., Becan, G., Acher, M., Ferreira Filho, J. B., Baudry, B., Sannier, N., & Davril, J.-M. (2015). MatrixMiner: A Red Pill to Architect Informal Product Descriptions in the Matrix. 10th Joint Meeting on Foundations of Software Engineering (ESEC/FSE 2015), Bergamo, Italy, August 30 - September 4, 2015 (pp. 982-985).
Chaib Draa, K., Voos, H., Alma, M., & Darouach, M. (2015). Linearizing Control of Biogas Flow Rate and Quality. 20th IEEE Int. Conference on Emerging Tecnologies and Factory Automation ETFA 2015, Luxembourg, 8-11 Sept. 2015.
Chenal, M., & Tang, Q. (2015). Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. Information Security - 18th International Conference, ISC 2015.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). Multicast Multigroup Precoding and User Scheduling for Frame-Based Satellite Communications. IEEE Transactions on Wireless Communications, 14(9), 4695 - 4707.
Cortés-Mendoza, J. M., Tchernykh, A., Drozdov, A., Bouvry, P., Simionovici, A.-M., Kliazovich, D., & Avetisyan, A. (2015, September). Distributed Adaptive VoIP Load Balancing in Hybrid Clouds. Paper presented at Russian Supercomputing Days 2015, Moscow, Russia.
Garcia Becerro, F., Aouada, D., Mirbach, B., Solignac, T., & Ottersten, B. (2015). Unified Multi-Lateral Filter for Real-Time Depth Map Enhancement. Image & Vision Computing, 41, 26-42.
Hartmann, T., Moawad, A., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T., Lethbridge, J., Cabot, & A., Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting.
Hochgeschwender, N., Olivares Mendez, M. A., Voos, H., & Kraetzschmar, G. K. (2015). Context-based Selection and Execution of Robot Perception Graphs. 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'15).
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015). Power Control for Satellite Uplink and Terrestrial Fixed-Service Co-existence in Ka-band. IEEE Vehicular Technology Conference, Boston 6-9 Sept 2015.
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015, September). Resource Allocation for Cognitive Satellite Communications with Incumbent Terrestrial Networks. IEEE Transactions on Cognitive Communications and Networking.
Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T., Lethbridge, J., Cabot, & A., Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting.
Nguyen, P., Kramer, M., Klein, J., & Le Traon, Y. (2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information & Software Technology, 68(December 2015), 62-81.
Östlund, S., Panchenko, A., & Engel, T. (2015). A study on ethical aspects and legal issues in e-learning. Proceedings of the 8th International Conference on E-Learning (e-Learning'15) (pp. 286-292).
Popleteev, A. (2015, September). Activity tracking and indoor positioning with a wearable magnet. Poster session presented at 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015).
Sharma, S. K., Bogale, T. E., Chatzinotas, S., Le, L. B., Wang, X., & Ottersten, B. (2015). Improving Robustness of Cyclostationary Detectors to Cyclic Frequency Mismatch Using Slepian Basis. Proceedings of IEEE PIMRC 2015.
Sharma, S. K., Chatzinotas, S., Grotz, J., & Ottersten, B. (2015). 3D Beamforming for Spectral Coexistence of Satellite and Terrestrial Networks. IEEE Vehicular Technology Conference 2015.
Skrobot, M., & Lancrenon, J. (2015). On the Provable Security of the Dragonfly Protocol. In J., Lopez & C. J., Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (pp. 244--261). Springer.
Tang, Q., & Wang, J. (2015). Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security.
Wang, C., Pastore, F., Göknil, A., Briand, L., & Iqbal, Z. (2015). UMTG: A Toolset to Automatically Generate System Test Cases from Use Case Specifications. 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Bergamo 30 August - 4 September 2015 (pp. 942-945).
Ghatpande, S., & Gheorghe, G. (2015). Towards more secure and usable cloud storage for E-Health. Luxembourg, Luxembourg: University of Luxembourg.
Kubler, S., Yoo, M.-J., Cassagnes, C., Främling, K., Kiritsis, D., & Skilton, M. (2015). Opportunity to Leverage Information-as-an-Asset in the IoT -- The road ahead. 3rd International Conference on Future Internet of Things and Cloud (pp. 64-71). IEEE Computer Society.
Bronzi, W., Frank, R., Castignani, G., & Engel, T. (2015, August 20). Bluetooth Low Energy performance and robustness analysis for Inter-Vehicular Communications. Elsevier - Ad Hoc Networks.
Norta, D. P. B., Winkler, C., Allelein, H.-J., & Sachau, J. (2015). 11,8-100% Rural Renewable Energy and Power Supply and its Influence on the Luxembourgish Power System. Energy Procedia, 73, 163-172.
Jan, S., Nguyen, D. C., & Briand, L. (2015). Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. The 2015 IEEE International Conference on Software Quality, Reliability & Security, Vancouver 3-5 August 2015.
Arora, C., Sabetzadeh, M., Göknil, A., Briand, L., & Zimmer, F. (2015). Change Impact Analysis for Natural Language Requirements: An NLP Approach. 23rd IEEE International Requirements Engineering Conference, Ottawa 24-28 August 2015.
Biryukov, A., & Perrin, L. P. (2015). On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. In R., Gennaro & M., Robshaw (Eds.), Advances in Cryptology -- CRYPTO 2015 (pp. 116-140). Berlin, Germany: Springer-Verlag.
Lanze, F., Panchenko, A., & Engel, T. (2015). A Formalization of Fingerprinting Techniques. Proceedings of the IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015 (pp. 818-825).
Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015).
N'Doye, I., Voos, H., Darouach, M., & Schneider, J. (2015). Static Output Feedback H-infinity Control for a Fractional-Order Glucose-Insulin System. International Journal of Control, Automation, and Systems, 13(4), 798-807.
Yang, Y., & Pesavento, M. (2015). A novel iterative convex approximation method. Proc. IEEE 6th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing.
Yang, Y., & Pesavento, M. (2015). A novel line search method for nonsmooth optimization problems. Proc. 23rd European Signal Processing Conference.
Zhauniarovich, Y., Philippov, A., Gadyatskaya, O., Crispo, B., & Massacci, F. (2015). Towards Black Box Testing of Android Apps. Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES). IEEE.
Bartolini, C. (2015, July 29). Liability of Intermediary Service Providers. Paper presented at LAST-JD seminar, Luxembourg, Luxembourg.
Bissyande, T. F. D. A. (2015). Harvesting Fix Hints in the History of Bugs (TR-SNT-2015-6). SnT, University of Luxembourg.
Li, Y., Voos, H., Darouach, M., & Hua, C. (2015). An algebraic detection approach for control systems under multiple stochastic cyber-attacks. IEEE/CAA Journal of Automatica Sinica, 2(3), 258-266.
Bella, G., & Lenzini, G. (2015, July 13). 2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015. Paper presented at Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy.
Dinu, D.-D., Biryukov, A., Groszschädl, J., Khovratovich, D., Le Corre, Y., & Perrin, L. P. (2015, July). FELICS - Fair Evaluation of Lightweight Cryptographic Systems. Paper presented at NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, MD.
Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (2015, July). Triathlon of Lightweight Block Ciphers for the Internet of Things. Paper presented at NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, MD.
Kracheel, M., Mccall, R., & Koenig, V. (2015). Playing with Traffic: An Emerging Methodology for Developing Gamified Mobility Applications. In J., Lumsden (Ed.), Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices (pp. 105-122). Hershey, Pennsylvania: IGI.
Liang, K., Zhao, L., Yang, K., Zheng, G., & Ding, W. (2015). A Fair Power Splitting Algorithm for Simultaneous Wireless Information and Energy Transfer in CoMP Downlink Transmission. Wireless Personal Communications, 85(4), 2687-2710.
Madhikermi, M., Kubler, S., Buda, A., & Främling, K. (2015). Data Quality Assessment of Company's Maintenance Reporting: A Case Study. Proceedings of 4th International Conference on Data Management Technologies and Applications (pp. 162-172). Colmar, France: SciTePress.
Olivares Mendez, M. A., & Campoy, P. (2015). Vision Based Fuzzy Control Approaches for Unmanned Aerial Vehicles. 16th World Congress of the International Fuzzy Systems Association (IFSA) 9th Conference of the European Society for Fuzzy Logic and Technology (EUSFLAT).
Sharma, S. K., Bogale, T. E., Chatzinotas, S., Ottersten, B., Le, L. B., & Wang, X. (2015, July). Cognitive Radio Techniques under Practical Imperfections: A Survey. IEEE Communications Surveys and Tutorials.
Wang, C., Pastore, F., Göknil, A., Briand, L., & Iqbal, Z. (2015). Automatic Generation of System Test Cases from Use Case Specifications. Proceedings of the International Symposium on Software Testing and Analysis (ISSTA' 15), July 2015, USA.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Energy Efficient Symbol-Level Precoding in Multiuser MISO Channels. 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications.
Gharanjik, A., Shankar, B., Arapoglou, P.-D., Bengtsson, M., & Ottersten, B. (2015). Precoding Design and User Selection for Multibeam Satellite Channels. 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2015.
Kalantari, A., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015). Secrecy Energy Efficiency Optimization for MISO and SISO Communication Networks. The 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Marchal, S. (2015). DNS and Semantic Analysis for Phishing Detection. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Festor, O. (Promotor), Sorger, U., Godart, C., Filiol, E., Totel, E., Gurbani, V., & State, R.
Gerard, B., Voos, H., Li, Y., & Darouach, M. (2015). Effects of Permanent Bounded Cyber-Attacks on Networked Control Systems. 23rd Mediterranean Conference on Control and Automation (MED) (pp. 917-922).
Mouelhi, T., El Kateb, D., & Le Traon, Y. (2015). Inroads in Testing Access Control. Advances in Computers. ELSEVIER.
Montavont, N., Blanc, A., Navas, R., & Castignani, G. (2015). Handover triggering in IEEE 802.11 Networks. 16th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (pp. 9).
Correa Bahnsen, A., Aouada, D., & Ottersten, B. (2015). A novel cost-sensitive framework for customer churn predictive modeling. Decision Analytics, 2(5).
Al Ismaeil, K., Aouada, D., Solignac, T., Mirbach, B., & Ottersten, B. (2015). Real-Time Non-Rigid Multi-Frame Depth Video Super-Resolution. IEEE Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'15), (Best paper award).
Li, Y., Voos, H., Darouach, M., & Hua, C. (2015, June 10). An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach. IMA Journal of Mathematical Control and Information, 1-22.
Bartolini, C. (2015, June 03). An overview of the limitations to the dissemination of data. Paper presented at 4th International Conference on Models and Technologies for Intelligent Transportation Systems, Budapest, Hungary.
Di Donna, S. A., Cantelmo, G., & Viti, F. (2015). A Markov Chain dynamic model for trip generation and distribution based on CDR. Proceedings of the MT-ITS Conference.
Di Nardo, D., Alshahwan, N., Briand, L., & Labiche, Y. (2015). Coverage-based regression test case selection, minimization and prioritization: a case study on an industrial system. Software Testing, Verification & Reliability, 25(4), 371-396.
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2015). Performance Metrics for Data Center Communication Systems. 8th IEEE International Conference on Cloud Computing, New York, USA, 2015.
Gharanjik, A., & Shankar, B. (2015). Robust Precoding for Multibeam Satellite Channels with Phase Uncertainty. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/21264.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2015). Estimation-Throughput Tradeoff for Underlay Cognitive Radio Systems. Proceedings of International Conference on Communications (ICC).
Lagunas, E., Amin, M., & Ahmad, F. (2015). Through-the-Wall Radar Imaging for Heterogeneous Walls using Compressive Sensing. International Workshop on Compressed Sensing Theory and its Applications to Radar, Sonar and Remote Sensing (CoSeRa), Pisa, Italy, 16-19 June 2015.
LE, H.-T., Nguyen, D. C., Briand, L., & Hourte, B. (2015). Automated Inference of Access Control Policies for Web Applications. 20th ACM Symposium on Access Control Models and Technologies (SACMAT), 1-3 June 2015.
Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg.
Mazzali, N., Shankar, B., & Ottersten, B. (2015). On-board Signal Predistortion for Digital Transparent Satellites. Proceedings on IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Mccall, R., Popleteev, A., Martin, B., Louveton, N., & Engel, T. (2015). Text entry on smart glasses A comparison of two input techniques. 8th International Conference on Human System Interaction (HSI'2015).
Olivares Mendez, M. A., Kannan, S., & Voos, H. (2015). Vision Based Fuzzy Control Autonomous Landing with UAVs: From V-REP to Real Experiments. 23nd IEEE Mediterranean Conference of Control and Automation (MED), 2015, Torremolinos 2015, Spain.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2015). Cognitive Beamforming for Spectral Coexistence of Hybrid Satellite Systems. Cooperative and Cognitive Satellite Systems. Elsevier.
Sharma, S. K., Lagunas, E., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., & Ottersten, B. (2015). Resource Allocation for Cognitive Satellite Communications in Ka-band (17.7-19.7 GHz). Proceedings of International Conference on Communications (ICC).
Sharma, S. K., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., & Ottersten, B. (2015). Joint Carrier Allocation and Beamforming for Cognitive SatComs in Ka-band (17.3-18.1 GHz). Proceedings of International Conference on Communications.
Sharma, S. K., Patwary, M., Chatzinotas, S., Ottersten, B., & Abdel-Maguid, M. (2015). Repeater for 5G Wireless: A Complementary Contender for Spectrum Sensing Intelligence. Proceedings of International Conference on Communications 2015.
Signorello, S., State, R., & Festor, O. (2015). Exploring IoT Protocols Through the Information-Centric Networking's Lens. Intelligent Mechanisms for Network Configuration and Security (Lecture Notes in Computer Science). Springer.
Tang, Q., Ma, H., & Chen, X. (2015). Extend the Concept of Public Key Encryption with Delegated Search. Computer Journal, 58(4), 11.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2015). A Comprehensive Modeling Framework for Role-based Access Control Policies. Journal of Systems and Software, 107(September,2015), 110-126.
Ziafati, P. (2015). Information Engineering in Autonomous Robot Software. Luxembourg, Luxembourg: University of Luxembourg.
Pan, L., Voos, H., Li, Y., & Darouach, M. (2015). Uncertainty Quantification of Exponential Synchronization for a Novel Class of Complex Dynamical Networks with Hybrid TVD Using PIPC. Control and Decision Conference (CCDC), 2015 27th Chinese (pp. 125-130). USA: IEEE.
Yumei, L., Voos, H., Pan, L., & Darouach, M. (2015). Stochastic cyber-attacks estimation for nonlinear control systems based on robust H∞ filtering technique. Control and Decision Conference (CCDC), 2015 27th Chinese (pp. 5590-5595). USA: IEEE.
Melakessou, F. (2015, May 22). Analysis of Call Detail Records Based on Scilab. Paper presented at SCILABTEC2015, 7th International Scilab Users Conference, Paris, France.
Pan, L. (2015, May 14). Adaptive synchronization of stochastic time-varying delay dynamical networks with complex-variable systems. Nonlinear Dyn.
Yue, T., Briand, L., & Labiche, Y. (2015). aToucan: An Automated Framework to Derive UML Analysis Models from Use Case Models. ACM Transactions on Software Engineering & Methodology, 24(3).
Forster, M. (2015). An Event-Driven Cooperative Advanced Driver Assistance System to Mitigate Vehicular Traffic Shock Waves in Temporarily High Traffic Demand. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Sorger, U., Casetti, C., Gerla, M., & Frank, R.
Nguyen, P. H. (2015). Model-Driven Security based on A Unified System of Security Design Patterns. Luxembourg, Luxembourg: University of Luxembourg.
Codeca, L., Frank, R., & Engel, T. (2015, May 07). LuST: a 24-hour Scenario of Luxembourg City for SUMO Traffic simulations. Paper presented at SUMO User Conference 2015 - Intermodal Simulation for Intermodal Transport, Berlin, Germany.
Dolberg, L. (2015, May 04). Network Management with Data Analytics. Paper presented at Network Management with Data Analytics.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2015). Automated Checking of Conformance to Requirements Templates using Natural Language Processing. IEEE Transactions on Software Engineering, 41(10), 944 - 968.
Avanesov, T., Gheorghe, G., Palattella, M. R., Kantor, M., Popoviciu, C., & Engel, T. (2015). Network troubleshooting with SDN-RADAR (demo paper). Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM).
Bianculli, D., Filieri, A., Ghezzi, C., Mandrioli, D., & Rizzi, A. M. (2015). Syntax-driven program verification of matching logic properties. Proceedings of the 3rd FME Workshop on Formal Methods in Software Engineering (FormaliSE 2015). IEEE.
Buda, A., Kubler, S., Främling, K., Borgman, J., Madhikermi, M., & Mirzaeifar, S. (2015). Data supply chain in Industrial Internet. 11th IEEE World Conference on Factory Communication Systems (pp. 1--7). Palma de Mallorca, Spain: IEEE.
Chaib Draa, K., Voos, H., Alma, M., & Darouach, M. (2015). Adaptive Control for the Methane Flow rate in Biogas Plants. 3rd IEEE Int. Conference on Control, Engineering and Information Technology, Tlemcen, Algeria, 2015.
DING, S., TAN, H. B. K., & Shar, L. K. (2015, May). Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths. Automation of Software Test (AST 2015).
Emeras, J., Varrette, S., Guzek, M., & Bouvry, P. (2015). Evalix: Classification and Prediction of Job Resource Consumption on HPC Platforms. Proc. of the 19th Intl. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP'15), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015). IEEE Computer Society.
Faye, S., & Frank, R. (2015). Demo: Using Wearables to Learn from Human Dynamics. Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '15).
Guzek, M., Bouvry, P., & Talbi, E.-G. (2015). A Survey of Evolutionary Computation for Resource Management of Processing in Cloud Computing. IEEE Computational Intelligence Magazine, 10(2), 53-67.
Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. International Conference on ICT Systems Security and Privacy Protection (SEC 2015).
N'Doye, I., Darouach, M., Voos, H., & Zasadzinski, M. (2015, May). On the robustness of linear and non-linear fractional-order systems with non-linear uncertain parameters. IMA Journal of Mathematical Control and Information.
Pastore, F., & Mariani, L. (2015). ZoomIn: Discovering Failures by Detecting Wrong Assertions. Proceedings of the 37th International Conference on Software Engineering (ICSE).
Popleteev, A., Louveton, N., & Mccall, R. (2015). Colorizer: Smart Glasses Aid for the Colorblind. WearSys'15. ACM.
Gharanjik, A., Shankar, B., Arapoglou, P.-D., & Bengtsson, M. (2015). Robust Precoding Design for Multibeam Downlink Satellite Channel with Phase Uncertainty. 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2015.
Nguyen, P. H. (2015). An Extensive Systematic Review on Model-Driven Development of Secure Systems. Luxembourg, Luxembourg: University of Luxembourg.
Norta, D. P. B., Ramanathan, S., Sachau, J., & Allelein, H.-J. (2015, April 13). Hydrokinetic Micro-Power Generation in Small Rivers - a New Approach. Renewable Energy and Power Quality Journal.
Norta, D. P. B., Winkler, C., Ingenieure ohne Grenzen, D., & Engineers Without Borders, L. (2015). A Concept to Increase the Bulk Warm Water Production of Ordinary Direct and Indirect Solar-Thermal Systems in Rural India. Renewable Energy and Power Quality Journal, 13.
Margossian, H., Deconinck, G., & Sachau, J. (2015). Distribution Network Protection Considering Grid Code Requirements for Distributed Generation. IET Generation, Transmission & Distribution, 9(12), 1377 - 1381.
Derrmann, T., Frank, R., Melakessou, F., Castignani, G., & Engel, T. (2015, April 08). A Cell Dwell Time Model for Synthetic Population Generation from Call Detail Records. Paper presented at Netmob'15, the main conference on the scientific analysis of mobile phone datasets, Boston, USA.
Melakessou, F., Derrmann, T., Frank, R., Castignani, G., & Engel, T. (2015, April 08). Detection of Population Mobility Anomalies in Senegal from Base Station Profiles. Paper presented at Netmob'15, the main conference on the scientific analysis of mobile phone datasets, Boston, USA.
Lenzini, G., Mauw, S., & Ouchani, S. (2015, April 06). Security analysis of socio-technical physical systems. Computers electrical engineering.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Symbol Based Precoding in the Downlink of Cognitive MISO Channel. Proceedings of CROWNCOM 2015.
Di Nardo, D., Pastore, F., & Briand, L. (2015). Generating Complex and Faulty Test Data Through Model-Based Mutation Analysis. Software Testing, Verification and Validation (ICST), 2015 IEEE Eighth International Conference on.
Gheorghe, G., Avanesov, T., Palattella, M. R., Engel, T., & Popoviciu, C. (2015). SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities. Proc. of IEEE Conf. on Network Softwarization (NetSoft).
Henard, C., Papadakis, M., & Le Traon, Y. (2015). Flattening or not of the combinatorial interaction testing models. Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2015). Sensing-Throughput Tradeoff for Cognitive Radio Systems with Unknown Received Power. Proceedings of CROWNCOM 2015.
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., Grotz, J., Jens, K., & Ottersten, B. (2015). Resource Allocation for Cognitive Satellite Uplink and Fixed-Service Terrestrial Coexistence in Ka-band. Proceedings of CROWNCOM 2015.
Moawad, A., Hartmann, T., Fouquet, F., Klein, J., & Le Traon, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM.
Mouton, M., Castignani, G., Frank, R., & Engel, T. (2015). Enabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers. Vehicular Communications, 2(2), 59-69.
Nair, S., de la Vara, J. L., Sabetzadeh, M., & Falessi. (2015). Evidence management for compliance of critical systems with safety standards: A survey on the state of practice. Information & Software Technology, 60, 1-15.
Ruiz, P., Dorronsoro, B., Talbi, E.-G., & Bouvry, P. (2015). Finding a robust configuration for the AEDB information dissemination protocol for mobile ad hoc networks. Applied Soft Computing, 32, 494-508.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2015). Cooperative Spectrum Sensing for Heterogeneous Sensor Networks Using Multiple Decision Statistics. Proceedings of CROWNCOM 2015.
Norta, D. P. B., Ramanathan, S., Sachau, J., & Allelein, H.-J. (2015, March 25). Hydrokinetic Micro-Power Generation in Small Rivers - a New Approach. Poster session presented at International Conference on Renewable Energies and Power Quality, La Coruna, Spain.
Tewari, U., Neshvad, S., & Sachau, J. (2015, March 25). Verification and Implementation of Pseudo-Random-Binary-Sequences for Online Determination of Grid Impedance Spectrum. The Renewable Energy & Power Quality Journal.
Di Alesio, S. (2015). Supporting Stress Testing in Real-Time Systems with Constraint Programming. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S. (Promotor), Gotlieb, A. (Promotor), Navet, N., Régin, J.-C., & Gérard, S.
Podlaszewski, M. J. (2015). Poles Apart : Navigating the Space of Opinions in Argumentation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: van der Torre, L. (Promotor), Caminada, M. (Promotor), Booth, R. (Promotor), Kelsen, P., Hunter, A., & Modgil, S.
Bartolini, C., Gheorghe, G., Giurgiu, A., Sabetzadeh, M., & Sannier, N. (2015, March 11). Assessing IT Security Standards Against the Upcoming GDPR for Cloud Systems. Poster session presented at Grande Region Security and Reliability Day 2015, Trier, Germany.
Norta, D. P. B., Winkler, C., Sachau, J., & Allelein, H.-J. (2015, March 10). 11,8-100% Rural Renewable Energy and Power Supply and its Influence on the Luxembourgish Power System. Poster session presented at International Renewable Energy Storage Conference, IRES 2015, Düsseldorf, Germany.
Aguilera Gonzalez, A., Voos, H., & Darouach, M. (2015). Glucose-Insulin System based on Minimal Model: a realisitic approach. IEEE UKSim-AMSS Int. Conference on Modelling and Simulation, Cambridge, UK, 2015.
Aouada, D., Al Ismaeil, K., & Ottersten, B. (2015). Patch-based Statistical Performance Analysis of Upsampling for Precise Super–Resolution. 11th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP'15).
Biryukov, A., Derbez, P., & Perrin, L. P. (2015). Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. In G., Leander (Ed.), Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (pp. 3-27). Berlin, Germany: Springer-Verlag.
Bronzi, W. (2015, March). Bluetooth Low Energy Robustness Analysis for V2V Communications. Ulmer Informatik-Berichte.
Chaib Draa, K., Voos, H., & Darouach, M. (2015). A Formal Modeling Framework for Anaerobic Digestion Systems. IEEE UKSim-AMSS Int. Conference on Modelling and Simulation, Cambridge, UK, 2015.
Derbez, P., & Perrin, L. P. (2015). Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. In G., Leander (Ed.), Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (pp. 190-216). Berlin, Germany: Springer-Verlag.
Guzek, M., Gniewek, A., Bouvry, P., Musial, J., & Blazewicz, J. (2015). Cloud Brokering: Current Practices and Upcoming Challenges. IEEE Cloud Computing, 2(2).
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015, March). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps. Paper presented at Grande Region Security and Reliability Day 2015.
Maleki, S., Chatzinotas, S., Evans, B., Liolis, K., Grotz, J., Vanelli-Coralli, A., & Chuberre, N. (2015). Cognitive Spectrum Utilization in Ka Band Multibeam Satellite Communications. IEEE Communications Magazine, 53(3), 24-29.
Max, C., Song, J.-Y., & Hack, N. (2015). ICT use at home and at school: A study on 8- to 12-year old students in Luxembourg. INTED2015 Proceedings (2015). International Academy of Technology, Education and Development (IATED).
Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2015). Security on medical data sharing (a literature review). Luxembourg, Luxembourg: SNT.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2015). Exploiting Polarization for Spectrum Awareness in Cognitive Satellite Communications. Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Access and Management. Hershey, USA: IGI Global.
Usman, M., Kliazovich, D., Granelli, F., Bouvry, P., & Castoldi, P. (2015, March). Energy efficiency of TCP: An analytical model and its application to reduce energy consumption of the most diffused transport protocol. International Journal of Communication Systems.
Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B., & Massacci, F. (2015). StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. Proceedings of CODASPY '15. ACM.
Lanze, F. (2015). Fingerprinting Techniques for Network Security. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Sorger, U., Scheuermann, B., Panchenko, A., & Spaniol, O.
Annaiyan, A., Yadav, M., Olivares Mendez, M. A., & Voos, H. (2015). Visual odometry based absolute target geo-location from micro aerial vehicle. International Conference on Robotics, Automation, Control and Embedded Systems (RACE), 2015 (pp. 1-7). IEEE.
Neshvad, S., Chatzinotas, S., & Sachau, J. (2015, February 16). Wideband Identification of Power Network Parameters Using Pseudo-Random Binary Sequences on Power Inverters. IEEE Transactions on Smart Grid.
Stathakis, A., Danoy, G., Bouvry, P., Talbi, E.-G., & Morelli, G. (2015). Optimizing communication satellites payload configuration with exact approaches. Engineering Optimization, 0(0), 1-26.
Tewari, U., Norta, D. P. B., & Kolmsee, K. (2015). Hydrokinetic Energy for Enlightening the Future of Rural Communities in Uttarakhand. Proceedings International Conference on Hydropower for Sustainable Development (pp. 146-157). Roorkee, India: IIT Roorkee, AHEC.
Norta, D. P. B., Lanser, C., Sachau, J., & Allelein, H.-J. (2015). Using Polyurethane to Reduce the Production Cost of Hydrokinetic Turbine Foils. Proceedings International Conference on Hydropower for Sustainable Development (pp. 135-145). Roorkee, India: IIT Roorkee, AHEC.
Max, C. (2015). Lernen in Bewegung: iPads im naturwissenschaftlichen Unterricht. Computer + Unterricht: Lernen und Lehren mit digitalen Medien, 97, 17-19.
Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Bourcier, J. (2015). Polymer: A Model-Driven Approach for Simpler, Safer, and Evolutive Multi-Objective Optimization Development. In S., Hammoudi, L. F., Pires, P., Desfray, & J., Filipe (Eds.), MODELSWARD 2015 - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development (pp. 286-293). Portugal: SCITEPRESS.
Schwickart, T. K., Voos, H., Minaglou, J.-R., Darouach, M., & Rosich, A. (2015). Design and Simulation of a Real-Time Implementable Energy-Efficient Model-Predictive Cruise Controller for Electric Vehicles. Journal of the Franklin Institute, 352(2), 603-625.
El Kateb, D. (2015). BALANCING NON-FUNCTIONAL REQUIREMENTS IN CLOUD-BASED SOFTWARE: AN APPROACH BASED ON SECURITY-AWARE DESIGN AND MULTI-OBJECTIVE SOFTWARE DYNAMIC MANAGEMENT. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Bouvry, P., Baudry, B., Bertolino, A., Mouelhi, T., & Fouquet, F.
Laczny, C., Sternal, T., Plugaru, V., Gawron, P., Atashpendar, A., Margossian, H. H., Coronado, S., van der Maaten, L., Vlassis, N., & Wilmes, P. (2015, January 20). VizBin - an application for reference-independent visualization and human-augmented binning of metagenomic data. Microbiome.
Castignani, G., Derrmann, T., Frank, R., & Engel, T. (2015). Driver Behavior Profiling Using Smartphones: A Low-Cost Platform for Driver Monitoring. Intelligent Transportation Systems Magazine, IEEE, 7(1), 91-102.
Colombo Tosatto, S. (2015). Proving Regulatory Compliance: Business Processes, Logic, Complexity. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: van der Torre, L. (Promotor), Boella, G. (Promotor), Governatori, G. (Promotor), Rinderle-Ma, S., & Montali, M.
Bianculli, D., Filieri, A., Ghezzi, C., & Mandrioli, D. (2015). Syntactic-Semantic Incrementality for Agile Verification. Science of Computer Programming, 97(0), 47-54.
Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2015). Argon and Argon2. Password Hashing Competition (PHC).
Biryukov, A., & Pustogarov, I. (2015). Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. Financial Cryptography and Data Security - 19th International Conference (pp. 10). Springer International Publishing.
Matinnejad, R., Nejati, S., Briand, L., Bruckmann, T., & Poull, C. (2015). Search-Based Automated Testing of Continuous Controllers: Framework, Tool Support, and Case Studies. Information and Software Technology, 57, 705-722.
Accettura, N., Vogli, E., Palattella, M. R., Grieco, L. A., Boggia, G., & Dohler, M. (2015). Decentralized Traffic Aware Scheduling in 6TiSCH Networks: Design and Experimental Evaluation. IEEE Internet of Things Journal.
Adamsky, F., Khayam, S. A., Jäger, R., & Rajarajan, M. (2015). P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. USENIX Workshop on Offensive Technologies (WOOT '15).
Afzal, H., Aouada, D., Destelle, F., Mirbach, B., & Ottersten, B. (2015). View-Independent Enhanced 3D Reconstruction of Non-Rigidly Deforming Objects. 16th International Conference on Computer Analysis of Images and Patterns.
Aguilera Gonzalez, A., Voos, H., & Darouach, M. (2015). Glucose-Insulin Minimal Model Augmented: Identification and Validation. AMCA Congreso Nacional de Control Automatico 2015, Guernavaca, Mexico, 2015.
Al-Azizy, D., Millard, D. E., Symeonidis, I., O'Hara, K., & Shadbolt, N. (2015). A Literature Survey and Classifications on Data Deanonymisation. In I., Symeonidis, Risks and Security of Internet and Systems - 10th International Conference CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers.
Ali, S., Iqbal, Z., Khalid, M., & Arcuri, A. (2015). Improving the Performance of OCL Constraint Solving with Novel Heuristics for Logical Operations: A SearchBased Approach. Empirical Software Engineering.
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel. IEEE Transactions on Signal Processing.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Spatial DCT-Based Channel Estimation in Multi-Antenna Multi-Cell Interference Channels. IEEE Transactions on Signal Processing.
Antonelo, E. A., & Camponogara, E. (2015). An Echo State Network-based Soft Sensor of Downhole Pressure for a Gas-lift Oil Well. In L., Iliadis & C., Jayne, Engineering Applications of Neural Networks (pp. 379-389). Springer.
Antonelo, E. A., Camponogara, E., & Plucenio, A. (2015). System Identification of a Vertical Riser Model with Echo State Networks. IFAC-PapersOnLine, 48(6), 304-310.
Antonelo, E. A., & Schrauwen, B. (2015). On Learning Navigation Behaviors for Small Mobile Robots With Reservoir Computing Architectures. IEEE Transactions on Neural Networks and Learning Systems, 26(4), 763-780.
Appelt, D., Nguyen, D. C., & Briand, L. (2015). Behind an Application Firewall, Are We Safe from SQL Injection Attacks? 2015 IEEE 8th International Conference on Software Testing, Verification, and Validation (ICST).
Aravanis, A., Shankar, B., Arapoglou, P.-D., Danoy, G., Cottis, P. G., & Ottersten, B. (2015). Power Allocation in Multibeam Satellite Systems: A Two-Stage Multi-Objective Optimization. IEEE Transactions on Wireless Communications.
Arcuri, A., Fraser, G., & Galeotti, J. P. (2015). Generating TCP/UDP Network Data for Automated Unit Test Generation. 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). ACM.
Avoine, G., Mauw, S., & Trujillo Rasua, R. (2015). Comparing distance bounding protocols: A critical mission supported by decision theory. Computer Communications, 67, 92–102.
Bahnsen, A. C., Aouada, D., & Ottersten, B. (2015). Ensemble of Example-Dependent Cost-Sensitive Decision Trees. arXiv preprint arXiv:1505.04637.
Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). On the Probabilistic Verification of Time Constrained SysML State Machines. Intelligent Software Methodologies, Tools and Techniques (pp. 425--441). Springer International Publishing.
Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). A probabilistic and timed verification approach of SysML state machine diagram. A probabilistic and timed verification approach of SysML state machine diagram.
Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). A Quantitative Verification Framework of SysML Activity Diagrams under Time Constraints. Expert Systems with Applications.
Bardin, S., Delahaye, M., Kosmatov, N., David, R., Papadakis, M., Le Traon, Y., & Marion, J.-Y. (2015). Sound and Quasi-Complete Detection of Infeasible Test Requirements. 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15).
Bella, G., Curzon, P., & Lenzini, G. (2015). Service security and privacy as a socio-technical problem. JOURNAL OF COMPUTER SECURITY, 23(5), 563-585.
Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2015). A Secure Exam Protocol Without Trusted Parties. ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015.
Benenson, Z., Bleikertz, S., Foley, S. N., Harpes, C., Kowalski, S., Lenzini, G., Oliveira, D., Parkin, S., Pfleeger, S. L., Smith, P., & others. (2015). 4.2 Social Dynamics Metrics-Working Group Report. Socio-Technical Security Metrics, 17-19.
Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., & Uebelacker. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Proc. of the New Security Paradigm Workshop.
Beneson, Z., Lenzini, G., Oliveira, D., Parkin, S., & Uebelacker, S. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (pp. 85-99). ACM.
Bertolino, A., Daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., Lonetti, F., Marchetti, E., Mouelhi, T., & Papadakis, M. (2015). Similarity testing for access control. Information and Software Technology, 58, 355-372.
Bezzaoucha, S., & Henry, D. (2015). An LMI approach for the Integral Sliding Mode and Hinfinity State Feedback Control Problem. Journal of Physics, 12th European Workshop on Advanced Control and Diagnosis (ACD 2015).
Bezzaoucha, S., Marx, B., Maquin, D., & Ragot, J. (2015). State and output feedback control for Takagi-Sugeno systems with saturated actuators. International Journal of Adaptive Control and Signal Processing.
Bezzaoucha, S., Marx, B., Maquin, D., & Ragot, J. (2015). State constrained tracking control for nonlinear systems. Journal of the Franklin Institute, 352(7), 2866-2886.
Bhavani Shankar, M. R., Zheng, G., Maleki, S., & Ottersten, B. (2015). Feasibility study of full-duplex relaying in satellite networks. IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015-August, 560-564.
Bianculli, D., Calinescu, R., & Rumpe, B. (Eds.). (2015). Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK, September 7-8, 2015, Revised Selected Papers. Springer.
bikakis, A., & Caire, P. (2015). Computing coalitions in Multiagent Systems: A contextual reasoning approach. Lecture Notes in Computer Science, 8953.
Biryukov, A., & Vipul, G. (Eds.). (2015). Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India. Springer.
Blumenthal, S., Hochgeschwender, N., Prassler, E., Voos, H., & Bruyninckx, H. (2015). An Approach for a Distributed World Model with QoS-Based Perception Algorithm Adaptation. 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems IROS, Hamburg, Germany, 2015 (pp. 1806 - 1811).
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Energy-efficient Data Replication in Cloud Computing Datacenters. Cluster Computing, 18(1), 385-402.
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Models for Efficient Data Replication in Cloud Computing Datacenters. IEEE International Conference on Communications (ICC), London, UK, 2015.
Butt, M. M., Jorswieck, E. A., & Ottersten, B. (2015). Maximizing energy efficiency in multiple access channels by exploiting packet dropping and transmitter buffering. IEEE Transactions on Wireless Communications, 14(8), 4129-4141.
Campos, J., Fraser, G., Arcuri, A., & Rui, A. (2015). Continuous Test Generation on Guava. Symposium on Search-Based Software Engineering (SSBSE). Springer.
Ceccato, M., Marchetto, A., Mariani, L., Nguyen, D. C., & Tonella, P. (2015). Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency. The ACM Transactions on Software Engineering and Methodology (TOSEM), 25(1), 5:1--5:38.
Chatzinotas, S., Christopoulos, D., & Ottersten, B. (2015). Cellular-broadcast service convergence through caching for CoMP cloud RANs. arXiv preprint arXiv:1504.08274.
Chatzinotas, S., Ottersten, B., & DeGaudenzi, R. (Eds.). (2015). Cooperative and Cognitive Satellite Systems. Elsevier.
Chen, X., Mizera, A., & Pang, J. (2015). Activity tracking: A new attack on location privacy. Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15) (pp. 22-30). IEEE CS.
Cheng, R., Pang, J., & Zhang, Y. (2015). Inferring friendship from check-in data of location-based social networks. Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (pp. 1284-1291). IEEE CS.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). Cellular-Broadcast Service Convergence through Caching for CoMP Cloud RANs. 22nd IEEE Symposium on Communications and Vehicular Technology in the Benelux.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). Multicast multigroup beamforming for per-antenna power constrained large-scale arrays. IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015-August, 271-275.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). User Scheduling in Cooperative Satellite Systems. Cooperative and Cognitive Satellite Systems. Elsevier.
Christopoulos, D., Chatzinotas, S., Taricco, G., Vasquez, M. A., Perez-Neira, A., Arapoglou, P.-D., & Ginesi, A. (2015). Multibeam Joint Precoding: frame based design. Cooperative and Cognitive Satellite Systems. Elsevier.
Cole, M., & Giurgiu, A. (2015). The "Minimal" Approach: the CJEU on the Concept of "Establishment" Triggering Jurisdiction for DPAs and Limitations of Their Sanctioning Powers. European Data Protection Law Review.
Colombo Tosatto, S., Kelsen, P., & Governatori, G. (2015). Business Process Regulatory Compliance is Hard. IEEE Transactions on Services Computing, 8(6), 958-970.
Colombo Tosatto, S., Kelsen, P., Ma, Q., el Kharbili, M., Governatori, G., & van der Torre, L. (2015). Algorithms for tractable compliance problems. Frontiers of Computer Science, 9(1), 55-74.
Cramer, M., Ambrossio, D. A., & van Hertum, P. (2015). A Logic of Trust for Reasoning about Delegation and Revocation. Proceedings of the 20th ACM Symposium on Access Control Models and Technologies.
Cramer, M., Pang, J., & Zhang, Y. (2015). A logical approach to restricting access in online social networks. Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. ACM.
Demisse, G., Aouada, D., & Ottersten, B. (2015). Template-Based Statistical Shape Modelling on Deformation Space. 22nd IEEE International Conference on Image Processing.
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & Lenzini, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015.
El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2015). Towards a full support of obligations in XACML. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8924, 213-221.
El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T., & Le Traon, Y. (2015). Conviviality-driven access control policy. Requirements Engineering, 20(4), 363-382.
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2015). CAPS: Context-Aware Privacy Scheme for VANET Safety Applications. ACM Wisec 15.
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2015). On Evaluation of Location Privacy Preserving Schemes for VANET Safety Applications. Computer Communications, 63(1), 11--23.
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2015). POSTER: Context-adaptive user-centric privacy scheme for VANET. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer.
Evans, B., Thompson, P., Lagunas, E., Sharma, S. K., Tarchi, D., & Icolari, V. (2015). Extending the Usable Ka Band Spectrum for Satellite Communications: The CoRaSat Project. Advanced Next Generation Broadband Satellite Systems Workshop, International Conference on Wireless and Satellite Systems (WiSATS, formerly PSATS), Bradford, UK, July 2015.
Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S., Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer.
Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334.
Ferreira, A., & Lenzini, G. (2015). An Analysis of Social Engineering Principles in Effective Phishing. Proc. of the 5th International Workshop on Socio-Technical Security and Trust. CSP.
Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A., T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer.
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2015). Network-Assisted Offloading for Mobile Cloud Applications. IEEE International Conference on Communications (ICC), London, UK, 2015.
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2015). Performance and Energy Efficiency Metrics for Communication Systems of Cloud Computing Data Centers. IEEE Transactions on Cloud Computing.
Fraser, G., & Arcuri, A. (2015). EvoSuite at the SBST 2015 Tool Competition. 8th International Workshop on Search-Based Software Testing (SBST) 2015. ACM.
Gao, N., Darouach, M., Alma, M., & Voos, H. (2015). Decentralized Dynamic Observer-Based Control for Large Scale Nonlinear Uncertain Systems. American Control Conference ACC 2015, Chicago, USA (pp. 4131-4136).
Garcia, F., & Ottersten, B. (2015). Real-time Curve-skeleton Extraction of Human-scanned Point Clouds. International Conference on Computer Vision Theory and Applications (VISAPP 2015) (pp. 54-60).
Gharanjik, A., Shankar, B., Arapoglou, P.-D., & Ottersten, B. (2015). Multiple Gateway Transmit Diversity in Q/V Band Feeder Links. IEEE Transactions on Communications.
Gheorghe, G., & Engel, T. (2015). Towards Reinventing Online Privacy. In B., Berendt, T., Engel, D., Ikonomou, D., Le Métayer, & S., Schiffner (Eds.), LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy. Springer.
Giurgiu, A. (2015). No Place to Hide – Edward Snowden, the NSA and the Surveillance State. European Data Protection Law Review, 1(3), 249 - 254.
Giustolisi, R., Iovino, V., & Roenne, P. (2015). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. IACR Cryptology ePrint Archive, 2015, 1119.
Gniewek, A. (2015). Ochrona danych osobowych w środowisku Chmury Obliczeniowej (ang. Cloud Computing ). Analiza wybranych elementów reformy przepisów o ochronie danych osobowych w Unii Europejskiej. In J., Kępiński, K., Klafkowska-Waśniowska, & R., Sikorski (Eds.), Własność intelektualna w obrocie elektronicznym. Tom V. Poland: Beck.
Guidotti, A., Icolari, V., Tarchi, D., Vanelli-Coralli, A., Sharma, S. K., Lagunas, E., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., Corbel, E., Evans, B., & Thompson, P. (2015). Spectrum Awareness and Exploitation for Cognitive Satellite Communications. European Conference on Networks and Communications (EuCNC), Paris, France, Jun 2015.
Guzek, M., Kliazovich, D., & Bouvry, P. (2015). HEROS: Energy-Efficient Load Balancing for Heterogeneous Data Centers. 8th IEEE International Conference on Cloud Computing IEEE CLOUD 2015.
He, S., Huang, Y., Yang, L., Ottersten, B., & Hong, W. (2015). Energy Efficient Coordinated Beamforming for Multicell System: Duality-Based Algorithm Design and Massive MIMO Transition. IEEE TRANSACTIONS ON COMMUNICATIONS, 63(12), 4920-4935.
Henard, C., Papadakis, M., Harman, M., & Le Traon, Y. (2015). Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. 37th International Conference on Software Engineering (ICSE 2015).
Humphreys, L., Boella, G., Robaldo, L., Di Caro, L., Cupi, L., Ghanavati, S., Kiriinya, R. K. M., & van der Torre, L. (2015). Classifying and Extracting Elements of Norms for Ontology Population using Semantic Role Labelling. The 15th International Conference on Artificial Intelligence & Law — San Diego, June 8-12, 2015.
Humphreys, L., Santos, C., Di Caro, L., Boella, G., Robaldo, L., & van der Torre, L. (2015). Mapping Recitals to Normative Provisions in EU Legislation to Assist Legal Interpretation. Proceedings of the 28th International Conference on Legal Knowledge and Information Systems.
Iovino, V., & Żebrowski, K. (2015). Simulation-Based Secure Functional Encryption in the Random Oracle Model. Progress in Cryptology -- LATINCRYPT 2015 (pp. 19). Springer.
Jamroga, W., & Tabatabaei, M. (2015). Accumulative knowledge under bounded resources. Journal of Logic & Computation, 003.
Jamroga, W., & Tabatabaei, M. (2015). Strategic Noninterference. ICT Systems Security and Privacy Protection (pp. 67--81). Springer.
Jasim, I., Plapper, P., & Voos, H. (2015). Adaptive sliding mode fuzzy control for unknown robots with arbitrarily-switched constraints. Mechatronics, 30C, 174-186.
Jasim, I., Plapper, P., & Voos, H. (2015). Contact-State Modelling in Force-Controlled Robotic Peg-in-Hole Assembly Processes of Flexible Objects Using Optimised Gaussian Mixtures. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture.
Jhawar, R., Kordy, B., Mauw, S., Radomirovic, S., & Trujillo Rasua, R. (2015). Attack Trees with Sequential Conjunction. Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (pp. 339--353). Springer.
Jonker, H., Mauw, S., & Radomirovic, S. (2015). Location-private interstellar communication. 23rd Security Protocols Workshop. Springer-Verlag.
Kalantari, A., Maleki, S., Zheng, G., Chatzinotas, S., & Ottersten, B. (2015). Joint Power Control in Wiretap Interference Channels. IEEE Transactions on Wireless Communications.
Kalantari, A., & Ottersten, B. (2015). Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications. IEEE Transactions on Information Forensics and Security.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2015). Performance Analysis of Underlay Cognitive Radio Systems: Estimation-Throughput Tradeoff. arXiv preprint arXiv:1510.03353.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2015). Sensing-Throughput Tradeoff for Interweave Cognitive Radio System: A Deployment-Centric Viewpoint. Wireless Communications, IEEE Transactions on, PP(99), 14.
Kayhan, F., Mazzali, N., & Shankar, B. (2015). Constellation Design in Four Dimensions under Average Power Constraint. Proceedings on IEEE Symposium on Communications and Vehicular Technology in the Benelux.
Kayhan, F., Montorsi, G., Taricco, G., & Alagha, N. (2015). Comparative Assessment of Orthogonal and Nonorthogonal Multiplexing Techniques for Differentiated Satellite Broadcasting Services. Paper presented at 22nd IEEE Symposium on Communications and Vehicular Technology in the Benelux.
Kintis, M., Papadakis, M., & Malevris, N. (2015). Employing second-order mutation for isolating first-order equivalent mutants. Software Testing, Verification & Reliability, 25(5-7), 508-535.
Kliazovich, D., Bouvry, P., Granelli, F., & Fonseca, N. L. S. (2015). Energy Consumption Optimization in Cloud Data Centers. Cloud Services, Networking and Management. Wiley.
Kreutz, D., Ramos, F. M. V., Verissimo, P., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE, 103(1), 14-76.
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., & Ottersten, B. (2015). Resource allocation for cognitive satellite uplink and fixed-service terrestrial coexistence in ka-band. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 156, 487-498.
Lagunas, E., & Nájar, M. (2015). Spectral Feature Detection with sub-Nyquist Sampling for Wideband Spectrum Sensing. IEEE Transactions on Wireless Communications.
Lanze, F., Panchenko, A., Ponce-Alcaide, I., & Engel, T. (2015). Hacker’s Toolbox: Detecting Software-Based 802.11 Evil Twin Access Points. Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015).
Lenzini, G., & Ferreira, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? Advances in Intelligent Systems and Computing. Springer.
Li, J., Sattar, S. A., Baig, M. M., Liu, J., Tang, Q., & Malin, B. (2015). Methods to Mitigate Risk of Composition Attack in Independent Data Publications. Medical Data Privacy Handbook 2015. Springer.
Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015).
Li, L., Bissyandé, T. F., Klein, J., & Le Traon, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. arXiv preprint arXiv:1511.06554.
Li, Y., & Pang, J. (2015). Formalizing provable anonymity in Isabelle/HOL. Formal Aspects of Computing, 27(2), 255-282.
Li, Y., Pang, J., Lv, Y., Fan, D., Cao, S., & Duan, K. (2015). paraVerifier: An automatic framework for proving parameterized cache coherence protocols. Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (pp. 207-213).
Li, Y., Voos, H., & Darouach, M. (2015). Nonlinear protocols for distributed consensus in directed networks of dynamic agents. Journal of the Franklin Institute, 352(9), 3645-3669.
Liu, B., Lucia, L., Nejati, S., & Briand, L. (2015). Simulink Fault Localization: an Iterative Statistical Debugging Approach (TR-SnT-2015-8).