Latest publications
Recent publications by the Division of Information Science and Engineering.
[1]
J. Liu et al.,
"Enhancing credibility of transient stability assessment under stochastic operation modes in power systems: An incremental dataset recognition approach,"
Electric power systems research, vol. 253, 2026.
[2]
J. Liu et al.,
"A Generic Scene-Dependent Credibility Evaluation Framework for Machine Learning-based Transient Stability Assessment of Power Systems,"
IEEE Transactions on Power Systems, 2025.
[3]
W. Yanmin et al.,
"Double-target collaborative spectrum sharing for 6G hybrid satellite-terrestrial networks with user-centric channel pools,"
China Communications, vol. 22, no. 10, pp. 25-33, 2025.
[4]
T. Li et al.,
"Designing likelihood function under nuisance components in block particle filter,"
Mechanical systems and signal processing, vol. 241, 2025.
[5]
X. Huang et al.,
"A Multi-Hop Semantic Communication System Enhanced by Semantic Importance,"
IEEE Access, vol. 13, pp. 140685-140693, 2025.
[6]
A. Hadziaganovic et al.,
"Digital Twins of Industrial and 6G Systems : Enablers Towards Situational Awareness,"
in 2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation, ETFA 2025 - Proceedings, 2025.
[7]
D. Bosser et al.,
"Broadband Passive Sonar Track-Before-Detect Using Raw Acoustic Data,"
IEEE Journal of Oceanic Engineering, vol. 50, no. 4, pp. 3106-3116, 2025.
[8]
A. Gouverneur,
"An Information-Theoretic Approach to Bandits and Reinforcement Learning,"
Doctoral thesis Stockholm : Kungliga Tekniska högskolan, TRITA-EECS-AVL, 2025:108, 2025.
[9]
A. Gouverneur et al.,
"An Information-Theoretic Analysis of Thompson Sampling with Infinite Action Spaces,"
in ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2025.
[10]
A. Gouverneur et al.,
"Chained Information-Theoretic Bounds and Tight Regret Rate for Linear Bandit Problems,"
, 2025.
[11]
A. Gouverneur, T. J. Oechtering and M. Skoglund,
"An Information-Theoretic Analysis of Thompson Sampling for Logistic Bandit Problems,"
, 2025.
[12]
D. G. Pérez, Z. Wang and J. M.Enguita González,
"CACTUS : A Context-Aware Framework for Counterfactual Explanations Across Diverse Prediction Domains,"
in Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, pp. 460-475.
[13]
T. Wang et al.,
"BatteryCDE : A Transferable Future Capacity Estimation Method for Battery Degradation With Irregular Sampling and Missing Data,"
IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, vol. 11, no. 4, pp. 10427-10440, 2025.
[14]
X. Chen et al.,
"Classification-Oriented Semantic Communication for Internet of Things,"
in 2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings, 2025.
[15]
C. Li, M. Xiao and M. Skoglund,
"Coded Robust Aggregation for Distributed Learning under Byzantine Attacks,"
IEEE Transactions on Information Forensics and Security, vol. 20, pp. 11636-11651, 2025.
[16]
S. Rivetti et al.,
"Destructive and Constructive Ris Beamforming in an Isac Multi-User Mimo Network,"
in ICC 2025 - IEEE International Conference on Communications, 2025, pp. 2412-2417.
[17]
J. Cao et al.,
"Delay Coprime Array: A New Sparse Linear Array for Fast and Robust DOA Estimation,"
IEEE Signal Processing Letters, vol. 32, pp. 3994-3998, 2025.
[18]
A. Ghosh,
"Deep Learning-based State and Parameter Estimation in Nonlinear Dynamical Systems,"
Doctoral thesis Stockholm, Sweden : Kungliga Tekniska högskolan, TRITA-EECS-AVL, 2025:96, 2025.
[19]
J. Jin et al.,
"Cloud-Fog Automation : The New Paradigm Toward Autonomous Industrial Cyber-Physical Systems,"
IEEE Journal on Selected Areas in Communications, vol. 43, no. 9, pp. 2917-2937, 2025.
[20]
S. Egger et al.,
"End-to-End Reliability in Wireless IEEE 802.1Qbv Time-Sensitive Networks,"
in 2025 IEEE/ACM 33rd International Symposium on Quality of Service, IWQoS 2025, 2025.
[21]
T. Wang et al.,
"Domain-Adaptive Clustered Federated Transfer Learning for EV Charging Demand Forecasting,"
IEEE Transactions on Power Systems, vol. 40, no. 2, pp. 1241-1254, 2025.
[22]
N. Mehrnia et al.,
"Channel Prediction Using Deep Recurrent Neural Network With EVT-Based Adaptive Quantile Loss Function,"
IEEE Communications Letters, vol. 29, no. 7, pp. 1699-1703, 2025.
[23]
M. O. Olguín Muñoz et al.,
"Emulating Reactive Workloads for Cyber-Human Systems: A Data-Driven Methodology,"
IEEE Access, vol. 13, pp. 169953-169967, 2025.
[24]
[25]
Y. Chen et al.,
"A Kirigami-Inspired Stretchable Pressure Sensor for Conformal and Decoupled Human–Machine Touch Mapping,"
IEEE Sensors Journal, 2025.
[26]
A. Zamani et al.,
"A Unified Framework for Joint Semantic and Privacy Design Under Bounded Leakage,"
in SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings, 2025.
[27]
H. Zhao, M. Bengtsson and T. J. Oechtering,
"A Privacy-Preserving Beamspace for Wireless Localization,"
in SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings, 2025.
[28]
D. Roy and J. Gross,
"Causality-driven RL-based Scheduling Policies for Diverse Delay Constraints,"
in 2025 IEEE International Conference on Machine Learning for Communication and Networking, ICMLCN 2025, 2025.
[29]
S. Rivetti et al.,
"Clutter-Aware Target Detection for ISAC in a Millimeter-Wave Cell-Free Massive MIMO System,"
in SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings, 2025.
[30]
J. Kipen and J. Jaldén,
"Brownian motion data augmentation : a method to push neural network performance on nanopore sensors,"
Bioinformatics, vol. 41, no. 6, 2025.
[31]
Z. Ye et al.,
"CA-FedRC : Codebook Adaptation via Federated Reservoir Computing in 5G NR,"
IEEE Transactions on Vehicular Technology, vol. 74, no. 6, pp. 9995-9999, 2025.
[32]
P. Nikolaidis et al.,
"A Proof of Concept Resource Management Scheme for Augmented Reality Applications in 5G Systems,"
in 2025 IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2025, 2025.
[33]
M. Jiang et al.,
"ACSNet : A Deep Neural Network for Compound GNSS Jamming Signal Classification,"
IEEE Transactions on Cognitive Communications and Networking, 2025.
[34]
J. Kipen,
"Algorithms and machine learning for single-molecule protein sequencing methods,"
Doctoral thesis : Kungliga Tekniska högskolan, TRITA-EECS-AVL, 2025:86, 2025.
[35]
J. Zhang et al.,
"Diffusion-Guided Diversity for Single Domain Generalization in Time Series Classification,"
in KDD 2025 : Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2, 2025, pp. 3764-3773.
[36]
C. Li, M. Xiao and M. Skoglund,
"Communication-Efficient Semi-Decentralized Federated Learning in the Presence of Stragglers,"
IEEE Transactions on Communications, pp. 1-1, 2025.
[37]
V. N. Moothedath et al.,
"Delay Analysis of 5G HARQ in the Presence of Decoding and Feedback Latencies,"
(Manuscript).
[38]
J. Helleberg et al.,
"Beyond labels : determining the true type of blood gas samples in ICU patients through supervised machine learning,"
BMC Medical Informatics and Decision Making, vol. 25, no. 1, 2025.
[39]
O. Friman et al.,
"Accuracy of Glucose Trends by Subcutaneous Continuous Monitoring vs Intermittent Arterial Measurements in Critically Ill Patients,"
Journal of Diabetes Science and Technology, 2025.
[40]
C. Yang, S. Chatterjee and T. J. Oechtering,
"Enhancing Network Calibration for Low-Cost Gas Sensor Networks Through Adaptive Similarity Search,"
in 2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025, Hyderabad, India, April 6-11, 2025, 2025.
[41]
L. Liu et al.,
"Distributed Collaborative Computing for Task Completion Rate Maximization in Vehicular Edge Computing,"
IEEE Transactions on Intelligent Transportation Systems, 2025.
[42]
H. Qin et al.,
"BiGSM : Bayesian inference of gene regulatory network via sparse modelling,"
Bioinformatics, vol. 41, no. 6, 2025.
[43]
H. Ko, S. Seo and S. Pack,
"Dynamic Split Computing Framework for Multi-Task Learning Models: A Deep Reinforcement Learning Approach,"
IEEE Access, 2025.
[44]
X. Li et al.,
"A Recursive Puncturing Method for PAC Codes Based on the Partial Order,"
IEEE Communications Letters, vol. 29, no. 5, pp. 978-982, 2025.
[45]
K. Ma et al.,
"A Multi-UAV Network Formation Scheme via Integrated Localization and Motion Planning,"
IEEE Transactions on Network Science and Engineering, vol. 12, no. 3, pp. 1552-1566, 2025.
[46]
Q. Li et al.,
"A Multi-Task Learning-Based Approach for Power System Short-Term Voltage Stability Assessment With Missing PMU Data,"
IEEE Transactions on Automation Science and Engineering, vol. 22, pp. 13187-13197, 2025.
[47]
Q. Li et al.,
"Enhancing Trustworthiness of Data-Driven Power System Dynamic Security Assessment via Hybrid Credibility Learning,"
IEEE Transactions on Power Systems, vol. 40, no. 3, pp. 2791-2794, 2025.
[48]
S. Dutta, D. Roy and G. Das,
"Desynchronized Wake-Up Algorithm for Energy Efficient EPON-Based 5G Backhaul,"
Journal of Lightwave Technology, vol. 43, no. 10, pp. 4516-4529, 2025.
[49]
T. U. Islam et al.,
"Design and implementation of ARA wireless living lab for rural broadband and applications,"
Computer Networks, vol. 263, 2025.
[50]
S. Weng et al.,
"Coded Cooperative Networks for Semi-Decentralized Federated Learning,"
IEEE Wireless Communications Letters, vol. 14, no. 3, pp. 626-630, 2025.