Publications
Link to the full list in the KTH publication portal.
TCS Publications, 50 latest
[1]
K. Etemadi et al.,
"Mokav: Execution-driven differential testing with LLMs,"
Journal of Systems and Software, vol. 230, 2025.
[2]
D. J. Bouvier et al.,
"GenAI Integration in Upper-Level Computing Courses,"
in ITiCSE 2025 - Proceedings of the 30th ACM Conference on Innovation and Technology in Computer Science Education, 2025, pp. 691-692.
[3]
J. Blikstad et al.,
"Global vs. s-t Vertex Connectivity Beyond Sequential : Almost-Perfect Reductions and Near-Optimal Separations,"
in STOC 2025 - Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025, pp. 2305-2316.
[4]
P. Austrin et al.,
"Algorithms for the Diverse-k-SAT Problem : The Geometry of Satisfying Assignments,"
in 52nd International Colloquium on Automata, Languages, and Programming, ICALP 2025, 2025.
[5]
A. Silva, S. Fang and M. Monperrus,
"RepairLLaMA : Efficient Representations and Fine-Tuned Adapters for Program Repair,"
IEEE Transactions on Software Engineering, vol. 51, no. 8, pp. 2366-2380, 2025.
[6]
A. Sharma,
"Build and Runtime Integrity for Java,"
in Proceedings - 2025 IEEE/ACM 47th International Conference on Software Engineering, ICSE-Companion 2025, 2025, pp. 145-147.
[7]
P. Kamboj et al.,
"Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures,"
in Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings, 2025, pp. 219-241.
[8]
S. Bobadilla et al.,
"SOBO: A Feedback Bot to Nudge Code Quality in Programming Courses,"
in Proceedings - 2025 IEEE/ACM 37th International Conference on Software Engineering Education and Training, CSEE and T 2025, 2025, p. 229.
[9]
S. Amer-Yahia et al.,
"Towards Reliable Conversational Data Analytics,"
in 28th International Conference on Extending Database Technology, EDBT 2025, Barcelona, Spain, Mar 25 2025 - Mar 28 2025, 2025, pp. 962-969.
[10]
J. Gulliksen et al.,
"Technology Enhanced Accessible Learning (TEAL) : History, Purpose, Evolution, and the Future,"
in EDULEARN25 Proceedings, 2025, pp. 5274-5282.
[11]
Y. Liu et al.,
"Detecting and removing bloated dependencies in CommonJS packages,"
Journal of Systems and Software, vol. 230, 2025.
[12]
H. Wang, S. Tu and A. Gionis,
"Sequential Diversification with Provable Guarantees,"
in Proceedings Of The Eighteenth Acm International Conference On Web Search And Data Mining, WSDM 2025, 2025, pp. 345-353.
[13]
G. Preti et al.,
"POLARIS : Sampling from the Multigraph Configuration Model with Prescribed Color Assortativity,"
in Proceedings Of The Eighteenth Acm International Conference On Web Search And Data Mining, Wsdm 2025, 2025, pp. 30-39.
[14]
M. Sevenhuijsen, K. Etemadi and M. Nyberg,
"VeCoGen: Automating Generation of Formally Verified C Code With Large Language Models,"
in FormaliSE 2025: ACM/IEEE International Conference on Formal Methods in Software Engineering, Ottawa, Canada, April 27-28, 2025., 2025.
[15]
M. M. Ahmadpanah et al.,
"CodeX : Contextual Flow Tracking for Browser Extensions,"
in Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, 2025.
[16]
Y. Liu et al.,
"Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction,"
in Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, 2025, pp. 147-158.
[17]
X. Liu et al.,
"ContractViz : Extending Eclipse Trace Compass for Smart Contract Transaction Analysis,"
in Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, 2025, pp. 819-823.
[18]
D. Lundberg, R. Guanciale and M. Dam,
"Proof-Producing Symbolic Execution for P4,"
in Verified Software. Theories, Tools and Experiments - 16th International Conference, VSTTE 2024, Revised Selected Papers, 2025, pp. 70-83.
[19]
G. Zhang, I. Sarpe and A. Gionis,
"Efficient and Practical Approximation Algorithms for Advertising in Content Feeds,"
in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 3193-3203.
[20]
A. Gadekar, A. Gionis and S. Thejaswi,
"Fair Clustering for Data Summarization : Improved Approximation Algorithms and Complexity Insights,"
in WWW 2025 - Proceedings of the ACM Web Conference, 2025, pp. 4458-4469.
[21]
E. Riese et al.,
"Experiences, Impacts and Implications of a STINT Teaching Sabbatical,"
in KTH SoTL 2025, KTH Royal Institute of Technology, Sweden, May 20, 2025., 2025.
[22]
K. Falkenberg et al.,
"Combining pure question-based learning and interactive audio for inclusive sound and music education,"
in INTED2025 Proceedings, 2025.
[23]
J. Berengueres,
"Comparing lesson plan-driven and ask-me-anything chatbots: teaching a UNIX Shell course,"
Discover Education, vol. 4, no. 1, 2025.
[24]
S. Dalleiger, J. Vreeken and M. Kamp,
"Federated Binary Matrix Factorization Using Proximal Optimization,"
in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16144-16152.
[25]
S. Tu,
"Models and Algorithms for Addressing Challenges in Online Social Networks,"
Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:57, 2025.
[26]
S. Dalleiger and A. Gionis,
"Creating Coherence in Federated Non-Negative Matrix Factorization,"
in 39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025, Philadelphia, United States of America, Feb 25 2025 - Mar 4 2025, 2025, pp. 16135-16143.
[27]
S. Thejaswi, J. Lauri and A. Gionis,
"Restless reachability problems in temporal graphs,"
Knowledge and Information Systems, 2025.
[28]
M. Eshghie,
"Securing Smart Contracts Against Business Logic Flaws,"
Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:56, 2025.
[29]
M. Ekerå and J. Gärtner,
"A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography,"
IACR Communications in Cryptology, vol. 2, no. 1, 2025.
[30]
[31]
[32]
V. Andersson et al.,
"UPPERCASE IS ALL YOU NEED,"
in SIGBOVIK : A Record of the Proceedings of SIGBOVIK 2025, 2025, pp. 24-35.
[33]
E. Poorhadi,
"Formal Modelling of the Impact of Cyberattacks on Safety of Networked Control Systems,"
Doctoral thesis Stockholm, Sweden : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:39, 2025.
[34]
K. Vombatkere, A. Gionis and E. Terzi,
"Forming coordinated teams that balance task coverage and expert workload,"
Data mining and knowledge discovery, vol. 39, no. 3, 2025.
[35]
C. Izu et al.,
"Introducing Code Quality at CS1 Level : Examples and Activities,"
in ITiCSE WGR 2024 - Publication of the 2024 Working Group Reports on Innovation and Technology in Computer Science Education, 2025, pp. 339-377.
[36]
J. Augustine and M. Mohit Daga,
"Distributed Small Cuts using Semigroups,"
in ICDCN 2025 - Proceedings of the 26th International Conference on Distributed Computing and Networking, 2025, pp. 134-143.
[37]
A. de Almeida Borges et al.,
"Lessons for Interactive Theorem Proving Researchers from a Survey of Coq Users,"
Journal of automated reasoning, vol. 69, no. 1, 2025.
[38]
A. M. Ahmadian,
"To Secure a Flow : From Specification to Enforcement of Information Flow Control,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2025:22, 2025.
[39]
D. Oliveira et al.,
"Understanding Code Understandability Improvements in Code Reviews,"
IEEE Transactions on Software Engineering, vol. 51, no. 1, pp. 14-37, 2025.
[40]
F. Cornell et al.,
"Unsupervised Ontology- and Taxonomy Construction Through Hyperbolic Relational Domains and Ranges,"
in Machine Learning and Principles and Practice of Knowledge Discovery in Databases - International Workshops of ECML PKDD 2023, Revised Selected Papers, 2025, pp. 339-348.
[41]
J. Amilon and D. Gurov,
"Deductively Verified Program Models for Software Model Checking,"
in Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification - 12th International Symposium, ISoLA 2024, Proceedings, 2025, pp. 8-25.
[42]
M. A. Kuhail et al.,
Advances, Applications and the Future of Haptic Technology.
Springer Nature, 2024.
[43]
J. Spenger, P. Carbone and P. Haller,
"A Survey of Actor-Like Programming Models for Serverless Computing,"
in Active Object Languages : Current Research Trends, Frank de Boer, Ferruccio Damiani, Reiner Hähnle, Einar Broch Johnsen, Eduard Kamburjan Ed., : Springer Nature, 2024, pp. 123-146.
[44]
M. Mikša and J. Nordström,
"A Generalized Method for Proving Polynomial Calculus Degree Lower Bounds,"
Journal of the ACM, vol. 71, no. 6, 2024.
[45]
N. Dayan, I. Bercea and R. Pagh,
"Aleph Filter : To Infinity in Constant Time,"
Proceedings of the VLDB Endowment, vol. 17, no. 11, pp. 3644-3656, 2024.
[46]
M. Aghvamipanah et al.,
"Activity Recognition Protection for IoT Trigger-Action Platforms,"
in Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 2024, pp. 600-616.
[47]
R. Glassey and A. Baltatzis,
"Active Repos : Integrating Generative AI Workflows into GitHub,"
in ITiCSE 2024 - Proceedings of the 2024 Conference Innovation and Technology in Computer Science Education, 2024, pp. 777-778.
[48]
T. Lanciano et al.,
"A Survey on the Densest Subgraph Problem and its Variants,"
ACM Computing Surveys, vol. 56, no. 8, 2024.
[49]
C. Lidström,
"Automated Deductive Verification of Safety-Critical Embedded Software,"
Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:17, 2024.
[50]
J. Amilon et al.,
"An Exercise in Mind Reading: Automatic Contract Inference for Frama-C,"
in Guide to Software Verification with Frama-C: Core Components, Usages, and Applications, : Springer Nature, 2024.