-
Over-the-Air Federated Averaging with Limited Power and Privacy Budgets
Authors:
Na Yan,
Kezhi Wang,
Cunhua Pan,
Kok Keong Chai,
Feng Shu,
Jiangzhou Wang
Abstract:
To jointly overcome the communication bottleneck and privacy leakage of wireless federated learning (FL), this paper studies a differentially private over-the-air federated averaging (DP-OTA-FedAvg) system with a limited sum power budget. With DP-OTA-FedAvg, the gradients are aligned by an alignment coefficient and aggregated over the air, and channel noise is employed to protect privacy. We aim t…
▽ More
To jointly overcome the communication bottleneck and privacy leakage of wireless federated learning (FL), this paper studies a differentially private over-the-air federated averaging (DP-OTA-FedAvg) system with a limited sum power budget. With DP-OTA-FedAvg, the gradients are aligned by an alignment coefficient and aggregated over the air, and channel noise is employed to protect privacy. We aim to improve the learning performance by jointly designing the device scheduling, alignment coefficient, and the number of aggregation rounds of federated averaging (FedAvg) subject to sum power and privacy constraints. We first present the privacy analysis based on differential privacy (DP) to quantify the impact of the alignment coefficient on privacy preservation in each communication round. Furthermore, to study how the device scheduling, alignment coefficient, and the number of the global aggregation affect the learning process, we conduct the convergence analysis of DP-OTA-FedAvg in the cases of convex and non-convex loss functions. Based on these analytical results, we formulate an optimization problem to minimize the optimality gap of the DP-OTA-FedAvg subject to limited sum power and privacy budgets. The problem is solved by decoupling it into two sub-problems. Given the number of communication rounds, we conclude the relationship between the number of scheduled devices and the alignment coefficient, which offers a set of potential optimal solution pairs of device scheduling and the alignment coefficient. Thanks to the reduced search space, the optimal solution can be efficiently obtained. The effectiveness of the proposed policy is validated through simulations.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Performance Analysis and Low-Complexity Design for XL-MIMO with Near-Field Spatial Non-Stationarities
Authors:
Kangda Zhi,
Cunhua Pan,
Hong Ren,
Kok Keong Chai,
Cheng-Xiang Wang,
Robert Schober,
Xiaohu You
Abstract:
Extremely large-scale multiple-input multiple-output (XL-MIMO) is capable of supporting extremely high system capacities with large numbers of users. In this work, we build a framework for the analysis and low-complexity design of XL-MIMO in the near field with spatial non-stationarities. Specifically, we first analyze the theoretical performance of discrete-aperture XL-MIMO using an electromagnet…
▽ More
Extremely large-scale multiple-input multiple-output (XL-MIMO) is capable of supporting extremely high system capacities with large numbers of users. In this work, we build a framework for the analysis and low-complexity design of XL-MIMO in the near field with spatial non-stationarities. Specifically, we first analyze the theoretical performance of discrete-aperture XL-MIMO using an electromagnetic (EM) channel model based on the near-field spherical wavefront. We analytically reveal the impact of the discrete aperture and polarization mismatch on the received power. We also complement the classical Fraunhofer distance based on the considered EM channel model. Our analytical results indicate that a limited part of the XL-array receives the majority of the signal power in the near field, which leads to a notion of visibility region (VR) of a user. Thus, we propose a VR detection algorithm and leverage the acquired VR information to devise a low-complexity symbol detection scheme. Furthermore, we propose a graph theory-based user partition algorithm, relying on the VR overlap ratio between different users. Partial zero-forcing (PZF) is utilized to eliminate only the interference from users allocated to the same group, which further reduces computational complexity in matrix inversion. Numerical results confirm the correctness of the analytical results and the effectiveness of the proposed algorithms. It reveals that our algorithms approach the performance of conventional whole array (WA)-based designs but with much lower complexity.
△ Less
Submitted 12 October, 2023; v1 submitted 31 March, 2023;
originally announced April 2023.
-
Device Scheduling for Over-the-Air Federated Learning with Differential Privacy
Authors:
Na Yan,
Kezhi Wang,
Cunhua Pan,
Kok Keong Chai
Abstract:
In this paper, we propose a device scheduling scheme for differentially private over-the-air federated learning (DP-OTA-FL) systems, referred to as S-DPOTAFL, where the privacy of the participants is guaranteed by channel noise. In S-DPOTAFL, the gradients are aligned by the alignment coefficient and aggregated via over-the-air computation (AirComp). The scheme schedules the devices with better ch…
▽ More
In this paper, we propose a device scheduling scheme for differentially private over-the-air federated learning (DP-OTA-FL) systems, referred to as S-DPOTAFL, where the privacy of the participants is guaranteed by channel noise. In S-DPOTAFL, the gradients are aligned by the alignment coefficient and aggregated via over-the-air computation (AirComp). The scheme schedules the devices with better channel conditions in the training to avoid the problem that the alignment coefficient is limited by the device with the worst channel condition in the system. We conduct the privacy and convergence analysis to theoretically demonstrate the impact of device scheduling on privacy protection and learning performance. To improve the learning accuracy, we formulate an optimization problem with the goal to minimize the training loss subjecting to privacy and transmit power constraints. Furthermore, we present the condition that the S-DPOTAFL performs better than the DP-OTA-FL without considering device scheduling (NoS-DPOTAFL). The effectiveness of the S-DPOTAFL is validated through simulations.
△ Less
Submitted 13 November, 2022; v1 submitted 31 October, 2022;
originally announced October 2022.
-
Toward Secure and Private Over-the-Air Federated Learning
Authors:
Na Yan,
Kezhi Wang,
Kangda Zhi,
Cunhua Pan,
Kok Keong Chai,
H. Vincent Poor
Abstract:
In this paper, a novel secure and private over-the-air federated learning (SP-OTA-FL) framework is studied where noise is employed to protect data privacy and system security. Specifically, the privacy leakage of user data and the security level of the system are measured by differential privacy (DP) and mean square error security (MSE-security), respectively. To mitigate the impact of noise on le…
▽ More
In this paper, a novel secure and private over-the-air federated learning (SP-OTA-FL) framework is studied where noise is employed to protect data privacy and system security. Specifically, the privacy leakage of user data and the security level of the system are measured by differential privacy (DP) and mean square error security (MSE-security), respectively. To mitigate the impact of noise on learning accuracy, we propose a channel-weighted post-processing (CWPP) mechanism, which assigns a smaller weight to the gradient of the device with poor channel conditions. Furthermore, employing CWPP can avoid the issue that the signal-to-noise ratio (SNR) of the overall system is limited by the device with the worst channel condition in aligned over-the-air federated learning (OTA-FL). We theoretically analyze the effect of noise on privacy and security protection and also illustrate the adverse impact of noise on learning performance by conducting convergence analysis. Based on these analytical results, we propose device scheduling policies considering privacy and security protection in different cases of channel noise. In particular, we formulate an integer nonlinear fractional programming problem aiming to minimize the negative impact of noise on the learning process. We obtain the closed-form solution to the optimization problem when the model is with high dimension. For the general case, we propose a secure and private algorithm (SPA) based on the branch-and-bound (BnB) method, which can obtain an optimal solution with low complexity. The effectiveness of the proposed CWPP mechanism and the policies for device selection are validated through simulations.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Active RIS Versus Passive RIS: Which Is Superior with the Same Power Budget?
Authors:
Kangda Zhi,
Cunhua Pan,
Hong Ren,
Kok Keong Chai,
Maged Elkashlan
Abstract:
This letter theoretically compares the active reconfigurable intelligent surface (RIS)-aided system with the passive RIS-aided system. For fair comparison, we consider that these two systems have the same overall power budget that can be used at both the base station (BS) and the RIS. For active RIS, we first derive the optimal power allocation between the BS's transmit signal power and RIS's outp…
▽ More
This letter theoretically compares the active reconfigurable intelligent surface (RIS)-aided system with the passive RIS-aided system. For fair comparison, we consider that these two systems have the same overall power budget that can be used at both the base station (BS) and the RIS. For active RIS, we first derive the optimal power allocation between the BS's transmit signal power and RIS's output signal power. We also analyze the impact of various system parameters on the optimal power allocation ratio. Then, we compare the performance between the active RIS and the passive RIS, which demonstrates that the active RIS would be superior if the power budget is not very small and the number of RIS elements is not very large.
△ Less
Submitted 14 December, 2021;
originally announced December 2021.
-
Meta-learning for RIS-assisted NOMA Networks
Authors:
Yixuan Zou,
Yuanwei Liu,
Kaifeng Han,
Xiao Liu,
Kok Keong Chai
Abstract:
A novel reconfigurable intelligent surfaces (RISs)-based transmission framework is proposed for downlink non-orthogonal multiple access (NOMA) networks. We propose a quality-of-service (QoS)-based clustering scheme to improve the resource efficiency and formulate a sum rate maximization problem by jointly optimizing the phase shift of the RIS and the power allocation at the base station (BS). A mo…
▽ More
A novel reconfigurable intelligent surfaces (RISs)-based transmission framework is proposed for downlink non-orthogonal multiple access (NOMA) networks. We propose a quality-of-service (QoS)-based clustering scheme to improve the resource efficiency and formulate a sum rate maximization problem by jointly optimizing the phase shift of the RIS and the power allocation at the base station (BS). A model-agnostic meta-learning (MAML)-based learning algorithm is proposed to solve the joint optimization problem with a fast convergence rate and low model complexity. Extensive simulation results demonstrate that the proposed QoS-based NOMA network achieves significantly higher transmission throughput compared to the conventional orthogonal multiple access (OMA) network. It can also be observed that substantial throughput gain can be achieved by integrating RISs in NOMA and OMA networks. Moreover, simulation results of the proposed QoS-based clustering method demonstrate observable throughput gain against the conventional channel condition-based schemes.
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Scaling laws to predict humidity-induced swelling and stiffness in hydrogels
Authors:
Yiwei Gao,
Nicholas K. K. Chai,
Negin Garakani,
Sujit S. Datta,
H. Jeremy Cho
Abstract:
From pasta to biological tissues to contact lenses, gel and gel-like materials inherently soften as they swell with water. In dry, low-relative-humidity environments, these materials stiffen as they de-swell with water. Here, we use semi-dilute polymer theory to develop a simple power-law relationship between hydrogel elastic modulus and swelling. From this relationship, we predict hydrogel stiffn…
▽ More
From pasta to biological tissues to contact lenses, gel and gel-like materials inherently soften as they swell with water. In dry, low-relative-humidity environments, these materials stiffen as they de-swell with water. Here, we use semi-dilute polymer theory to develop a simple power-law relationship between hydrogel elastic modulus and swelling. From this relationship, we predict hydrogel stiffness or swelling at arbitrary relative humidities. Our close predictions of properties of hydrogels across three different polymer mesh families at varying crosslinking densities and relative humidities demonstrate the validity and generality of our understanding. This predictive capability enables more rapid material discovery and selection for hydrogel applications in varying humidity environments.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
Downlink Analysis for Reconfigurable Intelligent Surfaces Aided NOMA Networks
Authors:
Chao Zhang,
Wenqiang Yi,
Yuanwei Liu,
Zhi** Qin,
Kok Keong Chai
Abstract:
By activating blocked users and altering successive interference cancellation (SIC) sequences, reconfigurable intelligent surfaces (RISs) become promising for enhancing non-orthogonal multiple access (NOMA) systems. This work investigates the downlink performance of RIS-aided NOMA networks via stochastic geometry. We first introduce the unique path loss model for RIS reflecting channels. Then, we…
▽ More
By activating blocked users and altering successive interference cancellation (SIC) sequences, reconfigurable intelligent surfaces (RISs) become promising for enhancing non-orthogonal multiple access (NOMA) systems. This work investigates the downlink performance of RIS-aided NOMA networks via stochastic geometry. We first introduce the unique path loss model for RIS reflecting channels. Then, we evaluate the angle distributions based on a Poisson cluster process (PCP) framework, which theoretically demonstrates that the angles of incidence and reflection are uniformly distributed. Lastly, we derive closed-form expressions for coverage probabilities of the paired NOMA users. Our results show that 1) RIS-aided NOMA networks perform better than the traditional NOMA networks; 2) the SIC order in NOMA systems can be altered since RISs are able to change the channel gains of NOMA users.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
User Cooperation for IRS-aided Secure SWIPT MIMO Systems
Authors:
Gui Zhou,
Cunhua Pan,
Hong Ren,
Kezhi Wang,
Kok Keong Chai,
Kai-Kit Wong
Abstract:
In this paper, intelligent reflecting surface (IRS) is proposed to enhance the physical layer security in the Rician fading channel where the angular direction of the eavesdropper is aligned with a legitimate user. In this scenario, we consider a two-phase communication system under the active attacks and passive eavesdrop**. Particularly, in the first phase, the base station avoids direct trans…
▽ More
In this paper, intelligent reflecting surface (IRS) is proposed to enhance the physical layer security in the Rician fading channel where the angular direction of the eavesdropper is aligned with a legitimate user. In this scenario, we consider a two-phase communication system under the active attacks and passive eavesdrop**. Particularly, in the first phase, the base station avoids direct transmission to the attacked user. While, in the second phase, other users cooperate to forward signals to the attacked user with the help of IRS and energy harvesting technology. Under the active attacks, we investigate an outage constrained beamforming design problem under the statistical cascaded channel error model, which is solved by using the Bernstein-type inequality. As for the passive eavesdrop**, an average secrecy rate maximization problem is formulated, which is addressed by a low complexity algorithm. Numerical results show that the negative effect of the eavesdropper's channel error is greater than that of the legitimate user.
△ Less
Submitted 28 June, 2021; v1 submitted 9 June, 2020;
originally announced June 2020.
-
Robust Transmission Design for Intelligent Reflecting Surface Aided Secure Communication Systems with Imperfect Cascaded CSI
Authors:
Sheng Hong,
Cunhua Pan,
Hong Ren,
Kezhi Wang,
Kok Keong Chai,
Arumugam Nallanathan
Abstract:
In this paper, we investigate the design of robust and secure transmission in intelligent reflecting surface (IRS) aided wireless communication systems. In particular, a multi-antenna access point (AP) communicates with a single-antenna legitimate receiver in the presence of multiple single-antenna eavesdroppers, where the artificial noise (AN) is transmitted to enhance the security performance. B…
▽ More
In this paper, we investigate the design of robust and secure transmission in intelligent reflecting surface (IRS) aided wireless communication systems. In particular, a multi-antenna access point (AP) communicates with a single-antenna legitimate receiver in the presence of multiple single-antenna eavesdroppers, where the artificial noise (AN) is transmitted to enhance the security performance. Besides, we assume that the cascaded AP-IRS-user channels are imperfect due to the channel estimation error. To minimize the transmit power, the beamforming vector at the transmitter, the AN covariance matrix, and the IRS phase shifts are jointly optimized subject to the outage rate probability constraints under the statistical cascaded channel state information (CSI) error model that usually models the channel estimation error. To handle the resulting non-convex optimization problem, we first approximate the outage rate probability constraints by using the Bernstein-type inequality. Then, we develop a suboptimal algorithm based on alternating optimization, the penalty-based and semidefinite relaxation methods. Simulation results reveal that the proposed scheme significantly reduces the transmit power compared to other benchmark schemes.
△ Less
Submitted 3 December, 2020; v1 submitted 24 April, 2020;
originally announced April 2020.