Publications
Link to the full list in the KTH publication portal.
TCS Publications, 50 latest
[1]
S. Bobadilla et al.,
"SOBO : A Feedback Bot to Nudge Code Quality in Programming Courses,"
IEEE Software, vol. 41, no. 2, pp. 68-76, 2024.
[2]
H. Ye and M. Monperrus,
"ITER : Iterative Neural Repair for Multi-Location Patches,"
in ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.
[3]
C. Lidström,
"Automated Deductive Verification of Safety-Critical Embedded Software,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:17, 2024.
[4]
J. Amilon et al.,
"An Exercise in Mind Reading: Automatic Contract Inference for Frama-C,"
in Guide to Software Verification with Frama-C: Core Components, Usages, and Applications, : Springer Nature, 2024.
[5]
J. Cabrera-Arteaga et al.,
"Wasm-Mutate : Fast and effective binary diversification for WebAssembly,"
Computers & security (Print), vol. 139, pp. 103731-103731, 2024.
[6]
N. Dong,
"Towards a Trustworthy Stack: Formal Verification of Low-Level Hardware and Software,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:3, 2024.
[7]
C. Kolb, E. Björnson and E. Troubitsyna,
"2nd International Workshop on Safety-Security Interaction (SENSEI 2023),"
in COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS, 2023, pp. 162-163.
[8]
M. Balliu et al.,
"Challenges of Producing Software Bill of Materials for Java,"
IEEE Security and Privacy, vol. 21, no. 6, pp. 12-23, 2023.
[9]
K. Zhao et al.,
"DeepInfer : Deep Type Inference from Smart Contract Bytecode,"
in Proceedings Of The 31St Acm Joint Meeting European Software Engineering Conference And Symposium On The Foundations Of Software Engineering, Esec/Fse 2023, 2023, pp. 745-757.
[10]
M. Andersson et al.,
"Admission to master programmes : What are the indicators for successful study performance?,"
in Bidrag från den 9:e utvecklingskonferensen för Sveriges ingenjörsutbildningar, 2023, pp. 9-18.
[11]
Y. He, Z. Chen and C. Le Goues,
"PreciseBugCollector : Extensible, Executable and Precise Bug-fix Collection,"
in 2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, pp. 1899-1910.
[12]
E. Troubitsyna,
"Monitoring Privacy-Preserving Constraints in Microservices Architecture Through Parameter Formalisation,"
in 2023 3rd Intelligent Cybersecurity Conference, ICSC 2023, 2023, pp. 54-62.
[13]
Z. Chen et al.,
"MuRS : Mutant Ranking and Suppression using Identifier Templates,"
in ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023, pp. 1798-1808.
[14]
U. Sehar et al.,
"A hybrid dependency-based approach for Urdu sentiment analysis,"
Scientific Reports, vol. 13, no. 1, 2023.
[15]
C. Björn, K. Edström and V. Kann,
"Engineering students reflect on work-life relevant learning,"
in SEFI 2023 - 51st Annual Conference of the European Society for Engineering Education: Engineering Education for Sustainability, Proceedings, 2023, pp. 203-211.
[16]
E. Troubitsyna,
"Employing Redundancy to Leverage Cybersecurity Protection of Safety-Critical Systems,"
in Proceedings - 2023 10th International Conference on Dependable Systems and Their Applications, DSA 2023, 2023, pp. 282-287.
[17]
O. Bälter et al.,
"English-medium instruction and impact on academic performance : a randomized control study,"
Applied Linguistics Review, 2023.
[18]
A. Maiga et al.,
"Does Rust SPARK Joy? Safe Bindings from Rust to SPARK, Applied to the BBQueue Library,"
in FTSCS 2023 - Proceedings of the 9th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems, Co-located: SPLASH 2023, 2023, pp. 37-47.
[19]
M. Eshghie et al.,
"Capturing Smart Contract Design with DCR Graphs,"
in Software Engineering and Formal Methods : 21st International Conference, SEFM 2023, Proceedings, 2023, pp. 106-125.
[20]
N. Dong et al.,
"Formal Verification of Correctness and Information Flow Security for an In-Order Pipelined Processor,"
in Proceedings of the 23rd Conference on Formal Methods in Computer-Aided Design – FMCAD 2023, 2023.
[21]
S. Bhattacharya et al.,
"DETERMINISTIC NEAR-OPTIMAL APPROXIMATION ALGORITHMS FOR DYNAMIC SET COVER,"
SIAM journal on computing (Print), vol. 52, no. 5, pp. 1132-1192, 2023.
[22]
M. Martinez, J. R. Falleri and M. Monperrus,
"Hyperparameter Optimization for AST Differencing,"
IEEE Transactions on Software Engineering, vol. 49, no. 10, pp. 4814-4828, 2023.
[23]
M. Ciaperoni, H. Xiao and A. Gionis,
"Concise and interpretable multi-label rule sets,"
Knowledge and Information Systems, vol. 65, no. 12, pp. 5657-5694, 2023.
[24]
J. K. Larsen et al.,
"P4R-Type : A Verified API for P4 Control Plane Programs,"
Proceedings of the ACM on Programming Languages, vol. 7, no. OOPSLA2, 2023.
[25]
E. Poorhadi and E. Troubitsyna,
"Automating an Analysis of Safety-Security Interactions for Railway Systems,"
in Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification - 5th International Conference, RSSRail 2023, Proceedings, 2023, pp. 3-21.
[26]
J. Spenger et al.,
"Portals : A Showcase of Multi-Dataflow Stateful Serverless,"
in Proceedings 49th International Conference on Very Large Data Bases, VLDB 2023, 2023, pp. 4054-4057.
[27]
J. Blikstad and P. Kiss,
"Incremental (1 − ε)-Approximate Dynamic Matching in O(poly(1/ε)) Update Time,"
in 31st Annual European Symposium on Algorithms, ESA 2023, 2023.
[28]
K. Norrman, V. Sundararajan and A. Bruni,
"Extended Formal Analysis of the EDHOC Protocol in Tamarin,"
in E-Business and Telecommunications, 2023, pp. 224-248.
[29]
F. Adriaens, H. Wang and A. Gionis,
"Minimizing hitting time between disparate groups with shortcut edges,"
in KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 1-10.
[30]
G. Zhang, N. Tatti and A. Gionis,
"Finding Favourite Tuples on Data Streams with Provably Few Comparisons,"
in KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 3229-3238.
[31]
L. Oettershagen, N. M. Kriege and P. Mutzel,
"A Higher-Order Temporal H-Index for Evolving Networks,"
in KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 1770-1782.
[32]
S. Tu, S. Neumann and A. Gionis,
"Adversaries with Limited Information in the Friedkin-Johnsen Model,"
in KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 2201-2210.
[33]
A. de Almeida Borges et al.,
"Lessons for Interactive Theorem Proving Researchers from a Survey of Coq Users,"
in 14th International Conference on Interactive Theorem Proving, ITP 2023, 2023.
[34]
J. Amilon et al.,
"Automatic Program Instrumentation for Automatic Verification,"
in Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, 2023, pp. 281-304.
[35]
Y. Jin et al.,
"Learning Cellular Coverage from Real Network Configurations using GNNs,"
in 2023 IEEE 97th Vehicular Technology Conference, VTC 2023-Spring - Proceedings, 2023.
[36]
Z. Yu et al.,
"Learning the Relation Between Code Features and Code Transforms With Structured Prediction,"
IEEE Transactions on Software Engineering, vol. 49, no. 7, pp. 3872-3900, 2023.
[37]
T. Hasegawa et al.,
"Edge-Based Graph Neural Networks for Cell-Graph Modeling and Prediction,"
in Information Processing in Medical Imaging - 28th International Conference, IPMI 2023, Proceedings, 2023, pp. 265-277.
[38]
J. Spoerhase et al.,
"A Constant-Factor Approximation Algorithm for Reconciliation k-Median,"
in Proceedings of the 26th International Conference on Artificial Intelligence and Statistics, AISTATS 2023, 2023, pp. 1719-1746.
[39]
C. Lidström and D. Gurov,
"Contract Based Embedded Software Design,"
in Theoretical Aspects of Software Engineering - 17th International Symposium, TASE 2023, Proceedings, 2023, pp. 77-94.
[40]
J. Blikstad et al.,
"Fast Algorithms via Dynamic-Oracle Matroids,"
in STOC 2023 : Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023, pp. 1229-1242.
[41]
M. Henzinger et al.,
"Dynamic Maintenance of Monotone Dynamic Programs and Applications,"
in 40th International Symposium on Theoretical Aspects of Computer Science, STACS 2023, 2023.
[42]
K. T. Foerster et al.,
"Analyzing the Communication Clusters in Datacenters,"
in ACM Web Conference 2023 : Proceedings of the World Wide Web Conference, WWW 2023, 2023, pp. 3022-3032.
[43]
L. Östlund, N. Wicklund and R. Glassey,
"It's Never too Early to Learn about Code Quality : A Longitudinal Study of Code Quality in First-year Computer Science Students,"
in SIGCSE 2023 : Proceedings of the 54th ACM Technical Symposium on Computer Science Education, 2023, pp. 792-798.
[44]
[45]
A. Bernstein and D. Na Nongkai,
"Distributed exact weighted all-pairs shortest paths in randomized near-linear time,"
SIAM journal on computing (Print), vol. 52, no. 2, pp. 112-127, 2023.
[46]
R. Glassey and O. Bälter,
"Learnersourcing analytics,"
in Practicable Learning Analytics, : Springer International Publishing, 2023, pp. 155-175.
[47]
J. Haglund,
"Formal Verification of Peripheral Memory Isolation,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2013:48, 2023.
[48]
H. Ye,
"Improving the Precision of Automatic Program Repair with Machine Learning,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2023:10, 2023.
[49]
E. Riese and S. Stenbom,
"Engineering Students’ Experiences of Assessment in Introductory Computer Science Courses,"
IEEE Transactions on Education, vol. 66, no. 4, pp. 350-359, 2023.
[50]
Z. Chen, S. J. Kommrusch and M. Monperrus,
"Neural Transfer Learning for Repairing Security Vulnerabilities in C Code,"
IEEE Transactions on Software Engineering, vol. 49, no. 1, pp. 147-165, 2023.