Skip to main content
To KTH's start page

Publications

The 50 most recent publications from the Division of Software and Computer Systems:

[1]
Y. Gamage et al., "The design space of lockfiles across package managers," Empirical Software Engineering, vol. 31, no. 3, 2026.
[2]
S. Tahmasebi et al., "PureBiasoMeter : Decoupling Popularity Bias from User Fairness in LLM-Based Recommender Systems," in Recommender Systems for Sustainability and Social Good - Second International Workshop, RecSoGood 2025, Proceedings, 2026, pp. 155-168.
[3]
S. W.D. Chien et al., "ParaLog: Consistent Host-side Logging for Parallel Checkpoints," in SoCC 2025 - Proceedings of the 2025 ACM Symposium on Cloud Computing, 2026, pp. 59-73.
[4]
W. Liu and P. Papadimitratos, "Multimodal Location Spoofing: Federated Detection With RAIM-Based Self-Labeling," IEEE Open Journal of the Communications Society, vol. 7, pp. 769-785, 2026.
[5]
D. F. Perez-Ramirez, "Machine Learning-Driven Optimization in Networked Systems : Leveraging Graph Neural Networks to Solve Resource Allocation Problems," Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2026:09, 2026.
[6]
S. Shen et al., "Towards privacy preservation in smart grids via controlled redactable signatures," Journal of systems architecture, vol. 172, 2026.
[7]
D. F. Perez-Ramirez et al., "Robust Generalization of Graph Neural Networks for Scheduling Backscatter Communications at Scale," IEEE Transactions on Machine Learning in Communications and Networking, vol. 4, pp. 76-97, 2026.
[8]
A. Rao and M. Boman, "Self-Supervised Pretraining for User Performance Prediction Under Scarce Data Conditions," IEEE Transactions on Network and Service Management, vol. 23, pp. 112-122, 2026.
[9]
J. Spenger, P. Carbone and P. Haller, "Failure-Transparent Actors," in Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, pp. 81-113.
[10]
M. Soltani, M. Mirmohseni and P. Papadimitratos, "Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers," IEEE Transactions on Wireless Communications, vol. 25, pp. 4496-4513, 2026.
[11]
G. Dong, R. Bresson and H. Boström, "Detecting Attacks with Conformal Test Martingales," in Fourteenth Symposium On Conformal And Probabilistic Prediction With Applications, COPA 2025, 2025, pp. 758-761.
[12]
L. Froschauer, J. Langlet and A. Kassler, "Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed," in 34th International Conference on Computer Communications and Networks, ICCCN 2025, 2025.
[13]
C. Wang, M. Scazzariello and M. Chiesa, "From Scientific Texts to Verifiable Code : Automating the Process with Transformers," in 2025 IEEE/ACM International Workshop On Large Language Models For Code, LLM4CODE, 2025, pp. 213-216.
[14]
[15]
L. Puccioni et al., "Deriving Coding-Specific Sub-Models from LLMs using Resource-Efficient Pruning," in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[16]
D. Cipollone et al., "Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues," in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[17]
M. Canini et al., "Cloud abstractions for AI workloads," in APSys '25: Proceedings of the 16th ACM SIGOPS Asia-Pacific Workshop on Systems, 2025, pp. 98-105.
[18]
H. Li et al., "AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons," in PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, pp. 8-13.
[19]
X. Pang et al., "BI-RADS Boosted Breast Cancer Diagnosis With Masked Pretraining On Imbalanced Ultrasound Data," in 2025 IEEE International Conference on Multimedia and Expo: Journey to the Center of Machine Imagination, ICME 2025 - Conference Proceedings, 2025.
[20]
W. Liu and P. Papadimitratos, "Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services," IEEE Open Journal of the Communications Society, vol. 6, pp. 9229-9246, 2025.
[21]
N. Benso et al., "Distributed On-Demand Routing for VLEO Constellations with 3-Terminal Inter-Satellite Links," in 2025 33rd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2025, 2025.
[22]
X. Shi, A. Srinivasan and S. Pashami, "Counterfactual Explanation for Anomaly Detection using Graph Neural Network," in BEHAIV 2025 - Proceedings of the 2025 Workshop on AI for Understanding Human Behavior in Professional Settings, co-located with 28th European Conference on Artificial Intelligence, ECAI 2025, 2025, pp. 42-55.
[23]
G. Dong et al., "Explaining Deep Neural Networks with Example and Pixel Attribution," in Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, pp. 286-300.
[25]
B. Bera et al., "Fortifying V2RSU Communication with Post Quantum Security in the Green Internet of Vehicles," in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 2026-2032.
[26]
Z. Xing et al., "HMM-Based CSI Embedding for Trajectory Recovery via Feature Engineering on MIMO-OFDM Channels in LOS/NLOS Regions," in 2025 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2025, 2025.
[27]
Y. Mei et al., "Disaggregated State Management in Apache Flink® 2.0," in Proceedings of the VLDB Endowment, 2025, pp. 4846-4859.
[28]
L. Froschauer, J. Langlet and A. Kassler, "Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed," in ICCCN 2025 - 34th International Conference on Computer Communications and Networks, 2025.
[29]
F. Cornell et al., "Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors," in Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, pp. 1650-1663.
[30]
P. Sjösvärd, H. Jin and P. Papadimitratos, "DNS in the Time of Curiosity : A Tale of Collaborative User Privacy Protection," in Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025, 2025.
[31]
Z. Li and H. Boström, "FlowGuard: Guarding Flow Matching via Conformal Sampling," in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 775-777.
[32]
G. Dong, R. Bresson and H. Boström, "Detecting Attacks with Conformal Test Martingales," in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 758-761.
[33]
W. Liu and P. Papadimitratos, "Guardian Positioning System (GPS) for Location Based Services," in WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, pp. 88-99.
[34]
V. Gulisano et al., "Foreword," in Debs 2025 Proceedings of the 19th ACM International Conference on Distributed and Event Based Systems, 2025, pp. vi-vii.
[35]
W. Liu and P. Papadimitratos, "GNSS Spoofing Detection Based on Opportunistic Position Information," IEEE Internet of Things Journal, vol. 12, no. 17, pp. 36168-36182, 2025.
[36]
Z. Zhou, H. Jin and P. Papadimitratos, "Clogging DoS Resilient Bootstrapping of Efficient V2V Validation," in 40th Annual ACM Symposium On Applied Computing, 2025, pp. 1857-1866.
[37]
Y. Liu et al., "Detecting and removing bloated dependencies in CommonJS packages," Journal of Systems and Software, vol. 230, 2025.
[38]
H. Jin and P. Papadimitratos, "Accountable, Scalable and DoS-resilient Secure Vehicular Communication," Computers & Security, vol. 156, 2025.
[39]
S. Ennadir et al., "Expressivity of Representation Learning on Continuous-Time Dynamic Graphs: An Information-Flow Centric Review," Transactions on Machine Learning Research, vol. 2025-April, 2025.
[40]
C. Ottaviani et al., "Advanced Routing Strategies for LEO and VLEO Constellations : Ensuring Polar Coverage," in 2025 12th Advanced Satellite Multimedia Systems Conference and the 18th Signal Processing for Space Communications Workshop, ASMS/SPSC 2025, 2025.
[41]
M. I. Al Hafiz et al., "A Reconfigurable Stream-Based FPGA Accelerator for Bayesian Confidence Propagation Neural Networks," in Applied Reconfigurable Computing. Architectures, Tools, and Applications - 21st International Symposium, ARC 2025, Proceedings, 2025, pp. 196-213.
[42]
R. Yadav et al., "Automatic Tracing in Task-Based Runtime Systems," in ASPLOS 2025 - Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025, pp. 84-99.
[43]
G. Shang et al., "Atlas-Chat : Adapting Large Language Models for Low-Resource Moroccan Arabic Dialect," in LoResLM 2025 - 1st Workshop on Language Models for Low-Resource Languages, Proceedings of the Workshop, 2025, pp. 9-30.
[44]
M. Spanghero, "Data verification for GNSS systems and protection of GNSS services," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:36, 2025.
[45]
M. Spanghero et al., "GNSS jammer localization and identification with airborne commercial GNSS receivers," IEEE Transactions on Information Forensics and Security, vol. 20, pp. 3550-3565, 2025.
[46]
G. Verardo et al., "FMM-Head: Enhancing Autoencoder-Based ECG Anomaly Detection with Prior Knowledge," in Pattern Recognition and Artificial Intelligence - 4th International Conference, ICPRAI 2024, Proceedings, 2025, pp. 18-32.
[47]
A. H. Akhavan Rahnama, "Evaluating the Faithfulness of Local Feature Attribution Explanations : Can We Trust Explainable AI?," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:23, 2025.
[48]
M. Spanghero and P. Papadimitratos, "Consumer INS coupled with carrier phase measurements for GNSS spoofing detection," in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[49]
A. Alkhatib, "Addressing Shortcomings of Explainable Machine Learning Methods," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:11, 2025.
[50]
E. Listo Zec, "Decentralized deep learning in statistically heterogeneous environments," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:4, 2025.
Full list in the KTH publications portal