Publikationer
De 50 senaste publikationerna från avdelningen för programvaruteknik och datorsystem:
[1]
J. Spenger, P. Carbone och P. Haller,
"Failure-Transparent Actors,"
i Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, s. 81-113.
[2]
L. Puccioni et al.,
"Deriving Coding-Specific Sub-Models from LLMs using Resource-Efficient Pruning,"
i Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[3]
D. Cipollone et al.,
"Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues,"
i Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[4]
M. Canini et al.,
"Cloud abstractions for AI workloads,"
i APSys '25: Proceedings of the 16th ACM SIGOPS Asia-Pacific Workshop on Systems, 2025, s. 98-105.
[5]
H. Li et al.,
"AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons,"
i PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, s. 8-13.
[6]
X. Pang et al.,
"BI-RADS Boosted Breast Cancer Diagnosis With Masked Pretraining On Imbalanced Ultrasound Data,"
i 2025 IEEE International Conference on Multimedia and Expo: Journey to the Center of Machine Imagination, ICME 2025 - Conference Proceedings, 2025.
[7]
W. Liu och P. Papadimitratos,
"Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services,"
IEEE Open Journal of the Communications Society, vol. 6, s. 9229-9246, 2025.
[8]
Y. Huang et al.,
"Interference-Resilient Optical Wireless Positioning via Machine Learning-Enhanced Subset Filtering,"
i Proceedings of the 51st European Conference on Optical Communication, 2025.
[9]
W. J. Szczerek och A. Podobas,
"IzhiRISC-V-a RISC-V-based Processor with Custom ISA Extension for Spiking Neuron Networks Processing with Izhikevich Neurons,"
i Proceedings of the SC’25 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis, 2025, s. 1667-1675.
[10]
N. Benso et al.,
"Distributed On-Demand Routing for VLEO Constellations with 3-Terminal Inter-Satellite Links,"
i 2025 33rd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2025, 2025.
[11]
X. Shi, A. Srinivasan och S. Pashami,
"Counterfactual Explanation for Anomaly Detection using Graph Neural Network,"
i BEHAIV 2025 - Proceedings of the 2025 Workshop on AI for Understanding Human Behavior in Professional Settings, co-located with 28th European Conference on Artificial Intelligence, ECAI 2025, 2025, s. 42-55.
[12]
G. Dong et al.,
"Explaining Deep Neural Networks with Example and Pixel Attribution,"
i Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, s. 286-300.
[13]
[14]
B. Bera et al.,
"Fortifying V2RSU Communication with Post Quantum Security in the Green Internet of Vehicles,"
i ICC 2025 - IEEE International Conference on Communications, 2025, s. 2026-2032.
[15]
Z. Xing et al.,
"HMM-Based CSI Embedding for Trajectory Recovery via Feature Engineering on MIMO-OFDM Channels in LOS/NLOS Regions,"
i 2025 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2025, 2025.
[16]
Y. Mei et al.,
"Disaggregated State Management in Apache Flink® 2.0,"
i Proceedings of the VLDB Endowment, 2025, s. 4846-4859.
[17]
M. Soltani, M. Mirmohseni och P. Papadimitratos,
"Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers,"
IEEE Transactions on Wireless Communications, 2025.
[18]
W. Johan, A. Hussain och P. Papadimitratos,
"Jailbreaking Large Language Models Through Content Concretization,"
i GameSec 2025 : 16th Conference on Game Theory and AI for Security, 2025.
[19]
L. Froschauer, J. Langlet och A. Kassler,
"Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed,"
i ICCCN 2025 - 34th International Conference on Computer Communications and Networks, 2025.
[20]
F. Cornell et al.,
"Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors,"
i Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, s. 1650-1663.
[21]
A. E. Samy, L. Giaretta och S. Girdzijauskas,
"HopNet : Addressing Over-Squashing with Learnable Rewiring in GNNs,"
(Manuskript).
[22]
P. Sjösvärd, H. Jin och P. Papadimitratos,
"DNS in the Time of Curiosity : A Tale of Collaborative User Privacy Protection,"
i Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025, 2025.
[23]
P. Sjösvärd, H. Jin och P. Papadimitratos,
"LLUAD : Low-Latency User-Anonymized DNS,"
i 24th Workshop on Privacy in the Electronic Society held in conjunction with ACM CCS 2025, 13 October 2025, Taipei, Taiwan, 2025.
[24]
Z. Li och H. Boström,
"FlowGuard: Guarding Flow Matching via Conformal Sampling,"
i Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, s. 775-777.
[25]
G. Dong, R. Bresson och H. Boström,
"Detecting Attacks with Conformal Test Martingales,"
i Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, s. 758-761.
[26]
K. Hammerfald et al.,
"Leveraging large language models to identify microcounseling skills in psychotherapy transcripts,"
Psychotherapy Research, s. 1-19, 2025.
[27]
W. Liu och P. Papadimitratos,
"Guardian Positioning System (GPS) for Location Based Services,"
i WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, s. 88-99.
[28]
E. Ståhl et al.,
"On the Benefits of Predictable Traffic in Virtual Switches: A Case Study,"
i ANRW 2025 - Proceedings of the 2025 Applied Networking Research Workshop, 2025, s. 113-119.
[29]
V. Gulisano et al.,
"Foreword,"
i Debs 2025 Proceedings of the 19th ACM International Conference on Distributed and Event Based Systems, 2025, s. vi-vii.
[30]
W. Liu och P. Papadimitratos,
"GNSS Spoofing Detection Based on Opportunistic Position Information,"
IEEE Internet of Things Journal, 2025.
[31]
Z. Zhou, H. Jin och P. Papadimitratos,
"Clogging DoS Resilient Bootstrapping of Efficient V2V Validation,"
i 40th Annual ACM Symposium On Applied Computing, 2025, s. 1857-1866.
[32]
Y. Liu et al.,
"Detecting and removing bloated dependencies in CommonJS packages,"
Journal of Systems and Software, vol. 230, 2025.
[33]
H. Jin och P. Papadimitratos,
"Accountable, Scalable and DoS-resilient Secure Vehicular Communication,"
Computers & Security, vol. 156, 2025.
[34]
G. Dong et al.,
"Obtaining Example-Based Explanations from Deep Neural Networks,"
i Advances in Intelligent Data Analysis XXIII - 23rd International Symposium on Intelligent Data Analysis, IDA 2025, Proceedings, 2025, s. 432-443.
[35]
S. Ennadir et al.,
"Expressivity of Representation Learning on Continuous-Time Dynamic Graphs: An Information-Flow Centric Review,"
Transactions on Machine Learning Research, vol. 2025-April, 2025.
[36]
C. Ottaviani et al.,
"Advanced Routing Strategies for LEO and VLEO Constellations : Ensuring Polar Coverage,"
i 2025 12th Advanced Satellite Multimedia Systems Conference and the 18th Signal Processing for Space Communications Workshop, ASMS/SPSC 2025, 2025.
[37]
M. I. Al Hafiz et al.,
"A Reconfigurable Stream-Based FPGA Accelerator for Bayesian Confidence Propagation Neural Networks,"
i Applied Reconfigurable Computing. Architectures, Tools, and Applications - 21st International Symposium, ARC 2025, Proceedings, 2025, s. 196-213.
[38]
P. Papadimitratos,
"Mix-Zones in Wireless Mobile Networks,"
i Encyclopedia of Cryptography, Security and Privacy, Sushil Jajodia, Pierangela Samarati, Moti Yung red., 3. uppl. : Springer Nature, 2025, s. 1555-1559.
[39]
R. Yadav et al.,
"Automatic Tracing in Task-Based Runtime Systems,"
i ASPLOS 2025 - Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025, s. 84-99.
[40]
G. Shang et al.,
"Atlas-Chat : Adapting Large Language Models for Low-Resource Moroccan Arabic Dialect,"
i LoResLM 2025 - 1st Workshop on Language Models for Low-Resource Languages, Proceedings of the Workshop, 2025, s. 9-30.
[41]
A. E. Samy, Z. T. Kefato och Š. Girdzijauskas,
"Leap : Inductive Link Prediction via Learnable Topology Augmentation,"
i Machine Learning, Optimization, and Data Science - 10th International Conference, LOD 2024, Revised Selected Papers, 2025, s. 448-463.
[42]
V. Komini och S. Girdzijauskas,
"Integrating Logit Space Embeddings for Reliable Out-of-Distribution Detection,"
i Machine Learning, Optimization, and Data Science - 10th International Conference, LOD 2024, Revised Selected Papers, 2025, s. 255-269.
[43]
R. Bresson et al.,
"KAGNNs : Kolmogorov-Arnold Networks meet Graph Learning,"
Transactions on Machine Learning Research, vol. 2025-March, s. 1-29, 2025.
[44]
M. Spanghero,
"Data verification for GNSS systems and protection of GNSS services,"
Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:36, 2025.
[45]
M. Spanghero et al.,
"GNSS jammer localization and identification with airborne commercial GNSS receivers,"
IEEE Transactions on Information Forensics and Security, vol. 20, s. 3550-3565, 2025.
[46]
G. Verardo et al.,
"FMM-Head: Enhancing Autoencoder-Based ECG Anomaly Detection with Prior Knowledge,"
i Pattern Recognition and Artificial Intelligence - 4th International Conference, ICPRAI 2024, Proceedings, 2025, s. 18-32.
[47]
A. H. Akhavan Rahnama,
"Evaluating the Faithfulness of Local Feature Attribution Explanations : Can We Trust Explainable AI?,"
Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:23, 2025.
[48]
M. Spanghero och P. Papadimitratos,
"Consumer INS coupled with carrier phase measurements for GNSS spoofing detection,"
i ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[49]
A. Alkhatib,
"Addressing Shortcomings of Explainable Machine Learning Methods,"
Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:11, 2025.
[50]
E. Listo Zec,
"Decentralized deep learning in statistically heterogeneous environments,"
Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:4, 2025.