Skip to main content
To KTH's start page

Latest publications

Recent publications by the Division of Information Science and Engineering.

[1]
F. Fotiadis et al., "Poisoning Actuation Attacks Against the Learning of an Optimal Controller," in 2024 American Control Conference, ACC 2024, 2024, pp. 4838-4843.
[2]
Y. Xiang et al., "A scoping investigation on debris bed formation with high-temperature melt simulant Fe-Sn," Applied Thermal Engineering, vol. 257, 2024.
[3]
H. Zhang et al., "Amplitude Phase Shift Keying-Aided Space-Time Block Coded Differential Spatial Modulation," in ICC 2024 - IEEE International Conference on Communications, 2024, pp. 3888-3893.
[4]
Y. Zhao et al., "Energy Efficiency Maximization for Multi-Node IoT Networks Operating with Finite Blocklength Codes," in 2024 19th International Symposium on Wireless Communication Systems, ISWCS 2024, 2024.
[5]
M. Zhao, M. L. Treust and T. J. Oechtering, "Coordination Coding with Causal Encoder for Vector-Valued Witsenhausen Counterexample," in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 3255-3260.
[6]
D. Zhang et al., "Federated Learning via Active RIS Assisted Over-the-Air Computation," in 2024 IEEE International Conference on Machine Learning for Communication and Networking, ICMLCN 2024, 2024, pp. 201-207.
[7]
A. Zamani et al., "Multi-Task Private Semantic Communication," in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 3480-3485.
[8]
V. Ramachandran, T. J. Oechtering and M. Skoglund, "Multi-terminal Strong Coordination over Noisy Channels with Secrecy Constraints," in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 1925-1930.
[9]
L. Grosse et al., "Quantifying Privacy via Information Density," in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 3071-3076.
[10]
B. Rodríguez Gálvez et al., "A Note on Generalization Bounds for Losses with Finite Moments," in 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, 2024, pp. 2676-2681.
[12]
A. Kullberg et al., "Adaptive Basis Function Selection for Computationally Efficient Predictions," IEEE Signal Processing Letters, vol. 31, pp. 2130-2134, 2024.
[13]
J. Chen et al., "Physical layer security for near-field communications via directional modulation," IEEE Transactions on Vehicular Technology, vol. 73, no. 8, pp. 12242-12246, 2024.
[14]
J. He, M. Xiao and M. Skoglund, "Fast-Converging Decentralized ADMM for Consensus Optimization," in Proceedings - 2024 IEEE Conference on Artificial Intelligence, CAI 2024, 2024, pp. 575-580.
[15]
S. Saeidian, T. J. Oechtering and M. Skoglund, "Evaluating Differential Privacy on Correlated Datasets Using Pointwise Maximal Leakage," in Privacy Technologies and Policy - 12th Annual Privacy Forum, APF 2024, Proceedings, 2024, pp. 73-86.
[16]
S. S. Mostafavi et al., "EDAF: An End-to-End Delay Analytics Framework for 5G-and-Beyond Networks," in 11th International Workshop on Computer and Networking Experimental Research using Testbeds (CNERT 2024), 2024.
[17]
Y. You et al., "Fast Incremental ADMM for Decentralized Consensus Multi-Agent Optimization," in 2024 IEEE 18th International Conference on Control and Automation, ICCA 2024, 2024, pp. 473-477.
[18]
A. Kanellopoulos et al., "A Moving Target Defense Mechanism Based on Spatial Unpredictability for Wireless Communication," in 2024 European Control Conference, ECC 2024, 2024, pp. 2206-2211.
[19]
A. Kanellopoulos et al., Control and Game Theoretic Methods for Cyber-Physical Security. Elsevier BV, 2024.
[20]
D. Hu et al., "Embodied AI Through Cloud-Fog Computing: A Framework for Everywhere Intelligence," in 2024 33rd International Symposium on Industrial Electronics, ISIE 2024 - Proceedings, 2024.
[21]
S. Das et al., "IMU-based Online Multi-lidar Calibration," in 35th IEEE Intelligent Vehicles Symposium, IV 2024, 2024, pp. 3227-3234.
[22]
[23]
S. Rivetti et al., "Malicious Reconfigurable Intelligent Surfaces : How Impactful Can Destructive Beamforming be?," IEEE Wireless Communications Letters, vol. 13, no. 7, pp. 1918-1922, 2024.
[24]
X. Xu and J. Jaldén, "Marginalized Beam Search Algorithms for Hierarchical HMMs," IEEE Transactions on Signal Processing, vol. 72, pp. 3013-3027, 2024.
[25]
G. P. Sharma et al., "End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks," Journal of Network and Systems Management, vol. 32, no. 3, 2024.
[27]
D. Zhang et al., "Fluid Antenna Array Enhanced Over-the-Air Computation," IEEE Wireless Communications Letters, vol. 13, no. 6, pp. 1541-1545, 2024.
[28]
Y. Khorsandmanesh et al., "Beam Coherence Time Analysis for Mobile Wideband mmWave Point-to-Point MIMO Channels," IEEE Wireless Communications Letters, vol. 13, no. 6, pp. 1546-1550, 2024.
[29]
Z. Chen et al., "Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation," IEEE transactions on consumer electronics, vol. 70, no. 1, pp. 2391-2400, 2024.
[30]
D. Zhang et al., "IRS Assisted Federated Learning : A Broadband Over-the-Air Aggregation Approach," IEEE Transactions on Wireless Communications, vol. 23, no. 5, pp. 4069-4082, 2024.
[32]
Y. Wang et al., "Optimized Energy Dispatch for Microgrids with Distributed Reinforcement Learning," IEEE Transactions on Smart Grid, vol. 15, no. 3, pp. 2946-2956, 2024.
[34]
K. V. Mishra et al., "Preface," in Signal Processing for Joint Radar Communications, : wiley, 2024.
[35]
K. V. Mishra et al., "A Signal Processing Outlook Toward Joint Radar-Communications," in Signal Processing for Joint Radar Communications, : Wiley, 2024, pp. 3-36.
[36]
Y. Ding et al., "Guest Editorial of the Special section on Emerging Technologies and Applications of Consumer Electronics for Healthy and Sustainable Life," IEEE transactions on consumer electronics, vol. 70, no. 1, pp. 2378-2381, 2024.
[37]
M. Le Treust and T. J. Oechtering, "Power-Estimation Trade-Off of Vector-Valued Witsenhausen Counterexample With Causal Decoder," IEEE Transactions on Information Theory, vol. 70, no. 3, pp. 1588-1609, 2024.
[38]
A. Zamani, T. J. Oechtering and M. Skoglund, "On the Privacy-Utility Trade-Off With and Without Direct Access to the Private Data," IEEE Transactions on Information Theory, vol. 70, no. 3, pp. 2177-2200, 2024.
[39]
A. Ghosh, A. Honore and S. Chatterjee, "DANSE : Data-Driven Non-Linear State Estimation of Model-Free Process in Unsupervised Learning Setup," IEEE Transactions on Signal Processing, vol. 72, pp. 1824-1838, 2024.
[40]
X. Xu, "Algorithms and Models in Nanopore DNA Sequencing : Advanced Decoding and Modeling with Hierarchical Hidden Markov Models," Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:40, 2024.
[41]
B. Rodríguez Gálvez, R. Thobaben and M. Skoglund, "More PAC-Bayes bounds : From bounded losses, to losses with general tail behaviors, to anytime validity," Journal of machine learning research, vol. 25, pp. 1-43, 2024.
[42]
Q. Wang et al., "Improving Transferability and Immunity of Physical Layer Authentication by the Channel Time-Varying Pattern," IEEE Wireless Communications Letters, vol. 13, no. 3, pp. 751-755, 2024.
[43]
Y. You, Q. Xu and C. Fischione, "Hierarchical Online Game-Theoretic Framework for Real-Time Energy Trading in Smart Grid," IEEE Transactions on Smart Grid, vol. 15, no. 2, pp. 1634-1645, 2024.
[44]
B. Rodríguez Gálvez, "An Information-Theoretic Approach to Generalization Theory," Doctoral thesis : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:31, 2024.
[45]
B. Vundurthy et al., "Intelligent Players in a Fictitious Play Framework," IEEE Transactions on Automatic Control, vol. 69, no. 1, pp. 479-486, 2024.
[46]
R. R. Avula, T. J. Oechtering and D. Månsson, "Adversarial Inference Control in Cyber-Physical Systems : A Bayesian Approach With Application to Smart Meters," IEEE Access, vol. 12, pp. 24933-24948, 2024.
[47]
S. Das et al., "IMU-based Online Multi-lidar Calibration," (Manuscript).
[48]
V. N. Moothedath, J. P. Champati and J. Gross, "Getting the Best Out of Both Worlds: Algorithms for Hierarchical Inference at the Edge," IEEE Transactions on Machine Learning in Communications and Networking, pp. 1-1, 2024.
[49]
S. Saeidian, "Pointwise Maximal Leakage : Robust, Flexible and Explainable Privacy," Doctoral thesis Stockholm : KTH Royal Institute of Technology, TRITA-EECS-AVL, 2024:7, 2024.
Full list in the KTH publications portal