-
Efficient Reinforcement Learning with Impaired Observability: Learning to Act with Delayed and Missing State Observations
Authors:
Minshuo Chen,
Jie Meng,
Yu Bai,
Yinyu Ye,
H. Vincent Poor,
Mengdi Wang
Abstract:
In real-world reinforcement learning (RL) systems, various forms of {\it impaired observability} can complicate matters. These situations arise when an agent is unable to observe the most recent state of the system due to latency or lossy channels, yet the agent must still make real-time decisions. This paper introduces a theoretical investigation into efficient RL in control systems where agents…
▽ More
In real-world reinforcement learning (RL) systems, various forms of {\it impaired observability} can complicate matters. These situations arise when an agent is unable to observe the most recent state of the system due to latency or lossy channels, yet the agent must still make real-time decisions. This paper introduces a theoretical investigation into efficient RL in control systems where agents must act with delayed and missing state observations. We present algorithms and establish near-optimal regret upper and lower bounds, of the form $\tilde{\mathcal{O}}(\sqrt{{\rm poly}(H) SAK})$, for RL in the delayed and missing observation settings. Here $S$ and $A$ are the sizes of state and action spaces, $H$ is the time horizon and $K$ is the number of episodes. Despite impaired observability posing significant challenges to the policy class and planning, our results demonstrate that learning remains efficient, with the regret bound optimally depending on the state-action size of the original system. Additionally, we provide a characterization of the performance of the optimal policy under impaired observability, comparing it to the optimal value obtained with full observability. Numerical results are provided to support our theory.
△ Less
Submitted 26 October, 2023; v1 submitted 1 June, 2023;
originally announced June 2023.
-
Reconstructing Graph Diffusion History from a Single Snapshot
Authors:
Ruizhong Qiu,
Dingsu Wang,
Lei Ying,
H. Vincent Poor,
Yifang Zhang,
Hanghang Tong
Abstract:
Diffusion on graphs is ubiquitous with numerous high-impact applications. In these applications, complete diffusion histories play an essential role in terms of identifying dynamical patterns, reflecting on precaution actions, and forecasting intervention effects. Despite their importance, complete diffusion histories are rarely available and are highly challenging to reconstruct due to ill-posedn…
▽ More
Diffusion on graphs is ubiquitous with numerous high-impact applications. In these applications, complete diffusion histories play an essential role in terms of identifying dynamical patterns, reflecting on precaution actions, and forecasting intervention effects. Despite their importance, complete diffusion histories are rarely available and are highly challenging to reconstruct due to ill-posedness, explosive search space, and scarcity of training data. To date, few methods exist for diffusion history reconstruction. They are exclusively based on the maximum likelihood estimation (MLE) formulation and require to know true diffusion parameters. In this paper, we study an even harder problem, namely reconstructing Diffusion history from A single SnapsHot} (DASH), where we seek to reconstruct the history from only the final snapshot without knowing true diffusion parameters. We start with theoretical analyses that reveal a fundamental limitation of the MLE formulation. We prove: (a) estimation error of diffusion parameters is unavoidable due to NP-hardness of diffusion parameter estimation, and (b) the MLE formulation is sensitive to estimation error of diffusion parameters. To overcome the inherent limitation of the MLE formulation, we propose a novel barycenter formulation: finding the barycenter of the posterior distribution of histories, which is provably stable against the estimation error of diffusion parameters. We further develop an effective solver named DIffusion hiTting Times with Optimal proposal (DITTO) by reducing the problem to estimating posterior expected hitting times via the Metropolis--Hastings Markov chain Monte Carlo method (M--H MCMC) and employing an unsupervised graph neural network to learn an optimal proposal to accelerate the convergence of M--H MCMC. We conduct extensive experiments to demonstrate the efficacy of the proposed method.
△ Less
Submitted 31 May, 2024; v1 submitted 1 June, 2023;
originally announced June 2023.
-
A Tutorial on Holographic MIMO Communications--Part III: Open Opportunities and Challenges
Authors:
Jiancheng An,
Chau Yuen,
Chongwen Huang,
Merouane Debbah,
H. Vincent Poor,
Lajos Hanzo
Abstract:
Holographic multiple-input multiple-output (HMIMO) technology, which uses spatially continuous surfaces for signal transmission and reception, is envisioned to be a promising solution for improving the data rate and coverage of wireless networks. In Parts I and II of this three-part tutorial on HMIMO communications, we provided an overview of channel modeling and highlighted the state-of-the-art i…
▽ More
Holographic multiple-input multiple-output (HMIMO) technology, which uses spatially continuous surfaces for signal transmission and reception, is envisioned to be a promising solution for improving the data rate and coverage of wireless networks. In Parts I and II of this three-part tutorial on HMIMO communications, we provided an overview of channel modeling and highlighted the state-of-the-art in holographic beamforming. In this part, we will discuss the unique properties of HMIMO systems, highlighting the open challenges and opportunities that arise as the transceiver array apertures become denser and electromagnetically larger. Additionally, we explore the interplay between HMIMO and other emerging technologies in next-generation networks.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
A Tutorial on Holographic MIMO Communications--Part II: Performance Analysis and Holographic Beamforming
Authors:
Jiancheng An,
Chau Yuen,
Chongwen Huang,
Merouane Debbah,
H. Vincent Poor,
Lajos Hanzo
Abstract:
As Part II of a three-part tutorial on holographic multiple-input multiple-output (HMIMO), this Letter focuses on the state-of-the-art in performance analysis and on holographic beamforming for HMIMO communications. We commence by discussing the spatial degrees of freedom (DoF) and ergodic capacity of a point-to-point HMIMO system, based on the channel model presented in Part I. Additionally, we a…
▽ More
As Part II of a three-part tutorial on holographic multiple-input multiple-output (HMIMO), this Letter focuses on the state-of-the-art in performance analysis and on holographic beamforming for HMIMO communications. We commence by discussing the spatial degrees of freedom (DoF) and ergodic capacity of a point-to-point HMIMO system, based on the channel model presented in Part I. Additionally, we also consider the sum-rate analysis of multi-user HMIMO systems. Moreover, we review the recent progress in holographic beamforming techniques developed for various HMIMO scenarios. Finally, we evaluate both the spatial DoF and the channel capacity through numerical simulations.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
A Tutorial on Holographic MIMO Communications--Part I: Channel Modeling and Channel Estimation
Authors:
Jiancheng An,
Chau Yuen,
Chongwen Huang,
Merouane Debbah,
H. Vincent Poor,
Lajos Hanzo
Abstract:
By integrating a nearly infinite number of reconfigurable elements into a finite space, a spatially continuous array aperture is formed for holographic multiple-input multiple-output (HMIMO) communications. This three-part tutorial aims for providing an overview of the latest advances in HMIMO communications. As Part I of the tutorial, this letter first introduces the fundamental concept of HMIMO…
▽ More
By integrating a nearly infinite number of reconfigurable elements into a finite space, a spatially continuous array aperture is formed for holographic multiple-input multiple-output (HMIMO) communications. This three-part tutorial aims for providing an overview of the latest advances in HMIMO communications. As Part I of the tutorial, this letter first introduces the fundamental concept of HMIMO and reviews the recent progress in HMIMO channel modeling, followed by a suite of efficient channel estimation approaches. Finally, numerical results are provided for demonstrating the statistical consistency of the new HMIMO channel model advocated with conventional ones and evaluating the performance of the channel estimators. Parts II and III of the tutorial will delve into the performance analysis and holographic beamforming, and detail the interplay of HMIMO with emerging technologies.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Multi-Connectivity for Multicast Video Streaming in Cellular Networks (Extended Abstract)
Authors:
Sadaf Ul Zuhra,
Prasanna Chaporkar,
Abhay Karandikar,
H. Vincent Poor
Abstract:
In video streaming applications especially during live streaming events (such as the Super Bowl), video traffic can account for a significant portion of network traffic and can lead to severe network congestion. During such events, multicast transmission can be used to avoid network congestion since the same video content is being streamed to multiple users simultaneously. However, providing seaml…
▽ More
In video streaming applications especially during live streaming events (such as the Super Bowl), video traffic can account for a significant portion of network traffic and can lead to severe network congestion. During such events, multicast transmission can be used to avoid network congestion since the same video content is being streamed to multiple users simultaneously. However, providing seamless connectivity to cellular users in multicast streaming remains an open problem. To address this issue, this paper explores the potential of using multi-connectivity (MC) in wireless multicast streaming. Our results reveal that MC significantly improves the performance of multicast services, especially for cell edge users who often suffer from poor channel conditions. We prove that optimal resource allocation in MC multicast streaming is an NP-hard problem. Therefore, we propose a greedy approximation algorithm for this problem with an approximation factor of $(1-1/e)$. We also prove that no other polynomial-time algorithm can provide a better approximation.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Adversarial Channels with O(1)-Bit Partial Feedback
Authors:
Eric Ruzomberka,
Yongkyu Jang,
David J. Love,
H. Vincent Poor
Abstract:
We consider point-to-point communication over $q$-ary adversarial channels with partial noiseless feedback. In this setting, a sender Alice transmits $n$ symbols from a $q$-ary alphabet over a noisy forward channel to a receiver Bob, while Bob sends feedback to Alice over a noiseless reverse channel. In the forward channel, an adversary can inject both symbol errors and erasures up to an error fra…
▽ More
We consider point-to-point communication over $q$-ary adversarial channels with partial noiseless feedback. In this setting, a sender Alice transmits $n$ symbols from a $q$-ary alphabet over a noisy forward channel to a receiver Bob, while Bob sends feedback to Alice over a noiseless reverse channel. In the forward channel, an adversary can inject both symbol errors and erasures up to an error fraction $p \in [0,1]$ and erasure fraction $r \in [0,1]$, respectively. In the reverse channel, Bob's feedback is partial such that he can send at most $B(n) \geq 0$ bits during the communication session.
As a case study on minimal partial feedback, we initiate the study of the $O(1)$-bit feedback setting in which $B$ is $O(1)$ in $n$. As our main result, we provide a tight characterization of zero-error capacity under $O(1)$-bit feedback for all $q \geq 2$, $p \in [0,1]$ and $r \in [0,1]$, which we prove this result via novel achievability and converse schemes inspired by recent studies of causal adversarial channels without feedback. Perhaps surprisingly, we show that $O(1)$-bits of feedback are sufficient to achieve the zero-error capacity of the $q$-ary adversarial error channel with full feedback when the error fraction $p$ is sufficiently small.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Cooperative Channel Capacity Learning
Authors:
Nunzio A. Letizia,
Andrea M. Tonello,
H. Vincent Poor
Abstract:
In this paper, the problem of determining the capacity of a communication channel is formulated as a cooperative game, between a generator and a discriminator, that is solved via deep learning techniques. The task of the generator is to produce channel input samples for which the discriminator ideally distinguishes conditional from unconditional channel output samples. The learning approach, refer…
▽ More
In this paper, the problem of determining the capacity of a communication channel is formulated as a cooperative game, between a generator and a discriminator, that is solved via deep learning techniques. The task of the generator is to produce channel input samples for which the discriminator ideally distinguishes conditional from unconditional channel output samples. The learning approach, referred to as cooperative channel capacity learning (CORTICAL), provides both the optimal input signal distribution and the channel capacity estimate. Numerical results demonstrate that the proposed framework learns the capacity-achieving input distribution under challenging non-Shannon settings.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
YOLO: An Efficient Terahertz Band Integrated Sensing and Communications Scheme with Beam Squint
Authors:
Hongliang Luo,
Feifei Gao,
Hai Lin,
Shaodan Ma,
H. Vincent Poor
Abstract:
Using communications signals for dynamic target sensing is an important component of integrated sensing and communications (ISAC). In this paper, we propose to utilize the beam squint effect to realize fast non-cooperative dynamic target sensing in massive multiple input and multiple output (MIMO) Terahertz band communications systems. Specifically, we construct a wideband channel model of the ech…
▽ More
Using communications signals for dynamic target sensing is an important component of integrated sensing and communications (ISAC). In this paper, we propose to utilize the beam squint effect to realize fast non-cooperative dynamic target sensing in massive multiple input and multiple output (MIMO) Terahertz band communications systems. Specifically, we construct a wideband channel model of the echo signals, and design a beamforming strategy that controls the range of beam squint by adjusting the values of phase shifters and true time delay lines. With this design, beams at different subcarriers can be aligned along different directions in a planned way. Then the received echo signals at different subcarriers will carry target information in different directions, based on which the targets' angles can be estimated through sophisticatedly designed algorithm. Moreover, we propose a supporting method based on extended array signal estimation, which utilizes the phase changes of different frequency subcarriers within different OFDM symbols to estimate the distance and velocity of dynamic targets. Interestingly, the proposed sensing scheme only needs to transmit and receive the signals once, which can be termed as You Only Listen Once (YOLO). Compared with the traditional ISAC method that requires time consuming beam swee**, the proposed one greatly reduces the sensing overhead. Simulation results are provided to demonstrate the effectiveness of the proposed scheme.
△ Less
Submitted 5 February, 2024; v1 submitted 19 May, 2023;
originally announced May 2023.
-
Joint Coding of eMBB and URLLC in Vehicle-to-Everything (V2X) Communications
Authors:
Homa Nikbakht,
Eric Ruzomberka,
Michèle Wigger,
Shlomo Shamai,
H. Vincent Poor
Abstract:
A point-to-point communication is considered where a roadside unite (RSU) wishes to simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services to a vehicle. The eMBB message arrives at the beginning of a block and its transmission lasts over the entire block. During each eMBB transmission block, random arrivals of URLLC messages a…
▽ More
A point-to-point communication is considered where a roadside unite (RSU) wishes to simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services to a vehicle. The eMBB message arrives at the beginning of a block and its transmission lasts over the entire block. During each eMBB transmission block, random arrivals of URLLC messages are assumed. To improve the reliability of the URLLC transmissions, the RSU reinforces their transmissions by mitigating the interference of eMBB transmission by means of dirty paper coding (DPC). In the proposed coding scheme, the eMBB messages are decoded based on two approaches: treating interference as noise, and successive interference cancellation. Rigorous bounds are derived for the error probabilities of eMBB and URLLC transmissions achieved by our scheme. Numerical results illustrate that they are lower than bounds for standard time-sharing.
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
Deep Reinforcement Learning for Interference Management in UAV-based 3D Networks: Potentials and Challenges
Authors:
Mojtaba Vaezi,
Xingqin Lin,
Hongliang Zhang,
Walid Saad,
H. Vincent Poor
Abstract:
Modern cellular networks are multi-cell and use universal frequency reuse to maximize spectral efficiency. This results in high inter-cell interference. This problem is growing as cellular networks become three-dimensional with the adoption of unmanned aerial vehicles (UAVs). This is because the strength and number of interference links rapidly increase due to the line-of-sight channels in UAV com…
▽ More
Modern cellular networks are multi-cell and use universal frequency reuse to maximize spectral efficiency. This results in high inter-cell interference. This problem is growing as cellular networks become three-dimensional with the adoption of unmanned aerial vehicles (UAVs). This is because the strength and number of interference links rapidly increase due to the line-of-sight channels in UAV communications. Existing interference management solutions need each transmitter to know the channel information of interfering signals, rendering them impractical due to excessive signaling overhead. In this paper, we propose leveraging deep reinforcement learning for interference management to tackle this shortcoming. In particular, we show that interference can still be effectively mitigated even without knowing its channel information. We then discuss novel approaches to scale the algorithms with linear/sublinear complexity and decentralize them using multi-agent reinforcement learning. By harnessing interference, the proposed solutions enable the continued growth of civilian UAVs.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
Algorithmic Computability of the Capacity of Gaussian Channels with Colored Noise
Authors:
Holger Boche,
Andrea Grigorescu,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
Designing capacity-achieving coding schemes for the band-limited additive colored Gaussian noise (ACGN) channel has been and is still a challenge. In this paper, the capacity of the band-limited ACGN channel is studied from a fundamental algorithmic point of view by addressing the question of whether or not the capacity can be algorithmically computed. To this aim, the concept of Turing machines i…
▽ More
Designing capacity-achieving coding schemes for the band-limited additive colored Gaussian noise (ACGN) channel has been and is still a challenge. In this paper, the capacity of the band-limited ACGN channel is studied from a fundamental algorithmic point of view by addressing the question of whether or not the capacity can be algorithmically computed. To this aim, the concept of Turing machines is used, which provides fundamental performance limits of digital computers. t is shown that there are band-limited ACGN channels having computable continuous spectral densities whose capacity are non-computable numbers. Moreover, it is demonstrated that for those channels, it is impossible to find computable sequences of asymptotically sharp upper bounds for their capacities.
△ Less
Submitted 1 June, 2023; v1 submitted 4 May, 2023;
originally announced May 2023.
-
Data Valuation from Data-Driven Optimization
Authors:
Robert Mieth,
Juan M. Morales,
H. Vincent Poor
Abstract:
With the ongoing investment in data collection and communication technology in power systems, data-driven optimization has been established as a powerful tool for system operators to handle stochastic system states caused by weather- and behavior-dependent resources. However, most methods are ignorant to data quality, which may differ based on measurement and underlying privacy-protection mechanis…
▽ More
With the ongoing investment in data collection and communication technology in power systems, data-driven optimization has been established as a powerful tool for system operators to handle stochastic system states caused by weather- and behavior-dependent resources. However, most methods are ignorant to data quality, which may differ based on measurement and underlying privacy-protection mechanisms. This paper addresses this shortcoming by (i) proposing a practical data quality metric based on Wasserstein distance, (ii) leveraging a novel modification of distributionally robust optimization using information from multiple data sets with heterogeneous quality to valuate data, (iii) applying the proposed optimization framework to an optimal power flow problem, and (iv) showing a direct method to valuate data from the optimal solution. We conduct numerical experiments to analyze and illustrate the proposed model and publish the implementation open-source.
△ Less
Submitted 15 December, 2023; v1 submitted 2 May, 2023;
originally announced May 2023.
-
Next-Generation Full Duplex Networking System Empowered by Reconfigurable Intelligent Surfaces
Authors:
Yingyang Chen,
Yuncong Li,
Miaowen Wen,
Duoying Zhang,
Bingli Jiao,
Zhiguo Ding,
Theodoros A. Tsiftsis,
H. Vincent Poor
Abstract:
Full duplex (FD) radio has attracted extensive attention due to its co-time and co-frequency transceiving capability. {However, the potential gain brought by FD radios is closely related to the management of self-interference (SI), which imposes high or even stringent requirements on SI cancellation (SIC) techniques. When the FD deployment evolves into next-generation mobile networking, the SI pro…
▽ More
Full duplex (FD) radio has attracted extensive attention due to its co-time and co-frequency transceiving capability. {However, the potential gain brought by FD radios is closely related to the management of self-interference (SI), which imposes high or even stringent requirements on SI cancellation (SIC) techniques. When the FD deployment evolves into next-generation mobile networking, the SI problem becomes more complicated, significantly limiting its potential gains.} In this paper, we conceive a multi-cell FD networking scheme by deploying a reconfigurable intelligent surface (RIS) at the cell boundary to configure the radio environment proactively. To achieve the full potential of the system, we aim to maximize the sum rate (SR) of multiple cells by jointly optimizing the transmit precoding (TPC) matrices at FD base stations (BSs) and users and the phase shift matrix at RIS. Since the original problem is non-convex, we reformulate and decouple it into a pair of subproblems by utilizing the relationship between the SR and minimum mean square error (MMSE). The optimal solutions of TPC matrices are obtained in closed form, while both complex circle manifold (CCM) and successive convex approximation (SCA) based algorithms are developed to resolve the phase shift matrix suboptimally. Our simulation results show that introducing an RIS into an FD networking system not only improves the overall SR significantly but also enhances the cell edge performance prominently. More importantly, we validate that the RIS deployment with optimized phase shifts can reduce the requirement for SIC and the number of BS antennas, which further reduces the hardware cost and power consumption, especially with a sufficient number of reflecting elements. As a result, the utilization of an RIS enables the originally cumbersome FD networking system to become efficient and practical.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Edge Learning for Large-Scale Internet of Things With Task-Oriented Efficient Communication
Authors:
Haihui Xie,
Minghua Xia,
Peiran Wu,
Shuai Wang,
H. Vincent Poor
Abstract:
In the Internet of Things (IoT) networks, edge learning for data-driven tasks provides intelligent applications and services. As the network size becomes large, different users may generate distinct datasets. Thus, to suit multiple edge learning tasks for large-scale IoT networks, this paper performs efficient communication under the task-oriented principle by using the collaborative design of wir…
▽ More
In the Internet of Things (IoT) networks, edge learning for data-driven tasks provides intelligent applications and services. As the network size becomes large, different users may generate distinct datasets. Thus, to suit multiple edge learning tasks for large-scale IoT networks, this paper performs efficient communication under the task-oriented principle by using the collaborative design of wireless resource allocation and edge learning error prediction. In particular, we start with multi-user scheduling to alleviate co-channel interference in dense networks. Then, we perform optimal power allocation in parallel for different learning tasks. Thanks to the high parallelization of the designed algorithm, extensive experimental results corroborate that the multi-user scheduling and task-oriented power allocation improve the performance of distinct edge learning tasks efficiently compared with the state-of-the-art benchmark algorithms.
△ Less
Submitted 30 April, 2023;
originally announced May 2023.
-
Joint Sensing, Communication, and AI: A Trifecta for Resilient THz User Experiences
Authors:
Christina Chaccour,
Walid Saad,
Merouane Debbah,
H. Vincent Poor
Abstract:
In this paper a novel joint sensing, communication, and artificial intelligence (AI) framework is proposed so as to optimize extended reality (XR) experiences over terahertz (THz) wireless systems. The proposed framework consists of three main components. First, a tensor decomposition framework is proposed to extract unique sensing parameters for XR users and their environment by exploiting then T…
▽ More
In this paper a novel joint sensing, communication, and artificial intelligence (AI) framework is proposed so as to optimize extended reality (XR) experiences over terahertz (THz) wireless systems. The proposed framework consists of three main components. First, a tensor decomposition framework is proposed to extract unique sensing parameters for XR users and their environment by exploiting then THz channel sparsity. Essentially, THz band's quasi-opticality is exploited and the sensing parameters are extracted from the uplink communication signal, thereby allowing for the use of the same waveform, spectrum, and hardware for both communication and sensing functionalities. Then, the Cramer-Rao lower bound is derived to assess the accuracy of the estimated sensing parameters. Second, a non-autoregressive multi-resolution generative artificial intelligence (AI) framework integrated with an adversarial transformer is proposed to predict missing and future sensing information. The proposed framework offers robust and comprehensive historical sensing information and anticipatory forecasts of future environmental changes, which are generalizable to fluctuations in both known and unforeseen user behaviors and environmental conditions. Third, a multi-agent deep recurrent hysteretic Q-neural network is developed to control the handover policy of reconfigurable intelligent surface (RIS) subarrays, leveraging the informative nature of sensing information to minimize handover cost, maximize the individual quality of personal experiences (QoPEs), and improve the robustness and resilience of THz links. Simulation results show a high generalizability of the proposed unsupervised generative AI framework to fluctuations in user behavior and velocity, leading to a 61 % improvement in instantaneous reliability compared to schemes with known channel state information.
△ Less
Submitted 28 April, 2023;
originally announced May 2023.
-
Generative AI-enabled Vehicular Networks: Fundamentals, Framework, and Case Study
Authors:
Ruichen Zhang,
Ke Xiong,
Hongyang Du,
Dusit Niyato,
Jiawen Kang,
Xuemin Shen,
H. Vincent Poor
Abstract:
Recognizing the tremendous improvements that the integration of generative AI can bring to intelligent transportation systems, this article explores the integration of generative AI technologies in vehicular networks, focusing on their potential applications and challenges. Generative AI, with its capabilities of generating realistic data and facilitating advanced decision-making processes, enhanc…
▽ More
Recognizing the tremendous improvements that the integration of generative AI can bring to intelligent transportation systems, this article explores the integration of generative AI technologies in vehicular networks, focusing on their potential applications and challenges. Generative AI, with its capabilities of generating realistic data and facilitating advanced decision-making processes, enhances various applications when combined with vehicular networks, such as navigation optimization, traffic prediction, data generation, and evaluation. Despite these promising applications, the integration of generative AI with vehicular networks faces several challenges, such as real-time data processing and decision-making, adapting to dynamic and unpredictable environments, as well as privacy and security concerns. To address these challenges, we propose a multi-modality semantic-aware framework to enhance the service quality of generative AI. By leveraging multi-modal and semantic communication technologies, the framework enables the use of text and image data for creating multi-modal content, providing more reliable guidance to receiving vehicles and ultimately improving system usability and efficiency. To further improve the reliability and efficiency of information transmission and reconstruction within the framework, taking generative AI-enabled vehicle-to-vehicle (V2V) as a case study, a deep reinforcement learning (DRL)-based approach is proposed for resource allocation. Finally, we discuss potential research directions and anticipated advancements in the field of generative AI-enabled vehicular networks.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
On the Capacity Region of Reconfigurable Intelligent Surface Assisted Symbiotic Radios
Authors:
Qianqian Zhang,
Hu Zhou,
Ying-Chang Liang,
Sumei Sun,
Wei Zhang,
H. Vincent Poor
Abstract:
In this paper, we are interested in a reconfigurable intelligent surface (RIS)-assisted symbiotic radio (SR) system, where an RIS assists a primary transmission by passive beamforming and simultaneously acts as an information transmitter by periodically adjusting its reflection coefficients. The above RIS functions innately enable a new multiplicative multiple access channel (M-MAC), where the pri…
▽ More
In this paper, we are interested in a reconfigurable intelligent surface (RIS)-assisted symbiotic radio (SR) system, where an RIS assists a primary transmission by passive beamforming and simultaneously acts as an information transmitter by periodically adjusting its reflection coefficients. The above RIS functions innately enable a new multiplicative multiple access channel (M-MAC), where the primary and secondary signals are superposed in a multiplicative manner. To pursue the fundamental performance limits of M-MAC, we focus on the characterization of the capacity region for such a system when the direct link is blocked. Due to the reflection nature of RIS, the signal transmitted from the RIS should satisfy a passive reflection constraint. We consider two types of passive reflection constraints, one for the case that only the phases of the RIS can be adjusted, while the other for the case that both the amplitude and the phase can be adjusted. Under the passive reflection constraints at the RIS as well as the average power constraint at the primary transmitter (PTx), we characterize the capacity region of RIS-assisted SR. It is observed that: 1) the number of sum-rate-optimal points on the boundary of the capacity region is infinite; 2) for the rate pairs with the maximum sum rate, the optimal distribution of the amplitude of the primary signal is a continuous Rayleigh distribution, while for the remaining rate pairs on the capacity region boundary, the optimal amplitude of the primary signal is discrete; 3) the adjustment of the amplitude for the RIS can enlarge the capacity region as compared to the phase-adjusted-only case.
△ Less
Submitted 26 April, 2024; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Secure Federated Learning for Cognitive Radio Sensing
Authors:
Malgorzata Wasilewska,
Hanna Bogucka,
H. Vincent Poor
Abstract:
This paper considers reliable and secure Spectrum Sensing (SS) based on Federated Learning (FL) in the Cognitive Radio (CR) environment. Motivation, architectures, and algorithms of FL in SS are discussed. Security and privacy threats on these algorithms are overviewed, along with possible countermeasures to such attacks. Some illustrative examples are also provided, with design recommendations fo…
▽ More
This paper considers reliable and secure Spectrum Sensing (SS) based on Federated Learning (FL) in the Cognitive Radio (CR) environment. Motivation, architectures, and algorithms of FL in SS are discussed. Security and privacy threats on these algorithms are overviewed, along with possible countermeasures to such attacks. Some illustrative examples are also provided, with design recommendations for FL-based SS in future CRs.
△ Less
Submitted 23 March, 2023;
originally announced April 2023.
-
Low Complexity Optimization for Line-of-Sight RIS-Aided Holographic Communications
Authors:
Juan Carlos Ruiz-Sicilia,
Marco Di Renzo,
Merouane Debbah,
H. Vincent Poor
Abstract:
The synergy of metasurface-based holographic surfaces (HoloS) and reconfigurable intelligent surfaces (RIS) is considered a key aspect for future communication networks. However, the optimization of dynamic metasurfaces requires the use of numerical algorithms, for example, based on the singular value decomposition (SVD) and gradient descent methods, which are usually computationally intensive, es…
▽ More
The synergy of metasurface-based holographic surfaces (HoloS) and reconfigurable intelligent surfaces (RIS) is considered a key aspect for future communication networks. However, the optimization of dynamic metasurfaces requires the use of numerical algorithms, for example, based on the singular value decomposition (SVD) and gradient descent methods, which are usually computationally intensive, especially when the number of elements is large. In this paper, we analyze low complexity designs for RIS-aided HoloS communication systems, in which the configurations of the HoloS transmitter and the RIS are given in a closed-form expression. We consider implementations based on diagonal and non-diagonal RISs. Over line-of-sight channels, we show that the proposed schemes provide performance that is close to that offered by complex numerical methods.
△ Less
Submitted 30 June, 2023; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Quasi-Synchronous Random Access for Massive MIMO-Based LEO Satellite Constellations
Authors:
Keke Ying,
Zhen Gao,
Sheng Chen,
Mingyu Zhou,
Dezhi Zheng,
Symeon Chatzinotas,
Björn Ottersten,
H. Vincent Poor
Abstract:
Low earth orbit (LEO) satellite constellation-enabled communication networks are expected to be an important part of many Internet of Things (IoT) deployments due to their unique advantage of providing seamless global coverage. In this paper, we investigate the random access problem in massive multiple-input multiple-output-based LEO satellite systems, where the multi-satellite cooperative process…
▽ More
Low earth orbit (LEO) satellite constellation-enabled communication networks are expected to be an important part of many Internet of Things (IoT) deployments due to their unique advantage of providing seamless global coverage. In this paper, we investigate the random access problem in massive multiple-input multiple-output-based LEO satellite systems, where the multi-satellite cooperative processing mechanism is considered. Specifically, at edge satellite nodes, we conceive a training sequence padded multi-carrier system to overcome the issue of imperfect synchronization, where the training sequence is utilized to detect the devices' activity and estimate their channels. Considering the inherent sparsity of terrestrial-satellite links and the sporadic traffic feature of IoT terminals, we utilize the orthogonal approximate message passing-multiple measurement vector algorithm to estimate the delay coefficients and user terminal activity. To further utilize the structure of the receive array, a two-dimensional estimation of signal parameters via rotational invariance technique is performed for enhancing channel estimation. Finally, at the central server node, we propose a majority voting scheme to enhance activity detection by aggregating backhaul information from multiple satellites. Moreover, multi-satellite cooperative linear data detection and multi-satellite cooperative Bayesian dequantization data detection are proposed to cope with perfect and quantized backhaul, respectively. Simulation results verify the effectiveness of our proposed schemes in terms of channel estimation, activity detection, and data detection for quasi-synchronous random access in satellite systems.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
Exploring Collaborative Distributed Diffusion-Based AI-Generated Content (AIGC) in Wireless Networks
Authors:
Hongyang Du,
Ruichen Zhang,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Dong In Kim,
Xuemin,
Shen,
H. Vincent Poor
Abstract:
Driven by advances in generative artificial intelligence (AI) techniques and algorithms, the widespread adoption of AI-generated content (AIGC) has emerged, allowing for the generation of diverse and high-quality content. Especially, the diffusion model-based AIGC technique has been widely used to generate content in a variety of modalities. However, the real-world implementation of AIGC models, p…
▽ More
Driven by advances in generative artificial intelligence (AI) techniques and algorithms, the widespread adoption of AI-generated content (AIGC) has emerged, allowing for the generation of diverse and high-quality content. Especially, the diffusion model-based AIGC technique has been widely used to generate content in a variety of modalities. However, the real-world implementation of AIGC models, particularly on resource-constrained devices such as mobile phones, introduces significant challenges related to energy consumption and privacy concerns. To further promote the realization of ubiquitous AIGC services, we propose a novel collaborative distributed diffusion-based AIGC framework. By capitalizing on collaboration among devices in wireless networks, the proposed framework facilitates the efficient execution of AIGC tasks, optimizing edge computation resource utilization. Furthermore, we examine the practical implementation of the denoising steps on mobile phones, the impact of the proposed approach on the wireless network-aided AIGC landscape, and the future opportunities associated with its real-world integration. The contributions of this paper not only offer a promising solution to the existing limitations of AIGC services but also pave the way for future research in device collaboration, resource optimization, and the seamless delivery of AIGC services across various devices. Our code is available at https://github.com/HongyangDu/DistributedDiffusion.
△ Less
Submitted 23 December, 2023; v1 submitted 6 April, 2023;
originally announced April 2023.
-
25 Years of Signal Processing Advances for Multiantenna Communications
Authors:
Emil Björnson,
Yonina C. Eldar,
Erik G. Larsson,
Angel Lozano,
H. Vincent Poor
Abstract:
Wireless communication technology has progressed dramatically over the past 25 years, in terms of societal adoption as well as technical sophistication. In 1998, mobile phones were still in the process of becoming compact and affordable devices that could be widely utilized in both developed and develo** countries. There were "only" 300 million mobile subscribers in the world [1]. Cellular netwo…
▽ More
Wireless communication technology has progressed dramatically over the past 25 years, in terms of societal adoption as well as technical sophistication. In 1998, mobile phones were still in the process of becoming compact and affordable devices that could be widely utilized in both developed and develo** countries. There were "only" 300 million mobile subscribers in the world [1]. Cellular networks were among the first privatized telecommunication markets, and competition turned the devices into fashion accessories with attractive designs that could be individualized. The service was circumscribed to telephony and text messaging, but it was groundbreaking in that, for the first time, telecommunication was between people rather than locations.
Wireless networks have changed dramatically over the past few decades, enabling this revolution in service provisioning and making it possible to accommodate the ensuing dramatic growth in traffic. There are many contributing components, including new air interfaces for faster transmission, channel coding for enhanced reliability, improved source compression to remove redundancies, and leaner protocols to reduce overheads. Signal processing is at the core of these improvements, but nowhere has it played a bigger role than in the development of multiantenna communication. This article tells the story of how major signal processing advances have transformed the early multiantenna concepts into mainstream technology over the past 25 years. The story therefore begins somewhat arbitrarily in 1998. A broad account of the state-of-the-art signal processing techniques for wireless systems by 1998 can be found in [2], and its contrast with recent textbooks such as [3]-[5] reveals the dramatic leap forward that has taken place in the interim.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.
-
Reliability and Latency Analysis for Wireless Communication Systems with a Secret-Key Budget
Authors:
Karl-Ludwig Besser,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
We consider a wireless communication system with a passive eavesdropper, in which a transmitter and legitimate receiver generate and use key bits to secure the transmission of their data. These bits are added to and used from a pool of available key bits. In this work, we analyze the reliability of the system in terms of the probability that the budget of available key bits will be exhausted. In a…
▽ More
We consider a wireless communication system with a passive eavesdropper, in which a transmitter and legitimate receiver generate and use key bits to secure the transmission of their data. These bits are added to and used from a pool of available key bits. In this work, we analyze the reliability of the system in terms of the probability that the budget of available key bits will be exhausted. In addition, we investigate the latency before a transmission can take place. Since security, reliability, and latency are three important metrics for modern communication systems, it is of great interest to jointly analyze them in relation to the system parameters. In particular, we show under what conditions the system may remain in an active state indefinitely, i.e., never run out of available secret-key bits. The results presented in this work will allow system designers to adjust the system parameters in such a way that the requirements of the application in terms of both reliability and latency are met.
△ Less
Submitted 12 January, 2024; v1 submitted 5 April, 2023;
originally announced April 2023.
-
Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services
Authors:
Minrui Xu,
Hongyang Du,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Shiwen Mao,
Zhu Han,
Abbas Jamalipour,
Dong In Kim,
Xuemin Shen,
Victor C. M. Leung,
H. Vincent Poor
Abstract:
Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and customized AIGC services in real time while mainta…
▽ More
Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and customized AIGC services in real time while maintaining user privacy. We begin by introducing the background and fundamentals of generative models and the lifecycle of AIGC services at mobile AIGC networks, which includes data collection, training, finetuning, inference, and product management. We then discuss the collaborative cloud-edge-mobile infrastructure and technologies required to support AIGC services and enable users to access AIGC at mobile edge networks. Furthermore, we explore AIGCdriven creative applications and use cases for mobile AIGC networks. Additionally, we discuss the implementation, security, and privacy challenges of deploying mobile AIGC networks. Finally, we highlight some future research directions and open issues for the full realization of mobile AIGC networks.
△ Less
Submitted 31 October, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
A Survey on Model-based, Heuristic, and Machine Learning Optimization Approaches in RIS-aided Wireless Networks
Authors:
Hao Zhou,
Melike Erol-Kantarci,
Yuanwei Liu,
H. Vincent Poor
Abstract:
Reconfigurable intelligent surfaces (RISs) have received considerable attention as a key enabler for envisioned 6G networks, for the purpose of improving the network capacity, coverage, efficiency, and security with low energy consumption and low hardware cost. However, integrating RISs into the existing infrastructure greatly increases the network management complexity, especially for controlling…
▽ More
Reconfigurable intelligent surfaces (RISs) have received considerable attention as a key enabler for envisioned 6G networks, for the purpose of improving the network capacity, coverage, efficiency, and security with low energy consumption and low hardware cost. However, integrating RISs into the existing infrastructure greatly increases the network management complexity, especially for controlling a significant number of RIS elements. To unleash the full potential of RISs, efficient optimization approaches are of great importance. This work provides a comprehensive survey on optimization techniques for RIS-aided wireless communications, including model-based, heuristic, and machine learning (ML) algorithms. In particular, we first summarize the problem formulations in the literature with diverse objectives and constraints, e.g., sum-rate maximization, power minimization, and imperfect channel state information constraints. Then, we introduce model-based algorithms that have been used in the literature, such as alternating optimization, the majorization-minimization method, and successive convex approximation. Next, heuristic optimization is discussed, which applies heuristic rules for obtaining low-complexity solutions. Moreover, we present state-of-the-art ML algorithms and applications towards RISs, i.e., supervised and unsupervised learning, reinforcement learning, federated learning, graph learning, transfer learning, and hierarchical learning-based approaches. Model-based, heuristic, and ML approaches are compared in terms of stability, robustness, optimality and so on, providing a systematic understanding of these techniques. Finally, we highlight RIS-aided applications towards 6G networks and identify future challenges.
△ Less
Submitted 28 November, 2023; v1 submitted 24 March, 2023;
originally announced March 2023.
-
A New Design of CR-NOMA and Its Application to AoI Reduction
Authors:
Zhiguo Ding,
Octavia A. Dobre,
**zhi Fan,
H. Vincent Poor
Abstract:
The aim of this letter is to develop a new design of cognitive radio inspired non-orthogonal multiple access (CR-NOMA), which ensures that multiple new users can be supported without causing disruption to the legacy network. Analytical results are developed to characterize the statistical properties of the number of supported new users. The developed CRNOMA scheme is compatible to various communic…
▽ More
The aim of this letter is to develop a new design of cognitive radio inspired non-orthogonal multiple access (CR-NOMA), which ensures that multiple new users can be supported without causing disruption to the legacy network. Analytical results are developed to characterize the statistical properties of the number of supported new users. The developed CRNOMA scheme is compatible to various communication networks, because it can be implemented as a simple add-on. An example of using CR-NOMA as an add-on in time-division multiple access networks for age of information (AoI) reduction is illustrated, where analytical results are developed to demonstrate
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
Authors:
Yulong Wang,
Tong Sun,
Shenghong Li,
Xin Yuan,
Wei Ni,
Ekram Hossain,
H. Vincent Poor
Abstract:
Adversarial attacks and defenses in machine learning and deep neural network have been gaining significant attention due to the rapidly growing applications of deep learning in the Internet and relevant scenarios. This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques, with a focus on deep neural network-based classificati…
▽ More
Adversarial attacks and defenses in machine learning and deep neural network have been gaining significant attention due to the rapidly growing applications of deep learning in the Internet and relevant scenarios. This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques, with a focus on deep neural network-based classification models. Specifically, we conduct a comprehensive classification of recent adversarial attack methods and state-of-the-art adversarial defense techniques based on attack principles, and present them in visually appealing tables and tree diagrams. This is based on a rigorous evaluation of the existing works, including an analysis of their strengths and limitations. We also categorize the methods into counter-attack detection and robustness enhancement, with a specific focus on regularization-based methods for enhancing robustness. New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks, and a hierarchical classification of the latest defense methods is provided, highlighting the challenges of balancing training costs with performance, maintaining clean accuracy, overcoming the effect of gradient masking, and ensuring method transferability. At last, the lessons learned and open challenges are summarized with future research opportunities recommended.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
Next-Generation URLLC with Massive Devices: A Unified Semi-Blind Detection Framework for Sourced and Unsourced Random Access
Authors:
Malong Ke,
Zhen Gao,
Mingyu Zhou,
Dezhi Zheng,
Derrick Wing Kwan Ng,
H. Vincent Poor
Abstract:
This paper proposes a unified semi-blind detection framework for sourced and unsourced random access (RA), which enables next-generation ultra-reliable low-latency communications (URLLC) with massive devices. Specifically, the active devices transmit their uplink access signals in a grant-free manner to realize ultra-low access latency. Meanwhile, the base station aims to achieve ultra-reliable da…
▽ More
This paper proposes a unified semi-blind detection framework for sourced and unsourced random access (RA), which enables next-generation ultra-reliable low-latency communications (URLLC) with massive devices. Specifically, the active devices transmit their uplink access signals in a grant-free manner to realize ultra-low access latency. Meanwhile, the base station aims to achieve ultra-reliable data detection under severe inter-device interference without exploiting explicit channel state information (CSI). We first propose an efficient transmitter design, where a small amount of reference information (RI) is embedded in the access signal to resolve the inherent ambiguities incurred by the unknown CSI. At the receiver, we further develop a successive interference cancellation-based semi-blind detection scheme, where a bilinear generalized approximate message passing algorithm is utilized for joint channel and signal estimation (JCSE), while the embedded RI is exploited for ambiguity elimination. Particularly, a rank selection approach and a RI-aided initialization strategy are incorporated to reduce the algorithmic computational complexity and to enhance the JCSE reliability, respectively. Besides, four enabling techniques are integrated to satisfy the stringent latency and reliability requirements of massive URLLC. Numerical results demonstrate that the proposed semi-blind detection framework offers a better scalability-latency-reliability tradeoff than the state-of-the-art detection schemes dedicated to sourced or unsourced RA.
△ Less
Submitted 20 March, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
An Extended Model for Ecological Robustness to Capture Power System Resilience
Authors:
Hao Huang,
Katherine R. Davis,
H. Vincent Poor
Abstract:
The long-term resilient property of ecosystems has been quantified as ecological robustness (RECO) in terms of the energy transfer over food webs. The RECO of resilient ecosystems favors a balance of food webs' network efficiency and redundancy. By integrating RECO with power system constraints, the authors are able to optimize power systems' inherent resilience as ecosystems through network desig…
▽ More
The long-term resilient property of ecosystems has been quantified as ecological robustness (RECO) in terms of the energy transfer over food webs. The RECO of resilient ecosystems favors a balance of food webs' network efficiency and redundancy. By integrating RECO with power system constraints, the authors are able to optimize power systems' inherent resilience as ecosystems through network design and system operation. A previous model used on real power flows and aggregated redundant components for a rigorous map** between ecosystems and power systems. However, the reactive power flows also determine power systems resilience; and the power components' redundancy is part of the global network redundancy. These characteristics should be considered for RECO-oriented evaluation and optimization for power systems. Thus, this paper extends the model for quantifying RECO in power systems using real, reactive, and apparent power flows with the consideration of redundant placement of generators. Recalling the performance of RECO-oriented optimal power flows under N-x contingencies, the analyses suggest reactive power flows and redundant components should be included for RECO to capture power systems' inherent resilience.
△ Less
Submitted 1 October, 2023; v1 submitted 7 March, 2023;
originally announced March 2023.
-
Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning
Authors:
Xin Yuan,
Wei Ni,
Ming Ding,
Kang Wei,
Jun Li,
H. Vincent Poor
Abstract:
While preserving the privacy of federated learning (FL), differential privacy (DP) inevitably degrades the utility (i.e., accuracy) of FL due to model perturbations caused by DP noise added to model updates. Existing studies have considered exclusively noise with persistent root-mean-square amplitude and overlooked an opportunity of adjusting the amplitudes to alleviate the adverse effects of the…
▽ More
While preserving the privacy of federated learning (FL), differential privacy (DP) inevitably degrades the utility (i.e., accuracy) of FL due to model perturbations caused by DP noise added to model updates. Existing studies have considered exclusively noise with persistent root-mean-square amplitude and overlooked an opportunity of adjusting the amplitudes to alleviate the adverse effects of the noise. This paper presents a new DP perturbation mechanism with a time-varying noise amplitude to protect the privacy of FL and retain the capability of adjusting the learning performance. Specifically, we propose a geometric series form for the noise amplitude and reveal analytically the dependence of the series on the number of global aggregations and the $(ε,δ)$-DP requirement. We derive an online refinement of the series to prevent FL from premature convergence resulting from excessive perturbation noise. Another important aspect is an upper bound developed for the loss function of a multi-layer perceptron (MLP) trained by FL running the new DP mechanism. Accordingly, the optimal number of global aggregations is obtained, balancing the learning and privacy. Extensive experiments are conducted using MLP, supporting vector machine, and convolutional neural network models on four public datasets. The contribution of the new DP mechanism to the convergence and accuracy of privacy-preserving FL is corroborated, compared to the state-of-the-art Gaussian noise mechanism with a persistent noise amplitude.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.
-
Challenges and Opportunities for Beyond-5G Wireless Security
Authors:
Eric Ruzomberka,
David J. Love,
Christopher G. Brinton,
Arpit Gupta,
Chih-Chun Wang,
H. Vincent Poor
Abstract:
The demand for broadband wireless access is driving research and standardization of 5G and beyond-5G wireless systems. In this paper, we aim to identify emerging security challenges for these wireless systems and pose multiple research areas to address these challenges.
The demand for broadband wireless access is driving research and standardization of 5G and beyond-5G wireless systems. In this paper, we aim to identify emerging security challenges for these wireless systems and pose multiple research areas to address these challenges.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Collaborative Mean Estimation over Intermittently Connected Networks with Peer-To-Peer Privacy
Authors:
Rajarshi Saha,
Mohamed Seif,
Michal Yemini,
Andrea J. Goldsmith,
H. Vincent Poor
Abstract:
This work considers the problem of Distributed Mean Estimation (DME) over networks with intermittent connectivity, where the goal is to learn a global statistic over the data samples localized across distributed nodes with the help of a central server. To mitigate the impact of intermittent links, nodes can collaborate with their neighbors to compute local consensus which they forward to the centr…
▽ More
This work considers the problem of Distributed Mean Estimation (DME) over networks with intermittent connectivity, where the goal is to learn a global statistic over the data samples localized across distributed nodes with the help of a central server. To mitigate the impact of intermittent links, nodes can collaborate with their neighbors to compute local consensus which they forward to the central server. In such a setup, the communications between any pair of nodes must satisfy local differential privacy constraints. We study the tradeoff between collaborative relaying and privacy leakage due to the additional data sharing among nodes and, subsequently, propose a novel differentially private collaborative algorithm for DME to achieve the optimal tradeoff. Finally, we present numerical simulations to substantiate our theoretical findings.
△ Less
Submitted 28 February, 2023;
originally announced March 2023.
-
On the Road to 6G: Visions, Requirements, Key Technologies and Testbeds
Authors:
Cheng-Xiang Wang,
Xiaohu You,
Xiqi Gao,
Xiuming Zhu,
Zixin Li,
Chuan Zhang,
Haiming Wang,
Yongming Huang,
Yunfei Chen,
Harald Haas,
John S. Thompson,
Erik G. Larsson,
Marco Di Renzo,
Wen Tong,
Peiying Zhu,
Xuemin,
Shen,
H. Vincent Poor,
Lajos Hanzo
Abstract:
Fifth generation (5G) mobile communication systems have entered the stage of commercial development, providing users with new services and improved user experiences as well as offering a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on s…
▽ More
Fifth generation (5G) mobile communication systems have entered the stage of commercial development, providing users with new services and improved user experiences as well as offering a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation (6G) wireless communication systems. A series of white papers and survey papers have been published, which aim to define 6G in terms of requirements, application scenarios, key technologies, etc. Although ITU-R has been working on the 6G vision and it is expected to reach a consensus on what 6G will be by mid-2023, the related global discussions are still wide open and the existing literature has identified numerous open issues. This paper first provides a comprehensive portrayal of the 6G vision, technical requirements, and application scenarios, covering the current common understanding of 6G. Then, a critical appraisal of the 6G network architecture and key technologies is presented. Furthermore, existing testbeds and advanced 6G verification platforms are detailed for the first time. In addition, future research directions and open challenges are identified for stimulating the on-going global debate. Finally, lessons learned to date concerning 6G networks are discussed.
△ Less
Submitted 28 February, 2023;
originally announced February 2023.
-
Quickest Inference of Susceptible-Infected Cascades in Sparse Networks
Authors:
Anirudh Sridhar,
Tirza Routtenberg,
H. Vincent Poor
Abstract:
We consider the task of estimating a network cascade as fast as possible. The cascade is assumed to spread according to a general Susceptible-Infected process with heterogeneous transmission rates from an unknown source in the network. While the propagation is not directly observable, noisy information about its spread can be gathered through multiple rounds of error-prone diagnostic testing. We p…
▽ More
We consider the task of estimating a network cascade as fast as possible. The cascade is assumed to spread according to a general Susceptible-Infected process with heterogeneous transmission rates from an unknown source in the network. While the propagation is not directly observable, noisy information about its spread can be gathered through multiple rounds of error-prone diagnostic testing. We propose a novel adaptive procedure which quickly outputs an estimate for the cascade source and the full spread under this observation model. Remarkably, under mild conditions on the network topology, our procedure is able to estimate the full spread of the cascade in an $n$-vertex network, before $\mathrm{poly log}(n)$ vertices are affected by the cascade. We complement our theoretical analysis with simulation results illustrating the effectiveness of our methods.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
On the Tacit Linearity Assumption in Common Cascaded Models of RIS-Parametrized Wireless Channels
Authors:
Antonin Rabault,
Luc Le Magoarou,
Jérôme Sol,
George C. Alexandropoulos,
Nir Shlezinger,
H. Vincent Poor,
Philipp del Hougne
Abstract:
We analytically derive from first physical principles the functional dependence of wireless channels on the RIS configuration for generic (i.e., potentially complex-scattering) RIS-parametrized radio environments. The wireless channel is a linear input-output relation that depends non-linearly on the RIS configuration because of two independent mechanisms: i) proximity-induced mutual coupling betw…
▽ More
We analytically derive from first physical principles the functional dependence of wireless channels on the RIS configuration for generic (i.e., potentially complex-scattering) RIS-parametrized radio environments. The wireless channel is a linear input-output relation that depends non-linearly on the RIS configuration because of two independent mechanisms: i) proximity-induced mutual coupling between close-by RIS elements; ii) reverberation-induced long-range coupling between all RIS elements. Mathematically, this "structural" non-linearity originates from the inversion of an "interaction" matrix that can be cast as the sum of an infinite Born series [for i)] or Born-like series [for ii)] whose $K$th term physically represents paths involving $K$ bounces between the RIS elements [for i)] or wireless entities [for ii)]. We identify the key physical parameters that determine whether these series can be truncated after the first and second term, respectively, as tacitly done in common cascaded models of RIS-parametrized wireless channels. Numerical results obtained with the physics-compliant PhysFad model and experimental results obtained with a RIS prototype in an anechoic (echo-free) chamber and rich-scattering reverberation chambers corroborate our analysis. Our findings raise doubts about the reliability of existing performance analysis and channel-estimation protocols for cases in which cascaded models poorly describe the physical reality.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Fast Computation of Optimal Transport via Entropy-Regularized Extragradient Methods
Authors:
Gen Li,
Yanxi Chen,
Yu Huang,
Yuejie Chi,
H. Vincent Poor,
Yuxin Chen
Abstract:
Efficient computation of the optimal transport distance between two distributions serves as an algorithm subroutine that empowers various applications. This paper develops a scalable first-order optimization-based method that computes optimal transport to within $\varepsilon$ additive accuracy with runtime $\widetilde{O}( n^2/\varepsilon)$, where $n$ denotes the dimension of the probability distri…
▽ More
Efficient computation of the optimal transport distance between two distributions serves as an algorithm subroutine that empowers various applications. This paper develops a scalable first-order optimization-based method that computes optimal transport to within $\varepsilon$ additive accuracy with runtime $\widetilde{O}( n^2/\varepsilon)$, where $n$ denotes the dimension of the probability distributions of interest. Our algorithm achieves the state-of-the-art computational guarantees among all first-order methods, while exhibiting favorable numerical performance compared to classical algorithms like Sinkhorn and Greenkhorn. Underlying our algorithm designs are two key elements: (a) converting the original problem into a bilinear minimax problem over probability distributions; (b) exploiting the extragradient idea -- in conjunction with entropy regularization and adaptive learning rates -- to accelerate convergence.
△ Less
Submitted 20 June, 2024; v1 submitted 30 January, 2023;
originally announced January 2023.
-
Adversarial Learning for Implicit Semantic-Aware Communications
Authors:
Zhimin Lu,
Yong Xiao,
Zijian Sun,
Yingyu Li,
Guangming Shi,
Xianfu Chen,
Mehdi Bennis,
H. Vincent Poor
Abstract:
Semantic communication is a novel communication paradigm that focuses on recognizing and delivering the desired meaning of messages to the destination users. Most existing works in this area focus on delivering explicit semantics, labels or signal features that can be directly identified from the source signals. In this paper, we consider the implicit semantic communication problem in which hidden…
▽ More
Semantic communication is a novel communication paradigm that focuses on recognizing and delivering the desired meaning of messages to the destination users. Most existing works in this area focus on delivering explicit semantics, labels or signal features that can be directly identified from the source signals. In this paper, we consider the implicit semantic communication problem in which hidden relations and closely related semantic terms that cannot be recognized from the source signals need to also be delivered to the destination user. We develop a novel adversarial learning-based implicit semantic-aware communication (iSAC) architecture in which the source user, instead of maximizing the total amount of information transmitted to the channel, aims to help the recipient learn an inference rule that can automatically generate implicit semantics based on limited clue information. We prove that by applying iSAC, the destination user can always learn an inference rule that matches the true inference rule of the source messages. Experimental results show that the proposed iSAC can offer up to a 19.69 dB improvement over existing non-inferential communication solutions, in terms of symbol error rate at the destination user.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Towards 6G Hyper-Connectivity: Vision, Challenges, and Key Enabling Technologies
Authors:
Howon Lee,
Byungju Lee,
Heecheol Yang,
Junghyun Kim,
Seungnyun Kim,
Wonjae Shin,
Byonghyo Shim,
H. Vincent Poor
Abstract:
Technology forecasts anticipate a new era in which massive numbers of humans, machines, and things are connected to wireless networks to sense, process, act, and communicate with the surrounding environment in a real-time manner. To make the visions come true, the sixth generation (6G) wireless networks should be hyper-connected, implying that there are no constraints on the data rate, coverage, a…
▽ More
Technology forecasts anticipate a new era in which massive numbers of humans, machines, and things are connected to wireless networks to sense, process, act, and communicate with the surrounding environment in a real-time manner. To make the visions come true, the sixth generation (6G) wireless networks should be hyper-connected, implying that there are no constraints on the data rate, coverage, and computing. In this article, we first identify the main challenges for 6G hyper-connectivity, including terabits-per-second (Tbps) data rates for immersive user experiences, zero coverage-hole networks, and pervasive computing for connected intelligence. To overcome these challenges, we highlight key enabling technologies for 6G such as distributed and intelligence-aware cell-free massive multi-input multioutput (MIMO) networks, boundless and fully integrated terrestrial and non-terrestrial networks, and communication-aware distributed computing for computation-intensive applications. We further illustrate and discuss the hyper-connected 6G network architecture along with open issues and future research directions.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Active RISs: Signal Modeling, Asymptotic Analysis, and Beamforming Design
Authors:
Zijian Zhang,
Linglong Dai,
Xibi Chen,
Changhao Liu,
Fan Yang,
Robert Schober,
H. Vincent Poor
Abstract:
Reconfigurable intelligent surfaces (RISs) have emerged as a candidate technology for future 6G networks. However, due to the "multiplicative fading" effect, the existing passive RISs only achieve a negligible capacity gain in environments with strong direct links. In this paper, the concept of active RISs is studied to overcome this fundamental limitation. Unlike the existing passive RISs that re…
▽ More
Reconfigurable intelligent surfaces (RISs) have emerged as a candidate technology for future 6G networks. However, due to the "multiplicative fading" effect, the existing passive RISs only achieve a negligible capacity gain in environments with strong direct links. In this paper, the concept of active RISs is studied to overcome this fundamental limitation. Unlike the existing passive RISs that reflect signals without amplification, active RISs can amplify the reflected signals via amplifiers integrated into their elements. To characterize the signal amplification and incorporate the noise introduced by the active components, we verify the signal model of active RISs through the experimental measurements on a fabricated active RIS element. Based on the verified signal model, we formulate the sum-rate maximization problem for an active RIS aided multi-user multiple-input single-output (MU-MISO) system and a joint transmit precoding and reflect beamforming algorithm is proposed to solve this problem. Simulation results show that, in a typical wireless system, the existing passive RISs can realize only a negligible sum-rate gain of 3%, while the active RISs can achieve a significant sum-rate gain of 62%, thus overcoming the "multiplicative fading" effect. Finally, we develop a 64-element active RIS aided wireless communication prototype, and the significant gain of active RISs is validated by field test.
△ Less
Submitted 31 December, 2022;
originally announced January 2023.
-
Knowledge Transfer and Reuse: A Case Study of AI-enabled Resource Management in RAN Slicing
Authors:
Hao Zhou,
Melike Erol-Kantarci,
Vincent Poor
Abstract:
An efficient resource management scheme is critical to enable network slicing in 5G networks and in envisioned 6G networks, and artificial intelligence (AI) techniques offer promising solutions. Considering the rapidly emerging new machine learning techniques, such as graph learning, federated learning, and transfer learning, a timely survey is needed to provide an overview of resource management…
▽ More
An efficient resource management scheme is critical to enable network slicing in 5G networks and in envisioned 6G networks, and artificial intelligence (AI) techniques offer promising solutions. Considering the rapidly emerging new machine learning techniques, such as graph learning, federated learning, and transfer learning, a timely survey is needed to provide an overview of resource management and network slicing techniques of AI-enabled wireless networks. This article provides such a survey along with an application of knowledge transfer in radio access network (RAN) slicing. In particular, we firs provide some background on resource management and network slicing, and review relevant state-of-the-art AI and machine learning (ML) techniques and their applications. Then, we introduce our AI-enabled knowledge transfer and reuse-based resource management (AKRM) scheme, where we apply transfer learning to improve system performance. Compared with most existing works, which focus on the training of standalone agents from scratch, the main difference of AKRM lies in its knowledge transfer and reuse capability between different tasks. Our paper aims to be a roadmap for researchers to use knowledge transfer schemes in AI-enabled wireless networks, and we provide a case study over the resource allocation problem in RAN slicing.
△ Less
Submitted 18 December, 2022;
originally announced December 2022.
-
Electromagnetic Information Theory: Fundamentals, Modeling, Applications, and Open Problems
Authors:
Jieao Zhu,
Zhongzhichao Wan,
Linglong Dai,
Mérouane Debbah,
H. Vincent Poor
Abstract:
Traditional massive multiple-input multiple-output (MIMO) information theory adopt non-physically consistent assumptions, including white-noised, scalar-quantity, far-field, discretized, and monochromatic EM fields, which mismatch the nature of the underlying electromagnetic (EM) fields supporting the physical layer of wireless communication systems. To incorporate EM laws into designing procedure…
▽ More
Traditional massive multiple-input multiple-output (MIMO) information theory adopt non-physically consistent assumptions, including white-noised, scalar-quantity, far-field, discretized, and monochromatic EM fields, which mismatch the nature of the underlying electromagnetic (EM) fields supporting the physical layer of wireless communication systems. To incorporate EM laws into designing procedures of the physical layer, we first propose the novel concept of EM physical layer, whose backbone theory is called EM information theory (EIT). In this article, we systematically investigate the basic ideas and main results of EIT. First, we review the fundamental analytical tools of classical information theory and EM theory. Then, we introduce the modeling and analysis methodologies of EIT, including continuous field modeling, degrees of freedom, and mutual information analyses. Several EIT-inspired applications are discussed to illustrate how EIT guides the design of practical wireless systems. Finally, we point out the open problems of EIT, where further research efforts are required for EIT to construct a unified interdisciplinary theory.
△ Less
Submitted 26 June, 2023; v1 submitted 6 December, 2022;
originally announced December 2022.
-
Holographic MIMO Communications: Theoretical Foundations, Enabling Technologies, and Future Directions
Authors:
Tierui Gong,
Panagiotis Gavriilidis,
Ran Ji,
Chongwen Huang,
George C. Alexandropoulos,
Li Wei,
Zhaoyang Zhang,
Mérouane Debbah,
H. Vincent Poor,
Chau Yuen
Abstract:
Future wireless systems are envisioned to create an endogenously holography-capable, intelligent, and programmable radio propagation environment, that will offer unprecedented capabilities for high spectral and energy efficiency, low latency, and massive connectivity. A potential and promising technology for supporting the expected extreme requirements of the sixth-generation (6G) communication sy…
▽ More
Future wireless systems are envisioned to create an endogenously holography-capable, intelligent, and programmable radio propagation environment, that will offer unprecedented capabilities for high spectral and energy efficiency, low latency, and massive connectivity. A potential and promising technology for supporting the expected extreme requirements of the sixth-generation (6G) communication systems is the concept of the holographic multiple-input multiple-output (HMIMO), which will actualize holographic radios with reasonable power consumption and fabrication cost. The HMIMO is facilitated by ultra-thin, extremely large, and nearly continuous surfaces that incorporate reconfigurable and sub-wavelength-spaced antennas and/or metamaterials. Such surfaces comprising dense electromagnetic (EM) excited elements are capable of recording and manipulating im**ing fields with utmost flexibility and precision, as well as with reduced cost and power consumption, thereby sha** arbitrary-intended EM waves with high energy efficiency. The powerful EM processing capability of HMIMO opens up the possibility of wireless communications of holographic imaging level, paving the way for signal processing techniques realized in the EM-domain, possibly in conjunction with their digital-domain counterparts. However, in spite of the significant potential, the studies on HMIMO communications are still at an initial stage, its fundamental limits remain to be unveiled, and a certain number of critical technical challenges need to be addressed. In this survey, we present a comprehensive overview of the latest advances in the HMIMO communications paradigm, with a special focus on their physical aspects, their theoretical foundations, as well as the enabling technologies for HMIMO systems. We also compare the HMIMO with existing multi-antenna technologies, especially the massive MIMO, present various...
△ Less
Submitted 28 August, 2023; v1 submitted 2 December, 2022;
originally announced December 2022.
-
What Physical Layer Security Can Do for 6G Security
Authors:
Miroslav Mitev,
Arsenia Chorti,
H. V. Poor,
Gerhard Fettweis
Abstract:
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, s…
▽ More
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, starting at the physical layer, is not only viable in 6G but importantly, arises as an efficient way to overcome security hurdles in novel use cases, notably massive machine type communications (mMTC), ultra reliable low latency communications (URLLC) and autonomous cyberphysical systems. Unlike existing review papers that treat physical layer security orthogonally to cryptography, we will try to provide a few insights of underlying connections. Discussing many practical issues, we will present a comprehensive review of the state-of-the-art in i) secret key generation from shared randomness, ii) the wiretap channel and fundamental limits, iii) authentication of devices using physical unclonable functions (PUFs), localization and multi-factor authentication, and, iv) jamming attacks at the physical layer. We finally conclude with the proposers' aspirations for the 6G security landscape, in the hyper-connectivity and semantic communications era.
△ Less
Submitted 1 December, 2022;
originally announced December 2022.
-
Less Data, More Knowledge: Building Next Generation Semantic Communication Networks
Authors:
Christina Chaccour,
Walid Saad,
Merouane Debbah,
Zhu Han,
H. Vincent Poor
Abstract:
Semantic communication is viewed as a revolutionary paradigm that can potentially transform how we design and operate wireless communication systems. However, despite a recent surge of research activities in this area, the research landscape remains limited. In this tutorial, we present the first rigorous vision of a scalable end-to-end semantic communication network that is founded on novel conce…
▽ More
Semantic communication is viewed as a revolutionary paradigm that can potentially transform how we design and operate wireless communication systems. However, despite a recent surge of research activities in this area, the research landscape remains limited. In this tutorial, we present the first rigorous vision of a scalable end-to-end semantic communication network that is founded on novel concepts from artificial intelligence (AI), causal reasoning, and communication theory. We first discuss how the design of semantic communication networks requires a move from data-driven networks towards knowledge-driven ones. Subsequently, we highlight the necessity of creating semantic representations of data that satisfy the key properties of minimalism, generalizability, and efficiency so as to do more with less. We then explain how those representations can form the basis a so-called semantic language. By using semantic representation and languages, we show that the traditional transmitter and receiver now become a teacher and apprentice. Then, we define the concept of reasoning by investigating the fundamentals of causal representation learning and their role in designing semantic communication networks. We demonstrate that reasoning faculties are majorly characterized by the ability to capture causal and associational relationships in datastreams. For such reasoning-driven networks, we propose novel and essential semantic communication metrics that include new "reasoning capacity" measures that could go beyond Shannon's bound to capture the convergence of computing and communication. Finally, we explain how semantic communications can be scaled to large-scale networks (6G and beyond). In a nutshell, we expect this tutorial to provide a comprehensive reference on how to properly build, analyze, and deploy future semantic communication networks.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
Impact of NOMA on Age of Information: A Grant-Free Transmission Perspective
Authors:
Z. Ding,
R. Schober,
H. V. Poor
Abstract:
The aim of this paper is to characterize the impact of non-orthogonal multiple access (NOMA) on the age of information (AoI) of grant-free transmission. In particular, a low-complexity form of NOMA, termed NOMA-assisted random access, is applied to grant-free transmission in order to illustrate the two benefits of NOMA for AoI reduction, namely increasing channel access and reducing user collision…
▽ More
The aim of this paper is to characterize the impact of non-orthogonal multiple access (NOMA) on the age of information (AoI) of grant-free transmission. In particular, a low-complexity form of NOMA, termed NOMA-assisted random access, is applied to grant-free transmission in order to illustrate the two benefits of NOMA for AoI reduction, namely increasing channel access and reducing user collisions. Closed-form analytical expressions for the AoI achieved by NOMA assisted grant-free transmission are obtained, and asymptotic studies are carried out to demonstrate that the use of the simplest form of NOMA is already sufficient to reduce the AoI of orthogonal multiple access (OMA) by more than 40%. In addition, the developed analytical expressions are also shown to be useful for optimizing the users' transmission attempt probabilities, which are key parameters for grant-free transmission.
△ Less
Submitted 3 May, 2023; v1 submitted 24 November, 2022;
originally announced November 2022.
-
Impact of Channel Models on Performance Characterization of RIS-Assisted Wireless Systems
Authors:
Vahid Jamali,
Walid Ghanem,
Robert Schober,
H. Vincent Poor
Abstract:
The performance characterization of communication systems assisted by large reconfigurable intelligent surfaces (RISs) significantly depends on the adopted models for the underlying channels. Under unrealistic channel models, the system performance may be over- or under-estimated which yields inaccurate conclusions for the system design. In this paper, we review five channel models that are chosen…
▽ More
The performance characterization of communication systems assisted by large reconfigurable intelligent surfaces (RISs) significantly depends on the adopted models for the underlying channels. Under unrealistic channel models, the system performance may be over- or under-estimated which yields inaccurate conclusions for the system design. In this paper, we review five channel models that are chosen to progressively improve the modeling accuracy for large RISs. For each channel model, we highlight the underlying assumptions, its advantages, and its limitations. We compare the system performance under the aforementioned channel models using RIS configuration algorithms from the literature and a new scalable algorithm proposed in this paper specifically for the configuration of extremely large RISs.
△ Less
Submitted 17 January, 2023; v1 submitted 16 October, 2022;
originally announced November 2022.
-
Deep Reinforcement Learning for IRS Phase Shift Design in Spatiotemporally Correlated Environments
Authors:
Spilios Evmorfos,
Athina P. Petropulu,
H. Vincent Poor
Abstract:
The paper studies the problem of designing the Intelligent Reflecting Surface (IRS) phase shifters for Multiple Input Single Output (MISO) communication systems in spatiotemporally correlated channel environments, where the destination can move within a confined area. The objective is to maximize the expected sum of SNRs at the receiver over infinite time horizons. The problem formulation gives ri…
▽ More
The paper studies the problem of designing the Intelligent Reflecting Surface (IRS) phase shifters for Multiple Input Single Output (MISO) communication systems in spatiotemporally correlated channel environments, where the destination can move within a confined area. The objective is to maximize the expected sum of SNRs at the receiver over infinite time horizons. The problem formulation gives rise to a Markov Decision Process (MDP). We propose a deep actor-critic algorithm that accounts for channel correlations and destination motion by constructing the state representation to include the current position of the receiver and the phase shift values and receiver positions that correspond to a window of previous time steps. The channel variability induces high frequency components on the spectrum of the underlying value function. We propose the preprocessing of the critic's input with a Fourier kernel which enables stable value learning. Finally, we investigate the use of the destination SNR as a component of the designed MDP state, which is common practice in previous work. We provide empirical evidence that, when the channels are spatiotemporally correlated, the inclusion of the SNR in the state representation interacts with function approximation in ways that inhibit convergence.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
Information-Energy Regions in the Finite Block-Length Regime with Finite Channel Inputs
Authors:
Sadaf Ul Zuhra,
Samir M. Perlaza,
H. Vincent Poor,
Mikael Skoglund
Abstract:
This paper characterizes the trade-offs between information and energy transmission over an additive white Gaussian noise channel in the finite block-length regime with finite sets of channel input symbols. These trade-offs are characterized using impossibility and achievability bounds on the information transmission rate, energy transmission rate, decoding error probability (DEP) and energy outag…
▽ More
This paper characterizes the trade-offs between information and energy transmission over an additive white Gaussian noise channel in the finite block-length regime with finite sets of channel input symbols. These trade-offs are characterized using impossibility and achievability bounds on the information transmission rate, energy transmission rate, decoding error probability (DEP) and energy outage probability (EOP) for a finite block-length code. Given a set of channel input symbols, the impossibility results identify the tuples of information rate, energy rate, DEP and EOP that cannot be achieved by any code using the given set of channel inputs. A novel method for constructing a family of codes that satisfy a target information rate, energy rate, DEP and EOP is also proposed. The achievability bounds identify the set of tuples of information rate, energy rate, DEP and EOP that can be simultaneously achieved by the constructed family of codes. The proposed construction matches the impossibility bounds for the information rate, energy rate, and the EOP. However, for a given information rate, energy rate and EOP, the achieved DEP is higher than the impossibility bound due to the choice of the decoding sets made during the code construction.
△ Less
Submitted 24 May, 2023; v1 submitted 10 November, 2022;
originally announced November 2022.
-
DeepTrace: Learning to Optimize Contact Tracing in Epidemic Networks with Graph Neural Networks
Authors:
Chee Wei Tan,
Pei-Duo Yu,
Siya Chen,
H. Vincent Poor
Abstract:
Digital contact tracing aims to curb epidemics by identifying and mitigating public health emergencies through technology. Backward contact tracing, which tracks the sources of infection, proved crucial in places like Japan for identifying COVID-19 infections from superspreading events. This paper presents a novel perspective of digital contact tracing as online graph exploration and addresses the…
▽ More
Digital contact tracing aims to curb epidemics by identifying and mitigating public health emergencies through technology. Backward contact tracing, which tracks the sources of infection, proved crucial in places like Japan for identifying COVID-19 infections from superspreading events. This paper presents a novel perspective of digital contact tracing as online graph exploration and addresses the forward and backward contact tracing problem as a maximum-likelihood (ML) estimation problem using iterative epidemic network data sampling. The challenge lies in the combinatorial complexity and rapid spread of infections. We introduce DeepTrace, an algorithm based on a Graph Neural Network (GNN) that iteratively updates its estimations as new contact tracing data is collected, learning to optimize the maximum likelihood estimation by utilizing topological features to accelerate learning and improve convergence. The contact tracing process combines either BFS or DFS to expand the network and trace the infection source, ensuring comprehensive and efficient exploration. Additionally, the GNN model is fine-tuned through a two-phase approach: pre-training with synthetic networks to approximate likelihood probabilities and fine-tuning with high-quality data to refine the model. Using COVID-19 variant data, we illustrate that DeepTrace surpasses current methods in identifying superspreaders, providing a robust basis for a scalable digital contact tracing strategy.
△ Less
Submitted 24 June, 2024; v1 submitted 2 November, 2022;
originally announced November 2022.