Stefan Roth

ORCID: 0000-0003-4408-3306
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Energy Harvesting in Wireless Networks
  • Security in Wireless Sensor Networks
  • Advanced Wireless Communication Technologies
  • Metaheuristic Optimization Algorithms Research
  • Evolutionary Algorithms and Applications
  • Age of Information Optimization
  • Indoor and Outdoor Localization Technologies
  • Smart Grid Security and Resilience
  • Wireless Body Area Networks
  • IoT Networks and Protocols
  • Neural Networks and Applications
  • Adversarial Robustness in Machine Learning
  • Distributed Sensor Networks and Detection Algorithms
  • Advanced Wireless Network Optimization
  • Antenna Design and Analysis
  • Advanced Multi-Objective Optimization Algorithms
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cooperative Communication and Network Coding
  • Antenna Design and Optimization
  • Wireless Signal Modulation Classification
  • Biometric Identification and Security
  • Software-Defined Networks and 5G
  • UAV Applications and Optimization

Ruhr University Bochum
2006-2025

Graz University of Technology
2017

Munich Cluster for Systems Neurology
2014

Linköping University
2010

Georgia Institute of Technology
1985-1988

Georgia Tech Research Institute
1985-1988

The covariancematrix adaptation evolution strategy (CMA-ES) is one of themost powerful evolutionary algorithms for real-valued single-objective optimization. In this paper, we develop a variant the CMA-ES multi-objective optimization (MOO). We first introduce single-objective, elitist using plus-selection and step size control based on success rule. This algorithm compared to standard CMA-ES. turns out be slightly faster unimodal functions, but more prone getting stuck in sub-optimal local...

10.1162/evco.2007.15.1.1 article EN Evolutionary Computation 2007-03-01

10.1109/tvt.2025.3530497 article EN IEEE Transactions on Vehicular Technology 2025-01-01

Wireless radio channels are known to contain information about the surrounding propagation environment, which can be extracted using established wireless sensing methods. Thus, today's ubiquitous devices attractive targets for passive eavesdroppers launch reconnaissance attacks. In particular, by overhearing standard communication signals, obtain estimations of give away sensitive indoor environments. For instance, applying simple statistical methods, adversaries infer human motion from...

10.1109/sp46214.2022.9833676 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

The future sixth generation (6G) of communication systems is envisioned to provide numerous applications in safety-critical contexts, e.g., driverless traffic, modular industry, and smart cities, which require outstanding performance, high reliability fault tolerance, as well autonomy. Ensuring criticality awareness for diverse functional safety providing tolerance an autonomous manner are essential 6G systems. Therefore, this paper proposes jointly employing the concepts resilience mixed...

10.1109/tvt.2023.3296977 article EN IEEE Transactions on Vehicular Technology 2023-07-19

Stroke is the third most common cause of death and a main acquired adult disability in developed countries. Only very limited therapeutical options are available for small proportion stroke patients acute phase. Current research intensively searching novel therapeutic strategies increasingly focusing on sub-acute chronic phase after because more might be eligible interventions prolonged time window. These delayed mechanisms include important pathophysiological pathways such as post-stroke...

10.3791/51729-v article EN Journal of Visualized Experiments 2014-07-31

In cyber-physical systems, as in 5G and beyond, multiple physical processes require timely online monitoring at a remote device. There, the received information is used to estimate current future process values. When transmitting data over communication channel, source-channel coding order reduce errors. During transmission, high resolution helpful capture value of variables precisely. However, this typically comes with long transmission delays reducing utilizability data, since estimation...

10.1109/icc40277.2020.9149010 article EN 2020-06-01

The fifth generation (5G) of cellular networks improves the precision user localization and provides means to disclose location information over-the-top (OTT) service providers. network data analytics function (NWDAF) can further elaborate this at an aggregated level using artificial intelligence techniques. These powerful features may lead improper use by mobile operators (MNOs) OTT Moreover, vulnerabilities various layers also leak eavesdroppers. Hence, privacy users is likely risk, as...

10.3390/s21155176 article EN cc-by Sensors 2021-07-30

Future sixth generation (6G) wireless communication networks face the need to similarly meet unprecedented quality of service (QoS) demands while also providing a larger energy efficiency (EE) minimize their carbon footprint. Moreover, due diverseness network participants, mixed criticality QoS levels are assigned users such networks. In this work, with focus on cloud-radio access (C-RAN), fulfillment desired and minimized transmit power use is optimized jointly within rate-splitting...

10.1109/iccworkshops53468.2022.9813735 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2022-05-16

In this paper we study the impact of unmanned aerial vehicles (UAVs) trajectories on terrestrial users' spectral efficiency (SE). Assuming a strong line sight path to users, distance from all users UAVs influence outcome an online trajectory optimization. The should be designed in way that fairness rate is maximized over time. That means, travel directions maximize minimum SE. From free-space path-loss channel model, data-rate gradient calculated and used direct long-term perspective towards...

10.1109/icc.2019.8761630 article EN 2019-05-01

In cyber-physical systems (CPSs) and internet-of-things applications, various sensor-actuator pairs are deployed for control purposes which require timely online communication. The sensors measuring information about the CPS, e.g., process systems, whereas actuators using to take actions. These usually communicate via same wireless medium thus their transmissions need be scheduled in time. When transmitting data, a <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/twc.2021.3132462 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2021-12-10

In this paper, we are concerned with indoor localization based on multiple-antenna channel measurements. Indoor is an active area of research due to its great importance in many applications. We propose a hybrid algorithm which combines the benefits two techniques, namely signal processing and machine learning. validate our real measurements acquired from practical setups. Our approach shows very promising performance IEEE CTW 2019 - Positioning Algorithm Competition where achieves accuracy...

10.1109/vtcfall.2019.8891416 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2019-09-01

In fifth-generation (5G) cellular networks, users feed back to the base station index of precoder (from a codebook) be used for downlink transmission. The is strongly related user channel and in turn position within cell. We propose method by which an external attacker determines passively overhearing this unencrypted layer-2 feedback signal. first builds map fed indices Then, victim user, finds its on map. focus type-I single-panel codebook, today only mandatory solution 3GPP standard....

10.1109/twc.2021.3055851 article EN IEEE Transactions on Wireless Communications 2021-02-09

The use of relays is a promising way to extend coverage and increase rates in Long Term Evolution Advanced (LTE Advanced) networks. Performing transmission several hops (BS-relay & relay-user) requires more radio resources than single hop transmission. This paper analyses how the available resource should be allocated between users order maximize throughput and/or fairness. Time frequency multiplexed backhaul investigated under some basic assumptions on division resource. It shown that...

10.1109/pimrc.2010.5671910 article EN 2010-09-01

We present an efficient implementation of volumetric anisotropic image diffusion filters on modern programmable graphics processing units (GPUs), where the mathematics behind is effectively reduced to in 2D images. hereby avoid computational bottleneck a time consuming eigenvalue decomposition ℝ 3 . Instead, we use projection Hessian matrix along surface normal onto tangent plane local isodensity and solve for remaining two space eigenvectors. derive closed formulas achieve this prevent GPU...

10.1017/s1004897900001148 article EN Numerical Mathematics Theory Methods and Applications 2013-02-01

One of the great potentials to improve confidentiality in mmWave/THz at physical layer technical communication, measured by secrecy rate, lies use reconfigurable intelligent surfaces (RISs). However, an important open problem arises when eavesdropper is aligned with legitimate user or proximity RIS user. The limitation comes, on one hand, from high directional gain caused dominant line-of-sight (LOS) path high-frequency transmission, and, other energy leakage and To address these issues, we...

10.48550/arxiv.2401.15154 preprint EN arXiv (Cornell University) 2024-01-26

The sector of information and communication technology (ICT) can contribute to the fulfillment Paris agreement sustainable development goals (SDGs) through introduction sustainability strategies. For environmental sustainability, such strategies should contain efficiency, sufficiency, consistency measures. To propose such, a structural analysis ICT is undertaken in this manuscript. Thereby, key mechanisms dynamics behind usage corresponding energy resource use are analyzed by describing as...

10.48550/arxiv.2410.10977 preprint EN arXiv (Cornell University) 2024-10-14

In future sixth-generation (6G) wireless applications, high levels of security and privacy are expected due to the soaring volume confidential sensitive data. To achieve this objective, covert communication can be employed as it hide any activity a specific legitimate user against warden. study, we investigate potential reconfigurable intelligent surfaces (RIS) rate splitting (RS) enabling techniques for improving performance. end, jointly optimize RIS phase shifts transmit beamforming...

10.1109/spawc53906.2023.10304499 article EN 2023-09-25

In a wireless sensor network, data from various sensors are gathered to estimate the system-state of process system. However, adversaries aim at distorting estimation, for which they may infiltrate or position additional devices in environment. For authentication, receiver can evaluate integrity measurements different jointly with temporal channel each sensor. Therefore, we design security protocol, Kalman filters predict and channel-state values. Then, received is authenticated by...

10.1109/ojvt.2022.3229064 article EN cc-by IEEE Open Journal of Vehicular Technology 2022-12-14

REACT (Rapid Expert Assessment to Counter Threats) is a prototype artificial intelligence system which being developed at the Grumman Corporate Research Center. The purpose of aid pilots in determining appropriate threat response strategies during combat situations. also designed monitor state aircraft's onboard systems order offload pilot from performing some these tasks. will notify unusual circumstances require corrective actions be taken. Our approach carrying out tasks develop...

10.1117/12.946968 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 1988-03-29

We investigate Gaussian widely linear precoding known as improper signaling for the cellular uplink with inter-cell interference, interference multiple access channel (IMAC). This transmission scheme provides extra degrees of freedom by treating real and imaginary components complex signal differently. Since current standards mainly utilize beamforming waveform generation, we highlight benefits over temporal dimensions (symbol extension in time) IMAC. achieves significantly higher...

10.1109/pimrc.2018.8581021 article EN 2018-09-01

This paper proposes a networked event-based method for collision avoidance of moving objects in leader-follower structure. It extends the results previous to cope with communication constraints from an information theoretical perspective. The are locally controlled and connected by network, which transmission delays packet losses occur. In considered setting, leader can freely change its trajectory while follower has avoid collisions predicting movement, invoking at event times that indicate...

10.1016/j.ifacol.2020.12.929 article EN IFAC-PapersOnLine 2020-01-01
Coming Soon ...