TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
6 | |
6G | |
A | |
A Priori Optimization | |
Abstractions | |
Achievable Rates | |
active generative AI | |
active learning | |
Adaptive Optimization | |
Adversarial robustness | |
adversarial training | |
Age of Information | |
Age of Information | |
agent-based model | |
AI for Science | |
AI-enabled Cyber-Physical Systems | |
aleatoric uncertainty | |
Algorithms with predictions | |
Alpha-mutual information | |
Analytical Function Discovery | |
anomaly detection | |
Approximation Error | |
Artificial Intelligence | |
Artificial neural networks | |
Artificial parameter | |
asymmetric channels | |
asymptotic optimality | |
atomic norm | |
Attention | |
Autoencoder | |
automation | |
Autonomous systems | |
Average reward | |
B | |
balanced matching | |
batteries | |
Bayesian deep learning | |
Bayesian inference | |
Bayesian methods | |
Bayesian networks | |
Bayesian persuasion | |
Bayesian uncertainty quantification | |
Beamforming | |
Beamspace Processing | |
binary dot product | |
Binning | |
Biometric identification systems | |
biosystems design | |
Breakdown Point | |
broadcast channel | |
broadcast networks | |
Budget Constraints | |
C | |
caching network | |
Camera-based Perception | |
capacity region | |
Catastrophic Forgetting | |
causal discovery | |
causal inference | |
causal mixing | |
chain of thought | |
Change Detection | |
change-point | |
Change-point detection | |
Changepoint detection | |
channel coding | |
channel estimation | |
Channel simulation | |
channel with feedback | |
Classification | |
cloud computing | |
clustering of time series | |
Codec | |
coding techniques and applications | |
coding theory | |
combination network | |
Combinatorial design theory | |
Common randomness | |
Communication Systems | |
Complete Information | |
complex networked systems | |
Complexity | |
Compositional Verification | |
compressed sensing | |
Compression | |
compression | |
computation offloading | |
Computational complexity | |
Concentration | |
Conditional Value at Risk | |
Conjectural reasoning | |
consensus | |
Conservative Q-learning | |
Constellation Design | |
constrained Cramer-Rao bound | |
Constrained Markov Decision Process | |
Constraint satisfaction problem | |
content caching | |
Continual Learning | |
contraction theory | |
contrastive pre-training | |
Control | |
convergence of probability measures | |
Converses | |
convex minorant | |
convex optimization | |
coordination games | |
Copositive programming | |
coset states | |
Cost Optimization | |
Counterfactual Retrieval | |
cross technology communications | |
cross-sector partnership | |
CUSUM | |
cutting-plane methods | |
Cyber Deception | |
cyber-physical systems | |
cyclostationary | |
D | |
data acquisition | |
data assimilation | |
Data compression | |
data ecology | |
data markets | |
Data modeling | |
data-driven methods | |
dataflows | |
day-ahead | |
DC power flow | |
Dec-POMDP | |
Decentralized algorithms | |
Decoding | |
Deep Learning | |
Deep Neural Network Verification | |
deep reinforcement learning (DRL) | |
delay-optimal control | |
Delayed engagement decision | |
demand response | |
denoising | |
denoising score matching | |
dependent data | |
desalination | |
detection and estimation | |
detection delay | |
Differential entropy | |
Differential game | |
Differential Privacy | |
differential privacy | |
Differential Privacy | |
diffusion | |
diffusion model | |
Diffusion Models | |
Directional Modulation | |
discrete distribution estimation | |
distillation | |
distributed and large-scale systems | |
Distributed Computing | |
Distributed Energy Resources | |
distributed learning | |
distributed optimization | |
Distributed Storage Systems | |
Distribution Estimation | |
distribution-free algorithms | |
duty cycle constraint | |
Dynamic calibration | |
Dynamic information acquisition | |
Dynamic mechanism design | |
dynamic scheduling | |
dynamical systems | |
dynamical systems | |
E | |
echo state networks | |
electricity | |
electricity market | |
electricity markets | |
Encoding | |
Energy | |
Energy harvesting wireless networks | |
Entanglement-assisted communication | |
Entropy coding | |
Epidemiological modeling | |
epistemic uncertainty | |
Equilibrium selection | |
ergodic rate | |
Erlang-C | |
Error-correcting codes | |
Error-sensitive | |
Estimation | |
Estimation | |
Estimation bias | |
Evaluation | |
exploration | |
Exponential cost | |
externality | |
F | |
f-divergence inequalities | |
Failure discovery | |
Fairness | |
farsightedness | |
federated learning | |
Federated learning (FL) | |
Federated LLM Fine-Tuning | |
Fine-tuning LLMs | |
finite regime | |
flow-based models | |
Focal loss | |
Follow-the-Perturbed-Leader | |
Follow-the-Regularized-Leader | |
formal methods | |
formal verification | |
Foundation Models | |
Function Approximation | |
G | |
game theory | |
Gaussian Comparision Inequalities | |
generalized synchronization | |
generative AI | |
Generative modeling | |
generative models | |
Geometric Deep Learning | |
ghost modulation | |
Good-Turing estimator | |
Gossip Networks | |
graph neural network (GNN) | |
Graph Neural Networks | |
Graphon | |
group formation | |
Group Testing | |
groupcast | |
Guidance problem | |
H | |
hamming coding | |
Hardware Trojan | |
Heavy-Tailed Noise | |
Heavy-traffic analysis | |
heterogeneity | |
Heterogeneous stochastic systems | |
hierarchical models | |
high-dimensional data | |
High-Probability Bounds | |
Human–AI collaboration | |
Hypothesis testing | |
hypothesis testing | |
I | |
I-MMSE | |
identifiability | |
identification rate | |
image editing | |
Image restoration | |
impossibility upper bound | |
Incentivization | |
Incomplete information | |
Infinite Dimensional Optimization | |
Influence Function | |
information design | |
information freshness | |
Information Fusion | |
Information Fusion | |
Information structure | |
Information theoretic lower bounds | |
Information Theoretic Privacy | |
information theoretic security | |
Information Theory | |
information theory | |
Information-Theoretic Privacy | |
Integrated Sensing and Communication (ISAC) | |
interactive error-correcting codes | |
Interference Channel | |
Interference-powered networks | |
interim stability | |
Interpretable machine learning | |
interval Markov decision process | |
Inverse Constraint Learning | |
inverse problem | |
inverse problems | |
J | |
Join the Shortest Queue | |
joint communication and sensing | |
joint problems | |
K | |
Kernel Methods | |
kernel statistics | |
knapsack problem | |
Koopman | |
Kron Reduction | |
Kruskal's Algorithm | |
KV Cache | |
L | |
Language Models | |
Large language model | |
Large language models | |
Large language models (LLMs) | |
Large system analysis | |
Latency | |
Lattice | |
LDPC | |
Learned error-correcting codes | |
Learning in general games | |
learning linear dynamical systems | |
Learning to communicate | |
Learning-enabled Autonomous Systems | |
Learning-enabled Autonomy | |
Lifelong Learning | |
limit theorems | |
Linear Control | |
linear quadratic regulator | |
linearization | |
Link function | |
LLM | |
LLM Fine-Tuning | |
load balancing | |
local differential privacy | |
log-likelihood training | |
logic | |
Low-light | |
Lyapunov | |
Lyapunov Function | |
Lyapunov functions | |
Lyapunov methods | |
M | |
M-estimator | |
M-MMSE | |
machine faults | |
machine learning | |
machine learning and learning theory | |
machine learning representations | |
Majority-Logic Decoding | |
Majorization theory | |
Malliavin derivative | |
market power | |
Markov chain | |
Markov Chain Monte Carlo | |
Markov chains | |
Markov Decision Process | |
Markov Decision Process | |
Markov Games | |
martingale convergence theorem | |
Massive MIMO | |
Massive MIMO Radar | |
Matrix factorization | |
Matrix norms | |
Matrix Riccati Differential Equation | |
Mechanism Design | |
message-passing algorithm | |
Microgrid network | |
millimeter-wave | |
Minimax optimality | |
Minimum Spanning Tree | |
Minkowski sums | |
missing mass | |
Missing mass | |
Mixing | |
MMSE | |
model based RL | |
model collapse | |
model reduction | |
Model Selection | |
model structural uncertainty | |
model-form error | |
monogamy-of-entanglement | |
Monotone systems | |
Monte Carlo methods | |
Multi armed bandit (MAB) | |
Multi-agent Reinforcement Learning | |
Multi-arm bandit | |
multi-armed bandit | |
Multi-cell processing | |
multi-modal detection | |
multi-party computation | |
Multiple-Access Channel | |
multiplex networks | |
Multiplicative Noise | |
Multitask learning | |
multivariate time series | |
MVDR Beamforming | |
N | |
net metering | |
network coding | |
Network constraints | |
network control | |
network flow | |
network information theory | |
network topology | |
Neural Control Barrier Functions | |
neural differential equations | |
Neural Network Controllers | |
neural network verification | |
Neural Networks | |
Neural Operators | |
neural perception | |
neural stochastic differential equation | |
Non-binary | |
non-equilibrium statistical physics | |
Non-monetary mechanism | |
noncooperative dynamic games | |
Nonlinear control | |
nonlinear dynamic system | |
nonlinear dynamics | |
Nonlinear Systems | |
Nudges | |
numerical analysis | |
O | |
Oblivious Transfer | |
offline reinforcement learning | |
online algorithm | |
Online algorithms | |
online allocation | |
Online convex optimization | |
Online Learning | |
Online Linear Optimization | |
Online matching | |
Online Resource Allocation | |
opacity | |
Open questions | |
Operating Envelopes | |
Opinion dynamics | |
optimal battery placement | |
Optimal Control | |
optimal experimental design | |
optimal experimental design (OED) | |
Optimal stopping | |
Optimal Transport | |
Optimization | |
Optimization | |
optimization performance analysis | |
Optimization Theory | |
Outage constrained routing | |
outliers | |
P | |
P-MMSE | |
Partial Information | |
PDE | |
Perception models | |
Perishability | |
perturbation | |
Pessimism Principle | |
physical intelligence | |
Physical-Layer Security | |
Pilot contamination | |
Poincare | |
Poisson equation | |
Poisson functional representation | |
polyhedral cone | |
post-allocation service | |
posterior sampling | |
POVM optimization | |
Power electronic converters | |
Power Flow | |
Power Modulation | |
Power system operations | |
Power Systems | |
Pre-order preserving linear maps | |
Preferential attachment models | |
Preventive and reactive defense | |
Price optimization | |
pricing | |
privacy amplification | |
privacy costs | |
privacy preservation | |
private information retrieval | |
Private Information Retrieval | |
Probabilistic Minimum Spanning Tree Problem | |
probabilistic model checking | |
proof certification | |
proof generation and checking | |
Prophet inequalities | |
protein design | |
proxy assignments | |
Pulse Shaping filter | |
Pushing the Efficiency-Performance Trade-Off | |
Q | |
quality constraint | |
Quantile regression | |
quantum algorithms | |
Quantum capacity | |
quantum correlations | |
quantum games | |
Quantum relay channels | |
Quantum repeaters | |
Quasi cyclic | |
queue | |
Queueing systems | |
Queueing theory | |
quickest change detection | |
quickest detection | |
quickest quantum channel change detection | |
quickest quantum state change detection | |
R | |
random binning | |
random graph | |
Random Graphs | |
random matching markets | |
random matrices | |
Random matrix theory | |
Randomized algorithm | |
randomized cutting-plane method | |
Randomized Singular Value Decomposition | |
Randomized SVD | |
rate region | |
Rate-Distortion Theory | |
rate-distortion-perception | |
Rational Inattention | |
Reachability Analysis | |
real-time | |
reasoning | |
reasoning | |
reasoning models | |
Reconfigurable Antenna Arrays | |
rectified flow | |
recursive training | |
refugee matching | |
Regression | |
regret | |
Reinforcement Learning | |
reinforcement learning | |
Reinforcement Learning from Human Feedback (RLHF) | |
Reinforcement Learning with Symbolic Feedback | |
Relay-Channel | |
Reliability | |
reliability security and trust | |
Remote Estimation | |
renewable energy | |
reoptimization | |
representation alignment | |
Representation Learning | |
Reproducing Kernel Hilbert Space | |
reservoir computing | |
Resource allocation | |
resource pooling | |
Restless Bandits | |
restless multi armed bandits | |
Ridge regression | |
Risk-seeking Policy Optimization | |
RLHF | |
Robust MDP | |
Robust regression | |
robust reinforcement learning | |
robustness | |
Robustness quantification | |
rolling element bearing | |
ROPE | |
routing algorithms | |
RSVD | |
Rényi divergence | |
Rényi entropy | |
Rényi-divergence | |
S | |
Safe Autonomous Systems | |
Safety | |
Sample complexity | |
Sampling | |
sampling control | |
SAT/SMT Solvers | |
Scalability | |
Scalable pilot assignment | |
Scheduling | |
Scheduling Algorithm | |
score-based diffusion | |
Second-order Cone Power Flow Relaxation | |
Secrecy | |
secrecy capacity | |
security | |
self-driving laboratory | |
Semantic Communication | |
semantic communications | |
semantics | |
semidefinite programming | |
sequential change detection | |
Sequential decision making | |
Sequential decision-making | |
Sequential decision-making | |
sequential detection | |
sequential test | |
Series expansion | |
Service rate regions | |
SGD | |
shallow and wide networks | |
Shared resource allocation | |
side channels | |
Side information | |
Sign structure analysis | |
signaling mechanism | |
sketching | |
smart grid | |
Soft-decision decoding | |
source coding | |
source signal separation | |
Source-Channel Coding | |
spatial cohesion | |
Spatially correlated Rayleigh fading | |
Sphere-packing | |
SPIR | |
Spot Instances | |
Stability | |
Stackelberg games | |
Stackelberg Games | |
State space collapse | |
Statistical analysis | |
Stochastic Control | |
stochastic gradient algorithm | |
stochastic gradient descent | |
Stochastic Hybrid Systems | |
Stochastic linear bandits | |
stochastic localization | |
Stochastic Maximum Principle | |
stochastic optimal control | |
Stochastic Optimization | |
stochastic optimization | |
Stochastic Processes | |
stopping time | |
Storage vs Transport Capacity Tradeoffs | |
strategic communication | |
Strategic deception | |
strong data processing inequalities | |
strong duality | |
strong Nash equilibrium | |
structural system theory | |
Sub-quadratic | |
subspace | |
subspace permutations | |
subspace states | |
switch-type policies | |
Switchback experiments | |
Symbolic reasoning | |
Symbolic Transformer | |
Symmetric Private Information Retrieval | |
synthetic data | |
synthetic data augmentation | |
System Identification | |
T | |
Target Detection | |
target following | |
Tarski’s theorem | |
Tensor Product Attention | |
test-time scaling | |
Testing | |
text summarization | |
Thompson Sampling | |
time series forecasting | |
Time-reversal | |
time-varying constraints | |
timing synchronization | |
Traffic control | |
training dynamics | |
Transfer Reinforcement Learning | |
Transformers | |
Transport | |
Trojan Detectability | |
truncated epigraphs | |
trust | |
U | |
uncertain max flow | |
uncertain min cut | |
Uncertainty Quantification | |
uncertainty quantification (UQ) | |
unified approach | |
unit commitment | |
Unit commitment | |
universal adversarial attack | |
universal information theory | |
Unknown Distribution | |
Upper confidence bounds | |
User preferences and Actionability | |
V | |
value of data | |
variable max flow | |
variable maximum flow | |
variable min cut | |
variable minimum cut | |
Variable-length codes | |
Variational Inference | |
W | |
water-energy nexus | |
Watermarking | |
weak derivative estimator | |
Weakly coupled stochastic dynamic programs | |
Weakly-coupled MDPs | |
Wiener filter | |
Wireless Communication | |
Wireless networks | |
world models | |
Z | |
Z Channel | |
Zero Perception Error | |
zero-one law | |
Zero-One Laws | |
Zero-Shot Learning | |
zeroth-order optimization |