Skip to main content
To KTH's start page

Publications

Link to the full list   in the KTH publication portal.

TCS Publications, 50 latest

[1]
M. Ciaperoni, A. Gionis and H. Mannila, "Sample and Expand: Discovering Low-Rank Submatrices With Quality Guarantees," in Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2025, Proceedings, 2026, pp. 78-95.
[2]
J. Spenger, P. Carbone and P. Haller, "Failure-Transparent Actors," in Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, pp. 81-113.
[3]
G. Badkobeh et al., "Preface," in String Processing and Information Retrieval : 32nd International Symposium, SPIRE 2025, London, UK, September 8–11, 2025, Proceedings, Golnaz Badkobeh, Jakub Radoszewski, Nicola Tonellotto, Ricardo Baeza-Yates Ed., : Springer Science and Business Media Deutschland GmbH, 2026, pp. v-vii.
[4]
E. Ábrahám et al., "Why do women pursue a Ph.D. in Computer Science?," Journal of Systems and Software, vol. 231, 2026.
[5]
A. Andreasson et al., "Cyber situation awareness during an emerging cyberthreat: a case study," International Journal of Information Security, vol. 24, no. 5, 2025.
[6]
S. Dalleiger and A. Gionis, "Creating Coherence in Federated Non-Negative Matrix Factorization," in Thirty-Ninth Aaai Conference On Artificial Intelligence,  AAAI-25, VOL 39 NO 15, 2025, pp. 16135-16143.
[7]
S. Dalleiger, J. Vreeken and M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," in Thirty-Ninth Aaai Conference On Artificial Intelligence, Aaai-25, Vol 39 No 15, 2025, pp. 16144-16152.
[8]
Y. Jin et al., "SANDWICH: Towards an Offline, Differentiable, Fully-Trainable Wireless Neural Ray-Tracing Surrogate," in 2025 IEEE International Conference on Machine Learning for Communication and Networking, ICMLCN 2025, 2025.
[9]
N. Eslami, I. Bercea and N. Dayan, "Diva: Dynamic Range Filter for Var-Length Keys and Queries," in Proceedings of the VLDB Endowment, 2025, pp. 3923-3936.
[10]
J. Berengueres and T. Yu, "Flexible Ergonomics : Can a Flexible Mouse Fix That Wrist Pain?," interactions, vol. 32, no. 5, pp. 32-37, 2025.
[11]
F. Cornell et al., "Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors," in Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, pp. 1650-1663.
[12]
S. Tu et al., "Optirefine : densest subgraphs and maximum cuts with k refinements," Data mining and knowledge discovery, vol. 39, no. 6, 2025.
[13]
M. Moazen et al., "TAPShield: Securing Trigger-Action Platforms against Strong Attackers," in Proceedings - IEEE 10th European Symposium on Security and Privacy, Euro S and P 2025, 2025, pp. 60-77.
[14]
A. Alshnakat et al., "Securing P4 Programs by Information Flow Control," in Proceedings - 2025 IEEE 38th Computer Security Foundations Symposium, CSF 2025, 2025, pp. 284-299.
[15]
S. Díaz-Aranda et al., "Error Bounds for the Network Scale-Up Method," in KDD 2025 - Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2025, pp. 498-509.
[16]
R. Liu et al., "Dirty-Waters: Detecting Software Supply Chain Smells," in FSE Companion 2025 - Companion Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025, pp. 1045-1049.
[17]
K. Etemadi et al., "Mokav: Execution-driven differential testing with LLMs," Journal of Systems and Software, vol. 230, 2025.
[18]
D. J. Bouvier et al., "GenAI Integration in Upper-Level Computing Courses," in ITiCSE 2025 - Proceedings of the 30th ACM Conference on Innovation and Technology in Computer Science Education, 2025, pp. 691-692.
[19]
J. Blikstad et al., "Global vs. s-t Vertex Connectivity Beyond Sequential : Almost-Perfect Reductions and Near-Optimal Separations," in STOC 2025 - Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025, pp. 2305-2316.
[20]
P. Austrin et al., "Algorithms for the Diverse-k-SAT Problem : The Geometry of Satisfying Assignments," in 52nd International Colloquium on Automata, Languages, and Programming, ICALP 2025, 2025.
[21]
A. Silva, S. Fang and M. Monperrus, "RepairLLaMA : Efficient Representations and Fine-Tuned Adapters for Program Repair," IEEE Transactions on Software Engineering, vol. 51, no. 8, pp. 2366-2380, 2025.
[22]
A. Sharma, "Build and Runtime Integrity for Java," in Proceedings - 2025 IEEE/ACM 47th International Conference on Software Engineering, ICSE-Companion 2025, 2025, pp. 145-147.
[23]
P. Kamboj et al., "Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures," in Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings, 2025, pp. 219-241.
[24]
S. Bobadilla et al., "SOBO: A Feedback Bot to Nudge Code Quality in Programming Courses," in Proceedings - 2025 IEEE/ACM 37th International Conference on Software Engineering Education and Training, CSEE and T 2025, 2025, p. 229.
[25]
Y. Liu et al., "Detecting and removing bloated dependencies in CommonJS packages," Journal of Systems and Software, vol. 230, 2025.
[26]
H. Wang, S. Tu and A. Gionis, "Sequential Diversification with Provable Guarantees," in Proceedings Of The Eighteenth Acm International Conference On Web Search And Data Mining, WSDM 2025, 2025, pp. 345-353.
[27]
G. Preti et al., "POLARIS : Sampling from the Multigraph Configuration Model with Prescribed Color Assortativity," in Proceedings Of The Eighteenth Acm International Conference On Web Search And Data Mining, Wsdm 2025, 2025, pp. 30-39.
[28]
M. M. Ahmadpanah et al., "CodeX : Contextual Flow Tracking for Browser Extensions," in Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, 2025.
[29]
Y. Liu et al., "Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction," in Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, 2025, pp. 147-158.
[30]
X. Liu et al., "ContractViz : Extending Eclipse Trace Compass for Smart Contract Transaction Analysis," in Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, 2025, pp. 819-823.
[31]
D. Lundberg, R. Guanciale and M. Dam, "Proof-Producing Symbolic Execution for P4," in Verified Software. Theories, Tools and Experiments - 16th International Conference, VSTTE 2024, Revised Selected Papers, 2025, pp. 70-83.
[32]
G. Zhang, I. Sarpe and A. Gionis, "Efficient and Practical Approximation Algorithms for Advertising in Content Feeds," in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 3193-3203.
[33]
A. Gadekar, A. Gionis and S. Thejaswi, "Fair Clustering for Data Summarization : Improved Approximation Algorithms and Complexity Insights," in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 4458-4469.
[34]
E. Riese et al., "Experiences, Impacts and Implications of a STINT Teaching Sabbatical," in KTH SoTL 2025, KTH Royal Institute of Technology, Sweden, May 20, 2025., 2025.
[36]
[37]
S. Dalleiger, J. Vreeken and M. Kamp, "Federated Binary Matrix Factorization Using Proximal Optimization," in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16144-16152.
[38]
S. Tu, "Models and Algorithms for Addressing Challenges in Online Social Networks," Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:57, 2025.
[39]
S. Dalleiger and A. Gionis, "Creating Coherence in Federated Non-Negative Matrix Factorization," in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16135-16143.
[40]
S. Thejaswi, J. Lauri and A. Gionis, "Restless reachability problems in temporal graphs," Knowledge and Information Systems, 2025.
[41]
M. Eshghie, "Securing Smart Contracts Against Business Logic Flaws," Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:56, 2025.
[42]
M. Ekerå and J. Gärtner, "A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography," IACR Communications in Cryptology, vol. 2, no. 1, 2025.
[43]
B. Baudry and M. Monperrus, "Humor for graduate training," ACM Inroads, 2025.
[45]
E. Poorhadi, "Formal Modelling of the Impact of Cyberattacks on Safety of Networked Control Systems," Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:39, 2025.
[46]
K. Vombatkere, A. Gionis and E. Terzi, "Forming coordinated teams that balance task coverage and expert workload," Data mining and knowledge discovery, vol. 39, no. 3, 2025.
[47]
C. Izu et al., "Introducing Code Quality at CS1 Level : Examples and Activities," in ITiCSE WGR 2024 - Publication of the 2024 Working Group Reports on Innovation and Technology in Computer Science Education, 2025, pp. 339-377.
[48]
J. Augustine and M. Mohit Daga, "Distributed Small Cuts using Semigroups," in ICDCN 2025 - Proceedings of the 26th International Conference on Distributed Computing and Networking, 2025, pp. 134-143.
[49]
A. de Almeida Borges et al., "Lessons for Interactive Theorem Proving Researchers from a Survey of Coq Users," Journal of automated reasoning, vol. 69, no. 1, 2025.
[50]
J. Amilon and D. Gurov, "Deductively Verified Program Models for Software Model Checking," in Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification - 12th International Symposium, ISoLA 2024, Proceedings, 2025, pp. 8-25.