Skip to main content
To KTH's start page

Publications

The 50 most recent publications from the Division of Software and Computer Systems:

[1]
J. Spenger, P. Carbone and P. Haller, "Failure-Transparent Actors," in Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, pp. 81-113.
[2]
L. Puccioni et al., "Deriving Coding-Specific Sub-Models from LLMs using Resource-Efficient Pruning," in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[3]
D. Cipollone et al., "Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues," in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[4]
M. Canini et al., "Cloud abstractions for AI workloads," in APSys '25: Proceedings of the 16th ACM SIGOPS Asia-Pacific Workshop on Systems, 2025, pp. 98-105.
[5]
H. Li et al., "AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons," in PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, pp. 8-13.
[6]
X. Pang et al., "BI-RADS Boosted Breast Cancer Diagnosis With Masked Pretraining On Imbalanced Ultrasound Data," in 2025 IEEE International Conference on Multimedia and Expo: Journey to the Center of Machine Imagination, ICME 2025 - Conference Proceedings, 2025.
[7]
W. Liu and P. Papadimitratos, "Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services," IEEE Open Journal of the Communications Society, vol. 6, pp. 9229-9246, 2025.
[8]
Y. Huang et al., "Interference-Resilient Optical Wireless Positioning via Machine Learning-Enhanced Subset Filtering," in Proceedings of the 51st European Conference on Optical Communication, 2025.
[9]
W. J. Szczerek and A. Podobas, "IzhiRISC-V-a RISC-V-based Processor with Custom ISA Extension for Spiking Neuron Networks Processing with Izhikevich Neurons," in Proceedings of the SC’25 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis, 2025, pp. 1667-1675.
[10]
N. Benso et al., "Distributed On-Demand Routing for VLEO Constellations with 3-Terminal Inter-Satellite Links," in 2025 33rd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2025, 2025.
[11]
X. Shi, A. Srinivasan and S. Pashami, "Counterfactual Explanation for Anomaly Detection using Graph Neural Network," in BEHAIV 2025 - Proceedings of the 2025 Workshop on AI for Understanding Human Behavior in Professional Settings, co-located with 28th European Conference on Artificial Intelligence, ECAI 2025, 2025, pp. 42-55.
[12]
G. Dong et al., "Explaining Deep Neural Networks with Example and Pixel Attribution," in Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, pp. 286-300.
[14]
B. Bera et al., "Fortifying V2RSU Communication with Post Quantum Security in the Green Internet of Vehicles," in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 2026-2032.
[15]
Z. Xing et al., "HMM-Based CSI Embedding for Trajectory Recovery via Feature Engineering on MIMO-OFDM Channels in LOS/NLOS Regions," in 2025 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2025, 2025.
[16]
Y. Mei et al., "Disaggregated State Management in Apache Flink® 2.0," in Proceedings of the VLDB Endowment, 2025, pp. 4846-4859.
[17]
M. Soltani, M. Mirmohseni and P. Papadimitratos, "Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers," IEEE Transactions on Wireless Communications, 2025.
[18]
W. Johan, A. Hussain and P. Papadimitratos, "Jailbreaking Large Language Models Through Content Concretization," in GameSec 2025 : 16th Conference on Game Theory and AI for Security, 2025.
[19]
L. Froschauer, J. Langlet and A. Kassler, "Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed," in ICCCN 2025 - 34th International Conference on Computer Communications and Networks, 2025.
[20]
F. Cornell et al., "Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors," in Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, pp. 1650-1663.
[21]
A. E. Samy, L. Giaretta and S. Girdzijauskas, "HopNet : Addressing Over-Squashing with Learnable Rewiring in GNNs," (Manuscript).
[22]
P. Sjösvärd, H. Jin and P. Papadimitratos, "DNS in the Time of Curiosity : A Tale of Collaborative User Privacy Protection," in Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025, 2025.
[23]
P. Sjösvärd, H. Jin and P. Papadimitratos, "LLUAD : Low-Latency User-Anonymized DNS," in 24th Workshop on Privacy in the Electronic Society held in conjunction with ACM CCS 2025, 13 October 2025, Taipei, Taiwan, 2025.
[24]
Z. Li and H. Boström, "FlowGuard: Guarding Flow Matching via Conformal Sampling," in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 775-777.
[25]
G. Dong, R. Bresson and H. Boström, "Detecting Attacks with Conformal Test Martingales," in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 758-761.
[26]
[27]
W. Liu and P. Papadimitratos, "Guardian Positioning System (GPS) for Location Based Services," in WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, pp. 88-99.
[28]
E. Ståhl et al., "On the Benefits of Predictable Traffic in Virtual Switches: A Case Study," in ANRW 2025 - Proceedings of the 2025 Applied Networking Research Workshop, 2025, pp. 113-119.
[29]
V. Gulisano et al., "Foreword," in Debs 2025 Proceedings of the 19th ACM International Conference on Distributed and Event Based Systems, 2025, pp. vi-vii.
[30]
W. Liu and P. Papadimitratos, "GNSS Spoofing Detection Based on Opportunistic Position Information," IEEE Internet of Things Journal, 2025.
[31]
Z. Zhou, H. Jin and P. Papadimitratos, "Clogging DoS Resilient Bootstrapping of Efficient V2V Validation," in 40th Annual ACM Symposium On Applied Computing, 2025, pp. 1857-1866.
[32]
Y. Liu et al., "Detecting and removing bloated dependencies in CommonJS packages," Journal of Systems and Software, vol. 230, 2025.
[33]
H. Jin and P. Papadimitratos, "Accountable, Scalable and DoS-resilient Secure Vehicular Communication," Computers & Security, vol. 156, 2025.
[34]
G. Dong et al., "Obtaining Example-Based Explanations from Deep Neural Networks," in Advances in Intelligent Data Analysis XXIII - 23rd International Symposium on Intelligent Data Analysis, IDA 2025, Proceedings, 2025, pp. 432-443.
[35]
S. Ennadir et al., "Expressivity of Representation Learning on Continuous-Time Dynamic Graphs: An Information-Flow Centric Review," Transactions on Machine Learning Research, vol. 2025-April, 2025.
[36]
C. Ottaviani et al., "Advanced Routing Strategies for LEO and VLEO Constellations : Ensuring Polar Coverage," in 2025 12th Advanced Satellite Multimedia Systems Conference and the 18th Signal Processing for Space Communications Workshop, ASMS/SPSC 2025, 2025.
[37]
M. I. Al Hafiz et al., "A Reconfigurable Stream-Based FPGA Accelerator for Bayesian Confidence Propagation Neural Networks," in Applied Reconfigurable Computing. Architectures, Tools, and Applications - 21st International Symposium, ARC 2025, Proceedings, 2025, pp. 196-213.
[38]
P. Papadimitratos, "Mix-Zones in Wireless Mobile Networks," in Encyclopedia of Cryptography, Security and Privacy, Sushil Jajodia, Pierangela Samarati, Moti Yung Ed., 3rd ed. : Springer Nature, 2025, pp. 1555-1559.
[39]
R. Yadav et al., "Automatic Tracing in Task-Based Runtime Systems," in ASPLOS 2025 - Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025, pp. 84-99.
[40]
G. Shang et al., "Atlas-Chat : Adapting Large Language Models for Low-Resource Moroccan Arabic Dialect," in LoResLM 2025 - 1st Workshop on Language Models for Low-Resource Languages, Proceedings of the Workshop, 2025, pp. 9-30.
[41]
A. E. Samy, Z. T. Kefato and Š. Girdzijauskas, "Leap : Inductive Link Prediction via Learnable Topology Augmentation," in Machine Learning, Optimization, and Data Science - 10th International Conference, LOD 2024, Revised Selected Papers, 2025, pp. 448-463.
[42]
V. Komini and S. Girdzijauskas, "Integrating Logit Space Embeddings for Reliable Out-of-Distribution Detection," in Machine Learning, Optimization, and Data Science - 10th International Conference, LOD 2024, Revised Selected Papers, 2025, pp. 255-269.
[43]
R. Bresson et al., "KAGNNs : Kolmogorov-Arnold Networks meet Graph Learning," Transactions on Machine Learning Research, vol. 2025-March, pp. 1-29, 2025.
[44]
M. Spanghero, "Data verification for GNSS systems and protection of GNSS services," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:36, 2025.
[45]
M. Spanghero et al., "GNSS jammer localization and identification with airborne commercial GNSS receivers," IEEE Transactions on Information Forensics and Security, vol. 20, pp. 3550-3565, 2025.
[46]
G. Verardo et al., "FMM-Head: Enhancing Autoencoder-Based ECG Anomaly Detection with Prior Knowledge," in Pattern Recognition and Artificial Intelligence - 4th International Conference, ICPRAI 2024, Proceedings, 2025, pp. 18-32.
[47]
A. H. Akhavan Rahnama, "Evaluating the Faithfulness of Local Feature Attribution Explanations : Can We Trust Explainable AI?," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:23, 2025.
[48]
M. Spanghero and P. Papadimitratos, "Consumer INS coupled with carrier phase measurements for GNSS spoofing detection," in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[49]
A. Alkhatib, "Addressing Shortcomings of Explainable Machine Learning Methods," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:11, 2025.
[50]
E. Listo Zec, "Decentralized deep learning in statistically heterogeneous environments," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:4, 2025.
Full list in the KTH publications portal