Publications
The 50 most recent publications from the Division of Software and Computer Systems:
[1]
W. Liu and P. Papadimitratos,
"Multimodal Location Spoofing: Federated Detection With RAIM-Based Self-Labeling,"
IEEE Open Journal of the Communications Society, vol. 7, pp. 769-785, 2026.
[2]
D. F. Perez-Ramirez,
"Machine Learning-Driven Optimization in Networked Systems : Leveraging Graph Neural Networks to Solve Resource Allocation Problems,"
Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2026:09, 2026.
[3]
S. Shen et al.,
"Towards privacy preservation in smart grids via controlled redactable signatures,"
Journal of systems architecture, vol. 172, 2026.
[4]
D. F. Perez-Ramirez et al.,
"Robust Generalization of Graph Neural Networks for Scheduling Backscatter Communications at Scale,"
IEEE Transactions on Machine Learning in Communications and Networking, vol. 4, pp. 76-97, 2026.
[5]
A. Rao and M. Boman,
"Self-Supervised Pretraining for User Performance Prediction Under Scarce Data Conditions,"
IEEE Transactions on Network and Service Management, vol. 23, pp. 112-122, 2026.
[6]
J. Spenger, P. Carbone and P. Haller,
"Failure-Transparent Actors,"
in Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, pp. 81-113.
[7]
M. Soltani, M. Mirmohseni and P. Papadimitratos,
"Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers,"
IEEE Transactions on Wireless Communications, vol. 25, pp. 4496-4513, 2026.
[8]
L. Froschauer, J. Langlet and A. Kassler,
"Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed,"
in 34th International Conference on Computer Communications and Networks, ICCCN 2025, 2025.
[9]
C. Wang, M. Scazzariello and M. Chiesa,
"From Scientific Texts to Verifiable Code : Automating the Process with Transformers,"
in 2025 IEEE/ACM International Workshop On Large Language Models For Code, LLM4CODE, 2025, pp. 213-216.
[10]
S. Ghani et al.,
"Conversational Agents for Building Energy Efficiency - Advising Housing Cooperatives in Stockholm on Reducing Energy Consumption,"
in IOP Conference Series: Earth and Environmental Science, 2025.
[11]
L. Puccioni et al.,
"Deriving Coding-Specific Sub-Models from LLMs using Resource-Efficient Pruning,"
in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[12]
D. Cipollone et al.,
"Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues,"
in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[13]
M. Canini et al.,
"Cloud abstractions for AI workloads,"
in APSys '25: Proceedings of the 16th ACM SIGOPS Asia-Pacific Workshop on Systems, 2025, pp. 98-105.
[14]
H. Li et al.,
"AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons,"
in PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, pp. 8-13.
[15]
X. Pang et al.,
"BI-RADS Boosted Breast Cancer Diagnosis With Masked Pretraining On Imbalanced Ultrasound Data,"
in 2025 IEEE International Conference on Multimedia and Expo: Journey to the Center of Machine Imagination, ICME 2025 - Conference Proceedings, 2025.
[16]
W. Liu and P. Papadimitratos,
"Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services,"
IEEE Open Journal of the Communications Society, vol. 6, pp. 9229-9246, 2025.
[17]
Y. Huang et al.,
"Interference-Resilient Optical Wireless Positioning via Machine Learning-Enhanced Subset Filtering,"
in Proceedings of the 51st European Conference on Optical Communication, 2025.
[18]
W. J. Szczerek and A. Podobas,
"IzhiRISC-V-a RISC-V-based Processor with Custom ISA Extension for Spiking Neuron Networks Processing with Izhikevich Neurons,"
in Proceedings of the SC’25 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis, 2025, pp. 1667-1675.
[19]
N. Benso et al.,
"Distributed On-Demand Routing for VLEO Constellations with 3-Terminal Inter-Satellite Links,"
in 2025 33rd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2025, 2025.
[20]
X. Shi, A. Srinivasan and S. Pashami,
"Counterfactual Explanation for Anomaly Detection using Graph Neural Network,"
in BEHAIV 2025 - Proceedings of the 2025 Workshop on AI for Understanding Human Behavior in Professional Settings, co-located with 28th European Conference on Artificial Intelligence, ECAI 2025, 2025, pp. 42-55.
[21]
G. Dong et al.,
"Explaining Deep Neural Networks with Example and Pixel Attribution,"
in Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, pp. 286-300.
[22]
[23]
B. Bera et al.,
"Fortifying V2RSU Communication with Post Quantum Security in the Green Internet of Vehicles,"
in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 2026-2032.
[24]
Z. Xing et al.,
"HMM-Based CSI Embedding for Trajectory Recovery via Feature Engineering on MIMO-OFDM Channels in LOS/NLOS Regions,"
in 2025 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2025, 2025.
[25]
Y. Mei et al.,
"Disaggregated State Management in Apache Flink® 2.0,"
in Proceedings of the VLDB Endowment, 2025, pp. 4846-4859.
[26]
L. Froschauer, J. Langlet and A. Kassler,
"Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed,"
in ICCCN 2025 - 34th International Conference on Computer Communications and Networks, 2025.
[27]
F. Cornell et al.,
"Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors,"
in Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, pp. 1650-1663.
[28]
A. E. Samy, L. Giaretta and S. Girdzijauskas,
"HopNet : Addressing Over-Squashing with Learnable Rewiring in GNNs,"
(Manuscript).
[29]
P. Sjösvärd, H. Jin and P. Papadimitratos,
"DNS in the Time of Curiosity : A Tale of Collaborative User Privacy Protection,"
in Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025, 2025.
[30]
Z. Li and H. Boström,
"FlowGuard: Guarding Flow Matching via Conformal Sampling,"
in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 775-777.
[31]
G. Dong, R. Bresson and H. Boström,
"Detecting Attacks with Conformal Test Martingales,"
in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 758-761.
[32]
W. Liu and P. Papadimitratos,
"Guardian Positioning System (GPS) for Location Based Services,"
in WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, pp. 88-99.
[33]
V. Gulisano et al.,
"Foreword,"
in Debs 2025 Proceedings of the 19th ACM International Conference on Distributed and Event Based Systems, 2025, pp. vi-vii.
[34]
W. Liu and P. Papadimitratos,
"GNSS Spoofing Detection Based on Opportunistic Position Information,"
IEEE Internet of Things Journal, vol. 12, no. 17, pp. 36168-36182, 2025.
[35]
Z. Zhou, H. Jin and P. Papadimitratos,
"Clogging DoS Resilient Bootstrapping of Efficient V2V Validation,"
in 40th Annual ACM Symposium On Applied Computing, 2025, pp. 1857-1866.
[36]
Y. Liu et al.,
"Detecting and removing bloated dependencies in CommonJS packages,"
Journal of Systems and Software, vol. 230, 2025.
[37]
H. Jin and P. Papadimitratos,
"Accountable, Scalable and DoS-resilient Secure Vehicular Communication,"
Computers & Security, vol. 156, 2025.
[38]
S. Ennadir et al.,
"Expressivity of Representation Learning on Continuous-Time Dynamic Graphs: An Information-Flow Centric Review,"
Transactions on Machine Learning Research, vol. 2025-April, 2025.
[39]
C. Ottaviani et al.,
"Advanced Routing Strategies for LEO and VLEO Constellations : Ensuring Polar Coverage,"
in 2025 12th Advanced Satellite Multimedia Systems Conference and the 18th Signal Processing for Space Communications Workshop, ASMS/SPSC 2025, 2025.
[40]
M. I. Al Hafiz et al.,
"A Reconfigurable Stream-Based FPGA Accelerator for Bayesian Confidence Propagation Neural Networks,"
in Applied Reconfigurable Computing. Architectures, Tools, and Applications - 21st International Symposium, ARC 2025, Proceedings, 2025, pp. 196-213.
[41]
R. Yadav et al.,
"Automatic Tracing in Task-Based Runtime Systems,"
in ASPLOS 2025 - Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025, pp. 84-99.
[42]
G. Shang et al.,
"Atlas-Chat : Adapting Large Language Models for Low-Resource Moroccan Arabic Dialect,"
in LoResLM 2025 - 1st Workshop on Language Models for Low-Resource Languages, Proceedings of the Workshop, 2025, pp. 9-30.
[43]
V. Komini and S. Girdzijauskas,
"Integrating Logit Space Embeddings for Reliable Out-of-Distribution Detection,"
in Machine Learning, Optimization, and Data Science - 10th International Conference, LOD 2024, Revised Selected Papers, 2025, pp. 255-269.
[44]
M. Spanghero,
"Data verification for GNSS systems and protection of GNSS services,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:36, 2025.
[45]
M. Spanghero et al.,
"GNSS jammer localization and identification with airborne commercial GNSS receivers,"
IEEE Transactions on Information Forensics and Security, vol. 20, pp. 3550-3565, 2025.
[46]
G. Verardo et al.,
"FMM-Head: Enhancing Autoencoder-Based ECG Anomaly Detection with Prior Knowledge,"
in Pattern Recognition and Artificial Intelligence - 4th International Conference, ICPRAI 2024, Proceedings, 2025, pp. 18-32.
[47]
A. H. Akhavan Rahnama,
"Evaluating the Faithfulness of Local Feature Attribution Explanations : Can We Trust Explainable AI?,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:23, 2025.
[48]
M. Spanghero and P. Papadimitratos,
"Consumer INS coupled with carrier phase measurements for GNSS spoofing detection,"
in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[49]
A. Alkhatib,
"Addressing Shortcomings of Explainable Machine Learning Methods,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:11, 2025.
[50]
E. Listo Zec,
"Decentralized deep learning in statistically heterogeneous environments,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:4, 2025.