Hybrid-Task Meta-Learning: A Graph Neural Network Approach for Scalable and Transferable Bandwidth Allocation
Abstract
In this paper, we develop a deep learning-based bandwidth allocation policy that is: 1) scalable with the number of users and 2) transferable to different communication scenarios, such as non-stationary wireless channels, different quality-of-service (QoS) requirements, and dynamically available resources. To support scalability, the bandwidth allocation policy is represented by a graph neural network (GNN), with which the number of training parameters does not change with the number of users. To enable the generalization of the GNN, we develop a hybrid-task meta-learning (HML) algorithm that trains the initial parameters of the GNN with different communication scenarios during meta-training. Next, during meta-testing, a few samples are used to fine-tune the GNN with unseen communication scenarios. Simulation results demonstrate that our HML approach can improve the initial performance by , and sampling efficiency by , compared with existing benchmarks. After fine-tuning, our near-optimal GNN-based policy can achieve close to the same reward with much lower inference complexity compared to the optimal policy obtained using iterative optimization.
Index Terms:
Bandwidth allocation, graph neural network, meta-learning, quality-of-service.I Introduction
Throughout the rapid evolution of wireless communication systems, the spectral efficiency, which is the amount of information that can be transmitted over a given bandwidth while maintaining a certain quality of service (QoS) level, still remains one of the most critical performance metrics for future sixth-generation (6G) wireless communications [1, 2]. To maximize spectrum efficiency, low-complexity bandwidth allocation solutions are critical for real-time decision-making within each transmission time interval (TTI) that could be shorter than one millisecond in current fifth-generation (5G) wireless communications. Furthermore, the number of users requesting bandwidth in each TTI is stochastic [3, 4], each user may have different QoS requirements [6, 5, 7], and wireless channels are non-stationary [8, 9], making it difficult to develop a low-complexity bandwidth allocation policy that is scalable with the number of users and can satisfy a diverse range of communication scenarios.
Existing iterative optimization algorithms can obtain optimal bandwidth allocation policies, but their computational complexity is generally too high to be implemented in real time [10, 11, 12]. To reduce the computational complexity, deep learning is a promising approach for 6G communications [14, 13]. The idea is to train a deep neural network that maps the network status to the optimal decision. After training, the deep neural network can be used in communication systems for real-time decision-making, referred to as inference [15]. Although deep learning has much lower inference complexity compared with iterative optimization algorithms, existing deep learning solutions using fully connected neural networks (FNNs) are not scalable to different number of users in wireless networks [16]. This is because the number of training parameters of an FNN depends on the dimensions of the input and output, which change with the number of users. Thus, a well-trained FNN is not applicable in wireless networks with stochastic user requests. In contrast to FNNs, graph neural networks (GNNs) have scalable numbers of training parameters that adapt to the number of users [17] — making them highly-suitable for develo** scalable deep learning-based resource allocation solutions for wireless networks [19, 18]. Furthermore, improving the generalization ability of GNN in wireless networks with diverse QoS requirements remains an open problem.
A key 5G application that requires flexible resource allocation solutions is network slicing, where resources from a shared physical infrastructure is partitioned into distinct network slices supporting diverse QoS requirements, such as data rate [21, 20], latency [22, 23], and security [25, 26, 24, 27], in both long and short coding blocklength regimes [30, 28, 29]. To reserve resources for a single slice, the authors of [31] proposed to compute the weights of different slices based on the corresponding QoS requirements and the number of service requests. With this approach, the amount of reserved resources for each slice is stochastic. Meanwhile, since the wireless channels are non-stationary, the reserved resources and the wireless channels in the training stage could be different from the actual required resources in the testing stage [32, 33]. As such, the mismatch between training data samples and testing data samples remains a crucial bottleneck for implementing efficient learning-based policies in practical wireless networks.
Recent works have proposed to reduce the online training time by transfer learning, which involves offline pre-training and online fine-tuning [10]. This method effectively reuses previously well-trained neural network features and significantly improves the sample efficiency. To further improve the online training efficiency for unseen tasks, meta-learning has been proposed [34, 37, 35, 36]. One of the meta-learning algorithms, model-agnostic meta-learning (MAML), has been applied to solve policy mismatch issues caused by varying user requests and non-stationary wireless channels [39, 38, 8, 9]. While these aforementioned works have highlighted the generalization ability of meta-learning for non-stationary wireless resource allocation, no works have addressed the impact of diverse QoS requirements in different communication scenarios.
In this paper, we put forth a low-complexity bandwidth allocation framework by designing a GNN that is scalable with the number of users and applying meta-learning to generalize the GNN to different communication scenarios. The main contributions are summarized as follows,
-
•
Our proposed GNN is designed to handle six diverse QoS requirements of data rate, latency, and security in each of the long and short coding blocklength regimes. This generalization is achieved by using feature engineering to translate the channel state information (CSI) and customized QoS requirement of individual users into the minimum required bandwidth.
-
•
Based on the extracted feature of minimum required bandwidth, we design a GNN-based bandwidth allocation policy that is scalable to the number of users. To train the GNN, we apply an unsupervised learning method to maximize the sum reward of the users with different QoS requirements in a network-slicing architecture.
-
•
The optimal bandwidth allocation policies are obtained based on an iterative optimization algorithm to obtain the performance limit of the GNN-based policy in terms of the sum reward. By analyzing the computational complexity, we show that the GNN has a much lower inference complexity compared with the iterative optimization algorithm that is optimal.
-
•
Finally, we develop our generalized hybrid-task meta-learning (HML) algorithm that is transferable to different communication scenarios by using meta-training to train the initial parameters of the GNN. We note that only a few samples are required to fine-tune the parameters of the GNN in meta-testing which validates that our GNN-based policy initialized by HML can be efficiently transferred to previously unseen communication scenarios. Simulation results show that our GNN-based policy achieves near-optimal performance and HML significantly outperforms the three considered benchmarks of MAML, MTL transfer (multi-task learning based transfer learning), and random initialisation.
In our simulations, the gap between the sum reward achieved by the GNN-based policy and that of the optimal bandwidth allocation policy obtained from the iterative optimization algorithm is less than . HML also improves the initial performance by up to and sample efficiency by up to compared with the MAML benchmark. We also show that the performance gains of HML is even higher when compared to the other two benchmarks.
II Related Works
II-A Deep Learning for Resource Allocation in Wireless Communications
Applying deep learning for resource allocation in wireless networks has been widely studied in the existing literature [15, 16]. In [15], the authors showed that learning-based algorithms could obtain near-optimal solutions, and the computational complexity in inference is low. In [16], the authors proposed a FNN-based unsupervised learning algorithm to optimize the bandwidth allocation policy. More recently, due to the fact that FNN is not scalable to the number of users, GNNs have been applied in wireless networks optimizations [19, 18]. In [18], the authors designed a GNN, which is scalable to the number of users in a wireless network, to minimize the summation of queuing delay violation probability and packet loss probability. In [19], the authors developed GNN-based scalable learning-based methods to solve radio resource management problems.
II-B Generalization of Deep Learning Policies in Non-Stationary Wireless Networks
In wireless networks, the user requests, wireless channels, and available resources for each type of service can be non-stationary. Table I summarizes some QoS requirements considered in the related works. For example, data rate, latency, and security have been investigated in [20, 21, 22, 23, 24, 25, 26]. These papers mainly focus on scenarios with long channel coding blocklengths, where the achievable rate of a wireless link can be approximated by the Shannon capacity. In 5G, the coding blocklength can be short, and Shannon capacity is not applicable. As such, the authors of [27, 28] established how to optimize wireless communication systems using the achievable rate in the short blocklength regime [29]. Meanwhile, different services may co-exist in one network, and the authors of [30, 10] considered different QoS requirements in both long and short blocklength regimes. To support diverse QoS requirements in network slicing, the authors of [31] proposed to reserve bandwidth for different slices based on the number of users and the required QoS.
Further considering that the number of requests, the reserved resources, and the wireless channels are dynamic, improving the generalization ability of deep learning policies has attracted significant research interests in recent years. One approach to address this challenge is to carefully initialize the neural network and fine-tune it online. The authors of [10] applied transfer learning to fine-tune the parameters of deep neural networks that are trained offline in dynamic wireless networks. To further improve the sample efficiency in an unseen communication scenario, meta-learning has been adopted in [8, 9, 38, 39], where the hyper-parameters of a deep neural network, such as the initial parameters, are updated according to a set of communication scenarios in meta-training. In [38], meta-learning was applied to optimize computing resource allocation policies in mobile edge computing networks to fit both time-varying wireless channels and different requests of computing tasks. In [39], meta-learning was applied in virtual reality to quickly adapt to the user movement patterns changing over time. To improve the training efficiency in non-stationary vehicle networks, the authors in [8] proposed optimizing the beamforming using meta-learning. In [9], the authors combined meta-learning and support vector regression to extract the features for beamforming optimization, further improving training efficiency over non-stationary channels.
III System Model and Problem Formulation
We consider an uplink orthogonal-frequency-division-multiple-access communication system with network slicing where users are requesting different types of services from one base station (BS). The BS first reserves bandwidth for each type of service according to the QoS requirement and the number of users. Then, it allocates bandwidth to different users within each slice. The resource reservation for different slices has been extensively studied in the existing literature, so we will focus on develo** bandwidth allocation policies for individual slices with different numbers of users, non-stationary wireless channels, and dynamic available bandwidth.
III-A Different QoS in Infinite and Short Blocklength Regimes
To investigate the generalization ability of our proposed bandwidth allocation policy, we consider both long and short blocklength regimes with three types of QoS requirements, i.e., data rate, queuing delay, and security. Thus, there are six scenarios in total. We denote the reward of the -th user by
(1) |
where superscripts represent data rate, effective capacity with queuing delay constraint, and secrecy rate, respectively, whilst the superscripts represent the scenarios in the infinite long and finite short blocklength regimes, respectively.
III-A1 Data Rate Requirement
When the blocklength is long, the data rate reward of the -th user can be expressed as
(2) |
where is the bandwidth allocated to the -th user, is the transmit power of the -th user, is the single-sided noise spectral density, and is the channel gain, where and represent the large-scale and small-scale channel gains between the -th user and the BS, respectively.
When the blocklength is short, decoding errors cannot be neglected. As such, the data rate reward of the -th user can be approximated by [29]
(3) |
where is the channel dispersion that measures the stochastic variability of the channel related to a deterministic channel with the same capacity, is the blocklength, and is the transmission duration of each coding block. The function is the inverse of the Gaussian Q-function, and is the decoding error probability.
III-A2 Latency Requirement
When considering latency constraints due to queueing delays, the effective capacity is applied to characterize the statistical QoS requirement in wireless communications, and is expressed as [28]
(4) |
where is the channel coherence time, is the QoS exponent for queuing delay, denotes the expectation, and is the data rate in (2) or (3). We note that is determined by the maximum tolerable delay bound violation probability, , the packet arrival rate, , and the threshold of queuing delay, .
III-A3 Security Requirement
To formulate the wireless security requirement, we consider that there is an eavesdropper that attempts to wiretap the information transmitted by each user.
In the long blocklength regime, the secrecy rate of the -th user can be expressed as [24]
(5) |
where , and is the data rate of the wiretapped channel from the -th user to the eavesdropper. The channel gain of the wiretapped channel is denoted by , where and represent the large-scale and small-scale channel gains between the -th user and the eavesdropper, respectively.
In the short blocklength regime, the achievable secrecy rate of the -th user can be approximated as [27],
(6) |
where , and represents the information leakage, which describes the statistical independence between the transmitted confidential message and the eavesdropper’s observation, and is measured by the total variation distance [27].
III-B Bandwidth Reservation for Different Slices
We assume that there can be multiple bandwidth reservation policies for different slices in network slicing. Given the total bandwidth of the BS, , the bandwidth reserved for the -th slice is given by
(7) |
where is the number of users in the -th slice, is the QoS class identifier (QCI) of the -th user in the -th slice, and is the network function for bandwidth reservation in network slicing. Since the sum of the bandwidth reserved for all the slices equals the total bandwidth of the BS, thus
(8) |
where is the number of slices. Inspired by [31], the bandwidth reserved for each slice depends on the number of users in this slice and the QCI of these users, e.g.,
(9) |
III-C Problem Formulation
To maximize the sum reward subject to the QoS requirements in each slice, we formulate the bandwidth allocation problem as follows,
(10) | ||||
(10a) | ||||
(10b) | ||||
(10c) |
where is the bandwidth allocated to the users, and is the minimum threshold of the QoS required by the users. Thus, constraint (10c) guarantees the QoS of all the users.
III-D Analysis of Problem Feasibility
Given the available bandwidth constraint in (10a) and the QoS constraint in (10c), problem (10) will be infeasible when some of the users in this slice have weak channels. We denote the minimum bandwidth required to meet constraint (10c) by . If some users experience deep fading, leading to , then problem (10) is infeasible. In this case, the BS will only schedule the users with sufficiently strong channels. Alternatively, to maximize the number of scheduled users in problem (10), we consider that the BS schedules the users with the smallest bandwidth requirement. Denote the set of scheduled users by . Then, for any and , we have . After user scheduling, problem (10) can be reformulated as follows,
(11) | ||||
(11a) | ||||
(11b) |
In the following, we investigate how to find the optimal solution to problem (11).
IV Hybrid-Task Meta-Learning for GNN-based Scalable Bandwidth Allocation
In this section, we first illustrate how to obtain the optimal bandwidth allocation by using an iterative optimization algorithm. Next, we utilize feature engineering techniques to reformulate the problem, and represent the bandwidth allocation policy by a GNN. To generalize the GNN, the feature of required minimum bandwidth that can be used to represent different QoS requirements is used as the GNN’s input. Then, we develop a meta-learning approach to train the GNN. The goal is to obtain a policy that is scalable to the number of users and can generalize well in diverse communication scenarios with different channel distributions, QoS requirements, and available bandwidth.
IV-A Optimal Bandwidth Allocation by Iterative Algorithm
Inspired by the optimization algorithm for resource allocation in [10], we propose an iterative optimization algorithm for solving our problems. We denote the bandwidth of each resource block by . At the beginning of the iteration, the bandwidth allocated to each user is . In each iteration, we calculate the incremental reward of each user when an extra resource block is allocated to it, denoted by . Finally, the resource block is allocated to the user with the highest . The details of the algorithm can be found in Algorithm 1. The optimality of the algorithm depends on the properties of the problems. For problem (11), if it is a convex problem, then Algorithm 1 can obtain the optimal solution [10]. To validate whether problem (11) is convex or not, we only need to validate whether is concave or not. In the long blocklength regime, we can prove that the secrecy rate is concave in bandwidth. See proof in Appendix A. Since Shannon’s capacity is a special case of the secrecy rate when the wiretapped channel is in deep fading, thus Shannon’s capacity is also concave in bandwidth. In addition, the authors of [41] proved that the effective capacity is concave in bandwidth. Therefore, Algorithm 1 can obtain the optimal solution in the long blocklength regime. In the short-blocklength regime, is not concave when . Nevertheless, based on the results in [42], the optimal bandwidth can be obtained in a region , where is concave in bandwidth. By searching for the optimal bandwidth in , Algorithm 1 can obtain the optimal solution in the short blocklength regime.
IV-B Feature Engineering and Problem Reformulation
To obtain a policy that can generalize well in different scenarios, we propose to use feature engineering technology to represent the channels and QoS requirements with more general features. Specifically, we first normalize the bandwidth allocation policy by the bandwidth reserved for this slice. The normalized bandwidth allocated to the -th user, , is given by . Then, the normalized minimum bandwidth required by the scheduled users is denoted by . We define the surplus bandwidth as , and further denote the normalized surplus bandwidth by .
We note that bandwidth allocation policy maps channels and constraints to the bandwidth allocated to each user. After scheduling and normalization, the features of the channel state information and constraints (11a) and (11b) can be represented by . Therefore, the bandwidth allocation policy can be reformulated as the map** from and to . We denote this function by
(12) |
where and . Given the bandwidth reserved for this slice, the achievable rates of the scheduled users can be expressed as
(13) |
where , , and . Then, we can reformulate problem (11) as a functional optimization problem,
(14) | ||||
(14a) | ||||
(14b) |
In the rest part of this section, we will find the optimal solution to problem (14).
IV-C Proposed GNN
In this subsection, we propose a GNN-based unsupervised learning algorithm to obtain a scalable bandwidth allocation policy.
![Refer to caption](x1.png)
IV-C1 Structure of GNN
As shown in Fig. 1, the proposed GNN-based bandwidth allocation algorithm comprises three key steps: message passing, aggregation, and readout.
Message passing
Each scheduled user is a vertex in the GNN. We use a fully connected neural network (FNN) to obtain the embedding of each vertex, denoted by . The inputs of each FNN include and . We use to denote the training parameters of the FNN. In the -th epoch, the message passing function is given by . Since the vertices are homogeneous, the training parameters of all the FNNs are the same.
Aggregation
In the aggregation step, we first aggregate the embeddings of all the scheduled users by using a concatenation function, , followed by a Softmax function, , which serves as the activation function in the aggregation. The output after aggregation is denoted by .
Readout
IV-C2 Unsupervised Learning
The learning algorithm is detailed in Algorithm 2. Specifically, in the -th epoch, we use our GNN to obtain the bandwidth allocation and estimate the expectation of the objective function by using the batch samples according to
(15) |
where is the batch size. Then, we use stochastic gradient descent (SGA) to maximize the estimated expectation of the objective function in (14). As shown in [16], maximizing the expectation of the objective function, where the expectation is taken over channels, is equivalent to maximizing the objective function with given channels. Thus, from Algorithm 2, we can find the bandwidth allocation policy that maximizes the objective function in (14).
IV-C3 Computational Complexity
We compare the computational complexity of our GNN with the iterative algorithm introduced in Section IV-A. In cellular systems, both algorithms will be implemented in each transmission time interval with a duration of less than 1 ms. Thus, we are interested in the inference complexity of our GNN, i.e., the number of operations to be executed to obtain the bandwidth allocation in each transmission time interval.
Inference complexity of our GNN
To compute the embedding of each vertex, we need to compute the output of the FNN in Fig. 1. We denote the number of layers of the FNN by and the number of neurons in the -th layer by . Then, the number of multiplications required to compute the output of the -th layer is and the total number of multiplications for computing the embedding is [10]. After obtaining the embeddings of users, the number of multiplications required by and is . Therefore, the inference complexity of the GNN-based bandwidth allocation policy is
(16) |
Complexity of the iterative algorithm
In each iteration of the optimization algorithm, we assign a small portion of the normalized surplus bandwidth, denoted by , to a user that can maximize the objective function. The algorithm needs to compute the objective function times and find the best user. We denote the complexity for computing the objective function by , then the complexity of the iterative algorithm is given by
(17) |
where represents the number of iterations used in the iterative algorithm.
Complexity comparison
To obtain bandwidth allocation in each transmission time interval, the transmitter either uses the forward propagation algorithm to compute the outcome of the GNN or executes the iterative algorithm. From eqs. (16) and (17), we can see that the computational complexity of our GNN and the iterative algorithm increase linearly with the number of users. Recall that in eq. (16) is quite limited. In contrast, the complexity of the iterative algorithm also increases with the amount of surplus bandwidth and the resource block and thus depends on the channels of the users. In addition, the computing complexity for evaluating the objective function, denoted by in eq. (17), in each iteration of the optimization algorithm could also be extremely high. Thus, the inference complexity of the GNN is much lower than the complexity of the iterative optimization algorithm.
IV-D Hybrid-Task Meta-Learning
To obtain a GNN with strong generalization ability, we propose an HML algorithm that combines multi-task learning and meta-learning.
IV-D1 Task, Sample, and Taskset
To apply the meta-learning framework, we first define tasks, samples, and tasksets in the context of bandwidth allocation problems. A task is a specific bandwidth allocation problem with a unique combination of system parameters, including the number of users, , the channel model (i.e., path loss model, shadowing, and small-scale channel fading), the QoS requirement, , and the reserved bandwidth, . If any of the above system parameters change, it would result in a different task. For each task, the samples correspond to the wireless channels that have been transformed into the minimum bandwidth requirement by feature engineering, as specified in constraint (14b). There are four tasksets in meta-learning, and a taskset consists of multiple tasks. We will provide their definitions in the sequel.
![Refer to caption](x2.png)
![Refer to caption](x3.png)
IV-D2 Support Set and Query Set in Meta-Training
As shown in Fig. 2(a), most meta-learning learning algorithms, such as MAML, consist of a meta-training stage and a meta-testing stage. In meta-training, there are two tasksets, support set and query set . The tasks in the two tasksets are the same, but the samples of each task in the two tasksets are different. Specifically, we first set the initialize parameters of the GNN to , which is randomly initialized at the beginning of meta-training, and updated in every iteration of the meta-training. Then, we train the parameters of the GNN by using the tasks and the corresponding samples in the support set, where is initialized with parameters . Then, we update the initial parameters by using the tasks and the corresponding samples in the query set. We denote the initial parameters trained in meta-training of MAML by . The details of the MAML algorithm can be found in [37].
IV-D3 Fine-Tuning Set and Evaluation Set in Meta-Testing
To evaluate the generalization ability of the GNN, a different set of tasks that are unseen in the meta-training stage are used in meta-testing. As shown in Fig. 2(a), the tasks in meta-testing are divided into a fine-tuning set and an evaluation set, denoted by and , respectively. The tasks in and are the same, but the samples of each task in these two tasksets are different. For each new task in meta-testing, the samples from the fine-tuning set are used to fine-tune , which is initialized by obtained in meta-training. After fine-tuning, the updated GNN is tested with the samples from the evaluation set. If no sample is used to fine-tune the GNN in the meta-testing stage, we refer to this approach as zero-shot meta-learning. Otherwise, it is known as few-shot meta-learning. The meta-testing algorithm is detailed in Algorithm 3.
IV-D4 Meta-Training of Proposed HML Algorithm
Fig. 2(b) illustrates the tasks and tasksets used in the meta-training and meta-testing of the proposed HML algorithm. The difference between MAML and HML lies in the selection of tasks from the query set. In MAML, the tasks selected from the query set are identical to those selected from the support set in each meta-training epoch. To improve the generalization ability, in HML, we select different tasks from the query set to train the initial parameters of the GNN. Specifically, tasks are randomly selected from the query set to estimate the average loss of the GNN parameterized by in the -th epoch of meta-training. The step-by-step algorithm for meta-training of the proposed HML algorithm is described in Algorithm 4, and the meta-testing algorithm of HML is the same as that of MAML in Algorithm 3.
Simulation parameters | Values |
Transmit power of each user, | 23 dBm |
Single-sided noise spectral density, | -174 dBm/Hz |
Channel coherence time, | ms [28] |
Duration of one time slot, | ms |
Decoding error probability, | [28] |
Information leakage, | [28] |
QoS exponent of queuing delay, | [28] |
Size of bandwidth resource block, | kHz |
Learning rates, | |
Batch sizes of GNN, | 32 |
Batch sizes of meta optimizer, | 4, 2 |
Parameters | & | & | |
Network scale | Number of users | ||
Channel models | Path loss: | ||
Shadowing: | |||
Small-scale channels: , , | , | ||
QoS | Rewards with different QoS requirements | , , | |
---|---|---|---|
Values of QoS constraints (Mbps) | |||
Reserved bandwidth | Constraints on reserved bandwidth (MHz) |
V Performance Evaluation
In this section, we evaluate the performance of our GNN-based HML algorithm. The GNN is first initialized by the parameters obtained from meta-training, where all the tasks aim to maximize the sum of the secrecy rate with different numbers of users and channel models. Then, we evaluate the performance of our GNN in unseen tasks with different numbers of users, channel models, objective functions, QoS constraints, and reserved bandwidth.
V-A System Setup
We consider a BS, located at m, serving multiple users randomly distributed in a rectangular area, where the coordinates of the users are denoted by , where and . When the QoS requirement is secrecy rate, an eavesdropper is randomly located in the above rectangular area. The transmitted signal of each user is a complex Gaussian process with zero-mean and equal variance, . Channel models include large-scale channels and small-scale channels. Specifically, the large-scale channels depend on path loss and shadowing fading, whilst small-scale channels follow Rice, Nakagami, and Rayleigh distributions with various parameters in Table III. The number of neurons in each layer of the GNN is . Unless otherwise mentioned, the simulation parameters are summarized in Table II, and the parameters of tasksets are defined in Table III.
V-B Performance of GNN
![Refer to caption](x4.png)
Fig. 3 shows the training losses when the number of users increases from to . The results show that the unsupervised learning algorithm can converge after a few hundred training epochs for different numbers of users, and the convergence time increases slightly with the number of users.
![Refer to caption](x5.png)
![Refer to caption](x6.png)
After the training stage of the unsupervised learning algorithm, we select samples from the evaluation set of the same task to evaluate the constraint and reward achieved by the GNN in Fig. 4. The results in Fig. 4(a) show that the secrecy rates of all the scheduled users are equal to or higher than the requirement, Mbps. The results in Fig. 4(b) show that the sum secrecy rate achieved by the GNN is close to that achieved by the iterative optimization algorithm in Section IV-A (with legend “Optimal”). In other words, the unsupervised learning algorithm can obtain a near-optimal solution.
V-C Meta-Testing Performance of HML
In this subsection, we evaluate the generalization ability of the proposed HML algorithm. The differences between tasks in meta-training and meta-testing are shown in Table. III. In meta-testing, we first select an unseen task that is not included in meta-training. In each training epoch of the meta-testing, samples are randomly selected from to fine-tune the GNN, whilst all the testing samples from the same task in are used to evaluate the performance.
V-C1 Different Wireless Channels and QoS Requirements
In this part, we set MHz and Mbps for all types of services. The other parameters follow the rules in and as shown in Table. III. We compare the initial performance and sample efficiency of HML with four benchmarks: 1) Optimal, 2) Model-agnostic meta-learning (MAML), 3) Multi-task learning-based transfer learning (MTL Transfer), and 4) Random initialization.
- •
-
•
MAML: MAML is one of the most widely used meta-learning algorithms, and its key ideas have been discussed in Section IV-D.
-
•
MTL Transfer: Transfer learning improves the sample efficiency by fine-tuning the parameters of the pre-trained GNN in a task with fewer training samples. With multi-task learning (MTL), the initial performance is much better than random initialization as the GNN is pre-trained in multiple tasks [37, 43]. To execute MTL transfer learning, we only need to replace the initialization in line 2 of Algorithm 2 by the pre-trained parameters.
-
•
Random Initialization: Random initialization is the conventional method that trains the GNN from scratch with a new task.
In figures 5-7, the horizontal axis represents the training epochs used to fine-tune the GNN, and samples from are used to train the GNN. The vertical axis represents the sum of the rewards of all the users, and the average is taken over samples, i.e., testing samples from are used. We refer to it as the average sum reward.
![Refer to caption](x7.png)
![Refer to caption](x8.png)
In Fig. 5, we consider the average sum of secrecy rates and illustrate the impacts of the number of users, channel models, and coding blocklength on the initial performance and sample efficiency of different methods. The results in Fig. 5 show that HML achieves the best initial average sum secrecy rate and the highest sample efficiency compared with all the benchmarks. In Fig. 5(a), HML can converge in training epochs. Both MAML and MTL transfer learning takes more than epochs to converge. Thus, HML can reduce the convergence time by up to . After the fine-tuning, the gap between learning methods and the optimal solution is around %. In Fig. 5(b), the coding blocklength in meta-testing is also different from that in meta-training. As a result, the gap between the initial performance of HML and the optimal solution is . After fine-tuning, the gap reduced to , which is larger than the gap in Fig. 5(a), where the blocklength is the same in meta-training and meta-testing.
![Refer to caption](x9.png)
![Refer to caption](x10.png)
Fig. 6 shows the average sum of data rates achieved by different methods. The results indicate that when the reward function and the QoS constraint in meta-testing are different from that in meta-training, the gaps between the initial performance of HML and the optimal solution increase to and in long and short blocklength regimes, respectively. After fine-tuning, the gaps between the learning methods and the optimal solution are smaller than that in Fig. 5. This is because Shannon’s capacity/achievable rate are two special cases of the secrecy rate in the long/short blocklength regimes when the wiretapped channels are in deep fading. It is easier to learn a good policy when the problem becomes less complicated.
![Refer to caption](x11.png)
![Refer to caption](x12.png)
Fig. 7 shows the average sum of effective capacities achieved in the meta-testing stage, where the initial parameters of the GNN are obtained from meta-training, and the GNN is trained with tasks maximizing the sum secrecy rate in the long blocklength regime. In other words, the QoS requirement in meta-testing is queuing delay requirement, which is quite different from the security requirement in meta-training. By comparing the results in Figs. 7 and 5, we can observe that the gaps between the HML and the optimal solution in Fig. 7 are larger than the gaps in Fig. 5. Nevertheless, HML can still converge in around to epochs and outperforms the other benchmarks in Fig. 7.
![Refer to caption](x13.png)
![Refer to caption](x14.png)
![Refer to caption](x15.png)
V-C2 Meta-Testing with Different System Parameters
In this part, we focus on secrecy rates in the long blocklength regime in both meta-training and meta-testing, and change the values of , , and to investigate their impacts on the initial performance and sample efficiency of HML in meta-testing.
![Refer to caption](x16.png)
![Refer to caption](x17.png)
In Fig. 8, we evaluate the initial performance and sample efficiency with different in support sets and query sets in meta-training. Specifically, we set to Mbps and Mbps in meta-training in Figs. 8(a) and 8(b), respectively. In Fig. 8(c), is randomly selected from the set Mbps in meta-training. In meta-testing, we increase from Mbps to Mbps. The results in Figs. 8(a) and 8(b) indicate that the gaps between zero-shot learning (with training epochs in meta-testing) and the optimal solution increase with the difference between in meta-training and in meta-testing. To increase the generalization ability, we can increase the diversity of tasks in meta-training as shown in Fig. 8(c). In this way, our GNN is near-optimal with zero-shot learning.
In Fig. 9, we validated the generalization ability of our GNN with dynamic bandwidth . In meta-training, is randomly selecting from the set MHz. In meta-testing, we increase from to MHz. The results in Fig. 9 show that our GNN is near-optimal with different values of . In Fig. 10, we further validate the generalization ability of our GNN with different numbers of users. In meta-training, the number of total users is randomly selected, . In meta-testing, we increase the number of total users from to . The results in Fig. 10 show that the proposed HML can obtain a GNN that has strong generalization ability with different numbers of users. The gap between the GNN and the optimal policy increases slightly with . This is because the scale of the problem increases with , and it is more difficult to learn the bandwidth allocation policy of a large-scale problem compared with that of a small-scale problem.
VI Conclusion
In this paper, we developed an HML approach to train a GNN-based scalable bandwidth allocation policy that can generalize well in various communication scenarios, including different number of users, wireless channels, QoS requirements, and bandwidth. The main idea is to train the initial parameters of the GNN with various tasks in meta-training, and then fine-tune the parameters with a few samples in meta-testing. Simulation results showed that the performance gap between the GNN and the optimal policy obtained by an iterative algorithm is less than % in most of the cases. For unseen communication scenarios, the GNN can converge in to training epochs, which are much faster than the existing benchmarks. Our approach can be extended beyond bandwidth allocation, such as power allocation, precoding, and repetitions. Nevertheless, the featuring engineering and the structure of GNN in other scenarios deserve further investigation.
Appendix A Proof of Concavity for Secrecy Rate in Long Blocklength Regimes
To prove the concavity of the secrecy rate in long blocklength regimes, we only need to prove that the second derivative of the secrecy rate is positive. We first calculate the partial derivative of the secrecy rate of the -th scheduled user as follows,
(18) |
where and . Since the secrecy rate of the user increases with the increasing of the allocated bandwidth, we have . The second derivative of can be derived as follows,
(19) |
For any scheduled user, we have . Thus, . Therefore, is concave. This completes the proof.
References
- [1] X. Hao, P. L. Yeoh, Y. Liu, C. She, B. Vucetic, and Y. Li, “Graph neural network-based bandwidth allocation for secure wireless communications,” in Proc. 2023 IEEE Int. Conf. Commun. Workshops (ICC workshops), Rome, Italy, 2023, pp. 332–337.
- [2] M. Z. Chowdhury, M. Shahjalal, S. Ahmed, and Y. M. Jang, “6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions,” IEEE Open J. Commun. Soc., vol. 1, pp. 957–975, 2020.
- [3] Y. Gu, C. She, Z. Quan, C. Qiu, and X. Xu, “Graph neural networks for distributed power allocation in wireless networks: Aggregation over-the-air,” IEEE Trans. Wireless Commun., Early access.
- [4] J. Guo and C. Yang, “Learning power allocation for multi-cell-multi-user systems with heterogeneous graph neural networks,” IEEE Trans. Wireless Commun., vol. 21, no. 2, pp. 884–897, Feb. 2022.
- [5] R. D-Mohammady, M. Y. Naderi, and K. R. Chowdhury, “Spectrum allocation and QoS provisioning framework for cognitive radio with heterogeneous service classes,” IEEE Trans. Wireless Commun., vol. 13, no. 7, pp. 3938–3950, Jul. 2014.
- [6] B. Han, V. Sciancalepore, X. Costa-Pérez, D. Feng, and H. D. Schotten, “Multiservice-based network slicing orchestration with impatient tenants,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 5010–5024, Jul. 2020.
- [7] L. Zanzi, V. Sciancalepore, A. Garcia-Saavedra, H. D. Schotten, and X. Costa-Pérez, “LACO: A latency-driven network slicing orchestration in beyond-5G networks,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 667–682, Jan. 2021.
- [8] Y. Yuan, G. Zheng, K. -K. Wong, B. Ottersten, and Z. -Q. Luo, “Transfer learning and meta learning-based fast downlink beamforming adaptation,” IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 1742–1755, Mar. 2021.
- [9] J. Zhang, Y. Yuan, G. Zheng, I. Krikidis, and K. -K. Wong, “Embedding model-based fast meta learning for downlink beamforming adaptation,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 149–162, Jan. 2022.
- [10] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep learning for radio resource allocation with diverse quality-of-service requirements in 5G,” IEEE Trans. Wireless Commun., vol. 20, no. 4, pp. 2309–2324, Apr. 2021.
- [11] H. Lee, J. Park, S. H. Lee, and I. Lee, “Message-passing based user association and bandwidth allocation in HetNets with wireless backhaul,” IEEE Trans. Wireless Commun., vol. 22, no. 1, pp. 704–717, Jan. 2023.
- [12] Q. Xu, Z. Su, D. Fang, and Y. Wu, “Hierarchical bandwidth allocation for social community-oriented multicast in space-air-ground integrated networks,” IEEE Trans. Wireless Commun., vol. 22, no. 3, pp. 1915–1930, Mar. 2023.
- [13] K. B. Letaief, Y. Shi, J. Lu, and J. Lu, “Edge artificial intelligence for 6G: Vision, enabling technologies, and applications,” IEEE J. Sel. Areas Commun., vol. 40, no. 1, pp. 5–36, Jan. 2022.
- [14] C. She, C. Sun, Z. Gu, Y. Li, C. Yang, H. V. Poor, B. Vucetic, “A tutorial on ultrareliable and low-latency communications in 6G: Integrating domain knowledge into deep learning,” Proc. IEEE, vol. 109, no. 3, pp. 204–246, Mar. 2021.
- [15] D. He, C. Liu, H. Wang, and T. Q. S. Quek, “Learning-based wireless powered secure transmission,” IEEE Wireless Commun. Lett., vol. 8, no. 2, pp. 600–603, Apr. 2019.
- [16] C. Sun, C, She, and C. Yang, “Unsupervised deep learning for optimizing wireless systems with instantaneous and statistic constraints” in Ultra-reliable and low-latency communications (URLLC) theory and practice: Advances in 5G and beyond, 1st ed. Hoboken, NJ, USA: John Wiley&Sons, Ltd. 2023, ch. 4, pp. 85–118.
- [17] J. Gilmer, S. S. Schoenholz, P. F. Riley, O. Vinyals, and G. E. Dahl, “Neural message passing for quantum chemistry,” in Proc. Int. Conf. Mach. Learn. (ICML), Sydney, Australia, pp. 1263–1272, Apr. 2017.
- [18] Y. Liu, C. She, Y. Zhong, W. Hardjawana, F.-C. Zheng, and B. Vucetic, “Interference-limited ultra-reliable and low-latency communications: Graph neural networks or stochastic geometry?,” 2022, arXiv:2207.06918.
- [19] Y. Shen, Y. Shi, J. Zhang, and K. B. Letaief, “Graph neural networks for scalable radio resource management: Architecture design and theoretical analysis,” IEEE J. Sel. Areas Commun., vol. 39, no. 1, pp. 101–115, Jan. 2021.
- [20] J. Guo and C. Yang, “Deep neural networks with data rate model: Learning power allocation efficiently,” IEEE Trans. Commun., vol. 71, no. 3, pp. 1447–1461, Mar. 2023.
- [21] C. Guo, L. Liang, and G. Y. Li, “Resource allocation for vehicular communications with low latency and high reliability,” IEEE Trans. Wireless Commun., vol. 18, no. 8, pp. 3887–3902, Aug. 2019.
- [22] D. Wu and R. Negi, “Effective capacity: a wireless link model for support of quality of service,” IEEE Trans. Wireless Commun., vol. 2, no. 4, pp. 630-–643, Jul. 2003.
- [23] J. Tang and X. Zhang, “Quality-of-service driven power and rate adaptation over wireless links,” IEEE Trans. Wireless Commun., vol. 6, no. 8, pp. 3058–3068, Aug. 2007.
- [24] W. Yu, A. Chorti, L. Musavian, H. Vincent Poor, and Q. Ni, “Effective secrecy rate for a downlink NOMA network,” IEEE Trans. Wireless Commun., vol. 18, no. 12, pp. 5673–5690, Dec. 2019.
- [25] H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, “Deep reinforcement learning based intelligent reflecting surface for secure wireless communications,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 375–388, Jan. 2021.
- [26] C. Liu, J. Lee, and T. Q.S. Quek, “Safeguarding UAV communications against full-duplex active eavesdropper,” IEEE Trans. Wireless Commun., vol. 18, no. 6, pp. 2919–2931, Jun. 2019.
- [27] H. -M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packet communications for mission-critical IoT applications,” IEEE Trans. Wireless Commun., vol. 18, no. 5, pp. 2565–2578, May 2019.
- [28] C. Li, C. She, N. Yang, and T. Q. S. Quek, “Secure transmission rate of short packets with queueing delay requirement,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 203–218, Jan. 2022.
- [29] Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, May 2010.
- [30] M. Alsenwi, N. H. Tran, M. Bennis, S. R. Pandey, A. K. Bairagi, and C. S. Hong, “Intelligent resource slicing for eMBB and URLLC coexistence in 5G and beyond: A deep reinforcement learning based approach,” IEEE Trans. Wireless Commun., vol. 20, no. 7, pp. 4585–4600, Jul. 2021.
- [31] G. Sun, Z. T. Gebrekidan, G. O. Boateng, D. A.-Mensah, and W. Jiang, “Dynamic reservation and deep reinforcement learning based autonomous resource slicing for virtualized radio access networks,” IEEE Access, vol. 7, pp. 45758–45772, 2019.
- [32] T. T. Do, T. J. Oechtering, S. M. Kim, M. Skoglund, and G. Peters, “Uplink waveform channel with imperfect channel state information and finite constellation Input,” IEEE Trans. Wireless Commun., vol. 16, no. 2, pp. 1107–1119, Feb. 2017.
- [33] Y. Lu, P. Cheng, Z. Chen, W. H. Mow, Y. Li and B. Vucetic, “Deep multi-task learning for cooperative NOMA: System design and principles,” IEEE J. Sel. Areas Commun., vol. 39, no. 1, pp. 61–78, Jan. 2021.
- [34] M. Andrychowicz, M. Denil, S. Gomez, M. W. Hoffman, D. Pfau, T. Schaul, B. Shillingford, N. Freitas, “Learning to learn by gradient descent by gradient descent,” in Proc. 30th Conf. Neural Inf. Process. Syst. (NIPS 2016), Barcelona, Spain.
- [35] A. Nichol, J. Achiam, and J. Schulman, “On first-order meta-learning algorithms,” 2018, arXiv:1803.02999.
- [36] A. Raghu, M. Raghu, S. Bengio, and O. Vinyals, “Rapid learning or feature reuse? Towards understanding the effectiveness of MAML,” in Proc. Int. Conf. Learn. Representations (ICLR), Apr. 2020.
- [37] C. Finn, P. Abbeel, and S. Levine, “Model-agnostic meta-learning for fast adaptation of deep networks,” in Proc. Int. Conf. Mach. Learn. (ICML), Sydney, Australia, pp. 1126–1135, 2017.
- [38] L. Huang, L. Zhang, S. Yang, L. P. Qian, and Y. Wu, “Meta-learning based dynamic computation task offloading for mobile edge computing networks,” IEEE Commun. Lett., vol. 25, no. 5, pp. 1568–1572, May 2021.
- [39] Y. Wang, M. Chen, Z. Yang, W. Saad, T. Luo, S. Cui, H. V. Poor, “Meta-reinforcement learning for reliable communication in THz/VLC wireless VR networks,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7778–7793, Sept. 2022.
- [40] A. Goldsmith, Wireless communications. Cambridge, U.K.: Cambridge Univ. Press, 2005.
- [41] C. Xiong, G. Y. Li, Y. Liu, Y. Chen, and S. Xu, “Energy-efficient design for downlink OFDMA with delay-sensitive traffic,” IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 3085–3095, Jun. 2013.
- [42] C. Sun, C. She, C. Yang, T. Q. S. Quek, Y. Li, and B. Vucetic, “Optimizing resource allocation in the short blocklength regime for ultra-reliable and low-latency communications,” IEEE Trans. Wireless Commun., vol. 18, no. 1, pp. 402–415, Jan. 2019.
- [43] N. Ye, X. Li, H. Yu, L. Zhao, W. Liu, and X. Hou, “DeepNOMA: A unified framework for NOMA using deep multi-task learning,” IEEE Trans. Wireless Commun., vol. 19, no. 4, pp. 2208–2225, Apr. 2020.
- [44] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, USA: Cambridge Univ. Press, 2004.