Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Bhargavan, K., Buyse, M., Franceschino, L., Hansen, L. L., Kiefer, F., Schneider-Bensch, J. & Spitters, B. (2025). hax: Verifying Security-Critical Rust Software Using Multiple Provers. In J. Protzenko & A. Raad (Eds.), Verified Software. Theories, Tools and Experiments - 16th International Conference, VSTTE 2024, Revised Selected Papers (pp. 96-119). Springer. https://doi.org/10.1007/978-3-031-86695-1_7
Wang, H., Weidner, F., Abdrabou, Y., Pfeuffer, K. & Gellersen, H. (2025). HeadDepth: Gaze Raycasting with Head Pitch for Depth Control. In U. Eck, G. Lee, A. Plopski, M. Smith, Q. Sun & M. Tatzgern (Eds.), Proceedings - 2025 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2025 (pp. 370-380). IEEE. https://doi.org/10.1109/ISMAR67309.2025.00048
Wang, H., Sidenmark, L., Weidner, F., Newn, J. & Gellersen, H. (2025). HeadShift: Head Pointing with Dynamic Control-Display Gain. ACM Transactions on Computer-Human Interaction, 32(1), Article 2. https://doi.org/10.1145/3689434
Aranha, D. F., Costache, A., Guimaraes, A. & Soria-Vazquez, E. (2025). HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical. In K.-M. Chung & Y. Sasaki (Eds.), Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. V, pp. 302-334). Springer. https://doi.org/10.1007/978-981-96-0935-2_10
Hansen, L. L. (2025). High Assurance Cryptographic Software using Rust and Rocq. [PhD dissertation, Aarhus University].
Sun, G., Karras, P. & Zhang, Q. (2025). Highly Efficient Direct Analytics on Semantic-Aware Time Series Data Compression. In M. Valenti, D. Reed & M. Torres (Eds.), ICC 2025 - IEEE International Conference on Communications (pp. 5945-5950). IEEE. https://doi.org/10.1109/ICC52391.2025.11162086
Neumann, L., Guimaraes, A., Aranha, D. F. & Borin, E. (2025). Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data. In M. Fischlin & V. Moonsamy (Eds.), Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Proceedings (pp. 309-338) https://doi.org/10.1007/978-3-031-95767-3_12
Agarwal, A., Bienstock, A., Damgård, I. & Escudero, D. (2025). Honest Majority GOD MPC with O(depth(C)) Rounds and Low Online Communication. In K.-M. Chung & Y. Sasaki (Eds.), Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 234-265). Springer Nature. https://doi.org/10.1007/978-981-96-0938-3_8
Bai, Z., Grønbæk, J. E. S., Irlitti, A., Knibbe, J. & Velloso, E. (2025). I Can't Join, but I Will Send My Agent: Stand-in Enhanced Asynchronous Meetings (SEAM). Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 9(4), Article 158. https://doi.org/10.1145/3770659
Gratzer, D., Møller, M. A. & Birkedal, L. (2025). Idempotent Resources in Separation Logic: The Heart of core in Iris. In P. A. Abdulla & D. Kesner (Eds.), Foundations of Software Science and Computation Structures - 28th International Conference, FoSSaCS 2025, Held as Part of the International Joint Conferences on Theory and Practice of Software: ETAPS 2025, Proceedings (pp. 45-66). Springer Science+Business Media. https://doi.org/10.1007/978-3-031-90897-2_3
Høgsgaard, M. M. & Larsen, K. G. (2025). Improved Margin Generalization Bounds for Voting Classifiers. In Proceedings of Thirty Eighth Conference on Learning Theory (Vol. 291, pp. 2822-2855). PMLR. https://proceedings.mlr.press/v291/hogsgaard-moller25a.html
Zardbani, F. (2025). Incremental Management of Multi-dimensional Data’. [PhD dissertation, Aarhus University].
Xia, Y., de Araujo, P. H. L., Zaporojets, K. & Roth, B. (2025). Influences on LLM Calibration: A Study of Response Agreement, Loss Functions, and Prompt Styles. In W. Che, J. Nabende, E. Shutova & M. T. Pilehvar (Eds.), Long Papers (pp. 3740-3761). Association for Computational Linguistics (ACL). https://doi.org/10.18653/v1/2025.acl-long.188
Kolby, S., Roy, L. D., Sternad, J. & Yakoubov, S. (2025). Information-Theoretic Random-Index PIR. In N. Gilboa (Ed.), 6th Conference on Information-Theoretic Cryptography (ITC 2025) (pp. 5:1-5:15). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ITC.2025.5
Tran, H. V., Zhang, Z., Pham, T. D., Doan, N. P., Hoang, A.-T., Li, P., Vandierendonck, H., Assent, I. & Mai, T. S. (2025). InteDisUX: intepretation-guided discriminative user-centric explanation for time series. Proceedings of the AAAI Conference on Artificial Intelligence, 39(20), 20921-20928. https://doi.org/10.1609/aaai.v39i20.35387
Lunding, R. S., Feuchtner, T. & Grønbæk, K. (2025). Investigating AR Assistance for Human-Robot Collaboration in Mould Assembly 'in the Wild'. In HRI 2025 - Proceedings of the 2025 ACM/IEEE International Conference on Human-Robot Interaction (pp. 540-549). IEEE. https://doi.org/10.1109/HRI61500.2025.10973920
Sølvsten, S. C. (2025). I/O-efficient Symbolic Model Checking. [PhD dissertation, Aarhus University].
Prummer, F., Shereef Abdelwahab, M., Weidner, F., Abdrabou, Y. & Gellersen, H. (2025). It’s Not Always the Same Eye That Dominates: Effects of Viewing Angle, Handedness and Eye Movement in 3D. In CHI 2025 - Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems Article 748 Association for Computing Machinery. https://doi.org/10.1145/3706598.3713992
Abram, D., Malavolta, G. & Roy, L. (2025). Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 236-268). Springer Science+Business Media. https://doi.org/10.1007/978-3-032-01881-6_8
Constantin-Sukul, L. R. J., Ø. Gammelgaard, R., Henriksen, A. & Aranha, D. F. (2025). Key recovery on static Kyber based on transient execution attacks. In Proceedings of the 1st Microarchitecture Security Conference https://doi.org/10.46586/uasc.2025.006
Namakonov, E. S., Fasse, J., Jacobs, B., Birkedal, L. & Timany, A. (2025). Lawyer: Modular Obligations-Based Liveness Reasoning in Higher-Order Impredicative Concurrent Separation Logic. Paper presented at Object-Oriented Programming, Systems, Languages & Applications 2026, Oakland, United States. Advance online publication.
Rysgaard, C. M. & Wild, S. (2025). Lazy B-Trees. In P. Gawrychowski, F. Mazowiecki & M. Skrzypczak (Eds.), 50th International Symposium on Mathematical Foundations of Computer Science, MFCS 2025 Article 87 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2025.87
Cao, Z., Zhao, X., Krieger, L., Scharr, H. & Assent, I. (2025). LeapFactual: Reliable Visual Counterfactual Explanation Using Conditional Flow Matching. Poster session presented at The Thirty-ninth Annual Conference on Neural Information Processing Systems, San Diego, California, United States.
Agarwal, A., Baum, C., Braun, L. & Scholl, P. (2025). Low-Bandwidth Mixed Arithmetic in VOLE-Based ZK from Low-Degree PRGs. In S. Fehr & P.-A. Fouque (Eds.), Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2025, Proceedings: EUROCRYPT 2025 (Vol. 4, pp. 396-426). Springer. https://doi.org/10.1007/978-3-031-91134-7_14
Januzelli, J., Rosulek, M. & Roy, L. (2025). Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 589-618). Springer Science+Business Media. https://doi.org/10.1007/978-3-032-01884-7_19
Morita, H., Pohle, E., Sadakane, K., Scholl, P., Tozawa, K. & Tschudi, D. (2025). MAESTRO: Multi-Party AES Using Lookup Tables. In Proceedings of the 34th USENIX Security Symposium (pp. 1965-1984). USENIX - The Advanced Computing Systems Association. https://doi.org/10.5555/3766078.3766180
Pauli, A. B., Augenstein, I. & Assent, I. (2025). Measuring and Benchmarking Large Language Models’ Capabilities to Generate Persuasive Language. In L. Chiruzzo, A. Ritter & L. Wang (Eds.), Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers) (pp. 10056-10075). Association for Computational Linguistics. https://doi.org/10.18653/v1/2025.naacl-long.506
Kleinau, J. & Hoggan, E. (2025). Mediating Meeting Dynamics: An Exploration of AI-Based Multimodal Feedback in Hybrid Meetings. In Proceedings of the 23rd EUSSET Conference on Computer Supported Cooperative Work European Society for Socially Embedded Technologies (EUSSET). https://doi.org/10.48340/ecscw2025_cp04
Pauli, A. B., Augenstein, I. & Assent, I. (2025). Mind the Style Gap: Meta-Evaluation of Style and Attribute Transfer Metrics. In C. Christodoulopoulos, T. Chakraborty, C. Rose & V. Peng (Eds.), EMNLP 2025 - 2025 Conference on Empirical Methods in Natural Language Processing, Findings of EMNLP 2025: EMNLP 2025 (pp. 21550-21564). Association for Computational Linguistics. https://doi.org/10.18653/v1/2025.findings-emnlp.1175
Tran, H. V., Doan, N. P., Zhang, Z., Pham, T. D., Nguyen, P. H., Nguyen, X. H., Vandierendonck, H., Assent, I. & Mai, T. S. (2025). MIX: A Multi-view Time-Frequency Interactive Explanation Framework for Time Series Classification. Poster session presented at The Thirty-ninth Annual Conference on Neural Information Processing Systems, San Diego, California, United States. https://neurips.cc/virtual/2025/loc/san-diego/poster/117533
Stassen, P., Møgelberg, R. E., Zwart, M. A., Aguirre, A. & Birkedal, L. (2025). Modelling Recursion and Probabilistic Choice in Guarded Type Theory. Proceedings of the ACM on Programming Languages , 9(POPL), 1417-1445. Article 48. https://doi.org/10.1145/3704884
Li, K. H., Aguirre, A., Gregersen, S. O., Haselwarter, P. G., Tassarotti, J. & Birkedal, L. (2025). Modular Reasoning about Error Bounds for Concurrent Probabilistic Programs. Proceedings of the ACM on Programming Languages , 9(ICFP), 276-305. https://doi.org/10.1145/3747514
Boudgoust, K. & Keller, H. (2025). Module Learning with Errors with Truncated Matrices. In R. Niederhagen & M.-J. O. Saarinen (Eds.), Post-Quantum Cryptography - 16th International Workshop, PQCrypto 2025, Proceedings (Vol. Part 1, pp. 255-277). Springer. https://doi.org/10.1007/978-3-031-86599-2_9
Chen, J., Chacon, D. A., Bilal, M., Zhou, Q. & Johal, W. (2025). Mr.LfD: A Mixed Reality Interface for Robot Learning from Demonstration. In S. Viller, J. Paay, J. Fredericks & J. Turner (Eds.), Proceedings of the 36th Australasian Conference on Human-Computer Interaction, OzCHI 2024 (pp. 275-285). Association for Computing Machinery. https://doi.org/10.1145/3726986.3727004
Florea, F. C., Grebla, H., Gillich, G. R., Bindea, B. N. & Rusu, C. V. (2025). Multiple Crack Detection in Beam-Like Structures Using a Novel Particle Swarm Optimization Approach. In Proceedings of the 17th International Conference on Agents and Artificial Intelligence (pp. 334-342). SciTePress. https://doi.org/10.5220/0013131400003890
Böhm, J. N., Keute, M., Guzmán, A., Damrich, S., Draganov, A. & Kobak, D. (2025). Node Embeddings via Neighbor Embeddings. Transactions on Machine Learning Research, 2025-November.
Hansen, A. B., Nielsen, J. B. & Simkin, M. (2025). OCash: Fully Anonymous Payments Between Blockchain Light Clients. In T. Jager & J. Pan (Eds.), Public-Key Cryptography – PKC 2025 - 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (pp. 169-202). Springer Science+Business Media. https://doi.org/10.1007/978-3-031-91832-2_6
Adolf, J., Kán, P., Feuchtner, T., Adolfová, B., Doležal, J. & Lhotská, L. (2025). Offistretch: camera-based real-time feedback for daily stretching exercises. Visual Computer, 41(3), 1555-1571. Article e19608. https://doi.org/10.1007/s00371-024-03450-y
Karthik, C. S., Lee, E., Rabani, Y., Schwiegelshohn, C. & Zhou, S. (2025). On Approximability of l22Min-Sum Clustering. In O. Aichholzer & H. Wang (Eds.), 41st International Symposium on Computational Geometry, SoCG 2025 Article 62 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.SoCG.2025.62
Tsimbalistaia, U., Berger, C. P., Gellersen, H. & Manakhov, P. (2025). On-body Icons: Designing a 3D Interface for Launching Apps in Augmented Reality. In CHI 2025 - Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (pp. 1-15). Article 629 Association for Computing Machinery. https://doi.org/10.1145/3706598.3713954
Baum, C., Beullens, W., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C., Roy, L. & Scholl, P. (2025). One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. In K.-M. Chung & Y. Sasaki (Eds.), Advances in Cryptology - ASIACRYPT 2024 (pp. 463-493). Springer Nature. https://doi.org/10.1007/978-981-96-0875-1_15
Christensen, J. E., Jørgensen, S. F., Pavlogiannis, A. & van de Pol, J. (2025). On Exact Sizes of Minimal CNOT Circuits. In R. Glück & R. Kaarsgaard (Eds.), Reversible Computation: 17th International Conference, RC 2025, Proceedings (pp. 71-88). Springer. https://doi.org/10.1007/978-3-031-97063-4_6
Caragiannis, I., Kanellopoulos, P. & Kyropoulou, M. (2025). On Interim Envy-Free Allocation Lotteries. Mathematics of Operations Research, 50(4), 3257-3282. https://doi.org/10.1287/moor.2023.0203
Hou, B. J., Abramyan, L., Gurumurthy, P., Adams, H., Tosic Rodgers, I., Gonzalez, E. J., Patel, K., Colaço, A., Pfeuffer, K., Gellersen, H., Ahuja, K. & Gonzalez-Franco, M. (2025). Online-EYE: Multimodal Implicit Eye Tracking Calibration for XR. In N. Yamashita, V. Evers & K. Yatani (Eds.), CHI 2025 - Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (pp. 1-16). Article 550 Association for Computing Machinery. https://doi.org/10.1145/3706598.3713461