welcome [] · co-founder & head of software engineering, datathings martin halliwell cto, ses...
TRANSCRIPT
WELCOME
Message from the Director ..................................... 04
What They Say about Us ......................................... 06
OUR RESEARCH
Autonomous Vehicles .............................................. 10
Cybersecurity ............................................................ 16
Fintech ........................................................................ 23
Internet of Things ...................................................... 27
Secure and Compliant Data Management ........... 29
Space Resources ...................................................... 32
TECHNOLOGY TRANSFER
Our Partners .............................................................. 36
Partnership Program ................................................ 38
Boosting the Innovation Ecosystem ...................... 39
ABOUT US
Organisation .............................................................. 42
Financial Data ............................................................ 43
Leadership ................................................................. 44
Events ......................................................................... 46
People ......................................................................... 48
Awards ....................................................................... 50
OUR OUTPUT
Projects ...................................................................... 54
Publications ............................................................... 66
Table of contents
03
MESSAGE FROM THE DIRECTOR
2018 was a year in which we pushed the boundaries, in
every sense of the word. Our researchers not only trod new
scientific ground but also expanded into new industry sectors and countries.
Expanding the scientific frontier is an international endeavour where we team up with top researchers in Europe and beyond. Our presence in the highly competitive EU scientific programmes continues to grow, with 14 new H2020 and European Space Agency projects acquired — a record for SnT. This will double our research activity funded by Euro-pean sources in 2019. And as all eyes turn towards Horizon Europe (FP9), our place at the table for three of the four EU Cybersecurity Competence Networks being launched puts SnT — the only organisation in Europe to achieve such representation — at the heart of global security efforts.
Beyond Europe, in 2018 we welcomed new international partnerships — including QRA, Canada-based developers of systems and require-ments engineering technology — and our first grant from a US research funding agency (ONRG). These are clear signs of the value companies see in tapping into our expertise.
Closer to home, we welcomed nine new partners, beginning collabo-rations in two new sectors, with our first legal and insurance firms, Linklaters and Foyer. Together with our partners we continue to develop Luxembourg’s reputation as an exciting hub for technology driven service innovation.
At the heart of our activities, as with any knowledge organisation, is people. Our success lies in attracting and retaining talented, dedicated, and highly motivated individuals committed to SnT and Luxembourg in a competitive market. SnT researchers have now accumulated over 100 prestigious best paper and individual awards. Together with our third ERC Advanced Grant, awarded to Prof. Dr. Jean-Sébastien Coron, these show that we continue to rise to the challenge we set ourselves: bridging the worlds of cutting edge long-term and demand-driven research.
In pushing the boundaries in 2018, we’ve raised the bar for ourselves in 2019, our 10th anniversary year. Join us on social media to keep track of our celebrations.
Prof. Dr. Björn OtterstenDirector, Interdisciplinary Centre for Security, Reliability and Trust
0504 back to table of contents
I spent over four years at SnT, and no matter where I work I will always miss my time there. I was honoured to work alongside inspiring researchers such as Prof. Lionel Briand and Dr. Domenico Bianculli. Problem solving is a big part of my work in industry, and it relies heavily upon the skills I learned at SnT, such as scientific thinking, research, and communication skills, as well as a strong sense of determination and persistence.
IEE puts a big emphasis on staying ahead of the curve in software development techniques. This is especially true in our main domain – sensing solutions for automotive applications. So we were excited to get the opportunity to work with Prof. Lionel Briand and his team. One early project focused on automating testing from use case specifications. This helped us cut costs, improve our release quality, and reduce our time to market. The collaboration’s ongoing success led us to hire one of their PhDs, who now leads the creation of new methods and tools to increase our development and management team’s quality and efficiency.
My first and lasting impression of SnT is the diverse skill sets it brings together – I made a lot of friends from different backgrounds from whom I learned a lot. This cultural and technical diversity is good for fostering collaboration and also crucial for identifying novel problems and challenges. I collaborated with talented students and researchers on a variety of computer vision problems, some theoretical, others highly motivated by practical problems. Such a broad exposure is an enabling experience for pursuing a range of carrier paths.
At SMC, a part of our job is covering new technologies and thinking about their benefits for the public. SnT always helps us discover new possibilities, and also to bring them to life. If SnT is working on a new technology, I want to know all about it, because it’ll be a technology that will be here for good!
My time at SnT presented me with the unique opportunity to work with people from around the world, broadening my horizons and helping me to think outside the box. This creative environment was the right place to meet the people with whom I would go on to create SnT spin-off DataThings. Our company exploits the research ideas and technologies that we worked on during our time at the Centre.
Throughout the long relationship between SES and SnT, we’ve collaborated on several major projects. One that sticks out was the development of an automated open source tool to translate satellite control procedures from multiple vendors into a common language. Being able to process them in this way has proved to be of critical importance to us. At SES we have many such areas of interest we would like to explore and eventually exploit, but as we’re not an R&D institution, a close relationship with SnT is essential to doing so effectively.
THOMAS HARTMANNCO-FOUNDER & HEAD OF SOFTWARE ENGINEERING, DATATHINGS
MARTIN HALLIWELLCTO, SES
GIRUM DEMISSEVISITING RESEARCHER, FACEBOOK INC.
What they say about us
DOU WEISOFTWARE ENGINEER, TALKWALKERTHIERRY STEPHANY
CENTRAL R&D, IEE S.A.
MAX GINDTATTACHÉ, MINISTÈRE D’ETAT – SERVICE DES MÉDIAS ET DE LA COMMUNICATION
0606 07
Welcome Welcome
back to table of contents
OUR RESEARCH
Our scientists conduct research with impact. Whether they are pushing the
boundaries of scientific knowledge or tackling clearly defined problems with
industry partners, their work is rooted in a thorough understanding of societal
and industrial challenges. The result: solutions that are applicable, scalable
and provide a genuine long-term competitive advantage for companies in
Luxembourg and beyond.
Our work aligns with areas of strategic importance for Luxembourg:
AUTONOMOUS VEHICLES
Smart Drones for all Seasons ................................................................... 10
Collective Intelligence Helps Drones Rise above Adversity ............... 12
Bringing 5G to Europe’s Roads ................................................................. 13
The 360Lab: a Vehicle for Collaboration ................................................. 14
Patents on the Radar for Automotive Applications............................... 15
CYBERSECURITY
How to Stop Ransomware in its Tracks? Take Away its Tools ............ 16
SnT at Heart of EU Cybersecurity Push .................................................. 17
It Wasn’t Me: Deniability in a Post-Quantum World ............................. 18
Law and Technology: How to Police the Privacy Beat ......................... 19
Saving Lives at the Sharp End of Software Engineering...................... 20
This Californian Life: Software Solutions in Silicon Valley .................. 22
FINTECH
How to Catch 42,000 Smart Contract Vulnerabilities .....................................23
Building Privacy into the Blockchain ................................................................24
Your AI Advisor: Wealth Management in the 21st Century .........................24
Securing Banks against Digital Heists .............................................................25
Setting the Standard for Requirements Engineers ........................................26
INTERNET OF THINGS
Print Scheduling Solution Cures Mass Customisation Headache ............27
3D Tech for Stroke Survivors ...............................................................................28
SECURE AND COMPLIANT DATA MANAGEMENT
Digital Medical Systems: Who’s Accessing Your Data? ..............................29
Fast but Secure Processing for Your DNA .......................................................30
SPACE RESOURCES
Satellite Pre-coding Clears Congested Airwaves ................................. 32
Christof Ferreira Torres and Mathis Steichen research blockchain topics.
08 09back to table of contents
On a windy, rainy day last autumn, Dr. Miguel Olivares-Mendez and his colleagues Dr. Jose Luis Sanchez-Lopez, Manuel Castillo-Lopez and Maciej Zurad headed to a bridge over a road just outside of Luxembourg City. Having successfully completed field tests of their airplane inspection drone the week before at Luxembourg Airport, they were ready to explo-re new challenges and applications for their autonomous technology. This time, they were there to assist a team from the University of Luxembourg’s Physics and Materials Science Research Unit conduct a bridge inspection.
While the rain came down, the drones flew more than 30 autonomous flights around the bridge. They inspected the bridge while it was free from vehicles, again with six loaded trucks on it, and a third time after the trucks were removed. Using a variety of sensors including high-resolution RGB (which shows colours true to the human eye) and LiDAR (which produces a 3D model), they gathered the data needed to search for signs that the bridge had sustained deflection.
Any technology is most useful when it is dependable, simple and unobtrusive. And with the rain pouring down, that was exactly what Miguel’s drones were able to provide. The drones worked with one another perfectly, automatically matching their flight paths and communicating with one another to accom-plish this shared mission. The materials scien-tists, meanwhile, could focus on their own part of the job — interpreting the data.
This unobtrusive dependability will make Olivares-Mendez‘s smart, goal-driven drones a good fit for an ever-widening range of applications: from art historians examining a UNESCO monument for preservation purposes, to forest management teams deciding when to close a trail, to film crews who need to repli-cate a particular shot with precision. “What we do here is make things that really work, in real-world conditions,” says Olivares-Mendez with a smile. “And that includes wind and rain.”
Dr. Dario Cazzato, Dr. Miguel Olivares Mendez, Dr. Jose Luis Sanchez-Lopez
Smart Drones for all Seasons“What we do here is make things that really work, in real-world conditions,” says Olivares-Mendez with a smile. “And that includes wind and rain.”
10 11back to table of contents10 11
ResearchResearch
Bringing 5G to Europe’s Roads
Dr. Ion Turcanu
It has happened to all of us: on New Year’s Eve shortly after midnight, we pick up our mobile phones and try to call or write a loved one. And then, nothing. The network is too crowded and we start the new year offline. Crowds, data-guzzling apps, and an ever increasing number of connected devices keep pushing modern cellular networks to the limit. While the consequences of an overcrowded network can be irksome, and even downright inconvenient, the stakes are about to rise significantly as automotive companies develop increasingly connected cars.
Connected cars promise to be safer, to reduce traffic, and to be more fuel efficient. They’ll do this by communicating constantly with one another and their environments, sending mes-sages warning of slowdowns, informing one another of the need to form a rescue lane on the highway, or moving in coordinated platoons to reduce wind resistance. But the foundation of all this communication needs to be more robust and dependable than the networks we live with today. Connected cars need to
communicate without delays, without dropped messages, and without service holes.
What connected cars need is 5G — the next generation of mobile connectivity — and Dr. Ion Turcanu and his colleagues at SnT are laying the foundations for just that. They have teamed up with more than 50 partners within the H2020 5G-MOBIX and 5G-DRIVE projects to test potential use cases for 5G in connected cars. Results from trials across Europe, China and Korea, will then contribute to the standar-disation of the global 5G network.
Turcanu explains that “connected cars will use a heterogeneous network to communicate with each other.” This means that the car will switch between different communication methods according to current conditions — their speed, weather, location, etc.. For example, in a remo-te region that might mean communicating via satellite, while in dense urban traffic, Bluetooth or a modified form of short-range WiFi might be more appropriate.
This ability to switch seamlessly between communication technologies will ensure that important messages arrive in real-time and that no information gets dropped.Ion and his fellow researchers are developing technologies and requirements that not only meet the already obvious needs of connected cars in the near future but that also anticipate potential future needs, leaving room for even more innovation.
Collective Intelligence Helps Drones Rise above Adversity
photo by Phoenixns/Shutterstock.com
Without any central organising mechanism, or indeed any direct communication, ants can outperform computers at scouting an area. Using nothing but passive pheromones to communicate, ants are, in fact, so efficient that Prof. Dr. Pascal Bouvry and Dr. Grégoire Danoy have made them the algorithmic model behind their autonomous drones.
Like the ants, these drones explore independ-ently while automatically informing the swarm of their path. Together they can quickly — al-most instinctively — determine whether an area has been completely explored or whether a given path is efficient. But while insects rely on pheromones, the drones use peer-to-peer communication. The algorithms behind this process don’t rely on consensus or a leader. Rather, through a mechanism analogous to how prices emerge in a free market, individual decisions affect the whole group, without the need for explicit plans or directions.
The great advantage this approach has over its insect role model is that it enables collective intelligence not only within a single swarm but also across multiple swarms. Excitingly, it even opens up the possibility of cooperation between different “species” of drones with different capabilities — working on land, water and in the air.
Multi-swarms, unlike choreographed fleet formations, are resilient in complicated, even adversarial conditions. The loss of any individu-al drone would not cripple the rest of the mul-ti-swarm because the remaining drones would seamlessly adapt. This makes multi-swarms ideal for use, for example, on the heels of natu-ral disasters, where time is of the essence and drones are likely to fall foul of hazards such as falling trees, debris and bad weather. Using a multi-swarm for search-and-rescue operations following a hurricane, earthquake, or tsunami could therefore help responders find victims faster, saving lives.
While ants have been swarming on earth for 92 million years, the multi-swarm drone model is now just entering its proof-of-concept phase. With funding from an FNR Jump Grant and a two-million euro investment in the hardware muscle needed for the high-performance com-puting that powers the algorithms behind the drones, Bouvry and Danoy look forward to pus-hing their multi-swarms to the limit. “Right now we are finding a balance between maximising the area covered and ensuring connectivity,” says Bouvry, “but I am personally most looking forward to multi-species cooperation.”
12 13back to table of contents12 13
ResearchResearch
Patents on the Radar for Automotive ApplicationsIn 1904, the German patent office awarded the first patent for radar technology. It took forty years and two World Wars, however, before radar was adopted for submarines, ships, and airplanes. And it is only now that radar is finally being incorporated into automobiles for situational awareness.
Radar still has someway to go before it will be adopted as an automotive standard. First, it must be adapted for interference (irrelevant radio waves from other cars equipped with radar) and clutter (irrelevant objects). Then, radar needs to fit into the restricted space and power limitations of cars. Finally, automotive radar operates at a much closer range than aviation and marine radar.
At SnT, Dr. Bhavani Shankar and his team are working hard to meet these challenges. Their close cooperation with leading sensor manu-facturer IEE to develop new automotive radar systems has resulted in no fewer than five patents in the last two years. And this steady output shows no sign of slowing down. “Once radar is standard in cars, we might for example be able to use it to send short emergency mes-sages,” says Shankar as he reflects on future developments.
In the short-term, automotive radar needs to be made affordable, reliable, and robust. It also needs to detect a wider range of objects more reliably. For example, without an adequate sys-tem for coping with clutter, a building or a truck
will send back a stronger signal than a pede-strian or cyclist — leaving the most vulnerable road users undetected.
This is where the team’s adaptation of Multiple Input-Multiple Output, or MIMO, radar excels. By placing sensors at different locations on the car and programming specific patterns in how they transmit, the MIMO radar can detect the objects that matter most, more reliably. It is a solution for the car of tomorrow, already making us safer today.
The 360Lab— A VEHICLE FOR COLLABORATION
“I see myself as an entrepreneur in research,” Dr. Raphaël Frank explains, sat in front of a colorful display of visual data collected by the newly built heart of SnT’s 360Lab: a self- driving car.
“We finished the car in mid-2018 and next we will be building a simulation of it,” Frank con-tinues, outlining the development of the new lab. The simulation will drive the thousands of virtual kilometres required to build a robust dataset before the real car can undertake longer driving trials on public roads.With industry giants such as IEE, Delphi and CEBI based in Luxembourg, there is a growing need for local graduates with a background in automated driving. So beyond testing the self-driving car — the first of its kind in
Luxembourg — Frank looks forward to using the 360Lab to introduce a younger generation to the new field of smart mobility. In 2019, for example, master’s level computer science workshops will provide graduates with the opportunity to explore data from and appli- cations for the lab’s state-of-the-art car.
“We also hope to work with academics from the social sciences,” Frank explains. “For example, collaborating with psychologists to study driver emotional responses, or with lawyers to examine liability issues when it comes to autonomous vehicles.”
Even closer to home, the lab will continue to help researchers at SnT to broaden their horizons, working with colleagues from across
disciplines and backgrounds to develop secure solutions for smart mobility.
Reflecting on his motivation for founding the 360Lab, Frank emphasises that his job is to “bring people together and motivate them to organise.” The goal is to maximise the potential of SnT’s talented researchers, through connec-tion and collaboration. It is the embodiment of the interdisciplinary model at SnT.
Dr. Georgios Varisteas, Dr. Amin Sajadi, Dr. Raphaël Frank,
Dr. Radu State, François Robinet
14 15back to table of contents14 15
ResearchResearch
How to Stop Ransomware in its Tracks? — TAKE AWAY ITS TOOLS
Right around the time that the WannaCry ran-somware began to wreak havoc globally, SnT’s Ziya Alper Genç, had a big idea. “It became my obsession,” says Genç. “I had this idea that I just couldn’t let go.” What Genç dreamt up was a method for preventing ransomware from encrypting files in the first place — a method that would make ransomware viruses like WannaCry harmless.
Ransomware gets onto our devices the same way all malware does — through infected emails, downloads, or unprotected internet connections. Once on a device, the malware’s first step is to produce the cryptographic tools used by the ransomware to encrypt valuable documents on the computer. Once locked, only the hackers can prompt the malware to decrypt them.
What Genç saw is — at first glance — simple: if the ransomware cannot find its cryptographic tools in the first place, then it cannot encrypt.
“We create basically a whitelist of the pro-grams that are allowed to ask for such tools and then just deny programs not on the list. So ransomware would be denied access to the instruments they need to lock your computer.” By cutting off ransomware‘s ability to do its job, the encryption process, you render modern ransomware effectively impotent.
Up to now, there have been just three levels of malware protection. Users can regularly backup their data, anti-malware programs can analyse program behaviour, or anti-malware programs can analyse a program file’s unique signature. Genç’s innovative approach is an additional fourth level of malware protection, a potential game-changer in the anti-mal-ware business. With the support of an FNR Pathfinder grant, Genç has already tested his research’s marketability — the first step to bring a new product to market. Having gathered extensive evidence that his idea works under real-world conditions and against
actual ransomware, in 2019 he will follow up with another FNR grant, this time to develop a proof-of-concept.
“Anticipating the evolution of ransomware is a must, not a luxury,” adds Dr. Gabriele Lenzini, Genç’s thesis supervisor. So while we will all soon be a little more secure, the fight will go on. But it is comforting to know that by the time the world is again gripped with panic at the next round of hacks, researchers such as Genç will almost certainly have another big idea that they just can’t let go.
Ziya Alper Genç, Dr. Gabriele Lenzini
SnT at Heart of EU Cybersecurity Push“I was always an interdisciplinary guy,” begins Prof. Dr. Paulo Esteves-Veríssimo, FNR PEARL Chair. “Electrical engineers, computer scientists and data scientists... they all have promising contributions to make to common problems. The same with dependability and se-curity — it is always a two-way street, where we learn from each other.” Esteves-Veríssimo’s team has been applying this interdisciplinary perspective to develop trustworthy cutting-edge technologies, from computer multi-cores to biomedical data analy-sis systems. They build software that is not only dependable (which is to say, safe from acci-dental malfunctions), but also secure (resistant to intentional hacks). “The systems we use today are complex, and that creates vulnerabilities. All too often,
even with a robust system, all it takes is one defect and the whole system is done. What we do is investigate innovative algorithms and mechanisms we can apply to make systems tolerate faults and intrusions in an automatic way.” And they do this from both perspecti-ves: dependability, and security. “Our critical information infrastructures need to endure and adapt, regardless of whether the problem is an accidental malfunction or a malicious attack. We call it resilience, and it needs to be built into our digital infrastructure.” Since 2016, the team has brought this unique perspective to the agenda of the European Cyber Security Organisation (ECSO), a Pub-lic-Private Partnership aimed at developing the digital infrastructure for a secure Europe. And beginning in 2019, they will continue this work as part of the H2020 initiative of Cybersecurity
Competence Networks, where SnT won highly competitive seats in three of the four networks — the only organisation in Europe to do so. With cybersecurity set to be high on the agen-da for Horizon Europe, the successor to H2020, SnT is thus extremely well positioned to shape the development of the field. Each Cybersecurity Competence Network brings together some 40 partners from across Europe, with a total initial financing of around 65 million Euros. These networks will improve the cybersecurity of the entire Digital Single Market, ensuring European-wide security for critical industries such as healthcare, energy, finance, transportation, and public administra-tion. It is an ambitious push to begin bridging the safety-security gap, ensuring that our vital infrastructures have the capacity to recover, come what may, accidents or attacks.
photo by artjazz/Shutterstock.com16 17back to table of contents16 17
ResearchResearch
LAW AND TECHNOLOGY:
How to Police the Privacy Beat
“Most websites and web services, including Google‘s, don‘t change their behaviour when they receive a Do Not Track request. Chrome doesn‘t provide details of which websites and web services respect Do Not Track requests and how websites interpret them.“ That’s how Google Chrome concludes the FAQ page on its Do Not Track privacy feature. In the box below that, you’ll find the instructions for activating the setting, just in case you still care.
The “Do Not Track” experiment, begun in 2009, is a voluntary system to allow users to request websites not to collect data on their online activities. Although most browsers offer the feature, the scheme ultimately fell apart. It was never backed with the force of law and for many websites and third-party trackers, the advantages of collecting user data far outweig-hed the benefits of complying with polite “Do Not Track” requests.
The irresistible lure of collecting increasingly invasive user data has led the European Union to pass a regulation with teeth: the General
Data Protection Regulation (GDPR). This has made clear that privacy violations are a crime, just like any other. But it also presents a new problem: we now need to develop new methods and standards for policing this brand new beat in the world of cybercrime. That’s how SnT’s Dr. Marharyta Aleksandrova and Dr. Stefan Schiffner got involved with the H2020-funded SAINT project — an internatio-nal task-force quantifying the economic cost of cybercrimes. They are developing the unders-tanding and the tools we need to enforce the new law.
Aleksandrova’s research, concluded in 2018, focused on protecting TOR users — such as journalists, whistleblowers and dissidents — who depend on strong anonymity while online. While TOR masks a user’s identity, a third party could take advantage of the differences between website metadata to launch a “finger-printing” attack, undermining TOR’s promised anonymity. To empower users, Aleksandrova has developed a tool that grades websites ba-sed on their susceptibility to this vulnerability.
This easy-to-understand privacy score will let users decide if they really want to proceed to any particular website.
Schiffner’s research, on the other hand, is more abstract. He has been working to develop a common framework for concepts outlined in the GDPR, such as “anonymity”, “confidentiali-ty”, and “privacy”, but which aren’t yet well de-fined; because before we can police violations, we need clear metrics with which to measure them. Laying the groundwork for this, Schiffner has combed through existing privacy research to map concepts and distill definitions. His aim is to formalise the existing expertise in the field of privacy research so that we can determine, for example, what really counts as the “state of the art” protections required by the GDPR. And then, finally, we might be able to really start holding corporations to account.
Dr. Marharyta Aleksandrova, Dr. Stefan Schiffner, Wladimir de la Cadena RamosDr. Peter Roenne, Dr. Dimiter Ostrev
IT WASN’T ME:
Deniability in a Post-Quantum WorldThe quantum supremacy — the point at which quantum computers will begin to outperform traditional computers — is just around the corner. Quantum supercomputers will be able to execute ultra-complex calculations so fast, it will leave our laptops looking like abaci and their processing power will drive dramatic advances in fields such as pharmaceutical, AI research, and much, much more. But when the quantum supremacy comes, one of the first changes it will bring will be to the field of cryptography. Because quantum computing will break it.
The threat to modern cryptography is a threat to everything for which we use cryptography, from securing national, critical infrastructures to our individual privacy. In anticipation of the
looming quantum shift, researchers around the world are already working on post-quantum cryptography — including SnT’s own Dr. Peter Roenne.
Dr. Roenne and the quantum team are explor- ing options for preserving our privacy in a post-quantum future when attackers might have access to quantum computers. To do this, they are researching how today’s technologies might be used to ensure deniability, the proper-ty that enables the original author, receiver, and content of the message all to remain uncertain, so everyone involved can plausibly claim, “it wasn’t me.”
Building deniability into computer security is an insurance policy against hacks and leaks,
ensuring messages can’t be pinned on you even if the unthinkable happens and somehow your encryption is broken. One way the team has been able to achieve this is by hiding mes-sages in the noise that is inherent in quantum communication itself.
Their strategy, called ‘covert communication’, can help ensure that your communication remains safe even after quantum computers change our technological realities. So, by the time quantum computing is accessible, we will have the tools we need to stay one step ahead of the next challenge to our digital privacy.
18 19back to table of contents18 19
ResearchResearch
Saving Lives at the Sharp End of Software
EngineeringWhile a “blue screen of death” on our desktop can ruin a day,
that sort of a failure in an autopilot could ruin a life.
According to the last major study in IT project failures, conducted by McKinsey and the University of Oxford, half of all large IT projects “massively blow” their budgets. These large projects (defined as IT projects starting out with a budget of over $15 million) on average exceed their budgets by about 45%. In fact, the 5,400 IT projects studied had a collective cost overrun of $ 66 billion – more than the GDP of Luxembourg. In many cases, the report suggests, these failures boil down to a lack of focus and clarity. In other words, they boil down to inadequate requirements. And while the prospect of inade-quate requirements leading to project overruns is one thing, the prospect of them resulting in software defects that could cause deaths is quite another. This is the reality faced by software engineers working in the field of cyber-physical systems, where complex software is deeply intertwined with a physical system in order to perform a vital function. From travelling in airplanes equipped with autopilot, to depending on the
anti-lock braking system in our cars, we rely almost every day on these complex, intelligent technologies. The safety of the people interacting with cyber-physical systems often depends on the embedded software working reliably. Because while a “blue screen of death” on our desktop computers can ruin a day, that sort of a failure in an autopilot could ruin lives. But SnT’s Dr. Sallam Abualhaija and Dr. Shiva Nejati are giving software engineers the tools to make our increasingly cyber-physical world safer. Dr. Abualhaija is developing a tool for ex-amining software requirements documents written for cyber-physical systems. Her tool lets project managers, software engineers, and government regulators alike comb soft-ware requirements documents to check for ambiguity, vagueness, and inconsistencies. What makes her tool particularly useful is that it seeks out only legally binding requirements. This means that stakeholders don’t get bog-ged down by supplementary information, for example regarding preferred design choices,
as they move through the requirements writing process. This lets all the parties really focus on what matters most. Dr. Nejati and her team, meanwhile, are building a technology that takes a completed requirements document and turns it into a math- ematical representation. By translating English sentences into logical equations, defects in the system can be spotted systematically. With cyber-physical systems, the software can then be checked to ensure it respects all of the systems’ physical limitations as well. Their projects, conducted in collaboration with Canada-based QRA Corp., a company specia-lising in the development of enterprise tools for software quality assurance, will help make the cyber-physical systems we interact with every day a whole lot safer.
DR. SALLAM ABUALHAIJA
Working with QRA helps us
to see beyond the research
horizon, all the way to appli-
cation. It’s like a compass
that orientates our research
efforts towards the problems
their customers and engineers
have to deal with. It’s fun!
20 21back to table of contents20 21
ResearchResearch
How to Catch 42,000 Smart Contract Vulnerabilities“In some ways with Blockchain it is like we went 30 years back in time,” explains doctoral researcher Christof Ferreira Torres. “Lessons from 30 years ago ought to apply to blockchain programming, but people have moved so fast they didn’t think of it.” Remember, for example, the panic around the turn of the millennium? Because storage was expensive, computers were only programmed to work with the last two digits of the date, e.g. “99” instead of “1999”. Computers then needed to be updated en masse to ensure that on 1 January 2000 they wouldn’t believe we had time traveled back to 1900.
Jump forward 19 years to today’s Ethereum blockchain system. Its primary programming language, Solidity, suffers from a similar error. It has failed to account for “integer over-flows” — incidents where the number of digits the computer can store is not adequate for representing the true sum. Within Ethereum’s smart contract ecosystem, this is a potentially dire problem. A malicious actor could exploit
an integer overflow to leave an account empty. That would be as simple as sending a target account the exact number of coins needed to “overflow” their balance back to “(1)0000”. The other direction is, however, also possible; a malicious actor could subtract a coin from their empty account, leaving themselves with “9999” coins after the “(1)0000” counter is wound back by one.
Today, most computer programming langua-ges have built-in guard rails against integer overflow and underflow. And indeed, the next generation of Ethereum’s programming language — Vyper — will too. But the develop-ment of that language is still ongoing and some programmers might prefer to stick with Solidity anyway. Moreover, the contracts already deployed in Solidity will, by the very nature of the blockchain, continue to exist forever.
This is where Torres can help. Working with in-dustry partner Banque et Caisse d‘Épargne de l‘État, he has developed a tool that works with
Solidity — the most widely used programming language on the Ethereum blockchain — to check for integer over and underflows. It does this by producing a control flow graph of the program, and when the tool detects a problem it can follow it back along its branch to its source. This allows Solidity programmers — and those inheriting or acquiring older contracts — to deal with errors in their coding much more efficiently.
The program has, in fact, already found 42,000 contracts with integer over- and underflow bugs — in one case even identifying a poten-tial $30,000 error. “We were floored when we found that,” says Torres, beaming. “It really highlights what a big impact our tool could have in the real world.”
Christof Ferreira TorresProf. Dr. Yves Le Traon
THIS CALIFORNIAN LIFE:
Software Solutions in Silicon Valley
Decompress. Focus your attention. Expand your perspective. That, Prof. Dr. Yves Le Traon explains, is the aim while on sabbatical. While at the University of California, Berkeley, howe-ver, Le Traon did one more thing: he connected.
“I had the opportunity to work not only with Prof. Koushik Sen at UC Berkeley, but also to go to Google and PayPal at least once every week.” Working so closely with industry means keeping your research relevant. “We can work on real solutions for real problems,” says Le Traon. At both Google and PayPal, Le Traon discussed methods for testing code and hunting for bugs in both of their continuous integration processes. The two companies, Le Traon explains, are so different that while you can take inspiration from one project to the other, they need specific solutions.
Google’s Test Automation Process (TAP) ensures that any updates to their vast software do not contain bugs or break existing software
functionality. But the process of deciding which software tests to run and when to run them needs optimisation. On top of that, Google needs to understand which tests aren’t work- ing reliably and why — a problem known in software engineering as “flakiness”. Together with Google, Le Traon hopes to develop machi-ne-learning algorithms that will ultimately help engineers select just the best tests to run.
His time at PayPal was different. “PayPal has a different software architecture and therefore different problems.” Like Google, PayPal needs to guarantee the reliability of their software. But while PayPal’s flexible service-oriented architecture is less diverse than Google‘s, the potential configurations are more complicated. On top of this, at PayPal software incidents lead to crisis situations that have to be mana-ged urgently. Their engineers need to be able to locate the root cause of an incident, the buggy code, very quickly. Add in the huge flow of real-time data and the task resembles a race
to find a needle in a haystack. The collabora-tion with PayPal focuses, therefore, not only on bug prevention done through improvements in the continuous integration process, similar to Google’s, but also on rapid incident response. In the coming year, Le Traon will recruit a team of researchers, including two PhD students, to investigate this two-pronged project.
Le Traon describes his research as “mul-ti-core.” It is an interdisciplinary model that insists on exploring diverse real-world con-texts. But the common denominator is always people: “Humans are gifted at creating a mess. The challenge in software quality is, therefore, to cope with human nature. That’s what I like about working in software engineering. There is never perfect certitude in software testing, there is always a human element. Therefore, you can never fully formalise or automate it, because you have to face the imaginative way humans tend to err.”
22 23back to table of contents22 23
ResearchResearch
In 2011, shortly after a new no-frills budget bank was founded in the UK, the CEO found himself in an unexpected situation. Customers were pouring in, but not just for no-cost checking accounts. Hundreds of high-net-worth individuals were leaving prestigious private banks to free themselves from unhelpful advice.
The heart of private banking has always been personalised customer service. But times are changing and private banking must too. SnT’s Ans-human Bhadauria has built his PhD research around bringing the custo-mer service ethos of traditional private banking into the 21st century.
In collaboration with BGL BNP Paribas, he is developing a tool that will use existing market conditions to suggest relevant products, advise on courses of action and even warn about risk in a portfolio. But this isn’t a recommendation engine like you might know from Amazon. That’s be-cause in finance, the products themselves are not static, and customer preference is influenced just as much by external economic and political factors as by previous customer choices or profile. Bhadauria’s algo-rithms, he explains, therefore look at customer portfolios “as if they were texts and use natural language processing to then identify how other investors have invested their own portfolios based on external contextual input, like stock-market conditions.” The system therefore takes into ac-count the historical actions of an investor as well as the market situation at the time of those actions to learn their preferences and needs. “Another thing that is great about our system is that ‘fairness’ is built in,” says Anne Goujon, project supervisor and Director of BGL BNP Paribas’s Data Science Lab. “Because we look only at the contents of the portfolio and the situation in markets, we make suggestions without considering customer demographic profile.” Which is good news because in the end our needs are all a lot more alike than we sometimes realise, and we all deserve the best possible decision-making support in our financial lives.
Your AI Advisor: Wealth Management in the 21st Century
Securing Banks against Digital HeistsOn 20 January 2018, two computer scientists
boarded a propeller plane in Wisconsin with an air-gapped laptop, a Geiger counter, and some radioactive material from Chernobyl. They were just one small part of what the developers of Zcash call “the ceremony” — an elaborate procedure to produce a completely random and secret cryptographic key. This key is the backbone of Zcash cryptocurrency, which promises to provide the same functionality as Bitcoin but with significantly improved privacy.
The thing is: despite the elaborate ceremony, even Zcash fails to live up to its promise of privacy. “Cryptocurrencies look anonymous, but they are not,” explains doctoral researcher Sergei Tikhomirov. That’s because the very way transactions occur on their networks can provide a savvy observer with potentially identifying information.
Which isn’t to say that cryptocurrencies cannot ever fulfill their promise of anonymity for all. Rather, as Tikhomirov points out, achieving anonymity is a “gradual process” that needs to be built into technological foundations.
So Tikhomirov, with funding first through a Zcash Foundation Grant award and an FNR Grant, spends many of his days working as a white-hat hacker. He searches for ways to exploit information on the blockchain at the network level (for example: how, where, and when a transaction is conducted). He is on the lookout for patterns in blockchain network traffic that would allow him to unmask users, many of whom believe their transactions are totally anonymous.
Once he has found a vulnerability, he suggests countermeasures at the level of the “wallet”
and the end user, leading to better privacy in blockchain transactions. But he also makes suggestions to improve the foundations of the blockchain system (called the “core”), mov- ing the entire system closer to offering true anonymity.
Someday, when blockchain-powered curren-cies are more seamlessly incorporated into our everyday lives, Tikhomirov’s work will help make privacy a real option. “Solutions like the GDPR apply old frameworks to new problems,” points out Tikhomirov. Rather, by building privacy into the technological foundations of the blockchain, maybe we can all look forward to a future where we can make genuinely empowered choices about retaining or waving our anonymity.
On the evening of 10 July 2016, two men made their way through typhoon rain to an ATM in Taipei. After the men loitered for a few minutes, the machines began to spit out cash. Hundreds of euros worth in cash. Quickly, the men picked the money up, stuffed it into a bag, and took off. They were two of fifteen “money mules” completing the final step in one of the Carba-nak gang’s high-tech bank heists.
So forget Ocean’s Eleven. Forget Bonnie and Clyde. Today’s most successful bank robbers work with software code, not a pick lock. And to protect themselves, banks rely on security requirements engineers to draw up the digital equivalent of super-secure bank vaults.These engineers determine the who, where, and how of data accessibility. They need to make sure that hackers cannot access their internal systems to inflate bank balances, transfer money or take control of ATMs. Before a security requirements engineer’s job is done, they have considered hundreds of different
parameters and developed a holistic security strategy.
And yet, the process is highly individual. Two engineers might do the same job in slightly dif-ferent ways. Often even a very capable securi-ty requirements engineer might not be able to explain why an existing system is like it is — it seems almost impossible to reverse-engineer the logic behind a set of security requirements. But Dr. Mehrdad Sabetzadeh and his colleagu-es have begun to change that. Together with their partners at BGL BNP Paribas, they are building a tool that provides automated decisi-on support for specifying security requirements from beginning to end. The aim: to standardise and streamline the security requirements engineering process.
The resulting standardisation will not only make it easier for new team members to understand the security concerns and build upon the existing groundwork more quickly. It will also
help ensure that security decisions are applied consistently across whole organisations.All of this is achieved in three broad stages. The tool will first help to define the existing se-curity architecture and indicate what features are desirable according to its logic. Second, using machine learning, it will identify com-plementary techniques and recommend how to implement them. Finally, it will use natural language processing to extract information from related textual sources, identifying further relevant security measures.
The project is an example of modern artifi-cial intelligence applied to an ultra-complex application environment — made possible by BGL BNP Paribas Bank, who granted unpre-cedented access to their expert security team. It is a unique partnership that has enabled computer-supported security assessment at a level previously unseen in research.
Building Privacy into the Blockchain
Seifeddine Bettaieb, Dr. Seung Yeob Shin, Dr. Mehrdad Sabetzadeh
Anne Goujon, Anshuman Bhadauria
24 25back to table of contents24 25
ResearchResearch
Setting the Standard for Requirements EngineersThe first step towards good software is good communication. Requirements engineers, who work at the earliest stage of software develop-ment, work closely with clients to develop ‘what’ software should do before it is passed on to developers to work out the ‘how’. Like archi-tects creating blueprints before construction, requirements engineers create outlines that software developers then turn into the code.
While architects, however, have universal stan-dards for blueprints — nobody, afterall, wants to get feet and metres confused — require-ments engineers do not. Most requirements engineering processes are bespoke. On top of this, business-oriented clients and compu-ter-science-oriented software professionals can miscommunicate, making the requirements writing process even more complicated. When all is done, there is a good chance that some requirements may end up being unclear, incomplete, or even contradictory. Errors in requirements engineering have a
ripple effect on the software development process. These errors can make multiple, un-planned project iterations necessary and result in significant headaches. This ultimately puts projects in danger of being over budget, below expectations, or even completely abandoned. But what if requirements could be made more consistent? More complete? What if there were a “blueprints” standard that requirements analysts could follow?
This is what SnT researchers in the field of software verification and validation, including Dr. Mauricio Alferez, Alvaro Veizaga, Dr. Mike Sabetzadeh and Prof. Dr. Lionel Briand are working to achieve. Together with financial firm Clearstream and IT coaching company, Escent, they are putting together a tool that guides requirements engineers through the process of developing and testing software requirements for the financial and insurance sectors. This will help identify unclear text, contradictory requirements, and inefficient workflows.
Their tool will employ artificial intelligence techniques to derive a model of how the envi-sioned software will work. This model provides an ideal mechanism for uncovering potential errors and omissions through such means as automated testing. The resulting technologies can be used from the very beginning of the requirements gathering and documentation process to guide requirements engineers in consistently following best practices and planning for later software verification and validation activities.
By ensuring that requirements are complete, clear and verifiable before they are handed down to software developers, the whole development process can be streamlined — and latent problems in the software can be fixed early so software turns out as correct and complete as possible the first time around.
Print Scheduling Solution Cures Mass Customisation Headache
We increasingly choose to print only our most important documents — documents that we hope will stand out, like colourful posters; that have a strong emotional significance, like wedd- ing invitations; or that mark major personal achievements, like thesis dissertations. That’s because paper can break through electronic distractions and hold someone’s full attention. Indeed, as it turns out, the digital revolution has not meant the death of paper — but it has meant the rise of custom printing.
Commercial printing factories remain competi-tive in the age of email by creating offers with varying degrees of customisation, order-fulfill-ment speed, and product quality. We can have our save-the-dates printed in two days’ time at bargain prices or stunning brochures guaran-teed by the morning of a big meeting.
But even without the extra complications that these bespoke offers have introduced to printing factories, the scheduling optimisation
problems faced by commercial printing ope-rations are massive. Different printing orders require different processing workflows, and complex custom orders might need to run through half-a-dozen machines or more before they are completed. How can an industry that is already so complicated handle the added complexity of mass-market customisation?
As Prof. Dr. Holger Voos explains, while “prin-ting production planning works well when it is formalised as an abstract numerical problem, managers have found that these abstract models just don’t work well with the actual chaos on the ground.” With some factories turning to conventional forms of more-or-less manual scheduling, the industry needed a tool that could handle high volumes of orders and execute remodelling. And they needed it soon, because, as Voos continues, “a perfect solution is not helpful if it comes too late. What printing factories needed was a very good solution, fast.”
They needed an algorithm that was, well, more down-to-earth. So that’s just what Voos and his team at SnT have built for them. Unlike some other approaches, their algorithm reasons based on practical constraints that can be adjusted to reflect the actual situation on the factory floor. It can accept changes in priorities, such as the arrival of rush orders, or even a shift in emphasis from quality to cost minimisation. Once adjusted, it performs a rapid search for an optimised workflow. It is the flexible tool printing factories need to execute the mass customisation of products. Working in close cooperation with their partners at Rogler — a developer of print ma-nagement solutions — Voos and his team have developed an algorithmic solution so flexible that it can be applied broadly to other industries in need of a flexible solution for mass-market customisation. It is a high-tech solution with its feet on the ground.
Standing, from left to right: Benoit Cardinael, Dr. Mauricio Alferez, Jean-Richard Riccardi, Alvaro Veizaga, Sabina RohackovaSitting, from left to right: Elene Pitskhelauri, Thomas Henin, Dr. Mehrdad Sabetzadeh
26 27back to table of contents26 27
ResearchResearch
DIGITAL MEDICAL SYSTEMS:
Who’s Accessing Your Data?
Dr. Dayana Spagnuelo
3D Tech for Stroke SurvivorsWalking into the 4th floor conference room at SnT, I was expecting to see something big and unusual. I was on my way to participate in a trial of 3D motion detection and body repre-sentation for a piece of software that promises to improve the recovery process for stroke patients in Europe. But opening the door, all I saw was a small black box like a DVD player and a big screen monitor; it all seemed rather ordinary.
The fact that the hardware setup for the STARR project’s software is so economical is part of its brilliance. Through the H2020 STARR project (short for Decision SupporT and self-mAnage-ment system for stRoke survivoRs), SnT is developing a home-support system for stroke patients and their doctors. It provides real-time feedback as the patient performs physical therapy exercises in the comfort of their home, and it gives doctors the data they need to ensu-re that their patients keep making progress.
It isn’t just the equipment that resembles a video game. What patients see on the screen
is reminiscent of a game too: a stick person mirrors their movements, moving as they move, with limbs turning green, yellow, and red. This cartoon avatar tells patients if they are perfor-ming their exercises correctly; lean too far to one side and the spine turns yellow. Bend over and the spine turns red.
What is especially innovative about this system is that the “ideal” motion the patient should perform is not only measured against a physical therapist’s example; at the start of their program, patients perform their physical therapy exercises with the unaffected side of their body. Their own dexterity is then taken as the baseline that they are working to achieve with the affected side. This process is powered by the team’s movement optimisation feedback algorithm. “That has been the main building block” says Dr. Djamila Aouada, the project leader.
Beyond guiding patients in their exercises, the setup ensures patient safety. Should the patient fall down or deviate wildly from their
regular motion, their doctor or therapist can be notified immediately. They can check in on patients personally or even send an ambulance to address the situation.
“The whole process is always driven by the patients first and foremost. That’s what is really important to us in this project,” says Dr. Aoua-da. Take the posture feedback, for example: “That was something patients explicitly wan-ted, so we made it happen. And in the end, we turned that work into an award-winning paper.” It is a human-centred approach to academic excellence in computer science.
Dr. Enjie Ghorbel, Dr. Abd El Rahman Shabayek, Renato Baptista, Dr. Djamila Aouada
In June of 2018 security researchers disco-vered that the American marketing company Exactis had inadvertently leaked the private information of over 218 million people. Not only was the data leak massive, but for the vast majority of people, the first time they heard of Exactis was when they found out the company had leaked their personal information to the world.
Data breaches increasingly affect people who had no idea that the company in question ever had their data. This is because data is often passed along channels that we as consumers — who pay for the services we love with our data — are not made aware of. While this sort of surprise is bad enough when just your email address is leaked, what if it were part of your health records? Your pregnancy result? HIV status? Prescription records?
While digitalising medical records can be a tool to empower patients, it is essential that
patients understand (and ultimately control) who then gets to access that data. Even with this transparent handling of data, as required by the new European GDPR law, we might not be able to exclude the possibility of accidents, but we can preclude the possibility of unplea-sant surprises.
But what exactly counts as “transparent” anyway? Is the usual fine print, supposedly defining what data is being collected, why and by whom, good enough? While researchers have been examining standards of data privacy (including concepts of transparency) for years, they have not all been using a common vocabulary, let alone a common framework. And that’s where doctoral candidate Dayana Spagnuelo comes in.
In her research — conducted under the super-vision of Dr. Gabriele Lenzini and in collaborati-on with researchers in Luxembourg, Brazil, and Portugal — she examined the various ways
transparency has been defined and assessed. She also clarified the building blocks of trans-parency, such as the availability, portability, and readability of information, the verifiability of a system, and the auditability of privacy policy compliance.
Using her definition of transparency and outline of its building blocks, Spagnuelo developed a checklist of requirements that developers can reference when creating transparent-by- design digital medical systems. She also developed metrics by which they can evaluate transparency in existing systems. This means that we can look forward to a future where we know exactly where, how and by whom our medical data is processed. While we might never have control over all contingencies, we can expect fewer surprises and will be able to hold the individuals and corporations who do have our most valuable data to account.
28 29back to table of contents28 29
ResearchResearch
Fast but Secure Processing
for Your DNABecause sequencing your genome should empower you as an individual, our researchers are putting control over the
data where it belongs — in your hands.
Humans have much more in common with one another than we sometimes imagine. Indeed, only 3% of DNA is unique to a person, while the balance is shared with the rest of humanity. But that 3% is powerful. It determines eye color, height, and bone structure. It can make you smarter and healthier than your neighbours. Or it could give you a tendency to put on weight, an inability to digest lactose, or a predisposition to developing a number of life-threatening diseases. As our understanding of the genome develops, medicine is searching for treat-ment options guided by the patient’s genetic makeup. Already companies sell kits to map your genome in the comfort of your own home, using equipment smaller than a loaf of bread. Other “mail-order” services map your genome in the lab.
To date, the process has focused on complete, accurate results. But an important question remains: what happens to those results? Who controls the data? How should it be stored? These privacy and security driven questions have hardly been considered. As researcher Dr. Jérémie Decouchant puts it, “I would like
info on my DNA, but I, as a computer scientist, don’t trust the stakeholders or their computing infrastructures.” There is, after all, no data more sensitive than that 3% of your genome. That’s why Decouchant and doctoral resear-cher Maria Fernandes have developed a new methodology for human genome analysis that keeps 10% of the information produced truly secure. 90% of the genome can be processed as usual — it is, after all, information that is common to all humans. The remaining 10% (including that discriminating 3%) can then be processed either locally or in a secure enclave in the cloud. This system has the important advantage of leaving private data in the own- er’s control, and crucially, it is only marginally slower than the standard way of processing the human genome.
With this control, you decide who gets to see your data and when. You could take any infor-mation that might be relevant to a nutritionist, for example, with you to your appointment and would not have to reveal unrelated details. And you could ensure that insurance companies,
hospitals or even employers cannot use your data to make decisions about your premium, eligibility or treatment options.
Because sequencing your genome should empower you as an individual, Decouchant and Fernandes are putting control over the data where it belongs — in your hands. And having filed a patent last year and recently launched a Proof of Concept funded by FNR, they are looking forward to taking their work another step nearer to application. So consider waiting just a bit longer before you get your genome sequenced. A better approach is just a short way off.
Maria Fernandes, Dr. Jérémie Decouchant
30 31back to table of contents 31
Research
30
Research
Satellite Pre-coding Clears Congested Airwaves
These precise alterations, called “pre-coding”, are calculated based on interference informa-tion received along with test signals already being sent for synchronisation purposes. Moreover, this pre-coding does not require any alterations to existing satellites — it can be accomplished with simple processing power upgrades at the earthbound transmitter.
Pre-coding transmissions in this way allows multiple transmissions to be sent simultaneous-ly on the same frequency. The end effect for frequencies is like that of the skyscraper for land: you can layer multiple transmissions on
top of each other. Just as skyscrapers have elevators with buttons to reach the floor you need, these layered transmissions arrive with the keys needed to clean up the signal to focus on any given one. This means telecoms can make significantly better use of their allocated frequencies.
Together with SES and Airbus, and with funding from the European Space Agency, SnT’s LiveSatPreDem project is implemen-ting the theoretical framework produced by SERENADE. So perhaps very soon we can expect a significant improvement in the quality
of Internet on airplanes, boats and in remote regions — or more prosaically, as Dr. Nicola Maturo, researcher on the LiveSat project said with a smile, “with these data-capacity impro-vements, before long we will be able to receive a lot more channels on Ultra-HD satellite TV.”
“Buy land, they’re not making any more of it.” Mark Twain’s famous advice was probably sound for the generation that came after him. But then, things changed. While land remains a finite resource, the way we use it would hardly be recognisable to Twain. We work and live, for example, in buildings hundreds of metres taller than anything he could have imagined. Yes, physical space remains finite. It is the way we relate to that space and use it that has changed dramatically.
Like land, the radio frequency spectrum, including the frequencies used for satellite communications, is also a finite resource. And each year, the demands we put on it have been increasing; telecommunications companies have been preparing for a coming frequency crunch. But thanks to SnT’s SERENADE project, they might not need to look quite as far to find the satellite bandwidth they need — because the way they utilise frequencies they already have is about to change.
Up to now, telecoms have had to minimise interference by leaving dedicated buffer frequencies empty and then sending only one signal on a frequency at a time. Last year, however, the FNR-funded project SERENADE, led by Dr. Symeon Chatzinotas with Dr. Juan Carlos Merlano Duncan, developed a method of altering wavelengths to cancel out the anticipated inference, leaving simultaneous messages crystal clear.
Access the Internet wherever and whenever you need to, whether in a plane or out at sea
Dr. Jorge Querol Borras, Dr. Nicola Maturo, Dr. Juan Merlano Duncan
32 33back to table of contents32 33
ResearchResearch
33
TECHNOLOGY TRANSFERSnT has a broad range of vehicles for ensuring that we play a central role in Luxembourg’s innovation ecosystem. Whether we are putting our researchers in direct contact with industry through our Partnership Program and business network, or encouraging entrepreneurial activity all the way through from patenting to spin-offs, we ensure that our research has socio-economic impact.
Jacek Plucinski and Jose Soares bridge the gap between research and industry.
34 35back to table of contents
SnT Partners 2018In 2018 SnT’s Partnership Program counted 43 industry and public partners. In addition to collaborating on projects with our research partners, we also foster communication and knowledge sharing between the key players in Luxembourg’s innovation ecosystem with our networking partners.
In 2018, nine new partners joined the SnT Partnership Program. Meet the latest companies to join the program:
Cebi is a global developer and manufacturer of electromechanical components for the automotive and household appliance industries. SnT resear-chers will work with Cebi Luxembourg S. A. to make Industry 4.0 a reality at their flagship factory in Luxembourg.
Foyer S.A is a leading player in Luxembourg in the local life and non-life insurance market, with activities in several European countries through insurance, benefit protection insurance and wealth management. In two projects, SnT will work on data analytics for personalised insurance, and risk assessments based on driving data fused from multiple sources while maintaining user privacy.
Linklaters is a leading global law firm, supporting clients in achieving their strategies wherever they do business. This project will help organisations come to terms with the implications of the new GDPR regulation by converting the legal texts into an intuitive and machine-analysable format, opening the way for computer-assisted compliance analysis.
VNX Exchange is a marketplace and trading platform for tokenised venture capital assets, aiming to unlock liquidity for the venture capital industry. Through this partnership, SnT researchers will design new IT frameworks facilitating the secure exchange of digital assets on blockchain networks.
Huawei is a leading global provider of ICT infrastructure and smart devices. In this project, SnT researchers will develop automated tools for testing Android smartphone updates, replacing the painstaking manual process of identifying “regression faults” in Android OS updates.
The LHoFT Foundation is a public-private sector incubator initiative that drives technology innovation for Luxembourg’s financial services industry, connecting the domestic and international Fintech community to develop solutions that shape the world of tomorrow. This networking partnership will enable SnT researchers to interact with the start-ups and institutions making use of the Fintech innovation hub.
RESEARCH PARTNERS
NETWORKING PARTNERS
36 37back to table of contents36 37
Technology Transfer Technology Transfer
Partnership ProgramPublic and private organisations collaborate with SnT to open up new possibilities using cutting-edge concepts in computer science and ICT. Guided by a partner’s domain knowledge, SnT researchers bring their expertise to bear on specific industry pain points, from the need to improve efficiency in software testing to challenges in making smart manufacturing a reality.
Boosting the Innovation Ecosystem
OUR SPIN-OFFS
SPOTLIGHT ON MOTION-S2018 was a landmark year for SnT spin-off Motion-S, which closed its first round of investment with one million euros from FEBIAC, the federation of automotive manufacturers and importers in Belgium and Luxembourg.
Motion-S collects, augments and analyses mobility data for the insuran-ce market. The spin-off will now take the next step in its journey, expan-ding its data services to encompass the full range of modern mobility, from car sharing to fleet management and predictive maintenance.
> www.motion-s.com
A STRONG NETWORKInnovations don’t make it all the way from discovery to commercialisa-tion by chance – the transition requires a robust network of players from across the research and innovation ecosystem.
To make this network a reality, SnT works closely with government, trade offices, SMEs, large corporates, and entrepreneurs and investors, orga-nising events and other platforms to share knowledge (see all events on pages 46-47).
In 2018, SnT was delighted to launch a new collaboration with The Luxembourg House of Financial Technology (LhoFT), bringing our re- searchers into daily contact with the firms and institutions making use of Luxembourg’s Fintech incubator.
PATENTED
1. Acquiring Ideas 2. Lab Development 3. Market Research & Validation
5. Minimum Viable Product 4. IP Protection6. Business Model7. License Agreement8. Spin-off
Research and Development Stage
Proof of Concept StageTransfer Stage
CULTIVATING ENTREPRENEURSHIPOur researchers are encouraged to be entrepreneurs. Regular training sessions on IP commercialisation together with ideation camps at the University of Luxembourg Incubator help them to develop the skills they need to build a business from an idea.
On the practical side, IP experts are always on-hand to help researchers navigate the winding road from research results and invention disclosures through to proof of concepts and spin-offs.
WHY COLLABORATE WITH SNT?This combination of scientific excellence and domain knowledge results in technological solutions that are applicable and scalable in real contexts, providing a long-lasting competitive advantage for companies in Luxembourg and beyond.
MORE PRECISELY, PARTNERS BENEFIT FROM:
• Joint research results and Intellectual Property (IP) commercialisation rights
• Leveraging of public research funding
• Scientific knowledge and research excellence
• Access to research equipment
• Highly specialised talent for future hiring needs
• IP management expertise
• Networking across Luxembourg’s innovation ecosystem
HOW DOES A PARTNERSHIP WORK?The Partnership Program provides an attractive form of collaboration with SnT. Project costs are split 50/50, and the Program leverages European and national public research funding.
SnT and the partner define a three-to-four-year project, addressing a specific industry challenge and targeting results of long-term scientific value
SnT recruits an Industrial PhD candidate for the project. S/he will conduct applied research within a team of experienced SnT scientists
A steering committee monitors and evaluates the project, ensuring that activities remain in line with project goals
Experts in Intellectual Property at SnT work with the partner to identify and protect re-search results with potential commercial value
A KEY PART OF OUR RESEARCH MODELOur scientists are inspired by the challenge of conducting academic research in the face of industry realities. These collaborations provide a different perspective, allowing them to tackle well-defined problems within well-understood domains. The results? IP for licensing and com-mercialisation, and award-winning papers and theses.
DATATHINGS
1
2
3
4
Jacek Plucinski, Isabelle Chesnay, Dr. Marc Lemmer and Jose Soares work on technology transfer and partnership development.
38 39back to table of contents38 39
Technology Transfer Technology Transfer
ABOUT USThe University of Luxembourg launched its Interdisciplinary Centre for Security,
Reliability and Trust (SnT) in 2009. SnT has a two-fold approach focusing on both
collaborative demand-driven research and high-risk, long-term research projects.
The Centre brings 290 staff, from some 40 nationalities, together in Luxembourg.
Nine research groups with complementary expertise tackle the biggest problems
facing industry and society in Luxembourg and beyond.
Serket Quintanar Guzman and Anush Manukyan conduct research in automation and robotics. SnT is strategically located on Kirchberg (pictured here) and in Belval.
40 414140 back to table of contents
OrganisationThe SnT Advisory Board advises the President of the University of Luxem-bourg on the Centre’s activities. The SnT Director, supported by the Management Board (see pages 44–45), is responsible for the day-to-day management of the Centre.
Facts and Figures
Location and Labs
2018 SNT EXPENSES (IN KEUR)2018 SNT CONSUMED INCOME (IN KEUR)
SNT 2014–2018 CONSUMED INCOME PER SOURCE (IN KEUR)
For me, SnT is one of the strongest arguments for Luxembourg’s achievements in terms of research excellence. The list of inter- national players that have chosen SnT as a research institute is truly impressive and because of SnT, I can tell our international partners:
“Yes, we have innovation in Luxembourg, we’re even a technology exporter!”
ANNE-CATHERINE RIESPREMIER CONSEILLER DE DIRECTION,
MINISTÈRE DES COMMUNICATIONS ET DES MÉDIAS, LE GOUVERNEMENT DU
GRAND-DUCHÉ DU LUXEMBOURG
0UL Partners EU/ESA FNR Other
2018
2014
2015
2016
20171,000
2,000
3,000
4,000
5,000
6,000
7,000
8,000
398 (2 %)
6,919 (33 %)
7,586 (37 %)
UL
Partners
EU/ESA
FNR
Other
2,092 (10 %)
3,808 (18 %)
SnT is strategically located on two sites – one in the centre of Luxembourg’s Kirchberg financial district and one on the University’s vibrant Belval Campus.
When SnT researchers are refining their work for real-world application, they can test and vali-date their ideas on state of the art hardware and software in SnT’s laboratory infrastructure. To date, we count some 10 labs that offer unique environments for work relating to computer vision, satellite communications, autonomous driving, aerial robotics, server networks, cybersecurity and safety and Artificial Intelligence.
CENTRE ADVISORY BOARD*
Stéphane Pallage, Chairman President, University of Luxembourg
Erica Monfardini Director of Administration, University of Luxembourg
Anne-Catherine Ries Premier Conseiller de direction, Ministère des Communications et des Médias, Le Gouvernement du Grand-Duché du Luxembourg
Pierre Zimmer Chief Information Officer, POST
Ruy Pinto Chief Technology Officer, SES
*as of 15.02.2019
SNT MANAGEMENT BOARD
1,931 (9 %)
629 (3 %)
875 (4%)
1,042 (5 %)
385 (2 %)
1,101 (6 %)
14,604 (70%)
Manpower expenses
Sub-contracting
Investments
Travel
Repres. & Registr.
Operating exp.
In-Kind contributions
42 43back to table of contents42 43
About us About us
LeadershipSnT’s Management Board consists of internationally renowned experts from across the ICT landscape. We provide them with a platform to do research that matters.
Under their leadership, computer scientists at SnT conduct outstanding research driven by industry needs, collaborate on interdisciplinary solutions to complex problems, and nurture the next generation of specialists in ICT.
PROF. DR. BJÖRN OTTERSTEN, SNT DIRECTORSIGNAL PROCESSING AND COMMUNICATIONS RESEARCH GROUP (SIGCOM)
SIGCOM focusses on signal processing in wireless communications, radar and computer vision. Applications range from satellite systems to vehicular sensors and 3D body modelling.
PROF. DR. LIONEL BRIAND, SNT VICE-DIRECTORSOFTWARE VERIFICATION AND VALIDATION RESEARCH GROUP (SVV)
SVV develops novel and effective techniques to ensure that software systems are reliable, safe, secure, and compli-ant. Their work heavily relies on artificial intelligence and is done in collaboration with partners in domains such as satellite, automotive, finance, public service, and legal.
PROF. DR. ALEX BIRYUKOVCRYPTOLUX RESEARCH GROUP
CryptoLux strives for a greater understanding of how cryptosystems get broken in the real world, how they can be de-signed and implemented to better resist attacks, and how they should be used to build secure systems and networks.
PROF. DR. THOMAS ENGELNETWORKING RESEARCH GROUP (NETLAB)
NetLab works on privacy by distribution, network and system security, Supervisory Control and Data Acquisition and cybersecurity, IoT, vehicular communication and multimodal traffic management, and wireless networks and mobile security.
PROF. DR. PAULO ESTEVES-VERÍSSIMOCRITICAL AND EXTREME SECURITY AND DEPENDABILITY RESEARCH GROUP (CRITIX)
CritiX investigates methods and architectures to ensure systems resilience in an automated way, keeping them safe, secure and operational even in the face of unexpected threats, like when compromised by highly skilled and well equipped hacker attacks. Such systems include autonomous driving, e-health, blockchains, or powergrids.
PROF. DR. YVES LE TRAONSECURITY, REASONING AND VALIDATION RESEARCH GROUP (SERVAL)
SerVal focusses on three areas: testing, debugging and repair techniques; mobile security and reliability using static code analysis and machine learning; and model-driven engineering with a focus on analytics and artificial intelligen-ce. They work on applications ranging from automated Android app debugging to IoT data analytics with decision making capabilities.
PROF. DR. PETER Y. A. RYANAPPLIED SECURITY AND INFORMATION ASSURANCE RESEARCH GROUP (APSIA)
APSIA specialises in the mathematical foundations of cybersecurity and the design and modelling of security proto-cols (classical and quantum). Applications range from electronic voting systems to privacy enhancing technologies. The group also performs interdisciplinary research in cybersecurity, with close collaborations with social sciences, physics and law.
DR. RADU STATESERVICE AND DATA MANAGEMENT IN DISTRIBUTED SYSTEMS RESEARCH GROUP (SEDAN)
SEDAN works on blockchain, cloud computing, and data analytics, developing new architectures, algorithms and approaches for dealing with ever-increasing volumes of data. Applications range from blockchain infrastructures for KYC and digital trading to analysis and visualisation of big data for public utilities.
PROF. DR. HOLGER VOOSAUTOMATION AND ROBOTICS RESEARCH GROUP
Automation and Robotics investigates approaches to perception, control, adaptation and learning for networked autonomous cars, service robots, drones and space robots. In large-scale distributed systems it works on novel distributed estimation, control and optimisation algorithms.
Operations
ISABELLE CHESNAYADMINISTRATION
As Head of Office, Isabelle Chesnay guarantees the efficient support of SnT’s researchers from an administrative perspective, while also complying with University policies and procedures.
DR. MARC LEMMERTECHNOLOGY TRANSFER
Marc Lemmer’s team shapes the Centre’s interaction with industry, enables IP commercialisation and fosters entre-preneurship throughout the country and at international level.
44 45back to table of contents44 45
About us About us
EventsDISTINGUISHED LECTURESProf. Stephen Boyd (Stanford University, USA): Convex Optimisation, July 2018Prof. Bryan Ford (Swiss Federal Institute of Technology in Lausanne, Switzerland): Coins, Clubs, and Crowds: Scaling and Decentralisation in Next-Generation Blockchains and Cryptocurrencies, December 2018Prof. Francois Coallier (École de technologie supérieure, Canada): Engineering Challenges in IoT based Systems, December 2018
SCIENTIFIC EVENTSFlysec Proof of Concept at lux-Airport by Aurel Machalek, February 2018SatNEx IV Summer School 2018 by Dr. Bhavani Shankar, Dr. Symeon Chatzinotas and Prof. Dr. Björn Ottersten. In collaboration with SES, May 2018International Conference on Dependable Systems and Networks (DSN 2018) by Prof. Dr. Paulo Esteves-Veríssimo, June 201874th Meeting of IFIP Working Group 10.4 by Prof. Dr. Paulo Esteves-Veríssimo, June 2018ATENA H2020 Workshop by Dr. Florian Adamsky, October 2018
SnT hosted 27 Research Seminars during 2018.
BUSINESSGDPR Roundtable Session 1: Legal Solutions: How to Accommodate the GDPR Challenges in Your IT Contracts by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, December 2017GDPR Roundtable Session 2: Big Data Projects: How to Draft Efficient and Pragmatic Privacy Policies? by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, January 2018GDPR Roundtable Session 3: Help Me, I’m Hacked – Incident Management and GDPR Governance by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, February 2018GDPR Roundtable Session 4: International Data Transfers by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, March 2018
Data Centres, GPUs and Machine Learning. In collaboration with Digital Luxembourg, March 2018GDPR Roundtable Session 5: GDPR and New Technologies by Dr. Andra Giurgiu. In collaboration with Stibbe and FDEF, April 20187th SnT Partnership Day, June 2018VNX Partnership Launch Event, November 2018
SnT hosted 11 Meetups during 2018, welcoming professionals from Data Science Luxembourg and JavaScript Luxembourg.
TRAININGSA New Awareness of the GDPR By Dr. Sandine Munoz and Christian Hutter, March 2018Turning Your Research into a Proof-Of-Concept Proposal Worth Funding by Dr. Jeff Skinner, October 2018
PUBLICShapify 3D Scanning at Belle Étoile by Dr. Djamila Aouada, August 2018Aerial Robotics Lab Open House by Dr. Miguel A. Olivares-Mendez. Part of European Robotics Week 2018, November 2018FNR Researchers’ Days, November 2018
SPOTLIGHT ON: GDPR ROUNDTABLE SERIESThe European General Data Protection Regulation (GDPR) came into play on 25 May 2018. In the lead up, professionals from across industries were struggling to come to terms with its implications. SnT legal expert, Dr. Andra Giurgiu took the opportunity to lead the discussion in a popular series of five monthly GDPR roundtables. Stakeholders and experts gathered to tackle subjects ranging from IT contracts and privacy policies for big data projects to applying the law to new disruptive technologies.
The Shapify team at Belle EtoileFrances May Lintag (VNX) and Alex Panican (LHoFT) moderating the VNX partnership launch event
GDPR Roundtable Debates Marc Hansen and their Royal Highnesses Princess Stéphanie and Prince Guillaume attending Partnership Day 2018
46 47back to table of contents46 47
About us About us
Heads of SnT research groups
• OTTERSTEN, Björn, Prof. Dr., Director• BRIAND, Lionel, Prof. Dr., Vice-Director• BIRYUKOV, Alex, Prof. Dr.• ENGEL, Thomas, Prof. Dr.• LE TRAON, Yves, Prof. Dr.• RYAN, Peter, Prof. Dr.• STATE, Radu, Dr.• VERÍSSIMO, Paulo, Prof. Dr.• VOOS, Holger, Prof. Dr.
Affiliated Faculty• BOUVRY, Pascal, Prof. Dr.• COLE, Mark, Prof. Dr.• CORON Jean-Sebastien, Prof. Dr.• HILGER, Jean• HOFMANN, Mahulena, Prof. Dr.• KELSEN, Pierre, Prof. Dr.• LEPREVOST, Franck, Prof. Dr.• MARTIN, Romain, Prof. Dr.• MAUW, Sjouke, Prof. Dr.• MAX, Charles, Prof. Dr.• VAN DER TORRE, Leon, Prof. Dr.• VITI, Francesco, Prof. Dr.
Senior Research Scientists• CHATZINOTAS Symeon, Dr.• KLEIN, Jacques, Dr.• LENZINI, Gabriele, Dr.• NEJATI, Shiva, Dr.• SABETZADEH, Mehrdad, Dr.
Research Scientists• AOUADA, Djamila, Dr.• BIANCULLI, Domenico, Dr.• BISSYANDÉ, Tegawendé F., Dr.• FRANK, Raphael, Dr.• LAGUNAS, Eva, Dr.• MYSORE R.R., Bhavani Shankar, Dr.• OLIVARES-MENDEZ, Miguel Ángel, Dr• PANCHENKO, Andriy, Dr.• PANG, Jun, Dr.• PAPADAKIS, Michail, Dr.• PASTORE, Fabrizio, Dr.• SHARMA, Shree Krishma, Dr.• VÖLP, Marcus, Dr.
Research Associates• ABUALHAIJA, Sallam, Dr.• ADAMSKY, Florian, Dr.• ALAEEKERAHROODI, Mohammad, Dr.• ALEKSANDROVA Marharyta, Dr.• ALFEREZ Mauricio, Dr.• AL HRAISHAWI, Hayde, Dr.• ALLIX, Kevin, Dr.• ANDRENACCI, Stefano, Dr.• ANTONELO, Eric, Dr.• BANA, Gergely, Dr.• BANIASADI, Zohreh• BARTEL, Alexandre, Dr.• BARTOLINI, Cesare , Dr.• BEIERLE, Christof, Dr.• BEN FADHEL Ameni, Dr.• BEZZAOUCHA, Souad, Dr.• BOYTSOV, Andrey, Dr.• BRUST, Matthias, Dr.• BHAUMIK, Ritam, Dr.• CASINI, Giovanni, Dr.• CASSAGNES, Cyril, Dr.
• CAZZATO, Dario, Dr.• ·CECI, Marcello, Dr.• DAS, Rig, DR.• DASHEVSKYI, Stanislav, Dr.• DECOUCHANT, Jérémie, Dr.• DELERUE ARRIAGA, Afonso, Dr.• DEMISSE, Girum Getachew, Dr• DENTLER, Jan Erik, Dr.• DERR, Erik, Dr.• FALK, Eric, Dr• FUHRER, Detlef• GADYATSKAYA, Olga, Dr.• GHATPANDE, Sankalp• GHORBEL, Enjie, Dr.• GIURGIU, Andra, Dr.• GOKNIL, Arda, Dr.• GONZALEZ, Carlos A., Dr.• HAMMERSCHMIDT, Christian, Dr• HARTMANN, Thomas, Dr.• HOCHGESWENDER, Nico, Dr.• HOMMES, Stefan, Dr.• IOVINO, Vincenzo, Dr.• JOROUGHI, Vahid, Dr.• JUKSS, Maris, Dr.• KAISER, Daniel, Dr.• KANNAN, Somasundar, Dr.• KAYHAN, Farbod, Dr.• KEN IANNILLO, Antonio, Dr.• KHOVRATOVICH, Dmitry, Dr.• KIBRIA, Mirza Golam, Dr.• KIM, Dongsun, Dr.• KINTIS, Marinos, Dr.• KISSELEFF, Steven, Dr.• KOZHAYA David, Dr. • KUSHNIAROU, Artsiom• LAGRAA, Sofiane, Dr.• LADID, Latif, Dr.• LEI, Lei, Dr.• LI, Li, Dr.• LI, Daoyuan, Dr.• LIU Zhe, Dr.• MACHALEK, Aurel, Dr.• MALEKI, Sina, Dr.• MATURO, Nicola, Dr.• MAZZALI, Nicolò, Dr.• MEIRA, Jorge, Dr.• MENGHI, Claudio, Dr.• MERLANDO DUNCAN, Juan Carlos, Dr.• MESTEL, David, Dr.• MONTERO, Leandro, Dr.• MSADEK, Nizar, Dr.• NAVEH, David, Dr.• OSTREV, Dimiter Valentinov, Dr.• OSVIK, Dag Arne, Dr.• PANICHELLA, Annibale, Dr.• PAUL Soumya, Dr. • QUEROL, Jorge, Dr.• RAHLI, Vincent, Dr.• RAMIREZ-CRUZ, Yunior, Dr.• RIAL DURAN, Alfredo, Dr.• ROBALDO, Livio, Dr.• ROBERT, Jérémy, Dr.• ROENNE, Peter, Dr.• ROSALIE, Martin, Dr.• ROSIE, Razvan, Dr.• SAHIN GEBIZLI, Ceren, Dr.• SAJADI ALAMDARI, Amin, Dr.• SANCHEZ LOPEZ, Jose Luis, Dr.• SANNIER, Nicolas, Dr.• SASSIOUI, Redouane • SCHIFFNER, Stefan, Dr.
• SCHMITZ, Sandra, Dr.• SHABAYEK, Abd EI Rahman, Dr.• SHBAIR Wazen, Dr.• SHIN, Donghwan, Dr• SHIN, Seung Yeob, Dr.• SKROBOT Marjan, Dr.• SOLTANA, Ghanem, Dr• SOUA Ridha, Dr.• SPANO, Danilo, Dr.• SYMEONIDIS, Iraklis, Dr.• TASSAN-ZANIN- CASER, Virgil• THOME, Julian, Dr.• TORRE, Damiano, Dr.• TRUJILLO, RASUA Rolando, Dr.• TSAKMALIS Anestis, Dr• TSINOS, Christos, Dr.• TURCANU, Ion• VARISTEAS, Georgios, Dr.• VU, Xuan Thankg, Dr.• VUPPALA, Satyanaryana, Dr.• WANG, Chunhui, Dr• WANG, Jun, Dr.• WANG, Qingju, Dr.• XIANG, Lin, Dr.• YAKUBOV, Alexander• YANG, Yang, Dr.• YU, Jiangshan, Dr.
PhD Candidates• AHMED, Eman • AMIN, Sleimi• ANNAIYAN, Arun• ANTONIADIS, Nikolaos• ARORA, Aakash• ATASHPENDAR, Arash• BADAWY, Haythem Kamel • BANDI, Ashok • BAPTISTA, Renato• BELLESI, Melissa• BEN ABDESSALEM, Raja• BENEDICK, Paul-Lou• BETTAIEB, Seifeddine• BHADAURIA, Anshuman• BOMMARAVENI, Shrikanth• BOUFAIED, Chaima• CAMINO, Ramiro• CAO, Tong• CARETTE, Antonin• CARVALHO OTA, Fernando Kaway • CASTILLO LOPEZ, Manuel• CHAOUCH, Karim• CHARLIER, Jérémy• CHERENKOVA, Kseniya• CIMARELLI, Claudio• CORNELIUS, Gary• DAMODARAN, Aditya• DANEGGER, Christian• DE LA CADENA, Wladimir• DERRMANN, Thierry• DI MAIO, Antonio• DILMAGHANI, Saharnaz Esmaielzadeh• DOKHANCHI, Sayed Hossein• DOMOUCHTSIDIS, Stavros• DU, Manxing• EZZINI, Saad• FEHÉR, Dániel• FERNANDES, Maria• FERREIRA TORRES, Christof• FIZ PONTIVEROS, Borja Beltran• FU, Shange• GAALOUL, Khouloud
• GAO, Jun• GAUTAM, Sumit• GENÇ, Ziya Alper• GINI, Agnese• GLAUNER, Patrick• HAJRI, Ines• HAMMES, Christian• HAQIQATNEJAD, Alireza• HURIER, Médéric• JAFARNEJAD, Sasan• JIMENEZ, Matthieu• KAIAFAS, Georgios• KHAN, Nida• KIEFFER, Emmanuel• KISUB, Kim• KODHELI, Oltjon• KOLBE, Niklas• KONG, Pingfun• KORRAI, Praveenkumar• KOYUNCU, Anil• KREMER, Paul• KREUTZ, Diego• KRIVOCHIZA, Jevgenij• KUI, Liu• LAMBERT, Christoph• LAMHAR, Salima• LEE, Jaekwon• LESAGE Laurent• LIU, Chao• LOPEZ BECERRA, José Miguel• LUDIVIG, Philippe• MAI, Xuan Phu• MANUKYAN, Anush• MAYOUCHE, Abderrahmane• MEHRIZI RAHMAT ABADI, Sajad• MENGALI, Alberto• MESSAOUDI, Salma• MIRTO, Cristian• MOSTAANI, Arsham• MOULINE, Ludovic• MULLER, Steve• NORVILL, Robert• OYEDOTUN, Oyaebade• PANDI PERUMAL, Raja • PAPADOPOULOS, Konstantinos• PARRY GOWHER, Majeed• PASCOAL, Tulio• PEJO, Balazs• PIERINA BRUSTOLIN SPAGNUELO, Dayana• PILGUN, Alexandre• PINTO GOUVEIA, Ines• POLGE, Julien• POLITIS, Christos• QADEER, Rizwan• QUINTANAR GUZMAN, Serket• RAEI DEHAGHI, Ehsan• RIOM, Timothée• RIVERA, Sean• ROBINET, François• RWEMALIKA, Renaud• SAINT, Alexandre• SAMIR LABIB, Nader• SANCHEZ GUINEA, Alejandro• SCHMITT, Xavier• SEDIGHI, Saeid• SHAFT, Brian• SIGNORELLO, Salvatore• SOROUSH, Najmeh• SPIGNOLI, Lorenzo• STEICHEN, Mathis• STOJKOVSKI Borce
• SU, Cui• TESSARO LUNARDI, Willian• TIKHOMIROV, Sergei• TITCHEU CHEKAM, Thierry• UDOVENKO, Aleksei• VAN WIER, Jeroen• VARMAZYAR, Mojtaba• VÁZQUEZ SANDOVAL, Itzel• VEIZAGA CAMPERO, Alvaro Mario• VITTO, Giuseppe• VUKOTIC, Ivana• WANG, Anyue• WANG, Jun • WANG, Min• WASIM Muhammad Umer• WEI, Ma• YUAN, Ya Xiong
Research Fellows• ADEDJOUMA, Morayo, Dr.• ARCURI, Andrea, Dr.• ARORA, Chetan, Dr.• BRORSSON, Mats, Dr.• CASTIGNANI, German• DE WACHTER, Hannes• DUNLOP, Dominic• FRANCOIS, Jérôme, Dr.• GHARANJIK Ahmad, Dr. • HANS, Dirk• LEHMANN, Martin• LI, Li, Dr.• MISHRA, Kumar, Dr.• MUND, Sandro• NAZARIKHORRAM, Aida, Dr.• ORMAZABAL, Gaston, Dr.• PAPAZAFEIROPOULOS, Anastasios, Dr • SASNAUSKAS, Raimondas, Dr.• SCHILTZ, Jean-Louis, (Honorary Professor) • SCHMIT, Georges• SCHWEITZER, Jean, Dr.• SMYTH, Benjamin, Dr.• VON SCHEFFER, Guido• WAGNER, Cynthia, Dr.• ZIAFATI, Pouyan, Dr.• ZURAD, Maciej
Staff• ANNET, Stéphanie, Communications and Events Assistant
• BELKACEM, Nadjia, Administrative Assistant• BÖSL, Sabine, Financial Controller• BRANCO SOARES, Jose, Business Development Officer
• CHESNAY, Isabelle, Project Coordinator – Acting Head of Administration and Support
• EDWARDSDOTTIR, Helga, Administrative Assistant
• FUHRER, Pierre, Project Coordinator• GELAO, Anthony (Interim)• GREGOIRE Valerie, Administrative Assistant• GUGAN, Daniel, Project Coordinator• HARAND Aurore, Legal Advisor• HOMOLKO Christine, Communications Advisor• KINDER, Margaux, Administrative Assistant• KINET, Christine, Administrative Assistant • KIRF, Natalie, Administrative Assistant• LAGROST, Céline, Project Coordinator• LAROCHE, Corinne, Administrative Assistant • LEMMER, Marc, Dr., Head of Technology Transfer Office
• MARTIN, Magali, Administrative Assistant• MERZOUGUI, Alban, Junior Legal Advisor• OCHSENBEIN, Anne, Dr., Project Coordinator• ÖSTLUND, Stefanie, Project Coordinator• PETIT, Cécile, Dr., Project Coordinator• PLUCINSKI, Jacek, Technology Transfer Officer• THUER, Claudia, Administrative Assistant• TZIMAPITI, Anna, Administrative Assistant with HR focus
• UPTON William, Communications and Events Assistant
• VARROY, Elena, Project Coordinator• VIAU-COURVILLE Mathieu, Project Coordinator• VINCENS, Solène, Administrative Assistant
Technical Staff• EDDS, Liam• GIOTTI, Domenico• KHRAMTSOVA, Ekaterina
Visitors• ADENSTEDT, Victoria, University of Duisburg Essen, Germany
• AJAVON, Charlène, Université Ouaga I PrJoseph Ki-Zerbo, Burkina Faso
• CAILAC, Maxime, INRIA NANCY, France• CASIMIRO F. Costa, Antonio, Faculdade de Ciências da Universidade de Lisboa, Portugal
• CASSANO, Valentin, Universidad Nacional de Córdoba, Argentina
• CHEN, Yuxing, UC, Berkeley• COHEN, Andrea, Universidad Nacional del Sur, Argentina
• CORDY, Maxime, University of Namur, Belgium• DAOUDAGH, Said, University of Pisa, Italy• DE FARIA, Haroldo, Federal University of ABC, Brazil
• ESTEVEZ, Elsa, Universidad Nacional del Sur, Argentina
• GOETZ, Detlev, Ville de Luxembourg, Luxembourg
• GOOSS, Anica, University of Duisburg Essen, Germany
• GUIDOTTI, Alessandro, University of Bologna, Italy
• HOANG Hong-Nhât Quoc, Hanoi University of Science and Technology,Vietnam
• KABORE, Abdoul Kader, Université Ouaga I PrJoseph Ki-Zerbo, Burkina Faso
• KAUSHIK, Aryan, University of Edinburgh, Scotland
• MARTINEZ POSSE, Maria Vanina, Universidad Nacional del Sur, Argentina
• MUSIAL, Jedrej, Poznan Polytechnic University, Poland
• POLISHARLA, Guru Vamsi, IIT Bombay, India• SAWADOGO, Delwende Donald Arthur, Uni- versité du Québec à Montréal (UQAM), Canada
• SINAK, Jarek, Poznan University of Technology, Poland
• TATO ARIAS, Anxo, University of Catalunya, Spain
• TOHME, Fernando, Universidad Nacional del Sur, Argentina
• UGOLINI Alessandro, University of Parma, Italy• WANGSOM, Peerasak, KMUTT University, Bangkok, Thailand
People
Alexandre Saint, Dr. Djamila Aouada, Dr. Abd El Rahman Shabayek48 49back to table of contents48 49
About us About us
48 back to table of contents
What first drew you to cryptography?I discovered cryptography when I was still in middle school: I used to read a lot of books by Jules Verne, and in one of them the decryption of an encrypted message is a key plot point – that got me curious.
I also consider strong cryptography crucial for society to work. When we exchange messages, we want to ensure that nobody can read them but their recipient, that they have been written by the right person, and that they have not been modified along the way. Cryptography is the science that ensures that these three properties are present.
This interest for cryptography, my love for mathematics, and a sense of purpose nudged me toward research in this field. Plus, I find cryptogra-phy fun!
Can you tell us about your PhD thesis?The first of my two main topics was “lightweight cryptography”. With the advent of the Internet of Things, we are going to have a myriad of tiny devices with very little computing power but which still need to commu-nicate securely.
To meet this need for “lightweight algorithms”, I co-designed a block ci-pher (a type of cryptographic algorithm) called SPARX. Block ciphers use one of two types of subfunction: “S-boxes”, which allow security proofs,
or modular additions, which are lighter weight. For SPARX, I invented a new design approach that bridges the gap between the good perfor-mance of modular additions and the security guarantees of S-boxes. This opened a new avenue for designing the algorithms to secure the IoT.
The second axis of my PhD was on “S-box reverse-engineering”. The security of a cipher using an S-box hinges on its mathematical proper-ties, so cipher designers always describe the design process for their S-box in great detail, except when they don’t… Russian and American secret services have designed algorithms without describing them, and these have gone on to be used widely, without anyone knowing if they contain hidden flaws.
I co-invented techniques that can recover the structure or the design process of such S-boxes using very limited information. In fact, we found a hidden structure in the S-box used by the last Russian standards!
What are you working on now?In Paris, I’m continuing my work on S-box reverse-engineering, while with my former colleagues from Luxembourg we’re submitting an algorithm, based on my design strategy for SPARX, to a National Institute of Standards and Technology (USA) competition for choosing a new standard.
BEST PAPER AWARDS
Flexible Feedback System for Posture Monitor- ing and CorrectionRenato Baptista, Dr. Michel Antunes, Dr. Abd El Rahman Shabayek, Dr. Djamila Aouada and Prof. Dr. Björn Ottersten IEEE Fourth International Conference on Image Information Processing (ICIIP 2017)21-23 December 2017, Shimla, India
Detecting Malicious Authentication Events TrustfullyGeorgios Kaiafas, Dr. Georgios Varisteas, Dr. Sofiane Lagraa and Dr. Radu StateThird IEEE/IFIP International Workshop on Analytics for Network and Service Manage-ment (AnNet 2018)23 April 2018, Taipei, Taiwan
FaCoY: A Code-to-Code Search EngineKisub Kim, Dongsun Kim, Dr. Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Dr. Jacques Klein and Prof. Dr. Yves Le TraonIPSJ SIG SE Excellent Research Award by the Information Processing Society of Japan, SIG Software Engineering, 40th International Con-ference on Software Engineering (ICSE 2018)27 May-3 June 2018, Gothenburg, Sweden
Characterising Deprecated Android APIsLi Li, Jun Gao, Dr. Tegawendé F. Bissyandé, Lei Ma, Xin Xia and Dr. Jacques KleinFOSS Impact Paper Award, 15th International Conference on Mining Software Repositories (MSR 2018)28-29 May 2018, Gothenburg, Sweden
A Model for Regulating of Ethical Preferences in Machine EthicsDr. Zohreh Baniasadi, Dr. Xavier Parent, Prof. Dr. Charles Max and Marcos CramerHuman-Computer Interaction International Conference (HCI 2018)15-20 July 2018, Las Vegas, Navada, USA
On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power UsagePatrick Glauner, Dr. Radu State, Petko Vultcher and Diogo DuarteInternational FLINS Conference on Data Sci-ence and Knowledge Engineering for Sensing Decision Support (FLINS 2018)21-24 August 2018, Belfast, Northern Ireland
Interference Alignment for Spectral Coexist- ence of Heterogeneous NetworksDr. Shree Krishna Sharma, Dr. Symeon Chatzi-notas and Prof. Dr. Björn OtterstenEuropean Association for Signal Processing (EURASIP) 2018 Best Paper AwardPresented during the 26th European Signal Processing Conference (EUSIPCO 2018)3-7 September 2018, Rome, Italy
Code Design for Non-Coherent Detection of Frame Headers in Precoded Satellite SystemsDr. Farbod Kayhan and Prof. Guido Montorsi9th Advanced Satellite Multimedia Systems Conference (ASMS) and Signal Processing for Space Communications Workshop (SPSC)10-12 September 2018, Berlin, Germany
Enabling Model Testing of Cyber-Physical SystemsDr. Carlos A. González, Mojtaba Varmazyar, Dr. Shiva Nejati, Prof. Dr. Lionel C. Briand and Yago IsasiACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018)14-19 October 2018, Copenhagen, Denmark
Live Search of Fix Ingredients for Automated Program RepairKui Liu, Anil Koyuncu, Kisub Kim, Dongsun Kim and Dr. Tegawendé F. BissyandéBest ERA Paper Award, 25th Asia-Pacific Soft-ware Engineering Conference (APSEC 2018)4-7 December 2018, Nara, Japan
INDIVIDUAL AWARDS
Prof. Dr. Pascal Bouvry and Dr. Grégoir Danoy received a US Navy Office of Naval Research three-year grant in recognition of their re-search into drone swarming.The US Navy funded project will allow them to combine their work on three distinct areas of swarm mobility — chaos theory, clustering techniques and nature-inspired approaches — to optimise the behaviour of autonomous vehicles in a completely distributed way.
Prof. Dr. Jean-Sébastien Coron received the European Research Council’s prestigious Advanced Grant. Coron and his team will receive up to € 2.5
million over a period of five years to make cryptographic tasks usable in practice, so that citizens do not have to compromise on the privacy and security of their data. Coron is the third researcher at SnT (and in Luxembourg) to receive an ERC Advanced Grant.
Dr. Rig Das received the European Association for Biometrics Research Award 2018.The prestigious award recognises individuals who have made a significant contribution to the field of biometrics research in Europe; in this case, Dag’s work on facial recognition and finger vein-based identification.
Dr. Shiva Nejati was named a Distinguished Reviewer at the 40th International Conference on Software Engineering (ICSE 2018), 27 May-3 June, Gothenburg, Sweden.
Prof. Dr. Björn Ottersten, Director of SnT, is the 2018 recipient of the prestigious European Association for Signal Processing (EURASIP) Group Technical Achievement Award.The award recognises Ottersten’s scientific leadership in building research groups, most recently as head of SnT’s Signal Processing and Communications Research Group (SIG-COM) at SnT.
Dr. Léo Perrin won the Amis de l‘Université association’s 2018 Rolf Tarrach Award. His doctoral thesis, ‘Cryptanalysis, Reverse- Engineering and Design of Symmetric Crypto-graphic Algorithms’, was selected as the best across all disciplines at the University.
Dr. Radu State received a three-year grant as part of Ripple’s University Blockchain Research Initiative (UBRI). The programme supports academic research, technical development and innovation in blockchain, cryptocurrency and digital payments.
Awards
On 5 July 2018, the Amis de l’Université du Luxembourg awarded their annual best thesis award – the Rolf Tarrach Prize – to SnT’s Léo Perrin. Dr. Perrin completed his thesis, “Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms”, under the supervision of Prof. Dr. Alex Biryukov, and is now a postdoctoral researcher at Inria, Paris. We caught up with him to learn more about his pioneering work in cryptography.
Dr. Leo Perrin gives the keynote speech at the graduation ceremony of the University of Luxembourg held in December 2018.
50 51back to table of contents 51
About us
50
About us
OUROUTPUT
52 53back to table of contents
Projects
Project Phd Student Supervisor Partner
Secure and Compliant Data Management
Automated Extraction of Metadata and Compliance Rules from Legal Texts
Amin Sleimi Dr. Mehrdad Sabetzadeh
Service Central de Législation (Public2)
Implementation of Securely Proved Protocols for Private Communications
Itzel Vázquez Sandoval Dr. Gabriele Lenzini pEp Security
Protocols for Privacy Security Analysis Ziya Alper Genç Dr. Gabriele Lenzini pEp Security
Personalized Insurance with Data Analytics Laurent Lesage Dr. Radu State Foyer
Fintech
Automated Decision Support for Security Requirements Analysis Seifeddine Bettaieb Prof. Dr. Lionel Briand
BGL BNP Paribas
Anti-Money Laundering with Big Data Analytics Ramiro Camino Dr. Radu State LOGOS (AFR)
Data Analytics for Personal Finance Jérémy Charlier Dr. Radu State BCEE
Security of Smart Contracts Cristof Ferreira Torres Dr. Radu State BCEE (IF)
Data Analytics and Smart Contracts for Traceability in Finance Nida Khan Dr. Radu State Eethiq (AFR)
Smart Testing in a Devops and Continuous Integration Process Renaud Rwemalika Prof. Dr. Yves Le Traon
BGL BNP Paribas (AFR)
Distributed Ledger Prototype and Data Analytics for KYC Robert Norvill Dr. Radu State ABBL
Machine Learning for Client Segmentation Anshuman Bhadauria Prof. Dr. Yves Le Traon
BGL BNP Paribas
A Model-based Framework for Requirements Engineering in the Financial Domain
Alvaro Mario Veizaga Campero Prof. Dr. Lionel Briand
Clearstream-Escent
Cybersecurity
Software Defined Network Service Chaining through Network Analytics
Beltran Borja Fiz Pontiveros Dr. Radu State Telindus
Smart Grid Deep Search Nikolaos Antoniadis Prof. Dr. Yves Le Traon
CREOS
Hardware/Software Architectures for Deep Packet Inspection and Security Monitoring at GigaByte Speed
Mathis Steichen Dr. Radu State Telindus
Self-learning Predictive Algorithms: from Design to Scalable Implementation
Manxing Du Dr. Radu State Olamobile (AFR)
Data Analytics for Network Security Giorgios Kaiafas Dr. Radu State CHOICE (AFR)
Big Data Analytics against Electricity Theft Patrick Glauner Dr. Radu State CHOICE (AFR)
Risk Monitoring with Intrusion Detection for Industrial control systems
Steve Muller (graduated in 2018)
Prof. Dr. Yves Le Traon
Itrust (AFR)
Space Systems and Resources
Model-driven Trace Checking Chaima Boufaid Prof. Dr. Lionel Briand
LuxSpace (IRP)
Satellite Sensor Networks for Spectrum Monitoring Christos Politis (graduated in 2018)
Dr. Symeon Chatzinotas
SES (CORE)
Advanced Signal Processing Techniques for Satellite Communications
Alberto Mengali (graduated in 2018)
Prof. Dr. Björn Ottersten
SES (AFR)
Broadband/Broadcast Convergence through Intelligent Caching in 5G Satellite Networks
Danilo Spano (graduated in 2018)
Dr. Symeon Chatzinotas
SES (AFR)
Project Phd Student Supervisor Partner
End-to-end Signal Processing Algorithms for Precoded Satellite Communications
Jevgeny Krivochiza Dr. Symeon Chatzinotas
SES (AFR)
Log-based Automated Testing of Satellite Ground Control Systems Salma Messaoudi Prof. Dr. Lionel Briand
SES (CORE-PPP)
Online Learning for Edge-caching in Hybrid Satellite-Terrestrial Networks LISTEN
Sajad Mehrizi Prof. Dr. Björn Ottersten
SES (AFR)
Optimized Digitized Payload Processing for Satellite Communications
Ashok Bandi Prof. Dr. Björn Ottersten
SES (CORE)
Power Efficient Sparse Signal Processing for Digital Wideband on-Board Techniques
Akash Arora Prof. Dr. Björn Ottersten
SES (AFR)
Automated and Model-based Simulation of Large-scale Satellite Systems
Karim Chaouch Dr. Shiva Nejati SES (CORE-PPP)
Development of a Support Framework for the Model-based Engineering of Microsatellites
Raja Pandi Perumal Prof. Dr. Holger Voos
LuxSpace (IF)
Communications Algorithms for End-to-End Satellite IoT Oltjon Kodheli Dr. Symeon Chatzinotas
SES (IF)
Autonomous Vehicles
Multimodal Transport Optimization Thierry Derrmann (graduated in 2018)
Prof. Dr. Thomas Engel
POST (CORE)
Scene flow from RGB-D: Applications in Human Motion Sensing Konstantinos Papadopoulos Dr. Djamila Aouada POST (CORE)
Accurate 3D Human Body Shape Modelling and Fitting under Clothing- BODYFIT
Alexandre Saint Dr. Djamila Aouada ARTEC (AFR)
Deep Learning Based 3D Shape Analysis with Application to Face Recognition
Eman Ahmed Dr. Djamila Aouada ARTEC (CORE-PPP)
Automated CAD Re-engineering Kseniya Cherenkova Dr. Djamila Aouada ARTEC
Automating Regression Test Selection for Requirements-based Testing in Embedded Systems
Ines Hajri Prof. Dr. Lionel Briand
IEE (AFR)
Traceability from Requirements to Design to Support Context- driven Testing of Embedded Software Systems
Raja Ben Abdessalem Prof. Dr. Lionel Briand
IEE
Increased Mission Autonomy for small UAVs Manuel Castillo Lopez Prof. Dr. Holger Voos
Lux Army
Radar Waveform Design for Automotive Applications Christian Hammes Dr. Bhavani Shankar IEE (AFR)
Coherent Radar Waveform Design for Automotive Applications Sayed Dokhanchi Prof. Dr. Björn Ottersten
IEE (AFR)
Future Developments for Flexible Production Processes Lunardi Willian Tessaro Prof. Dr. Holger Voos
ROGLER
VICO - Vision-based Control of Small Unmanned Aerial Vehicles Arun Annaiyan (graduated in 2018)
Prof. Dr. Holger Voos
Lux Army (AFR)
Learning of Control Behaviors in Flying Manipulation Anush Anukyan Prof. Dr. Holger Voos
Lux Army
Design and Control of a Flying Gripper and Manipulator Paul Kremer Prof. Dr. Holger Voos
Lux Army
Security in ROS Base Systems Sean Rivera Dr. Radu State Lux Army
Hybrid Verification of CPS Behavioral Design Models Khouloud Gaaloul Dr. Shiva Nejati QRA
5454 55
Projects Projects
back to table of contents
Project Phd Student Supervisor Partner
Using Artificial Intelligence to Support Automated Requirements Quality Assurance
Saad Ezzini Dr. Mehrdad Sabetzadeh
QRA
Highly Automated Surveillance of Data Centers with Multi-UAV Systems
Claudio Cimarelli Prof. Dr. Holger Voos
Luxconnect
Privacy Preserving Risk Assessment of Human & Automated Driving using Multi-Fusion Sensor Analytics
Francois Robinet Dr. Raphaël Frank Foyer (IF)
mmWave Cognitive Radar: Adaptive Waveform Design and Implementation
Ehsan Raei Dehaghi Dr. Bhavani Shankar IEE (CORE-PPP)
Compressive Sensing for Ranging and Detection in Automotive Applications
Saeid Sedighi Prof. Dr. Björn Ottersten
FNR Bilateral
Handling Uncertainties in Design and Analysis of Cyber Physical Systems
Jaekwon Lee Prof. Dr. Lionel Briand
LuxSpace
Internet of Things
Omniscient Fault Localization in Home Automation System Using Model-driven Data Analytics
Ludovic Mouline Prof. Dr. Yves Le Traon
POST
Software Engineering and Data Analytics in the Context of Smart Buildings
Daoyuan Li (graduated in 2018)
Prof. Dr. Yves Le Traon
Paul Wurth
Continuous Development, Deployment, and Testing for Self- adaptive Software Systems; A New Engineering Process Applied to Smart Home
Alejandro Sanchez Guinea (graduated in 2018)
Prof. Dr. Yves Le Traon
POST
Normalisation and IoT Nader Samir Labib Dr. Grégoire Danoy ILNAS
Normalisation and Cloudcomputing Service Price Models for Optimisation
Chao Liu Prof. Dr. Pascal Bouvry
ILNAS
Biotechnological Big Data: Security, Privacy, and Standardization Saharnaz Esmaielzadeh Dilmaghani
Dr. Matthias Brust ILNAS
Connectivity Framework for the Industry 4.0 Paul-Lou Benedick Prof. Dr. Yves Le Traon
Cebi
Security Framework for the Industry 4.0 Julien Polge Prof. Dr. Yves Le Traon
Cebi
EU AND ESA PROJECTS IN 2018
Project Principal Investigator Programme
Awarded
FCD4ITS - Floating Car Data Collection for Intelligent Transportation Systems
Prof. Dr. Thomas Engel H2020
CONCORDIA - Cyber security cOmpeteNce fOr Research anD Innovation
Dr. Radu State H2020
FlexPreDem - Demonstrator of Precoding Techniques for Flexible Broadband Systems
Dr. Symeon Chatzinotas ESA
SPARTA - Special projects for advanced research and technology in Europe
Prof. Dr. Paulo Esteves-Veríssimo H2020
FIN-TECH - A FINancial supervision and TECHnology compliance training programme
Dr. Radu State H2020
5G-DRIVE - 5G HarmoniseD Research and TrIals for serVice Evolution between EU and China
Prof. Dr. Thomas Engel H2020
5G-MOBIX - 5G for cooperative & connected automated MOBIlity on X-border corridors
Prof. Dr. Thomas Engel H2020
NG-HDR - Next Generation High Data Rate Trunking Systems Dr. Bhavani Shankar ESA
CyberSec4Europe - Cyber Security Network of Competence Centres for Europe
Prof. Dr. Paulo Esteves-Veríssimo H2020
HiEdTec - Modernisation of Higher Education in Central Asia through new Technologies
Prof. Dr. Thomas Engel Erasmus plus
VHTSMODEM - User Terminal Wideband Modem for Very High Throughput Satellite (VHTS)
Dr. Symeon Chatzinotas ESA
CLOUDMAP - Cloud Computing via Homomorphic Encryption and Multilinear Maps
Prof. Dr. Jean-Sébastien Coron ERC
TERMINAL - Minibus électriques automatisés dans les navetteurs transfrontaliers
Dr. Raphaël Frank Interreg V A
LAST-JD-RIoE - Law, Science and Technology Joint Doctorate: Rights of the Internet of Everything
Prof. Dr. Leon Van Der Torre MCSA-ITN
Ongoing
LiveSatPreDem - Live Satellite Demonstration of Advanced Interference Management Techniques
Dr. Symeon Chatzinotas ESA
GRoNE - Grande Région rObotique aérienNE Prof. Dr. Holger Voos Interreg V A
MIREL - Mining and Reasoning with Legal Test Prof. Dr. Leon Van Der Torre MCSA-RISE
ATENA - Advanced Tools to Assess and Mitigate the Criticality of ICT Components and their Dependencies over Critical Infrastructures
Prof. Dr. Thomas Engel H2020
AGNOSTIC - Actively Enhanced Cognition based Framework for Design of Complex Systems
Prof. Dr. Björn Ottersten ERC
SAINT - Systemic Analyzer In Network Threats Prof. Dr. Thomas Engel H2020
STARR - Decision SupporT and self-mAnagement system for stRoke survivoRs
Dr. Djamila Aouada H2020
HTS-DBS - High Throughput Digital Broadcasting Satellite Systems Dr. Symeon Chatzinotas ESA
FutureTPM - Future Proofing the Connected World: A Quantum-Re-sistant Trusted Platform Module
Prof. Dr. Peter Y. A. Ryan H2020
5656 57
Projects Projects
back to table of contents
Project Principal Investigator Programme
CADSAT - Carrier Aggregation in Satellite Communication Networks
Dr. Symeon Chatzinotas ESA
TUNE - Testing the Untestable: Model Testing of Complex Software-intensive Systems
Prof. Dr. Lionel Briand ERC
Completed
F-INTEROP - FIRE+ Online Interoperability and Performance Test Tools to Support Emerging Technologies from Research to Standardization and Market Launch: An Accelerator to Develop Standards and Innovations
Prof. Dr. Thomas Engel H2020
Flysec - FLY faster through an innovative and robust risk-based SECurity tunnel
Prof. Dr. Thomas Engel H2020
SATNEX-IV - Satellite Network Of Experts CCN2 W14 Dr. Symeon Chatzinotas ESA
SATNEX-IV - Satellite Network Of Experts CCN2 W11 Dr. Symeon Chatzinotas ESA
SATNEX-IV - Satellite Network Of Experts CCN2 W12 Dr. Bhavani Shankar ESA
Privacy Flag - Enabling Crowd-sourcing based Privacy Protection for Smartphone Applications, Websites and Internet of Things Deployments
Prof. Dr. Thomas Engel H2020
M2MSAT - Demonstrator of Light-weight Application and Transport Protocols for Future M2M Applications
Prof. Dr. Thomas Engel ESA
TARGET - Training Augmented Reality Generalized Environment Toolkit
Prof. Dr. Thomas Engel H2020
ONSET - Optical Feeder Study for Satellite Networks Prof. Dr. Björn Ottersten ESA
SANSA - Shared Access Terrestrial-Satellite Backhaul Network enabled by Smart Antennas
Prof. Dr. Björn Ottersten H2020
PreDem - Precoding Demonstrator for broadband system forward links
Dr. Symeon Chatzinotas ESA
bIoTope - Backbone of future Internet of Thing Open Ecosystems Prof. Dr. Yves Le Traon H2020
GHOST - On-Ground EnHanced Non-Intrusive IOT System Proto-typing and Testing for Efficient Monitoring Of Wideband Satellite Transponders
Dr. Symeon Chatzinotas ESA
Project Principal Investigator Funding Instrument
Awarded
EnCaVIBS - The EU NIS Directive: Enhancing Cybersecurity across Vital Business Sectors
Prof. Dr. Mark Cole CORE
Onniva - Automatic Detection and Prevention of Deserialization Vulnerabilities
Dr. Alexandre Bartel CORE
SPRINGER - Signal Processing for Next Generation Radar Prof. Dr. Björn Ottersten CORE
STV - Socio-Technical Verification of Information Security and Trust in Voting Systems
Prof. Dr. Peter Y. A. Ryan CORE International
HyLIT - Architectural Support for Intrusion Tolerant Operating- System Kernels
Dr. Marcus Völp CORE Junior
STELLAR - teSTing sELf-LeARning systems Prof. Dr. Yves Le Traon CORE
ThreatAdapt - Adaptive Byzantine Fault and Intrusion Tolerance Prof. Dr. Paulo Esteves-Veríssimo CORE International
Ongoing
SSh - Security in the Shell Prof. Dr. Jan Lagerwall (co-PI Dr. Gabriele Lenzini)
CORE
PrivDA - Privacy-preserving Publication of Dynamic Social Network Data in the Presence of Active Adversaries
Dr. Yunior Ramirez-Cruz CORE Junior
Q-CoDe - Quantum Communication with Deniability Prof. Dr. Peter Y. A. Ryan CORE
FESS - Functional Encrypted Secure Systems Dr. Vincenzo Iovino CORE Junior
DAPRECO - DAta Protection REgulation Compliance Dr. Gabriele Lenzini CORE
BEST-RPAS - Robust Emergency Sense-and-Avoid Capability for Small Remotely Piloted Aerial Systems
Prof. Dr. Holger Voos CORE
3D-ACT - 3D Action Recognition Using Refinement and Invariance Strategies for Reliable Surveillance
Prof. Dr. Björn Ottersten CORE
ESSTIMS - Enhanced Signal Space opTImization for satellite comMunication Systems
Dr. Farbod Kayhan CORE Junior
ROSETTA - Resource Optimization for Integrated Satellite-5G Networks with Non-Orthogonal Multiple Access
Dr. Lei Lei CORE Junior
COHESAT - Cognitive Cohesive Networks of Distributed Units for Active and Passive Space Applications
Dr. Juan Merlano Duncan CORE Junior
FinCrypt - Security, Scalability, and Privacy in Blockchain Applications and Smart Contracts
Prof. Dr. Alex Biryukov CORE
ECLECTIC - Energy and Complexity Efficient Millimiter-wave Large-Array Communications
Dr. Tsinos Christos CORE Junior
CODEMATES - COntinuous DEvelopment with Mutation Analysis and TESting
Dr. Michail Papadakis CORE Junior
PROCAST - Proactive Edge Caching for Content Delivery Networks powered by Hybrid Satellite/Terrestrial Backhauling
Prof. Dr. Björn Ottersten CORE
RECOMMEND - Automatic Bug Fix Recommendation: Improving Software Repair and Reducing Time-to-Fix Delays in Software Development Projects
Dr. Tegawendé Bissyande CORE Junior
VoteVerif - Verification of Voter-Verifiable Voting Protocols Prof. Dr. Peter Y. A. Ryan CORE
CHARACTERIZE - Characterization of Malicious Code in Mobile Apps: Towards Accurate and Explainable Malware Detection
Dr. Jacques Klein CORE
FNR CORE
5858 59
Projects Projects
back to table of contents
FNR AFR GRANTS AND INDUSTRIAL FELLOWSHIPS
FNR CORE PPP, BRIDGES AND PUBLIC2
Project Principal Investigator Funding Instrument
SZK - Stateful Zero-Knowledge Dr. Alfredo Rial CORE Junior
COMMA - Combating Context-sensitive Mobile Malware Dr. Olga Gadyatskaya CORE Junior
PETIT - Privacy Enhancing Techniques for Future Internet Dr. Andriy Panchenko CORE Junior
Completed
SATSENT - SATellite SEnsor NeTworks for spectrum monitoring Dr. Symeon Chatzinotas CORE Junior
MAMBA - MultimodAl MoBility Assistance Prof. Dr. Thomas Engel CORE
DIST - Distance Bounding: A Graph Theoretical and Formal Approach
Dr. Rolando Trujillo CORE Junior
aToMS - a Theory of Matching Sessions Prof. Dr. Peter Y. A. Ryan CORE
FIXPATTERN (AUTOFIX) - Automated Program Repair using Fix patterns Learned from Human-written Patches
Dr. Dongsun Kim CORE Junior
Project Principal Investigator Programme
Awarded
IMoReF - Improved Model-based Requirements for Financial Applications
Prof. Dr. Lionel Briand BRIDGES
CAFFE PF - Cost-aware Active Feedback & Feature Extraction for Profiling Financial Transcations
Dr. Radu State BRIDGES
TESTFAST - Software testing in a Fast, Clever and Effective Way Prof. Dr. Yves Le Traon BRIDGES
EQUACS - Early QUality Assurance of Critical Systems Dr. Mehrdad Sabetzadeh BRIDGES
Ongoing
MOSIS - Model-Based Simulation of Integrated Software Systems Prof. Dr. Lionel Briand CORE PPP
IDFORM - Face Identification Under Deformations Dr. Djamila Aouada CORE PPP
SCARLET - Semantic Metadata and Compliance Rule Extraction from Legal Texts
Prof. Dr. Lionel Briand PUBLIC2
LISTENER - Log-drIven, Search-based TEst geNERation for Ground Control Systems
Prof. Dr. Lionel Briand CORE PPP
PROSAT - On-board processing techniques for high throughput satellites
Prof. Dr. Björn Ottersten CORE PPP
AWARDS - Adaptive mmWave Radar Platform for enhanced Situational Awareness: Design and Implementation
Prof. Dr. Björn Ottersten CORE PPP
Project Applicant Supervisor Programme
Awarded
MASSIVE - Machine Learning for Risk Assessment in Semi- autonomous Vehicles
François Robinet Dr. Raphaël Frank Industrial Fellowship (Foyer)
Blockchain for Finance - Secure Blockchain Technologies for Finance
Christof Ferreira Torres Dr. Radu State Industrial Fellowship (BCEE)
CL2ML - Continuously Learning to Meta Learn Using Ensemble and Reinforcement Learning
Dr. Thomas Hartmann Prof. Dr. Yves Le Traon
Industrial Fellowship (DataThings)
DESSIRA - Development of a Decision Support System for Incorporating Risk Assessments during the System Design of Microsatellites
Raja Pandi Perumal Prof. Dr. Holger Voos
Industrial Fellowship (LuxSpace)
LACLOCCN - Learning -Assisted Cross-Layer Optimizaation of Cognitive Communication Networks
Praveen Kumar Korrai Dr. Symeon Chatzinotas
AFR-PhD
AutoGEM - Automatic Generation and Maintenance of functional tests in agile environment
Renaud Rwemalika Prof. Dr. Yves Le Traon
AFR-PhD
SATIOT - Communication Algorithms for End-to-End Satellite-IoT Oltjon Kodheli Dr. Symeon Chatzinotas
Industrial Fellowship (SES)
Ongoing
LISTEN - online Learning for edge-caching In hybrid Satellite- Terrestrial Networks
Sajad Mehrizi Rahmat Abadi Prof. Dr. Björn Ottersten
AFR-PPP PhD (SES)
SPA - Self-learning Predictive Algorithms: From Design to Acalable Implementation
Manxing Du Dr. Radu State AFR-PPP PhD (Olamobile)
SigProSat - End-to-end Signal Processing Algorithms for Precoded Satellite Communications
Jevgenij Krivochiza Prof. Dr. Björn Ottersten
AFR-PPP PhD (SES)
AREG - Automating Regression Test Selection for Require-ments-based Testing in Embedded Systems
Ines Hajri Prof. Dr. Lionel Briand
AFR-PPP PhD (IEE)
DGAP - Real Time Prediction and Detection of Malicious Activities Georgios Kaiafas Dr. Radu State AFR-PPP PhD (POST)
BODYFIT - Accurate 3D Human Body Shape Modelling and Fitting under Clothing
Alexandre Saint Dr. Djamila Aouada AFR-PPP PhD (Artec)
LARGOS - Learning-Assisted Optimization for Resource and Security Management in Slicing-Based 5G Networks
Yaxiong Yuan / S. Bommeraveni Dr. Symeon Chatzinotas
AFR Bilateral Grant
DroidMod - Systematically Exploring Semantic App Models for Android
Alexandre Pilgun Prof. Dr. Sjouke Mauw
AFR-PhD
DYNAMO - Enhancing Angular Resolution in Radar Through Dynamic Beam Steering and MIMO
Christian Hammes Dr. Bhavani Shankar AFR-PPP PhD (IEE)
AVR - Automatic Feature Selection for Visual Recognition Oyaebade Oyedotun Prof. Dr. Björn Ottersten
AFR-PhD
NavSys - Navigation System for a Small Lunar Exploration Rover Philippe Ludivig Prof. Dr. Holger Voos
AFR-PPP PhD (iSpace)
SCASE21 - “Space“ as a Catalyst of a Sustainable Smart School Environment Systemic Conceiving and achieving of Conviviality for the School of the 21st Century
Melissa Bellesi Prof. Dr. Charles Max
AFR-PhD
Digital Payload Processing for Next Generation Satellite Systems Dr. Vahid Joroughi Prof. Dr. Björn Ottersten
AFR-PPP PDR (SES)
SemClose - Source Code Search for Semantically Similar Functionalities
Kisub Kim Dr. Tegawendé Bissyande
AFR-PhD
6060 61
Projects Projects
back to table of contents
FNR INTER
Project Applicant Supervisor Programme
SPASAT - Power Efficient Sparse Signal Processing for Digital Wideband On-board Techniques
Arora Aakash Prof. Dr. Björn Ottersten
AFR-PPP PhD (SES)
DASCF - Data Analytics and Smart Contracts for Traceability in Finance
Nida Khan Dr. Radu State AFR-PPP PhD (EETHIQ)
STEPIT - Spatio-Temporal Processes for Electricity Theft Detection Patrick Glauner Dr. Radu State AFR-PPP PhD (CHOICE)
OSPPAP - Optimal Scalability and Performance in Programmatic Advertising Platforms
Georgios Varisteas Dr. Radu State AFR-PPP PDR (Olamobile)
AMADA - Advanced Market Abuse Detection with Big Data Ramiro Camino Dr. Radu State AFR-PPP PhD (LOGOS)
UTEMA - Unbiased Temporal Machine for General-purpose Times Series-based Fraud Detection
Dr. Eric Antonelo Dr. Radu State AFR-PPP PDR (CHOICE)
TASTRA - Tailoring Automated Software Techniques for Real World and Large Scale Software Applications
Thierry Titcheu Chekam Prof. Dr. Yves Le Traon
AFR-PhD
ACCORDION - Compressive Sensing for Ranging and Detection in Automotive Applications
Saeid Sedighi Prof. Dr. Björn Ottersten
AFR Bilateral Grant
CatchMe - Android Malicious Code Localisation: Catch Me if You Can!
Pingfun Kong Dr. Jacques Klein AFR-PhD
RECONCIS - Reconciling Natural-Language Requirements and Model-based Specification for Effective Development of Critical Infrastructure Systems
Dr. Chetan Arora Prof. Dr. Lionel Briand
AFR-PPP PDR (SES)
GRAMMAF - Graph Anti-Money laundering and Market Abuse Framework
Dr. Leandro Montero Dr. Radu State AFR-PPP PDR (LOGOS)
LSBT - Large-Scale Blockchain Testbed Dr. Wazen Shbair Dr. Radu State AFR-PPP PDR (EETHIQ)
CARBON - CoevolutionAry HybRid Bi-level OptimizatioN Emmanuel Kieffer Prof. Dr. Pascal Bouvry
AFR-PhD
Completed
SMPC - Stochastic Model Predictive Control for Eco-Driving Assis-tance Systems in Electric Vehicles
Seyed Amin Sajadi Alamdari Prof. Dr. Holger Voos
AFR-PhD
BroadSat - Multibeam Joint Processing for Broadband/Broad-cast Convergence in Next Generation High Throughput Satellite Communications
Danilo Spano Prof. Dr. Björn Ottersten
AFR-PPP PhD (SES)
RIMIDI - Risk Monitoring with Intrusion Detection for Industrial control systems
Steve Muller Prof. Dr. Yves Le Traon
AFR-PPP PhD (itrust)
HyVAn - A Scalable Symbolic Execution Framework for Detecting Vulnerabilities
Julian Thome Prof. Dr. Lionel Briand
AFR-PhD
RUCON - Rule Compilation for Software-defined Networks (SDN) Stefan Hommes Dr. Radu State AFR-PPP PDR (Telindus)
MOSER - Model-driven Software Engineering for Social Robots Gary Cornelius Prof. Dr. Holger Voos
AFR-PhD
CoNav - Collision-free Navigation of Small UAVs in Complex Urban Environments Using Predictive Control
Arun Annaiyan Prof. Dr. Holger Voos
AFR-PhD (Lux Army)
FLYMAN - Controller Design for Cooperative Flying Manipulation Using Small Quadrotors UAVs
Jan Erik Dentler Prof. Dr. Holger Voos
AFR-PhD
TYPAMED - Transparent yet Private Access to Medical Data Dayana Spagnuelo Prof. Dr. Peter Y. A. Ryan
AFR-PhD
RECONTRE - Reliable Communication Techniques for Future Gene-ration Satellite Systems
Alberto Mengali Prof. Dr. Björn Ottersten
AFR-PPP PhD (SES)
Project Principal Investigator Programme
Awarded
SATOCROSS - Support of Advanced Test cOverage Criteria for RObust and Secure Software
Dr. Michail Papadakis INTER (with ANR)
SURCVS - Secure, Usable, Robust Cryptographic Voting Systems Prof. Dr. Peter Y. A. Ryan and Prof. Dr. Sjouke Mauw
INTER (with RCN)
Ongoing
CRC 1223 - Methods and Tools for Holistic, Agile Privacy Prof. Dr. Lionel Briand INTER (with DFG)
SEQUOIA - Security Properties, Process Equivalences, and Automa-ted Verification
Prof. Dr. Peter Y. A. Ryan INTER (with ANR)
SIERRA - Spectral Efficient Receivers and Resource Allocation for Satellite Cognitive Systems
Dr. Symeon Chatzinotas INTER (with ANR)
CI-PHY - Exploiting Interference for Physical Layer Security in 5G Networks
Dr. Symeon Chatzinotas INTER (with RCUK)
EDLAH2 - Enhanced Daily Living and Health 2 - an incentive based service
Prof. Dr. Lionel Briand INTER (with AAL)
InWIPNET - Integrated Wireless Information and Power Networks Prof. Dr. Björn Ottersten INTER (with FNRS)
CONTACT - CONtext and conTent Aware CommunicaTions for QoS support in VANETs
Prof. Dr. Thomas Engel INTER (with SNF)
Completed
MaDSAV - MAintaining Driving Skills in Semi-Autonomous Vehicles
Prof. Dr. Thomas Engel INTER (with FWF)
6262 63
Projects Projects
back to table of contents
OTHER PROJECTS
Project Principal Investigator Programme
Awarded
Building an In-car Ethernet Testbed System Prof. Dr. Thomas Engel Honda Initiation Grant Europe
HUNTED - Heterogeneous multi-swarms of UNmanned auTono-mous systEms for mission Deployment
Prof. Dr. Pascal Bouvry (Co-PI Dr. Grégoire Danoy)
US NAVAL Research Office
Ongoing
MIRI - L‘Interaction mobile au service de l’intégration Prof. Dr. Charles Max Fond Asile Migra-tion integration
MOVIDA - Model-driven Trace Checking of Quantitative Properties Using Big Data Technologies
Dr. Mehrdad Sabetzadeh IRP
FDISC - Future Directions in Symmetric Cryptography Prof. Dr. Alex Biryukov IRP
ReACP - Context and Business Aware Reverse-engineering and Testing for Access Control Policies
Prof. Dr. Lionel Briand IRP
CritiX-CARS - Architectural Support for Efficient Domain-specific Byzantine Fault and Intrusion Tolerance
Prof. Dr. Paulo Esteves-Veríssimo Intel Grant
SEC-PBN - Scalable External Control of Probabilistic Boolean Networks
Dr. Jun Pang (co-PI Prof. Dr. Thomas Sauter)
IRP
HitDroid - Hinting at Malicious Code in Android Apps Identifying Malicious Payloads in Malware at Market Scale with Graph and Data Clustering Techniques
Dr. Jacques Klein IRP
VulFix - Automated Fixing of Program Vulnerabilities in the Android Ecosystem
Prof. Dr. Yves Le Traon IRP
Completed
Cyber-Net - Cyber-Security of Networked Control Systems Using an Event-based Control Approach
Prof. Dr. Holger Voos IRP
REQUISITE - Reconciling the Uneasy Relationship between the Economics of Personal Data and Privacy
Prof. Dr. Peter Y. A. Ryan IRP
HONDA - Securing Smart Entry Systems Prof. Dr. Thomas Engel Honda Initiative Grant Europe Program
UNIQUE - Unclonable Networks for Identification using Cholesteric Emulsions
Dr. Gabriele Lenzini (co-PI Prof. Dr. Jan Lagerwall)
IRP
OTHER PROJECTS FUNDED BY FNR
Project Principal Investigator Programme
Awarded
SIMMS - Swarm Intelligent Mission systeMS Dr. Grégoire Danoy POC
PreMaas - Predictive Maintenance as a Service Dr. Jorge Augusto Meira POC
NoCry PoC - No More Cryptographic Ransomware, Proof of Concept
Dr. Gabriele Lenzini POC
GenoMask-POC - Early Stage Read Filtering and Masking of Genomic Information
Dr. Marcus Völp POC
LuxLogAI 2018 - Luxembourg Logic for AI Summit (LuxLogAI) Prof. Dr. Leon Van Der Torre RESCOM
AURORA - unpredictAble Uav swaRms fOr suRveillAnce Dr. Grégoire Danoy PATHFINDER
Smart Schoul 2025 - Smart Schoul 2025: The Future Luxembourg Smart School
Dr. Djamila Aouada PSP
PREMA - PREdictive MAintenance Analysis Dr. Jorge Augusto Meira PATHFINDER
QOE-WiC - Distributed optimization and dynamic programming for wireless edge caching to maximize quality of experience
Dr. Symeon Chatzinotas INTER MOBILITY
DAPROSELF - Data Protection Self-assessment Method For SMEs Dr. Andra Giurgiu PATHFINDER
SIGMMA - Secure, Interoperable and Global Mobile Money in Sub-Saharan Africa
Dr. Tegawendé Bissyande PATHFINDER
Autonomous Driving Demo Dr. Raphaël Frank RESEARCHERS NIGHT/DAY
NoCry - No More Cryptographic Ransomware Dr. Gabriele Lenzini PATHFINDER
GenoMask - Early Stage Read Filtering and Masking of Genomic Information
Dr. Marcus Völp PATHFINDER
Ongoing
TTO2.0-Leader Prof. Dr. Björn Ottersten KITS
IISD - Strategic RTnD Program on Information Infrastructure Securi-ty and Dependability
Prof. Dr. Paulo Esteves-Veríssimo PEARL
IndusPartnership2.0 Dr. Marc Lemmer KITS
Completed
ARMLET - Automated Retrieval of Metadata from Legal Texts Dr. Mehrdad Sabetzadeh POC
ProCRob3 - PROgramming Cognitive ROBots 3 Prof. Dr. Leon Van Der Torre POC
SERENADE - Satellite Precoding Hardware Demonstrator Dr. Symeon Chatzinotas POC
RAFAEL - RainFall Estimation Using Signalling Data of Satellite Communication Network
Dr. Bhavani Shankar POC
AFI - Air Frame Inspection Dr. Miguel Angel Olivares-Mendez POC
V&V Lab - Verification and Validation Laboratory Prof. Dr. Lionel Briand PEARL
We would like to thank the following organisations for their support:
6464 65
Projects Projects
back to table of contents
Articles in Academic Journals
1. Abu Shaban, Z., Mehrpouyan, H., Shankar, B., & Ottersten, B. (2018). Reduced Complexity Satellite Broadcast Receiver with Interference Mitigation in Correlated Noise. International Journal of Satellite Communications and Networking, 36(5)
2. Adamsky, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Di Giorgio, A., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proenca, J., Pucci, P., Rosa, L., & Soua, R. (2018). Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach. Elsevier International Journal of Critical Infrastructure Protection
3. Afzal, H., Aouada, D., Mirbach, B., & Ottersten, B. (2018, January). Full 3D Reconstruction of Non-rigidly Deforming Objects. ACM Trans-actions on Multimedia Computing, Communi-cations, & Applications
4. Alferez, M., Acher, M., Galindo, J., Baudry, B., & Benavides, D. (2018, March). Modeling Variability in the Video Domain: Language and Experience Report. Software Quality Journal
5. Alodeh, M., Spano, D., Kalantari, A., Tsinos, C., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2018, April). Symbol-level and Multicast Precoding for Multiuser Multiantenna Down-link: A State-of-the-art, Classification and Challenges. IEEE Communications Surveys and Tutorials
6. An, K., Liang, T., Zheng, G., Yan, X., Li, Y., & Chatzinotas, S. (2018). Performance Limits of Cognitive Uplink FSS and Terrestrial FS for Ka-Band. IEEE Transactions on Aerospace and Electronic Systems
7. Appelt, D., Nguyen, C. D., Panichella, A., & Briand, L. (2018). A Machine Learning-driven Evolutionary Approach for Testing Web Application Firewalls. IEEE Transactions on Reliability, 67(3), 733-757
14. Spano, D. (2018). Advanced Symbol-level Precoding Schemes for Interference Exploi-tation in Multi-antenna Multi-user Wireless Communications. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
15. Symeonidis, I. (2018). Analysis and Design of Privacy-enhancing Information Sharing Sys-tems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
16. Thome, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
17. Wang, J. (2018). Privacy-preserving Recom-mender Systems Facilitated by The Machine Learning Approach. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
Doctoral Theses
1. Annaiyan, A. (2018). Collision-free Navigation of Small UAVs in Complex Urban Environ-ments. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
2. Dentler, J. E. (2018). Real-time Model Predic-tive Control for Aerial Manipulation. Unpublis-hed doctoral thesis, University of Luxembourg, Luxembourg
3. Derrmann, T. (2018). Mobile Network Data Analytics for Intelligent Transportation Sys-tems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
4. Jimenez, M. (2018). Evaluating Vulnerability Prediction Models. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
5. Li, D. (2018). Transforming Time Series for Efficient and Accurate Classification. Unpublis-hed doctoral thesis, University of Luxembourg, Luxembourg
6. Mengali, A. (2018). Link Optimization in Future Generation Satellite Systems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
7. Muller, S. (2018). Risk Monitoring and Intru-sion Detection for Industrial Control Systems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
8. Perrin, L. (2018). Cryptanalysis, Reverse-engi-neering and Design of Symmetric Cryptogra-phic Algorithms. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
9. Politis, C. (2018). Spectrum Monitoring Algo-rithms for Wireless and Satellite Communica-tions. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
10. Sajadi Alamdari, S. A. (2018). Stochastic Mo-del Predictive Control for Eco-Driving Assistan-ce Systems in Electric Vehicles. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
11. Sanchez Guinea, A. (2018). Engineering Smart Software Services for Intelligent Pervasive Systems. Unpublished doctoral thesis, Uni-versity of Luxembourg, Luxembourg
12. Signorello, S. (2018). A Multifold Approach to Address the Security Issues of Stateful Forwarding Mechanisms in Information-cen-tric Networks. Unpublished doctoral thesis, Unpublished doctoral thesis, University of Luxembourg, Luxembourg
13. Spagnuelo, D. P. B. (2018). Defining, Measu-ring, and Enabling Transparency for Electronic Medical Systems. Unpublished doctoral thesis, University of Luxembourg, Luxembourg
8. Arcuri, A. (2018). An Experience Report On Applying Software Testing Academic Results in Industry: We Need Usable Automated Test Generation. Empirical Software Engineering, 23(4)
9. Arcuri, A. (2018). Test Suite Generation with the Many Independent Objective (MIO) Algo-rithm. Information and Software Technology, 104(December), 195-206
10. Artiga, X., Pérez-Neira, Baranda, Lagunas, E., Chatzinotas, S., Zetik, R., Gorski, P., Ntougias, K., Pérez, D., & Ziaragkas, G. (2018, October). Shared Access Satellite-terrestrial Reconfi-gurable Backhaul Network Enabled by Smart Antennas at MmWave Band. IEEE Network
11. Bartolini, C., Santos, C., & Ullrich, C. (2018). Property and the Cloud. Computer Law & Security Report
12. Basili, V., Briand, L., Bianculli, D., Nejati, S., Pastore, F., & Sabetzadeh, M. (2018). Soft-ware Engineering Research and Industry: A Symbiotic Relationship to Foster Impact. IEEE Software, 35(5), 44-49
13. Bavle, H., Sanchez Lopez, J. L., de la Puente, P., Rodriguez-Ramos, A., Sampedro, C., & Campoy, P. (2018). Fast and Robust Flight Alti-tude Estimation of Multirotor UAVs in Dynamic Unstructured Environments Using 3D Point Cloud Sensors. Aerospace, 5(3)
14. Beierle, C., Canteaut, A., & Leander, G. (2018). Nonlinear Approximations in Cryptanalysis Revisited. IACR Transactions on Symmetric Cryptology, 2018(4), 80-101
15. Blanchet, B., & Smyth, B. (2018). Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. Journal of Computer Security, 26(3), 367-422
16. Cazzato, D., Dominio, F., Manduchi, R., & Castro, S. (2018, February 07). Real-time Gaze Estimation via Pupil Center Tracking. Paladyn. Journal of Behavioral Robotics
17. Cazzato, D., Leo, M., Distante, C., Crifaci, G., Bernava, G. M., Ruta, L., Pioggia, G., & Castro, S. (2018). An Ecological Visual Exploration Tool to Support the Analysis of Visual Processing Pathways in Children with Autism Spectrum Disorders. Journal of Imaging
18. Chang, Z., Lei, L., Zhang, H., Ristaniemi, T., Chatzinotas, S., Ottersten, B., & Han, Z. (2018). Energy-efficient and Secure Resource Allocation for Multiple-antenna NOMA with Wireless Power Transfer. IEEE Transactions on Green Communications and Networking
19. Chang, Z., Lei, L., Zhou, Z., Mao, S., & Ristanie-mi, T. (2018, June). Learn to Cache: Machine Learning for Network Edge Caching in the Big Data Era. IEEE Wireless Communications
20. Charlier, J. H. J., & State, R. (2018). Non-Nega-tive Paratuck2 Tensor Decomposition Com-bined to LSTM Network for Smart Contracts Profiling. International Journal of Computer & Software Engineering, 3(1)
21. Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and Competitive Caching Designs in Large-scale Multi-tier Wireless Multicasting Networks. IEEE Transactions on Communications, 66(6), 3108-3121
22. Dashevskyi, S., Brucker, A. D., & Massacci, F. (2018). A Screening Test for Disclosed Vulnerabilities in FOSS Components. IEEE Transactions on Software Engineering, 1-1
23. Decouchant, J., Fernandes, M., Volp, M., Couto, F. M., & Verissimo, P. (2018). Accurate Filtering of Privacy-Sensitive Information In Raw Genomic Data. Journal Of Biomedical Informatics
24. Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation Based 3D Facial Expres-sion Representation. ACM Transactions on Multimedia Computing, Communications, & Applications
25. Dentler, J. E., Kannan, S., Bezzaoucha, S., Olivares-Mendez, M. A., & Voos, H. (2018). Model Predictive Cooperative Localization Control of Multiple Uavs Using Potential Function Sensor Constraints. Autonomous Robots, 1-26
26. Dentler, J. E., Rosalie, M., Danoy, G., Bouvry, P., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2018, April 20). Collision Avoidance Effects on the Mobility of a UAV Swarm Using Chaotic Ant Colony with Model Predictive Control. Journal of Intelligent & Robotic Systems, 1-17
27. Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2018). Model-based Mutant Equivalence Detection Using Automata Language Equivalence and Simulations. Journal of Systems and Software
28. Dinu, D.-D., Le Corre, Y., Khovratovich, D., Per-rin, L. P., Groszschädl, J., & Biryukov, A. (2018). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering
29. Domouchtsidis, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018, December 13). Sym-bol-level Precoding for Low Complexity Trans-mitter Architectures in Large-scale Antenna Array Systems. IEEE Transactions on Wireless Communications (Early Access), 1-1
30. Fletcher, S., De Vries, M., & Max, C. (2018). Die technische Mündigkeit von Schüler/-in-nen zum Ende der Sek. I im internationalen Vergleich – Entwicklung eines Testwerk-instruments und erste Ergebnisse. Journal of Technical Education, 6(4)
31. Fröhlich, A. A., Scheffel, M. R., Kozhaya, D., & Verissimo, P. (2018, September 19). Byzantine Resilient Protocol for the IoT. IEEE Internet of Things Journal
32. Garousi, V., Felderer, M., Karapıçak, Ç. M., & Yılmaz, U. (2018). What we Know about Testing Embedded Software. IEEE Software, 35(4), 62-69
33. Gautam, S., Vu, T. X., Chatzinotas, S., & Ot-tersten, B. (2018). Cache-aided Simultaneous Wireless Information and Power Transfer (SWIPT) with Relay Selection. IEEE Journal on Selected Areas In Communications
34. Giudotti, A., Vanelli-Coralli, A., Conti, M., Andrenacci, S., Chatzinotas, S., Maturo, N., Evans, B., Awoseyila, A., Ugolini, T., Foggi, L., Gaudio, N., Alagha, N., & Cioni, S. (2018). Architectures and Key Technical Challenges for 5G Systems Incorporating Satellites. IEEE Transactions on Vehicular Technology
35. Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Change Impact Analysis for Evolving Configuration Decisions in Product Line Use Case Models. Journal of Systems and Soft-ware, 139, 211-237
36. Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2018). Configuring Use Case Models in Pro-duct Families. Software & Systems Modeling, 17(3), 939-971
37. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Constructive Interference for Generic Constellations. IEEE Signal Processing Letters, 25(4), 586-590
38. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). PowerMinimizer Symbol-Level Precoding: A Closed-Form Sub-Optimal Solu-tion. IEEE Signal Processing Letters, 25(11), 1730-1734
39. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-Level Precoding Design Based on Distance Preserving Constructive Interfe-rence Regions. IEEE Transactions on Signal Processing, 66(22), 5817-5832
40. Hooshiary, A., Azmi, P., Mokari, N., & Maleki, S. (2018). Optimal Channel Selection for Simultaneous RF Energy Harvesting and Data Transmission in Cognitive Radio Networks. Transactions on Emerging Telecommunications Technologies
41. Ibrahim, A. A. Z. A., Wasim, M. U., Varrette, S., & Bouvry, P. (2018). PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services. Mobile Information Systems, 2018(1351386)
42. Jordanou, J. P., Camponogara, E., Antonelo, E. A., & S. de Aguiar, M. A. (2018). Nonlinear Model Predictive Control of an Oil Well with Echo State Networks. IFAC-PapersOnLine, 51, 13-18
43. Karpenko, A., Kinnunen, T., Madhikermi, M., Robert, J., Främling, K., Dave, B., & Nurminen, A. (2018, December 13). Data Exchange Inter-operability in IoT Ecosystem for Smart Parking and EV Charging. Sensors
44. Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., Malevris, N., & Le Traon, Y. (2018). How Effective are Mutation Testing Tools? An Empirical Analysis of Java Mutation Testing Tools with Manual Analysis and Real Faults. Empirical Software Engineering
45. Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018, September 03). Automated Testing of Android Apps: A Sys-tematic Literature Review. IEEE Transactions on Reliability, 1-22
46. Kozhaya, D., Decouchant, J., & Verissimo, P. (2018). RT-ByzCast: Byzantine-resilient Real-ti-me Reliable Broadcast. IEEE Transactions on Computers
47. Krivochiza, J., Merlano Duncan, J. C., Andren-acci, S., Chatzinotas, S., & Ottersten, B. (2018). Computationally and Energy Efficient Sym-bol-level Precoding Communications Demonst-rator. Physical Communication, 28, 108-115
48. Krüger, K., Volp, M., & Fohler, G. (2018). Vul-nerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Trig-gered Systems. LIPIcs-Leibniz International Proceedings in Informatics, 106, 22:1-22:17
49. Kubler, S., Derigent, W., Voisin, A., Robert, J., Le Traon, Y., & Herrera Viedma, E. (2018, September 27). Measuring Inconsistency and Deriving Priorities from Fuzzy Pairwise Com-parison Matrices using the Knowledge-Based Consistency Index. Knowledge-based Systems
50. Kubler, S., Robert, J., Neumaier, S., Umbrich, J., & Le Traon, Y. (2018, January 01). Compari-son of Metadata Quality in Open Data Portals Using the Analytic Hierarchy Process. Govern-ment Information Quarterly
51. Lei, L., Lagunas, E., Chatzinotas, S., & Ot-tersten, B. (2018). NOMA Aided Interference Management for Full-Duplex Self-Backhauling HetNets. IEEE Communications Letters, 22(8), 1696-1699
52. Li, Y., Duan, K., Jansen, D., Pang, J., Zhang, L., Lv, Y., & Cai, S. (2018). An Automatic Proving Approach to Parameterized Verification. ACM Transactions on Computational Logic, 19(4), 1-27
53. Lin, Z., Lin, M., Ouyang, J., Zhu, W.-P., & Chat-zinotas, S. (2018). Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks. IEEE Signal Processing Letters
54. Liu, B., Nejati, S., Lucia, L., & Briand, L. (2018). Effective Fault Localization of Automotive Simulink Models: Achieving the Trade-off bet-
Publications
6666 67
Publications Publications
back to table of contents
78. Shaat, M., Lagunas, E., Pérez-Neira, A., & Chatzinotas, S. (2018). Integrated Terrestri-al-satellite Wireless Backhauling: Resource Management and Benefits for 5G. IEEE Vehicular Technology Magazine
79. Shamshiri, Rojas, Gazzola, Fraser, McMinn, Mariani, & Arcuri, A. (2018). Random or Evolu-tionary Search for Object-oriented Test Suite Generation? Software Testing, Verification & Reliability, 28(4), 1660
80. Sharma, S. K., Bogale, T. E., le, L. B., Chatzi-notas, S., Wang, X., & Ottersten, B. (2018). Dynamic Spectrum Sharing in 5G Wireless Networks with Full-Duplex Technology: Recent Advances and Research Challenges. IEEE Communications Surveys & Tutorials, 20(1), 674-707
81. Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2018). Augmenting and Structuring User Queries to Support Efficient Free-form Code Search. Empirical Software Engineering, 90, 27-39
82. Soltana, G., Sannier, N., Sabetzadeh, M., & Briand, L. (2018). Model-based Simulation of Legal Policies: Framework, Tool Support, and Validation. Software & Systems Modeling, 17(3), 851-883
83. Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). Faster-than-Nyquist Signaling through Spatio-temporal Symbol-le-vel Precoding for the Multiuser MISO Down-link Channel. IEEE Transactions on Wireless Communications
84. Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). Symbol-level Precoding for the Nonlinear Multiuser MISO Downlink Channel. IEEE Transactions on Signal Proces-sing, 66(5), 1331-1345
85. Spano, D., Chatzinotas, S., Andrenacci, S., Krause, J., & Ottersten, B. (2018, March). Per-antenna Power Minimization in Symbol-le-vel Precoding for the Multi-beam Satellite Downlink. International Journal of Satellite Communications and Networking
86. Symeonidis, I., Biczók, G., Shirazi, F., Pé-rez-Solà, C., Schroers, J., & Preneel, B. (2018). Collateral Damage of Facebook Third-party Applications: a Comprehensive Study. Compu-ters & Security, 77, 179-208
87. Szalay, Z., Tettamanti, T., Esztergár-Kiss, D., Varga, I., & Bartolini, C. (2018). Development of a Test Track For Driverless Cars: Vehicle Design, Track Configuration, And Liability Considerations. Periodica Polytechnica Trans-portation Engineering, 46(1), 29-35
88. Tervo, O., Tran, L.-N., Pennanen, H., Chatzino-tas, S., Ottersten, B., & Juntti, M. (2018). Ener-gy-Efficient Multicell Multigroup Multicasting with Joint Beamforming and Antenna Selec-tion. IEEE Transactions on Signal Processing
Textual and Structural Smells. IEEE Trans-actions on Software Engineering, 44(10), 977-1000
67. Panichella, A., Kifetew, F., & Tonella, P. (2018). Automated Test Case Generation as a Ma-ny-Objective Optimisation Problem with Dyna-mic Selection of the Targets. IEEE Transactions on Software Engineering, 44(2), 122-158
68. Papazafeiropoulos, A., Sharma, S., Ratnarajah, T., & Chatzinotas, S. (2018). ‘Impact of Residu-al Additive Transceiver Hardware Impairments on RayleighProduct MIMO Channels with Line-ar Receivers: Exact and Asymptotic Analyses. IEEE Transactions on Communications
69. Perera, T. D. P., Jayakody, D. N., Sharma, S. K., Chatzinotas, S., & Li, J. (2018). Simultaneous Wireless Information and Power Trans-fer (SWIPT): Recent Advances and Future Challenges. IEEE Communications Surveys and Tutorials, 20(1), 264-302
70. Politis, C., Maleki, S., Merlano Duncan, J. C., Krivochiza, J., Chatzinotas, S., & Ottersten, B. (2018). SDR Implementation of a Testbed for Real-time Interference Detection with Signal Cancellation. IEEE Access
71. Quaglia, E. A., & Smyth, B. (2018). Secret, Verifiable Auctions from Elections. Theoretical Computer Science, 730, 44-92
72. Rosalie, M., Danoy, G., Chaumette, S., & Bouv-ry, P. (2018). Chaos-enhanced Mobility Models for Multilevel Swarms of UAVs. Swarm and Evolutionary Computation
73. Ruan, M., Titcheu Chekam, T., Zhai, E., Li, Z., Liu, Y., E, J., Cui, Y., & Xu, H. (2018). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE Trans-actions on Parallel and Distributed Systems, PP(99), 1-1
74. Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, November 27). Ecological Advanced Driver Assistance System for Optimal Energy Management in Electric Vehicles. IEEE Intelli-gent Transportation Systems Magazine
75. Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2018, December 03). Nonlinear Model Pre-dictive Control for Ecological Driver Assistance Systems in Electric Vehicles. Robotics and Autonomous Systems
76. Sanchez Lopez, J. L., Wang, M., Olivares Men-dez, M. A., Molina, M., & Voos, H. (2018, April 07). A Real-Time 3D Path Planning Solution for Collision-free Navigation of Multirotor Aerial Robots in Dynamic Environments. Journal of Intelligent and Robotic Systems
77. Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018, May 14). Cholesteric Liquid Crystal Shells as Enabling Material for Information-rich Design and Architecture. Advanced Materials, 1707382
ween Test Oracle Effort and Fault Localization Accuracy. Empirical Software Engineering, 47
55. Liu, Z., Choo, K.-K. R., & Groszschädl, J. (2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-based Crypto-graphy. IEEE Communications Magazine, 56(2), 158-162
56. Mai, X. P., Göknil, A., Shar, L. K., Pastore, F., Briand, L., & Shaame, S. (2018). Modeling Security and Privacy Requirements: a Use Ca-se-driven Approach. Information and Software Technology, 100, 165-182
57. Martinez, J., Ziadi, T., Papadakis, M., Bissyan-de, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature Location Benchmark for Extractive Software Product Line Adoption Research Using Realistic and Synthetic Eclipse Variants. Information and Software Technology
58. Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2018). Test Generation and Test Prioritization for Simulink Models with Dyna-mic Behavior. IEEE Transactions on Software Engineering, 25
59. Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2018). Anonymising Social Graphs in the Presence of Active Attackers. Transactions on Data Privacy, 11(2), 169-198
60. Mazzali, N., Boumard, S., Kinnunen, J., Shan-kar, B., Kiviranta, M., & Alagha, N. (2018, July 10). Enhancing Mobile Services with DVB-S2X Superframing. International Journal of Satelli-te Communications and Networking, 1-25
61. Mizera, A., Pang, J., Su, C., & Yuan, Q. (2018). ASSA-PBN: A Toolbox for Probabilistic Boolean Networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15(4), 1203-1216
62. Mizera, A., Pang, J., & Yuan, Q. (2018). Revi-ving the two-state Markov chain approach. IEEE/ACM Transactions on Computational Biology and Bioinformatics
63. Neveu, E., Popov, P., Hoffmann, A., Migliosi, A., Besseron, X., Danoy, G., Bouvry, P., & Grudinin, S. (2018). RapidRMSD: Rapid Determination of RMSDs Corresponding to Motions of Flexible Molecules. Bioinformatics
64. Ostaszewski, M., Kieffer, E., Danoy, G., Schneider, R., & Bouvry, P. (2018). Clustering Approaches for Visual Knowledge Exploration in Molecular Interaction Networks. BMC bioinformatics, 19(1), 308
65. Ostrev, D., & Vidick, T. (2018). Entanglement of Approximate Quantum Strategies in XOR Games. Quantum Information and Computa-tion, 18(7&8), 0617–0631
66. Palomba, F., Panichella, A., Zaidman, A., Oliveto, R., & De Lucia, A. (2018). The Scent of a Smell: An Extensive Comparison between
89. Tessaro Lunardi, W., & Voos, H. (2018). An Extended Flexible Job Shop Scheduling Pro-blem with Parallel Operations. ACM SIGAPP Applied Computing Review, 18(2), 46-56
90. Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2018). Security Slicing for Auditing Common Injection Vulnerabilities. Journal of Systems and Software, 137(March, 2018), 766-783
91. Tsinos, C., & Ottersten, B. (2018). An Effi-cient Algorithm for Unit-modulus Quadratic Programs with Application in Beamforming for Wireless Sensor Networks. IEEE Signal Processing Letters
92. Vazquez, M.-A., Shankar, B., Kourogiorgas, C., Arapoglou, P.-D., Icolari, V., Chatzinotas, S., Panagopoulos, A., & Perez-Neira, A. (2018). Precoding, Scheduling and Link Adaptation in Mobile Interactive Multibeam Satellite Systems. IEEE Journal on Selected Areas In Communications, 36(5), 971-980
93. Vu, T. X., Chatzinotas, S., & Ottersten, B. (2018, February). Edge-caching Wireless Networks: Performance Analysis and Optimization. IEEE Transactions on Wireless Communications
94. Vu, T. X., Chatzinotas, S., Ottersten, B., & Duong, T. Q. (2018). Energy Minimization for Cache-Assisted Content Delivery Networks With Wireless Backhaul. IEEE Wireless Communications Letters, 7(3), 332-335
95. Vuppala, S., Vu, T. X., Gautam, S., Chatzinotas, S., & Ottersten, B. (2018, March 25). Cache-ai-ded Millimeter Wave Ad-Hoc Networks with Contention-based Content Delivery. IEEE Transactions on Communications
96. Wang, J., Sun, J., Yuan, Q., & Pang, J. (2018). Learning Probabilistic Models for Model Checking: An Evolutionary Approach and an Empirical Study. International Journal on Software Tools for Technology Transfer, 20(6), 689-704
97. Xue, J., Biswas, S., Cirik, A. C., Du, H., Yang, Y., Ratnarajah, T., & Sellathurai, M. (2018). Transceiver Design of Optimum Wirelessly Powered Full-Duplex MIMO IoT Devices. IEEE Transactions on Communications, 66(5), 1955-1969
98. Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations. IEEE Journal of Selected Topics in Signal Processing, 12(6), 1-19
99. You, L., Yuan, D., Lei, L., Sun, S., Chatzinotas, S., & Ottersten, B. (2018, July). Resource Optimization with Load Coupling in Multi-Cell NOMA. IEEE Transactions on Wireless Communications
Books
Written in Collaboration
1. Andrenacci, S., Duncan, J. C. M., Krivochiza, J., & Chatzinotas, S. (2018). Satellite Mul-ti-Beam Precoding Hardware Demonstrator, Satellite Communications in the 5G Era. IET
2. Politis, C., Kalantari, A., Maleki, S., & Chatzi-notas, S. (2018). On-Board Interference Detec-tion and Localization for SATCOM, Satellite Communications in the 5G Era. IET
Editor of Collective Works
1. Bianculli, D., Medvidovi , N., & Rosenblum, D. R. (Eds.). (2018). 40 Editions of ICSE: the Ruby Anniversary Celebration. self-published
2. Pang, J., Zhang, C., He, J., & Weng, J. (Eds.). (2018). Proceedings of the 12th International Symposium on Theoretical Aspects of Soft-ware Engineering. IEEE Computer Society
3. Sharma, S. K., Chatzinotas, S., & Arapoglou, P.-D. (Eds.). (2018). Satellite Communications in the 5G Era. IET
Chapters of Collective Works
1. Bouvry, P., Varrette, S., Wasim, M. U., Ibrahim, A. A. Z. A., Besseron, X., & Trinh, T. A. (2018). Security, Reliability and Regulation Compli-ance in Ultrascale Computing Systems. In J., Carretero & E., Jeannot (Eds.), Ultrascale Computing Systems. IET
2. Glauner, P. (2018). Künstliche Intelligenz-die nächste Revolution (The Artificial Intelligence Revolution). In P., Plugmann, Innovationsum-gebungen gestalten: Impulse für Start-ups und etablierte Unternehmen im globalen Wett-bewerb. Springer
3. Max, C. (2018). An Activity Theoretical Re-search Lens on Inquiry-based Learning. In M. J., de Vries, S., Fletcher, S., Kruse, P., Labudde, M., Lang, I., Mammes, C., Max, D., Münk, B., Nicholl, J., Strobel, & M., Winterbottom, Re-search in Technology Education: International Approaches (pp. 147-168). Münster, Germany: Waxmann
Scientific Congresses, Symposiums and Conference Proceedings: Paper Published in a Book
1. Adamsky, F ., Retunskaia, T., Schiffner, S., & Engel, T. (2018). WLAN Device Fingerprinting Using Channel State Information (CSI). 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec)
2. Alaee-Kerahroodi, M., Modarres-Hashemi, M., Naghsh, M. M. N., Shankar, B., & Ottersten, B. (2018). Binary Sequences Set with Small ISL for MIMO Radar Systems. 2018 26th European Signal Processing Conference (EUSIPCO). IEEE
3. Alodeh, M., Chatzinotas, S., & Ottersten, B. (2018). User Selection for Symbol-level Multig-roup Multicasting Precoding in the Downlink of MISO Channels. 2018 IEEE International Conference on Communications (ICC). IEEE
4. Arcuri, A. (2018). Evaluating Search-Based Techniques with Statistical Tests. The Se-arch-Based Software Testing (SBST) Workshop
5. Arcuri, A. (2018). EvoMaster: Evolutionary Multi-context Automated System Test Gene-ration. IEEE Conference on Software Testing, Validation and Verification
6. Arora, A., Maleki, S., Shankar, B., Grotz, J., & Ottersten, B. (2018). Interference Localization On-board the Satellite Using Drift Induced Vir-tual Array. Proc. 2018 International Conference on Signal Processing and Communications (SPCOM)
7. Atashpendar, A., Policharla, G. V., Roenne, P., & Ryan, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communi-cation and Entanglement Distillation. Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (pp. 104-120). Springer
8. Bana, G., Chadha, R., & Eeralla, A. (2018). For-mal Analysis of Vote Privacy Using Computa-tionally Complete Symbolic Attacker. ESORICS 2018, 23rd European Symposium on Research in Computer Security (pp. 350–372)
9. Bandi, A. (2018). A Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels. In A., Bandi, B., Shankar, S., maleki, S., Chatzinotas, & B., Ot-tersten, 6th IEEE Global Conference on Signal and Information Processing
10. Bandi, A. (2018). Sparsity-Aided Low-Imple-mentation cost based On-Board beamforming Design for High Throughput Satellite Systems. In A., Bandi, V., Joroughi, B., Shankar, J., grotz, & B., Ottersten, 9th Advanced Satellite Multi-media Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC) (pp. 1-6)
11. Baniasadi, Z., Parent, X., Max, C., & Creamer, M. (2018). A Model for Regulating of Ethical Preferences in Machine Ethics. Proceedings of International Conference on Human-Computer Interaction, (pp. 481-506)
12. Baptista, R., Antunes, M., Aouada, D., & Ottersten, B. (2018). Anticipating Suspicious Actions using a Small Dataset of Action Tem-plates. 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP)
13. Baptista, R., Demisse, G., Aouada, D., & Ottersten, B. (2018). Deformation-based Ab-normal Motion Detection using 3D Skeletons. IEEE International Conference on Image Pro-cessing Theory, Tools and Applications (IPTA)
6868 69
Publications Publications
back to table of contents
35. Dominico, S., Almeida, E. C., Meira, J. A., & Alves, M. A. Z. (2018). An Elastic Multi-Core Allocation Mechanism for Database Systems. International Conference on Data Engineering (ICDE)
36. Domouchtsidis, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018). Antenna Selection Symbol-level Precoding for Low Complexity Large-scale Antenna Array Systems. 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE
37. Dong, F., Wang, H., Li, L., Guo, Y., Bissyande, T. F. D. A., Liu, T., Xu, G., & Klein, J. (2018). Fraud Droid: Automated Ad Fraud Detection for Android Apps. ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268)
38. Dou, W., Bianculli, D., & Briand, L. (2018). Mo-del-driven Trace Diagnostics for Pattern-based Temporal Specifications. Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (pp. 277-288). New York, USA: ACM
39. Erata, F., Göknil, A., Kurtev, I., & Tekinerdogan, B. (2018). AlloyInEcore: Embedding of First-Or-der Relational Logic into Meta-object Facility for Automated Model Reasoning. 26th ACM Joint European Software Engineering Confe-rence and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018)
40. Ferreira Torres, C., & Jonker, H. (2018). Investi-gating Fingerprinters and Fingerprinting-alike Behaviour of Android Applications. 23rd European Symposium on Research in Compu-ter Security, Barcelona, Spain, September 3-7, 2018
41. Ferreira Torres, C., Schütte, J., & State, R. (2018). Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. 34th Annual Computer Security Applications Conference (ACSAC ’18)
42. Fiz Pontiveros, B., Norvill, R., & State, R. (2018). Monitoring the Transaction Selection Policy of Bitcoin Mining Pools. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium
43. Fiz Pontiveros, B., Norvill, R., & State, R. (2018, February). Recycling Smart Contracts: Com-pression of the Ethereum Blockchain. Pro-ceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
44. Fouquet, F., Hartmann, T., Mosser, S., & Cordy, M. (2018). Enabling Lock-free Concurrent Workers over Temporal Graphs Composed of Multiple Time-series. 33rd Annual ACM Symposium on Applied Computing (SAC’18)
45. Fraser, G., Rojas, J., & Arcuri, A. (2018). EvoSuite at the SBST 2018 Tool Competition. 2018 ACM/IEEE 11th International Workshop on Search-based Software Testing
46. Gadyatskaya, O., & Trujillo Rasua, R. (2018). New Directions in Attack Tree Research: Cat-ching up with Industrial Needs. In S., Mauw, Proceedings of the 4th International Workshop on Graphical Models for Security. Springer
47. Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Procedings (1st ed, pp. 385-401). Cham, Switzerland: Springer Internatio-nal Publishing
48. Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryp-tographic Ransomware. In C., Giuffrida, S., Bardin, & G., Blanc (Eds.), Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018) (pp. 234-255). Springer International Publishing
49. Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. Advan-ces in Cybersecurity 2018
50. Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-corrupted Honeywords System. Proceedings of the 4th International Conference on Information Systems Security and Privacy
51. Gerard, B., Bezzaoucha, S., Voos, H., & Darou-ach, M. (2018, June 27). Cyber Security and Vulnerability Analysis of Networked Control System Subject to False-Data injection. Proceedings of the 2018 American Control Conference
52. Gerard, B., Bezzaoucha, S., Voos, H., & Darou-ach, M. (2018). Vulnerability Analysis of Cyber Physical Systems under False-data Injection and Disturbance Attacks. 2018 IEEE 23rd Inter-national Conference on Emerging Technologies and Factory Automation (ETFA 2018)
53. Gharanjik, A., Mishra, K. V., Shankar, B., & Ottersten, B. (2018). Learning-based rainfall Estimation via Communication Satellite Links. 2018 IEEE Statistical Signal Processing Work-shop (SSP). IEEE
54. Giotti, D., Lamorte, L., Soua, R., Palattella, M. R., & Engel, T. (2018). Performance Analysis of CoAP under Satellite Link Disruption. 25th International Conference on Telecommunica-tions (ICT)
55. Glauner, P., State, R., Valtchev, P., & Duarte, D. (2018). On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage. Proceedings 13th International FLINS Conference on Data Science and Knowledge
IEEE International Conference on Automated Software Engineering (pp. 892-895). ACM
25. Castillo Lopez, M., Sajadi Alamdari, S. A., Sanchez Lopez, J. L., Olivares Mendez, M. A., & Voos, H. (2018). Model Predictive Control for Aerial Collision Avoidance in Dynamic Environments. 26th Mediterranean Conference on Control and Automation (MED)
26. Charlier, J. H. J., Falk, E., State, R., & Hilger, J. (2018, November). User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition. 2018 IEEE Internatio-nal Conference on Data Mining Workshops (ICDMW)
27. Charlier, J. H. J., State, R., & Hilger, J. (2018). Non-negative Paratuck2 Tensor Decomposi-tion Combined to LSTM Network For Smart Contracts Profiling. In J., Charlier, R., State, & J., Hilger, 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (pp. 74-81). IEEE Computer Society Conference Publishing Services (CPS)
28. Chothia, T., Ruiter, J. D., & Smyth, B. (2018). Modelling and Analysis of a Hierarchy of Dis-tance Bounding Attacks. 27th USENIX Security Symposium
29. Costa, A. P., Charpiot, L., Rodriguez Lera, F. J., Ziafati, P., Nazarikhorram, A., van der Torre, L., & Steffgen, G. (2018). More Attention and Less Repetitive and Stereotyped Behaviors Using a Robot with Children with Autism. 27th IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN 2018
30. Delavernhe, F., Saber, T., Papadakis, M., & Ventresque, A. (2018). A Hybrid Algorithm for Multi-objective Test Case Selection in Regres-sion Testing. IEEE Congress on Evolutionary Computation
31. Demisse, G., Papadopoulos, K., Aouada, D., & Ottersten, B. (2018). Pose Encoding for Robust Skeleton-based Action Recognition. 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop
32. Di Maio, A., Soua, R., Palattella, M. R., & Engel, T. (2018). ROADNET: Fairness- and Throughput-enhanced Scheduling for Content Dissemination in VANETs. IEEE International Conference on Communications (ICC)
33. Dokhanchi, S. H., Shankar, B., Stifter, T., & Ottersten, B. (2018). OFDM-based Automotive Joint Radar-communication System. 2018 IEEE Radar Conference (RadarConf18). IEEE
34. Dokhanchi, S. H., Shankar, B., Stifter, T. S., & Ottersten, B. (2018). Multicarrier Phase Modulated Continuous Waveform for Automo-tive Joint Radar-communication System. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communica-tions (SPAWC). IEEE
14. Baptista, R., Ghorbel, E., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Key-skele-ton Based Feedback Tool for Assisting Physical Activity. 2018 Zooming Innovation in Consumer Electronics International Conference (ZINC)
15. Ben Abdessalem (helali), R., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Vision-Based Control Systems Using Learnable Evolutionary Algorithms. Proceedings of the 40th Internatio-nal Conference on Software Engineering (ICSE 2018). ACM
16. Ben Abdessalem (helali), R., Panichella, A., Nejati, S., Briand, L., & Stifter, T. (2018). Testing Autonomous Cars for Feature Inter-action Failures using Many-Objective Search. Proceedings of the 33rd IEEE/ACM Inter-national Conference on Automated Software Engineering (ASE 2018)
17. Ben Fadhel, A., Bianculli, D., & Briand, L. (2018). Model-driven Run-time Enforcement of Complex Role-based Access Control Policies. Proceeding of the 2018 33rd ACM/IEEE Inter-national Conference on Automated Software Engineering (ASE ’18) (pp. 248-258). New York, USA: ACM
18. Benedick, P.-L., Robert, J., Le Traon, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a Performance Analysis. 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018)
19. Bezzaoucha, S., & Voos, H. (2018, August 29). A Contribution to Cyber-physical Systems Security: an Event-based Attack-tolerant Control Approach. Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPRO-CESS 2018
20. Bezzaoucha, S., Voos, H., Davila, J., & Bejara-no, J. (2018, June 27). A Decoupling Approach to Design Observers for Polytopic Takagi-Su-geno Models Subject to Unknown Inputs. Proceedings of the 2018 American Control Conference
21. Bickford, M., Cohen, L., Constable, R., & Rahli, V. (2018). Computability Beyond Church-Turing via Choice Sequences. IEEE Symposium on Logic in Computer Science, LICS 2018
22. Biryukov, A., Dinu, D.-D., Le Corre, Y., & Udo-venko, A. (2018). Optimal First-Order Boolean Masking for Embedded IoT Devices. CARDIS 2017: Smart Card Research and Advanced Applications (pp. 22-41). Springer, Cham
23. Biryukov, A., & Udovenko, A. (2018). Attacks and Countermeasures for White-box Designs. In T., Peyrin & S., Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing
24. Cao, J., Li, Y., & Pang, J. (2018). L-CMP: an Automatic Learning-based Parameterized Ve-rification Tool. Proceedings of the 33rd ACM/
Engineering for Sensing Decision Support (FLINS 2018)
56. Glauner, P., Valtchev, P., & State, R. (2018). Impact of Biases in Big Data. Proceedings of the 26th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2018)
57. Gonzalez Perez, C. A., Varmazyar, M., Nejati, S., Briand, L., & isasi, Y. (2018). Enabling Model Testing of Cyber-Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18)
58. Haqiqatnejad, A., Kayhan, F., & Ottersten, B. (2018). Symbol-level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels. International Workshop on Signal Processing Advances in Wireless Communica-tions (SPAWC)
59. Hochgeschwender, N., Biggs, G., & Voos, H. (2018). A Reference Architecture for Deploying Component-based Robot Software and Com-parison with Existing Tools. Proceedings of the IEEE International Conference on Robotic Computing. IEEE
60. Jafarnejad, S., Castignani, G., & Engel, T. (2018). Non-intrusive Distracted Driving Detection Based on Driving Sensing Data. 4th International Conference on Vehicle Techno-logy and Intelligent Transport Systems (VEHITS 2018)
61. Jafarnejad, S., Castignani, G., & Engel, T. (2018). Revisiting Gaussian Mixture Models for Driver Identification. Proceedings of IEEE International Conference on Vehicular Electro-nics and Safety (ICVES) (ICVES 2018)
62. Jhawar, R., Lounis, K., Mauw, S., & Ramirez Cruz, Y. (2018). Semi-automatically Augmen-ting Attack Trees using an Annotated Attack Tree Library. In S., Katsikas & C., Alcaraz (Eds.), Security and Trust Management. STM 2018 (pp. 85-101). Springer
63. Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018). TUNA: TUning Natural-ness-based Analysis. 34th IEEE International Conference on Software Maintenance and Evolution
64. Jimenez, M., Le Traon, Y., & Papadakis, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. IEEE International Working Conference on Source Code Analysis and Manipulation
65. Jimenez, M., Titcheu Chekam, T., Cordy, M., Papadakis, M., Kintis, M., Le Traon, Y., & Harman, M. (2018, October 11). Are Mutants Really Natural? A Study on how “Naturalness” Helps Mutant Selection. 12th International Symposium on Empirical Software Engineering and Measurement (ESEM’18)
66. Joroughi, V., Lagunas, E., Andrenacci, S., Matu-ro, N., Chatzinotas, S., Grotz, J., & Ottersten, B. (2018). Deploying Joint Beamforming and Pre-coding in Multibeam Satellite Networks with Time Variant Traffic. IEEE Global Conference on Signal and Information Processing (GlobalSIP)
67. Joroughi, V., Shankar, B., Maleki, S., Chatzino-tas, S., & Grotz, J. (2018). Precoder Design for Multibeam Mobile Satellite Systems. Procee-dings of IEEE Asilomar Conference on Signals, Systems and Computers
68. Joroughi, V., Shankar, B., Maleki, S., Chat-zinotas, S., Grotz, J., & Ottersten, B. (2018). Designing Joint Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System. IEEE WCNC 2018
69. Joroughi, V., Shankar, B., Maleki, S., Chat-zinotas, S., Grotz, J., & Ottersten, B. (2018). On-board Precoding in a Multiple Gateway Multibeam Satellite System. Proceedings of IEEE VTC Fall 2018
70. Joroughi, V., Shankar, B., Maleki, S., Chatzino-tas, S., Grotz, J., & Ottersten, B. (2018). Robust Precoding and Beamforming in a Multiple Gate-way Multibeam Satellite System. IEEE Global Telecommunications Conference
71. Kaiafas, G., Varisteas, G., Lagraa, S., & State, R. (2018). Detecting Malicious Authentication Events Trustfully. In G., Kaiafas, G., Varisteas, S., Lagraa, & R., State, IEEE/IFIP Network Operations and Management Symposium, Cognitive Management in a Cyber World
72. Khan, N. (2018). FAST: A MapReduce Con-sensus for High Performance Blockchains. ACM BlockSys ‘18 Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems. New York, USA: ACM
73. Khan, N., Lahmadi, A., Francois, J., & State, R. (2018). Towards a Management Plane for Smart Contracts: Ethereum Case Study. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium
74. Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY-A Code-to-Code Search Engine. International Con-ference on Software Engineering (ICSE 2018)
75. Kodheli, O., Andrenacci, S., Maturo, N., Chatzinotas, S., & Zimmer, F. (2018). Resource Allocation Approach for Differential Doppler Reduction in NB-IoT over LEO Satellite. 9th Advanced Satellite Multimedia Systems Con-ference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC)
76. Lagunas, E., Andrenacci, S., Chatzinotas, S., & Ottersten, B. (2018). Cross-layer Forward Packet Scheduling for Emerging Precoded Broadband Multibeam Satellite System. 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC)
7070 71
Publications Publications
back to table of contents
77. Lagunas, E., Chatzinotas, S., & Ottersten, B. (2018). Fair Carrier Allocation for 5G Integrated Satellite-Terrestrial Backhaul Networks. Inter-national Conference on Communications (ICT)
78. Lagunas, E., Marques, A. G., Chatzinotas, S., & Ottersten, B. (2018). Graph Similarity based on Graph Fourier Distances. European Signal Processing Conference (EUSIPCO)
79. Lauvås, P., & Arcuri, A. (2018). Recent Trends in Software Testing Education: A Systematic Literature Review. UDIT (The Norwegian Conference on Didactics in IT education)
80. Le Corre, Y., Groszschädl, J., & Dinu, D.-D. (2018). Micro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In J., Fan & B., Gierlichs, Constructive Side-Channel Analysis and Secure Design-9th International Workshop, COSADE 2018, Proceedings (pp. 82-98). Springer Verlag
81. Lei, L., Chang, Z., Hu, Y., Ristaniemi, T., Yuan, Y., & Chatzinotas, S. (2018). Energy-efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems. IEEE/CIC International Conference on Communications in China (ICCC 2018)
82. Lei, L., Vu, T. X., You, L., Fowler, S., & Yuan, D. (2018). Efficient Minimum-energy Scheduling with Machine-learning based Predictions for Multiuser MISO Systems. 2018 IEEE Interna-tional Conference on Communications (ICC)
83. Lei, L., You, L., Yang, Y., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Power and Load Op-timization in Interference-coupled Non-ortho-gonal Multiple Access Networks. IEEE Global Communications Conference (GLOBECOM) 2018
84. Lei, L., You, L., Yuan, D., Chatzinotas, S., & Ottersten, B. (2018). Efficient Resource Optimi-zation in Wireless Networks: A Deep-learning Assisted Approach. 2018 INFORMS Telecom-munications Conference
85. Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. 21st International Conference on Extending Database Technology
86. Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsisten-cies. 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223)
87. Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM
88. Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM
89. Lopez Becerra, J. M., Ostrev, D., & Skrobot, M. (2018). Forward Secrecy for SPAKE2. In J., Baek & S., Willy (Eds.), The 12th International Conference on Provable Security (pp. 366-384). Springer International Publishing
90. Lopez Becerra, J. M., Roenne, P., Ryan, P., & Sala, P. (2018). HoneyPAKEs. Security Protocols XXVI: Lecture Notes in Computer Science (pp. 63-77). Springer International Publishing
91. Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Sys-tems. 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18)
92. Mai, X. P., Pastore, F., Göknil, A., & Briand, L. (2018). A Natural Language Programming Approach for Requirements-based Security Testing. 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018). IEEE
93. Martinez, J., Sottet, J.-S., Garcia-Frey, A., Biss-yande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS
94. Matthiesen, B., Yang, Y., & Jorswieck, E. (2018). Optimization of Weighted Individual Energy Efficiencies in Interference Networks. Proc. IEEE Wireless Communications and Net-working Conference
95. Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Automated Identifica-tion of Desynchronisation Attacks on Shared Secrets. European Symposium on Research in Computer Security. Springer
96. Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Distance-bounding Protocols: Verification without Time and Location. NY: IEEE Computer Society
97. Messaoudi, S., Panichella, A., Bianculli, D., Briand, L., & Sasnauskas, R. (2018). A Se-arch-based Approach for Accurate Identifica-tion of Log Message Formats. Proceedings of the 26th IEEE/ACM International Conference on Program Comprehension (ICPC ’18) (pp. 167-177). ACM
98. Meyer, M., Quaglia, E. A., & Smyth, B. (2018). Attacks against GSMA’s M2M Remote Provi-sioning. FC’18: 22nd International Conference on Financial Cryptography and Data Security. Springer
99. Mizera, A., Pang, J., Qu, H., & Yuan, Q. (2018). ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 277-284). Springer Science & Business Media B.V
100. Mouline, L., Benelallam, A., Fouquet, F., Bour-cier, J., & Barais, O. (2018). A Temporal Model for Interactive Diagnosis of Adaptive Systems. In L., Mouline, A., Benelallam, F., Fouquet, J., Bourcier, & O., Barais, 2018 IEEE International Conference on Autonomic Computing (ICAC)
101. Mouline, L., Benelallam, A., Hartmann, T., Fouquet, F., Bourcier, J., Morin, B., & Barais, O. (2018, April 09). Enabling Temporal-aware Contexts for Adaptative Distributed Systems. SAC 2018: SAC 2018: Symposium on Applied Computing
102. Msadek, M. N., Soua, R., Ladid, L., & Engel, T. (2018). Advancing the Security of Trustworthy Self-IoT (Position Paper). International Confe-rence on Smart Applications, Communications and Networking (SmartNets)
103. Mund, S., Frank, R., Varisteas, G., & State, R. (2018). Visualizing the Learning Progress of Self-Driving Cars. 21st International Confe-rence on Intelligent Transportation Systems (pp. 2358-2363). IEEE
104. Norvill, R., Fiz Pontiveros, B., State, R., & Cullen, A. (2018, July 09). Visual Emulation for Ethereum’s Virtual Machine. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium
105. Olszewski, M. A., Meder, J. A. A., Kieffer, E., Bleuse, R., Rosalie, M., Danoy, G., & Bouvry, P. (2018). Visualizing the Template of a Chaotic Attractor. 26th International Symposium on Graph Drawing and Network Visualization (GD 2018)
106. Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Highway Network Block with Gates Constraints for Training Very Deep Networks. 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop
107. Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2018). Improving the Capacity of very Deep Networks With Maxout Units. 2018 IEEE International Conference on Acous-tics, Speech and Signal Processing
108. Palmirani, M., Bartolini, C., Martoni, M., Ro-baldo, L., & Rossi, A. (2018). Legal Ontology for Modelling GDPR Concepts and Norms. JURIX 2018 proceedings
109. Palmirani, M., Martoni, M., Rossi, A., Bart-olini, C., & Robaldo, L. (2018). PrOnto: Privacy Ontology for Legal Reasoning. International Conference on Electronic Government and the Information Systems Perspective
110. Papadakis, M., Titcheu Chekam, T., & Le Traon, Y. (2018). Mutant Quality Indicators. 13th International Workshop on Mutation Analysis (MUTATION’18)
111. Papadopoulos, K., Antunes, M., Aouada, D., & Ottersten, B. (2018). A Revisit of Action Detection using Improved Trajectories. IEEE International Conference on Acoustics, Speech and Signal Processing
112. Paul, S., Pang, J., & Su, C. (2018). On the Full Control of Boolean Networks. Proceedings of the 16th International Conference on Computational Methods in Systems Biology (pp. 313-317). Springer Science & Business Media B.V
113. Paul, S., Pang, J., & Su, C. (2018). Towards the Existential Control of Boolean Networks: a Preliminary Report. Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (pp. 142-149). Springer Science & Business Media B.V
114. Paul, S., Su, C., Pang, J., & Mizera, A. (2018). A Decomposition-based Approach towards the Control of Boolean Networks. Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM
115. Quaglia, E. A., & Smyth, B. (2018). Authentica-tion with Weaker Trust Assumptions for Voting Systems. AFRICACRYPT’18: 10th International Conference on Cryptology in Africa. Springer
116. Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2018). Adaptive Control for a Lightweight Robotic Arm Ac-tuated by a Shape Memory Allow wire. 16th International Conference on New Actuators
117. Quintanar Guzman, S., Kannan, S., Voos, H., Darouach, M., & Alma, M. (2018). Experimen-tal Validation of Adaptive Control For a Shape Memory Alloy Actuated Lightweight Robotic Arm. ASME 2018 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems
118. Rahli, V., Cohen, L., & Bickford, M. (2018). A Verified Theorem Prover Backend Supported by a Monotonic Library. LPAR 2018
119. Rahli, V., Vukotic, I., Volp, M., & Verissimo, P. (2018). Velisarios: Byzantine Fault-tolerant Protocols Powered by Coq. ESOP 2018
120. Saint, A. F. A., Ahmed, E., Shabayek, A. E. R., Cherenkova, K., Gusev, G., Aouada, D., & Ottersten, B. (2018). 3DBodyTex: Textured 3D Body Dataset. 2018 Sixth International Conference on 3D Vision (3DV 2018)
121. Sajadi Alamdari, S. A., Voos, H., & Darou-ach, M. (2018). Stochastic Optimum Energy Management for Advanced Transportation Network. 15th IFAC Symposium on Control in
Transportation Systems CTS 2018 (pp. 317-322). Savona, Italy: Elsevier
122. Sanchez Lopez, J. L., Olivares Mendez, M. A., Castillo Lopez, M., & Voos, H. (2018). Towards Trajectory Planning from a Given Path for Multirotor Aerial Robots Trajectory Tracking. 2018 International Conference on Unmanned Aircraft Systems (ICUAS), Dallas 12-15 June 2018. Dallas, USA
123. Schiffner, S., Berendt, B., Siil, T., Degeling, M., Riemann, R., Schaub, F., Wuyts, K., Attoresi, M., Gürses, S., Klabunde, A., Polonetsky, J., Sadeh, N., & Zanfir-Fortuna, G. (2018). Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: a Transatlantic Initiative. In N., Tsouroulas, K., Rannenberg, & M., Medina (Ed.), proceedings of the Annual Privacy Forum 2018
124. Shbair, W., Steichen, M., François, J., & State, R. (2018). Blockchain Orchestration and Expe-rimentation Framework: A Case Study of KYC. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man-2Block) colocated with IEEE/IFIP NOMS 2018
125. Shin, S. Y., Chaouch, K., Nejati, S., Sabet-zadeh, M., Briand, L., & Zimmer, F. (2018). HITECS: A UML Profile and Analysis Frame-work for Hardware-in-the-Loop Testing of Cyber Physical Systems. Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18)
126. Shin, S. Y., Nejati, S., Sabetzadeh, M., Briand, L., & Zimmer, F. (2018). Test Case Prioritization for Acceptance Testing of Cyber Physical Systems: a Multi-Objective Search-based Approach. Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’18). New York, USA: ACM
127. Sleimi, A., Sannier, N., Sabetzadeh, M., Briand, L., & Dann, J. (2018). Automated Extraction of Semantic Legal Metadata Using Natural Language Processing. the 26th IEEE International Requirements Engineering Confe-rence, Banff, Alberta
128. Smyth, B. (2018). Verifiability of Helios Mixnet. Voting’18: 3rd Workshop on Advances in Secure Electronic Voting. Springer
129. Soua, R., Palattella, M. R., & Engel, T. (2018). IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks. Global Information Infrastructure and Networ-king Symposium (GIIS)
130. Soua, R., Turcanu, I., Adamsky, F., Führer, D., & Engel, T. (2018). Multi-access Edge Computing for Vehicular Networks: a Position Paper. 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelli-gent Transportation Systems
131. Spano, D., Alodeh, M., Chatzinotas, S., & Ot-tersten, B. (2018). PAPR Minimization through Spatio-temporal Symbol-level Precoding for the Non-linear Multi-user MISO Channel. 2018 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)
132. Spano, D., Chatzinotas, S., & Ottersten, B. (2018). Sequential Spatio-temporal Symbol-le-vel Precoding Enabling Faster-than-Nyquist Signaling for Multi-user MISO Systems. 2018 26th European Signal Processing Conference (EUSIPCO) (pp. 827-831). IEEE
133. Steichen, M., Fiz Pontiveros, B., Norvill, R., Shbair, W., & State, R. (2018). Blockchain-ba-sed, Decentralized Access Control for IPFS. The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (pp. 1499-1506). Halifax, Canada: IEEE
134. Tato, A., Andrenacci, S., Chatzinotas, S., & Mosquera, C. (2018). Link Adaptation and CSI Detection Errors in Multibeam Satellite Systems with Linear Precoding. 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC). IEEE
135. Tervo, O., Trant, L.-N., Chatzinotas, S., Otters-ten, B., & Juntti, M. (2018). Multigroup Mul-ticast Beamforming and Antenna Selection with Rate-Splitting in Multicell Systems. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communica-tions (SPAWC). IEEE
136. Tessaro Lunardi, W., Cherri, L. H., & Voos, H. (2018). A Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints. 17th International Conference on Artificial Intelli-gence and Soft Computing
137. Tessaro Lunardi, W., & Voos, H. (2018). Com-parative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization. 33rd ACM/SIGAPP Symposium On Applied Computing
138. Tessaro Lunardi, W., Voos, H., & Cherri, L. H. (2018). An Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem. 23rd IEEE International Conference on Emerging Technologies and Factory Auto-mation (pp. 8)
139. Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. 40th Inter-national Conference on Software Engineering
140. Toader, B., Moawad, A., Fouquet, F., Hartmann, T., Popescu, M., & Viti, F. (2018). A New Mo-delling Framework over Temporal Graphs for Collaborative Mobility Recommendation Sys-tems. 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC)
7272 73
Publications Publications
back to table of contents
141. Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2018). Constrained Bayesian Active Learning of Linear Classifier. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE
142. Tsinos, C., Chatzinotas, S., & Ottersten, B. (2018). Hybrid Analog-digital Transceiver Designs for mmwave Amplify-and-forward Relaying Systems. 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE
143. Tsinos, C., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2018). Symbol-level Precoding with Low Resolution DACs for Large-scale Array MU-MIMO systems. 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE
144. Varisteas, G., Avanesov, T., & State, R. (2018). Distributed C++-Python Embedding for Fast Predictions and Fast Prototyping. Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning
145. Vazquez Sandoval, I., & Lenzini, G. (2018). Experience Report: How to Extract Security Protocols’ Specifications from C Libraries. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE
146. Vazquez Sandoval, I., Lenzini, G., & Stoj-kovski, B. (2018). A Protocol to Strengthen Password-based Authentication. Emerging Technologies for Authorization and Authenti-cation-ESORICS 2018 International Workshops
147. Volp, M., & Verissimo, P. (2018, May 29). Intru-sion-tolerant Autonomous Driving. 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC)
148. Vu, T. X., Lei, L., Vuppala, S., Chatzinotas, S., & Ottersten, B. (2018). Energy-efficient Design for Latency-tolerant Content Delivery Net-works. 2018 IEEE Wireless Communications and Networking Conference (WCNC)
149. Vu, T. X., Lei, L., Vuppala, S., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2018). Latency
Minimization for Content Delivery Networks with Wireless Edge Caching. 2018 IEEE Inter-national Conference on Communications (ICC)
150. Vuppala, S., Sellathurai, M., & Chatzinotas, S. (2018). Optimal Deployment of Base Stations in Cognitive Satellite Terrestrial Networks. 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Pro-cessing for Space Communications Workshop (ASMS/SPSC). IEEE
151. Wang, C., Pastore, F., & Briand, L. (2018). Automated Generation of Constraints from Use Case Specifications to Support System Testing. Proceedings of the 11th IEEE Con-ference on Software Testing, Validation and Verification
152. Wang, M., Voos, H., & Su, D. (2018). Robust Online Obstacle Detection and Tracking for Collision-free Navigation of Multirotor UAVs in Complex Environments. 15th International Conference on Control, Automation, Robotics and Vision (ICARCV) (pp. 1228-1234)
153. Wang, Q., Grassi, L., & Rechberger, C. (2018). Zero-sum Partitions of PHOTON Permutations. In N. P., Smart (Ed.), Topics in Cryptolo-gy-CT-RSA 2018-The Cryptographers’ Track at the RSA Conference 2018, Proceedings (pp. 279-299). Springer
154. Wang, Q., Hao, Y., Todo, Y., Li, C., Isobe, T., & Meier, W. (2018). Improved Division Property Based Cube Attacks Exploiting Algebraic Pro-perties of Superpoly. 38th Annual International Cryptology Conference (pp. 275-305). Springer
155. Yakubov, A., Shbair, W., & State, R. (2018). BlockPGP: A Blockchain-based Framework for PGP Key Servers. The Sixth International Symposium on Computing and Networking. Hida Takayama, Japan: IEEE Xplore
156. Yakubov, A., Shbair, W., Wallbom, A., Sanda, D., & State, R. (2018). A Blockchain-based PKI Management Framework. The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) coloca-ted with IEEE/IFIP NOMS 2018
157. Yang, Y., & Pesavento, M. (2018). Energy Effi-ciency in MIMO Interference Channels: Social Optimality and Max-Min Fairness. Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal
158. Yang, Y., & Pesavento, M. (2018). A Parallel Best-Response Algorithm with Exact Line Search for Nonconvex Sparsity-regularized Rank Minimization. Proc. 2018 IEEE Inter-national Conference on Acoustics, Speech and Signal
159. Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Parallel and Hybrid Soft-thresholding Algorithms with Line Search for Sparse Nonlinear Regression. Proc. 26th European Signal Processing Conference
160. Yang, Y., Pesavento, M., Chatzinotas, S., & Ottersten, B. (2018). Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations. Proc. The 10th IEEE Sensor Array and Multi-channel Signal Processing Workshop
161. Zhang, Y., Humbert, M., Rahman, T., Li, C.-T., Pang, J., & Backes, M. (2018). Tagvisor: a Privacy Advisor for Sharing Hashtags. Procee-dings of the Web Conference 2018 (WWW’18) (pp. 287-296). ACM Press
162. Zhu, Panichella, A., & Zaidman, A. (2018). An Investigation of Compression Techniques to Speed up Mutation Testing. Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018
Published by: SnTEditorial and creative direction: Christine Homolko and William Upton – SnT communications maestros.Artwork: Laura Leyes – www.behance.net/lauraleyesCopy: Sara Messelar Hammerschmidt – alatus.tech/communicationsLayout: Dipl. Des. Isabel Zurowetz, www.just-my-types.dePhotography: all Kary Barthelmey, www.kary-photography.com (except p. 49: Sophie Margue)
University of Luxembourg – Interdisciplinary Centre for Security, Reliability and Trust (SnT)29, Avenue John F. Kennedy • L-1855 Luxembourg • Tel: + 352 46 66 44 5010 • snt @ uni.lu
7474
Publications