Skip to main content

Showing 1–21 of 21 results for author: Dan, G

.
  1. arXiv:2407.02161  [pdf, other

    eess.SY

    A Tax-Subsidy Scheme for Efficient Investment in Renewable Generation Capacity

    Authors: Mohammad Reza Karimi Gharigh, Lamia Varawala, Mohammad Reza Hesamzadeh, György Dán

    Abstract: The impact of energy production significantly affects system sustainability, which has enabled a shift towards renewable energy sources. Thus, producer behavior is crucial in electricity markets to achieve sustainability goals. In this paper, we address two key challenges comprising electricity markets and generation investment. Firstly, electricity markets typically are operated with competitive… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  2. arXiv:2401.11419  [pdf, other

    cs.NI eess.SP

    Joint UAV Deployment and Resource Allocation in THz-Assisted MEC-Enabled Integrated Space-Air-Ground Networks

    Authors: Yan Kyaw Tun, György Dán, Yu Min Park, Choong Seon Hong

    Abstract: Multi-access edge computing (MEC)-enabled integrated space-air-ground (SAG) networks have drawn much attention recently, as they can provide communication and computing services to wireless devices in areas that lack terrestrial base stations (TBSs). Leveraging the ample bandwidth in the terahertz (THz) spectrum, in this paper, we propose MEC-enabled integrated SAG networks with collaboration amon… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

    Comments: 36 pages, 8 figures

  3. arXiv:2311.14982  [pdf, other

    cs.NI

    Active Queue Management with Data-Driven Delay Violation Probability Predictors

    Authors: Samie Mostafavi, Neelabhro Roy, György Dán, James Gross

    Abstract: The increasing demand for latency-sensitive applications has necessitated the development of sophisticated algorithms that efficiently manage packets with end-to-end delay targets traversing the networked infrastructure. Network components must consider minimizing the packets' end-to-end delay violation probabilities (DVP) as a guiding principle throughout the transmission path to ensure timely de… ▽ More

    Submitted 25 November, 2023; originally announced November 2023.

  4. arXiv:2308.06557  [pdf

    physics.med-ph eess.IV

    Three-dimensional echo-shifted EPI with simultaneous blip-up and blip-down acquisitions for correcting geometric distortion

    Authors: Kaibao Sun, Zhifeng Chen, Guangyu Dan, Qingfei Luo, Lirong Yan, Feng Liu, Xiaohong Joe Zhou

    Abstract: Purpose: Echo-planar imaging (EPI) with blip-up/down acquisition (BUDA) can provide high-quality images with minimal distortions by using two readout trains with opposing phase-encoding gradients. Because of the need for two separate acquisitions, BUDA doubles the scan time and degrades the temporal resolution when compared to single-shot EPI, presenting a major challenge for many applications, pa… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

    Comments: 8 figures, peer-reviewed journal paper

  5. arXiv:2211.04157  [pdf, other

    cs.LG cs.AI cs.CR

    Inferring Class Label Distribution of Training Data from Classifiers: An Accuracy-Augmented Meta-Classifier Attack

    Authors: Raksha Ramakrishna, György Dán

    Abstract: Property inference attacks against machine learning (ML) models aim to infer properties of the training data that are unrelated to the primary task of the model, and have so far been formulated as binary decision problems, i.e., whether or not the training data have a certain property. However, in industrial and healthcare applications, the proportion of labels in the training data is quite often… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

    Comments: 12 pages, 2022 Trustworthy and Socially Responsible Machine Learning (TSRML 2022) co-located with NeurIPS 2022

  6. arXiv:2204.00209  [pdf, other

    eess.SY cs.GT

    Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs

    Authors: Hampei Sasahara, György Dán, Saurabh Amin, Henrik Sandberg

    Abstract: This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each player faces the cost of delayed delivery (due to charging requirements of EVs) and a pollution cost levied on the ICEVs. This cost structure models: 1) limited battery capacity of EVs and their cha… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 8 pages

  7. Industrial Edge-based Cyber-Physical Systems -- Application Needs and Concerns for Realization

    Authors: Martin Törngren, Haydn Thompson, Erik Herzog, Rafia Inam, James Gross, György Dán

    Abstract: Industry is moving towards advanced Cyber-Physical Systems (CPS), with trends in smartness, automation, connectivity and collaboration. We examine the drivers and requirements for the use of edge computing in critical industrial applications. Our purpose is to provide a better understanding of industrial needs and to initiate a discussion on what role edge computing could take, complementing curre… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: 7 pages, 1 figure

  8. arXiv:2111.06682  [pdf, ps, other

    eess.SY math.OC

    A Bayesian Nash equilibrium-based moving target defense against stealthy sensor attacks

    Authors: David Umsonst, Serkan Sarıtaş, György Dán, Henrik Sandberg

    Abstract: We present a moving target defense strategy to reduce the impact of stealthy sensor attacks on feedback systems. The defender periodically and randomly switches between thresholds from a discrete set to increase the uncertainty for the attacker and make stealthy attacks detectable. However, the defender does not know the exact goal of the attacker but only the prior of the possible attacker goals.… ▽ More

    Submitted 31 May, 2022; v1 submitted 12 November, 2021; originally announced November 2021.

    Comments: 16 pages, 4 figures, 4 tables

  9. arXiv:2105.02045  [pdf, other

    cs.CV cs.AI

    Bayesian Logistic Shape Model Inference: application to cochlea image segmentation

    Authors: Wang Zihao, Demarcy Thomas, Vandersteen Clair, Gnansia Dan, Raffaelli Charles, Guevara Nicolas, Delingette Hervé

    Abstract: Incorporating shape information is essential for the delineation of many organs and anatomical structures in medical images. While previous work has mainly focused on parametric spatial transformations applied on reference template shapes, in this paper, we address the Bayesian inference of parametric shape models for segmenting medical images with the objective to provide interpretable results. T… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

  10. arXiv:2104.12510  [pdf, other

    cs.CV

    Inner-ear Augmented Metal Artifact Reduction with Simulation-based 3D Generative Adversarial Networks

    Authors: Wang Zihao, Vandersteen Clair, Demarcy Thomas, Gnansia Dan, Raffaelli Charles, Guevara Nicolas, Delingette Herve

    Abstract: Metal Artifacts creates often difficulties for a high quality visual assessment of post-operative imaging in {c}omputed {t}omography (CT). A vast body of methods have been proposed to tackle this issue, but {these} methods were designed for regular CT scans and their performance is usually insufficient when imaging tiny implants. In the context of post-operative high-resolution {CT} imaging, we pr… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

  11. arXiv:2104.08111  [pdf, other

    cs.NI eess.SP

    NeuroRAN: Rethinking Virtualization for AI-native Radio Access Networks in 6G

    Authors: Paris Carbone, Gyoergy Dan, James Gross, Bo Goeransson, Marina Petrova

    Abstract: Network softwarization has revolutionized the architecture of cellular wireless networks. State-of-the-art container based virtual radio access networks (vRAN) provide enormous flexibility and reduced life cycle management costs, but they also come with prohibitive energy consumption. We argue that for future AI-native wireless networks to be flexible and energy efficient, there is a need for a ne… ▽ More

    Submitted 16 April, 2021; originally announced April 2021.

  12. A Pricing Mechanism to Jointly Mitigate Market Power and Environmental Externalities in Electricity Markets

    Authors: Lamia Varawala, Mohammad Reza Hesamzadeh, György Dán, Derek Bunn, Juan Rosellón

    Abstract: The electricity industry has been one of the first to face technological changes motivated by sustainability concerns. Whilst efficiency aspects of market design have tended to focus upon market power concerns, the new policy challenges emphasise sustainability. We argue that market designs need to develop remedies for market conduct integrated with regard to environmental externalities. According… ▽ More

    Submitted 5 April, 2023; v1 submitted 1 April, 2021; originally announced April 2021.

    Comments: The article is to be published in Energy Economics. The article has been updated to the final version as would be published by the journal

  13. arXiv:2009.02877  [pdf, other

    eess.SY

    A Game Theoretic Analysis of LQG Control under Adversarial Attack

    Authors: Zuxing Li, György Dán, Dong Liu

    Abstract: Motivated by recent works addressing adversarial attacks on deep reinforcement learning, a deception attack on linear quadratic Gaussian control is studied in this paper. In the considered attack model, the adversary can manipulate the observation of the agent subject to a mutual information constraint. The adversarial problem is formulated as a novel dynamic cheap talk game to capture the strateg… ▽ More

    Submitted 10 September, 2020; v1 submitted 6 September, 2020; originally announced September 2020.

    Comments: full version of paper accepted in IEEE Conference on Decision and Control 2020

  14. arXiv:2001.07964  [pdf, other

    cs.NI eess.SP

    Joint Wireless and Edge Computing Resource Management with Dynamic Network Slice Selection

    Authors: Slađana Jošilo, György Dán

    Abstract: Network slicing is a promising approach for enabling low latency computation offloading in edge computing systems. In this paper, we consider an edge computing system under network slicing in which the wireless devices generate latency sensitive computational tasks. We address the problem of joint dynamic assignment of computational tasks to slices, management of radio resources across slices and… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: 12 pages, 7 figures

  15. arXiv:1705.08252  [pdf, ps, other

    cs.CV

    Distributed Algorithms for Feature Extraction Off-loading in Multi-Camera Visual Sensor Networks

    Authors: Emil Eriksson, György Dán, Viktoria Fodor

    Abstract: Real-time visual analysis tasks, like tracking and recognition, require swift execution of computationally intensive algorithms. Visual sensor networks can be enabled to perform such tasks by augmenting the sensor network with processing nodes and distributing the computational burden in a way that the cameras contend for the processing nodes while trying to minimize their task completion times. I… ▽ More

    Submitted 15 May, 2017; originally announced May 2017.

    Comments: 12 pages, 7 figures, submitted to Transactions on Circuits and Systems for Video Technology

  16. arXiv:1704.02790  [pdf, other

    cs.MM cs.NI cs.PF

    Performance Analysis of Reliable Video Streaming with Strict Playout Deadline in Multi-Hop Wireless Networks

    Authors: Hussein Al-Zubaidy, Viktoria Fodor, György Dán, Markus Flierl

    Abstract: Motivated by emerging vision-based intelligent services, we consider the problem of rate adaptation for high quality and low delay visual information delivery over wireless networks using scalable video coding. Rate adaptation in this setting is inherently challenging due to the interplay between the variability of the wireless channels, the queuing at the network nodes and the frame-based decodin… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: 33 single column pages, 10 figures

  17. arXiv:1604.05460  [pdf, other

    cs.NI

    Selfish Computation Offloading for Mobile Cloud Computing in Dense Wireless Networks

    Authors: Slađana Jošilo, György Dán

    Abstract: Offloading computation to a mobile cloud is a promising solution to augment the computation capabilities of mobile devices. In this paper we consider selfish mobile devices in a dense wireless network, in which individual mobile devices can offload computations via multiple access points (APs) to a mobile cloud so as to minimize their computation costs, and we provide a game theoretical analysis o… ▽ More

    Submitted 19 April, 2016; originally announced April 2016.

    Comments: 10 pages, 6 figures

  18. arXiv:1603.09490  [pdf, ps, other

    cs.NI

    Stochastic Dynamic Cache Partitioning for Encrypted Content Delivery

    Authors: Andrea Araldo, Gyorgy Dan, Dario Rossi

    Abstract: In-network caching is an appealing solution to cope with the increasing bandwidth demand of video, audio and data transfer over the Internet. Nonetheless, an increasing share of content delivery services adopt encryption through HTTPS, which is not compatible with traditional ISP-managed approaches like transparent and proxy caching. This raises the need for solutions involving both Internet Servi… ▽ More

    Submitted 27 June, 2016; v1 submitted 31 March, 2016; originally announced March 2016.

    ACM Class: C.2.1; C.2.3

  19. Differentially Private State Estimation in Distribution Networks with Smart Meters

    Authors: Henrik Sandberg, György Dán, Ragnar Thobaben

    Abstract: State estimation is routinely being performed in high-voltage power transmission grids in order to assist in operation and to detect faulty equipment. In low- and medium-voltage power distribution grids, on the other hand, few real-time measurements are traditionally available, and operation is often conducted based on predicted and historical data. Today, in many parts of the world, smart meters… ▽ More

    Submitted 29 March, 2015; originally announced March 2015.

  20. arXiv:1011.1828  [pdf, other

    math.OC cs.NI physics.soc-ph

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    Authors: André Teixeira, György Dán, Henrik Sandberg, Karl H. Johansson

    Abstract: The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication chan… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Comments: Modified version submitted to the 18th IFAC World Congress, 2011. The paper has 11 pages and 4 figures

  21. arXiv:0802.0537  [pdf, ps, other

    astro-ph

    Support Vector Machines and Kd-tree for Separating Quasars from Large Survey Databases

    Authors: Gao Dan, Zhang Yanxia, Zhao Yongheng

    Abstract: We compare the performance of two automated classification algorithms: k-dimensional tree (kd-tree) and support vector machines (SVMs), to separate quasars from stars in the databases of the Sloan Digital Sky Survey (SDSS) and the Two Micron All Sky Survey (2MASS) catalogs. The two algorithms are trained on subsets of SDSS and 2MASS objects whose nature is known via spectroscopy. We choose diffe… ▽ More

    Submitted 4 February, 2008; originally announced February 2008.

    Comments: 11 pages, 4 figures, 8 tables. accepted for publication in MNRAS