{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:33:15Z","timestamp":1772908395420,"version":"3.50.1"},"reference-count":179,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Natural Science Fund for Excellent Young Scientists Fund Program"},{"name":"Qin Chuang Yuan Fund Program","award":["QCYRCXM-2022-358"],"award-info":[{"award-number":["QCYRCXM-2022-358"]}]},{"name":"\u201cthe Fundamental Research Funds for the Central Universities\u201d","award":["D5000250296"],"award-info":[{"award-number":["D5000250296"]}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Projects of Shaanxi Province","doi-asserted-by":"publisher","award":["2025GH-YBXM-049"],"award-info":[{"award-number":["2025GH-YBXM-049"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qin Chuang Yuan Fund Program","award":["QCYRCXM-2022-240"],"award-info":[{"award-number":["QCYRCXM-2022-240"]}]},{"name":"National Fund for Distinguished Young Scholars","award":["62025205"],"award-info":[{"award-number":["62025205"]}]},{"name":"Princeton NextG and in part by Princeton Language and Intelligence"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/comst.2026.3656241","type":"journal-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:42:28Z","timestamp":1768941748000},"page":"4555-4580","source":"Crossref","is-referenced-by-count":1,"title":["Frontiers of Generative AI for Network Optimization: Theories, Limits, and Visions"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6275-8904","authenticated-orcid":false,"given":"Bo","family":"Yang","sequence":"first","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3402-8086","authenticated-orcid":false,"given":"Ruihuai","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Weixin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Han","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6221-0754","authenticated-orcid":false,"given":"Xuelin","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9905-3238","authenticated-orcid":false,"given":"Zhiwen","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9837-9538","authenticated-orcid":false,"given":"Samson","family":"Lasaulce","sequence":"additional","affiliation":[{"name":"Khalifa University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8941-8080","authenticated-orcid":false,"given":"M\u00e9rouane","family":"Debbah","sequence":"additional","affiliation":[{"name":"Center for 6G Technology, Khalifa University of Science and Technology, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4827-1793","authenticated-orcid":false,"given":"Mohamed-Slim","family":"Alouini","sequence":"additional","affiliation":[{"name":"Computer, Electrical and Mathematical Sciences and Engineering Division, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2062-131X","authenticated-orcid":false,"given":"H.","family":"Vincent Poor","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9307-2120","authenticated-orcid":false,"given":"Chau","family":"Yuen","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronics Engineering, Nanyang Technological University, Jurong West, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3300664"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2024.3417332"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3701550"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref6","first-page":"1179","article-title":"Optimizing network provisioning through cooperation","volume-title":"Proc. 19th USENIX Symp. Networked Syst. Design Implement.","author":"Sharma"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3592493"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2990630"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3430509"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041405"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3592521"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3227032"},{"key":"ref14","first-page":"19667","article-title":"NVAE: A deep hierarchical variational autoencoder","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","volume":"33","author":"Vahdat"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.52202\/079017-1402"},{"key":"ref16","first-page":"1","article-title":"Normalizing flows for probabilistic modeling and inference","volume":"22","author":"Papamakarios","year":"2019","journal-title":"J. Mach. Learn. Res."},{"key":"ref17","first-page":"27381","article-title":"Flow network based generative models for non-iterative diverse candidate generation","volume-title":"Proc. 35th Int. Conf. Neural Inf. Process. Syst.","volume":"34","author":"Bengio"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3191346"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544251"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00326"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP55844.2023.10285914"},{"key":"ref22","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref23","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. NIPS","author":"Brown"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-022-1410-8"},{"key":"ref25","article-title":"Pushing large language models to the 6G edge: Vision, challenges, and opportunities","author":"Lin","year":"2023","journal-title":"arXiv:2309.16739"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3496491"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3465447"},{"key":"ref28","article-title":"Generative optimization: A perspective on AI-enhanced problem solving in engineering","author":"Regenwetter","year":"2024","journal-title":"arXiv:2412.13281"},{"key":"ref29","article-title":"From LLM reasoning to autonomous AI agents: A comprehensive review","author":"Ferrag","year":"2025","journal-title":"arXiv:2504.19678"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3574765"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3535554"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.016.2300600"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.005.2400019"},{"key":"ref34","article-title":"Internet of agents: Fundamentals, applications, and challenges","author":"Wang","year":"2025","journal-title":"arXiv:2505.07176"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2025.3526887"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2100053"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3422309"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564109"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3400011"},{"key":"ref40","article-title":"A comprehensive survey of large AI models for future communications: Foundations, applications and challenges","author":"Jiang","year":"2025","journal-title":"arXiv:2505.03556"},{"key":"ref41","article-title":"Wireless large AI model: Shaping the AI-native future of 6G and beyond","author":"Zhu","year":"2025","journal-title":"arXiv:2504.14653"},{"key":"ref42","article-title":"From large AI models to agentic AI: A tutorial on future intelligent communications","author":"Jiang","year":"2025","journal-title":"arXiv:2505.22311"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3642838"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.findings-acl.573"},{"key":"ref45","article-title":"GSM-symbolic: Understanding the limitations of mathematical reasoning in large language models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Mirzadeh"},{"key":"ref46","article-title":"Does reinforcement learning really incentivize reasoning capacity in LLMs beyond the base model?","author":"Yue","year":"2025","journal-title":"arXiv:2504.13837"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.emnlp-main.681"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2025.09.003"},{"key":"ref49","first-page":"70293","article-title":"Faith and fate: Limits of transformers on compositionality","volume-title":"Proc. 37th Int. Conf. Neural Inf. Process. Syst.","volume":"36","author":"Dziri"},{"key":"ref50","first-page":"36677","article-title":"Representational strengths and limitations of transformers","volume-title":"Proc. 37th Int. Conf. Neural Inf. Process. Syst.","volume":"36","author":"Sanford"},{"key":"ref51","article-title":"On memorization in diffusion models","author":"Gu","year":"2023","journal-title":"arXiv:2310.02664"},{"key":"ref52","first-page":"2097","article-title":"On the generalization properties of diffusion models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref53","article-title":"LLM-OptiRA: LLM-driven optimization of resource allocation for non-convex problems in wireless communications","author":"Peng","year":"2025","journal-title":"arXiv:2505.02091"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2024.3358284"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2024.3458922"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref57","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume-title":"Proc. 35th Int. Conf. Neural Inf. Process. Syst.","volume":"34","author":"Dhariwal"},{"key":"ref58","article-title":"Classifier-free diffusion guidance","author":"Ho","year":"2022","journal-title":"arXiv:2207.12598"},{"key":"ref59","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020","journal-title":"arXiv:2010.02502"},{"key":"ref60","first-page":"5775","article-title":"DPM-solver: A fast ODE solver for diffusion probabilistic model sampling in around 10 steps","volume-title":"Proc. 36th Int. Conf. Neural Inf. Process. Syst.","volume":"35","author":"Lu"},{"key":"ref61","first-page":"25598","article-title":"Gaussian mixture solvers for diffusion models","volume-title":"Proc. 37th Int. Conf. Neural Inf. Process. Syst.","volume":"36","author":"Guo"},{"key":"ref62","article-title":"Consistency models","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Song"},{"key":"ref63","first-page":"4263","article-title":"Parallel sampling of diffusion models","volume-title":"Proc. 37th Int. Conf. Neural Inf. Process. Syst.","volume":"36","author":"Shih"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00355"},{"key":"ref66","first-page":"17981","article-title":"Structured denoising diffusion models in discrete state-spaces","volume-title":"Proc. 35th Int. Conf. Neural Inf. Process. Syst.","volume":"34","author":"Austin"},{"key":"ref67","first-page":"11960","article-title":"Graph transformer networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Yun"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00387"},{"key":"ref69","article-title":"LLaMA: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv:2302.13971"},{"key":"ref70","article-title":"Gemini: A family of highly capable multimodal models","author":"Team","year":"2023","journal-title":"arXiv:2312.11805"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3695053.3731412"},{"key":"ref72","article-title":"DeepSeek-r1: Incentivizing reasoning capability in LLMs via reinforcement learning","author":"Guo","year":"2025","journal-title":"arXiv:2501.12948"},{"key":"ref73","article-title":"RStar-math: Small LLMs can master math reasoning with self-evolved deep thinking","author":"Guan","year":"2025","journal-title":"arXiv:2501.04519"},{"key":"ref74","article-title":"DeepSeek-Prover-v2: Advancing formal mathematical reasoning via reinforcement learning for subgoal decomposition","author":"Ren","year":"2025","journal-title":"arXiv:2504.21801"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.52202\/079017-1362"},{"key":"ref76","article-title":"LLMOPT: Learning to define and solve general optimization problems from scratch","author":"Jiang","year":"2024","journal-title":"arXiv:2410.13213"},{"key":"ref77","article-title":"Large language diffusion models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Nie"},{"key":"ref78","article-title":"MMaDA: Multimodal large diffusion language models","author":"Yang","year":"2025","journal-title":"arXiv:2505.15809"},{"key":"ref79","article-title":"V-JEPA 2: Self-supervised video models enable understanding, prediction and planning","author":"Assran","year":"2025","journal-title":"arXiv:2506.09985"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.findings-emnlp.85"},{"key":"ref81","article-title":"Large language models as optimizers","author":"Yang","year":"2023","journal-title":"arXiv:2309.03409"},{"key":"ref82","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"139","author":"Radford"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"ref84","article-title":"CARTE: Pretraining and transfer for tabular learning","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Kim"},{"key":"ref85","article-title":"GraphEdit: Large language models for graph structure learning","author":"Guo","year":"2024","journal-title":"arXiv:2402.15183"},{"key":"ref86","first-page":"16083","article-title":"Any-to-any generation via composable diffusion","volume-title":"Proc. 37th Int. Conf. Neural Inf. Process. Syst.","author":"Tang"},{"key":"ref87","first-page":"3706","article-title":"DIFUSCO: Graph-based diffusion solvers for combinatorial optimization","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Sun"},{"key":"ref88","article-title":"Accelerating diffusion-based combinatorial optimization solvers by progressive distillation","author":"Huang","year":"2023","journal-title":"arXiv:2308.06644"},{"key":"ref89","first-page":"50020","article-title":"T2T: From distribution learning in training to gradient search in testing for combinatorial optimization","volume-title":"Proc. Neural Inf. Process. Syst.","volume":"36","author":"Li"},{"key":"ref90","article-title":"A diffusion model framework for unsupervised neural combinatorial optimization","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Sanokowski"},{"key":"ref91","article-title":"Boosting cross-problem generalization in diffusion-based neural combinatorial solver via inference time adaptation","author":"Lei","year":"2025","journal-title":"arXiv:2502.12188"},{"key":"ref92","first-page":"25531","article-title":"DIMES: A differentiable meta solver for combinatorial optimization problems","volume-title":"Proc. 36th Int. Conf. Neural Inf. Process. Syst.","volume":"35","author":"Qiu"},{"key":"ref93","doi-asserted-by":"crossref","DOI":"10.36227\/techrxiv.174378343.39356214\/v1","article-title":"A survey on diffusion policy for robotic manipulation: Taxonomy, analysis, and future directions","volume-title":"TechRxiv","author":"Song","year":"2025"},{"key":"ref94","article-title":"Diffusion models for reinforcement learning: A survey","author":"Zhu","year":"2023","journal-title":"arXiv:2311.01223"},{"key":"ref95","article-title":"Is conditional generative modeling all you need for decision-making?","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Ajay"},{"key":"ref96","article-title":"IDQL: Implicit Q-Learning as an actor-critic method with diffusion policies","author":"Hansen-Estruch","year":"2023","journal-title":"arXiv:2304.10573"},{"key":"ref97","article-title":"Diffusion policies as an expressive policy class for offline reinforcement learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Wang"},{"key":"ref98","first-page":"64896","article-title":"Diffusion model is an effective planner and data synthesizer for multi-task reinforcement learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"He"},{"key":"ref99","article-title":"AdaptDiffuser: Diffusion models as adaptive self-evolving planners","author":"Liang","year":"2023","journal-title":"arXiv:2302.01877"},{"key":"ref100","first-page":"67195","article-title":"Efficient diffusion policies for offline reinforcement learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kang"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2024.3363530"},{"key":"ref102","article-title":"Safe offline reinforcement learning with feasibility-guided diffusion model","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zheng"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.52202\/079017-3895"},{"key":"ref104","article-title":"Task-agnostic pre-training and task-guided fine-tuning for versatile diffusion planner","author":"Fan","year":"2024","journal-title":"arXiv:2409.19949"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2400428"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3528955"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3570202"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3568248"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3690624.3709343"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TON.2025.3535518"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3356178"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2400176"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3287547"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC59896.2024.10555960"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3525410"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3459039"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3526230"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3535623"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2025.3544879"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2025.3562362"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2025.3556751"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3543823"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2025.3563657"},{"key":"ref124","article-title":"An overview of diffusion models: Applications, guided generation, statistical rates and optimization","author":"Chen","year":"2024","journal-title":"arXiv:2404.07771"},{"key":"ref125","first-page":"60599","article-title":"Reward-directed conditional diffusion: Provable distribution estimation and reward improvement","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yuan"},{"key":"ref126","first-page":"17842","article-title":"Diffusion models for black-box optimization","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Krishnamoorthy"},{"key":"ref127","article-title":"Diffusion models as constrained samplers for optimization with unknown constraints","author":"Kong","year":"2024","journal-title":"arXiv:2402.18012"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26093"},{"key":"ref129","first-page":"51830","article-title":"Aligning optimization trajectories with diffusion models for constrained design generation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Giannone"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10436728"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3414628"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649348"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM55648.2025.11044673"},{"key":"ref134","article-title":"Ten issues of NetGPT","author":"Tong","year":"2023","journal-title":"arXiv:2311.13106"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437725"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC59610.2024.10817162"},{"key":"ref137","article-title":"TeleQnA: A benchmark dataset to assess large language models telecommunications knowledge","author":"Maatouk","year":"2023","journal-title":"arXiv:2310.15051"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshp64532.2024.11101012"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/tmlcn.2025.3593184"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3421306"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649361"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2025.3579496"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2025.3529082"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2400076"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672268"},{"key":"ref146","first-page":"1","article-title":"LoRA: Low-rank adaptation of large language models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Hu"},{"key":"ref147","first-page":"321","article-title":"Large language models for power scheduling: A user-centric approach","volume-title":"Proc. 22nd Int. Symp. Model. Optim. Mobile","author":"Mongaillard"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3642840"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3645754"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2400106"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3696348.3696888"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628183"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/3696348.3696868"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3615759"},{"key":"ref155","article-title":"The emergence of reproducibility and consistency in diffusion models","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.52202\/079017-1833"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.52202\/079017-2189"},{"key":"ref158","first-page":"267","article-title":"Approximately optimal approximate reinforcement learning","volume-title":"Proc. 19th Int. Conf. Mach. Learn.","author":"Kakade"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-5823.2002.tb00178.x"},{"key":"ref160","article-title":"Autoformulation of mathematical optimization models using LLMs","author":"Astorga","year":"2024","journal-title":"arXiv:2411.01679"},{"key":"ref161","first-page":"18100","article-title":"CARD: Classification and regression diffusion models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Han"},{"key":"ref162","article-title":"From tokens to thoughts: How LLMs and humans trade compression for meaning","author":"Shani","year":"2025","journal-title":"arXiv:2505.17117"},{"key":"ref163","article-title":"Measuring mathematical problem solving with the MATH dataset","author":"Hendrycks","year":"2021","journal-title":"arXiv:2103.03874"},{"key":"ref164","article-title":"Generalist reward models: Found inside large language models","author":"Li","year":"2025","journal-title":"arXiv:2506.23235"},{"key":"ref165","article-title":"ReasoningBank: Scaling agent self-evolving with reasoning memory","author":"Ouyang","year":"2025","journal-title":"arXiv:2509.25140"},{"key":"ref166","article-title":"The Markovian thinker: Architecture-agnostic linear scaling of reasoning","author":"Aghajohari","year":"2025","journal-title":"arXiv:2510.06557"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2924010"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796715"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-025-00782-0"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3432716"},{"key":"ref171","article-title":"Inference-time scaling for diffusion models beyond scaling denoising steps","author":"Ma","year":"2025","journal-title":"arXiv:2501.09732"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628188"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTTECH54121.2022.00025"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.02172"},{"key":"ref175","volume-title":"Experiential Networked Intelligence (ENI); Study on AI Agents Based Next-generation Network Slicing","year":"2025"},{"key":"ref176","volume-title":"Network Architecture Evolution Towards 6G","year":"2025"},{"key":"ref177","first-page":"1","article-title":"Measuring mathematical problem solving with the math dataset","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hendrycks"},{"key":"ref178","article-title":"Training verifiers to solve math word problems","author":"Cobbe","year":"2021","journal-title":"arXiv:2110.14168"},{"key":"ref179","article-title":"Sensiverse: A dataset for ISAC study","author":"Luo","year":"2023","journal-title":"arXiv:2308.13789"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11321210\/11359211.pdf?arnumber=11359211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T20:57:58Z","timestamp":1770152278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11359211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":179,"URL":"https:\/\/doi.org\/10.1109\/comst.2026.3656241","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}