Till innehåll på sidan
Till KTH:s startsida

Publikationer

De 50 senaste publikationerna från avdelningen för programvaruteknik och datorsystem:

[1]
J. Spenger, P. Carbone och P. Haller, "Failure-Transparent Actors," i Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, s. 81-113.
[2]
L. Puccioni et al., "Deriving Coding-Specific Sub-Models from LLMs using Resource-Efficient Pruning," i Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[3]
D. Cipollone et al., "Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues," i Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[4]
M. Canini et al., "Cloud abstractions for AI workloads," i APSys '25: Proceedings of the 16th ACM SIGOPS Asia-Pacific Workshop on Systems, 2025, s. 98-105.
[5]
H. Li et al., "AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons," i PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, s. 8-13.
[6]
X. Pang et al., "BI-RADS Boosted Breast Cancer Diagnosis With Masked Pretraining On Imbalanced Ultrasound Data," i 2025 IEEE International Conference on Multimedia and Expo: Journey to the Center of Machine Imagination, ICME 2025 - Conference Proceedings, 2025.
[7]
W. Liu och P. Papadimitratos, "Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services," IEEE Open Journal of the Communications Society, vol. 6, s. 9229-9246, 2025.
[8]
Y. Huang et al., "Interference-Resilient Optical Wireless Positioning via Machine Learning-Enhanced Subset Filtering," i Proceedings of the 51st European Conference on Optical Communication, 2025.
[9]
W. J. Szczerek och A. Podobas, "IzhiRISC-V-a RISC-V-based Processor with Custom ISA Extension for Spiking Neuron Networks Processing with Izhikevich Neurons," i Proceedings of the SC’25 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis, 2025, s. 1667-1675.
[10]
N. Benso et al., "Distributed On-Demand Routing for VLEO Constellations with 3-Terminal Inter-Satellite Links," i 2025 33rd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2025, 2025.
[11]
X. Shi, A. Srinivasan och S. Pashami, "Counterfactual Explanation for Anomaly Detection using Graph Neural Network," i BEHAIV 2025 - Proceedings of the 2025 Workshop on AI for Understanding Human Behavior in Professional Settings, co-located with 28th European Conference on Artificial Intelligence, ECAI 2025, 2025, s. 42-55.
[12]
G. Dong et al., "Explaining Deep Neural Networks with Example and Pixel Attribution," i Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, s. 286-300.
[14]
B. Bera et al., "Fortifying V2RSU Communication with Post Quantum Security in the Green Internet of Vehicles," i ICC 2025 - IEEE International Conference on Communications, 2025, s. 2026-2032.
[15]
Z. Xing et al., "HMM-Based CSI Embedding for Trajectory Recovery via Feature Engineering on MIMO-OFDM Channels in LOS/NLOS Regions," i 2025 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2025, 2025.
[16]
Y. Mei et al., "Disaggregated State Management in Apache Flink® 2.0," i Proceedings of the VLDB Endowment, 2025, s. 4846-4859.
[17]
M. Soltani, M. Mirmohseni och P. Papadimitratos, "Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers," IEEE Transactions on Wireless Communications, 2025.
[18]
W. Johan, A. Hussain och P. Papadimitratos, "Jailbreaking Large Language Models Through Content Concretization," i GameSec 2025 : 16th Conference on Game Theory and AI for Security, 2025.
[19]
L. Froschauer, J. Langlet och A. Kassler, "Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed," i ICCCN 2025 - 34th International Conference on Computer Communications and Networks, 2025.
[20]
F. Cornell et al., "Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors," i Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, s. 1650-1663.
[21]
A. E. Samy, L. Giaretta och S. Girdzijauskas, "HopNet : Addressing Over-Squashing with Learnable Rewiring in GNNs," (Manuskript).
[22]
P. Sjösvärd, H. Jin och P. Papadimitratos, "DNS in the Time of Curiosity : A Tale of Collaborative User Privacy Protection," i Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025, 2025.
[23]
P. Sjösvärd, H. Jin och P. Papadimitratos, "LLUAD : Low-Latency User-Anonymized DNS," i 24th Workshop on Privacy in the Electronic Society held in conjunction with ACM CCS 2025, 13 October 2025, Taipei, Taiwan, 2025.
[24]
Z. Li och H. Boström, "FlowGuard: Guarding Flow Matching via Conformal Sampling," i Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, s. 775-777.
[25]
G. Dong, R. Bresson och H. Boström, "Detecting Attacks with Conformal Test Martingales," i Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, s. 758-761.
[26]
[27]
W. Liu och P. Papadimitratos, "Guardian Positioning System (GPS) for Location Based Services," i WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, s. 88-99.
[28]
E. Ståhl et al., "On the Benefits of Predictable Traffic in Virtual Switches: A Case Study," i ANRW 2025 - Proceedings of the 2025 Applied Networking Research Workshop, 2025, s. 113-119.
[29]
V. Gulisano et al., "Foreword," i Debs 2025 Proceedings of the 19th ACM International Conference on Distributed and Event Based Systems, 2025, s. vi-vii.
[30]
W. Liu och P. Papadimitratos, "GNSS Spoofing Detection Based on Opportunistic Position Information," IEEE Internet of Things Journal, 2025.
[31]
Z. Zhou, H. Jin och P. Papadimitratos, "Clogging DoS Resilient Bootstrapping of Efficient V2V Validation," i 40th Annual ACM Symposium On Applied Computing, 2025, s. 1857-1866.
[32]
Y. Liu et al., "Detecting and removing bloated dependencies in CommonJS packages," Journal of Systems and Software, vol. 230, 2025.
[33]
H. Jin och P. Papadimitratos, "Accountable, Scalable and DoS-resilient Secure Vehicular Communication," Computers & Security, vol. 156, 2025.
[34]
G. Dong et al., "Obtaining Example-Based Explanations from Deep Neural Networks," i Advances in Intelligent Data Analysis XXIII - 23rd International Symposium on Intelligent Data Analysis, IDA 2025, Proceedings, 2025, s. 432-443.
[35]
S. Ennadir et al., "Expressivity of Representation Learning on Continuous-Time Dynamic Graphs: An Information-Flow Centric Review," Transactions on Machine Learning Research, vol. 2025-April, 2025.
[36]
C. Ottaviani et al., "Advanced Routing Strategies for LEO and VLEO Constellations : Ensuring Polar Coverage," i 2025 12th Advanced Satellite Multimedia Systems Conference and the 18th Signal Processing for Space Communications Workshop, ASMS/SPSC 2025, 2025.
[37]
M. I. Al Hafiz et al., "A Reconfigurable Stream-Based FPGA Accelerator for Bayesian Confidence Propagation Neural Networks," i Applied Reconfigurable Computing. Architectures, Tools, and Applications - 21st International Symposium, ARC 2025, Proceedings, 2025, s. 196-213.
[38]
P. Papadimitratos, "Mix-Zones in Wireless Mobile Networks," i Encyclopedia of Cryptography, Security and Privacy, Sushil Jajodia, Pierangela Samarati, Moti Yung red., 3. uppl. : Springer Nature, 2025, s. 1555-1559.
[39]
R. Yadav et al., "Automatic Tracing in Task-Based Runtime Systems," i ASPLOS 2025 - Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025, s. 84-99.
[40]
G. Shang et al., "Atlas-Chat : Adapting Large Language Models for Low-Resource Moroccan Arabic Dialect," i LoResLM 2025 - 1st Workshop on Language Models for Low-Resource Languages, Proceedings of the Workshop, 2025, s. 9-30.
[41]
A. E. Samy, Z. T. Kefato och Š. Girdzijauskas, "Leap : Inductive Link Prediction via Learnable Topology Augmentation," i Machine Learning, Optimization, and Data Science - 10th International Conference, LOD 2024, Revised Selected Papers, 2025, s. 448-463.
[42]
V. Komini och S. Girdzijauskas, "Integrating Logit Space Embeddings for Reliable Out-of-Distribution Detection," i Machine Learning, Optimization, and Data Science - 10th International Conference, LOD 2024, Revised Selected Papers, 2025, s. 255-269.
[43]
R. Bresson et al., "KAGNNs : Kolmogorov-Arnold Networks meet Graph Learning," Transactions on Machine Learning Research, vol. 2025-March, s. 1-29, 2025.
[44]
M. Spanghero, "Data verification for GNSS systems and protection of GNSS services," Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:36, 2025.
[45]
M. Spanghero et al., "GNSS jammer localization and identification with airborne commercial GNSS receivers," IEEE Transactions on Information Forensics and Security, vol. 20, s. 3550-3565, 2025.
[46]
G. Verardo et al., "FMM-Head: Enhancing Autoencoder-Based ECG Anomaly Detection with Prior Knowledge," i Pattern Recognition and Artificial Intelligence - 4th International Conference, ICPRAI 2024, Proceedings, 2025, s. 18-32.
[47]
A. H. Akhavan Rahnama, "Evaluating the Faithfulness of Local Feature Attribution Explanations : Can We Trust Explainable AI?," Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:23, 2025.
[48]
M. Spanghero och P. Papadimitratos, "Consumer INS coupled with carrier phase measurements for GNSS spoofing detection," i ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[49]
A. Alkhatib, "Addressing Shortcomings of Explainable Machine Learning Methods," Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:11, 2025.
[50]
E. Listo Zec, "Decentralized deep learning in statistically heterogeneous environments," Doktorsavhandling Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:4, 2025.
Fullständig lista i KTH:s publikationsportal