Publications
Link to the full list in the KTH publication portal.
TCS Publications, 50 latest
[1]
S. Thejaswi, J. Lauri and A. Gionis,
"Restless reachability problems in temporal graphs,"
Knowledge and Information Systems, 2025.
[2]
M. Eshghie,
"Securing Smart Contracts Against Business Logic Flaws,"
Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:56, 2025.
[3]
M. Ekerå and J. Gärtner,
"A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography,"
IACR Communications in Cryptology, vol. 2, no. 1, 2025.
[4]
[5]
[6]
V. Andersson et al.,
"UPPERCASE IS ALL YOU NEED,"
in SIGBOVIK 2025, Carnegie Mellon University, Pittsburgh, PA, USA, April 4, 2025, 2025.
[7]
E. Poorhadi,
"Formal Modelling of the Impact of Cyberattacks on Safety of Networked Control Systems,"
Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:39, 2025.
[8]
K. Vombatkere, A. Gionis and E. Terzi,
"Forming coordinated teams that balance task coverage and expert workload,"
Data mining and knowledge discovery, vol. 39, no. 3, 2025.
[9]
C. Izu et al.,
"Introducing Code Quality at CS1 Level : Examples and Activities,"
in ITiCSE WGR 2024 - Publication of the 2024 Working Group Reports on Innovation and Technology in Computer Science Education, 2025, pp. 339-377.
[10]
J. Augustine and M. Mohit Daga,
"Distributed Small Cuts using Semigroups,"
in ICDCN 2025 - Proceedings of the 26th International Conference on Distributed Computing and Networking, 2025, pp. 134-143.
[11]
A. de Almeida Borges et al.,
"Lessons for Interactive Theorem Proving Researchers from a Survey of Coq Users,"
Journal of automated reasoning, vol. 69, no. 1, 2025.
[12]
A. M. Ahmadian,
"To Secure a Flow : From Specification to Enforcement of Information Flow Control,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:22, 2025.
[13]
D. Oliveira et al.,
"Understanding Code Understandability Improvements in Code Reviews,"
IEEE Transactions on Software Engineering, vol. 51, no. 1, pp. 14-37, 2025.
[14]
F. Cornell et al.,
"Unsupervised Ontology- and Taxonomy Construction Through Hyperbolic Relational Domains and Ranges,"
in Machine Learning and Principles and Practice of Knowledge Discovery in Databases - International Workshops of ECML PKDD 2023, Revised Selected Papers, 2025, pp. 339-348.
[15]
J. Amilon and D. Gurov,
"Deductively Verified Program Models for Software Model Checking,"
in Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification - 12th International Symposium, ISoLA 2024, Proceedings, 2025, pp. 8-25.
[16]
E. Cornelissen, M. Shcherbakov and M. Balliu,
"GHUNTER : Universal Prototype Pollution Gadgets in JavaScript Runtimes,"
in PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, pp. 3693-3710.
[17]
Y. Ye et al.,
"Flow to Rare Events: An Application of Normalizing Flow in Temporal Importance Sampling for Automated Vehicle Validation<sup>∗</sup>,"
in IAVVC 2024 - IEEE International Automated Vehicle Validation Conference, Proceedings, 2024.
[18]
F. Reyes García, B. Baudry and M. Monperrus,
"Breaking-Good: Explaining Breaking Dependency Updates with Build Analysis,"
in Proceedings - 2024 IEEE International Conference on Source Code Analysis and Manipulation, SCAM 2024, 2024, pp. 36-46.
[19]
M. Ciaperoni et al.,
"Beam-search SIEVE for low-memory speech recognition,"
in Interspeech 2024, 2024, pp. 272-276.
[20]
M. Mikša and J. Nordström,
"A Generalized Method for Proving Polynomial Calculus Degree Lower Bounds,"
Journal of the ACM, vol. 71, no. 6, 2024.
[21]
C. Cesarano et al.,
"GoSurf: Identifying Software Supply Chain Attack Vectors in Go,"
in SCORED 2024 - Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, Co-Located with: CCS 2024, 2024, pp. 33-42.
[22]
A. M. Ahmadian, M. Soloviev and M. Balliu,
"Disjunctive Policies for Database-Backed Programs,"
in 2024 IEEE 37TH Computer Security Foundations Symposium, CSF 2024, 2024, pp. 388-402.
[23]
E. Poorhadi and E. Troubitsyna,
"Automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety,"
in Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops, 2024, pp. 61-73.
[24]
R.-C. Tzeng,
"Efficient Learning in Graphs and in Combinatorial Multi-Armed Bandits,"
Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:77, 2024.
[25]
B. Baudry et al.,
"Generative AI to Generate Test Data Generators,"
IEEE Software, vol. 41, no. 6, pp. 55-64, 2024.
[26]
M. A. Kuhail et al.,
"Designing a Haptic Boot for Space With Prompt Engineering : Process, Insights, and Implications,"
IEEE Access, vol. 12, pp. 134235-134255, 2024.
[27]
K. Etemadi,
"Efficient Exploration and Analysis of Program Repair Search Spaces,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:76, 2024.
[28]
E. Cornelissen, M. Shcherbakov and M. Balliu,
"GHunter : Universal Prototype Pollution Gadgets in JavaScript Runtimes,"
in Proceedings of the 33rd USENIX Security Symposium, 2024, pp. 3693-3710.
[29]
M. Shcherbakov,
"Code-Reuse Attacks in Managed Programming Languages and Runtimes,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:75, 2024.
[30]
E. Troubitsyna,
"Formal Analysis of Interactions Between Safety and Security Requirements,"
in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), : Springer Science and Business Media Deutschland GmbH, 2024, pp. 141-161.
[31]
N. Dayan, I. Bercea and R. Pagh,
"Aleph Filter : To Infinity in Constant Time,"
Proceedings of the VLDB Endowment, vol. 17, no. 11, pp. 3644-3656, 2024.
[32]
A. Andreasson et al.,
"Cybersecurity work at Swedish administrative authorities : taking action or waiting for approval,"
Cognition, Technology & Work, vol. 26, no. 4, pp. 709-731, 2024.
[33]
M. Aghvamipanah et al.,
"Activity Recognition Protection for IoT Trigger-Action Platforms,"
in Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 2024, pp. 600-616.
[34]
M. Ciaperoni, H. Xiao and A. Gionis,
"Efficient Exploration of the Rashomon Set of Rule-Set Models,"
in KDD 2024 - Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024, pp. 478-489.
[35]
E. Troubitsyna,
"Goal-Oriented Modeling in Fault Tolerant Service-Oriented Multi-Agent Systems,"
in Proceedings - 2024 IEEE 48th Annual Computers, Software, and Applications Conference, COMPSAC 2024, 2024, pp. 1568-1569.
[36]
M. Eshghie, M. Jafari and C. Artho,
"From Creation to Exploitation: The Oracle Lifecycle,"
in Proceedings - 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion, SANER-C 2024, 2024, pp. 23-34.
[37]
A. Silva, N. Saavedra and M. Monperrus,
"GitBug-Java : A Reproducible Benchmark of Recent Java Bugs,"
in 2024 IEEE/ACM 21St International Conference On Mining Software Repositories, Msr, 2024, pp. 118-122.
[38]
T. Marinaro et al.,
"Beyond Over-Protection : A Targeted Approach to Spectre Mitigation and Performance Optimization,"
in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024, pp. 203-216.
[39]
F. Reyes García et al.,
"BUMP : A Benchmark of Reproducible Breaking Dependency Updates,"
in Proceedings - 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024, 2024, pp. 159-170.
[40]
R. Glassey and A. Baltatzis,
"Active Repos : Integrating Generative AI Workflows into GitHub,"
in ITiCSE 2024 - Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, 2024, pp. 777-778.
[41]
U. Alam et al.,
"Entropy and Memory Aware Active Transfer Learning in Smart Sensing Systems,"
IEEE Access, vol. 12, pp. 88841-88861, 2024.
[42]
S. Fowler et al.,
"Behavioural Types for Heterogeneous Systems (Position Paper),"
in Proceedings - 15th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2024, 2024, pp. 37-48.
[43]
Y. Tian et al.,
"Driving Intention Recognition and Speed Prediction at Complex Urban Intersections Considering Traffic Environment,"
IEEE transactions on intelligent transportation systems (Print), vol. 25, no. 5, pp. 4470-4488, 2024.
[44]
I. Bercea, J. B. Tejs Houen and R. Pagh,
"Daisy Bloom Filters,"
in 19th Scandinavian Symposium on Algorithm Theory, SWAT 2024, 2024.
[45]
N. Saavedra, A. Silva and M. Monperrus,
"GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub Actions,"
in Proceedings - 2024 ACM/IEEE 46th International Conference on Software Engineering: Companion, ICSE-Companion 2024, 2024, pp. 1-5.
[46]
L. Oettershagen, H. Wang and A. Gionis,
"Finding Densest Subgraphs with Edge-Color Constraints,"
in WWW 2024 - Proceedings of the ACM Web Conference, 2024, pp. 936-947.
[47]
T. Lanciano et al.,
"A Survey on the Densest Subgraph Problem and its Variants,"
ACM Computing Surveys, vol. 56, no. 8, 2024.
[48]
C. Lidström,
"Automated Deductive Verification of Safety-Critical Embedded Software,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:17, 2024.
[49]
J. Amilon et al.,
"An Exercise in Mind Reading: Automatic Contract Inference for Frama-C,"
in Guide to Software Verification with Frama-C: Core Components, Usages, and Applications, : Springer Nature, 2024.
[50]
O. Bälter et al.,
"English-medium instruction and impact on academic performance : a randomized control study,"
Applied Linguistics Review, vol. 15, no. 6, pp. 2373-2396, 2024.