TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| 6 | |
| 6G | |
| A | |
| A Priori Optimization | |
| Abstractions | |
| Achievable Rates | |
| active generative AI | |
| active learning | |
| Adaptive Optimization | |
| Adversarial robustness | |
| adversarial training | |
| Age of Information | |
| Age of Information | |
| agent-based model | |
| AI for Science | |
| AI-enabled Cyber-Physical Systems | |
| aleatoric uncertainty | |
| Algorithms with predictions | |
| Alpha-mutual information | |
| Analytical Function Discovery | |
| anomaly detection | |
| Approximation Error | |
| Artificial Intelligence | |
| Artificial neural networks | |
| Artificial parameter | |
| asymmetric channels | |
| asymptotic optimality | |
| atomic norm | |
| Attention | |
| Autoencoder | |
| automation | |
| Autonomous systems | |
| Average reward | |
| B | |
| balanced matching | |
| batteries | |
| Bayesian deep learning | |
| Bayesian inference | |
| Bayesian methods | |
| Bayesian networks | |
| Bayesian persuasion | |
| Bayesian uncertainty quantification | |
| Beamforming | |
| Beamspace Processing | |
| binary dot product | |
| Binning | |
| Biometric identification systems | |
| biosystems design | |
| Breakdown Point | |
| broadcast channel | |
| broadcast networks | |
| Budget Constraints | |
| C | |
| caching network | |
| Camera-based Perception | |
| capacity region | |
| Catastrophic Forgetting | |
| causal discovery | |
| causal inference | |
| causal mixing | |
| chain of thought | |
| Change Detection | |
| change-point | |
| Change-point detection | |
| Changepoint detection | |
| channel coding | |
| channel estimation | |
| Channel simulation | |
| channel with feedback | |
| Classification | |
| Cloud Computing | |
| clustering of time series | |
| Codec | |
| coding techniques and applications | |
| coding theorem | |
| coding theory | |
| combination network | |
| Combinatorial design theory | |
| Common randomness | |
| Communication Systems | |
| Complete Information | |
| complex networked systems | |
| Complexity | |
| Compositional Verification | |
| compressed sensing | |
| Compression | |
| compression | |
| computation offloading | |
| Computational complexity | |
| Computational imaging | |
| Concentration | |
| Conditional Value at Risk | |
| Conjectural reasoning | |
| consensus | |
| Conservative Q-learning | |
| Constellation Design | |
| constrained Cramer-Rao bound | |
| Constrained Markov Decision Process | |
| Constraint satisfaction problem | |
| content caching | |
| Continual Learning | |
| contraction theory | |
| contrastive pre-training | |
| Control | |
| convergence of probability measures | |
| Converses | |
| convex minorant | |
| convex optimization | |
| coordination games | |
| Copositive programming | |
| coset states | |
| Cost Optimization | |
| Counterfactual Retrieval | |
| cross technology communications | |
| cross-sector partnership | |
| CUSUM | |
| cutting-plane methods | |
| Cyber Deception | |
| cyber-physical systems | |
| cyclostationary | |
| D | |
| data acquisition | |
| data assimilation | |
| Data compression | |
| data ecology | |
| data markets | |
| Data modeling | |
| data-driven methods | |
| dataflows | |
| day-ahead | |
| DC power flow | |
| Dec-POMDP | |
| Decentralized algorithms | |
| Decoding | |
| Deep Learning | |
| Deep Neural Network Verification | |
| deep reinforcement learning (DRL) | |
| delay-optimal control | |
| Delayed engagement decision | |
| demand response | |
| denoising | |
| denoising score matching | |
| dependent data | |
| desalination | |
| detection and estimation | |
| detection delay | |
| Differential entropy | |
| Differential game | |
| Differential Privacy | |
| differential privacy | |
| Differential Privacy | |
| diffusion | |
| Diffusion model | |
| Diffusion models | |
| Directional Modulation | |
| discrete distribution estimation | |
| distillation | |
| distributed and large-scale systems | |
| Distributed Computing | |
| Distributed Energy Resources | |
| distributed learning | |
| distributed optimization | |
| Distributed Storage Systems | |
| Distribution Estimation | |
| distribution-free algorithms | |
| duty cycle constraint | |
| Dynamic calibration | |
| Dynamic information acquisition | |
| Dynamic mechanism design | |
| dynamic scheduling | |
| dynamical systems | |
| dynamical systems | |
| E | |
| echo state networks | |
| electricity | |
| electricity market | |
| electricity markets | |
| Encoding | |
| Energy | |
| Energy harvesting wireless networks | |
| Entanglement-assisted communication | |
| Entropy coding | |
| Epidemiological modeling | |
| epistemic uncertainty | |
| Equilibrium selection | |
| ergodic rate | |
| Erlang-C | |
| Error-correcting codes | |
| Error-sensitive | |
| Estimation | |
| Estimation | |
| Estimation bias | |
| Evaluation | |
| exploration | |
| Exponential cost | |
| externality | |
| F | |
| f-divergence inequalities | |
| Failure discovery | |
| Fairness | |
| farsightedness | |
| federated learning | |
| Federated learning (FL) | |
| Federated LLM Fine-Tuning | |
| Fine-tuning LLMs | |
| finite regime | |
| flow-based models | |
| Focal loss | |
| Follow-the-Perturbed-Leader | |
| Follow-the-Regularized-Leader | |
| formal methods | |
| formal verification | |
| Foundation Models | |
| Function Approximation | |
| G | |
| game theory | |
| Gaussian Comparision Inequalities | |
| generalized synchronization | |
| Generative AI | |
| Generative modeling | |
| generative models | |
| Geometric Deep Learning | |
| ghost modulation | |
| Good-Turing estimator | |
| Gossip Networks | |
| graph neural network (GNN) | |
| Graph Neural Networks | |
| Graphon | |
| group formation | |
| Group Testing | |
| groupcast | |
| Guidance problem | |
| H | |
| hamming coding | |
| Hardware Trojan | |
| Heavy-Tailed Noise | |
| Heavy-traffic analysis | |
| heterogeneity | |
| Heterogeneous stochastic systems | |
| hierarchical models | |
| high-dimensional data | |
| High-Probability Bounds | |
| Human–AI collaboration | |
| Hypothesis testing | |
| hypothesis testing | |
| I | |
| I-MMSE | |
| identifiability | |
| identification rate | |
| image editing | |
| Image restoration | |
| impossibility upper bound | |
| Incentivization | |
| Incomplete information | |
| Infinite Dimensional Optimization | |
| Influence Function | |
| information design | |
| information freshness | |
| Information Fusion | |
| Information Fusion | |
| Information structure | |
| Information theoretic lower bounds | |
| Information Theoretic Privacy | |
| information theoretic security | |
| Information Theory | |
| information theory | |
| Information-Theoretic Privacy | |
| Integrated Sensing and Communication (ISAC) | |
| interactive error-correcting codes | |
| Interference Channel | |
| Interference-powered networks | |
| interim stability | |
| Interpretable machine learning | |
| interval Markov decision process | |
| Inverse Constraint Learning | |
| inverse problem | |
| Inverse problem solving | |
| inverse problems | |
| J | |
| Join the Shortest Queue | |
| joint communication and sensing | |
| joint problems | |
| K | |
| Kernel Methods | |
| kernel statistics | |
| knapsack problem | |
| Koopman | |
| Kron Reduction | |
| Kruskal's Algorithm | |
| KV Cache | |
| L | |
| Language Models | |
| Large language model | |
| Large language models | |
| Large language models (LLMs) | |
| Large system analysis | |
| Latency | |
| Lattice | |
| LDPC | |
| Learned error-correcting codes | |
| Learning in general games | |
| learning linear dynamical systems | |
| Learning to communicate | |
| Learning-enabled Autonomous Systems | |
| Learning-enabled Autonomy | |
| Lifelong Learning | |
| limit theorems | |
| Linear Control | |
| linear quadratic regulator | |
| linearization | |
| Link function | |
| LLM | |
| LLM Fine-Tuning | |
| load balancing | |
| local differential privacy | |
| log-likelihood training | |
| logic | |
| Low-light | |
| Low-rank | |
| Lyapunov | |
| Lyapunov Function | |
| Lyapunov functions | |
| Lyapunov methods | |
| M | |
| M-estimator | |
| M-MMSE | |
| machine faults | |
| machine learning | |
| machine learning and learning theory | |
| machine learning representations | |
| Majority-Logic Decoding | |
| Majorization theory | |
| Malliavin derivative | |
| market power | |
| Markov chain | |
| Markov Chain Monte Carlo | |
| Markov chains | |
| Markov Decision Process | |
| Markov Decision Process | |
| Markov Games | |
| martingale convergence theorem | |
| Massive MIMO | |
| Massive MIMO Radar | |
| Matrix factorization | |
| Matrix norms | |
| Matrix Riccati Differential Equation | |
| Mechanism Design | |
| message-passing algorithm | |
| Microgrid network | |
| millimeter-wave | |
| Minimax optimality | |
| Minimum Spanning Tree | |
| Minkowski sums | |
| missing mass | |
| Missing mass | |
| Mixing | |
| MMSE | |
| model based RL | |
| model collapse | |
| Model efficiency | |
| model reduction | |
| Model Selection | |
| model structural uncertainty | |
| model-form error | |
| monogamy-of-entanglement | |
| Monotone systems | |
| Monte Carlo methods | |
| Multi armed bandit (MAB) | |
| Multi-agent Reinforcement Learning | |
| Multi-arm bandit | |
| multi-armed bandit | |
| Multi-cell processing | |
| multi-modal detection | |
| multi-party computation | |
| Multiple-Access Channel | |
| multiplex networks | |
| Multiplicative Noise | |
| Multitask learning | |
| multivariate time series | |
| MVDR Beamforming | |
| N | |
| net metering | |
| network coding | |
| Network constraints | |
| network control | |
| network flow | |
| network information theory | |
| network topology | |
| Neural Control Barrier Functions | |
| neural differential equations | |
| Neural Network Controllers | |
| neural network verification | |
| Neural Networks | |
| neural operators | |
| neural perception | |
| neural stochastic differential equation | |
| Non-binary | |
| non-equilibrium statistical physics | |
| Non-monetary mechanism | |
| noncooperative dynamic games | |
| Nonlinear control | |
| nonlinear dynamic system | |
| nonlinear dynamics | |
| Nonlinear Systems | |
| Nudges | |
| numerical analysis | |
| O | |
| Oblivious Transfer | |
| offline reinforcement learning | |
| online algorithm | |
| Online algorithms | |
| online allocation | |
| Online convex optimization | |
| Online Learning | |
| Online Linear Optimization | |
| Online matching | |
| online resource allocation | |
| opacity | |
| Open questions | |
| Operating Envelopes | |
| Opinion dynamics | |
| optimal battery placement | |
| Optimal Control | |
| optimal experimental design | |
| optimal experimental design (OED) | |
| Optimal stopping | |
| Optimal Transport | |
| optimization | |
| Optimization | |
| optimization performance analysis | |
| Optimization Theory | |
| Outage constrained routing | |
| outliers | |
| P | |
| P-MMSE | |
| Partial Information | |
| PDE | |
| Perception models | |
| Perishability | |
| perturbation | |
| Pessimism Principle | |
| physical intelligence | |
| Physical-Layer Security | |
| Pilot contamination | |
| Poincare | |
| Poisson equation | |
| Poisson functional representation | |
| polyhedral cone | |
| post-allocation service | |
| posterior sampling | |
| POVM optimization | |
| Power electronic converters | |
| Power Flow | |
| Power Modulation | |
| Power system operations | |
| Power Systems | |
| Pre-order preserving linear maps | |
| Preferential attachment models | |
| Preventive and reactive defense | |
| Price optimization | |
| pricing | |
| privacy amplification | |
| privacy costs | |
| privacy preservation | |
| Private Information Retrieval | |
| Private Information Retrieval | |
| Probabilistic Minimum Spanning Tree Problem | |
| probabilistic model checking | |
| proof certification | |
| proof generation and checking | |
| Prophet inequalities | |
| protein design | |
| proxy assignments | |
| Pulse Shaping filter | |
| Pushing the Efficiency-Performance Trade-Off | |
| Q | |
| quality constraint | |
| Quantile regression | |
| quantum algorithms | |
| Quantum capacity | |
| quantum correlations | |
| quantum games | |
| Quantum relay channels | |
| Quantum repeaters | |
| Quasi cyclic | |
| queue | |
| Queueing systems | |
| Queueing theory | |
| quickest change detection | |
| quickest detection | |
| quickest quantum channel change detection | |
| quickest quantum state change detection | |
| R | |
| random binning | |
| random graph | |
| Random Graphs | |
| random matching markets | |
| random matrices | |
| Random matrix theory | |
| Randomized algorithm | |
| randomized cutting-plane method | |
| Randomized Singular Value Decomposition | |
| Randomized SVD | |
| rate region | |
| Rate-Distortion Theory | |
| rate-distortion-perception | |
| Rational Inattention | |
| Reachability Analysis | |
| real-time | |
| reasoning | |
| reasoning | |
| reasoning models | |
| Reconfigurable Antenna Arrays | |
| rectified flow | |
| recursive training | |
| refugee matching | |
| Regression | |
| regret | |
| Reinforcement Learning | |
| reinforcement learning | |
| Reinforcement Learning from Human Feedback (RLHF) | |
| Reinforcement Learning with Symbolic Feedback | |
| Relay-Channel | |
| Reliability | |
| reliability security and trust | |
| Remote Estimation | |
| renewable energy | |
| reoptimization | |
| representation alignment | |
| Representation Learning | |
| Reproducing Kernel Hilbert Space | |
| reservoir computing | |
| Resource allocation | |
| resource pooling | |
| Restless Bandits | |
| restless multi armed bandits | |
| Ridge regression | |
| Risk-seeking Policy Optimization | |
| RL | |
| RLHF | |
| Robust MDP | |
| Robust regression | |
| robust reinforcement learning | |
| robustness | |
| Robustness quantification | |
| rolling element bearing | |
| ROPE | |
| routing algorithms | |
| RSVD | |
| Rényi divergence | |
| Rényi entropy | |
| Rényi-divergence | |
| S | |
| Safe Autonomous Systems | |
| Safety | |
| sample complexity | |
| Sampling | |
| sampling control | |
| SAT/SMT Solvers | |
| Scalability | |
| Scalable pilot assignment | |
| Scheduling | |
| Scheduling Algorithm | |
| score-based diffusion | |
| Second-order Cone Power Flow Relaxation | |
| Secrecy | |
| secrecy capacity | |
| security | |
| self-driving laboratory | |
| Semantic Communication | |
| semantic communications | |
| semantics | |
| semidefinite programming | |
| sequential change detection | |
| Sequential decision making | |
| Sequential decision-making | |
| Sequential decision-making | |
| sequential detection | |
| sequential test | |
| Series expansion | |
| Service rate regions | |
| SGD | |
| shallow and wide networks | |
| Shared resource allocation | |
| Shifted successor measure | |
| side channels | |
| Side information | |
| Sign structure analysis | |
| signaling mechanism | |
| sketching | |
| smart grid | |
| Soft-decision decoding | |
| source coding | |
| source signal separation | |
| Source-Channel Coding | |
| spatial cohesion | |
| Spatially correlated Rayleigh fading | |
| Sphere-packing | |
| SPIR | |
| Spot Instances | |
| Stability | |
| Stackelberg games | |
| Stackelberg Games | |
| State space collapse | |
| Statistical analysis | |
| Stochastic Control | |
| stochastic gradient algorithm | |
| stochastic gradient descent | |
| Stochastic Hybrid Systems | |
| Stochastic linear bandits | |
| stochastic localization | |
| Stochastic Maximum Principle | |
| stochastic optimal control | |
| Stochastic Optimization | |
| stochastic optimization | |
| Stochastic processes | |
| stopping time | |
| Storage vs Transport Capacity Tradeoffs | |
| strategic communication | |
| Strategic deception | |
| strong data processing inequalities | |
| strong duality | |
| strong Nash equilibrium | |
| structural system theory | |
| Sub-quadratic | |
| subspace | |
| subspace permutations | |
| subspace states | |
| switch-type policies | |
| Switchback experiments | |
| Symbolic reasoning | |
| Symbolic Transformer | |
| Symmetric Private Information Retrieval | |
| synthetic data | |
| synthetic data augmentation | |
| System Identification | |
| T | |
| Target Detection | |
| target following | |
| Tarski’s theorem | |
| Tensor Product Attention | |
| test-time scaling | |
| Testing | |
| text summarization | |
| Thompson Sampling | |
| time series forecasting | |
| Time-reversal | |
| time-varying constraints | |
| timing synchronization | |
| Traffic control | |
| training dynamics | |
| Transfer Reinforcement Learning | |
| Transformers | |
| Transport | |
| Trojan Detectability | |
| truncated epigraphs | |
| trust | |
| U | |
| uncertain max flow | |
| uncertain min cut | |
| Uncertainty Quantification | |
| uncertainty quantification (UQ) | |
| unified approach | |
| unit commitment | |
| Unit commitment | |
| universal adversarial attack | |
| universal information theory | |
| Unknown Distribution | |
| Upper confidence bounds | |
| User preferences and Actionability | |
| V | |
| value of data | |
| variable max flow | |
| variable maximum flow | |
| variable min cut | |
| variable minimum cut | |
| Variable-length codes | |
| Variational Inference | |
| W | |
| water-energy nexus | |
| Watermarking | |
| weak derivative estimator | |
| Weakly coupled stochastic dynamic programs | |
| Weakly-coupled MDPs | |
| Wiener filter | |
| Wireless Communication | |
| Wireless Networks | |
| world models | |
| Z | |
| Z Channel | |
| Zero Perception Error | |
| zero-one law | |
| Zero-One Laws | |
| Zero-Shot Learning | |
| zeroth-order optimization | |