Skip to main content
To KTH's start page

Latest publications

Recent publications by the Division of Information Science and Engineering.

[2]
L. Liu et al., "Reputation-Based Blockchain Sharding Scheme for Urban Rail Transit System: A DRL Approach," IEEE Transactions on Intelligent Transportation Systems, 2026.
[3]
Z. Lyu et al., "Empowering Intelligent Low-Altitude Economy With Large AI Model Deployment," IEEE wireless communications, vol. 33, no. 1, pp. 64-72, 2026.
[4]
H. Gao et al., "Detecting Timestamp Anomalies in Network Ranging," IEEE Communications Letters, vol. 30, pp. 667-671, 2026.
[5]
Z. Ye et al., "LLM-Aided Prediction and RL-Based Optimization for Secure Communications in Low-Altitude Economy Networks," IEEE Transactions on Network Science and Engineering, vol. 13, pp. 5247-5261, 2026.
[6]
M. Liu et al., "Integrated Sensing and Communication with Index Modulation over Pinching Antennas," IEEE Communications Letters, vol. 30, pp. 737-741, 2026.
[7]
S. Saeidian et al., "Information Density Bounds for Privacy," IEEE Transactions on Information Theory, vol. 72, no. 1, pp. 610-635, 2026.
[8]
Y. Gao et al., "Vision-Aided ISAC in Low-Altitude Economy Networks via De-Diffused Visual Priors," IEEE Transactions on Cognitive Communications and Networking, vol. 12, pp. 3831-3845, 2026.
[10]
[11]
Y. Li et al., "S3PRank : Towards Satisfaction-oriented Learning to Rank with Semi-supervised Pre-training," IEEE Transactions on Knowledge and Data Engineering, vol. 38, no. 1, pp. 559-572, 2026.
[12]
X. Shen et al., "Fundamental Tradeoff of Bistatic ISAC under Gaussian Fading Channels at Finite Blocklength," IEEE Transactions on Information Theory, vol. 72, no. 2, pp. 1176-1200, 2026.
[13]
M. Jiang et al., "ACSNet : A Deep Neural Network for Compound GNSS Jamming Signal Classification," IEEE Transactions on Cognitive Communications and Networking, vol. 12, pp. 1601-1615, 2026.
[14]
S. Mao et al., "RIS-enhanced Semantic-aware Sensing, Communication, Computation and Control for Internet of Things," IEEE Transactions on Wireless Communications, vol. 25, pp. 2231-2246, 2026.
[15]
C. Ren et al., "Enhancing Dynamic Security Assessment in Smart Grids Through Quantum Federated Learning," IEEE Transactions on Automation Science and Engineering, vol. 23, pp. 3255-3267, 2026.
[16]
A. Zamani, P. Sadeghi and M. Skoglund, "An Information Geometric Approach to Local Information Privacy with Applications to Max-lift and Local Differential Privacy," in 2025 IEEE Information Theory Workshop, ITW 2025, 2025.
[17]
Y. Huang et al., "A Maximum Distance Separable Code-Based RIS-OFDM : Design and Optimization," IEEE Transactions on Wireless Communications, vol. 24, no. 11, pp. 9249-9263, 2025.
[18]
S. Saeidian et al., "A Tight Context-Aware Privacy Bound for Histogram Publication," IEEE Signal Processing Letters, vol. 32, pp. 4169-4173, 2025.
[19]
B. Sun et al., "AoI-Based Optimal Transmission Scheduling for Multiprocess Remote Estimation," IEEE Transactions on Automatic Control, vol. 70, no. 11, pp. 7245-7260, 2025.
[20]
[21]
Y. Sun et al., "A Novel RIS Channel Model for 6G Wireless Communication Systems," IEEE Transactions on Communications, vol. 73, no. 10, pp. 8797-8810, 2025.
[22]
Y. Li et al., "An Enhanced Stereo UWB Bearing Scheme via Network Ambiguity Resolution and Online Phase Calibration," IEEE Transactions on Mobile Computing, vol. 24, no. 11, pp. 12061-12075, 2025.
[23]
N. Shlezinger et al., "Artificial Intelligence-Aided Kalman Filters : AI-Augmented Designs for Kalman-Type Algorithms," IEEE signal processing magazine (Print), vol. 42, no. 3, pp. 52-76, 2025.
[24]
A. Mahmoudi, M. Xiao and E. Björnson, "Accelerating Energy-Efficient Federated Learning in Cell-Free Networks With Adaptive Quantization," IEEE Transactions on Machine Learning in Communications and Networking, vol. 3, pp. 761-778, 2025.
[25]
[26]
X. Huang et al., "A Multi-Hop Semantic Communication System Enhanced by Semantic Importance," IEEE Access, vol. 13, pp. 140685-140693, 2025.
[27]
D. Bosser et al., "Broadband Passive Sonar Track-Before-Detect Using Raw Acoustic Data," IEEE Journal of Oceanic Engineering, vol. 50, no. 4, pp. 3106-3116, 2025.
[28]
A. Gouverneur, "An Information-Theoretic Approach to Bandits and Reinforcement Learning," Doctoral thesis Stockholm : Kungliga Tekniska högskolan, TRITA-EECS-AVL, 2025:108, 2025.
[29]
A. Gouverneur et al., "An Information-Theoretic Analysis of Thompson Sampling with Infinite Action Spaces," in ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2025.
[31]
A. Gouverneur, T. J. Oechtering and M. Skoglund, "An Information-Theoretic Analysis of Thompson Sampling for Logistic Bandit Problems," , 2025.
[32]
D. G. Pérez, Z. Wang and J. M.Enguita González, "CACTUS : A Context-Aware Framework for Counterfactual Explanations Across Diverse Prediction Domains," in Discovery Science - 28th International Conference, DS 2025, Proceedings, 2025, pp. 460-475.
[33]
T. Wang et al., "BatteryCDE : A Transferable Future Capacity Estimation Method for Battery Degradation With Irregular Sampling and Missing Data," IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, vol. 11, no. 4, pp. 10427-10440, 2025.
[34]
X. Chen et al., "Classification-Oriented Semantic Communication for Internet of Things," in 2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings, 2025.
[35]
J. Jin et al., "Cloud-Fog Automation : The New Paradigm Toward Autonomous Industrial Cyber-Physical Systems," IEEE Journal on Selected Areas in Communications, vol. 43, no. 9, pp. 2917-2937, 2025.
[36]
N. Mehrnia et al., "Channel Prediction Using Deep Recurrent Neural Network With EVT-Based Adaptive Quantile Loss Function," IEEE Communications Letters, vol. 29, no. 7, pp. 1699-1703, 2025.
[38]
A. Zamani et al., "A Unified Framework for Joint Semantic and Privacy Design Under Bounded Leakage," in SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings, 2025.
[39]
H. Zhao, M. Bengtsson and T. J. Oechtering, "A Privacy-Preserving Beamspace for Wireless Localization," in SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings, 2025.
[40]
D. Roy and J. Gross, "Causality-driven RL-based Scheduling Policies for Diverse Delay Constraints," in 2025 IEEE International Conference on Machine Learning for Communication and Networking, ICMLCN 2025, 2025.
[41]
[42]
Z. Ye et al., "CA-FedRC : Codebook Adaptation via Federated Reservoir Computing in 5G NR," IEEE Transactions on Vehicular Technology, vol. 74, no. 6, pp. 9995-9999, 2025.
[43]
P. Nikolaidis et al., "A Proof of Concept Resource Management Scheme for Augmented Reality Applications in 5G Systems," in 2025 IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2025, 2025.
[44]
J. Kipen, "Algorithms and machine learning for single-molecule protein sequencing methods," Doctoral thesis : Kungliga Tekniska högskolan, TRITA-EECS-AVL, 2025:86, 2025.
[45]
J. Helleberg et al., "Beyond labels : determining the true type of blood gas samples in ICU patients through supervised machine learning," BMC Medical Informatics and Decision Making, vol. 25, no. 1, 2025.
[47]
H. Qin et al., "BiGSM : Bayesian inference of gene regulatory network via sparse modelling," Bioinformatics, vol. 41, no. 6, 2025.
[48]
X. Li et al., "A Recursive Puncturing Method for PAC Codes Based on the Partial Order," IEEE Communications Letters, vol. 29, no. 5, pp. 978-982, 2025.
[49]
K. Ma et al., "A Multi-UAV Network Formation Scheme via Integrated Localization and Motion Planning," IEEE Transactions on Network Science and Engineering, vol. 12, no. 3, pp. 1552-1566, 2025.
[50]
Q. Li et al., "A Multi-Task Learning-Based Approach for Power System Short-Term Voltage Stability Assessment With Missing PMU Data," IEEE Transactions on Automation Science and Engineering, vol. 22, pp. 13187-13197, 2025.
Full list in the KTH publications portal