kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 677) Show all publications
Zamani, A., Daei, S., Changizi, A. & Skoglund, M. (2025). A Unified Framework for Joint Semantic and Privacy Design Under Bounded Leakage. In: SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings: . Paper presented at 26th IEEE International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications, SPAWC 2025, Surrey, United Kingdom of Great Britain, Jul 7 2025 - Jul 10 2025. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Unified Framework for Joint Semantic and Privacy Design Under Bounded Leakage
2025 (English)In: SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2025Conference paper, Published paper (Refereed)
Abstract [en]

We present a unified framework for semantic communication under bounded privacy leakage, in which an encoder must reveal selected information about a source while restricting the disclosure of correlated private data. In contrast to prior work that merely injects noise over a fixed representation, we co-design both the semantic mapping and the noise mechanism. Leveraging extended versions of the Functional Representation Lemma (FRL) and the Strong Functional Representation Lemma (SFRL), we model how the disclosed data arise from the original source and correlated private data. We then formulate a new optimization problem to align the resulting distributions with a 'goal' distributionbalancing accuracy for the user's task and privacy constraints on sensitive data. Furthermore, we propose two distinct mapping strategies that map the original signal domain to a compact semantic space. Our numerical results verify the effectiveness of this joint design, demonstrating significant benefits over conventional methods for privacy-constrained semantic communication.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Computer Sciences Communication Systems Signal Processing
Identifiers
urn:nbn:se:kth:diva-371369 (URN)10.1109/SPAWC66079.2025.11143335 (DOI)2-s2.0-105016907515 (Scopus ID)
Conference
26th IEEE International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications, SPAWC 2025, Surrey, United Kingdom of Great Britain, Jul 7 2025 - Jul 10 2025
Note

Part of ISBN 978-1-6654-7776-5

QC 20251013

Available from: 2025-10-13 Created: 2025-10-13 Last updated: 2025-10-13Bibliographically approved
Wang, Q., Zhang, G., Yang, Y., Ren, C., Wu, W., Zhao, X., . . . Sun, D. (2025). An Efficient GPU-Based Halpern Accelerating Algorithm for Large-Scale DC Optimal Power Flow. IEEE Transactions on Power Systems
Open this publication in new window or tab >>An Efficient GPU-Based Halpern Accelerating Algorithm for Large-Scale DC Optimal Power Flow
Show others...
2025 (English)In: IEEE Transactions on Power Systems, ISSN 0885-8950, E-ISSN 1558-0679Article in journal (Refereed) Epub ahead of print
Abstract [en]

With numerous renewable generators and energy storage systems integrated into the power grids, the security-constrained DC optimal power flow (DCOPF) is essential for power system operation. For large-scale power grids, traditional CPU-based optimization algorithms (such as the simplex and barrier methods) have saturated in computational efficiency and are inherently difficult to parallelize. To tackle these issues, by incorporating the symmetric Gauss–Seidel (sGS) decomposition, this work develops a GPU-based Halpern Peaceman-Rachford algorithm, termed the sGS-HPR, which enjoys an O(1k) iteration complexity in terms of the KKT residual. Moreover, the closed-form solutions for all subproblems are derived, which only consist of matrix- vector multiplications and vector operations, and thus can be easily parallelized on GPUs. As a consequence, the developed sGS-HPR algorithm enjoys a O(NL × n/ϵ) non-ergodic computational complexity in terms of floating-point operations for obtaining an ϵ-optimal solution measured by the KKT residual for large-scale DCOPF problems, where n represents the variable dimension, and NL denotes the number of branches in the power grid. Extensive numerical tests on large-scale power grids, reaching up to the 9241- bus PEGASE system, demonstrate the scalability and superior efficiency of the developed GPU-based sGS-HPR algorithm compared to state-of-the-art methods. Notably, the proposed method achieves a 6× speedup compared with Gurobi for large-scale instances. Additionally, for ultra-large-scale cases, Gurobi throws an “out-of-memory” error, while the proposed sGS-HPR algorithm maintains its computational scalability and efficiency.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
computational complexity, convergence rate, DC optimal power flow, GPU acceleration, Halpern iteration, Peaceman-Rachford splitting, symmetric Gauss–Seidel decomposition
National Category
Computational Mathematics Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-373737 (URN)10.1109/TPWRS.2025.3635652 (DOI)2-s2.0-105022702669 (Scopus ID)
Note

QC 20251208

Available from: 2025-12-08 Created: 2025-12-08 Last updated: 2025-12-08Bibliographically approved
Gouverneur, A., Oechtering, T. J. & Skoglund, M. (2025). An Information-Theoretic Analysis of Thompson Sampling for Logistic Bandit Problems.
Open this publication in new window or tab >>An Information-Theoretic Analysis of Thompson Sampling for Logistic Bandit Problems
2025 (English)In: Article in journal (Refereed) Submitted
Abstract [en]

We study the performance of the Thompson Sampling algorithm for logistic bandit problems. In this setting, an agent receives binary rewards with probabilities determined by a logistic function, $\exp(\beta \langle a, \theta \rangle)/(1+\exp(\beta \langle a, \theta \rangle))$, with parameter $\beta>0$, and where both the action $a\in \mathcal{A}$ and the unknown parameter $\theta \in \mathcal{O}$ lie within the $d$-dimensional unit ball. Adopting the information-theoretic framework introduced by Russo and Van Roy, we derive regret bounds via the analysis of the information ratio, a statistic that quantifies the trade-off between the immediate regret incurred by the agent and the information it gained about the parameter $\theta$.We improve upon previous results and establish that the information ratio is bounded in $O\big(d \alpha^{-2} \big)$, where $d$ is the dimension of the problem and $\alpha$ is a \emph{minimax measure} of the alignment between the action space $\mathcal{A}$ and the parameter space $\mathcal{O}$. Notably our bound does not scale exponentially with the logistic slope and is independent of the cardinality of the action and parameter spaces. Using this result, we derive a bound on the Thompson Sampling expected regret of order $O(d \alpha^{-1} \sqrt{T \log(\beta T/d)})$, where $T$ is the number of time steps. To our knowledge, this is the \emph{first regret bound for any logistic bandit algorithm} that eliminates any exponential scaling with $\beta$ and is independent of the number of actions. In particular, when the parameters are on the sphere and the action space contains the parameter space, the expected regret bound is of order $O(d \sqrt{T \log(\beta T/d)})$.

National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-373212 (URN)
Note

QC 20251124

Available from: 2025-11-21 Created: 2025-11-21 Last updated: 2025-11-30Bibliographically approved
Gouverneur, A., Rodríguez Gálvez, B., Oechtering, T. J. & Skoglund, M. (2025). An Information-Theoretic Analysis of Thompson Sampling with Infinite Action Spaces. In: IEEE (Ed.), ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP): . Paper presented at International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India, April 6-11, 2025. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>An Information-Theoretic Analysis of Thompson Sampling with Infinite Action Spaces
2025 (English)In: ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) / [ed] IEEE, Institute of Electrical and Electronics Engineers (IEEE) , 2025Conference paper, Published paper (Refereed)
Abstract [en]

This paper studies the Bayesian regret of the Thompson Sampling algorithm for bandit problems, building on the information-theoretic framework introduced by Russo and Van Roy [1]. Specifically, it extends the rate-distortion analysis of Dong and Van Roy [2], which provides near-optimal bounds for linear bandits. A key limitation of these results is the assumption of a finite action space. We address this by extending the analysis to settings with infinite and continuous action spaces. Additionally, we specialize our results to bandit problems with expected rewards that are Lipschitz continuous with respect to the action space, deriving a regret bound that explicitly accounts for the complexity of the action space.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-373210 (URN)10.1109/ICASSP49660.2025.10888239 (DOI)2-s2.0-105003867651 (Scopus ID)
Conference
International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India, April 6-11, 2025
Note

QC 20251124

Available from: 2025-11-21 Created: 2025-11-21 Last updated: 2025-11-24Bibliographically approved
Gouverneur, A., Rodríguez Gálvez, B., Oechtering, T. J. & Skoglund, M. (2025). Chained Information-Theoretic Bounds and Tight Regret Rate for Linear Bandit Problems.
Open this publication in new window or tab >>Chained Information-Theoretic Bounds and Tight Regret Rate for Linear Bandit Problems
2025 (English)In: Article in journal (Refereed) Submitted
Abstract [en]

This paper studies the Bayesian regret of a variant of the Thompson-Sampling algorithm for bandit problems. It builds upon the information-theoretic framework of [1] and, more specifically, on the rate-distortion analysis from [2], where they proved a bound with regret rate of O(d T log(T))for the d-dimensional linear bandit setting. We focus on bandit problems with a metric action space and, using a chaining argument, we establish new bounds that depend on the metric entropy of the action space for a variant of Thompson-Sampling. Under suitable continuity assumption of the rewards, our bound offers a tight rate of O(d√T) for d-dimensional linear bandit problems.

National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-373211 (URN)
Note

QC 20251124

Available from: 2025-11-21 Created: 2025-11-21 Last updated: 2025-11-24Bibliographically approved
Rivetti, S., Demir, Ö. T., Björnson, E. & Skoglund, M. (2025). Clutter-Aware Target Detection for ISAC in a Millimeter-Wave Cell-Free Massive MIMO System. In: SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings: . Paper presented at 26th IEEE International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications, SPAWC 2025, Surrey, United Kingdom of Great Britain, Jul 7 2025 - Jul 10 2025. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Clutter-Aware Target Detection for ISAC in a Millimeter-Wave Cell-Free Massive MIMO System
2025 (English)In: SPAWC 2025 - 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications - Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2025Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we investigate the performance of an integrated sensing and communication (ISAC) system within a cell-free massive multiple-input multiple-output (MIMO) system. Each access point (AP) operates in the millimeter-wave (mmWave) frequency band. The APs jointly serve the user equipments (UEs) in the downlink while simultaneously detecting a target through dedicated sensing beams directed toward a reconfigurable intelligent surface (RIS). Although the AP-RIS, RIS-target, and AP-target channels have both line-of-sight (LoS) and non-line-of-sight (NLoS) parts, only knowledge of the LoS paths is assumed to be available. A key contribution of this study is the consideration of clutter, which degrades the target detection performance if not handled. We propose an algorithm to alternatively optimize the transmit power allocation and the RIS phase-shift matrix, maximizing the target signal-to-clutter-plus-noise ratio (SCNR) while ensuring a minimum signal-to-interference-plus-noise ratio (SINR) for the UEs. Numerical results demonstrate that exploiting the clutter subspace significantly enhances detection probability, particularly at high clutter-to-noise ratios, and reveal that an increased number of transmit side clusters impairs detection performance. Finally, we highlight the performance gains achieved using a dedicated sensing beam.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
cell-free massive MIMO, ISAC, mmWave, RIS
National Category
Communication Systems Telecommunications Signal Processing
Identifiers
urn:nbn:se:kth:diva-371383 (URN)10.1109/SPAWC66079.2025.11143538 (DOI)2-s2.0-105016903244 (Scopus ID)978-1-6654-7776-5 (ISBN)
Conference
26th IEEE International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications, SPAWC 2025, Surrey, United Kingdom of Great Britain, Jul 7 2025 - Jul 10 2025
Note

Part of ISBN 978-1-6654-7776-5

QC 20251009

Available from: 2025-10-09 Created: 2025-10-09 Last updated: 2025-10-09Bibliographically approved
Weng, S., Xiao, M., Ren, C. & Skoglund, M. (2025). Coded Cooperative Networks for Semi-Decentralized Federated Learning. IEEE Wireless Communications Letters, 14(3), 626-630
Open this publication in new window or tab >>Coded Cooperative Networks for Semi-Decentralized Federated Learning
2025 (English)In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 14, no 3, p. 626-630Article in journal (Refereed) Published
Abstract [en]

To enhance straggler resilience in federated learning (FL) systems, a semi-decentralized approach has been recently proposed, enabling collaboration between clients. Unlike the existing semi-decentralized schemes, which adaptively adjust the collaboration weight according to the network topology, this letter proposes a deterministic coded network that leverages wireless diversity for semi-decentralized FL without requiring prior information about the entire network. Furthermore, the theoretical analyses of the outage and the convergence rate of the proposed scheme are provided. Finally, the superiority of our proposed method over benchmark methods is demonstrated through comprehensive simulations.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Training, Stochastic processes, Convergence, Wireless networks, Signal to noise ratio, Linear programming, Encoding, Computational modeling, Collaboration, Codes, Semi-decentralized federated learning, wireless network, diversity network code, communication stragglers
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-361615 (URN)10.1109/LWC.2024.3518057 (DOI)001439414200029 ()2-s2.0-86000777837 (Scopus ID)
Note

QC 20250326

Available from: 2025-03-26 Created: 2025-03-26 Last updated: 2025-03-26Bibliographically approved
Li, C., Xiao, M. & Skoglund, M. (2025). Coded Robust Aggregation for Distributed Learning under Byzantine Attacks. IEEE Transactions on Information Forensics and Security, 20, 11636-11651
Open this publication in new window or tab >>Coded Robust Aggregation for Distributed Learning under Byzantine Attacks
2025 (English)In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 20, p. 11636-11651Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate the problem of distributed learning (DL) in the presence of Byzantine attacks. For this problem, various robust bounded aggregation (RBA) rules have been proposed at the central server to mitigate the impact of Byzantine attacks. However, current DL methods apply RBA rules for the local gradients from the honest devices and the disruptive information from Byzantine devices, and the learning performance degrades significantly when the local gradients of different devices vary considerably from each other. To overcome this limitation, we propose a new DL method to cope with Byzantine attacks based on coded robust aggregation (CRA-DL). Before training begins, the training data are allocated to the devices redundantly. During training, in each iteration, the honest devices transmit coded gradients to the server computed from the allocated training data, and the server then aggregates the information received from both honest and Byzantine devices using RBA rules. In this way, the global gradient can be approximately recovered at the server to update the global model. Compared with current DL methods applying RBA rules, the improvement of CRA-DL is attributed to the fact that the coded gradients sent by the honest devices are closer to each other. This closeness enhances the robustness of the aggregation against Byzantine attacks, since Byzantine messages tend to be significantly different from those of honest devices in this case. We theoretically analyze the convergence performance of CRA-DL. Finally, we present numerical results to verify the superiority of the proposed method over existing baselines, showing its enhanced learning performance under Byzantine attacks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Byzantine attacks, convergence analysis, distributed learning, gradient coding, robust aggregation
National Category
Signal Processing
Identifiers
urn:nbn:se:kth:diva-372561 (URN)10.1109/TIFS.2025.3624620 (DOI)001606641400002 ()2-s2.0-105019656740 (Scopus ID)
Note

QC 20251111

Available from: 2025-11-11 Created: 2025-11-11 Last updated: 2025-11-11Bibliographically approved
Li, C., Xiao, M. & Skoglund, M. (2025). Communication-Efficient Semi-Decentralized Federated Learning in the Presence of Stragglers. IEEE Transactions on Communications, 73(12), 13999-14013
Open this publication in new window or tab >>Communication-Efficient Semi-Decentralized Federated Learning in the Presence of Stragglers
2025 (English)In: IEEE Transactions on Communications, ISSN 0090-6778, E-ISSN 1558-0857, Vol. 73, no 12, p. 13999-14013Article in journal (Refereed) Published
Abstract [en]

In this paper, we consider the problem of federated learning (FL) with devices that have intermittent connectivity to the central server. For this problem, the concept of semi-decentralized FL has been proposed in the literature. This paradigm allows non-straggler devices to relay the gradients computed by the stragglers to the server, and enables realization of gradient coding (GC) to mitigate the negative impact of the stragglers that fail to communicate directly to the central server. However, for GC in semi-decentralized FL, the communication overhead caused by information transmission among the devices is significant. To overcome this shortcoming, inspired by the existing communication-optimal exact consensus algorithm (CECA), we propose a new communication-efficient semi-decentralized FL method (COFFEE). In each round, the devices exchange information by taking a certain number of steps towards communication-optimal exact consensus, ensuring that each device obtains the average of the gradients computed by both its previous neighbors and itself. Afterwards, the non-stragglers transmit the local average result to the server for global aggregation to update the global model. We analyze the convergence performance and the communication overhead of COFFEE analytically. Building on this, to further enhance learning performance under a specific communication overhead, we propose an enhanced version of COFFEE with an adaptive aggregation rule at the central server, referred to as A-COFFEE, which adjusts to the straggler pattern of the devices over training rounds. Experiments are conducted to verify that the proposed methods outperform the baseline methods.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
communication efficiency, federated learning, intermittent connectivity, stragglers
National Category
Control Engineering Communication Systems
Identifiers
urn:nbn:se:kth:diva-370075 (URN)10.1109/TCOMM.2025.3605479 (DOI)2-s2.0-105015207710 (Scopus ID)
Note

QC 20250922

Available from: 2025-09-22 Created: 2025-09-22 Last updated: 2025-12-30Bibliographically approved
Weng, S., Ren, C., Xiao, M. & Skoglund, M. (2025). Cooperative Gradient Coding. IEEE Transactions on Communications
Open this publication in new window or tab >>Cooperative Gradient Coding
2025 (English)In: IEEE Transactions on Communications, ISSN 0090-6778, E-ISSN 1558-0857Article in journal (Refereed) Epub ahead of print
Abstract [en]

This work studies gradient coding (GC) in the context of distributed training problems with unreliable communication. We propose cooperative GC (CoGC), a novel gradient-sharing-based GC framework that leverages cooperative communication among clients. This approach eliminates the need for dataset replication, making it communication- and computation-efficient and suitable for federated learning (FL). By employing the standard GC decoding mechanism, CoGC yields strictly binary outcomes: the global model is either recovered exactly or the recovery is meaningless, with no intermediate outcomes. This characteristic ensures the optimality of the training and demonstrates strong resilience to client-to-server communication failures. However, due to the limited flexibility of the recovery outcomes, the decoding mechanism may also result in communication inefficiency and hinder convergence, especially when communication channels among clients are in poor condition. To overcome this limitation and further exploit the potential of GC matrices, we propose a complementary decoding mechanism, termed GC<sup>+</sup>, which leverages information that would otherwise be discarded during GC decoding failures. This approach significantly improves system reliability against unreliable communication, as the full recovery<sup>1</sup> of the global model dominates in GC<sup>+</sup>. To conclude, this work establishes solid theoretical frameworks for both CoGC and GC<sup>+</sup>. We assess the system reliability by outage analyses and convergence analyses for each decoding mechanism, along with a rigorous investigation of how outages affect the structure and performance of GC matrices. Finally, the effectiveness of CoGC and GC<sup>+</sup> is validated through extensive simulations.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Complementary decoding mechanism, Convergence, Cooperative gradient coding, Federated learning, Secure Aggregation, Straggler mitigation, Unreliable communication
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-371622 (URN)10.1109/TCOMM.2025.3612589 (DOI)2-s2.0-105017454960 (Scopus ID)
Note

QC 20251017

Available from: 2025-10-17 Created: 2025-10-17 Last updated: 2025-10-17Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-7926-5081

Search in DiVA

Show all publications