|Fast Kernel Error Propagation Analysis in Virtualized Environments|
Nicolas Coppik, Oliver Schwahn and Neeraj Suri
Proc. of ICST, 2021
|IP Unbound: Robust, Responsive CDN-scale service without CDN-Scale Addresses|
Marwan Fayed, Vasileios Giotsas, Lorenz Bauer, Sami Kerola, Marek Majkowski, Pavel Odintsov, Jakub Sitnicki, Taejoong Chung, Dave Levin, Alan Mislove, Nick Sullivan, Chris Wood
Proc. of SIGCOMM, (Forthcoming, August 2021
|Centralised Cooperative Path Planning for an Unmanned Combat Arial Vehicle Fleet using Reinforcement Learning. |
B. Yuksek, U. Demirezen, G. Inalhan and A. Tsourdos.
AIAA Journal of Aerospace Information Systems, 2021 (accepted, awaiting publication)
Post-Doctoral Researchers' PhD Theses
|A Model Based Flight Control System Design Approach for Micro Aerial Vehicles Using Integrated Flight Testing and HIL Simulations|
PhD Thesis, Istanbul Technical University, November 2019.
|Subjects of the Unconditioned:|
Kant’s Critical Metaphysics and Aesthetics and Their
Reconstruction in Schelling’s Identity-Philosophy.
PhD Thesis, Kent University, 2017
|Intelligent Edge Caching based on Federated Deep Learning |
PhD Thesis, University of Exeter, January 2021
|TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis|
Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman and Neeraj Suri
Proc. of DSN, 2020
|Analyzing the Effects of Bugs on Software Interfaces|
Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri
IEEE Trans. on Software Engg (TSE), 2020
|Distributed Systems Security N. Suri CyBok Knowledge Area, 2019||link||bib|
|Reinforcement learning based closed-loop reference model adaptive flight control system design|
B. Yuksek, G. Inalhan
International Journal of Adaptive Control and Signal Processing, 2020
|System Identification and Model-Based Flight Control System Design for an Agile Maneuvering Quadrotor Platform|
B. Yuksek, E. Saldiran, A. Cetin, R. Yeniceri, G. Inalhan
|Development of UCAV Fleet Autonomy by Reinforcement Learning in a Wargame Simulation Environment|
B. Yuksek, M. Umut Demirezen, G. Inalhan
|Assessing Variable Levels of Delegated Control – A Novel Measure of Trust|
S. Palmer, D. Richards, G. Shelton-Rayner, K. Izzetoglu, D. Inch.
|Human-Agent Teaming – an Evolving Interaction Paradigm: An Innovative Measure of Trust|
S. Palmer, D. Richards, G. Shelton-Rayner, D. Inch, K. Izzetoglu.
International Symposium of Aviation Psychology, 2019
|Adversarial Reinforcement Learning Framework for Benchmarking Collision Avoidance Mechanisms in Autonomous Vehicles.|
V. Behzadan, A. Munir.
IEEE Intelligent Transportation Systems Magazine, April 2019.
|A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks.|
C.Peng, H. Sun, M. Yang, Y-L. Wang
IEEE Transactions on Systems, Man, and Cybernetics: Systems ( Volume: 49, Issue: 8, Aug. 2019)
|Cyber Security Challenges and Solutions for V2X communications: A Survey.|
A.Alnasser, H.Sun, J.Jiang.
Computer Networks (151, 2019)
|A Study of Human-Agent Collaboration for Multi-UAV Task Allocation in Dynamic Environments.|
S.D.Ramchurn, J.E.Fischer, Y.Ikuno, F.Wu, J.Flann, A.Waldock
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015)
|Planning Search and Rescue Missions for UAV Teams.|
C.A.B. Baker, S. Ramchurn, W. T. L.Teacy, N.R. Jennings
ECAI’16: Proceedings of the Twenty-second European Conference on Artificial Intelligence (August 2016)
|Security Modeling of Autonomous Systems: A Survey.|
F. Jahan, W. Sun, Q. Niyaz, M. Alam
ACM Comput. Surv. 52, 5, Article 91 (September 2019),
|Analyzing Cyber-Physical Threats on|
K.M. Ahmad Yousef, A. AlMajali, S. Abu Ghalyon, W. Dweik, B. J. Mohd
Sensors, 18, 1643 (2018)
|Trustworthy Deep Learning in 6G-Enabled Mass Autonomy|
C. Li, W. Guo, S. Chengyao Sun, S. Al-Rubaye, A. Tsourdos.
IEEE Vehicular Technology Magazine (December 2020)
|Mobility-Aware Proactive Edge Caching for|
Connected Vehicles Using Federated Learning.
Z. Yu, J. Hu, G. Min, Z. Zhao, W. Miao, M.S. Hossain.
IEEE Transactions on Intelligent Transportation Systems (August 2020)
|Federated Learning Based Proactive Content|
Caching in Edge Computing
Z. Yu, J. Hu, G. Min, H. Lu, Z. Zhao, H. Wang, N. Georgalas
IEEE Global Communications Conference (GLOBECOM) (2018)
|How reliable are self-report measures of mileage, violations|
A.E. af Wåhlberg, L. Dorn
Safety Science (76, 2015)
|Accident proneness of bus drivers; controlling for exposure |
L. Dorn & A. E. af Wåhlberg
Theoretical Issues in Ergonomics Science
Volume 22 (2021)
|Experience as a Safety Factor in Driving;|
Methodological Considerations in a Sample of
A. af Wåhlberg, L. Dorn
Safety 5(2), (2019)
|Behavioural culpability for traffic accidents|
L. Dorn, A.E. af Wåhlberg
Transportation Research Part F: Traffic Psychology and Behaviour
Volume 60, (January 2019)
|Bus driver accident record: the return of accident proneness |
A. af Wåhlberg, L. Dorn
Theoretical Issues in Ergonomics Science (January 2009)
|Putting speculation and new materialisms in|
Palgrave Communications Volume 5, 11 (2019)
|Ethics through Design: Medical data systems,|
chronically ill data subjects, and all the invisible things in
M. Luján Escalante,
M. Büscher, E Tsekleves, M. Andersen, L. Nielsen,
P. Selinas, L. Moffat, J. Robins
International Association of Societies of
Design Research Conference (2019)
| Autonomous Learning Systems: From Data Streams to Knowledge in Real time |
John Willey and Sons (Dec 2012)
|Sense and Avoid in UAS: Research and Applications. |
P. Angelov (ed.)
John Willey and Sons (May 2012) Available in English and Chinese
|Seeing the invisible algorithm: The practical politics of tracking the credit trackers|
J. Deville and L. van der Velden (2015) in L. Amoore and V. Piotukh (eds) Algorithmic Life: Calculative Devices in the Age of Big Data. Routledge, pp. 90–109
|Digital subprime: Tracking the credit trackers|
J. Deville (2019) in M. Featherstone (ed.) The Sociology of Debt. Bristol: Policy Press, pp. 145–173.
|Futures of credit risk assessment in the UK |
J. Deville (2019)
London: Registry Trust Limited
|Profiling IoT-based Botnet Traffic using DNS |
O.P. Dwyer, A. K. Marnerides, V. Giotsas, and T. Mursch in IEEE Global Communications Conference (GLOBECOM, 2019), pp. 1-6.
|Identifying infected energy systems in the wild|
A.K. Marnerides, V. Giotsas and T. Mursch
Proceedings of the Tenth ACM International Conference on Future Energy Systems (2019)
|Inferring BGP blackholing activity in the internet|
V. Giotsas, G. Smaragdakis, C. Dietzel, P. Richter, A. Feldmann and A. Berger.
Proceedings of the Internet Measurement Conference (2017)
|Detecting peering infrastructure outages in the wild|
V. Giotsas, C. Dietzel, G. Smaragdakis, A. Feldmann, A. Berger and E. Aben
Proceedings of the conference of the ACM special interest group on data communication, (2017).