PROGRAM
Days: Wednesday, September 17th Thursday, September 18th Friday, September 19th
Wednesday, September 17th
View this program: with abstractssession overviewtalk overview
08:30-10:10 Session BHRSO5: Machine Learning I
Chairs:
Location: RM2
08:30 | Reward Biasing in RL: Tempered Optimism for Exploration Improves Performance (abstract) |
08:50 | A Piecewise Lyapunov Analysis of Sub-quadratic SGD: Applications to Robust and Quantile Regression (abstract) |
09:10 | Global Minimizers of Sigmoid Contrastive Loss (abstract) |
09:30 | Diffusion bridges and adversarial examples (abstract) |
09:50 | Reinforcement Learning from Human Feedback with an Unknown Link Function (abstract) |
08:30-10:10 Session LAVA01: Federated Information Processing
Chair:
Location: RM3
08:30 | FedCostAware: Enabling Cost-Aware Federated Learning on the Cloud (abstract) |
08:50 | A Modular Federated Suite for Low-Rank, Expressive, and Efficient LLM Fine-Tuning (abstract) |
09:10 | Sketching for Distributed Deep Learning (abstract) |
09:30 | The Role of Private Synthetic Data in Collaborative Learning (abstract) |
08:30-10:10 Session PMMR01: Learning, Filtering, and Control
Chairs:
Location: RM4
08:30 | A time-reversal methodology for steering the state of control-affine stochastic systems (abstract) |
08:50 | An Operator Theoretic Viewpoint of Reinforcement Learning and a class of PPO Algorithms (abstract) |
09:10 | Path-Generalized I-MMSE: Bridging Diffusion and Autoregressive Generation (abstract) |
09:30 | A Stochastic-Control Lense unifying Transformers, Diffusions & Reinforcement Learning (abstract) |
09:50 | Probabilistic DiffusionNet: A geometry informed probabilistic neural operator (abstract) |
08:30-10:10 Session REGS01: Applications of Codes
Location: RM5
08:30 | Maximal Achievable Service Rates of Codes and Connections to Combinatorial Designs (abstract) |
08:50 | Communication Systems with Mismatched Encoder and Decoders (abstract) |
09:10 | An Upper Bound for Interactive ECCs with Separate Budgets (abstract) |
09:30 | Side Channel Communications With Ghost Modulation Over the Asymmetric Binary Crossover Erasure Channel (abstract) |
09:50 | Z-Channel Modeling of Hardware Trojans (abstract) |
08:30-10:10 Session RETB01: Multiagent Decision-Making Systems
Chairs:
Location: RM1
08:30 | Allocating Shared Resources via Dynamic Max-Min Fairness (abstract) |
08:50 | Scalable and Convergent Algorithms for Strategically Risk-Averse Agents in Markov Games (abstract) |
09:10 | Principled Learning-to-Communicate with Quasi-Classical Information Structures (abstract) |
09:30 | Linear-Quadratic Stackelberg Differential Games for Jump-Diffusion Systems with Complete and Partial Information (abstract) |
09:50 | Differential Game Based Guidance with Delayed Engagement Decision (abstract) |
10:10-10:30Break
10:40-12:20 Session ABMR01: Dynamical Systems in Learning and Control
Chairs:
Location: RM5
10:40 | The H-property for Asymmetric Graphons: The zero-one law (abstract) |
11:00 | A Reinforcement Learning View on the Sample Complexity of Linear Quadratic Regulator (abstract) |
11:20 | Measure Transport of Control Systems using Flow Matching (abstract) |
11:40 | When do practical Koopman embeddings exist? (abstract) |
12:00 | On the role of time scale in reservoir computing (abstract) |
10:40-12:20 Session AMSS01: Infrastructure and Operational Economics of the Future Grid
Chair:
Location: RM2
10:40 | Unit Commitment without Commitment: The Network Setting (abstract) |
11:00 | Optimal Mechanisms for Demand Response: An Indifference Set Approach (abstract) |
11:20 | Battery Operations in Electricity Markets: Strategic Behavior and Distortions (abstract) |
11:40 | Optimal Battery Placement in Power Grid (abstract) |
12:00 | Risk Sharing Among Microgrids: Connectivity Requirements and Optimal Control (abstract) |
10:40-12:20 Session LAVA02: Semantics in Communications
Chair:
Location: RM1
10:40 | Private Counterfactual Retrieval (abstract) |
11:00 | Rate-Distortion-Perception Trade-off in Summarization (abstract) PRESENTER: Aylin Yener |
11:20 | Towards a Unification of Logic and Information Theory (abstract) |
11:40 | Zero Perception Error Rate-Distortion for Semantic Communication (abstract) |
10:40-12:20 Session VSGA01: Robust Inference and Learning I
Chair:
Location: RM4
10:40 | Pessimism for Zero-Shot Transfer in RL (abstract) |
11:00 | A Unified Principle of Pessimism for Offline Reinforcement Learning under Model Mismatch (abstract) |
11:20 | Theoretically Grounded Framework for LLM Watermarking: A Distribution-Adaptive Approach (abstract) |
11:40 | A Malliavin Calculus based Weak-Derivative Approach for Training Neural Stochastic Differential Equations (abstract) |
12:00 | Robust Conditional Value-at-Risk Based Risk-Sensitive Reinforcement Learning (abstract) |
10:40-12:20 Session YXGH01: Learning, Optimization, and Games
Chair:
Location: RM3
10:40 | Reliable and Adaptive Stochastic Optimization in the Face of Messy Data (abstract) |
11:00 | Learning with Episodic Hypothesis Testing in General Games (abstract) |
11:20 | On Speeding Up Language Model Evaluation (abstract) |
11:40 | HardNet: Hard-Constrained Neural Networks (abstract) |
12:20-14:30Lunch Break
14:30-16:30 Session AGSB01: Power and Energy Systems
Chairs:
Location: RM1
14:30 | Pricing in Discrete Markets Using Copositive Duality (abstract) |
14:50 | System Opacity Formulations and Applications to Privacy Preservation in Smart Grids (abstract) |
15:10 | Inexactness of Second-order Cone Relaxations for Calculating Operating Envelopes (abstract) |
15:30 | Watts and Drops: Co-Scheduling Power and Water in Desalination Plants (abstract) PRESENTER: Ahmed Alahmed |
15:50 | Model Expansion to Realize Preferred Topologies (abstract) |
16:10 | Optimal Setpoints of Current Constrained Converters-Based Resources (abstract) |
14:30-16:30 Session BHRS01: Machine Learning II
Chairs:
Location: RM2
14:30 | Learning Without Forgetting (abstract) |
14:50 | Tensor Product Attention Is All You Need (abstract) |
15:10 | Bridging Lifelong and Multi-Task Representation Learning via Algorithm and Complexity Measure (abstract) |
15:30 | Asymptotic convexity of wide and shallow neural networks (abstract) |
15:50 | Editing and inversion of images with flow models (abstract) |
14:30-16:30 Session MLZZ01: Diffusion Models and Inverse Problems
Chairs:
Zhizhen Zhao and Minh Do
Location: RM4
14:30 | FlowDAS: A Stochastic Interpolant-based Framework for Data Assimilation (abstract) |
14:50 | Provable Posterior Sampling with Score-Based Diffusion via Tilted Transport (abstract) |
15:10 | DarkDiff: Advancing Low-Light Raw Enhancement by Retasking Diffusion Models for Camera ISP (abstract) |
15:30 | Distillation learns clean generative models from corrupted data (abstract) |
14:30-16:30 Session REGS02: Games and Incentives
Location: RM5
14:30 | Group Formation through Game Theory and Agent-Based Modeling: Spatial Cohesion, Heterogeneity, and Resource Pooling (abstract) |
14:50 | Coordination Games on Multiplex Networks: Consensus and Convergence of Opinion Dynamics (abstract) |
15:10 | On Myopia in Rationally Inattentive Dynamic Information Acquisition (abstract) |
15:30 | A Noncooperative Solution for Coalition Formation and Payoff Negotiation (abstract) |
15:50 | Compression for Incentivization (abstract) |
14:30-16:30 Session SMHZ01: Verification and Learning I
Chairs:
Location: RM3
14:30 | Learning Neural Control Barrier Functions from Demonstrations (abstract) |
14:50 | Conservative Perception Models for Probabilistic Model Checking (abstract) |
15:10 | Co-Optimization of Perception and Control for Autonomous Systems (abstract) |
15:30 | Failure Prediction from Limited Hardware Demonstrations (abstract) |
15:50 | Abstractions for Scalable Analysis of AI-enabled Cyber-Physical Systems (CPS) (abstract) |
16:10 | Compositional Verification of Autonomous Systems (abstract) |
Thursday, September 18th
View this program: with abstractssession overviewtalk overview
08:30-10:10 Session BHRS03: Resource Allocation in Networks I
Chairs:
Location: RM2
08:30 | Monotone dynamics in network control (abstract) |
08:50 | Join-the-Shortest-Queue with Markov-Modulated Parameters: Poisson Equation and Transform Techniques (abstract) |
09:10 | Sequential policies and the distribution of their total rewards in dynamic and stochastic knapsack problems (abstract) |
09:30 | Target-Following Online Resource Allocation Using Proxy Assignments (abstract) |
09:50 | Mixing Times for Reversible Countable State Markov Chains: A case study of the Erlang-C queue (abstract) |
08:30-10:10 Session GFVV01: Sequential Methods
Chairs:
Location: RM4
08:30 | Dual-Sensor Quickest Change Detection with Sampling Control (abstract) |
08:50 | Bandit-Based Sequential Client Scheduling in Federated Learning (abstract) |
09:10 | Sequential Change Point Detection via Denoising Score Matching (abstract) |
09:30 | Cluster-Aware Causal Mixer for Sequential Change Detection in Multivariate Time Series (abstract) |
09:50 | Optimal Bounded-Influence Procedure for Robust Sequential Change-Point Detection (abstract) |
08:30-10:10 Session REGS03: Network Spread and Secrecy
Chair:
Location: RM3
08:30 | Towards a Nudge-Theoretic Cyber Deception Framework (abstract) PRESENTER: Swastik Brahma |
08:50 | On Subset Retrieval and Group Testing Problems with Differential Privacy Constraints (abstract) |
09:10 | Approximately Optimal Toll Design for Efficiency and Equity in Arc-Based Traffic Assignment Models (abstract) |
09:30 | Efficient and Privacy-Preserving Binary Dot Product via Multi-Party Computation (abstract) |
09:50 | If the Virus Respected Queues (abstract) |
08:30-10:10 Session REGS04: Learning and Dynamics
Location: RM5
08:30 | A theoretical basis for model collapse in recursive training (abstract) |
08:50 | Soft Training: Method for Neural Network Learning (abstract) |
09:10 | New Convergence Rates for Function Approximation Using Kernel Methods (abstract) |
09:30 | Joint Problems in Learning Multiple Dynamical Systems (abstract) |
09:50 | Artificial Parameter Based Approximate Solutions of Non-Symmetric Matrix Riccati Differential Equation (abstract) |
08:30-10:10 Session SBTB01: Incentive and Information Design
Chairs:
Location: RM1
08:30 | LLM-Stackelberg Games: Conjectural Reasoning Equilibria, Meta-Cognition, and Applications to Spearphishing (abstract) |
08:50 | Deception against Game-Theoretic Learning in Complex Adaptive Systems (abstract) |
09:10 | Experimentation in the Presence of Strategic Buyers: Unbiased Estimation Under Intertemporal Substitution (abstract) |
09:30 | Persuasion under Dynamic Trust: Parametric Sender Behavior (abstract) |
10:10-10:30Break
10:30-12:10 Session BHRSO4: Resource Allocation in Networks II
Chairs:
Location: RM2
10:30 | From signaling to interviews in random matching markets (abstract) |
10:50 | Stochastic model and decomposition schemes for relaxation oscillator based SAT solver (abstract) |
11:10 | Scheduling with Uncertain Holding Costs and its Application to Content Moderation (abstract) |
11:30 | Projection-based Lyapunov method for fully heterogeneous weakly-coupled MDPs (abstract) |
11:50 | Dynamic Matching with Post-allocation Service and its Application to Refugee Resettlement (abstract) |
10:30-12:10 Session LAVA03: AI for Science
Chair:
Location: RM1
10:30 | Learning and predicting uncertain dynamical systems from data (abstract) |
10:50 | Hierarchical Implicit Neural Operators (abstract) |
11:10 | Confronting Uncertainty in AI for Science (abstract) |
11:30 | Foundation Models for Spatio-temporal Physics (abstract) |
11:50 | Automation and generative AI accelerated design of bio-therapeutics (abstract) |
10:30-12:10 Session REGS05: Information Theory
Location: RM4
10:30 | Exact Channel Simulation under Exponential Cost (abstract) |
10:50 | An Achievable Rate Region for Hypothesis Testing and User Identification with Multiple Sources (abstract) PRESENTER: Vamoua Yachongka |
11:10 | Distributed Hypothesis Testing and the Output Statistics of Random Binning (abstract) PRESENTER: Siming Sun |
11:30 | Source-Channel Coding in Multiple-Access Channels with Correlated Sources (abstract) |
11:50 | On Explicit Families of Outer Bounds for Broadcast Networks (abstract) |
10:30-12:10 Session REGS06: Quantum and Codes
Location: RM3
10:30 | Reduced Complexity Encoding of Non-binary Quasi Cyclic Low-Density Parity-Check Codes (abstract) |
10:50 | Relaying Quantum Information (abstract) |
11:10 | A Cutting-plane Method for Semidefinite Programming with Potential Applications on Noisy Quantum Devices (abstract) |
11:30 | Winning Rates of (n, k) Quantum Coset Monogamy Games (abstract) |
12:10-13:40Lunch Break
13:40-15:40 Session BHRS02: Networks, Algorithms, and Inference
Chairs:
Location: RM4
13:40 | The Sum of Leaf Weights in the Minimum Spanning Tree of the Complete Graph (abstract) |
14:00 | Towards an optimal solution to NMF (abstract) |
14:20 | A Proof of The Changepoint Detection Threshold Conjecture in Preferential Attachment Models (abstract) |
14:40 | Active Generative Models for Inference and Learning in Complex Physical World (abstract) |
15:00 | Reliable Inference at Scale Using Graph Structure (abstract) |
13:40-15:40 Session GFVV02: Sequential Methods II
Chairs:
Location: RM1
13:40 | Optimal Change Detection in Multi-Armed Bandit (abstract) |
14:00 | Truncated LinUCB for Stochastic Linear Bandits (abstract) |
14:20 | Online Kernel CUSUM for Change-Point Detection (abstract) |
14:40 | On Prophet Inequalities for Markov Rewards (abstract) |
15:00 | Sequential Procedures for Early Detection of Machine Faults (abstract) |
15:20 | Quickest Quantum Change Point Detection (abstract) |
13:40-15:40 Session ISAV01: Recent Trends in Wireless Communications
Chair:
Location: RM2
13:40 | Near-Field Quiet Zone Using Passive XL-RIS for 6G-IoT Coexistence in the Upper Mid-Band (abstract) |
14:00 | On Secrecy Capacity of Binary Beampointing Channels with Block Memory and Feedback (abstract) |
14:20 | The Pulse-Shaping Trojan: Refinements and New Results (abstract) |
14:40 | Optimizing Age of Information without Knowing the Age of Information (abstract) |
15:00 | On Estimation of Angles of Arrival in Monostatic ISAC Without Instantaneous Transmit CSI at the Transmiter (abstract) |
15:20 | Interpreting learned error-correcting codes (abstract) |
13:40-15:40 Session REGS07: Deep Retrieval
Location: RM5
13:40 | Joint Constellation and Labeling Design for Gaussian Interference Channels via Autoencoders (abstract) |
14:00 | Regionally Robust Autoencoder-Based Channel Codes (abstract) |
14:20 | DPIR: Deep Predictive Interference-Aware Routing for Wireless Networks (abstract) |
14:40 | Single-Server SPIR over Binary Erasure Channels: Benefits of Noisy Side Information (abstract) |
15:00 | Leaky Multi-Message Private Information Retrieval with Differential Privacy Guarantees (abstract) |
15:20 | Improved Achievable Rate for Single Server SPIR over BEC (abstract) |
13:40-15:40 Session SMHZ02: Verification and Learning II
Chairs:
Location: RM3
13:40 | Is Neural Network Verification Useful and What Is Next? (abstract) |
14:00 | Generating and Checking DNN Verification Proofs (abstract) |
14:20 | StarV: A Qualitative and Quantitative Verification Framework for Learning-enabled Autonomy (abstract) |
14:40 | Reachable and Invariant Sets of Neural Controlled Systems via a Monotone Embedding (abstract) |
15:00 | Analytical Lyapunov Function Discovery: An RL-based Generative Approach (abstract) |
15:20 | Bridging Learning and Reasoning: From Solvers to LLMs (abstract) |
18:00-19:00Social Hour at Alice Campbell Alumni Center
19:00-20:30Banquet Dinner at Alice Campbell Alumni Center
Friday, September 19th
View this program: with abstractssession overviewtalk overview
08:30-10:10 Session REGS08: Informational Characterization
Location: RM3
08:30 | A Precise Performance Analysis of the Randomized Singular Value Decomposition (abstract) |
08:50 | Estimating Error in Natural Distribution Estimation (abstract) |
09:10 | Linking Diffusion Models & I-MMSE (abstract) |
09:30 | Bounds on the Privacy Amplification of Arbitrary Channels via the Contraction of $f_\alpha$-Divergence (abstract) |
09:50 | Information-Theoretic Outer-bounds from Sphere-Packing, Compactness, and Zero-One Laws (abstract) |
08:30-10:10 Session VSGA02: Robust Inference and Learning II
Chair:
Location: RM2
08:30 | Transformers Provably Learn Symbolic Multi-step Reasoning via Chain of Thought (abstract) |
08:50 | Reinforcement Learning Design for Quickest Change Detection - Extended Abstract (abstract) |
09:10 | Challenges of Reliable Training and Evaluation of Large Language Models (abstract) |
09:30 | Follow-the-Perturbed-Leader with Between-Action Dependence (abstract) |
08:30-10:10 Session YXRC01: Economics and Computation
Chair:
Location: RM1
08:30 | Toward a Theory of Data Ecology: Understanding and Steering Data Ecosystems (abstract) |
08:50 | Online Bipartite Matching with Advice (abstract) |
09:10 | Online Fair Allocation of Perishable Resources (abstract) |
09:30 | The Tarski Search Problem: Algorithms, Complexity, and Open Questions (abstract) |
09:50 | Optimal Data Acquisition with Privacy-Aware Agents (abstract) |
10:10-10:40Break
10:40-12:20 Session ISLA01: Information Theory, Statistics, and Data Science
Chairs:
Location: RM4
10:40 | Learning and inference from temporally dependent data (abstract) |
11:00 | Ordinal-Poisson Causal Discovery (abstract) |
11:20 | Focal Loss: Statistical and Information-Theoretic Perspectives (abstract) |
11:40 | Synchronizing Probabilities in Model-Driven Compression (abstract) |
12:00 | A FREQUENTIST THEORY FOR M-POSTERIORS: ASYMPTOTIC AND ROBUSTNESS PROPERTIES (abstract) |
10:40-12:20 Session REGS09: Dynamics
Location: RM1
10:40 | Optimal Sampling and Scheduling for Remote Fusion Estimation of Correlated Wiener Processes (abstract) PRESENTER: Elif Uysal |
11:00 | Optimizing Preventive and Reactive Defense Resource Allocation with Uncertain Sensor Signals (abstract) |
11:20 | Error-Sensitive Dynamic Calibration for Online Optimization with Switching Costs (abstract) |
11:40 | Control of Dynamical Systems with Multiplicative Observation Noise with Unknown Distribution Parameters (abstract) |
12:00 | Problem-dependent convergence bounds for randomized linear gradient compression (abstract) |
10:40-12:20 Session REGS10: Massive Inference
Location: RM2
10:40 | BayesFlow++: A Unified Framework for Amortized Bayesian Inference in Complex Systems (abstract) |
11:00 | On the Sign Structure of the Ridge Estimator for Nonnegative Linear Mappings (abstract) |
11:20 | Hybrid Atomic Norm Sparse/Diffuse Channel Estimation (abstract) |
11:40 | Scaling Wideband Massive MIMO Radar via Beamspace Dimension Reduction (abstract) PRESENTER: Oveys Delafrooz Noroozi |
12:00 | Multi-Cell MMSE Processing and Pilot Assignment in Massive MIMO under Correlated Fading (abstract) PRESENTER: Azadeh Vosoughi |
10:40-12:20 Session REGS11: Network Engineering
Location: RM3
10:40 | Optimal Service Mode Assignment in a Simple Computation Offloading System (abstract) |
11:00 | Distributed Caching of Transient Contents in a Tandem of Caches (abstract) |
11:20 | Variable Min-Cut Max-Flow Bounds and Algorithms in Finite Regime (abstract) |
11:40 | Version Age of Information with Contact Mobility in Gossip Networks (abstract) |
12:00 | Minimum-Latency Reliable Routing in Interference-Powered Networks (abstract) |