Annual Report 2017 - Université du Luxembourg

35
Annual Report 2017

Transcript of Annual Report 2017 - Université du Luxembourg

Page 1: Annual Report 2017 - Université du Luxembourg

Annual Report 2017

Page 2: Annual Report 2017 - Université du Luxembourg

03

WELCOME

Editorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Tech in 2018: Expert Predictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

RESEARCH

Applied Security and Information Assurance . . . . . . . . . . 6

Your money or your file! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Security against the quantum attack . . . . . . . . . . . . . . . . . . . . . . 8

Spotlight on: Alfredo Rial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Automation and robotics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Robotic arms and brains: the future of drone technology . . . . . 10

Microsatellites: making space travel more affordable . . . . . . . . 11

Spotlight on: Anush Manukyan . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Critical and Extreme Security and Dependability . . . . . . 12

Can you trust the miner? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Hackers might target cars in the near future . . . . . . . . . . . . . . . 14

Using logic to optimise redundancy . . . . . . . . . . . . . . . . . . . . . . . 14

CryptoLux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

The Bitcoin boom and blockchain breakthrough . . . . . . . . . . . . . 16

Hiding secrets in plain sight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Keyless entry: convenient, but at what cost? . . . . . . . . . . . . . . 19

Isolated areas need reliable networks, too . . . . . . . . . . . . . . . . . 20

Beyond encryption: what does your meta-data say about you? 20

Service and Data Management in Distributed Systems . 21

Getting up close and personal with data . . . . . . . . . . . . . . . . . . 22

How Blockchain is streamlining KYC . . . . . . . . . . . . . . . . . . . . . . 23

Spotlight on: Eric Falk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Security, Reasoning and Validation . . . . . . . . . . . . . . . . . . . 24

Keeping pace with bad programmers . . . . . . . . . . . . . . . . . . . . . 25

Teaching a computer the difference: fiscal report or patent? . . 26

Investment strategies: conservative or adventurous? . . . . . . . . 26

Signal Processing and Communications . . . . . . . . . . . . . . . 27

From facial recognition to 3D body modelling:

the need for smarter solutions . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Intelligent satellites for a rapidly-changing world . . . . . . . . . . . 29

Expanding data access through satellites . . . . . . . . . . . . . . . . . . 29

Software Verification and Validation . . . . . . . . . . . . . . . . . 30

Harnessing artificial intelligence for efficient analysis

of legal documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Accelerating software testing in cars . . . . . . . . . . . . . . . . . . . . 32

Testing the untestable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Affiliated Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

A guide for refugees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

The winning strategy in GDPR compliance . . . . . . . . . . . . . . . . . 33

TECHNOLOGY TRANSFER OFFICE

About the TTO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

ABOUT US

Who we are . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Organisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Financial Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

People . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Awards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Industry and SnT: Shaping Top Talent Together . . . . . . . . . . . . . . . 47

PROJECTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

PUBLICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Table of Contents

Table of contents

Partners:

38over

100 million euros in external funding

20 patents

45 disclosures

11 licenses

Intellectual Property

Secure and Compliant Data Management

FinTech Cybersecurity Space Systems and Resources

Autonomous Vehicles

Internet of Things

Research centre specialised in Information and Communication Technologies at the University of Luxembourg

51nationalities

Headcount: over

250

Page 3: Annual Report 2017 - Université du Luxembourg

0504

Welcome Welcome

Tech in 2018: Expert Predictions

Technology changes so fast that people are on constant lookout for the next big thing . That’s why we not only strive to push the boundaries in terms of security, reliability and trust, but we also contemplate industry trends and anticipate challenges for the near future . We turned to our experts for their predictions, hopes and ambitions for 2018 .

INITIAL COIN OFFERINGS WILL PLAY A PROMINENT ROLE

I believe that 2018 will be a key year for derived blockchain technologies and applications, such as Initial Coin Offerings (ICO) . ICO allows small investors unprecedented access to projects targeting the development of early stage technologies . However, young technologies also bring about uncertainties in terms of trust . The current lack of regulation and missing tools can lead to financial fraud . This leads me to believe that in a financial hub like Luxembourg, researchers will home in on Know Your Customer (KYC) technologies, automated evaluations of ICO projects, legal aspects, and robot-trading specifically for ICOs . There will be purely technological challenges, but also an abundance of interdisciplinary topics . Combined teams of computer scientists, econ-omists and lawyers will have to collaborate in order to push this technology toward mainstream adoption within a regulated framework .

THE TIME IS RIPE FOR MOBILE ROBOTICS

Mobile robots, like highly automated cars, service robots and drones – could become a huge market in the near future . While considerable progress has been made in single research areas such as mechatronics, computer vision or artificial intelligence, the efficient overall design and engineering of mobile robots with a high degree of autonomy is still a challenge . That’s because on top of its essential functionalities, a robotic product also needs to fulfil requirements such as safety, reliability, security and data privacy . And let’s not forget it must also comply with given regulations and laws! The required autonomous operation thus creates a new set of challenges in terms of development, such as software engineering, testing or certification . So we need to roll up our sleeves and start working on novel integrated engineering design processes .

RESILIENCE WILL DEFINE THE YEAR 2018

Distributed systems and infrastructures must become automatically secure and safe in an adaptive way, despite unpredictable accidents and attacks . Ransomware attacks like ‘Wannacry’ would be way less effective if automatic replication and diversification, e .g . with multi-cloud techniques, were routinely used in organisations . On the positive side, a key resilience technology such as Byzantine Fault Tolerance (BFT), used so far in military and critical control, is increasingly making its way into the market . A popular example is its incorporation into Blockchain techno-logies like Hyperledger Fabric . It really boils down to this: there is no trusted data over untrust-worthy infrastructures . I believe that those mastering resilience in the body of technologies will have a fantastic head start over competitors in our cyberspace full of threats .Prof . Dr . Paulo Esteves-Veríssimo

Prof . Dr . Holger Voos

Dr . habil . Radu State

Editorial

2017 was a year of records for SnT: we signed seven new partnerships, acquired 18 .7 million euros in third-party funding and grants – taking us up to 100 million – and our headcount increased by 13 per cent . Never before have we made such big leaps in a single year . This unprece-dented boom proves once again that our founding strategy has resonance – we focus on thematic areas that offer great innovative potential for Luxembourg and that attract the best scientists from around the world . This approach ensures dynamic and sustainable growth, for SnT and Luxembourg’s economy .

Although FinTech is on everyone’s lips today, four years ago – when we launched our activity in the field – it was still a niche subject . We recognised the potential of this movement early on and our efforts to expand our research activities in this domain are now bearing fruit . Today, SnT’s Fintech activities have critical mass, and in 2017 alone, we established four new partnerships with important players in the Luxembourgish financial sector . This brings us up to a total of ten FinTech partnerships! Our PayPal FNR PEARL Chair, endowed with 7 .5 million euros and to be held by a high-profile scientist, is a clear indicator that our efforts to establish Luxembourg as a world centre in Fintech are attracting international recognition .

There are of course other fields under-going rapid development both in Luxem-bourg and internationally . Space systems and resources gained substantial momen-tum last year, and they’re not showing any signs of slowing down . However, there are significant technical challenges that still need to be overcome, and SnT is equipped to make big contributions to this area – be it communications systems, software for controlling critical systems, or remote controlled vehicles such as drones and robots . And I doubt that we will have to wait until the next rocket lifts off before we see the resulting applica-

tions . Just last year, our scientists made tremendous progress by developing satel-lite software that can be deployed right here on Earth, already creating economic impact in Luxembourg .

The following pages cover all of these technological shifts, and more . You’ll notice we’ve revamped the look and feel of our annual report a bit . For the first time, we’ve asked three SnT experts to reflect on 2017 and to share their thoughts on the year to come . These 2018 hopes and predictions – a boom in cryptocurren-cies, mobile robots, and resilient systems – already got a foothold last year, but our experts are confident they’ll become a reality in the near future .

I hope this issue – which reflects the diversity of our activities in 2017 – inspires you to think about the ever-in-creasing need in our society for secure, reliable and trustworthy ICT . Feel free to give us feedback about this report at snt-comm@uni .lu . And you can also circle our next Partnership Day in your calendar: 5 June 2018 .

Prof . Dr . Björn Ottersten Director

Prof . Dr . Björn Ottersten

f back to table of contents

Page 4: Annual Report 2017 - Université du Luxembourg

07

Research

06

Research

Your money or your file!

All technologies are double-edged swords, and cryptocur-rencies are no exception . On one hand, cryptocurrencies provide a decentralised form of banking, arguably doing away with the need for middle-men and bankers . On the other, cyber currencies have also been embraced by criminals . The anonymity of Bitcoin and similar currencies is well suited for criminal transactions, and these have become the payment method of choice for ransomware criminals .

Ransomware is a form of malware, or malicious software . When it runs on your machine, it encrypts or locks critical files making it impossible to open them . An infected ma-chine becomes unusable, and data becomes inaccessible . WannaCry, the infamous ransomware that hit the world in May 2017, infected more than 100,000 computers in 150 countries causing damages estimated to be worth around $5 billion . However, ransomware does not ruin your files completely like old fashion computer viruses do . Instead it holds them to ransom and only criminals can offer the key to unlock them after payment .

Researchers at SnT are studying the crypto-ransom threat and looking for a better way to protect people’s data . Dr . Gabriele Lenzini, Ziya Alper Genç and Prof . Dr . Peter Ryan

are taking a different approach by looking at a novel cryp-tographic method to deal with the threat of malware at its source and prevent it from encrypting files in the first place .

“Cryptography is the fuel for ransomware, since encrypting a user’s valuable files is what criminals do . By recognising how they do this, we think we can counter them,” says Lenzini . “Essentially, it's about defeating ransomware at its root .”

By studying how to detect ‘encryption traces’ that ransom-ware leaves when it begins working in the background of a system, the SnT team hopes to find a way to stop it from completing its malicious task .

“We are also looking at the future of ransomware” says Genç . “We want to understand not only how current malware works but also anticipate how it can work and will work in the future .” The goal is to be able to develop a long-lasting defence against ransomware .

The group is currently looking for partnerships to pursue research and development of this approach . “In the end the goal is to help stop one of the evil aspects of crypto-graphy and cryptocurrencies,” says Lenzini .

Dr . Gabriele Lenzini

Applied Security and Information Assurance

The Applied Security and Information Assurance Research Group (APSIA) specialises in the mathematical foundations of information assurance, a field that involves protecting the integrity, availability, authenticity, non-repudiation and confidentiality of data . In particular, it focuses on secure

verifiable voting systems, electronic secure exam systems, the mathematical modelling and analysis of information flows, the design and analysis of cryptographic primitives and protocols, privacy enhancing technologies and game-theoretic analysis of security properties .

Our speciality might be secure, verifiable voting schemes, but we’ve also made significant contributions in the design and analysis of crypto protocols, in particular authenticated key establishment protocols. APSIA’s twenty first-rate researchers have worked hard to build a solid network with several high-profile research groups around the world, opening doors to lively collaborations and keeping us on our toes.

Research areas

FinTech Cybersecurity

Expertise

• Crypto primitives

• Crypto protocols

• Privacy enhancing technologies

• Quantum crypto

• Secure voting

Prof . Dr . Peter Y .A . Ryan, head of APSIA

More from APSIA

f back to table of contents

Page 5: Annual Report 2017 - Université du Luxembourg

09

Research

08

Research

Automation and Robotics

The Automation and Robotics Research Group has two focus areas . In the field of autonomous vehicles and robots, it investigates approaches to perception, control, adaptation and learning for networked autonomous cars, service robots, drones and space robots . In the world of large-scale, complex

distributed systems, such as energy networks, the group is interested in novel distributed estimation, control and optimisation algorithms . Furthermore, it investigates novel approaches for resilient automation systems and cyber attack-tolerant control .

Our top-level researchers each bring complementary expertise and great team spirit to the group. We are striving for stellar and visible innovation on an international level. It is a privilege to be involved in such challenging research areas and to have the chance to cooperate with ambi-tious industrial, administrative and academic partners.

Research areas Expertise

• Control engineering

• Autonomous systems

• Perception

• Networked control

• Systems engineering

Space Systems and Resources

Autonomous Vehicles

Internet of Things

Prof . Dr . Holger Voos, head of Automation and Robotics

More from Automation and Robotics

Security against the quantum attack

Author Edgar Allan Poe once declared: “It may be roundly asserted that human ingenuity can-not concoct a cipher which human ingenuity cannot resolve .” So far, Poe has been correct .

Nobody can be sure when someone will suc-ceed in building a large-scale quantum comput-er, but there is growing excitement, and invest-ment, in the prospect of quantum computing .

Spotlight on: Alfredo RialDr . Alfredo Rial, with his longtime interest in security and privacy, has dedicated his career to researching ways to secure information through inventive and innovative techniques in the field of cryp-tography . He first encountered the field at the end of his Master’s degree at KU Leuven in Belgium .

“From there I became highly interested in researching cryptography and in finding better ways to protect user privacy,” he says . “It was clear that there was a great need for this then, and there still is .”

Rial’s project proposal was retained for funding through the presti-gious 2017 Luxembourg National Research Fund (FNR) CORE (junior track) research programme . He intends to further his research in various cryptographic methods, bolstering the security of applica-tions like e-commerce, e-billing, location-based services and other sensitive scenarios where user privacy needs to be protected .

With such techniques, for example, it’s possible for online shoppers to purchase digital items without revea-ling to vendors what they purchased, giving shoppers an additional layer of privacy online .

As part of the three-year project, Rial’s rese-arch centres around a cryptographic principle known as “zero-knowledge proof,” which allows parties to verify each other’s behavior securely in a way that does not reveal sensitive information .

“If zero sensitive information is revealed, there’s nothing to be stolen,” he says . “It’s an elegant system that will play a crucial future role in protecting user privacy while online .”

encryption processes already vulnerable to quantum attacks .

“Quantum computers will pose a major security threat for devices and data,” says SnT researcher Prof . Dr . Peter Y .A . Ryan . “We don’t know yet when that might be, but we know we need to be ready with TPMs capable of handling the new attacks .”

To address this problem, Ryan and his team are contributing to the evolution of TPM secu-rity through a four-year Horizon 2020 project, consisting of a consortium of international collaborators including IBM Zürich, the Univer-sity of Surrey, UK, and the Weissman Institute, Israel . Each is working on different compo-nents of the new TPM security measure . Ryan’s group is focusing on theoretical foun-dations of design and analysis for improved encryption algorithms and protocols .

“In order to make a system capable of handling the new threat, we need to design a security system that works in new and innova-tive ways,” says Ryan .

Faced with this, many cryptographers have been turning their attention to developing crypto-algorithms, so-called “post-quantum” algorithms, able to withstand the blistering attacks of quantum computers . In particular, a long-standing hardware security mecha-nism known as the Trusted Program Module, or TPM, the anchor of trust that secures millions of devices worldwide, depends on

Prof . Dr . Peter Y .A . Ryan

f back to table of contents

Page 6: Annual Report 2017 - Université du Luxembourg

1110

Research Research

Microsatellites: making space travel more affordableGoing into space is expensive . Launching a satellite in an Ariane 5 rocket, for example, costs over 100 million euros . For many companies who want to launch a clever idea into orbit, this is simply unaffordable . “So de-ploying satellites has long been the preserve of space agencies or mega enterprises,” says SnT researcher Prof . Dr . Holger Voos .

LuxSpace Sàrl, a subsidiary of the space company OHB, is heading in another direction . The company, headquartered in Betzdorf, believes microsatellites are the way to go for those smaller, private providers who want to partake in space travel . That's where SnT ex-pertise comes in . The centre signed a project partnership with Luxspace toward the end

Electronic brains and artificial intelligence: many people shy away from these topics . Anush Manukyan, on the other hand, loves to be surrounded by robots and smart machines . SnT has proven to be an ideal playground for her passion .

Manukyan grew up in Armenia, where she studied applied mathe-matics and informatics . She came to Luxembourg in 2013 to pursue her second master’s degree . “I was then offered the opportunity to work on a fascinating project which brought the cooperation between different robots closer to the public,” Manukyan tells us . “I really enjoyed this project, so I decided to continue working with robots” .

Since autumn 2016, the computer scientist has been working on her doctorate, focusing in particular on unmanned aerial vehicles

(UAV), or drones . “They are increa-singly being used in many different contexts, ranging from military and agriculture to entertainment and even parcel delivery,” says Manukyan . Her objective is to use Artificial Intelligence to help drones per-form tasks safely and precisely and prevent any critical accidents .

Anush Manukyan also tinkers with Artificial Intelligence outside of SnT . “In my free time, I volunteer at the Luxembourg Tech School, a place where high school students can get free coaching and acquire tech skills” Manukyan says . The SnT researcher is keen on motivating more young people to pursue an education in ICT .

of 2017 . “We aim to develop new concepts and developmental processes, and to help analyse their opportunities and threats,” Voos explains .

The task requires a radical paradigm shift . The only way to lower the cost is to introduce commercial off-the-shelf launchers . “The aim is to build lines of models that can be easily adapted to different applications,” says Voos . Lower deployment costs could enable applica-tions such as the provision of high-resolution images from space to help track down bush-fires or optimise the use of fertilisers .

Computer chips on board satellites provide another opportunity to lower costs . It may be possible in the future to replace expensive chips which feature enhanced protection against harsh cosmic radiation, with proces-sors similar to those used in our computers down here on earth . Voos explains: “They might be less robust – but they are good enough to be used profitably for a while at least .” The project will be running tests to estimate just how long such ‘earthly’ compo-nents would be useful in space .

Spotlight on: Anush Manukyan

Prof . Dr . Holger Voos

Robotic arms and brains: the future of drone technology

Go for a walk these days and, at some stage, you’re likely to notice a flying object humming around somewhere overhead . Drones have become very popular electronic toys . But they can do so much more than entertain hobby pilots . They are quickly establishing them-selves as valuable helpers for industry, trade and authorities .

Researchers in the team of Prof . Dr . Holger Voos are laying the ground for taking drones to the next level in cooperation with a wide range of partners .

One such partner is LuxConnect . The Bettem-bourg-based company operates several data centres in Luxembourg as nodes for the country’s digital traffic . “LuxConnect wants to employ drones in the near future to protect these critical facilities against unauthorised access,” Voos reveals . The flying machines would serve as backup for the security staff . “We are developing hardware and software for this, which has already proved successful

Another field that could benefit from this functionality is construction: “Drones could inspect and repair buildings from the air, or pick up and transport materials on construc-tion sites .”

Even internationally, research into flying robots with ‘arms’ is still in its infancy . “We are exploring how all of the necessary components can be packed into the drones,” Voos continues . “And we are developing control systems for keeping the drones stable in the air while they work with the robot arm .”

In October 2017, a delegation from the Luxem-bourg Ministry of the Economy visited SnT to catch up with the project’s success so far . The Ministry is also responsible for defence policy – something that is peculiar to Luxembourg, and an enormous advantage, as Voos asserts: “It means results from security-related re-search can make their way rapidly and easily into the private sector .”

Dr . Jose Sanchez Lopez, Prof . Dr . Holger Voos and Dr . Miguel Olivares Mendez

in the lab,” Voos reports . “Experiments will soon be conducted onsite at the data centres .”

To this end, researchers must tackle questions such as: How can several drones work together in coordination? What degree of autonomy do they need? And how can they cooperate safely with human ‘colleagues’? “Most drones are still remotely controlled,” says Voos . “But they are becoming increas-ingly autonomous .” At SnT, for example, researchers are equipping the flying robots with sensors and artificial intelligence .

Such independence also serves well on military assignments, as the team are proving in their work with the Luxembourg Army . One aim is to use drones for handling objects – or in technical jargon, ‘flying manipulation’ . “For this, we want to equip drones with a robot arm,” Voos explains . This arm could be used, for example, to transport and install sensors into hard-to-reach or dangerous places .

f back to table of contents

Page 7: Annual Report 2017 - Université du Luxembourg

13

Research

12

Research

Can you trust the miner?

At the heart of cryptocurrencies such as Bitcoin is the blockchain principle, whereby a transparent shared ledger, open for all to see, records all transactions . A block in a blockchain is a record of transactions, like a page in a ledger . When the page is full, we open a new page . In the case of a cryptocurrency we gain a new block in the blockchain .

The challenge here is that if new blocks are created too quickly and without regulation, then this can result in conflicting blocks . To prevent this, so-called ‘miners’ – this can be anyone with access to specialised hardware – perform a difficult cryptographic computing task to create and verify a new block .

Despite this safety mechanism, the Bitcoin system suffers from a known weakness . If a given miner owns a majority of the total mining power in the system then he can add blocks to the blockchain faster than the rest of the network and spend his coins several times . “This vulnerability can be exploited through a flash attack, where someone briefly hires computing power and can therefore carry out such a 51% attack,” explains Dr . Jiangshan Yu, researcher at SnT .

To prevent such flash attacks from influencing the validity of a blockchain transfer, Yu and his colleagues have developed a solution that takes the long-term performance and reliability of a miner into account . Their system – RepuCoin – is the first to provide guarantees even when an attacker temporarily dominates more than 50 per cent of the system’s computing power . “Rather than simply using computer processing power to dictate how much of the system a miner controls, the RepuCoin algorithm uses what we call integrated power,” says Yu . Miners gain this integrated power gradually based on consistent and honest hard work over long periods . This not only delays and discourages any attack but also means that the same attack cannot occur twice; any rogue miner would lose their integrated power .

A happy consequence of their method is that it also accelerates transaction processing . Bitcoin users currently have to wait hours or days for a transaction to be verified because fewer than 20 transactions can be performed worldwide per second . “The algorithm we propose brings it up to 10,000 transactions per second,” says Yu, who hopes that one or more cryptocurrencies will opt to use it in the near future .

Dr . Jiangshan Yu

Critical and Extreme Security and Dependability

The Critical and Extreme Security and Dependability Research Group (CritiX) is concerned with extreme threats to critical information infrastructures (e .g . power grid control or auto-nomous driving systems), such as faults or attacks by highly skilled and well-equipped hacking teams . System complexity has reached a point where it is no longer possible to rule out

all vulnerabilities or to protect systems manually . The key here is therefore resilience; researchers focus on investi-gating automated methods and architectures to ensure that systems remain safe and operational even when compro-mised or under attack .

Our scientists have obtained successful results in all strategic areas, converging on our ultimate goal of ‘off-the-shelf resilience.’ The partnership with Intel (see page 14) is extremely rewarding, all the more so since the new institute is named ‘Collaborative Autonomous and Resilient Systems’. None of this would have been possible without the combined expertise and team spirit of this group of researchers.

Research areas Expertise

• Resilience

• Applied Security and Cryptography

• Dependability

• Distributed computing

• Fault and Intrusion Tolerance

• Real-Time and Embedded SystemsFinTech Cybersecurity Autonomous

Vehicles

Prof . Dr . Paulo Esteves-Veríssimo, head of CritiX

More from CritiX

f back to table of contents

Page 8: Annual Report 2017 - Université du Luxembourg

15

Research

14

Research

CryptoLux

The CryptoLux Research Group strives for a greater under-standing of how cryptosystems get broken in the real world, how they can be designed and implemented to better resist attacks, and how they should be used to build secure systems and networks . Scientists explore many different angles, from

mathematical design with provably secure properties, to efficient and secure implementation aspects . The group also studies the impact of cryptography on modern society which manifests itself in the form of privacy preserving communi-cation on the Internet, or blockchains and cryptocurrencies .

I feel privileged to work with a team of excellent researchers who place great care in studying all aspects of cryptography and information security from multiple perspectives. We are one of the few academic research teams worldwide that possesses expertise across the full spectrum of cryptology. This enables us to measure closely and predict the impact of these technologies on modern society.

Research areas Expertise

• Algorithm design

• Cryptanalysis

• Communication security and privacy

• Efficient implementations and reverse engineering

• Side-channel attacks and countermeasures

• Financial cryptography, cryptocurrencies, blockchainFinTech Cybersecurity

Prof . Dr . Alex Biryukov, head of CrytoLux

More from CryptoLux

Hackers might target cars in the near future

Using logic to optimise redundancy

What do bridge towers and the steel parts of car bodies have in com-mon? They’re both safety factors . When it comes to safety-critical com-ponents, engineers like to include securities . Another practice is adding redundant components: installing multiple copies of certain items . In driverless vehicles, this could be applied to the digital instrumentation and control systems . If one sensor fails, then the system uses data from a backup component . But a programming error in the software of these so-called cyber-physical systems would show up in all components using the faulty code . So one has to either write bug-free programs or use components running completely different software to have proper redundancy – or preferably both .

Hackers are usually known for going after bank accounts, emails of presidential candi-dates, or control centres of power plants . IT experts are familiar with these attacks and have a high success rate at thwarting them . But there is a whole new set of vulnerabilities open to attack in complex control systems – like those used in cars . This is true as much for the cars we’re driving today as for the autonomous vehicles that could be driving us tomorrow . Accordingly, SnT researchers are already hard at work developing defence systems to tackle this challenge .

“One key to security is diversity of compo-nents,” explains Dr . Marcus Völp, a researcher at SnT . If a hacker manages to crack the brake system of one manufacturer, for example, that doesn’t necessarily mean he can get into the brake system of another . Unfortunately, not all components are so diverse . Project lead Prof . Dr . Paulo Esteves-Veríssimo confirms this . “The Controller Area Network (CAN) bus used

to connect electronics in most cars nowadays isn’t safe . In experiments, experts were able to take control of an SUV using radio waves alone, and make it involuntarily drive in reverse .”

The risk of these attacks is even greater in autonomous vehicles that need to communi-cate with one another . Scientists at SnT are therefore cooperating with the Intel Colla-borative Research Institute for Collaborative Autonomous & Resilient Systems (ICRI-CARS) to tackle new challenges in the IT security of autonomous driving . “The future of vehicles isn’t so much fully autonomous cars but cooperative vehicles,” explains Dr . David Kozhaya . He continues: “the cars of tomorrow will wirelessly communicate to their environment where they are and where they want to go .”

This networking between vehicles, however, opens up new channels that malicious at-

tackers can exploit . What would happen, for example, if a hacker were to force a vehicle to report a false location or the wrong speed limit?

Völp outlines the challenge: “The vehicle’s systems must be able to identify when there is something wrong with the data . Then, they must immediately decide which data can be trusted and which cannot .” One part of the solution is to include multiple components ser-ving the same purpose but based on different systems . If one of these is compromised, the vehicle can still reconcile in real time which data is correct and which should be discarded . SnT and Intel are working together to ensure this all happens in a quick and reliable manner so that vehicles will be able to share the optimised traffic information securely among themselves .

SnT researcher Dr . Vincent Rahli explains: “Many tools have been developed over the last decade to help develop bug-free programs, such as theorem provers .” These can indeed be used to prove logically, and to the highest known reliability, that a given program will always execute a defined function correctly .

“However,” PhD student Ivana Vukotic adds, “cyber-physical systems present new challenges for the formal logic of the theorem provers because the physical component is especially difficult to model .” In cooperation with colleagues from Carnegie Mellon University, Rahli and Vukotic have now successfully verified the correctness of the theorem prover KeYmaera for cyber-physical systems . This proof significantly adds trust to the programs that are verified by this prover .

Vukotic sums it up: “Our work is part of a verification chain that checks that the algorithms work properly from simple machine codes of microcomputers to complex control programs of autonomous vehicles .” Programmes verified in this manner come closer to being one hundred percent reliable – and only then does a redundant design of cyber-physical hardware truly offer twice the security .

Dr . Marcus Völp, Prof . Dr . Paulo Esteves-Veríssimo and Dr . David Kozhaya

Dr . Vincent Rahli and Ivana Vukotic

f back to table of contents

Page 9: Annual Report 2017 - Université du Luxembourg

1716

Research Research

Hiding secrets in plain sight

The fact that British WWII soldiers managed to seize an Enigma cipher machine and the corresponding encryption codes from a cap-tured German U-Boat was an important factor in winning the Battle of the Atlantic . Having access to this device was necessary since, in addition to code books, part of the secret key was hardwired into the Enigma machine itself . Using the captured Wehr-macht Enigma, the Allies’ cryptographers were able to learn the secret details of the machine – and were henceforth able to decrypt and read the encrypted radio com-munications .

“This kind of attack on an encryption system, where the attacker has all the information at hand, is known as a ‘white-box attack’, as opposed to a ‘black-box attack’, where you only have access to the encrypted trans-missions,” explains Aleksei Udovenko, who researches cryptographic systems together with Prof . Dr . Alex Biryukov at SnT .

“There are commercially available encryption methods in which the key and algorithm are both stored together . These must be secured against white-box attacks,” says Biryukov, presenting the motivation behind their work . Most of the white-box techniques currently available on the market rely on security-by-obscurity, but researchers are able to reverse engineer and break these . Still, white-box encryption techniques are important in many business applications, like in digital rights management for music or videos, pay-TV or in smartphone-based mobile payments .

In order to accelerate the development of a secure white-box encryption method, the European ECRYPT CSA Consortium hosted an encryption/decryption competition in the summer of 2017 . The challenge was to hide both key and code for the world’s most widely used Advanced Encryption Standard (AES) method so cleverly in a public pro-gramme that the key could not be found .

Udovenko and Biryukov won the competition by a considerable margin by providing the most resistant design and by breaking numerous competing implementations along the way . “We used several advanced techniques to obtain resistance to certain powerful cryptanalytic attacks,” the winners describe . “We also added fault-tolerance and so-called side-channel resistance, and made the code as difficult to read by humans as possible .” With the electromechanical Enigma analogy, this would be like building a factory full of interconnected ciphering machines with extra gears and wires so that the hacker would never be able to crack the code despite being able to actively tamper with all the machines .

“This problem of hiding secrets in plain sight is related to fundamental challenges in com-puter science,” Biryukov summarises . “The question of whether efficient and secure white-box cryptography is possible is still open .”

The Bitcoin boom and blockchain breakthrough

prevents banks from capitalising on its potential . “Euro-pean law mandates that banks keep information about their customers, in a so-called Know Your Customer (KYC) regulation, to avoid criminal activity such as money laun-dering,” explains fellow PhD student Sergei Tikhomirov . Together with three other scientists, Feher and Tikhomirov took part in the LuxBlockHackathon, an international com-petition to help solve this problem for the asset manage-ment industry .

“With the blockchain technology application we devel-oped, we can largely maintain the customer’s privacy while satisfying the KYC regulation,” says Tikhomirov . The key is to assign a digital KYC certificate . Once customers have obtained this certificate, they can then participate in blockchain trading without having to reveal their own identity to other trading partners . For its solution, the SnT team shared first prize, 1 .5 million Stellar Lumens, with a team from Kiev .

Regardless of the results of current fluctuations in the cryptocurrency market, Feher and Tikhomirov are steadfast in their resolve to continue researching blockchain techno-logy . Tikhomirov is working to improve the much-desired privacy during the transaction process in the cryptocurrency zcash, which was introduced in 2016 . Meanwhile, Feher is constantly looking for new ways to break the anonymity of already completed transactions which are stored in the ledger .

Sergei Tikhomirov and Daniel Feher

Serious currencies or a speculative bubble waiting to burst? Cryptocurrencies such as Bitcoin, Ethereum and Ripple followed quite a sensational course in 2017 . From January to December, for example, the value of a single Bitcoin rose from just under EUR 1,000 to EUR 16,500 – only to fall back down to EUR 10,000 by the turn of the year .

Given such unpredictable market trajectories, it’s no sur-prise that some people are dismissing cryptocurrencies as hype . But at their heart is a technology with the potential to transcend any gold rush mentality – blockchain . “Block-chain presents an entirely new way of managing assets of all kinds, and banks are interested in using it”, says Daniel Feher, a PhD student working in the field of cryptography with Prof . Dr . Alex Biryukov . While all classical banking transactions rely on a central database for validation and authorisation, the blockchain method is entirely distri-

buted . Computers distributed around the world verify transactions, which are carried

forward in a shared ledger – the blockchain . There is no need for,

or possibility of, human inter-vention in the process .

Ironically, anonymity – the very thing for which blockchain technology is so often praised –

f back to table of contents

Page 10: Annual Report 2017 - Université du Luxembourg

19

Research

18

Research

Keyless entry: convenient, but at what cost?When it comes to convenience and comfort, car manufacturers take the design of automo-bile features very seriously . But it’s precisely these well-meant elements, such as drive by wire tech, hands-free Bluetooth connectivity, and keyless entry, that have proved vulnerable .

Keyless entry in particular has provided a rich hunting ground for clever thieves . SnT researcher Dr . Florian Adamsky and his col-leagues are working to stop these thieves by designing a more secure system between the owner’s key and the car .

In modern vehicles featuring passive keyless entry and start, a transmitter in the car sends a signal, which the owner’s key fob receives and returns as they approach the car . Once the car checks and confirms the signal, the doors open and push-button start is enabled .

Car thieves, however, have found a way to exploit a vulnerability in the keyless entry system; with one person near the vehicle and an accomplice near the victim, the thieves

can amplify the signals between key and car, unlocking the vehicle at a distance without anyone knowing .

“The basis of the attack is simple, and can be conducted using off-the-shelf products”, says Adamsky . “So we’re researching how to make it impossible for this kind of attack to ever happen .”

Adamsky and his team have proposed a novel solution to the problem by improving the car’s internal systems used to validate the key signature . Rather than simply recognising the key and opening the door, the new system will also take into account the time it takes for the signal to be received . If the transmission takes longer than predetermined, the car will neither open nor start .

Adamsky’s proposed method relies on the fact that it takes time for information to travel: a signal sent 20 meters away from the car takes longer to travel than a signal sent from the owner’s key only one meter away . To achieve

this, Adamsky and his team need to develop software capable of detecting very short time intervals .

“A few millionths of a second is a difference between lock and unlock,” says Adamsky . “So we’re working to create a system that’s rapid, but also reliable .”

Adamsky and his colleagues have partnered with Honda to explore a new security system around existing technologies . They are also investigating ways to integrate additional security features by creating a ‘fingerprint’ of how and when the key interacts with the car . This can be used as an extra security feature by identifying normal usage and blocking access when an attack occurs .

Sasan Jafarnejad, Dr . Florian Adamsky and Dr . Ridha Soua

Networking

The Networking Research Group (NetLab) conducts both fundamental and applied research in computer networking, privacy, and security . It focuses on the areas of privacy by distribution, network and system security, Supervisory

Control and Data Acquisition (SCADA) and cybersecurity, IoT, vehicular communication and multimodal traffic management, and wireless networks and mobile security .

This year again, our researchers advanced the state-of-the-art in the areas of traffic analysis and secure and private communication protocols, with 30+ publications in top conferences and two high-profile workshops. Our Bluetooth LE for V2X project caught the attention of BMW where our recent PhD graduate was offered a position. Our industry-driven R&D also led to major collaborators and the pursuing of 20+ projects, namely with CREOS, Honda, Telindus and RedDog as partners in advancing real-life applications of secure intelligent transport systems, IoT and privacy-friendly communications.

Research areas Expertise

• IoT

• Security

• Privacy

• Traffic analysis

• Vehicular communication

• Computer networksCybersecurity Autonomous

VehiclesInternet of Things

Prof . Dr . Thomas Engel, head of NetLab

More from NetLab

19f back e of contents

Page 11: Annual Report 2017 - Université du Luxembourg

21

Research

20

Research

Service and Data Management in Distributed Systems

The Service and Data Management in Distributed Systems Research Group (SEDAN) works on blockchain, cloud computing and data analytics, developing new architectures,

algorithms and approaches for dealing with the ever-increasing volumes of data that characterise the modern world .

I feel privileged to work in an environment with such a high volume of expertise and creativity, where a simple coffee break can lead to exciting scientific questions and intelligent dialogues. Interacting with industrial partners is a stimulating reality check for assessing the usability and potential of our research efforts.

Research areas Expertise

• Security

• Blockchain

• Big data

• Self-driving vehicles

• Computer Networks

• Big data architecturesFinTech Cybersecurity Autonomous

Vehicles

Dr . Radu State, head of SEDAN

More from SEDAN

Isolated areas need reliable networks, too

For industries operating in remote regions of the world, connectivity remains a constant challenge . Far away from terrestrial communication towers, operations in these distant areas rely on satellite communica-tions to monitor day-to-day activities and to deliver data generated by connected monitoring devices .

SnT researcher Dr . Ridha Soua explains, for example, that in the case of a natural gas pipeline located in an area such as a desert constant monitoring of the pipeline system is crucial for operations, the environ-ment and workers . One solution is to place monitoring devices along the totality of the pipeline . But in a hostile environment like the desert electronics are prone to fail and present a significant challenge for the network .

That’s why Soua is investigating application protocols for the Internet of Things (IoT) to communicate with satellites from these remote areas more efficiently . “Anything located in these faraway places needs to be extremely reliable and require little maintenance,” says Soua . “Since access to these areas is limited it could take hours or days to reach an affected area .”

The research project, called Machine to Machine Satellite Communica-tion (M2MSat), is a collaboration scheduled to run until May 2018 bet-ween the Luxembourg Institute of Science and Technology (LIST), SES Techcom Services, Joanneum Research, and SnT . Together they hope to optimise IoT Application protocols to ensure reliable IoT connectivity in integrated satellite-terrestrial networks .

Beyond encryption: what does your meta-data say about you?Encryption has become a go-to technology for securing digital information over the web; simply pick a trusted encryption method and the information is virtually impossible to decrypt . But that’s not the whole story .

“To be truly secure online we have to look at the big picture,” says SnT researcher Dr . Andriy Panchenko . “And that goes beyond what’s just being sent in the encrypted message .”

Panchenko explains that there are several variables in web traffic that can give away a user’s information . “It’s actually possible to learn a lot about what information is being sent without even trying to break the en-cryption .” This process is called traffic analy-sis: hackers can delve into what’s called the meta-data of a message, meaning the time between and size and direction of the data packets . All of these details can give them clues as to what’s in the message .

Panchenko is working with researchers at University College London to understand and hide information from would-be hackers and

protect privacy . At the core of his research, Panchenko’s strategy is to split the message into multiple parts and send these via several paths, making it harder to deduce what’s being sent . Once delivered, the pieces are rearranged together to make a complete package . The key is to do so in a way that preserves the privacy and the integrity of the message, and that does this efficiently .

Currently, Panchenko is researching ways to secure information sent over the Tor network, an already obscure and well-hidden network of traffic being sent around the world .

“By learning how to secure data over the Tor network, we can easily apply this to more simplified privacy systems on the web,” says Panchenko . “This research provides an additional building block to further protect online privacy .”

Dr . Ridha Soua

Dr . Andriy Panchenko

f back to table of contents

Page 12: Annual Report 2017 - Université du Luxembourg

2322

Research Research

Spotlight on: Eric Falk However you measure it, the Internet is growing faster than pretty much any other technology . Millions of pieces of data are being generated every second, for example when people order a product or talk over Skype . The issue here is that recipients don’t always have the capacity to process the data immediately – sometimes it needs to be put on hold .

That’s where Dr . Eric Falk comes in . The 31-year old researcher, who recently completed his PhD at SnT, has developed a query function for the free web Apache Kafka platform: Kafka is like an interim storage facility for information, it stores and forwards this mobile data . Falk, who develops creative solutions for managing large volumes of data quickly realised that just because this data is in ‘limbo’ doesn’t mean that it can’t be useful . His solution is called Queryable Kafka, which allows users to search for detailed

How Blockchain is streamlining KYC

Banks and financial institutions spend vast sums of money on compliance with Know Your Customer (KYC) regulations . They are required by law to verify the identity of each new customer they acquire . These regula-tions apply equally to all such institutions in Luxembourg and yet, due to the possibility of the manipulation of digital identification documents, banks tackle KYC individually at considerable expense .

To address these inefficiencies, a team of researchers at SnT is currently exploring the use of blockchain to provide a shared solution for KYC . Blockchain is a new and burgeoning technology which shot into public conscious-ness with the advent of Bitcoin in 2009 . While blockchain technology was originally used to record financial transactions, it has been found to have a large untapped potential for applications in many other areas . The fact that information on a blockchain can only be altered with a majority consensus by all par-ticipants from across the blockchain network makes it highly attractive for a shared and trustworthy KYC solution .

Led by Dr . Radu State, the research project launched in May 2017 . “We are aiming to create a more cost effective, distributed system backed by scientific research”, says Robert Norvill, the primary researcher for the project . “Blockchain technology has huge potential, but it has to be applied carefully to the specific challenges of KYC .”

The project is a cooperative effort between SnT, the Luxembourg School of Finance and the Luxembourg Bankers Association (ABBL) . The core research group includes represen-

information in the vast Kafka data stream . Using this, investigators could search for racist wording, or telecom-munications companies could look at the duration or number of voice connections in order to optimise network usage .

Big Data isn’t the only thing that keeps the Franco-German PhD busy . Falk also makes time to spearhead a local meetup: Data Science Luxembourg . Founded in the early years of SnT, over the last few years the meetup group has become the largest such community in the region, with over 1,500 members . “We invite IT experts all the time for fascinating discussions about data science . I just feel it’s important to share your knowledge with others .”

tatives from the Banque et Caisse d'Épargne de l'État (Spuerkeess), BGL BNP Paribas and BNY Mellon .

“We are excited to work with our partners in the financial sector . We expect, through research, to produce one platform that can be used by all banks” said State . The team is aiming to provide a long lasting and stable solution which is backed by thorough research . The results of the project could have a tangible impact on Luxembourg’s financial sector .”

Robert Norvill

Getting up close and personal with data

If you want to present a 3D model or visualise abstract data on a computer, you’ll quickly run up against limitations using a keyboard and mouse . SnT researchers Dr . Jorge Augusto Meira and PhD candidate Patrick Glauner are therefore developing new, more intuitive ways to view and edit data .

Meira and Glauner are using Microsoft’s HoloLens to create so-called mixed realities . A head-mounted display projects data onto a visor so the user sees it superimposed onto his or her environment . “Normally, we deal with the analysis of large data volumes – Big Data – using machine learning algorithms,” says Meira . These methods can detect interesting correlations and patterns in large amounts of data . “With the HoloLens we are now taking it a step further . We are making the data tangible and thus easier to understand and interpret .”

For Choice Technologies, for example, the two researchers have de-veloped a HoloLens app that can detect electricity thieves by analysing customer and consumption data . “Electricity theft through illegal power lines and meter manipulation is a real problem in some countries,” says Glauner . “We use our machine learning method on data from a Brazilian electricity utility and can detect theft automatically from suspicious consumption patterns” .

To show the utility exactly how the software attains its results, the re-searchers developed a HoloLens visualisation app that places red dots on a 3D map to show where the electricity theft is occurring . When you point to a dot with a hand gesture, the HoloLens calls up the respective data, from which it becomes clear why the software singled out that customer in that particular location .

In another project, in collaboration with Luxembourg-based commu-nications expert Max Gindt, Glauner and Meira have developed an application for the medical profession that allows users to view and edit conventional computerised tomography (CT) or ultrasound images in three dimensions . A surgeon can use the HoloLens, for example, to navigate throughout the body and edit certain areas using hand gestu-res, rather than clicking tediously around in the picture .

“With machine learning”, continues Glauner, “the computer can recognise certain organs and create references so that it can show how much a surgical procedure in a certain place would influence, for example, the blood flow .” The HoloLens projects this information onto an image of the body’s interior . The electricity theft detection app prototype has shown promising results and, for the time being, the researchers are continuing to perfect their medical application .

Dr . Jorge Meira, Patrick Glauner and Max Gindt (Digital Lëtzebuerg)

f back to table of contents

Page 13: Annual Report 2017 - Université du Luxembourg

25

Research

24

Research

Keeping pace with bad programmers

In the Google Play Store, the market platform for Android apps, you have over two million apps to choose from . But the quality of these apps varies wildly . “Not all programmers are good programmers; most are even bad programmers,” suggests Dr . Tegawendé F . Bissyandé, researcher at SnT . “An increasing number of people are writing code, and development cycles are getting shorter . Often, programmers use other people’s code without really understanding it, or knowing how to fix the bugs in it .”

Bissyandé, in collaboration with Prof . Dr . Yves Le Traon, Dr . Dongsun Kim and Dr . Jacques Klein, is working to find a way out of this conundrum . More specifically, he’s looking at open source programs that can be found on platforms such as GitHub – not only limited to Google Play Store Apps . With a team of doctoral students, they are combing through these programs for recurring code fragments . Whenever they find a bug in an app whose code is used directly or largely unmodified in a series of other apps, they notify the programmer and tell him where his apps have to be fixed .

“We are working towards our goal in three projects funded by the Luxembourg National Research Fund (FNR): SemClose, Recommend and Autofix,” says Bissyandé . SemClose, with PhD candidate Kisub Kim, builds on seman-tic relationships to search for code fragments that perform the same function, even if they are not a hundred percent

identical . This helps track down bugs in multiple pieces of software and makes it easier for programmers to reuse good code for tasks that have already been addressed .

Once the search for similar program routines is complete, Recommend, with PhD candidate Anil Koyuncu, steps in to create a recommendation for correcting the discovered bugs . “When a user creates a bug report that can be traced back to a certain error in an encryption method,” says Bissyandé, “then Recommend, true to its name, recommends an established fix to all users .”

Autofix, with PhD candidate Kui Liu, then takes the process a step further . This tool will automatically develop bug fixes and insert them into the codebase . Prospectively, this means the quality of many programs can be continually improved in the background, completely unnoticed .

These three new functionalities represent very important tools for Luxembourg software developers: programmers are still a rare commodity in the Grand Duchy, and there are no giant developer teams . “With our automatic sup-port, they’ll be able to remain competitive – and even keep up in terms of quality – with larger teams .” Bissyandé is very confident that programmers will use their tools: “People are welcoming these kinds of automatic tools more than ever .”

Kisub Kim, Dr . Tegawendé Bissyandé, Anil Koyunku and Kui Liu

Security, Reasoningand Validation

The Security, Reasoning and Validation Research Group (SerVal) works in software engineering, validation and security . Scientists focus on three axes:• Innovative testing, debugging and repair techniques• Mobile security and reliability using static code analysis

and machine learning techniques• Model-driven engineering with a focus on analytics and

artificial intelligence .

The “Reasoning” part of the group’s name reflects its work on engineering scalable and sound analytics with tailored reasoning and decision-making capacities . Scientists develop innovative analytics to ease the deployment and exploitation of smart grids, connected factories, transportation systems, and more recently Fintech data .

Working on industry projects is key to feeding our research and exploring new directions. In any application domain, the trend nowadays is to rely increasingly on Artificial Intelligence and machine learning to automatically process, analyse, classify and take decisions. We’ve acquired in-depth experience of the deployment of algorithms in real-world conditions. Our scientists, as well as our spin-off DataThings (see page 35), are developing a new data pro-cessing stack organised around a scalable temporal graph data structure.

Research areas Expertise

• Software testing and repairing

• Android security

• Model-driven analytics

• Model-driven engineering

• IoT

Secure and Compliant Data Management

FinTech Cybersecurity Internet of Things

Prof . Dr . Yves Le Traon, head of SerVal

More from SerVal

f back to table of contents

Page 14: Annual Report 2017 - Université du Luxembourg

27

Research

26

Research

Signal Processing and Communications

The Signal Processing and Communications Research Group (SIGCOM) focusses on signal processing with applications in wireless communications, radar and computer vision . The work on wireless systems specifically addresses satellite communications looking at the formulation, modeling, design and analysis of future satellite networks capable of supporting

new services in a cost-efficient manner . The computer vision research, meanwhile, focuses on real-world security appli-cations such as video-based surveillance, while the group’s work on radar signal processing aims to enhance situational awareness in automotive applications .

We’ve assembled a team of highly skilled and motivated scientists from all over the world to tackle challenges in wireless communications, computer vision and radar. Public funding allows us to focus on fundamental topics, while we validate and tailor the concepts in demand driven projects with our partners, SES, IEE and Artec 3D. This research is supported through our three experimental laboratories and testbeds in communication systems, computer vision, and automotive radar. We aim to provide scientific contributions in methodology while addressing application specific challenges with our core technologies.

Prof . Dr . Björn Ottersten, head of SIGCOM

Research areas Expertise

• Signal processing

• Wireless communications

• Computer vision

• Automotive radar systems

• Satellite communications

• 3D imaging & modelingSpace Systems and Resources

Autonomous Vehicles

More from SIGCOM

Investment strategies: Conservative or adventurous?What type of investor are you? Do you have a spare thousand euros to speculate with? Or do you prefer to keep your savings and hope they’ll survive inflation? Do you hold onto your shares during a crisis, or do you quickly switch to another form of investment?

Whatever strategy you follow, you can be sure of one thing: there are many others who share a similar profile . With this in mind, SnT and BGL BNP Paribas, the fourth largest bank in Luxembourg, are investigating a method for identifying groups of bank clients with similar interests . A better understanding of client segmentation will allow the bank to adapt and promote investment products that satisfy the needs of its customers better than ever before .

Teaching a computer the difference: fiscal report or patent?

“Investors’ behaviour can be represented in sixty different variables,” explains SnT researcher Dr . Andrey Boytsov . “We have

Over two thousand documents a day – that’s the whopping volume of data employees at the Luxembourg Stock Exchange (LuxSE) have to process for the admission of securities to listing and trading . When people hold a company’s report in their hands they can tell right away whether they’re looking at quarterly figures, an annual report or a recently granted patent . “For a computer, however, it’s difficult to make this distinction,” says Antonin Carette, a PhD student at SnT .

“Even documents of the same type never really look the same,” says SnT researcher Dr . Jacques Klein, Carette’s supervisor . “So we have to teach the computer criteria by which it can identify the document type .” Carette and Klein, together with Dr . Tegawendé Bissyande, are employing machine learning methods for this . That means training the program by trial and feedback to correctly identify the type of document .

We expect that one day security dealers will have computers to assist them in their work . Once a document has been properly identified, however, certain data also have to be filtered out, formalised and copied into special documents – which costs a lot of time . But regula-tors require this so that the security can be approved for listing .

“Our program can already identify 60 document types from the context of the stock exchange with good quality,” Carette is pleased to report .

Dr . Jacques Klein and Antonin Carette

This provides the basis for the further analysis of the files . The next stage of the SmartDoc project is to extract important information automatically and enter it into the database for listing . This would reduce the workload for SnT project partner LuxSE and its employees immensely, even if the software’s algorithm still needs to be continually adjusted and monitored in the future .

Dr . Andrey Boytsov

optimised a method that lets us break down this sixty-dimensional data into a two-dimen-sional model .” Only then do groups of similar investment preferences suddenly emerge . Otherwise, they would remain hidden in complex raw data . The way the new algorithm groups clients is paramount: the decisive factor, it turns out, is how they handle risk . Furthermore, Boytsov’s algorithm, which uses machine-learning methods, now even reflects client preferences changing in real time .

Without SnT’s research, investment advisors would have to assess all sixty parameters individually for every client seeking advice . Soon, however, the optimum investment product for each customer will be just a click away .

f back to table of contents

Page 15: Annual Report 2017 - Université du Luxembourg

2928

Research Research

Intelligent satellites for a rapidly-changing worldFrom movie and music streaming to web conferencing and down-loading files – along with the ever-increasing number of people using the internet – new demands are challenging the established strategies used on satellites orbiting Earth .

“Until recently, satellites were used largely for TV broadcasting which resulted in an easily scheduled system,” says SnT researcher Dr . Bhavani Shankar . “But today, time-varying traffic caused by on-demand streaming services means satellite systems need to adapt .”

Shankar’s team has partnered up with the Société Européenne des Satellites (SES), a global leader in satellite technology, to find new ways to improve the efficiency of the transmission systems on-board satellites . To do this, researchers are exploring ways to make these improvements within the confined system of a satellite with a limited power supply . Simply increasing the broadcast power to send more data isn’t an option, and it can also cause increased interference . Instead, Shankar and his colleagues are investigating ways to process the incoming signals on-board the satellite intelligently while reducing

Expanding data access through satellitesEvery year, millions of new users join the internet . More users means greater demand on the systems supplying the data . In urban areas, terrestrial towers and ground systems meet part of this demand, but in remote re-gions users require satellites to be connected .

These satellites, however, are a finite resource . “There are limits on the amount of data a satellite can send and receive,” says Dr . Stefano Andrenacci, researcher at SnT . “These limits determine who can use them and at what price .”

In their research project SERENADE, or Satellite Precoding Hardware Demonstrator, Andrenacci and his colleagues are exploring the best way to use the limited bandwidth of satellite communications and provide more efficient service . Instead of splitting the total amount of bandwidth into smaller pieces, each of them assigned to specific geograph-ical areas (spot-beams), the team's solution enables the use of the whole bandwidth in each spot-beam . This enables the efficient

allocation of satellite resources, like internet access, according to user demands . Someone sitting on a plane flying over a remote area could now enjoy a stable internet signal throughout the flight .

“In reusing the spectrum with spot-beams we encountered a problem though, and that’s interference,” says Dr . Juan Duncan who is part of the team . “Particularly at beam edges, information can get lost or become unusable .”

distortion . This then makes it easier for receiver stations on the ground to process the relayed signals, and increases the throughput while also reducing the latency in acquiring information .

“We want to design systems that are flexible enough to handle all sorts of data with different kinds of services and it’s clear that the current process is no longer sufficient,” says Shankar . “There needs to be a better way, and we’re working on it .”

By redesigning software and hardware, the SnT team is looking for ways to overcome the problem of interference through a process carried out on the ground . This will reduce the need to build newly designed satellites from scratch in order to use this new technology .

“These ground-based designs can reduce costs and increase bandwidth efficiency,” says Duncan, “while ultimately making satel-lite based internet connections more available to the masses .”

Ashok Bandi, Dr . Sina Maleki, Dr . Symeon Chatzinotas, Dr . Joel Grotz (SES), Dr . Bhavani Shankar, Aakash Arora and Vahid Joroughi

Dr . Eva Lagunas Targarona, Dr . Christos Politis, Dr . Symeon Chatzinotas, Jevgenij Krivochiza and Dr . Stefano Andrenacci

From facial recognition to 3D body modelling: the need for smarter solutions

When Apple launched its latest iPhone X in autumn 2017 its facial recognition feature, used to unlock the phone, soon attracted attention . It wasn’t long before some individuals figured out how to find a work- around . Whether susceptible to clever tricks or triggering accidental unlocks for people with similar features, facial recognition and scan-ning technologies still have room for improvement .

Dr . Djamila Aouada, researcher at SnT, is looking to improve data processing techniques used in 3D scanners with the ultimate goal of making these systems more secure, accurate, and safer . Scanning technologies are currently used around the world and are central to application areas such as airport security, scientific research, medical diagnostics and even fashion . The SnT team has therefore partnered with Artec 3D, an industry leader in 3D scanning technologies, to improve the algorithms used in the processing and analysis of scanned data .

“The goal of our research is to find better and more efficient ways to process and extract information from the data gathered by 3D scans,” says Aouada . “With these improvements, we want to create smarter systems which can accurately represent scanned scenes, humans or

objects, even in the absence of high-quality and high-resolution data .” Crucially, the team is developing solutions using data captured with safe and non-invasive cameras .

When it comes to full-body scans, such as those used in the medical and fashion industry, clothing still constitutes a challenge – especially loose fitting fabrics or reflective surfaces . Aouada and her team are exploring ways to remove the occluding parts accurately, fill in missing information and reduce the computing time necessary for the task .

Aouada says that these improvements can eventually help improve se-curity systems too, like those found in airports used to scan passengers and detect if they are carrying dangerous objects .

The team is also tackling facial recognition software, like that used in mobile phones . By using both 3D and 2D imagery, as well as motion, researchers aim to create stronger identification systems . “Some facial recognition software can be fooled by something as simple as a 3D mould of a person’s face,” says Aouada . “But by adding the elements of motion and time we can develop software that recognises a person’s facial deformations on top of just their appearance .”

Dr . Djamila Aouada, Dr . Abd el Rahman Shabayek, Alexandre Saint, Eman Ahmed, Front: Gleb Gusev (Artec 3D)

f back to table of contents

Page 16: Annual Report 2017 - Université du Luxembourg

31

Research

30

Research

Harnessing artificial intelligence for efficient analysis of legal documents Artificial intelligence is making waves in industry and the legal domain is no exception . In 2017, the Grand Duchy’s official legal portal Legilux (http://legilux .public .lu) got a major facelift .

Traditionally, Legilux, like other national legal portals around the world, has relied on print-only formats such as PDF for legal documents . But this concept isn’t future-proof . “Print-only formats are quite limited when it comes to building smart, interactive legal services . We need flexible formats that support not only the traditional way of working with legal texts but also more advanced and computer-assisted forms of interaction”, says John Dann, the director of the Ministry of State’s Service central de législation (SCL) . A major challenge was what to do with the thousands of pages of existing legal texts . Manually trans-forming this content into a machine-readable format is prohibitively expensive .

Together with SCL and Digital Lëtzebuerg, SnT researchers have been exploring ways to employ artificial intelligence for analysing Luxem-bourg’s laws since 2016 . “Both government and the private sector are already heavily invested in software-based legal services . Artificial

intelligence can dramatically improve these services by providing advanced automation opportunities”, states Dr . Mike Sabetzadeh, the lead researcher on the project . He further explains: “Using natural language processing and machine learning, we are developing tools that can do most of this transformation automatically .”

The project has already come to fruition with the revamp of Legilux: technologies developed at SnT were applied over existing legal codes, converting these into a web-enabled – and user-friendly – format .

SnT researchers involved in this project now have their eyes on more ambitious goals . Legal compliance is one of the key topics they are investigating at the moment . To this end, the team is using artificial intelligence to automatically extract compliance requirements from legal texts and transform these requirements into precise rules . “We strive to focus our effort on problems that are of great societal impact . Our projects are done in close collaboration with industry and public-service partners . The result of our collaboration with SCL is an excellent example of what we aspire to achieve via research,” states Prof . Dr . Lionel Briand, Vice-Director of SnT .

Dr . Nicolas Sannier, Dr . Mike Sabetzadeh, Virgil Tassan-Zanin-Caser, Pascal Thill (SCL), John Dann (SCL), Marc Hisette (SCL), Prof . Dr . Lionel Briand and Amin Sleimi

Software Verification and Validation

The Software Verification and Validation Research Group (SVV) focuses on the development and design of reliable, safe, and secure software systems . Its approach includes both upstream activities, such as the analysis of system

requirements and architecture, and downstream quality assurance activities – primarily software testing and analysis . Most of these activities involve the use of artificial intelli-gence techniques to support effective automation .

We strive to develop intelligent, effective, and novel techniques to ensure that software systems are dependable and trustworthy. Our expertise includes automated testing, verification, security auditing, requirements engineering, regulatory compliance and run-time monitoring. Our projects with industry and public partners take place in a variety of domains including satellite, automotive, finance and legal.

Research areas Expertise

• Application security

• System trustworthiness

• Automated testing

• Requirements engineering

• Data protection

• System monitoringSecure and Compliant Data Management

Cybersecurity Space Systems and Resources

Autonomous Vehicles

Prof . Dr . Lionel Briand, head of SVV

More from SVV

f back to table of contents

Page 17: Annual Report 2017 - Université du Luxembourg

3332

Research Research

Affiliated Research

The smartphone – one of the most important resources for a refugee . It helps them stay in touch with family back home and it is also a way to stay abreast of current affairs or talk with other refugees . On another note, smart-phones provide access to the Internet and, consequently, to information portals of local administrations . The problem for migrants, however, is that many of these official websi-tes are simply unnavigable . The information is hidden behind puzzling menus, written in officialese, or provided in English and French but not in Arabic .

This prompted SnT scientist Prof . Dr . Charles Max to develop the smartphone platform youarewelcome .lu for refugees . It presents all information relevant to refugees concisely and in plain language – including, for example, how to apply for asylum . “We have collated the essential facts from many official sources and prepared them in a way that everyone can un-

derstand,” says Max . For the translations into Arabic and Farsi, he had help from students who are native speakers from Syria and Iran . His team of researchers also recorded spoken versions of the information: illiterate refugees can now have the information read aloud .

Max consciously decided to develop a web platform rather than an app, which would

The winning strategy in GDPR compliance

need continual adaptation to new operating systems . “Users have confidence in our platform because it always works,” says Max . “We also make sure the information is constantly up to date .” The project, which goes by the name of ‘Mobile interaction for refugee integration’ (MIRI), is funded by the Oeuvre Nationale de Secours Grande-Duchesse Charlotte of Luxembourg .

On a daily basis, most of us leave a trail of data behind, especially online . To enable citizens to have better control over their personal data, the European Union created the General Data Protection Regula-tion (GDPR) – updating the current legislation for data protection . This new set of rules will be binding for all Member States, and will take effect on 25 May 2018 . Failure to observe the GDPR could result in severe penalties for private companies as well as for actors from the public sector .

The problem is that several of the regulation's provisions remain rather vague, so that it’s still unclear how it will be fully applied in practice . “The regulation does not always give straightforward answers,” says SnT researcher Dr . Andra Giurgiu, who works with Media Law Prof . Dr . Mark Cole . “Would a manufacturer of assistant robots be held respon-sible, for example, if these sent back data from their environment to help optimise their software without the agreement of the user?” she adds .

At SnT, legal professionals cooperate closely with IT experts: “In order to enable effective protection of data, we need to combine legal and technical expertise,” says Giurgiu . “An equally important part of this collaborative approach,” says Giurgiu, “is raising awareness and building competence among those who will have to implement the regulation .” Together with the law firm Stibbe, she organised a series of round-table discussions at SnT titled ‘IT Governance and the GDPR’ . Once a month, a group of professionals from diverse backgrounds – lawyers, IT officers, public servants – thus had the opportunity to discuss the challenges, tools, and best practice pertaining to setting up GDPR-compliant mechanisms .

Dr . Andra Giurgiu and Prof . Dr . Mark Cole

A guide for refugees

Zohreh Baniasadi, Gilberto Fernandes Cardoso and Prof . Dr . Charles Max

Accelerating software testing in cars

With all the talk about autonomous vehicles of the future, it’s easy to forget that a modern mid-sized car is already packed with elec-tronics: sophisticated software controls all the components . To ensure that this software gives the right commands at the right time, it is exhaustively tested while the car is still in development . Software engineers must develop appropriate tests where every conceivable state of the software can be run through as a simulation . For example, it is necessary to verify that a car’s airbag is always enabled when an adult is seated, thus ensuring the software adheres to safety standards .

The challenge for software engineers is that manufacturers provide these specifications in plain language which then have to be trans-lated into computer commands, such as “if weight > 20 then enabled = true” . Therefore,

the actual testing can only begin after hours of laborious translation .

Dr . Fabrizio Pastore and Dr . Chunhui Wang from SnT are working on a solution to stream-line this process, a technology called Use Case Modelling for System Tests Generation (UMTG) .

Using Natural Language Processing, they automate software testing using the ma-nufacturer’s plain-language specifications . “We have built a system that extracts the

Testing the untestableIt’s the same for everything from smartphones to cars: every product has to be tested before it leaves the factory . But in complex systems, which integrate large amounts of hardware and software, the component interactions often become untestable . “For these systems, conventional software tests would take too long and cost too much,” says SnT re-searcher Dr . Shiva Nejati . “Our goal is therefore to test a complex system even before the software and hardware are ready to deploy .”

But how do you test the workings of cyber-physical systems before they even exist? The key idea here is to perform most of the testing on models – which represent relevant aspects of system behaviour, environment, structure and properties – rather than on operational systems .

SnT is investigating such methods with LuxSpace, a provider of space systems such as satellites, which comprise multiple mechanical devices, signal processors and sensors, and software components . Researchers work on developing satellite system simulators by building on mathematical and software architecture models . Using these models, they test whether system components will interact properly . “In satellites, for example, we need to ensure that commands will execute within specific time windows”, says Nejati .

The testing itself is done using a synergistic combination of artifi-cial intelligence, machine learning and traditional software testing . The research that Nejati and her colleagues Dr . Carlos Gonzalez and Mojtaba Varmazyar are doing is so important that Prof . Dr . Lionel Briand, who leads the research team, has earned a European Re-search Council advanced grant, the highest research funding prize in the EU, to work on this topic .

Mojtaba Varmazyar, Dr . Shiva Nejati and Dr . Carlos Gonzalez Perez

Dr . Fabrizio Pastore

actual information from the specifications and converts it into computer commands for the tests,” says Pastore, who is collaborating on a project with sensor manufacturer IEE . “Such an end-to-end system solution that goes all the way from plain language to testing has never existed before .”

UMTG also makes the entire testing proce-dure safer because machines never overlook a single specification or command . Project partner IEE is paving the way and already using this innovative solution .

f back to table of contents

Page 18: Annual Report 2017 - Université du Luxembourg

3534

Technology Transfer Office Technology Transfer Office

DataThings S.A.R.L.Intelligent software systems transforming data into actionable and valuable insights . datathings.com

Motion-S S.A.R.L.Detailed fleet analytics ranging from basic usage statistics to advanced data analysis . motion-s.com

Promoting entrepreneurship

A big part of the TTO’s activity revolves around helping SnT researchers to develop their entrepreneurial awareness and skills . Over the last three years the TTO, with funding from the Luxembourg National Research Fund (FNR), has managed a dozen proof of concept projects, four of which have gone on to be launched as spin-off companies .

Spotlight on: DataThings

In 2017 SnT launched its latest spin-off, DataThings, which meets an urgent need for companies to be able to analyse complex data coming from sensors and other sources . The company hit the ground running and already boasts two SMEs and one large group among its clients .

When we think of data, we tend to think of something static, rooted in the past . DataThings, however, knows that data isn’t dead, but dynamic . Its intuitive software solutions analyse ‘data in motion’ . Using state-of-the-art machine learning algorithms, the software detects patterns over time, analyses behavioural changes and even makes predictions based on these changes .

Their GreyCat data management solution (http://greycat .ai) is designed for any business that deals with live data, from health care and the financial sector to transportation systems and building management . For example, DataThings recently integrated GreyCat with 3D indoor scanning technology for a client in order to prepare the ground for a predictive maintenance solution for buildings .

Black Swan Lux S.A.R.L.Black Swan’s SafeLiveTM offers Senior Resident Safety Monitoring that is fully compatible with ‘off-the-shelf’ wearable devices . safeliveapp.com

LuxAI S.A.Intuitive and smart social robots for every- one . luxai.com

Our Spin-offs

DataThings is: Dr . Cyril Cecchinel, Dr . Francois Fouquet, Dr . Assaad Moawad and Dr . Grégory Nain .

Guido von Scheffer, Aurore Harand and Dr . Raphaël Frank from the TTO

Technology Transfer Office

SnT Partnership program

Founded in 2014, SnT’s Technology Transfer Office (TTO) shapes the Centre’s interaction with industry, the public sector and other inno-vation activities throughout the country and at international level . On one hand, its goal is to accelerate the translation of scientific results and knowledge into real-world innovation . To do this, it supports re-searchers in packaging, marketing and licensing new technologies

and Intellectual Property (licenses, patents, software, knowledge and copyright), and nurtures entrepreneurial spirit . On the other hand, it manages the SnT Partnership Program, enabling interaction with industry at all stages of research . Together these activities ensure a clear path from scientific results to commercial exploitation and societal impact .

Benefits of collaborative research through the Partnership Program

For University of Luxembourg

And:• market relevant research• competitive industry funding• PhD theses and academic publications • IP licensing to industry for commercialisation

Through its Partnership Program SnT currently collaborates with 38 public and private organisations, addressing the major challenges facing industry and the public sector in ICT . Research is conducted jointly in partnered projects where SnT and partners combine know-how and

resources to achieve common goals . This collaborative framework enables partners to contribute to and influence the development of SnT at all levels . The resulting concepts present a genuine, long lasting competitive advantage for companies in Luxembourg and beyond .

Domain knowledge

Innovation demand

Fundamentalresearch

Appliedresearch

R&

D

Collaboration

SnT

Partner

About the TTO

For the Partner

And access to:• scientific knowledge • research excellence • research equipment• highly specialised talent for future hiring needs

Joint research results and Intellectual Property (IP)

34 f back to table of contents

Page 19: Annual Report 2017 - Université du Luxembourg

3736

Technology Transfer Office Technology Transfer Office

LuxConnect is a multi-tenant and multi-tier data centre provider and dark fibre network operator . This research program will investigate novel concepts and solutions for a highly automated data centres surveillance system using multiple unmanned aerial vehicles . These drones will sup-port human security personnel in their most critical tasks, significantly increasing the overall physical security of data centers .

The Luxembourg Bankers’ Association (ABBL) is the professional organisation representing the majority of banks and other financial inter-mediaries established in Luxembourg . This project will use Distributed Ledger Technology and data analytics to provide a generic solution to support Luxembourg's financial institutions in meeting regulatory require- ments for Know Your Customer .

QRA Corp is an emerging developer of systems and requirements en-gineering technology based in Halifax, Canada . Its tools help engineers build tomorrow’s safe, secure, and powerful products across industries tackling the most complex mission and safety critical systems . This part-nership focuses on two aspects: (1) improving the analysis and quality as-

surance of natural language requirements, and (2) automating the verifica- tion of executable system specifications and designs based on simulation .

The Luxembourg Institute of Standardisation, Accreditation, Safety and Quality of Products and Services (ILNAS) represents Luxembourg's interests in European and international standardisation organisations . This joint research programme on Smart ICT systems and services puts empha-sis on consolidating the new Smart ICT for Business Innovation certificate; developing procedures and formats for Big Data sharing and data integra-tion; standardisation activities in the field of drones; and providing tools for analysing and comparing prices offered by different cloud providers .

The Luxembourg Stock Exchange (LuxSE) is the world’s premier exchange for the listing of international securities, offering a full service throughout listing, trading and reporting . The aim of this partnership is to devise automated techniques for document classification and smart document processing . LuxSe and SnT will explore and develop new ways to harvest information in documents and extract value-added intelli- gence from acquired data using artificial intelligence .

SnT partners 2017

SnT is a leading international research institute with a strong focus on modern-day information and communication technology (ICT) . Together with its partners, the Centre is helping establish Luxembourg as a Euro-pean centre of excellence and innovation in the field of secure, reliable and trustworthy ICT systems and services . A key role in this process is played by SnT’s Partnership Program . In 2017, ten new partners joined the programme .

BGL BNP Paribas played an active part in Luxembourg's emergence as an international financial centre . It now holds second position on the professional clients and SMEs market and is the market leader in the area of bank assurance . This partnership spans three areas: the use of machine learning techniques to infer client clusters and extract in-vestment behavior trends; automated software testing and fixing in a DEVOPS environment; and automated predictions for security pattern selection and asset-level risk analysis . This work is supported through SnT’s partnership with the Alphonse Weicker Foundation, founded in 1989 to promote scientific research .

Clearstream, part of Deutsche Börse Group, is an important player in the securities services industry, providing post-trade infrastructure and securities services for the international market and domestic markets worldwide . This project, run in collaboration with escent, a consulting firm specialising in business analysis and requirements engineering, aims to automate the laborious analysis tasks present in Clearstream’s already-mature requirements engineering practices . This will range from reconciling requirement models with accompanying natural-language content, to deriving acceptance criteria from requirements .

The Intel Collaborative Research Institute for Collaborative Auto-nomous and Resilient Systems (ICRI-CARS) studies the security, privacy and safety of autonomous systems, ranging from drones and self-driving vehicles to collaborative systems in industrial automation . This project pursues the development of tools and architectures to endow vehicle control systems with the capacity to defeat extreme adversarial power automatically, maintain operability in real time during attacks, and sus-tain perpetual and unattended operation despite faults and attacks .

Research Partners

Networking Partners

New Partners

f back to table of contents

Page 20: Annual Report 2017 - Université du Luxembourg

3938

About us About us

CritiX

Paulo Esteves-Veríssimo

Organisation

Governance of SnT

A Centre Advisory Board, chaired by the President of the University of Luxembourg, advises the President on the Centre’s activities (strategy, annual plan, budget, monitoring, review, etc .) .

The Director is appointed by the University’s Board of Governors and is responsible for day-to-day management .

Management Team

SEDAN

Radu State

Centre Advisory Board

Stéphane PallagePresident, University of Luxembourg, Chair

Erica MonfardiniActing Director of Administration,

University of Luxembourg

Martin HalliwellCTO SES S .A

Jean-Paul ZensPremier Conseiller de Gouvernement,

Ministère des Communications et des Médias

Pierre ZimmerCIO Post

SerVal

Yves Le Traon

SVV

Lionel BriandSnT Vice Director

SnT management team

NetLab

Thomas Engel

Head of SnT Office Financial Controller

Laurent Betry*

SIGCOM

Björn OtterstenSnT Director

APSIA

Peter Y . A . Ryan

Automation & Robotics

Holger Voos

Head of Technology Transfer Office

Marc Lemmer

CryptoLux

Alex Biryukov

*Until October 2017

About us

Background

The University of Luxembourg launched the Interdisci-plinary Centre for Security, Reliability and Trust in 2009 . The Centre has a twofold approach focusing on both collaborative demand-driven research and high-risk, long-term research projects . By bringing together experts from different academic backgrounds, SnT offers a unique, interdisciplinary research approach . The Centre, with its international team of researchers, has strong links with Luxembourg’s industry and local institutions, and attracts research and development activities from across Europe and around the world .

Vision

As a leading international research and innovation centre, SnT strives to attract top talent, train highly qualified ICT professionals and create new technologies, making a lasting socio-economic impact in Luxembourg . The Centre prides itself on developing innovative solutions together with industry and public partners, while its expertise attracts investment in R&D from around the world . SnT is an essential part of the Luxembourg ecosystem and aligns itself with the country’s Digital Agenda .

Milestones

2010first EU project

starts

launch

2009first patent filed

201120 partners

2013

first FinTech conference

2015

100 MEUR in acquired external funding

2017

2012100 staff

2014first spin-off:

Motion-S

2016first ERC advanced

grant in Luxembourg

2018creation of a FinTech

research group

Research areas

Secure and Compliant Data Management

FinTech Cybersecurity Space Systems and Resources

Autonomous Vehicles

Internet of Things

f back to table of contents

Page 21: Annual Report 2017 - Université du Luxembourg

4140

About us About us

SnT 2013-2017 consumed income per funding source (in kEUR)

7,000

6,000

5,000

4,000

3,000

2,000

1,000

0UL Partners EU/ESA FNR Other

2013

2014

2015

2016

2017

Manpower Sub-contracting

Investments Travel Repres . & registration

Operatingexp .

In-kind

SnT 2013-2017 expenses per category (in kEUR)

14,000

13,000

12,000

11,000

10,000

9,000

8,000

7,000

6,000

5,000

4,000

3,000

2,000

1,000

0

2013

2014

2015

2016

2017

SnT 2013-2017 expenses per funding source (in kEUR)

2017

2016

2015

2014

2013

3,444 1,811 1,086 5,046 226

3,488 1,966 866 6,144 182

4,933 2,499 1,165 6,353 31

5,603 2,580 1,457 6,331 161

UL

Partners

EU/ESA

FNR

Other

6,677 3,265 1,684 7,205 303

0 2,000 4,000 6,000 8,000 10,000 12,000 14,000 16,000 20,00018,000

73+7+3+5+3+1+835+17+9+38+1

2017 SnT expenses (in kEUR)

2017 SnT consumed income (in kEUR)

UL (University of Luxembourg)

Partners

EU/ESA (European Union / European Space Agency)

FNR (National Research Fund)

Other

Manpower

Sub-contracting

Investments

Travel

Representation and registration

Operating expenses

In-kind contributions

7,205 (38%)

3,265 (17%)

303 (1%)

6,677 (35%)

1,684 (9%)

13,741 (72%)

1,212 (6%)

629 (3%)

1,005 (5%)

1,523 (8%)

539 (3%)

Financial Data

196 (1%)

f back to table of contents

Page 22: Annual Report 2017 - Université du Luxembourg

4342

About us About us

TTO Training: Will My Business Idea Work? by Dr . Pouyan Ziafati (LuxAI), January 2017

Interledger: Interoperability and the Internet of Value by Dr . Radu State, in collaboration with Ripple, January 2017

Google Hash Code Competition: Qualifi-cation Round by Beltran Fiz, February 2017

TTO Training: Personal Data Protection – Are You Prepared? by Dr . Sandrine Munoz, March 2017

Open Source Security Software Hacka-thon by Dr . Radu State, in collaboration with the Computer Incident Response Center Luxembourg and Hack .lu, May 2017

LuxBlockHackathon by Dr . Radu State, in collaboration with Hyperledger, May 2017

TTO Training: Challenges in Software Licensing by Sigmar Lampe, May 2017

6th Luxembourg Workshop on Space and Satellite Communication Law, in collabo-ration with the Faculty of Law, Economics and Finance (FDEF), June 2017

MAMBA: Workshop on Smart Mobility by Prof . Dr . Thomas Engel, June 2017

TTO Training: Writing Effective Proof of Concept Applications by Dr . Jeff Skinner (London Business School), June 2017

Kick-off Hyperledger in Luxembourg by Dr . Radu State, in collaboration with Melufina, July 2017

Data Science Meetup: It’s All about Machine Learning by Dr . Christian Ham-mersmith and Dr . Eric Falk, September 2017

Internet of Things (IoT) Security Challenge, in collaboration with LuxTrust, October 2017

How Blockchain will Impact our Industries, in collaboration with Hyperledger and IBM, October 2017

SnT Meets Brian Behlendorf, in collabora-tion with Hyperledger and IBM, October 2017

Meetup: Hyperledger Executive Director Brian Behlendorf Meets Luxembourg by Dr . Radu State, in collaboration with Melufina, Hyperledger and IBM, October 2017

Data Science Meetup: Machine Learning meets Security by Dr . Christian Hammer- smith and Dr . Eric Falk, October 2017

Workshops and Summer Schools

Xavier Bettel keynote at SnT Partnership Day

ABBL and SnT sign partnership agreement: Jean Hilger, Prof. Dr. Björn Ottersten, Yves Maas, Serge de Cillia and Catherine Bourin

LuxBlockHackathon Guided tours at SnT Partnership Day

Events

Conferences

Grand Region Security and Reliability Day (GRSRD 2017) by Dr . Jun Pang, March 2017

SnT Partnership Day 2017, May 2017

30th International Conference on Legal Knowledge and Information Systems (JURIX 201/), by Prof . Dr . Leon van der Torre, December 2017

Distinguished Lectures at SnT

Prof. Philip B. Stark (University of Cali-fornia): Don‘t Bet on your Random Number Generator, March 2017

Driving simulator at SnT Partnership Day

f back to table of contents

Page 23: Annual Report 2017 - Université du Luxembourg

4544

· CASTILLO LOPEZ, Manuel· CHAOUCH, Karim· CHARLIER, Jérémy· CHENAL, Massimo· CORNELIUS, Gary· DANEGGER, Christian· DE LA CADENA, Wladimir· DELERUE ARRIAGA, Afonso· DENTLER, Jan· DERRMANN, Thierry· DI MAIO, Antonio· DINU, Dumitru-Daniel· DOKHANCHI, Sayed Hossein· DOMOUCHTSIDIS, Stavros· DU, Manxing· DUTTA, Rahul Kumar· FEHÉR, Dániel· FERNANDES, Maria· FIZ PONTIVEROS, Borja Beltran· GAALOUL, Khouloud· GAO, Jun· GAUTAM, Sumit· GENÇ, Ziya Alper· GIESE, Mark Otto· GLAUNER, Patrick· HAJRI, Ines· HAQIQATNEJAD, Alireza· HAMMES, Christian· HURIER, Médéric· JAFARNEJAD, Sasan· JAN, Sadeeq· JIMENEZ, Matthieu· KAIAFAS, Georgios· KHAN, Nida· KIEFFER, Emmanuel· KISUB, Kim· KOLBE, Niklas· KONG, Pingfun· KOYUNCU, Anil· KREUTZ, Diego· KRIVOCHIZA, Jevgenij· KUI, Liu· LAMBERT, Christoph· LAMHAR, Salima· LE, Ha Thanh· LI, Daoyuan· LIU, Chao· LOPEZ BECERRA, José Miguel· LOUNIS, Karim· MAI, Xuan Phu· MANUKYAN, Anush· MEHRIZI RAHMAT ABADI, Sajad· MENGALI, Alberto· MESSAOUDI, Salma· MITSEVA, Asya· MOULINE, Ludovic· MULLER, Steve· NORTA, David · NORVILL, Robert· OYEDOTUN, Oyaebade· PANDI PERUMAL, Raja · PAPADOPOULOS, Konstantinos· PARRY GOWHER, Majeed· PEJO, Balazs

· PERRIN, Léo Paul· PIERINA BRUSTOLIN SPAGNUELO, Dayana· PILGUN, Alexandre· POLITIS, Christos· QUINTANAR GUZMAN, Serket· REN, Hongru· REPCEK, Stefan· RWEMALIKA, Renaud· SAINT, Alexandre· SAJADI ALAMDARI, Amin Seyed· SAMIR LABIB, Nader· SANCHEZ GUINEA, Alejandro· SEDIGHI, Saeid· SIGNORELLO, Salvatore· SOROUSH, Najmeh· SPANO, Danilo· STEICHEN, Mathis· STOJKOVSKI Borce· SU, Cui· TESSARO LUNARDI, Willian· THOME, Julian· TIKHOMIROV, Sergei· TITCHEU CHEKAM, Thierry· UDOVENKO, Aleksei· VAN ZEE, Marc· VARMAZYAR, Mojtaba· VÁZQUEZ SANDOVAL, Itzel· VUKOTIC, Ivana· WAGLE, Shyam· WANG, Jun · WANG, Min· WASIM Muhammad Umer· ZHOU, Lu

· ADEDJOUMA, Morayo, Dr .· ARCURI, Andrea, Dr .· CASTIGNANI, German· CHERKAOUI, Omar, Dr .· DE WACHTER, Hannes· FRANCOIS, Jérôme, Dr .· GHARANJIK Ahmad, Dr . · HANS, Dirk· IQBAL, Zohaib Muhammad, Dr .· JOHANNESSON, Karl· NAZARIKHORRAM, Aida, Dr .· ORMAZABAL, Gaston, Dr . · SASNAUSKAS, Raimondas, Dr .· SCHILTZ, Jean-Louis, (Honorary Professor in FDEF)

· SCHMIT, Georges· SCHWEITZER, Jean, Dr .· SMYTH, Benjamin, Dr .· VON SCHEFFER, Guido· WAGNER, Cynthia, Dr .· ZIAFATI, Pouyan, Dr .

· ANNET, Stéphanie, Communications and Events Assistant

· BETRY, Laurent, Head of Administration and Support

· BELKACEM, Nadjia, Administrative Assistant· BÖSL, Sabine, Financial Controller

Research fellows

· CHESNAY, Isabelle, Project Coordinator· EDWARDSDOTTIR, Helga, Administrative Assistant

· FUHRER, Pierre, Project Coordinator· GREGOIRE Valerie, Administrative Assistant· GUGAN, Daniel, Project Coordinator· HARAND Aurore, Legal Advisor· HOMOLKO Christine, Communications Advisor· KINDER, Margaux, Administrative Assistant· KINET, Christine, Administrative Assistant · KIRF, Natalie, Administrative Assistant· LAGROST, Céline, Project Coordinator· LAROCHE, Corinne, Administrative Assistant · LEMMER, Marc, Dr ., Head of Technology Transfer Office

· MARTIN, Magali, Administrative Assistant· OCHSENBEIN, Anne, Dr ., Project Coordinator· ÖSTLUND, Stefanie, Project Coordinator· PETIT, Cécile, Dr ., Project Coordinator· THUER, Claudia, Administrative Assistant· TZIMAPITI, Anna, Administrative Assistant with HR focus

· UPTON William, Communications and Events Assistant

· VIAU-COURVILLE Mathieu, Project Coordinator

· VINCENS, Solène, Administrative Assistant

· CONTI, Matteo· DUNLOP, Dominic· EDDS, Liam· FERNANDES CARDOSO, Gilberto· KORDY, Piotr

· ALONSO ALEMANI, Laura, Universidad Nacional de Córdoba, Spain

· CECCHINEL, Cyril, University of Nice Sophia-Antipolis, France

· CORDY, Maxime, University of Namur, Belgium

· FERVARI, Paul, University of Nice-Sophia Antipolis, France

· GOETZ, Detlev, Ville de Luxembourg, Luxembourg

· HARCHANDANI, Lovesh, Evernym Software Private Limited, Hyderabad, India

· HOANG Hong-Nhâ . t Quoc, Hanoi University of Science and Technology, Vietnam

· JOROUGHI Vahid, Islamic Azad University, Miyaneh branch, Iran

· MEDEIROS FROEHLICH Antonio, Federal University of Santa Catarina, Brazil

· MOHA, Naouel, Université du Quebec a Montreal, Canada

· MUSIAL, Jedrej, Poznan Polytechnic University, Poland

· SCALABRINO, Simone, Università del Molise, Italy

· SINAK, Jarek, Poznan University of Technology, Poland

· UGOLINI Alessandro, University of Parma, Italy

Visitors

Staff

Technical staff

45

About us

People

Heads of SnT research groups· OTTERSTEN, Björn, Prof . Dr ., Director· BRIAND, Lionel, Prof . Dr ., Vice-Director· BIRYUKOV, Alex, Prof . Dr .· ENGEL, Thomas, Prof . Dr .· LE TRAON, Yves, Prof . Dr .· RYAN, Peter, Prof . Dr .· STATE, Radu, Dr .· VERÍSSIMO, Paulo, Prof . Dr .· VOOS, Holger, Prof . Dr .

· BOUVRY, Pascal, Prof . Dr .· COLE, Mark, Prof . Dr .· CORON Jean-Sebastien, Prof . Dr .· HILGER, Jean· HOFMANN, Mahulena, Prof . Dr .· KELSEN, Pierre, Prof . Dr .· LEPREVOST, Franck, Prof . Dr .· MARTIN, Romain, Prof . Dr .· MAUW, Sjouke, Prof . Dr .· MAX, Charles, Prof . Dr .· VAN DER TORRE, Leon, Prof . Dr .· VITI, Francesco, Prof . Dr .

· CHATZINOTAS Symeon, Dr .· KLEIN, Jacques, Dr .· LENZINI, Gabriele, Dr .· SABETZADEH, Mehrdad, Dr .

· AOUADA, Djamila, Dr .· BIANCULLI, Domenico, Dr .· BISSYANDÉ, Tegawendé F ., Dr .· CAIRE, Patrice, Dr .· FRANK, Raphael, Dr .· MYSORE R .R ., Bhavani Shankar, Dr .· NEJATI, Shiva, Dr .· OLIVARES-MENDEZ, Miguel Ángel, Dr . · PANCHENKO, Andriy, Dr .· PANG, Jun, Dr .· PAPADAKIS, Michail, Dr .· PASTORE, Fabrizio, Dr .· VÖLP, Marcus, Dr .

· ABUALHAIJA, Sallam, Dr .· ADAMSKY, Florian, Dr .· AGUILERA GONZALEZ, Adriana, Dr .· ALAEEKERAHROODI, Mohammad, Dr .· ALEKSANDROVA Marharyta, Dr .· ALFEREZ Mauricio, Dr .· ALODEH, Maha, Dr .· ANDRENACCI, Stefano, Dr .· ANTONELO, Eric, Dr .· ARORA, Chetan, Dr .· BANA, Gergely, Dr .· BANIASADI, Zohreh· BARTEL, Alexandre, Dr .· BARTOLINI, Cesare, Dr .· BEN FADHEL Ameni (from 15/10/2017)· BEZZAOUCHA, Souad, Dr .

Faculty

Research scientists

Affiliated faculty

Senior research scientists

Research associates

· BOYTSOV, Andrey, Dr .· BRUST, Matthias, Dr .· CASINI, Giovanni, Dr .· CAZZATO, Dario, Dr .· CHAIB DRAA, Khadidja, Dr . (from 01/9/2017)· DASHEVSKYI, Stanislav, Dr .· DECOUCHANT, Jérémie, Dr .· DELERUE ARRIAGA, Afonso, Dr .· DEMISSE, Girum Getachew, Dr . (from 1/11/2017)· DOU, Wei, Dr .· EMARA, Karim, Dr .· FALK, Eric, Dr . (from 1/12/2017)· FAYE, Sébastien, Dr .· FORSTER, Daniel· FOUQUET, François, Dr .· FUHRER, Detlef· GADYATSKAYA, Olga, Dr .· GAROUSI, Vahid, Dr .· GHARANJIK, Ahmad, Dr .· GHATPANDE, Sankalp· GIURGIU, Andra, Dr .· GOKNIL, Arda, Dr .· GONCALVES ALMEIDA ANTUNES, Michel, Dr .· GONZALEZ, Carlos A ., Dr .· HAMMERSCHMIDT, Christian, Dr . (from 15/11/2017)

· HARTMANN, Thomas, Dr .· HOCHGESWENDER, Nico, Dr .· HOMMES, Stefan, Dr .· HUYNEN, Jean-Louis, Dr .· IOVINO, Vincenzo, Dr .· JHAWAR, Ravi, Dr .· KALANTARI, Ashkan, Dr .· KANNAN, Somasundar, Dr .· KAYHAN, Farbod, Dr .· KHOVRATOVICH, Dmitry, Dr .· KIM, Dongsun, Dr .· KINTIS, Marinos, Dr .· KOZHAYA David, Dr . · KUBLER, Sylvain, Dr .· KUSHNIAROU, Artsiom· LAGRAA, Sofiane, Dr .· LADID, Latif, Dr .· LAGUNAS, Eva, Dr .· LAMORTE, Luca· LEI, Lei, Dr .· LI, Li, Dr .· LIU, Bing, Dr . (from 15/7/2017)· LIU Zhe, Dr .· MACHALEK, Aurel, Dr .· MALEKI, Sina, Dr .· MATINNEZAD, Reza, Dr .· MATURO, Nicola, Dr .· MAZZALI, Nicolò, Dr .· MEIRA, Jorge, Dr .· MERLANDO DUNCAN, Juan Carlos, Dr .· MIGLIOSI, Angelo· MOAWAD, Assaad, Dr .· MONTERO, Leandro, Dr .· NAIN, Gregory, Dr .· NAVEH, David, Dr .· NIJSURE, Yogesh, Dr .· OSTREV, Dimiter Valentinov, Dr .· OUCHANI, Samir, Dr .

· PANICHELLA, Annibale, Dr .· PAUL Soumya, Dr . · POPLETEEV, Andrei, Dr .· RAHLI, Vincent, Dr .· RAMIREZ-CRUZ, Yunior, Dr .· RIAL DURAN, Alfredo, Dr .· RINALDI, Marco, Dr .· ROBALDO, Livio, Dr .· ROBERT, Jérémy, Dr .· ROCCHETTO, Marco, Dr .· ROCHA, Francisco, Dr .· ROENNE, Peter, Dr .· ROSALIE, Martin, Dr .· SAHIN GEBIZLI, Ceren, Dr .· SANCHEZ LOPEZ, Jose Luis, Dr .· SANNIER, Nicolas, Dr .· SASSIOUI, Redouane · SCHIFFNER, Stefan, Dr .· SCHMITZ, Sandra, Dr .· SHABAYEK, Abd EI Rahman, Dr .· SHAR, Lwin Khin, Dr .· SHBAIR Wazen, Dr .· SHEJWALKAR, Virat · SHIN, Seung Yeob, Dr .· SKROBOT Marjan, Dr .· SOLTANA, Ghanem, Dr . (from 1/11/2017)· SOUA Ridha, Dr .· TABATABAEI, Masoud, Dr .· TASSAN-ZANIN-CASER, Virgil· TRUJILLO, RASUA Rolando, Dr .· TSAKMALIS Anestis, Dr . (from 1/08/2017)· TSINOS, Christos, Dr .· TURCANU, Ion· VALTCHEV, Petko, Dr .· VARISTEAS, Georgios, Dr .· VELICHKOV, Vesselin, Dr .· VU, Xuan Thankg, Dr .· VUPPALA, Satyanaryana, Dr .· WANG, Chunhui, Dr . (from 15/08/2017)· YAKUBOV, Alexander· YANG, Yang, Dr .· YU, Jiangshan, Dr .

· AHMED, Eman · AMBROSSIO, Diego Agustin· AMIN, Sleimi· ANNAIYAN, Arun· ANTONIADIS, Nikolaos· ARORA, Aakash· ATASHPENDAR, Arash· BADAWY, Haythem Kamel · BANDI, Ashok · BAPTISTA, Renato· BEN ABDESSALEM, Raja· BENEDICK, Paul-Lou· BETTAIEB, Seifeddine· BHADAURIA, Anshuman· BOUFAIED, Chaima· BRONZI, Walter· BRUHL, Manuel· CALDEIRA LIMA, Antonio· CAMINO, Ramiro· CARETTE, Antonin

PhD candidates

44

About us

f back to table of contents

Page 24: Annual Report 2017 - Université du Luxembourg

4746

About us About us

Industry and SnT: Shaping Top Talent Together

Dr . Reza Matinnejad is an engineer working on embedded software at IEE, a global leader in automotive safety and people and object sensing solutions headquartered in Luxembourg . Dr . Matinnejad completed his thesis at SnT in 2016 .

Why did you choose SnT for your PhD?

I already knew by reputation that SnT conducts research in close collaboration with industry, with PhD theses defined based on real problems coming from the public and private sectors . This was a big part of the appeal, as was the chance to work with Prof . Dr . Lionel Briand . For my wife and me, it was our first time leaving our homeland, Iran, and we knew nothing about Luxembourg . We quickly grew to love living in the Grand Duchy and decided to stay .

47

What is the difference between conducting research with as opposed to without industry?When you work with a partner, you don’t need to invent a problem for your research . You already know that what you are addressing is valid and that there are people relying on you to find a solution . In addition, you receive regular feedback from your industry partner – this really helps keep the research on the right track .

How closely is your current work related to your SnT thesis?

During my PhD, I was testing and analysing embedded software used in the automotive domain . Embedded software is used to control machines or devices that are not typically thought of as computers – so for example now I am developing embedded software which is used in 3D cameras . In particular, I am working on an IEE product which automatically counts the number of people who are going in and out of a building . So, I’m not doing exactly what I was doing during my PhD, but the industry and research experience I’ve gained with embedded software at SnT definitely helps me to be successful at my current job .

“SnT provided me with my first working experience in an international

environment and helped me improve my skills in communication and teamwork

substantially.”

Awards

Individual awards

Dr. Chetan Arora received the award for the University of Luxembourg’s Best Computer Science and Communications PhD Thesis 2016 . His thesis, ‘Automated Analysis of Natural-Language Requirements Using Natural Language Processing’, proposes a range of techniques to automate the complex quality assurance and analysis tasks necessary to resolve issues of ambiguity, incompleteness and inconsistency at early stages in the writing of requirements documents .

Dr. Domenico Bianculli received the Out-standing Reviewer Award at the 39th Inter-national Conference on Software Engineering (ICSE 2017), Buenos Aires, Argentina .

FNR PEARL Chair Prof. Lionel C. Briand was nominated by AMiner as one of the Ten Most Influential Scholars of 2016 in Software Engineering . The AMiner Most Influential Scholar Annual List acknowledges scholars for their outstanding technical achievements and their impact on the research community .

A team of researchers from SnT – Daniel Feher, Dr. Dmitry Khovratovich, Sergei Tikhomirov, Aleksei Udovenko and Maciej Zurad (FSTC) – won joint first prize at the inaugural LuxBlockHackathon . Their asset management solution improved privacy for lenders while remaining compliant with Know Your Customer regulations .

Patrick Glauner won the best overall project prize at the Bridging the GAP research fair for his ongoing PhD project, ‘Spatio-Temporal Processes for Electricity Theft Detection’ . Glauner uses machine learning to detect non-technical-losses, such as electricity theft or billing errors, which account for some 40% of electricity distributed in some developing countries .

Dr. Latif Ladid was decorated with the IPv6 Life Time Achievement Award at the IEEE World Forum on Internet of Things in December 2016 . The award recognises Dr . Ladid’s work as a proponent of the modern

IPv6 Internet, ensuring that countries across the world moved forward in deploying this latest Internet protocol .

Dr. Jabier Martinez received an honourable mention from the Groupement de Recher-che Génie de la Programmation et du Logiciel (GDR GPL) for his PhD thesis, ‘Mining Software Artefact Variants for Product Line Migration and Analysis’ . Dr . Martinez provides an automated approach for capitalising on existing software variants .

Dr. Shiva Nejati has been awarded the IBM Centre for Advanced Studies Conference’s (CASCON) 10 year best paper award . ‘Runtime Monitoring of Web Service Conver-sations’, presented at CASCON 2007, was one of the first forays into the use of standard software modelling language UML for the automated verification of web services .

Prof. Björn Ottersten has been awarded an Advanced Grant (AdG), the most prestigious award offered by the European Research Council (ERC) . Prof . Ottersten will receive 2 .5 million euros in funding over the next five years . He will use the grant to develop a novel overarching technical framework that could be used to simplify the design and operation of complex systems in different areas such as automotive radar, caching and wireless networks .

Dr. Jiangshan Yu has received the Chinese Government Award for Outstanding Students Abroad . This award celebrates the achievements of Chinese doctoral students whose research isn’t funded by the Chinese government . Applicants were nominated by Chinese embassies in over 30 countries .

Dr. Pouyan Ziafati, CEO of SnT social robot-ics spin-off LuxAI, became the first recipient of the FNR’s Outstanding Research-Driven Innovation award . The award recognises researchers who have endeavoured to turn publicly funded research into innovations of a commercial or social nature .

Best paper awards

Smart Probabilistic Fingerprinting for Indoor Localization over Fog Computing Platforms – Dr . Andrea Sciarrone, Claudio Fiandrino, Dr . Igor Bisio, Prof . Fabio Lavagetto, Dr . Dzmitry Kliazovich and Prof . Dr . Pascal Bouvry, IEEE 5th International Conference on Cloud Networking (CloudNet 2016), Pisa, Italy

States and Unknown Input Estimation via Non-linear Sliding Mode High-gain Observers for a Glucose-Insulin System – Dr . Adriana Aguilera Gonzalez, Prof . Dr . Holger Voos and Prof . Mohamed Darouach, IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES 2016), Kuala Lumpur, Malaysia

Fast Stochastic Non-linear Model Predictive Control for Electric Vehicles’ Advanced Driver Assistance Systems – Seyed Amin Sajadi Alamdari, Prof . Dr . Holger Voos and Prof . Mohamed Darouach, 13th IEEE International Conference on Vehicular Electronics and Safety 2017, Vienna, Austria

Differentially Private Neighborhood-based Recommender Systems – Jun Wang and Dr . Qiang Tang, 32nd International Conference on ICT Systems Security and Privacy Protection (IFIPSEC 2017), Rome, Italy

Target Tracking Optimization of UAV SwarmsBased on Dual-Pheromone Clustering – Dr . Matthias R . Brust, Maciej Zurad, Laurent Hentges, Leandro Gomes, Dr . Gregoire Danoy and Prof . Dr . Pascal Bouvry, 3rd IEEE International Conference on Cybernetics (CYBCONF 2017)

Deformation Transfer of 3D Human Shapes and Poses on Manifolds – Dr . Abd El Rahman Shabayek, Dr . Djamila Aouada, Alexandre Fabian Saint and Prof . Dr . Björn Ottersten, IEEE International Conference on Image Processing (ICIP 2017), Exeter, UK

Unified Satellite and Terrestrial ACM Design – Alireza Haqiqatnejad and Dr . Farbod Kayhan, 35th AIAA International Communications Satellite Systems Conference (ICSSC 2017), Trieste, Italy

f back to table of contents

Page 25: Annual Report 2017 - Université du Luxembourg

4948

Projects Projects

Project Principal investigator PhD student Partner

Autonomous Vehicles

Multimodal Transport Optimization Prof . Dr . Thomas Engel Thierry Derrmann POST (FNR-CORE)

Scene flow from RGB-D: Applications in Human Motion Sensing Prof . Dr . Björn Ottersten Konstantinos Papadopoulos POST (FNR-CORE)

Accurate 3D human body shape modelling and fitting under clothing – BODYFIT

Dr . Djamila AoudaProf . Dr . Björn Ottersten

Alexandre Saint ARTEC (FNR-AFR)

Automating Regression Test Selection for Requirements-based Testing in Embedded Systems

Prof . Dr . Lionel Briand Ines Hajri IEE (FNR-AFR)

Traceability from requirements to design to support context-driven testing of embedded software systems

Prof . Dr . Lionel Briand Raja Ben Abdessalem IEE

Increased Mission Autonomy for small UAVs Prof . Dr . Holger Voos Manuel Castillo Lopez Defense Department of the Ministry of Foreign Affairs

Radar Waveform design for Automotive Applications Prof . Dr . Björn Ottersten Christian Hammes IEE (FNR-AFR)

Coherent Radar Waveform Design for Automotive Applications Prof . Dr . Björn Ottersten Sayed Dokhanchi IEE (FNR-AFR)

Future Developments for Flexible Production Processes Prof . Dr . Holger Voos Lunardi Willian Tessaro ROGLER

VICO – Vision-based Control of Small Unmanned Aerial Vehicles Prof . Dr . Holger Voos Arun Annaiyan Defense Department of the Ministry of Foreign Affairs (FNR-AFR)

Learning of control behaviors in flying manipulation Prof . Dr . Holger Voos Anush Manukyan Defense Department of the Ministry of Foreign Affairs

Internet of Things

Omniscient fault localization in home automation system using model-driven data analytics

Prof . Dr . Yves Le Traon Ludovic Mouline POST

Model-Based Design of Multi-Modal Human-Robot Interactions Prof . Dr . Holger Voos Gary Cornelius VdL (FNR-AFR)

Software Engineering and Data Analytics in the Context of Smart Buildings

Prof . Dr . Yves Le Traon Daoyuan Li Paul Wurth

Continuous Development, Deployment, and Testing for Self-adaptive Software Systems; a new engineering process applied to smart home

Prof . Dr . Yves Le Traon Alejandro Sanchez Guinea POST

Completed partnered projects in 2017

Project Principal investigator PhD student Partner

Model-Based Framework for Legal Policy Simulation and Compliance Checking

Prof . Dr . Lionel Briand Ghanem Soltana CTIE (FNR-AFR)

Comprehensive Specification and Efficient Enforcement of Role-based Access Control Policies using a Model-driven Approach

Prof . Dr . Lionel Briand Ameni Ben Fadhel HITEC

Citizen Centered Perspectives in URban Environment (CC-PURE) Prof . Dr . Holger Voos Detlev Goetz VdL

Automated and Effective Security Testing for XML-based Vulnerabilities Prof . Dr . Lionel Briand Sadeeq Jan CETREL/SIX (FNR-AFR)

Streaming Analytics for Security Architectures Dr . Radu State Christian Hammerschmidt NEXUS (FNR-AFR)

Big Data Architectures for converged security Dr . Radu State Eric Falk NEXUS

Enhancing Security Reputation and Performance of Heterogeneous Networks for Ubiquitous Internet Connectivity Sharing in a Mobile Context

Prof . Dr . Thomas Engel Walter Bronzi Telindus

Spectrum Management and Interference Mitigation in Cognitive Hybrid Satellite Networks

Dr . Symeon Chatzinotas Anestis Tsakmalis SES (FNR-CORE)

Automated Requirements-Driven Testing of Embedded Systems Based On Use Case Specifications and Timed Automata

Prof . Dr . Lionel Briand Chunhui Wang IEE

Automated Debugging and Fault Localization of Matlab/Simulink Models Prof . Dr . Lionel Briand Bing Liu Delphi (FNR-AFR)

Projects

Ongoing partnered projects in 2017

Project Principal investigator PhD student Partner

Secure and Compliant Data Management

Automated Extraction of Metadata and Compliance Rules from Legal Texts Dr . Mehrdad Sabetzadeh Amin Sleimi Service Central de Législation

Implementation of Securely Proved Protocols for Private Communications Dr . Gabriele Lenzini Itzel Vázquez Sandoval pEp Security

Protocols for Privacy Security Analysis Dr . Gabriele Lenzini Ziya Alper Genç pEp Security

FinTech

Automated Decision Support for Security Requirements Analysis Prof . Dr . Lionel Briand Seifeddine Bettaieb BGL BNP Paribas

Anti-Money Laundering with Big Data Analytics Dr . Radu State Ramiro Camino LOGOS (FNR-AFR)

Data Analytics for Personal Finance Dr . Radu State Jérémy Charlier BCEE

Automated Documents Processing Dr . Jacques Klein Antonin Carette LuxSE

Data Analytics and Smart Contracts for traceability in finance Dr . Radu State Nida Khan Eethiq (FNR-AFR)

Smart Testing in a Devops and continuous integration process Prof . Dr . Yves Le Traon Renaud Rwemalika BGL BNP Paribas

Distributed Ledger Prototype and Data Analytics for KYC Dr . Radu State Robert Norvill ABBL

Machine learning for client segmentation Prof . Dr . Yves Le Traon Anshuman Bhadauria BGL BNP Paribas

Cybersecurity

Software Defined Network Service Chaining through Network Analytics Dr . Radu State Beltran Borja Fiz Pontiveros Telindus

Smart Grid Deep Search Prof . Dr . Yves Le TraonDr . Francois Fouquet

Nikolaos Antoniadis CREOS

Normalisation and IoT Prof . Dr . Pascal Bouvry Nader Samir Labib ILNAS

Normalisation and Cloudcomputing service price models for optimisation Prof . Dr . Pascal Bouvry Chao Liu ILNAS

Hardware/Software architectures for deep packet inspection and security monitoring at GigaByte Speed

Dr . Radu State Mathis Steichen Telindus

Self-learning Predictive Algorithms: from design to scalable implementation Dr . Radu State Manxing Du Olamobile (FNR-AFR)

Risk Monitoring with Intrusion Detection for Industrial control systems Prof . Dr . Yves Le Traon Steve Muller itrust (FNR-AFR)

Data Analytics for Network Security Dr . Radu State Giorgios Kaiafas CHOICE

Big Data Analytics against Electricity Theft Dr . Radu State Patrick Glauner CHOICE (FNR-AFR)

Space Systems and Resources

Model-driven Trace Checking Prof . Dr . Lionel Briand Chaima Boufaid SES (UL-PUL)

Satellite Sensor Networks for spectrum monitoring Prof . Dr . Björn Ottersten Christos Politis SES (FNR-CORE)

Advanced Signal Processing techniques for satellite communications Prof . Dr . Björn Ottersten Alberto Mengali SES (FNR-AFR)

Broadband/Broadcast Convergence through Intelligent Caching in 5G Satellite Networks

Prof . Dr . Björn Ottersten Danilo Spano SES (FNR-AFR)

End-to-end Signal Processing Algorithms for Precoded Satellite Communications

Prof . Dr . Björn Ottersten Jevgeny Krivochiza SES (FNR-AFR)

Log-based Automated Testing of Satellite Ground Control Systems Prof . Dr . Lionel Briand Salma Messaoudi SES

Online Learning for edge-caching In hybrid Satellite-Terrestrial Networks LISTEN

Prof . Dr . Björn Ottersten Dr . Symeon Chatzinotas

Sajad Mehrizi SES (FNR-AFR)

Model Testing of Satellite Control Systems Dr . Shiva Nejati Mojtaba Varmazyar LuxSpace (FNR-AFR)

Optimized Digitized Payload Processing for Satellite Communications Prof . Dr . Björn Ottersten Dr . Bhavani Shankar

Ashok BandiSES (FNR-CORE)

Power efficient sparse signal processing for digital wideband on-board techniques

Prof . Dr . Björn Ottersten Dr . Bhavani Shankar

Akash AroraSES (FNR-AFR)

Automated and Model-based Simulation of Large-Scale Satellite Systems Dr . Shiva Nejati Karim Chaouch SES (FNR-CORE)

Development of a support framework for the model-based engineering of microsatellites

Prof . Dr . Holger Voos Raja Pandi Perumal LuxSpace

f back to table of contents

Page 26: Annual Report 2017 - Université du Luxembourg

5150

Projects Projects

FNR CORE (incl. Junior, PPP and Public2) projects 2017

Project Principal investigator Funding instrument

Awarded

SCARLET – Semantic Metadata and Compliance Rule Extraction from Legal Texts Prof . Dr . Lionel Briand PUBLIC2 (SCL)

AWARDS – Adaptive mmWave Radar Platform for enhanced Situational Awareness : Design and Implementation

Prof . Dr . Björn Ottersten CORE-PPP (IEE)

PROCAST – Proactive Edge Caching for Content Delivery Networks powered by Hybrid Satellite/Terrestrial Backhauling

Prof . Dr . Björn Ottersten CORE

FinCrypt – Security, Scalability, and Privacy in Blockchain Applications and Smart Contracts Prof . Dr . Alex Biryukov CORE

Q-CoDe – Quantum Communication with Deniability Prof . Dr . Peter Y . A . Ryan CORE

SZK – Stateful Zero-Knowledge Dr . Alfredo Rial (Junior)Prof . Dr . Peter Y . A . Ryan (Supervisor)

CORE Junior

COHESAT – Cognitive Cohesive Networks of Distributed Units for Active and Passive Space Applications

Dr . Juan C . Merlando (Junior)Prof . Dr . Björn Ottersten (Supervisor)

CORE Junior

IDFORM – Face Identification Under Deformations Dr . Djamila Aouada CORE-PPP (ARTEC)

LISTENER – Log-drIven, Search-based TEst geNERation for Ground Control Systems Prof . Dr . Lionel Briand CORE-PPP (SES)

SSh – Security in the Shell Prof . Dr . Jan LagerwallDr . Gabriele Lenzini

CORE

CODEMATES – COntinuous DEvelopment with Mutation Analysis and TESting Dr . Michail Papadakis (Junior)Prof . Dr . Yves Le Traon (Supervisor)

CORE Junior

CHARACTERIZE – Characterization of Malicious Code in Mobile Apps: Towards Accurate and Explainable Malware Detection

Dr . Jacques Klein CORE

PrivDA – Privacy-preserving Publication of Dynamic Social Network Data in the Presence of Active Adversaries

Dr . Yunior Ramirez Cruz (Junior) Prof . Dr . Sjouke Mauw (Supervisor)

CORE Junior

ROSETTA – Resource Optimization for Integrated Satellite-5G Networks with Non-Orthogonal Multiple Access

Dr . Lei Lei (Junior)Prof . Dr . Björn Ottersten (Supervisor)

CORE Junior

Ongoing

MOSIS – Model-Based Simulation of Integrated Software Systems Prof . Dr . Lionel Briand CORE-PPP (SES)

BRAIDS – Boosting Security and Efficiency in Recommender Systems Dr . Qiang Tang (Junior)Prof . Dr . Peter Y .A . Ryan (Supervisor)

CORE

DAPRECO – DAta Protection REgulation Compliance Dr . Gabriele Lenzini CORE

ESSTIMS – Enhanced Signal Space opTImization for satellite comMunication Systems Dr . Farbod Kayhan (Junior)Prof . Dr . Björn Ottersten (Supervisor)

CORE Junior

PROSAT – On-board processing techniques for high throughput satellites Prof . Dr . Björn Ottersten CORE

FESS – Functional Encrypted Secure Systems Dr . Vincenzo Iovino (Junior)Prof . Dr . Peter Y .A . Ryan (Supervisor)

CORE Junior

ECLECTIC – Energy and Complexity Efficient Millimiter-wave Large-array Communications Dr . Tsinos Christos (Junior)Prof . Dr . Björn Ottersten (Supervisor)

CORE Junior

BEST-RPAS – Robust Emergency Sense-and-Avoid Capability for Small Remotely Piloted Aerial Systems

Prof . Dr . Holger Voos CORE

MAMBA Architecture – MultimodAl MoBility Assistance Prof . Dr . Thomas Engel CORE

aToMS – a Theory of Matching Sessions Prof . Dr . Peter Y . A . Ryan CORE

INDOORS – Indoor Navigation with Ambient Radio Signals Dr . Andrei Popleteev (Junior)Prof . Dr . Thomas Engel (Supervisor)

CORE Junior

SATSENT – SATellite SEnsor NeTworks for spectrum monitoring Dr . Symeon Chatzinotas (Junior)Prof . Dr . Björn Ottersten (Supervisor)

CORE Junior

EU, ESA and EDA projects in 2017

Project Principal investigator Funding instrument

Awarded

SRU – Study to assess the future potential market and value-chain of Space Resources Utilisation Dr . Symeon Chatzinotas ESA Luximpulse

LiveSatPreDem – Live Satellite demonstration of advanced interference management Techniques Dr . Symeon Chatzinotas ESA

CADSAT – Carrier Aggregation in Satellite Communication Networks Dr . Symeon Chatzinotas ESA

Future TPM – Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module Prof . Dr . Peter Y . A . Ryan H2020-DS

HTS-DBS – High Throughput Digital Broadcasting Satellite Systems Dr . Symeon Chatzinotas ESA

SAINT – Systemic Analyzer In Network Threats Prof . Dr . Thomas Engel H2020-DS

GHOST – On-Ground EnHanced Non-Intrusive IOT System Prototyping and Testing for Efficient Monitoring Of Wideband Satellite Transponders

Dr . Symeon Chatzinotas ESA Luximpulse

AGNOSTIC – Actively Enhanced Cognition based Framework for Design of Complex Systems Prof . Dr . Björn Ottersten ERC

Ongoing

TUNE – Testing the Untestable: Model Testing of Complex Software-Intensive Systems Prof . Dr . Lionel Briand ERC

SANSA – Shared Access Terrestrial-Satellite Backhaul Network enabled by Smart Antennas Prof . Dr . Björn Ottersten H2020-ICT

F-INTEROP – FIRE+ online interoperability and performance test tools to support emerging technologies from research to standardization and market launch: an accelerator to develop standards and innovations

Prof . Dr . Thomas Engel H2020-ICT

MIREL – Mining and Reasoning With Legal Texts Prof . Dr . Leon van der Torre H2020-MSCA

ATENA – Advanced Tools to assess and mitigate the criticality of ICT components and their dependencies over Critical Infrastructures

Prof . Dr . Thomas Engel H2020-DS

TARGET – Training Augmented Reality Generalized Environment Toolkit Prof . Dr . Thomas Engel H2020-FCT

PrivacyFlag – Enabling Crowd-sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments

Prof . Dr . Thomas Engel H2020-DS

BioTope – Backbone of future Internet of Things Open Ecosystems Prof . Dr . Yves Le Traon H2020-ICT

STARR – Decision SupporT and self-mAnagement system for stRoke survivoRs Dr . Djamila Aouda H2020-PHC

Flysec – FLY faster through an innovative and robust risk-based SECurity tunnel Prof . Dr . Thomas Engel H2020-DRS

SATNEX-IV – Satellite Network of Experts CCN2 WI4 Dr . Symeon Chatzinotas ESA

ONSET – Optical Feeder Study for Satellite Networks Prof . Dr . Björn Ottersten ESA LuxImpulse

PreDem – Precoding Demonstrator for broadband system forward links Prof . Dr . Björn Ottersten ESA

SATNEX-IV – Satellite Network of Experts CCN2 WI1 Dr . Symeon Chatzinotas ESA

SATNEX-IV – Satellite Network of Experts CCN2 WI2 Dr . Bhavani Shankar ESA

GRoNE – Grande Région rObotique aérienNE Prof . Dr . Holger Voos Interreg VA

Completed

SATNEX-IV – Satellite Network of Experts Dr . Bhavani Shankar ESA

ASIMUT – Aid to Situation Management based on Multimodal, MUltiUAVs, Multilevel acquisition Techniques Prof . Dr . Pascal Bouvry EDA

ProLeMAS – Processing Legal Language for Normative Multi-Agent Systems Dr . Livio Robaldo H2020-MSCA

MCPRED – Efficient Multicarrier Transmission for Broadband Satellite Communications Prof . Dr . Björn Ottersten ESA

DVB-Sx – Novel Ground Components Prototype beyond DVB-S2 for Broadband Satellite Networks Prof . Dr . Björn Ottersten ESA

SATNEX-IV – Satellite Network of Experts CCN1 Dr . Bhavani Shankar ESA

SATNEX-IV – Satellite Network of Experts CCN1 Dr . Symeon Chatzinotas ESA

OPTIMUS – Optimized Transmission Techniques for SATCOM Unicast Interactive Traffic Prof . Dr . Björn Ottersten ESA

M2MSAT – Demonstrator of light-weight application and transport protocols for future M2M applications Prof . Dr . Thomas Engel ESA

MEO Modem – Modem prototype for MEO Broadband access Prof . Dr . Björn Ottersten ESA

f back to table of contents

Page 27: Annual Report 2017 - Université du Luxembourg

5352

Projects Projects

Project Principal investigator Applicant

Ongoing

Multibeam Joint Processing for Broadband/Broadcast Convergence in Next Generation High Throughput Satellite Communications

Prof . Dr . Björn Ottersten Danilo Spano

Coevolutionary Hybrid Bi-level Optimization Prof . Dr . Pascal Bouvry Emmanuel Kieffer

Risk Monitoring with Intrusion Detection for Industrial control systems Prof . Dr . Yves Le Traon Steve Muller

Automating Regression Test Selection for Requirements-based Testing in Embedded Systems Prof . Dr . Lionel Briand Ines Hajri

Collision-free Navigation of Small UAVs in Complex Urban Environments using Predictive Control Prof . Dr . Holger Voos Arun Annayian

Automatic Feature Selection for Visual Recognition Prof . Dr . Björn Ottersten Oyebade Oyedotun

Reliable Communication Techniques for Future Generation Satellite Systems Prof . Dr . Björn Ottersten Alberto Mengali

Tailoring Automated Software Techniques for Real World and Large Scale Software Applications Prof . Dr . Yves Le Traon Thierry Titcheu Chekam

Advanced Millimetre-Wave Technologies for Imaging Applications Prof . Dr . Björn Ottersten Christian Hammes

Self-learning predictive algorithms: from design to scalable implementation Dr . Radu State Manxing Du

Stochastic Model Predictive Control for Eco-Driving Assistance Systems in Electric Vehicles Prof . Dr . Holger Voos Seyed Amin Sajadi Alamdari

Systematically Exploring Semantic App Models for Android Prof . Dr . Sjouke Mauw Aleksandr Pilgun

Transparent Yet Private Access to Medical Data Prof . Dr . Peter Y .A . Ryan Dayana Spagnuelo

Spatio-Temporal Processes for Electricity Theft Detection Dr . Radu State Patrick Glauner

End-to-end Signal Processing Algorithms for Precoded Satellite Communications Dr . Symeon Chatzinotas Jevgeny Krivochiza

Evaluation of Authenticated Ciphers Prof . Dr . Alex Biryukov Alexey Udovenko

A Scalable Symbolic Execution Framework for Detecting Vulnerabilities Prof . Dr . Lionel Briand Julian Thome

Controller design for cooperative flying manipulation using small quadrotors UAVs Prof . Dr . Holger Voos Jan Dentler

Completed

Practical Lattice-Based Public-Key Cryptosystems Secure Against Quantum Computers Prof . Dr . Peter Y .A . Ryan Massimo Chenal

Integration of distributed controllable renewable generators in an electricity system including innovative micro- hydrokinetic turbines

Prof . Dr . Jürgen Sachau David Norta

An Effective Automated Testing approach for Detection of XML Injection Prof . Dr . Lionel Briand Sadeeq Jan

Stream Mining for Predictive Authentication Under Adversarial Influence Dr . Radu State Christian Hammerschmidt

Practical searchable encryption design through computation delegation Prof . Dr . Peter Y .A . Ryan Alfonso Arriaga

A Model-Based Framework for Specification and Automated Verification of Compliance to the Tax Law Dr . Lionel Briand Ghanem Soltana

Automated Debugging and Fault Localization of Matlab/Simulink Models Dr . Lionel Briand Liu Bing

Project Principal investigator Funding instrument

RECOMMEND – Automatic Bug Fix Recommendation: Improving Software Repair and Reducing Time-to-Fix Delays in Software Development Projects

Dr . Tegawendé F . Bissyandé (Junior)Prof . Dr . Yves Le Traon (Supervisor)

CORE Junior

FIXPATTERN – Automated Program Repair using Fix patterns Learned from Human-written Patches

Dr . Kim Dongsun (Junior)Prof . Dr . Yves Le Traon (Supervisor)

CORE Junior

DIST – Distance Bounding: a graph theoretical and formal approach Dr . Rolando Trujillo (Junior)Prof . Dr . Sjouke Mauw (Supervisor)

CORE Junior

COMMA – Combating Context-Sensitive Mobile Malware Dr . Olga Gadyatskaya (Junior)Prof . Dr . Sjouke Mauw (Supervisor)

CORE Junior

PETIT – Privacy Enhancing Techniques for Future Internet Dr . Andriy Panchenko (Junior)Prof . Dr . Thomas Engel (Supervisor)

CORE Junior

3D-ACT – 3D Action Recognition Using Refinement and Invariance Strategies for Reliable Surveillance

Prof . Dr . Björn Ottersten CORE

Completed

ADT2P – Attack-Defence Trees: Theory Meets Practice (Follow-up ATREES) Prof . Dr . Sjouke Mauw CORE

LOCALE – Localised Legacies Prof . Dr . Thomas Engel (LIST as coordinator)

CORE

SeMIGod – SpEctrum Management and Interference GeOlocation in cognitive raDio Satellite networks

Prof . Dr . Björn OtterstenCORE

AndroMap – Static Analysis For Android Security: Building the Map of Android Inter-App Communication

Dr . Jacques Klein CORE

ACRYPT – Applied Cryptography Prof . Dr . Alex Biryukov CORE

FNR AFR PhD Projects 2017

Project Principal investigator Applicant

Awarded

Navigation System for a Small Lunar Exploration Rover Prof . Dr . Holger Voos Philippe Ludivig

Android Malicious code Localisation: Catch Me if You can! Dr . Jacques Klein Pingfan Kong

Model-Driven Software Engineering for Social Robots Prof . Dr . Holger Voos Gary Philippe Cornelius

Source Code Search for Semantically Similar Functionalities Dr . Tegawende Byssinde Kim Kisub

Space as a catalyst of a sustainable smart school environment Prof . Dr . Charles Max Melissa Bellesi

Model Testing of Satellite Control Systems Dr . Shiva Nejati Mojtaba Varmazyar

Power efficient sparse signal processing for digital wideband on-board techniques Prof . Dr . Björn Ottersten Akash Arora

Prediction model for smart grids Prof . Dr . Yves Le Traon Luiz Antonio Ricci

Joint Radar-Communication System Prof . Dr . Björn Ottersten Sayed Hossein Dokhanchi

Data Analytics and Smart Contracts for traceability in finance Dr . Radu State Nida Khan

Advanced Market Abuse Detection with Big Data Dr . Radu State Ramiro Camino

Real time prediction and detection of malicious activities Dr . Radu State Georgios Kaiafas

Accurate 3D human body shape modelling and fitting under clothing Dr . Djamila AoudaProf . Dr . Björn Ottersten

Alexandre Saint

Online Learning for edge-caching In hybrid Satellite-Terrestrial Networks Prof . Dr . Björn OtterstenDr . Symeon Chatzinotas

Sajad Mehrizi

f back to table of contents

Page 28: Annual Report 2017 - Université du Luxembourg

5554

Projects Projects

Projects running under the bilateral programs

Project Principal investigator Co- funding agency

Awarded

SIERRA – Spectral efficient Receivers and Resource Allocation for satellite cognitive systems Dr . Symeon Chatzinotas ANR

CY-PHI – Exploiting interference for physical layer security in 5G networks Dr . Symeon Chatzinotas RCUK

Ongoing

CRC 1223 – Methods and Tools for Holistic, Agile Privacy Prof . Dr . Lionel Briand DFG-CRC

InWIPNET – Integrated Wireless Information and Power Networks Prof . Dr . Björn Ottersten FNRS

MaDSAV – MAintaining Driving Skills in Semi-Autonomous Vehicles Prof . Dr . Thomas Engel FWF

IDSECOM – ID-based Secure Communications system for unified access in IOT Prof . Dr . Thomas Engel NCBR

CONTACT – CONtext and conTent Aware CommunicaTions for QoS support in VANETs Prof . Dr . Thomas Engel SNF

SEQUOIA – Security Properties, Process Equivalences, and Automated Verification Prof . Dr . Peter Y .A . Ryan ANR

VoteVerif – Verification of Voter- Verifiable Voting Protocols Prof . Dr . Peter Y .A . Ryan NCBR

Completed

IShOP – Internet Shopping Optimization Project Prof . Dr . Pascal Bouvry NCBR

SIEP – Specification logics and inference tools for verification and Enforcement of Policies Prof . Dr . Leon van der Torre FWO

COSDN – Cognitive Software Defined Networks Prof . Dr . Thomas Engel NCBR

We would like to thank the following funding organisations for their support:

FNR AFR Post-Doc Projects 2017

Project Principal investigator Applicant

Awarded

Unbiased Temporal Machine for General-purpose Times series-based Fraud detection Dr . Radu State Dr . Eric Antonelo

Rule Compilation for Software-defined Networks (SDN) Dr . Radu State Dr . Stefan Hommes

Reconciling Natural-Language Requirements and Model-Based Specification for Effective Development of Critical Infrastructure Systems

Prof . Dr . Lionel Briand Dr . Chetan Arora

Large-Scale Blockchain Testbed Dr . Radu State Dr . Wazen Shbair

Optimal Scalability and Performance in Programmatic Advertising Platforms Dr . Radu State Dr . Georgios Varisteas

Graph Anti-Money laundering and Market Abuse Framework Dr . Radu State Dr . Leandro Montero

Digital Payload Processing for Next Generation Satellite Systems Prof . Dr . Björn Ottersten Dr . Joroughi Vahid

Completed

Internet of Things for Context-aware Building Energy & Health Management Prof . Dr . Yves Le Traon Dr . Sylvain Kubler

Other projects funded by FNR

Project Principal investigator Funding instrument

Awarded

ARMLET – Automated Retrieval of Metadata from Legal Texts Dr . Mehrdad Sabetzadeh Proof of Concept

AFI – Air Frame Inspection Dr . Miguel Angel Olivares Mendez

Proof of Concept

DesiRo – Engineering Design for Autonomous Mobile Robots Prof . Dr . Holger Voos INTER Mobility

DFS – PayPal-FNR PEARL Chair in Digital Financial Services TBD PEARL

RAFAEL – RainFall Estimation using signalling data of satellite communication networks Dr . Bhavani Shankar Proof of Concept

ProcRob3 – PROgramming Cognitive ROBots 3 Prof . Dr . Leon van der Torre Proof of Concept

Industry Partnership 2 .0 – Industry Partnership 2 .0 Dr . Marc Lemmer KITS

LARGOS – Learning-Assisted Optimization for Resource and Security Management in Slicing-Based 5G Networks

Dr . Symeon Chatzinotas AFR Bilateral Grant

Ongoing

IISD – Strategic RTnD Program on Information Infrastructure Security and Dependability Prof . Dr . Paulo E . Verissimo PEARL

TTOLeader2 .0 – TTO Leader 2 .0 Prof . Dr . Björn Ottersten KITS

V&V Lab – Verification and Validation Laboratory Prof . Dr . Lionel Briand PEARL

SERENADE – Satellite Precoding Hardware Demonstrator Dr . Symeon Chatzinotas Proof of Concept

EDLAH2 – Enhanced Daily Living and Health 2 – an incentive based service Prof . Dr . Lionel Briand AAL

NSBNET – Advanced Resource Allocation and Interference Management Strategies for Hybrid Satellite-Terrestrial Backhaul Networks

Prof . Dr . Björn Ottersten AFR Bilateral Grant

ACCORDION – Compressive Sensing for Ranging and Detection in Automotive Applications Prof . Dr . Björn Ottersten AFR Bilateral Grant

Serval@Berkeley Prof . Dr . Yves Le Traon INTER Mobility

Completed

HotspotID – crowdsourced WiFi security Dr . Daniel Forster Proof of Concept

SimCoTest – Simulink Controller Tester Dr . Reza Matinnejad Proof of Concept

ProcRob2 – PROgramming Cognitive ROBots 2 Prof . Dr . Leon van der Torre Proof of Concept

f back to table of contents

Page 29: Annual Report 2017 - Université du Luxembourg

5756

Publications Publications

14. Briand, L ., Bianculli, D ., Nejati, S ., Pastore, F ., & Sabetzadeh, M . (2017) . The Case for Context-Driven Software Engineering Research . IEEE Software, 34(5), 72-75 .

15. Capponi, A ., Fiandrino, C ., Kliazovich, D ., Bouvry, P ., & Giordano, S . (2017) . A Cost-effective Distributed Framework for Data Collection in Cloud-based Mobile Crowd Sensing Architectures . IEEE Transactions on Sustainable Computing .

16. Castignani, G ., Derrmann, T ., Frank, R ., & Engel, T . (2017) . Smartphone-based Adaptive Driving Maneuver Detection: a Large-scale Evaluation Study . IEEE Transactions on Intelligent TransportationSystems .

17. Castrillon, J ., Lieber, M ., Klueppelholz, S ., Volp, M ., Asmussen, N ., Assmann, U ., Baader, F ., Baier, C ., Fettweis, G ., & Froehlich, J . (2017) . A Hardware/Software Stack for Heterogeneous Systems . IEEE Transactions on Multi-Scale Computing Systems, PP(99), 1 .

18. De Caro, A .* , Iovino, V .* , & O’Neill, A .* (2017) . Receiver and Sender Deniable Functional Encryption . IET Information Security . * These authors have contributed equally to this work .

19. Demisse, G ., Aouada, D ., & Ottersten, B . (2017) . Deformation Based Curved Shape Representation . IEEE Transactions on Pattern Analysis & Machine Intelligence .

20. Di Nardo, D ., Pastore, F ., & Briand, L . (2017) . Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes . ACM Transactions on Software Engineering & Methodology, 26(1), 1-40 .

21. Dong, N ., Jonker, H ., & Pang, J . (2017) . Formal Modelling and Analysis of Receipt-Free Auction Protocols in Applied Pi . Computers & Security, 65, 405-432 .

22. Duarte, J ., Kalogeiton, E ., Soua, R ., Manzo, G ., Palattella, M . R ., Di Maio, A ., Braun, T ., Engel, T ., Villas, L ., & Rizzo, G . (2017, January 26) . A Multi-pronged Approach to Adaptive and Context Aware Content Dissemination in VANETs . Mobile Networks and Applications, 1-13 .

23. Fagerholm, F ., Sanchez Guinea, A ., Mäenpää, H ., & Münch, J . (2017) . The RIGHT model for Continuous Experimentation . Journal of Systems and Software, 123, 292-305 .

24. Falk, E ., Fiz Pontiveros, B ., Repcek, S ., Hommes, S ., State, R ., & Sasnauskas, R . (2017, December 07) . VSOC - a Virtual SecurityOperating Center . Global Communications .

25. Faye, S ., Bronzi, W ., Tahirou, I ., & Engel, T . (2017) . Characterizing User Mobility Using Mobile Sensing Systems . International Journal of Distributed Sensor Networks, 13(8) .

26. Fiandrino, C ., Capponi, A ., Cacciatore, G ., Kliazovich, D ., Sorger, U ., Bouvry, P ., Kantarci, B ., Granelli, F ., & Giordano, S . (2017, February) . CrowdSenSim: a Simulation Platform for Mobile Crowdsensing in Realistic Urban Environments . IEEE Access .

27. Giurgiu, A ., & Lallemang, T . (2017, January) . The General Data Protection Regulation: a New Opportunity and Challenge for the Banking Sector . Ace Magazine et Archives Online : Fiscalité, Comptabilité, Audit, Droit des Affaires au Luxembourg, (1), 3-15 .

28. Glauner, P ., Meira, J . A ., Valtchev, P ., State, R ., & Bettinger, F . (2017) . The Challenge of Non-technical Loss Detection using Artificial Intelligence: A Survey . International Journal of Computational Intelligence Systems, 10(1), 760-775 .

29. Hartmann, T ., Moawad, A ., Fouquet, F ., & Le Traon, Y . (2017, May 29) . The Next Evolution of MDE: a Seamless Integration of Machine Learning into Domain Modeling . Software & Systems Modeling .

30. He, S ., Wang, J ., Huang, Y ., Ottersten, B ., & Hong, W .(2017) . Codebook-based Hybrid Precoding for Millimeter Wave Multiuser Systems . IEEE Transactions on Signal Processing, 65(20), 5289-5304 .

31. Iovino, V ., Tang, Q ., & Zebrowski, K . (2017) . On the Power of Public-key Function-private Functional Encryption . IET Information Security .

32. Kardas, S ., & Genç, Z . A . (2017) . Security Attacks and Enhancements to Chaotic Cap-based RFID Authentication Protocols . Wireless Personal Communications .

33. Kieffer, E ., Danoy, G ., Bouvry, P ., & Nagih, A . (2017) . A New Modeling Approach for the Biobjective Exact Optimization of Satellite Payload Configuration . International Transactions in Operational Research .

34. Kintis, M ., Papadakis, M ., Jia, Y ., Malevris, N ., Le Traon, Y ., & Harman, M . (2017, March 20) . Detecting Trivial Mutant Equivalences via Compiler Optimisations . IEEE Transactions on Software Engineering .

35. Koesdwiady, A ., Soua, R ., Karray, F ., & Kamel, M . S . (2017) . Recent Trends in Driver Safety Monitoring Systems: State of the Art and Challenges . IEEE Transactions on Vehicular Technology, 66(6), 4550-4563 .

36. Kubler, S ., Robert, J ., Främling, K ., Hefnawy, A ., Cherifi, C ., & Bouras, A . (2017) . Open IoT Ecosystem for Sporting Event Management . IEEE Access, 5(1), 7064-7079 .

37. Kubler, S ., Robert, J ., Umbrich, J ., Neumaier, S ., & Le Traon, Y . (2017) . Comparison of Metadata Quality in Open Data Portals Using the Analytic Hierarchy Process . Government Information Quarterly .

38. Lemanska, M ., Rodríguez-Velázquez, A ., & Trujillo Rasua, R . (2017) . Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph . Fundamenta Informaticae, 152(3), 273-287 .

39. Li, L ., Bissyande, T . F . D . A ., Papadakis, M ., Rasthofer, S ., Bartel, A ., Octeau, D ., Klein, J ., & Le Traon, Y . (2017) . Static Analysis of An- droid Apps: a Systematic Literature Review . Information and Software Technology .

40. Li, L ., Li, D ., Bissyande, T . F . D . A ., Klein, J ., Cai, H ., Lo, D ., & Le Traon, Y . (2017, November) . On Locating Malicious Code in Piggybacked Android Apps . Journal of Computer Science & Technology .

41. Li, L ., Li, D ., Bissyande, T . F . D . A ., Klein, J ., Le Traon, Y ., Lo, D ., & Cavallaro, L . (2017, January) . Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting . IEEE Transactions on Information Forensics & Security .

42. Liu, Z ., Lei, L ., Zhang, N ., Kang, G ., & Chatzinotas, S . (2017, May) . Joint Beamforming and PowerOptimization with Iterative User Clustering for MISO-NOMA Systems . IEEE Access .

43. Nanda, R ., Siragusa, G ., Di caro, L ., Theobald, M ., Boella, G ., Robaldo, L ., & Costamagna, F . (2017) . Concept Recognition in European and National Law . Frontiers in Artificial Intelligence and Applications, Volume 302: Legal Knowledge and Information Systems .

44. Nguyen, Jayakody, Chatzinotas, S ., Thomp-son, & Li . (2017) . Self-powered Two-way Cognitive Relay Networks: Protocol Design and Performance Analysis . IEEE Access .

45. Oyedotun, O ., & Khashman, A . (2017, August 15) . Prototype Incorporated Emotional Neural Network (PI-EmNN) . IEEE Transactions on Neural Networks and Learning Systems .

46. Papazafeiropoulos, Sharma, Chatzinotas, S ., & Ottersten, B . (2017) . Ergodic Capacity Analysis of Amplify-and-Forward Dual-Hop MIMO Relay Systems with Residual Transceiver Hardware Impairments: Conventional and Large System Limits . IEEE Transactions on Vehicular Technology .

Publications

Doctoral theses

1. Ambrossio, D . A . (2017) . Non-Monotonic Logics for Access Control: Delegation Revocation and Distributed Policies . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

2. Ben Fadhel, A . (2017) . Comprehensive Specification and Efficient Enforcement of Role-Based Access Control Policies Using a Model-driven Approach . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

3. Bronzi, W . (2017) . Enhancing Mobility Applications through Bluetooth Communications . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

4. Brühl, M . (2017) . Investigation of Modular Battery Systems Affected by Inhomogeneous State-of-Health Distribution . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

5. Chaib Draa, K . (2017) . Observation and Control of Anaerobic Digestion Processes for Improved Biogas Production . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

6. Chenal, M . (2017) . Key-Recovery Attacks against Somewhat Homomorphic EncryptionSchemes . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

7. Delerue Arriaga, A . (2017) . Private Functional Encryption – Hiding What Cannot be Learned through Function Evaluation . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

8. Demisse, G . (2017) . Deformation Based Curved Shape Representation . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

9. Dinu, D . D . (2017) . Efficient and Secure Implementations of Lightweight SymmetricCryptographic Primitives . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

10. Falk, E . (2017) . Big Data Architectures for Converged Security . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

11. Giese, M . O . (2017) . Integral Construction and Control Design Employing Heat Flow Dynamics for Increased Thermogenerator’s Efficiency . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

12. Hammerschmidt, C . (2017) . Learning Finite Automata via Flexible State-Merging and Applications in Networking . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

13. Hochgeschwender, N . (2017) . Model-based Specification, Deployment and Adaptation of Robot Perception Systems . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

14. Jan, S . (2017) . Automated and Effective Security Testing for XML-based Vulnerabilities . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

15. Liu, B . (2017) . Automated Debugging and Fault Localization of Matlab/Simulink Models . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

16. Perrin, L . P . (2017) . Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

17. Skrobot, M . (2017) . On Composability and Security of Game-based Password-authenticated Key Exchange . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

18. Soltana, G . (2017) . A Model-based Frame-work for Legal Policy Simulation and Compli-ance Checking . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

19. Tsakmalis, A . (2017) . Active Learning in Cognitive Radio Networks . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

20. Wang, C . (2017) . Automated Requirements-driven Testing of Embedded Systems Based on Use Case Specifications and Timed Automata . Unpublished doctoral thesis, University of Luxembourg, Luxembourg .

Articles in academic journals

1. Ajani, G ., Boella, G ., Di Caro, L ., Robaldo, L ., Humphreys, L ., Praduroux, S ., Rossi, P ., & Violato, A . (2017) . The European Legal Taxonomy Syllabus: a Multi-lingual, Multi-level Ontology Framework to Untangle the Web of European Legal Terminology . Applied Ontology .

2. Al Ismaeil, K ., Aouada, D ., Solignac, T ., Mirbach, B ., & Ottersten, B . (2017) . Real-time Enhancement of Dynamic Depth Dideos with Non-rigid Deformations . IEEE Transactions on Pattern Analysis and Machine Intelligence, 39(10), 2045-2059 .

3. Alodeh, M ., Chatzinotas, S ., & Ottersten, B . (2017) . Symbol-level Multiuser MISO Precoding for Multi-level Adaptive Modulation . IEEE Transactions on WirelessCommunications .

4. Antonelo, E . A ., Camponogara, E ., & Foss, B . (2017) . Echo State Networks for Data-driven Downhole Pressure Estimation in Gas-lift Oil Wells . Neural Networks, 85, 106--117 .

5. Antonelo, E . A ., Flesch, C ., & Filipe, S . (2017) . Reservoir Computing for Detection of Steady State in Performance Tests of Compressors . Neurocomputing .

6. Arend, B ., Sunnen, P ., & Caire, P . (2017) . Investigating Breakdowns in Human Robot Interaction: a Conversation Analysis Guided Single Case Study of a Human-NAO Communication in a Museum Environment . International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, 11(5), 839-845 .

7. Arora, C ., Sabetzadeh, M ., Briand, L ., & Zimmer, F . (2017) . Automated Extraction and Clustering of Requirements Glossary Terms . IEEE Transactions on Software Engineering, 43(10), 918-945 .

8. Atashpendar, A ., Dorronsoro, B ., Danoy, G ., & Bouvry, P . (2017, June 10) . A Scalable Parallel Cooperative Coevolutionary PSO Algorithm for Multi-objective Optimization . Journal of Parallel & Distributed Computing .

9. Bartolini, C ., Tettamanti, T ., & István, V . (2017) . Critical Features of Autonomous Road Transport from the Perspective of Technological Regulation and Law . Transportation Research Procedia, 27, 791-798 .

10. Bella, G ., Giustolisi, R ., Lenzini, G ., & Ryan, P . (2017) . Trustworthy Exams without Trusted Parties . Computer and Security, 67, 291-307 .

11. Ben Nasr, S ., Bécan, G ., Acher, M ., Ferreira Filho, J . B ., Sannier, N ., Baudry, B ., & Davril, J .-M . (2017) . Automated Extraction of Product Comparison Matrices from Informal Product Descriptions . Journal of Systems and Software, 124, 82-103 .

12. Bezzaoucha, S ., Voos, H ., & Darouach, M . (2017, January) . A New Polytopic Approach for the Unknown Input Functional Observer Design . International Journal of Control .

13. Biesmans, W ., Balasch, J ., Rial Duran, A ., Preneel, B ., & Verbauwhede, I . (2017) . Private Mobile Pay-TV From Priced Oblivious Transfer . IEEE Transactions on Information Forensics & Security .

f back to table of contents

Page 30: Annual Report 2017 - Université du Luxembourg

5958

Publications Publications

7. Sharma, S . K ., Lagunas, E ., Tsinos, C ., Maleki, S ., Chatzinotas, S ., & Ottersten, B . (2017) . Spectral Coexistence for Next Generation Wireless Backhaul Networks . In Access, Fronthaul and Backhaul Networks for 5G and Beyond, Telecommunications (pp . 307-336) . Institution of Engineering and Technology .

8. Yu, J ., & Ryan, M . (2017) . Chapter 7: Evaluating web PKIs . Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017 . Morgan Kaufmann .

Scientific congresses, symposiums and conference proceedings: paper published in a book

1. Almasi, M ., Hemmati, H ., Fraser, G ., Arcuri, A ., & Benefelds, J . (2017) . An Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application . ACM/IEEE International Conference on Software Engineering (ICSE) .

2. Alodeh, M ., Spano, D ., Chatzinotas, S ., & Ottersten, B . (2017) . Faster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels . The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing .

3. Annaiyan, A ., Olivares Mendez, M . A ., & Voos, H . (2017) . Real-time Graph-based SLAM in Unknown Environments Using a Small UAV . 2017 International Conference on Unmanned Aircraft Systems (ICUAS); Miami 13-16 June 2017 (pp . 1118-1123) .

4. Antonelo, E . A ., & State, R . (2017) . Recurrent Dynamical Projection for Time Series-based Fraud Detection . ICANN 2017, Part II, LNCS 10614 .

5. Appelt, D ., Panichella, A ., & Briand, L . (2017) . Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks . The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp . 339-350) . IEEE .

6. Arcuri, A . (2017) . Many Independent Objective (MIO) Algorithm for Test Suite Generation . Symposium on Search-based Software Engineering (SSBSE) .

7. Arcuri, A . (2017) . RESTful API Automated Test Case Generation . IEEE International Conference on Software Quality, Reliability & Security (QRS) .

8. Arcuri, A ., Fraser, G ., & Just, R . (2017) . Private API Access and Functional Mocking in Automated Unit Test Generation . IEEE International Conference on Software Testing, Verification and Validation (ICST) .

9. Artiga, X ., Vázquez, M . Á ., Pérez-Neira, A ., Tsinos, C ., Lagunas, E ., Chatzinotas, S ., Ramireddy, V ., Steinmetz, C ., Zetik, R ., Ntougias, K ., Ntaikos, D ., & Papadias, C . (2017) . Spectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka Band . European Conference on Networks and Communications (EuCNC), June 2017 .

10. Backes, M ., Humbert, M ., Pang, J ., & Zhang, Y . (2017) . walk2friends: Inferring Social Links from Mobility Profiles . Proceedings of the 24th ACM International Conference on Computer and Communications Security (pp . 1943-1957) . ACM Press .

11. Baptista, R ., Antunes, M ., Shabayek, A . E . R ., Aouada, D ., & Ottersten, B . (2017) . Flexible Feedback System for Posture Monitoring and Correction . IEEE International Conference on Image Information Processing (ICIIP) .

12. Baptista, R ., Goncalves Almeida Antunes, M ., Aouada, D ., & Ottersten, B . (2017) . Video-based Feedback for Assisting Physical Activity . 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) .

13. Bardini Idalino, T ., Pierina Brustolin Spagnuelo, D ., & Everson Martina, J . (2017) . Private Verification of Access on Medical Data: An Initial Study . 12th International Workshop on Data Privacy Management . Springer .

14. Benelallam, A ., Hartmann, T ., Mouline, L ., Fouquet, F ., Bourcier, J ., Barais, O ., & Le Traon, Y . (2017) . Raising Time Awareness in Model-driven Engineering . 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp . 181-188) . Springer .

15. Bezzaoucha, S ., Voos, H ., & Darouach, M . (2017, May) . A Contribution to Cyber-Security of Networked Control Systems: an Event-based Control Approach . Proceedings of 2017 3rd International Conference on Event-Based Control, Communication and Signal Processing (EBCCSP 2017) .

16. Bezzaoucha, S ., Voos, H ., & Darouach, M . (2017, May) . Unknown Input Functional Observers Design for Polytopic Discrete Time Systems . Proceedings of 6th IEEE International Conference on Systems and Control (ICSC) 2017 .

17. Bezzaoucha, S ., Voos, H ., & Darouach, M . (2017, July) . On the Unknown Input Functional Observer Design via Polytopic Lyapunov Function: Application to a Quadrotor Aerial Robots Landing . IFAC-PapersOnLine .

Books

Editor of collective works

1. Booth, R ., Casini, G ., & Varzinczak, I . (Eds .) . (2017) . DARe-17 - Proceedings of the Fourth International Workshop on Defeasible and Ampliative Reasoning . CEUR Workshop Proceedings .

2. Jayakody, Chatzinotas, S ., Thompson, & Durrani (Eds .) . (2017) . Wireless Information and Power Transfer: a New Paradigm for Green Communications . Springer .

3. Wyner, A ., & Casini, G . (Eds .) . (2017) . Legal Knowledge and Information Systems - JURIX 2017: The Thirtieth Annual Conference . IOS Press BV .

Chapters of collective works

1. Bartolini, C . (2017) . Software Testing Techniques Revisited for OWL Ontologies . In S ., Hammoudi, L ., Ferreira Pires, B ., Selic, & P ., Desfray (Eds .), Model-Driven Engineering and Software Development (pp . 132-153) . Springer International Publishing .

2. Bartolini, C ., Muthuri, R ., & Cristiana, S . (2017) . Using Ontologies to Model Data Protection Requirements in Workflows . In M ., Otake, S ., Kurahashi, Y ., Ota, K ., Satoh, & D ., Bekki (Eds .), New Frontiers in Artificial Intelligence (pp . 233-248) . Springer International Publishing .

3. Bezzaoucha, S ., Voos, H ., & Darouach, M . (2017) . Chapter 4: A Survey on the Polytopic Takagi-Sugeno Approach: Application to the Inverted Pendulum . The Inverted Pendulum: From Theory to New Innovations in Control and Robotics . The Institution of Engineering and Technology IET-publishing .

4. Derigent, W ., Voisin, A ., Thomas, A ., Kubler, S ., & Robert, J . (2017) . Application of Measurement-Based AHP to Product-Driven System Control . In T ., Borangiu, Service Orientation in Holonic and Multi-Agent Manufacturing (Studies in Computational Intelligence, pp . 249-258) . Springer .

5. Kaushik, A ., Sharma, S . K ., Chatzinotas, S ., Ottersten, B ., & Jondral, F . K . (2017) . Modelling and Performance Analysis of Cognitive Radio Systems from a Deployment Perspective . In Handbook of Cognitive Radio, Cognitive Radio Communications . Springer .

6. Papadakis, M ., Kintis, M ., Zhang, J ., Jia, Y ., Le Traon, Y ., & Harman, M . (2017) . Mutation Testing Advances: An Analysis and Survey . Advances in Computers . Elsevier .

47. Papazafeiropoulos, Sharma, Chatzinotas, S ., & Ratnarajah . (2017) . Impact of Residual Additive Transceiver Hardware Impairments on Rayleigh-product MIMO Channels with Linear Receivers: Exact and Asymptotic Analyses . IEEE Transactions on Communications .

48. Perrin, L . P ., & Udovenko, A . (2017) . Exponential S-Boxes: a Link between the S-Boxes of BelT and Kuznyechik/Streebog . IACR Transactions on Symmetric Cryptology, 2016(2), 99-124 .

49. Politis, C ., Maleki, S ., Tsinos, C ., Liolis , K ., Chatzinotas, S ., & Ottersten, B . (2017) . Simultaneous Sensing and Transmission for Cognitive Radios with Imperfect Signal Cancellation . IEEE Transactions on Wireless Communications .

50. Quintanar Guzman, S ., Kannan, S ., Aguilera Gonzalez, A ., Olivares Mendez, M . A ., & Voos, H . (2017, August 25) . Operational Space Control of a Lightweight Robotic Arm Actuated by Shape Memory Alloy Wires: A Comparative Study . Journal of Intelligent Material Systems & Structures .

51. Radhakrishnan, I ., Soua, R ., Palattella, M . R ., & Engel, T . (2017, June) . An Efficient Service Channel Allocation Scheme in SDN-enabled VANETs . MedHocNet .

52. Rahli, V ., & Bickford, M . (2017) . Validating Brouwer’s Continuity Principle for Numbers Using Named Exceptions . Mathematical Structures in Computer Science .

53. Rahli, V ., Guaspari, D ., Bickford, M ., & Constable, R . (2017) . EventML: Specification, Verification, and Implementation of Crash-tolerant State Machine Replication Systems . Science of Computer Programming .

54. Rial Duran, A . (2017) . Issuer-free Oblivious Transfer with Access Control Revisited . Information Processing Letters .

55. Robaldo, L ., & Sun, X . (2017) . On the Complexity of Input/Output Logic . Journal of Applied Logic .

56. Robaldo, L ., & Sun, X . (2017) . Reified Input/Output logic: Combining Input/Output logic and Reification to Represent Norms Coming from Existing Legislation . The Journal of Logic and Computation .

57. Roldán, J . J ., Olivares Mendez, M . A ., del Cerro, J ., & Barrientos, A . (2017, November 23) . Analyzing and Improving Multi-robot Missions by Using Process Mining . Autonomous Robots .

58. Roldán, J . J ., Peña-Tapia, E ., Martín-Barrio, A ., Olivares Mendez, M . A ., Del Cerro, J ., & Barrientos, A . (2017) . Multi-robot Interfaces and Operator Situational Awareness: Study of the Impact of Immersion and Prediction . Sensors, 17(8 1720) .

59. Sannier, N ., Adedjouma, M ., Sabetzadeh, M ., & Briand, L . (2017) . An Automated Framework for Detection and Resolution of Cross References in Legal Texts . Requirements Engineering, 22(2), 215-237 .

60. Sharma, Bogale, Le, Chatzinotas, S ., Wang, & Ottersten, B . (2017) . Dynamic Spectrum Sharing in 5G Wireless Networks with Full-duplex Technology: Recent Advances and Research Challenges . IEEE Communications Surveys and Tutorials .

61. Shin, S . Y ., Brun, Y ., Balasubramanian, H ., Henneman, P . L ., & Osterweil, L . J . (2017, March 27) . Discrete-event Simulation and Integer Linear Programming for Constraint-aware Resource Scheduling . IEEE Transactions on Systems, Man, and Cybernetics: Systems .

62. Spano, D ., Alodeh, M ., Chatzinotas, S ., & Ottersten, B . (2017) . Symbol-level Precoding for the Non-linear Multiuser MISO Downlink Channel . IEEE Transactions on Signal Processing .

63. Sun, X ., & Robaldo, L . (2017) . Norm-based Deontic Logic for Access Control, Some Computational Results . Future Generation Computer Systems .

64. Tervo, Pennanen, Christopoulos, Chatzinotas, S ., Juntti, & Ottersten . (2017) . Distributed Optimization for Coordinated Multi-cell Multigroup Multicast Beamforming: Power Minimization and SINR Balancing . IEEE Transactions on Signal Processing .

65. Toader, B ., Sprumont, F ., Faye, S ., Viti, F ., & Popescu, M . (2017) . Usage of Smartphone Data to Derive an Indicator for Collaborative Mobility between Individuals . ISPRS International Journal of Geo-Information, 6(3), 62 .

66. Tsakmalis, A ., Chatzinotas, S ., & Ottersten, B . (2017) . Interference Constraint Active Learning with Uncertain Feedback for Cognitive Radio Networks . IEEE Transactions on Wireless Communications, 16(7), 4654-4668 .

67. Tsinos, C . G ., and Ottersten, B . (2017) . An Efficient Algorithm for Unit-modulus Quadratic Programs with Application in Beamforming for Wireless Sensor Networks . IEEE Signal Processing Letters, 25(2), 169-173 .

68. Tsinos, C ., Maleki, S ., Chatzinotas, S ., & Ottersten, B . (2017) . On the Energy-efficiency of Hybrid Analog-Digital Transceivers for Single- and Multi-carrier Large Antenna Array Systems . IEEE Journal on Selected Areas In Communications .

69. Vu, T . X ., Chatzinotas, S ., Ottersten, B ., & Duong, T . Q . (2017, November) . Energy Minimization for Cache-assisted Content Delivery Networks with Wireless Backhaul . IEEE Wireless Communications Letters .

70. Vu, T . X ., Duhamel, P ., Chatzinotas, S ., & Ottersten, B . (2017, May) . Finite-SNR Analysis for Partial Relaying Cooperation with Channel Coding and Opportunistic Relay Selection . EURASIP Journal on Advances in Signal Processing .

71. Vu, T . X ., Nguyen, Hieu Duy, Quek, Tony Q .S ., & Sun, Sumei . (2017) . Adaptive Cloud Radio Access Networks: Compression and Optimization . IEEE Transactions on Signal Processing, 65(1), 228-241 .

72. Yang, X ., Lo, D ., Li, L ., Xia, X ., Bissyande, T . F . D . A ., & Klein, J . (2017) . Comprehending Malicious Android Apps by Mining Topic-specific Data Flow Signatures . Information and Software Technology .

73. Yang, Y ., & Pesavento, M . (2017) . A Unified Successive Pseudoconvex Approximation Framework . IEEE Transactions on Signal Processing, 65(13), 3313 - 3328 .

74. You, I ., Lenzini, G ., & De Santis, A . (2017) . Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence . IEEE Systems Journal, 11(2) .

75. Yu, J ., Ryan, M ., & Cremers, C . (2017) . DECIM: Detecting Endpoint Compromise in Messaging . IEEE Transactions on Information Forensics & Security .

76. Ziaragkas, G ., Poziopoulou, G ., Núñez-Martínez, J ., Baranda Hortigüela, J ., Moreno, I ., Tsinos, C ., Maleki, S ., Sharma, S . K ., Alodeh, M ., & Chatzinotas, S . (2017) . SANSA - Hybrid Terrestrial-Satellite Backhaul Network: Scenarios, Use Cases, KPIs, Architecture, Network and Physical Layer Techniques . International Journal of Satellite Communications and Networking .

f back to table of contents

Page 31: Annual Report 2017 - Université du Luxembourg

6160

Publications Publications

46. Di Maio, A ., Soua, R ., Palattella, M . R ., Engel, T ., & Rizzo, G . (2017) . A Centralized Approach for Setting Floating Content Parameters in VANETs . 14th IEEE Annual Consumer Communications & Networking Conference (CCNC 2017) .

47. Di Nucci, D ., Palomba, F ., Prota, A ., Panichella, A ., Zaidman, A ., & De Lucia, A . (2017) . PETrA: a Software-based Tool for Estimating the Energy Profile of Android Applications . 39th International Conference on Software Engineering (ICSE) 2017 (pp . 3-6) . ACM .

48. Di Nucci, D ., Palomba, F ., Prota, A ., Panichella, A ., Zaidman, A ., & De Lucia, A . (2017) . Software-based Energy Profiling of Android Apps: Simple, Efficient and Reliable? Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) . IEEE .

49. Dou, W ., Bianculli, D ., & Briand, L . (2017) . TemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties . Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (pp . 64-70) . EasyChair .

50. Dou, W ., Bianculli, D ., & Briand, L . (2017) . A Model-driven Approach to Trace Checking of Pattern-based Temporal Properties . Pro-ceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) .

51. Du, M ., Sassioui, R ., Varisteas, G ., State, R ., Brorsson, M ., & Cherkaoui, O . (2017) . Improving Real-time Bidding Using a Constrained Markov Decision Process . Advanced Data Mining and Applications (pp . 711-726) . Springer .

52. Erata, F ., Göknil, A ., Tekinerdogan, B ., & Kardas,G . (2017) . A Tool for Automated Reasoning about Traces Based on Configurable Formal Semantics . 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)) (pp . 959-963) .

53. Falk, E ., Camino, R . D ., State, R ., & Gurbani, V . K . (2017) . On Non-parametric Models for Detecting Outages in the Mobile Network . Integrated Network and Service Management 2017 (pp . 1139-1142) .

54. Falk, E ., Charlier, J . H . J ., & State, R . (2017) . Your Moves, Your Device: Establishing Behavior Profiles Using Tensors . Advanced Data Mining and Applications - 13th International Conference, ADMA 2017 (pp . 460-474) .

55. Falk, E ., Gurbani, V . K ., & State, R . (2017) . Query-able Kafka: an Agile Data Analytics Pipeline for Mobile Wireless Networks . Proceedings of the 43rd International Conference on Very Large Data Bases 2017, 10, 1646-1657 .

56. Fraser, G ., Rojas, J . M ., Campos, J ., & Arcuri, A . (2017) . EVOSUITE at the SBST 2017 Tool Competition . IEEE/ACM International Work-shop on Search-Based Software Testing (SBST) .

57. Gadyatskaya, O ., Ravi, J ., Mauw, S ., Trujillo Rasua, R ., & Tim, A . C . W . (2017) . Refinement-aware Generation of Attack Trees . In G ., Livraga & C . J ., Mitchell, Security and Trust Management - 13th International Workshop (pp . 164-179) . Springer .

58. Gajrani, J ., Li, L ., Laxmi, V ., Tripathi, M ., Singh Gaur, M ., & Conti, M . (2017) . POSTER: Detection of Information Leaks via Reflection in Android Apps . The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017) .

59. Galetzka, M ., & Glauner, P . (2017) . A Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons . Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP .

60. Garousi, V ., & Felderer, M . (2017) . Experience-based Guidelines for Effective and Efficient Data Extraction in Systematic Reviews in Software Engineering . Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp . 170-179) . ACM .

61. Garousi, V ., & Yıldırım, E . (2017) . Introducing Automated GUI Testing and Observing its Benefits: an Industrial Case Study in the Context of Law-practice Management Software . Proceedings of ACM/IEEE Inter-national Symposium on Empirical Software Engineering and Measurement (ESEM) .

62. Garousi, V ., Afzal, W ., Çaglar, A ., Isık, I . B ., Baydan, B ., Çaylak, S ., Boyraz, A . Z ., Yolaçan, B ., & Herkiloglu, K . (2017) . Comparing Automated Visual GUI Testing Tools: an Industrial Case Study . Proceedings of International Workshop on Automated Software Testing (A-TEST) .

63. Garousi, V ., Felderer, M ., Fernandes, J ., Pfahl, D ., & Mäntylä, M . (2017) . Industry-academia Collaborations in Software Engineering: an Empirical Analysis of Challenges, Patterns and Anti-patterns in Research Projects . Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp . 224-229) . ACM .

64. Garousi, V ., Felderer, M ., Kuhrmann, M ., & Herkiloglu, K . (2017) . What Industry Wants from Academia in Software Testing? Hearing Practitioners’ Opinions . Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp . 65-69) . ACM Digital Library .

65. Gautam, S ., Lagunas, E ., Sharma, S . K ., Chatzinotas, S ., & Ottersten, B . (2017) . Relay Selection Strategies for SWIPT-En-abled Cooperative Wireless Systems . IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct . 2017 .

66. Genç, Z . A ., Kardas, S ., & Kiraz . (2017) . Examination of a New Defense Mechanism: Honeywords . Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice . Springer .

67. Genç, Z . A ., Lenzini, G ., & Ryan, P . (2017) . The Cipher, the Random and the Ransom: a Survey on Current and Future Ransomware . Advances in Cybersecurity 2017 (1st ed) . Maribor, Slovenia: University of Maribor Press .

68. Ghanavati, S ., Van Zee, M ., & Bex, F . (2017) . Argumentation-based Methodology for Goal-oriented Requirements Language (GRL) . Proceedings of the 10th International i* Workshop co-located with the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), Essen, Germany, June 12-13, 2017 .

69. Gharanjik, A ., Kmieciaky, J ., Shankar, B ., Raoy, A ., and Ottersten, B . (2017) . Coverage Exten-sion via Side-lobe Transmission in Multibeam Satellite System . In 23rd Ka and Broadband Communications Conference and the 35th AIAA International Communications Satellite Systems Conference (ICSSC), October 2017 .

70. Giustolisi, R ., Iovino, V ., & Lenzini, G . (2017) . Privacy-preserving Verifiability: a Case for an Electronic Exam Protocol . 14th Conf . on Security and Cryptography . ICEITE .

71. Glauner, P ., Dahringer, N ., Puhachov, O ., Meira, J . A ., Valtchev, P ., State, R ., & Duarte, D . (2017) . Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations . Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017) .

72. Glauner, P ., Du, M ., Paraschiv, V ., Boytsov, A ., Lopez Andrade, I ., Meira, J . A ., Valtchev, P ., & State, R . (2017) . The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study . Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017) .

18. Bezzaoucha, S ., Voos, H ., & Darouach, M . (2017) . Observer-based Event-triggered Attack-tolerant Control Design for Cyber-physical Systems . 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, November 2017 .

19. Bianculli, D ., & Krstic, S . (2017) . On the Risk of Tool Over-tuning in Runtime Verification Competitions . Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (pp . 37-40) . EasyChair .

20. Biryukov, A ., Dinu, D .-D ., & Le Corre, Y . (2017) . Side-Channel Attacks meet Secure Network Protocols . In D ., Gollmann, A ., Miyaji, & H ., Kikuchi (Eds .), Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017 . Proceedings (pp . 435-454) . Springer Verlag .

21. Blaiech, K ., Hamadi, S ., Hommes, S ., Valtchev, P ., Cherkaoui, O ., & State, R . (2017) . Rule Compilation in Multi-Tenant Networks . 2017 ACM/IEEE Symposium on Architectures for Networking and Communications (ANCS) (pp . 97-98) . Beijing, China: IEEE .

22. Bohrer, B ., Rahli, V ., Vukotic, I ., Volp, M ., & Platzer, A . (2017) . Formally Verified Differential Dynamic Logic . CPP 2017 .

23. Bouvry, P ., Chaumette, S ., Danoy, G ., Guerrini, G ., Jurquet, G ., Kuwertz, A ., Müller, W ., Rosalie, M ., Sander, J ., & Segor, F . (2017) . ASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques . DroNet’17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (pp . 17-20) . New York, NY, USA: ACM .

24. Brugali, D ., & Hochgeschwender, N . (2017) . Managing the Functional Variability of Robotic Perception Systems . Proceedings of the IEEE International Conference on Robotic Computing .

25. Brust, M ., Danoy, G ., Bouvry, P ., Gashi, D ., Pathak, H ., & Goncalves, M . P . (2017) . Defending Against Intrusion of Malicious UAVs with Networked UAV Defense Swarms . 42nd IEEE Conference on Local Computer Networks . IEEE Computer Society .

26. Brust, M ., Zurad, M ., Hentges, L . P ., Gomes, L ., Danoy, G ., & Bouvry, P . (2017) . Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering . CYBCONF 2017 . IEEE .

27. Cacciatore, G ., Fiandrino, C ., Kliazovich, D ., Granelli, F ., & Bouvry, P . (2017) . Cost analysis of Smart Lighting Solutions for Smart Cities . IEEE International Conference on Communications (ICC), Paris, France, 2017 .

28. Camino, R . D ., State, R ., Montero, L ., & Valtchev, P . (2017) . Finding Suspicious Activities in Financial Transactions and Distributed Ledgers . Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017) .

29. Campos, J ., Ge, Y ., Fraser, G ., Eler, M ., & Arcuri, A . (2017) . An Empirical Evaluation of Evolutionary Algorithms for Test Suite Generation . Symposium on Search-based Software Engineering (SSBSE) .

30. Cantelmo, G ., Viti, F ., & Derrmann, T . (2017, June 28) . Effectiveness of the Two-Step Dynamic Demand Estimation Model on Large Networks . Proceedings of 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS) .

31. Capponi, A ., Fiandrino, C ., Kliazovich, D ., Bouvry, P ., & Giordano, S . (2017) . Energy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities . 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing .

32. Casini, G ., & Meyer, T . (2017) . Belief Change in a Preferential Non-monotonic Framework . Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (pp . 929-935) . International Joint Conferences on Artificial Intelligence .

33. Castillo Lopez, M ., Olivares Mendez, M . A ., & Voos, H . (2017) . Evasive Maneuvering for UAVs: an MPC Approach . ROBOT’2017 - Third Iberian Robotics Conference, Sevilla, Spain, 2017 .

34. Chaib Draa, K ., & Voos, H . (2017) . An LMI-Based H_infty Discrete-Time Nonlinear State Observer Design for an Anaerobic Digestion Model . World Congress of the International Federation of Automatic Control, Toulouse 9-14 July 2017 .

35. Chaib Draa, K ., Voos, H ., Alma, M ., Zemouche, A ., & Darouach, M . (2017) . LMI-Based H_infty Nonlinear State Observer Design for Anaerobic Digestion Model . IEEE Mediterranean Conference on Control and Automation, Valletta 3-6 July 2017 .

36. Chaib Draa, K ., Voos, H ., Alma, M ., Zemouche, A ., & Darouach, M . (2017) . LMI-Based Discrete-Time Nonlinear State Observer for an Anaerobic Digestion Model . IEEE International Conference on Systems and Control, Batna 7-9 May 2017 .

37. Changaival, B ., & Rosalie, M . (2017) . Exploring chaotic dynamics by partition of bifurcation diagram . Proceeding of Workshop on Advance in Nonlinear Complex Systems and Applications (WANCSA) (pp . 7-8) .

38. Charlier, J . H . J ., Lagraa, S ., State, R ., & Francois, J . (2017) . Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining . Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), Skopje, Macedonia, September 18, 2017 (pp . 31-42) .

39. Cornelius, G . P ., Hochgeschwender, N ., & Voos, H . (2017) . Model-Driven Interaction Design for Social Robots . 4th International Workshop on Model-driven Robot Software Engineering, Marburg, Germany, 2017 . Springer .

40. Cornelius, G . P ., Hochgeschwender, N ., Voos, H ., Olivares Mendez, M . A ., Caire, P ., Volp, M ., & Verissimo, P . (2017) . A Perspective of Security for Mobile Service Robots . Iberian Robotics Conference, Seville, Spain, 2017 .

41. Correa Bahnsen, A ., Villegas, S ., Aouada, D ., & Ottersten, B . (2017) . Fraud Detection by Stacking Cost-sensitive Decision Trees . Data Science for Cyber-Security (DSCS), London 25-27 September .

42. Dentler, J . E ., Kannan, S ., Olivares Mendez, M . A ., & Voos, H . (2017) . Implementation and Validation of an Event-based Real-time Nonlinear Model Predictive Control Framework with ROS Interface for Single and Multi-robot Systems . 2017 IEEE Conference on Control Technology and Applications (CCTA) (pp . 1000-1006) .

43. Derrmann, T ., Frank, R ., Engel, T ., & Viti, F . (2017) . How Mobile Phone Handovers Reflect Urban Mobility: A Simulation Study . Proceedings of the 5th IEEE Conference on Models and Technologies for Intelligent Transportation Systems .

44. Derrmann, T ., Frank, R ., Viti, F ., & Engel, T . (2017, October) . Estimating Urban Road Traffic States Using Mobile Network Signaling Data . Abstract book of the 20th International Conference on Intelligent Transportation Systems .

45. Desmedt, Y ., Iovino, V ., Persiano, G ., & Visconti, I . (2017) . Controlled Homomorphic Encryption: Definition and Construction . FC 2017 International Workshops - WAHC’17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography .

f back to table of contents

Page 32: Annual Report 2017 - Université du Luxembourg

6362

Publications Publications

102. Kremer, P ., Dentler, J . E ., Kannan, S ., & Voos, H . (2017) . Cooperative Localization of Unmanned Aerial Vehicles in ROS - the Atlas Node . 2017 IEEE 15th International Conference on Industrial Informatics (INDIN) .

103. Krivochiza, J ., Kalantari, A ., Chatzinotas, S ., & Ottersten, B . (2017) . Low Complexity Symbol-level Design for Linear Precoding Systems . In R ., Heusdens & J . H ., Weber, PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (pp . 117) . Delft, Netherlands: Delft University of Technology .

104. Kubler, S ., Derigent, W ., Voisin, A ., Robert, J ., & Le Traon, Y . (2017) . Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices . IEEE International Conference on Fuzzy Systems .

105. Kuhrmann, M ., Diebold, P ., Münch, J ., Tell, P ., Garousi, V ., Felderer, M ., Trektere, K ., McCaffery, F ., Linssen, O ., Hanser, E ., & Christian, P . (2017) . Hybrid Software and System Development in Practice: Waterfall, Scrum, and Beyond . Proceedings of International Conference on Software and Systems Process (ICSSP) .

106. Lagunas, E ., Lei, L ., Maleki, S ., Chatzinotas, S ., & Ottersten, B . (2017) . Power Allocation for In-Band Full-Duplex Self-Backhauling . International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017 .

107. Lagunas, E ., Maleki, S ., Lei, L ., Tsinos, C ., Chatzinotas, S ., & Ottersten, B . (2017) . Carrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks . ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017 .

108. Lagunas, E ., & Rugini, L . (2017) . Performance of Compressive Sensing Based Energy Detection . IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, 8-13 October 2017 .

109. Laurent, T ., Papadakis, M ., Kintis, M ., Henard, C ., Le Traon, Y ., & Ventresque, A . (2017) . Assessing and Improving the Mutation Testing Practice of PIT . 10th IEEE International Conference on Software Testing, Verification and Validation .

110. Lei, L ., Lagunas, E ., Maleki, S ., He, Q ., Chatzinotas, S ., & Ottersten, B . (2017) . Energy Optimization for Full-duplex Self-backhauled HetNet with Non-orthogonal Multiple Access . International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, July 2017 .

111. Lei, L ., You, L ., Dai, G ., Vu, T . X ., Yuan, D ., & Chatzinotas, S . (2017) . A Deep Learning Approach for Optimizing Content Delivering in Cache-enabled HetNet . IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug . 2017 .

112. Lenzini, G ., Samir, O ., Roenne, P ., Ryan, P ., Geng,Y ., Noh, J ., & Lagerwall, J . (2017) . Security in the Shell: an Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals . Proc . of the 9th IEEE Workshop on Information Forensics and Security .

113. Li, D ., Bissyande, T . F . D . A ., Klein, J ., & Le Traon, Y . (2017) . Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements . The 32nd ACM Symposium on Applied Computing (SAC 2017) .

114. Li, L . (2017) . Mining AndroZoo: A Retrospect . The International Conference on Software Maintenance and Evolution (ICSME) .

115. Li, L ., Bissyande, T . F . D . A ., & Klein, J . (2017) . SimiDroid: Identifying and Explaining Similarities in Android Apps . Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) .

116. Li, L ., Dong, N ., Pang, J ., Sun, J ., Bai, G ., Liu, Y ., & Dong, J . S . (2017) . A Verification Framework for Stateful Security Protocols . Proceedings of the 19th International Conference on Formal Engineering Methods (pp . 262-280) . Springer Science & Business Media B .V .

117. Li, L ., Li, D ., Bissyande, T . F . D . A ., Klein, J ., Cai, H ., Lo, D ., & Le Traon, Y . (2017, May) . Automatically Locating Malicious Packages in Piggybacked Android Apps . Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017) .

118. Liu, B ., Lucia, L ., Nejati, S ., & Briand, L . (2017) . Improving Fault Localization for Simulink Models Using Search-based Testing and Prediction Models . 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) .

119. Liu, Z ., Järvinen, K ., Liu, W ., & Seo, H . (2017) . Multiprecision Multiplication on ARMv8 . IEEE 24th Symposium on Computer Arithmetic - ARITH24 (pp . 10-17) .

120. Liu, Z ., Kang, G ., Lei, L ., Zhang, N ., & Zhang, S . (2017) . Power Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA . IEEE Wireless Communications and Networking Conference (WCNC), 2017 (pp . 1-6) .

121. Liu, Z ., Longa, P ., Pereira, G ., Reparaz, O ., & Seo, H . (2017) . FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks . In N ., Homma & W ., Fischer (Ed .), International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (pp . 665-686) .

122. Lopez Becerra, J . M ., Iovino, V ., Ostrev, D ., & Skrobot, M . (2017) . On the Relation Between SIM and IND-RoR Security Models for PAKEs . Proceedings of the International Conference on Security and Cryptography (pp . 12) . SCITEPRESS .

123. Lopez Becerra, J . M ., Iovino, V ., Ostrev, D ., Sala, P ., & Skrobot, M . (2017) . Tightly-Secure PAK(E) . Cryptology and Network Security . Springer .

124. Manukyan, A ., Olivares Mendez, M . A ., Geist, M ., & Voos, H . (2017) . Real Time Degradation Identification of UAV Using Machine Learning Techniques . International Conference on Unmanned Aircraft Systems ICUAS . Miami, USA, 2017 . IEEE .

125. Manzo, G ., Soua, R ., Di Maio, A ., Engel, T ., Palattella, M . R ., & Rizzo, G . (2017) . Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario .

126. Matinnejad, R ., Nejati, S ., & Briand, L . (2017) . Automated Testing of Hybrid Simulink/Stateflow Controllers: Industrial Case Studies . Proceedings of 11th Joint Meeting of the European Software Engineering Conference and The ACM SIGSOFT Symposium on the Foundations Of Software Engineering (ESEC/FSE 2017) .

127. Meira, J . A ., Glauner, P ., State, R ., Valtchev, P ., Dolberg, L ., Bettinger, F ., & Duarte, D . (2017) . Distilling Provider-independent Data for General Detection of Non-technical Losses . Power and Energy Conference, Illinois 23-24 February 2017 .

128. Meng, W ., Lee, W ., Au, M . H ., & Liu, Z . (2017) . Exploring Effect of Location Number on Map-Based Graphical Password Authentication . 22nd Australasian Conference on Information Security and Privacy - ACISP2017 .

129. Meng, W ., Lee, W ., Liu, Z ., Su, C ., & Li, Y . (2017) . Evaluating the Impact of Juice Filming Charging Attack in Practical Environments . The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 .

73. Glauner, P ., Migliosi, A ., Meira, J . A ., Valtchev, P ., State, R ., & Bettinger, F . (2017) . Is Big Data Sufficient for a Reliable Detection of Non-technical Losses? Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) .

74. Goncalves Almeida Antunes, M ., Barreto, J . P ., Aouada, D ., & Ottersten, B . (2017) . Unsupervised Vanishing Point Detection and Camera Calibration from a Single Manhattan Image with Radial Distortion . IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017 .

75. Gurbani, V . K ., Kushnir, D ., Mendiratta, V . B ., Phadke, C ., Falk, E ., & State, R . (2017) . Detecting and Predicting Outages in Mobile Networks with Log Data . IEEE International Conference on Communications, ICC 2017 (pp . 1-7) .

76. Hajri, I ., Göknil, A ., & Briand, L . (2017) . A Change Management Approach in Product Lines for Use Case-driven Development and Testing . 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) .

77. Hajri, I ., Göknil, A ., Briand, L ., & Stephany, T . (2017) . Incremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions . 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (pp . 3-21) .

78. Hammes, C ., Nijsure, Y ., Shankar, B ., Schröder, U ., & Ottersten, B . (2017) . Discrimination of Angle-Doppler Signatures using Arbitrary Phase Center Motion for MIMO Radars . IEEE Radar Conf 2017 .

79. Hammes, C ., Shankar, B ., Nijsure, Y ., Spielmann, T ., & Ottersten, B . (2017) . Random Phase Center Motion Technique for Enhanced Angle-Doppler Discrimination Using MIMO Radars . European Signal Processing Conference (EUSIPCO) 2017 .

80. Hartmann, T ., Fouquet, F ., Jimenez, M ., Rouvoy, R ., & Le Traon, Y . (2017) . Analyzing Complex Data in Motion at Scale with Temporal Graphs . Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering .

81. Havrikov, N ., Gambi, A ., Zeller, A ., Arcuri, A ., & Galeotti, J . P . (2017) . Generating Unit Tests with Structured System Interactions . IEEE/ACM International Workshop on Automation of Software Test (AST) .

82. Hefnawy, A ., Elhariri, T ., Bouras, A ., Cherifi, C ., Robert, J ., Kubler, S ., & Främling, K . (2017) . Combined Use of Lifecycle Management and IoT in Smart Cities . 11th International Conference on Software, Knowledge, Information Management & Applications .

83. Hommes, S ., Valtchev, P ., Blaiech, K ., Hamadi, S ., Cherkaoui, O ., & State, R . (2017) . Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation . International Symposium on Network Computing and Applications (NCA 2017) . IEEE .

84. Hurier, M ., Suarez-Tangil, G ., Dash, S . K ., Bissyande, T . F . D . A ., Le Traon, Y ., Klein, J ., & Cavallaro, L . (2017) . Euphony: Harmonious Unification of Cacophonous Anti-virus Vendor Labels for Android Malware . MSR 2017 .

85. Huynen, J .-L ., & Lenzini, G . (2017) . From Situation Awareness to Action: an Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis . Proceedings of the 3rd International Conference on Information Systems Security and Privacy .

86. Iovino, V ., Rial Duran, A ., Roenne, P ., & Ryan, P . (2017) . Using Selene to Verify your Vote in JCJ . Workshop on Advances in Secure Electronic Voting (VOTING’17) (pp . 17) .

87. Jafarnejad, S ., Castignani, G ., & Engel, T . (2017) . Towards a Real-Time Driver Identification Mechanism Based on Driving Sensing Data . 20th International Conference on Intelligent Transportation Systems (ITSC) (pp . 7) .

88. Jan, S ., Nguyen, D . C ., Andrea, A ., & Briand, L . (2017) . A Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications . 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 .

89. Jhawar, R ., & Mauw, S . (2017) . Model-driven Situational Awareness for Moving Target De-fense . In M ., Scanlon & N .-A ., Le-Khac (Eds .), Proc . 16th European Conference on Cyber Warfare and Security (pp . 184-192) . ACPI .

90. Jordanou, J . P ., Antonelo, E . A ., Camponogara, E ., & S . de Aguiar, M . A . (2017) . Recurrent Neural Network Based Control of an Oil Well . Brazilian Symposium on Intelligent Automation, Porto Alegre 1-4 October 2017 .

91. Kalantari, A ., Fittipaldi, M ., Chatzinotas, S ., Vu, T . X ., and Ottersten, B . (2017) . Cacheassisted Hybrid Satellite-terrestrial Backhauling for 5G Cellular Networks . In GLOBECOM 2017 - 2017 IEEE Global Com-munications Conference, Dec 2017 (pp . 1-6) .

92. Kalantari, A ., Tsinos, C ., Soltanalian, M ., Chatzinotas, S ., Ma, W . K ., and Ottersten, B . (2017) . MIMO Directional Modulation M-QAM Precoding for Transceivers Performance Enhancement . In 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), July 2017 (pp . 1-5) .

93. Kalantari, A ., Tsinos, C ., Soltanalian, M ., Chatzinotas, S ., Ma, W . K ., and Ottersten, B . (2017) . Spatial Peak Power Minimization for Relaxed Phase M-PSK MIMO Directional Modulation Transmitter . In 2017 25th European Signal Processing Conference (EUSIPCO), Aug 2017 (pp . 2011-2015) .

94. Kannan, S ., Bezzaoucha, S ., Quintanar Guzman, S ., Dentler, J . E ., Olivares Mendez, M . A ., & Voos, H . (2017) . Hierarchical Control of Aerial Manipulation Vehicle . AIP Conference Proceedings, 1798(1), 020069 . AIP Publishing .

95. Kannan, S ., Sajadi Alamdari, S . A ., Dentler, J . E ., Olivares Mendez, M . A ., & Voos, H . (2017) . Model Predictive Control for Cooperative Control of Space Robots . AIP Conference Proceedings 1798 . AIP Publishing .

96. Kayhan, F . (2017) . On low complexity detection for QAM isomorphic constellations . IEEE GLOBECOM 2017 .

97. Kieffer, E ., Danoy, G ., Bouvry, P ., & Nagih, A . (2017) . Bayesian Optimization Approach of General Bi-level Problems . Proceedings of the Genetic and Evolutionary Computation Conference Companion (pp . 1614-1621) . New York, USA: ACM .

98. Kieffer, E ., Danoy, G ., Bouvry, P ., & Nagih, A . (2017) . A New Co-evolutionary Algorithm Based on Constraint Decomposition . IPDPS . IEEE Computer Society .

99. Kolbe, N ., Kubler, S ., Robert, J ., Le Traon, Y ., & Zaslavsky, A . (2017) . Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services . 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings .

100. Kolbe, N ., Robert, J ., Kubler, S ., & Le Traon, Y . (2017, November 07) . PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem . Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services .

101. Kolbe, N ., Zaslavsky, A ., Kubler, S ., Robert, J ., & Le Traon, Y . (2017) . Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components . Modeling and Using Context .

f back to table of contents

Page 33: Annual Report 2017 - Université du Luxembourg

6564

Publications Publications

158. Rocchetto, M . (2017) . Towards Formal Security Analysis of Industrial Control Systems . Asia Conference on Computer and Communications Security (AsiaCCS) .

159. Rosalie, M ., Brust, M ., Danoy, G ., Chaumette, S ., & Bouvry, P . (2017) . Coverage Optimization with Connectivity Preservation for UAV Swarms Applying Chaotic Dynamics . IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (pp . 113-118) .

160. Rosalie, M ., Danoy, G ., Chaumette, S ., & Bouvry, P . (2017) . Impact du mécanisme chaotique sur l’optimisation d’un modèle de mobilité pour un essaim de drones devant réaliser une couverture de zone . In E ., Falcon, M ., Lefranc, F ., Pétrélis, & C .-T ., Pham (Eds .), Comptes-rendus de la 20e Rencontre du Non Linéaire (pp . 79-84) . Saint Etienne du Rouvray, France: Non-Linéaire Publications .

161. Rosalie, M ., Dentler, J . E ., Danoy, G ., Bouvry, P ., Kannan, S ., Olivares Mendez, M . A ., & Voos, H . (2017) . Area Exploration with a Swarm of UAVs Combining Deterministic Chaotic Ant Colony Mobility with Position MPC . 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (pp . 1392-1397) .

162. Saint, A . F . A ., Shabayek, A . E . R ., Aouada, D ., Ottersten, B ., Cherenkova, K ., & Gusev, G . (2017) . Towards Automatic Human Body Model Fitting to a 3D Scan . In N ., D’Apuzzo (Ed .), Proceedings of 3DBODY .TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct . 2017 (pp . 274-280) . Ascona, Switzerland: Hometrica Consulting .

163. Sajadi Alamdari, S . A ., Voos, H ., & Darouach, M . (2017) . Deadzone-Quadratic Penalty Function for Predictive Extended Cruise Control with Experimental Validation . ROBOT 2017: Third Iberian Robotics Conference, Sevilla, Spain 22-24 November 2017 .

164. Sajadi Alamdari, S . A ., Voos, H ., & Darouach, M . (2017) . Fast Stochastic Non-linear Model Predictive Control for Electric Vehicle Advanced Driver Assistance Systems . 13th IEEE International Conference on Vehicular Electronics and Safety, Vienna, Austria 27-28 June 2017 (pp . 91-96) .

165. Sajadi Alamdari, S . A ., Voos, H ., & Darouach, M . (2017) . Risk-averse Stochastic Nonlinear Model Predictive Control for Real-time Safety-critical Systems . The 20th World Congress of the International Federation of Automatic Control, IFAC 2017 World Congress, Toulouse, France, 9-14 July 2017 .

166. Sannier, N ., Adedjouma, M ., Sabetzadeh, M ., & Briand, L . (2017) . Legal Markup Generation in the Large: an Experience Report . the 25th International Requirements Engineering Con-ference (RE’17), Lisbon, 4-8 September 2017 .

167. Sannier, N ., Sabetzadeh, M ., & Briand, L . (2017) . From RELAW Research to Practice: Reflections on an Ongoing Technology Transfer Project . the IEEE 25th International Requirements Engineering Conference, Lisbon, Portugal, 4-8 September 2017 (pp . 204-208) .

168. Seo, H ., Liu, Z ., Park, T ., Kwon, H ., Lee, S ., & Kim, H . (2017) . Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors . The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 .

169. Shabayek, A . E . R ., Aouada, D ., Saint, A . F . A ., & Ottersten, B . (2017) . Deformation Transfer of 3D Human Shapes and Poses on Manifolds . IEEE International Conference on Image Processing, Beijing 17-20 September 2017 .

170. Shamir, A ., Biryukov, A ., & Perrin, L . P . (2017) . Summary of an Open Discussion on IoT and Lightweight Cryptography . Proceedings of Early Symmetric Crypto Workshop, 2017 . Luxembourg: University of Luxembourg .

171. Shin, S . Y . (2017) . Specification and Analysis of Resource Utilization Policies for Human-intensive Systems (Extended Abstract) . Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017) . CEUR-WS .org .

172. Soltana, G ., Sabetzadeh, M ., & Briand, L . (2017) . Synthetic Data Generation for Statistical Testing . 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017) (pp . 10) .

173. Soltani, M ., Panichella, A ., & van Deursen, A . (2017) . A Guided Genetic Algorithm for Automated Crash Reproduction . Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) . ACM .

174. Spano, D ., Alodeh, M ., Chatzinotas, S ., Krause, J ., & Ottersten, B . (2017) . Spatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink . IEEE SPAWC 2017 .

175. Tervo, O ., Pennanen, H ., Chatzinotas, S ., Ottersten, B ., and Juntti, M . (2017) . Multi-cell Interference Coordination for Multigroup Multicast Transmission . In 2017 European Conference on Networks and Communications (EuCNC), June 2017 (1-5) .

176. Tervo, O ., Tran, L . N ., Chatzinotas, S ., Juntti, M ., and Ottersten, B . (2017) . Energy-efficient Joint Unicast and Multicast Beamforming with Multi-antenna User Terminals . In 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), July 2017 (pp . 1-5) .

177. Tervo, O ., Tran, L . N ., Pennanen, H ., Chatzinotas, S ., Juntti, M ., and Ottersten, B . (2017) . Energy-efficient Coordinated Multi-cell Multi-group Multicast Beamforming with Antenna Selection . In 2017 IEEE International Conference on Communications Workshops (ICC Workshops), May 2017 (pp . 1209-1214) .

178. Thome, J ., Shar, L . K ., Bianculli, D ., & Briand, L . (2017) . JoanAudit: A Tool for Auditing Common Injection Vulnerabilities . 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering . ACM .

179. Thome, J ., Shar, L . K ., Bianculli, D ., & Briand, L . (2017) . Search-driven String Constraint Solving for Vulnerability Detection . Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) . ACM .

180. Titcheu Chekam, T ., Papadakis, M ., Le Traon, Y ., & Harman, M . (2017) . An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption . International Conference on Software Engineering (ICSE 2017) .

181. Tsinos, C . G ., Maleki, S ., Chatzinotas, S ., and Ottersten, B . (2017) . On the Energy-efficiency of Hybrid Analog-digital Transceivers for Large Antenna Array Systems . In 2017 IEEE International Conference on Communications (ICC), May 2017 (pp . 1-7) .

182. van der Elst, L ., Quintanar Guzman, S ., & Hadji-Minaglou, J .-R . (2017) . Design of an Electromechanical Prosthetic Finger using Shape Memory Alloy Wires . IEEE 5th International Symposium on Robotics and Intelligent Sensors, Ottawa, Canada, 5-7 October 2017 .

183. van der Torre, L ., & Van Zee, M . (2017) . Rational Enterprise Architecture . Advances in Artificial Intelligence: From Theory to Practice - 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, Arras, France, June 27-30, 2017, Proceedings, Part I .

184. Verwer, S . E ., & Hammerschmidt, C . (2017) . flexfringe: A Passive Automaton Learning Package . Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on .

130. Mengali, A ., Lyras, N . K ., Shankar, B ., Kourogiorgas, C . I ., Panagopoulos, A . D ., & Liolis, K . (2017) . Optical Feeder Links Study towards Future Generation MEO VHTS Systems . Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC) .

131. Merlano Duncan, J . C ., Krivochiza, J ., Andrenacci, S ., Chatzinotas, S ., Ottersten, B ., & Kri . (2017, October) . Computationally Efficient Symbol-level Precoding Communications Demonstrator . IEEE International Symposium on Personal, Indoor and Mobile Radio Communications .

132. Merlano-Duncan, J . C ., Sharma, S . K ., Chatzinotas, S ., Ottersten, B ., and Wang, X . (2017) . Multiantenna Based One-bit Spatio-temporal Wideband Sensing for Cognitive Radio Networks . In 2017 IEEE International Conference on Communications (ICC), May 2017 (pp . 1-7) .

133. Milner, K ., Cremers, C ., Yu, J ., & Ryan, M . (2017) . Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications . 30th IEEE Computer Security Foundations Symposium .

134. Mizera, A ., Pang, J ., Qu, H ., & Yuan, Q . (2017) . A New Decomposition Method for Attractor Detection in Large Synchronous Boolean Networks . Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (pp . 232-249) . Springer Science & Business Media B .V .

135. Molina, M ., Frau, P ., Maraval, D ., Sanchez Lopez, J . L ., Bavle, H ., & Campoy, P . (2017) . Human-Robot Cooperation in Surface Inspection Aerial Missions . 2017 International Micro Air Vehicle Conference and Flight Competition (IMAV), Toulouse, France, 18-21 Septembre 2017 .

136. Mouline, L ., Hartmann, T ., Fouquet, F ., Le Traon, Y ., Bourcier, J ., & Barais, O . (2017) . Weaving Rules into Models@run .time for Embedded Smart Systems . Second International Modularity in Modelling Workshop . Brussels, Belgium: ACM .

137. Nanda, R ., Di Caro, L ., Boella, G ., Konstantinov, H ., Tyankov, T ., Traykov, D ., Hristov, H ., Costamagna, F ., Humphreys, L ., Robaldo, L ., & Romano, M . (2017) . A Unifying Similarity Measure for Automated Identification of National Implementations of European Union Directives . The 16th International Conference on Artificial Intelligence and Law .

138. Oyedotun, O ., Demisse, G ., Shabayek, A . E . R ., Aouada, D ., & Ottersten, B . (2017) . Facial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent Representations . 2017 IEEE International Conference on Computer Vision Workshop (ICCVW) .

139. Oyedotun, O ., Shabayek, A . E . R ., Aouada, D ., & Ottersten, B . (2017) . Training Very Deep Networks via Residual Learning with Stochastic Input Shortcut Connections . 24th International Conference on Neural Information Processing, Guangzhou, China, November 14–18, 2017 .

140. Özkan, R ., Garousi, V ., & Betin-Can, A . (2017) . Multi-objective Regression Test Selection in Practice: an Empirical Study in the Defense Software Industry . Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) .

141. Palomba, F ., Di Nucci, D ., Panichella, A ., Zaidman, A ., & De Lucia, A . (2017) . Lightweight Detection of Android-specific Code Smells: the aDoctor Project . Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) . IEEE .

142. Pang, J ., & Zhang, Y . (2017) . DeepCity: a Feature Learning Framework for Mining Location Check-ins . Proceedings of the 11th International Conference on Web and Social Media (ICWSM’17) (pp . 652-655) . AAAI .

143. Pang, J ., & Zhang, Y . (2017) . Quantifying Location Sociality . Proc . 28th ACM Conference on Hypertext and Social Media - HT’17 (pp . 145-154) . ACM Press .

144. Panichella, A ., & Urko, R . (2017) . Java Unit Testing Tool Competition – Fifth Round . 10th International Workshop on Search-based Software Testing (SBST) 2017 . IEEE .

145. Panichella, A ., Kifetew, F ., & Tonella, P . (2017) . LIPS vs MOSA: a Replicated Empirical Study on Automated Test Case Generation . International Symposium on Search Based Software Engineering (SSBSE) 2017 . Springer .

146. Papadopoulos, K ., Goncalves Almeida Antunes, M ., Aouada, D ., & Ottersten, B . (2017) . Enhanced Trajectory-based Action Recognition using Human Pose . IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017 .

147. Pejo, B ., & Tang, Q . (2017) . To Cheat or Not to Cheat - a Game-theoretic Analysis of Outsourced Computation Verification . Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 . New York, United States of America: ACM .

148. Politis, C ., Maleki, S ., Tsinos, C ., Chatzinotas, S ., & Ottersten, B . (2017) . Weak Interference Detection with Signal Cancellation in Satellite Communications . The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017 .

149. Popleteev, A . (2017) . AmbiLoc: A Year-long Dataset of FM, TV and GSM Fingerprints for Ambient Indoor Localization . 8th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2017) .

150. Popleteev, A . (2017) . Indoor Localization Using Ambient FM Radio RSS fingerprinting: A 9-month Study . 17th IEEE International Conference on Computer and Information Technology (CIT-2017) .

151. Popleteev, A . (2017) . Please Stand By: TV-based Indoor Localization . 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-2017) .

152. Popleteev, A . (2017) . Wi-Fi Butterfly Effect in Indoor Localization: the Impact of Imprecise Ground Truth and Small-scale Fading . 14th IEEE Workshop on Positioning, Navigation and Communications (WPNC-2017) .

153. Quintanar Guzman, S ., Kannan, S ., Voos, H ., Darouach, M ., & Alma, M . (2017) . Observer Design for Lightweight Robotic Arm Actuated by Shape Memory Alloy (SMA) Wire . 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, 16-17 November 2017 .

154. Rahli, V ., Bickford, M ., & Constable, R . (2017) . Bar Induction: the Good, the Bad, and the Ugly . Abstract book of LICS 2017: 32nd Annual ACM/IEEE Symposium on Logic in Computer Science .

155. Raulamo-Jurvanen, P ., Mäntylä, M ., & Garousi, V . (2017) . Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources . Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE 2017) (pp . 21-30) . ACM .

156. Riestock, M ., Engelhard, F ., Zug, S ., & Hoch- geschwender, N . (2017) . Exploring Gridmap- based Interfaces for the Remote Control of UAVs under Bandwidth Limitations . Com-panion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction .

157. Riestock, M ., Engelhard, F ., Zug, S ., & Hochgeschwender, N . (2017) . User Study on Remotely Controlled UAVs with Focus on Interfaces and Data Link Quality . IEEE/RAS International Conference on Intelligent Robots and Systems .

f back to table of contents

Page 34: Annual Report 2017 - Université du Luxembourg

66

Publications

185. Volp, M ., Rocha, F ., Decouchant, J ., Yu, J ., & Verissimo, P . (2017) . Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come . Twenty-fifth International Workshop on Security Protocols .

186. Vu, T . X ., Chatzinotas, S ., & Ottersten, B . (2017) . Coded Caching and Storage Planning in Heterogeneous Networks . 2017 IEEE Wireless Communications and Networking Conference (WCNC) .

187. Vu, T . X ., Chatzinotas, S ., & Ottersten, B . (2017, July) . Energy-efficient Design for Edge-caching Wireless Networks: When is Coded-caching beneficial? Abstract book of IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) .

188. Vu, T . X ., Chatzinotas, S ., & Ottersten, B . (2017, May) . On the Diversity of Partial Relaying Cooperation with Relay Selection in Finite-SNR Regime . IEEE International Conference on Communications .

189. Vu, T . X ., Trinh, A . V ., Chatzinotas, S ., & Ottersten, B . (2017, May) . Spectral-efficient Model for Multiuser Massive MIMO: Exploiting User Velocity . IEEE international Conference on Communications .

190. Vuppala, S ., Chatzinotas, S ., & Ottersten, B . (2017) . Secrecy Analysis of Random Wireless Networks with Multiple Eavesdroppers . Proceeding of IEEE Inter . Symp . on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada .

191. Wang, C ., Pastore, F ., & Briand, L . (2017) . System Testing of Timing Requirements based on Use Cases and Timed Automata . 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 .

192. Wang, J ., & Tang, Q . (2017) . Differentially Private Neighborhood-based Recommender Systems . IFIP Information Security & Privacy Conference (pp . 14) . Springer .

193. Wang, J ., Sun, J ., Yuan, Q ., & Pang, J . (2017) . Should We Learn Probabilistic Models for Model Checking? A New Approach and an Empirical Study . Proceedings of 20th Interna- tional Conference on Fundamental Approaches to Software Engineering (pp . 3-21) . Springer .

194. Wang, Y ., Qin, Z ., Pang, J ., Zhang, Y ., & Jin, X . (2017) . Semantic Annotation for Places in LBSN through Graph Embedding . Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM’17 (pp . 2343-2346) . ACM Press .

195. Wasim, M . U ., Ibrahim, A . A . Z . A ., Bouvry, P ., & Limba, T . (2017) . Law as a Service (LaaS): Enabling Legal Protection over a Blockchain Network . 14th International Conference on Smart Cities: Improving Quality of Life using ICT & IoT (HONET-ICT 17), October 09-11, Irbid Jordan .

196. Wasim, M . U ., Ibrahim, A . A . Z . A ., Bouvry, P ., & Limba, T . (2017) . Self-regulated Multi-criteria Decision Analysis: an Autonomous Brokerage-based Approach for Service Provider Ranking in the Cloud . 9th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2017), December 11-14, Hong Kong China .

197. Xinwei, G ., Li, L ., Jintai, D ., Jiqiang, L ., Rv, S ., & Liu, Z . (2017) . Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite . The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 .

198. You, L ., Lei, L ., Yuan, D ., Sun, S ., Chatzinotas, S ., & Ottersten, B . (2017) . A Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource . 2017 IEEE Global Communications Conference (GLOBECOM) .

199. Yu, J ., Ryan, M ., & Chen, L . (2017) . Authenticating Compromisable Storage Systems . The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications .

200. Zhang, Y ., Ni, M ., Han, W ., & Pang, J . (2017) . Does #like4like Indeed Provoke More Likes? Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI’17) (pp . 179-186) . ACM .

201. Zhu, Q ., Panichella, A ., & Zaidman, A . (2017) . Speeding-up Mutation Testing via Data Compression and State Infection . IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2017 (pp . 103-109) . IEEE .

202. Zuo, C ., Shao, J ., Liu, Z ., Ling, Y ., & Wei, G . (2017) . Hidden-Token Searchable Public-Key Encryption . The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17 .

University of Luxembourg • Interdisciplinary Centre for Security, Reliability and Trust

29, Avenue J .F Kennedy • L-1855 Luxembourg • Tel . +352 /46 66 44 -5721 • snt@uni .lu

Published by the Interdisciplinary Centre for Security, Reliability and Trust (SnT) in collaboration with scienceRELATIONSPhotos: scienceRELATIONS, Kary Barthelmey, SnT, Merkur journal of Chamber of CommerceCover: Laura LeyesLayout: www .spezial-kommunikation .de

In 2017 Dr . Pouyan Ziafati, CEO and co-founder of SnT social robotics spin-off LuxAI, became the first joint-recipient of the FNR’s Outstanding Research-Driven Innovation award . (Left to right: Dr . Pouyan Ziafati, QTrobot and Dr . Aida Nazarikhorram, LuxAI co-founder) . Photo © Merkur journal of Chamber of Commerce

f back to table of contents