Publications
The 50 most recent publications from the Division of Software and Computer Systems:
[1]
Y. Gamage et al.,
"The design space of lockfiles across package managers,"
Empirical Software Engineering, vol. 31, no. 3, 2026.
[2]
S. Tahmasebi et al.,
"PureBiasoMeter : Decoupling Popularity Bias from User Fairness in LLM-Based Recommender Systems,"
in Recommender Systems for Sustainability and Social Good - Second International Workshop, RecSoGood 2025, Proceedings, 2026, pp. 155-168.
[3]
S. W.D. Chien et al.,
"ParaLog: Consistent Host-side Logging for Parallel Checkpoints,"
in SoCC 2025 - Proceedings of the 2025 ACM Symposium on Cloud Computing, 2026, pp. 59-73.
[4]
W. Liu and P. Papadimitratos,
"Multimodal Location Spoofing: Federated Detection With RAIM-Based Self-Labeling,"
IEEE Open Journal of the Communications Society, vol. 7, pp. 769-785, 2026.
[5]
D. F. Perez-Ramirez,
"Machine Learning-Driven Optimization in Networked Systems : Leveraging Graph Neural Networks to Solve Resource Allocation Problems,"
Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2026:09, 2026.
[6]
S. Shen et al.,
"Towards privacy preservation in smart grids via controlled redactable signatures,"
Journal of systems architecture, vol. 172, 2026.
[7]
D. F. Perez-Ramirez et al.,
"Robust Generalization of Graph Neural Networks for Scheduling Backscatter Communications at Scale,"
IEEE Transactions on Machine Learning in Communications and Networking, vol. 4, pp. 76-97, 2026.
[8]
A. Rao and M. Boman,
"Self-Supervised Pretraining for User Performance Prediction Under Scarce Data Conditions,"
IEEE Transactions on Network and Service Management, vol. 23, pp. 112-122, 2026.
[9]
J. Spenger, P. Carbone and P. Haller,
"Failure-Transparent Actors,"
in Concurrent Programming, Open Systems and Formal Methods, : Springer Nature, 2026, pp. 81-113.
[10]
M. Soltani, M. Mirmohseni and P. Papadimitratos,
"Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers,"
IEEE Transactions on Wireless Communications, vol. 25, pp. 4496-4513, 2026.
[11]
G. Dong, R. Bresson and H. Boström,
"Detecting Attacks with Conformal Test Martingales,"
in Fourteenth Symposium On Conformal And Probabilistic Prediction With Applications, COPA 2025, 2025, pp. 758-761.
[12]
L. Froschauer, J. Langlet and A. Kassler,
"Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed,"
in 34th International Conference on Computer Communications and Networks, ICCCN 2025, 2025.
[13]
C. Wang, M. Scazzariello and M. Chiesa,
"From Scientific Texts to Verifiable Code : Automating the Process with Transformers,"
in 2025 IEEE/ACM International Workshop On Large Language Models For Code, LLM4CODE, 2025, pp. 213-216.
[14]
S. Ghani et al.,
"Conversational Agents for Building Energy Efficiency - Advising Housing Cooperatives in Stockholm on Reducing Energy Consumption,"
in IOP Conference Series: Earth and Environmental Science, 2025.
[15]
L. Puccioni et al.,
"Deriving Coding-Specific Sub-Models from LLMs using Resource-Efficient Pruning,"
in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[16]
D. Cipollone et al.,
"Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues,"
in Proceedings of IEEE/ACM International Workshop on Large Language Models for Code 2025, LLM4Code 2025, 2025.
[17]
M. Canini et al.,
"Cloud abstractions for AI workloads,"
in APSys '25: Proceedings of the 16th ACM SIGOPS Asia-Pacific Workshop on Systems, 2025, pp. 98-105.
[18]
H. Li et al.,
"AttentionGuard : Transformer-based Misbehavior Detection for Secure Vehicular Platoons,"
in PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, 2025, pp. 8-13.
[19]
X. Pang et al.,
"BI-RADS Boosted Breast Cancer Diagnosis With Masked Pretraining On Imbalanced Ultrasound Data,"
in 2025 IEEE International Conference on Multimedia and Expo: Journey to the Center of Machine Imagination, ICME 2025 - Conference Proceedings, 2025.
[20]
W. Liu and P. Papadimitratos,
"Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services,"
IEEE Open Journal of the Communications Society, vol. 6, pp. 9229-9246, 2025.
[21]
N. Benso et al.,
"Distributed On-Demand Routing for VLEO Constellations with 3-Terminal Inter-Satellite Links,"
in 2025 33rd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2025, 2025.
[22]
X. Shi, A. Srinivasan and S. Pashami,
"Counterfactual Explanation for Anomaly Detection using Graph Neural Network,"
in BEHAIV 2025 - Proceedings of the 2025 Workshop on AI for Understanding Human Behavior in Professional Settings, co-located with 28th European Conference on Artificial Intelligence, ECAI 2025, 2025, pp. 42-55.
[23]
G. Dong et al.,
"Explaining Deep Neural Networks with Example and Pixel Attribution,"
in Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, pp. 286-300.
[24]
[25]
B. Bera et al.,
"Fortifying V2RSU Communication with Post Quantum Security in the Green Internet of Vehicles,"
in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 2026-2032.
[26]
Z. Xing et al.,
"HMM-Based CSI Embedding for Trajectory Recovery via Feature Engineering on MIMO-OFDM Channels in LOS/NLOS Regions,"
in 2025 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2025, 2025.
[27]
Y. Mei et al.,
"Disaggregated State Management in Apache Flink® 2.0,"
in Proceedings of the VLDB Endowment, 2025, pp. 4846-4859.
[28]
L. Froschauer, J. Langlet and A. Kassler,
"Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed,"
in ICCCN 2025 - 34th International Conference on Computer Communications and Networks, 2025.
[29]
F. Cornell et al.,
"Are We Wasting Time? A Fast, Accurate Performance Evaluation Framework for Knowledge Graph Link Predictors,"
in Proceedings - 2025 IEEE 41st International Conference on Data Engineering, ICDE 2025, 2025, pp. 1650-1663.
[30]
P. Sjösvärd, H. Jin and P. Papadimitratos,
"DNS in the Time of Curiosity : A Tale of Collaborative User Privacy Protection,"
in Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025, 2025.
[31]
Z. Li and H. Boström,
"FlowGuard: Guarding Flow Matching via Conformal Sampling,"
in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 775-777.
[32]
G. Dong, R. Bresson and H. Boström,
"Detecting Attacks with Conformal Test Martingales,"
in Proceedings of the 14th Symposium on Conformal and Probabilistic Prediction with Applications, COPA 2025, 2025, pp. 758-761.
[33]
W. Liu and P. Papadimitratos,
"Guardian Positioning System (GPS) for Location Based Services,"
in WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, pp. 88-99.
[34]
V. Gulisano et al.,
"Foreword,"
in Debs 2025 Proceedings of the 19th ACM International Conference on Distributed and Event Based Systems, 2025, pp. vi-vii.
[35]
W. Liu and P. Papadimitratos,
"GNSS Spoofing Detection Based on Opportunistic Position Information,"
IEEE Internet of Things Journal, vol. 12, no. 17, pp. 36168-36182, 2025.
[36]
Z. Zhou, H. Jin and P. Papadimitratos,
"Clogging DoS Resilient Bootstrapping of Efficient V2V Validation,"
in 40th Annual ACM Symposium On Applied Computing, 2025, pp. 1857-1866.
[37]
Y. Liu et al.,
"Detecting and removing bloated dependencies in CommonJS packages,"
Journal of Systems and Software, vol. 230, 2025.
[38]
H. Jin and P. Papadimitratos,
"Accountable, Scalable and DoS-resilient Secure Vehicular Communication,"
Computers & Security, vol. 156, 2025.
[39]
S. Ennadir et al.,
"Expressivity of Representation Learning on Continuous-Time Dynamic Graphs: An Information-Flow Centric Review,"
Transactions on Machine Learning Research, vol. 2025-April, 2025.
[40]
C. Ottaviani et al.,
"Advanced Routing Strategies for LEO and VLEO Constellations : Ensuring Polar Coverage,"
in 2025 12th Advanced Satellite Multimedia Systems Conference and the 18th Signal Processing for Space Communications Workshop, ASMS/SPSC 2025, 2025.
[41]
M. I. Al Hafiz et al.,
"A Reconfigurable Stream-Based FPGA Accelerator for Bayesian Confidence Propagation Neural Networks,"
in Applied Reconfigurable Computing. Architectures, Tools, and Applications - 21st International Symposium, ARC 2025, Proceedings, 2025, pp. 196-213.
[42]
R. Yadav et al.,
"Automatic Tracing in Task-Based Runtime Systems,"
in ASPLOS 2025 - Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025, pp. 84-99.
[43]
G. Shang et al.,
"Atlas-Chat : Adapting Large Language Models for Low-Resource Moroccan Arabic Dialect,"
in LoResLM 2025 - 1st Workshop on Language Models for Low-Resource Languages, Proceedings of the Workshop, 2025, pp. 9-30.
[44]
M. Spanghero,
"Data verification for GNSS systems and protection of GNSS services,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:36, 2025.
[45]
M. Spanghero et al.,
"GNSS jammer localization and identification with airborne commercial GNSS receivers,"
IEEE Transactions on Information Forensics and Security, vol. 20, pp. 3550-3565, 2025.
[46]
G. Verardo et al.,
"FMM-Head: Enhancing Autoencoder-Based ECG Anomaly Detection with Prior Knowledge,"
in Pattern Recognition and Artificial Intelligence - 4th International Conference, ICPRAI 2024, Proceedings, 2025, pp. 18-32.
[47]
A. H. Akhavan Rahnama,
"Evaluating the Faithfulness of Local Feature Attribution Explanations : Can We Trust Explainable AI?,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:23, 2025.
[48]
M. Spanghero and P. Papadimitratos,
"Consumer INS coupled with carrier phase measurements for GNSS spoofing detection,"
in ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA, 2025.
[49]
A. Alkhatib,
"Addressing Shortcomings of Explainable Machine Learning Methods,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:11, 2025.
[50]
E. Listo Zec,
"Decentralized deep learning in statistically heterogeneous environments,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:4, 2025.