-
A Dimensionality Reduction Method for Finding Least Favorable Priors with a Focus on Bregman Divergence
Authors:
Alex Dytso,
Mario Goldenbaum,
H. Vincent Poor,
Shlomo Shamai
Abstract:
A common way of characterizing minimax estimators in point estimation is by moving the problem into the Bayesian estimation domain and finding a least favorable prior distribution. The Bayesian estimator induced by a least favorable prior, under mild conditions, is then known to be minimax. However, finding least favorable distributions can be challenging due to inherent optimization over the spac…
▽ More
A common way of characterizing minimax estimators in point estimation is by moving the problem into the Bayesian estimation domain and finding a least favorable prior distribution. The Bayesian estimator induced by a least favorable prior, under mild conditions, is then known to be minimax. However, finding least favorable distributions can be challenging due to inherent optimization over the space of probability distributions, which is infinite-dimensional. This paper develops a dimensionality reduction method that allows us to move the optimization to a finite-dimensional setting with an explicit bound on the dimension. The benefit of this dimensionality reduction is that it permits the use of popular algorithms such as projected gradient ascent to find least favorable priors. Throughout the paper, in order to make progress on the problem, we restrict ourselves to Bayesian risks induced by a relatively large class of loss functions, namely Bregman divergences.
△ Less
Submitted 23 February, 2022;
originally announced February 2022.
-
Trusted AI in Multi-agent Systems: An Overview of Privacy and Security for Distributed Learning
Authors:
Chuan Ma,
Jun Li,
Kang Wei,
Bo Liu,
Ming Ding,
Long Yuan,
Zhu Han,
H. Vincent Poor
Abstract:
Motivated by the advancing computational capacity of distributed end-user equipments (UEs), as well as the increasing concerns about sharing private data, there has been considerable recent interest in machine learning (ML) and artificial intelligence (AI) that can be processed on on distributed UEs. Specifically, in this paradigm, parts of an ML process are outsourced to multiple distributed UEs,…
▽ More
Motivated by the advancing computational capacity of distributed end-user equipments (UEs), as well as the increasing concerns about sharing private data, there has been considerable recent interest in machine learning (ML) and artificial intelligence (AI) that can be processed on on distributed UEs. Specifically, in this paradigm, parts of an ML process are outsourced to multiple distributed UEs, and then the processed ML information is aggregated on a certain level at a central server, which turns a centralized ML process into a distributed one, and brings about significant benefits. However, this new distributed ML paradigm raises new risks of privacy and security issues. In this paper, we provide a survey of the emerging security and privacy risks of distributed ML from a unique perspective of information exchange levels, which are defined according to the key steps of an ML process, i.e.: i) the level of preprocessed data, ii) the level of learning models, iii) the level of extracted knowledge and, iv) the level of intermediate results. We explore and analyze the potential of threats for each information exchange level based on an overview of the current state-of-the-art attack mechanisms, and then discuss the possible defense methods against such threats. Finally, we complete the survey by providing an outlook on the challenges and possible directions for future research in this critical area.
△ Less
Submitted 9 August, 2023; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Federated Stochastic Gradient Descent Begets Self-Induced Momentum
Authors:
Howard H. Yang,
Zuozhu Liu,
Yaru Fu,
Tony Q. S. Quek,
H. Vincent Poor
Abstract:
Federated learning (FL) is an emerging machine learning method that can be applied in mobile edge systems, in which a server and a host of clients collaboratively train a statistical model utilizing the data and computation resources of the clients without directly exposing their privacy-sensitive data. We show that running stochastic gradient descent (SGD) in such a setting can be viewed as addin…
▽ More
Federated learning (FL) is an emerging machine learning method that can be applied in mobile edge systems, in which a server and a host of clients collaboratively train a statistical model utilizing the data and computation resources of the clients without directly exposing their privacy-sensitive data. We show that running stochastic gradient descent (SGD) in such a setting can be viewed as adding a momentum-like term to the global aggregation process. Based on this finding, we further analyze the convergence rate of a federated learning system by accounting for the effects of parameter staleness and communication resources. These results advance the understanding of the Federated SGD algorithm, and also forges a link between staleness analysis and federated computing systems, which can be useful for systems designers.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Entanglement-assisted concatenated quantum codes
Authors:
Jihao Fan,
Jun Li,
Yongbin Zhou,
Min-Hsiu Hsieh,
H. Vincent Poor
Abstract:
Entanglement-assisted concatenated quantum codes (EACQCs), constructed by concatenating two quantum codes, are proposed. These EACQCs show several advantages over the standard concatenated quantum codes (CQCs). Several families of EACQCs that, unlike standard CQCs, can beat the nondegenerate Hamming bound for entanglement-assisted quantum error correction codes (EAQECCs) are derived. Further, a nu…
▽ More
Entanglement-assisted concatenated quantum codes (EACQCs), constructed by concatenating two quantum codes, are proposed. These EACQCs show several advantages over the standard concatenated quantum codes (CQCs). Several families of EACQCs that, unlike standard CQCs, can beat the nondegenerate Hamming bound for entanglement-assisted quantum error correction codes (EAQECCs) are derived. Further, a number of EACQCs with better parameters than the best known standard quantum error correction codes (QECCs) and EAQECCs are also derived. In particular, several catalytic EACQCs with better parameters than the best known QECCs of the same length and net transmission are constructed. Furthermore, each catalytic EACQC consumes only one or two ebits. It is also shown that EACQCs make entanglement-assisted quantum communication possible even if the ebits are noisy. Finally, it is shown that EACQCs can outperform CQCs in entanglement fidelity over depolarizing channels if the ebits are less noisy than the qubits. Moreover, the threshold error probability of EACQCs is larger than that of CQCs when the error probability of ebits is sufficiently lower than that of qubits. Therefore EACQCs are not only competitive in quantum communication but also applicable in fault-tolerant quantum computation.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Achievable Information-Energy Region in the Finite Block-Length Regime with Finite Constellations
Authors:
Sadaf ul Zuhra,
Samir M. Perlaza,
H. Vincent Poor,
Eitan Altman
Abstract:
This paper characterizes an achievable information-energy region of simultaneous information and energy transmission over an additive white Gaussian noise channel. This analysis is performed in the finite block-length regime with finite constellations. More specifically, a method for constructing a family of codes is proposed and the set of achievable tuples of information rate, energy rate, decod…
▽ More
This paper characterizes an achievable information-energy region of simultaneous information and energy transmission over an additive white Gaussian noise channel. This analysis is performed in the finite block-length regime with finite constellations. More specifically, a method for constructing a family of codes is proposed and the set of achievable tuples of information rate, energy rate, decoding error probability (DEP) and energy outage probability (EOP) is characterized. Using existing converse results, it is shown that the construction is information rate, energy rate, and EOP optimal. The achieved DEP is, however, sub-optimal.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Improved Information Theoretic Generalization Bounds for Distributed and Federated Learning
Authors:
L. P. Barnes,
Alex Dytso,
H. V. Poor
Abstract:
We consider information-theoretic bounds on expected generalization error for statistical learning problems in a networked setting. In this setting, there are $K$ nodes, each with its own independent dataset, and the models from each node have to be aggregated into a final centralized model. We consider both simple averaging of the models as well as more complicated multi-round algorithms. We give…
▽ More
We consider information-theoretic bounds on expected generalization error for statistical learning problems in a networked setting. In this setting, there are $K$ nodes, each with its own independent dataset, and the models from each node have to be aggregated into a final centralized model. We consider both simple averaging of the models as well as more complicated multi-round algorithms. We give upper bounds on the expected generalization error for a variety of problems, such as those with Bregman divergence or Lipschitz continuous losses, that demonstrate an improved dependence of $1/K$ on the number of nodes. These "per node" bounds are in terms of the mutual information between the training dataset and the trained weights at each node, and are therefore useful in describing the generalization properties inherent to having communication or privacy constraints at each node.
△ Less
Submitted 15 January, 2024; v1 submitted 4 February, 2022;
originally announced February 2022.
-
Reasoning on the Air: An Implicit Semantic Communication Architecture
Authors:
Yong Xiao,
Yingyu Li,
Guangming Shi,
H. Vincent Poor
Abstract:
Semantic communication is a novel communication paradigm which draws inspiration from human communication focusing on the delivery of the meaning of a message to the intended users. It has attracted significant interest recently due to its potential to improve efficiency and reliability of communication, enhance users' quality-of-experience (QoE), and achieve smoother cross-protocol/domain communi…
▽ More
Semantic communication is a novel communication paradigm which draws inspiration from human communication focusing on the delivery of the meaning of a message to the intended users. It has attracted significant interest recently due to its potential to improve efficiency and reliability of communication, enhance users' quality-of-experience (QoE), and achieve smoother cross-protocol/domain communication. Most existing works in semantic communication focus on identifying and transmitting explicit semantic meaning, e.g., labels of objects, that can be directly identified from the source signal. This paper investigates implicit semantic communication in which the hidden information, e.g., implicit causality and reasoning mechanisms of users, that cannot be directly observed from the source signal needs to be transported and delivered to the intended users. We propose a novel implicit semantic communication (iSC) architecture for representing, communicating, and interpreting the implicit semantic meaning. In particular, we first propose a graph-inspired structure to represent implicit meaning of message based on three key components: entity, relation, and reasoning mechanism. We then propose a generative adversarial imitation learning-based reasoning mechanism learning (GAML) solution for the destination user to learn and imitate the reasoning process of the source user. We prove that, by applying GAML, the destination user can accurately imitate the reasoning process of the users to generate reasoning paths that follow the same probability distribution as the expert paths. Numerical results suggest that our proposed architecture can achieve accurate implicit meaning interpretation at the destination user.
△ Less
Submitted 16 March, 2022; v1 submitted 3 February, 2022;
originally announced February 2022.
-
Random Orthogonalization for Federated Learning in Massive MIMO Systems
Authors:
Xizixiang Wei,
Cong Shen,
**g Yang,
H. Vincent Poor
Abstract:
We propose a novel uplink communication method, coined random orthogonalization, for federated learning (FL) in a massive multiple-input and multiple-output (MIMO) wireless system. The key novelty of random orthogonalization comes from the tight coupling of FL model aggregation and two unique characteristics of massive MIMO - channel hardening and favorable propagation. As a result, random orthogo…
▽ More
We propose a novel uplink communication method, coined random orthogonalization, for federated learning (FL) in a massive multiple-input and multiple-output (MIMO) wireless system. The key novelty of random orthogonalization comes from the tight coupling of FL model aggregation and two unique characteristics of massive MIMO - channel hardening and favorable propagation. As a result, random orthogonalization can achieve natural over-the-air model aggregation without requiring transmitter side channel state information, while significantly reducing the channel estimation overhead at the receiver. Theoretical analyses with respect to both communication and machine learning performances are carried out. In particular, an explicit relationship among the convergence rate, the number of clients and the number of antennas is established. Experimental results validate the effectiveness and efficiency of random orthogonalization for FL in massive MIMO.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
An Indirect Rate-Distortion Characterization for Semantic Sources: General Model and the Case of Gaussian Observation
Authors:
Jiakun Liu,
Shuo Shao,
Wenyi Zhang,
H. Vincent Poor
Abstract:
A new source model, which consists of an intrinsic state part and an extrinsic observation part, is proposed and its information-theoretic characterization, namely its rate-distortion function, is defined and analyzed. Such a source model is motivated by the recent surge of interest in the semantic aspect of information: the intrinsic state corresponds to the semantic feature of the source, which…
▽ More
A new source model, which consists of an intrinsic state part and an extrinsic observation part, is proposed and its information-theoretic characterization, namely its rate-distortion function, is defined and analyzed. Such a source model is motivated by the recent surge of interest in the semantic aspect of information: the intrinsic state corresponds to the semantic feature of the source, which in general is not observable but can only be inferred from the extrinsic observation. There are two distortion measures, one between the intrinsic state and its reproduction, and the other between the extrinsic observation and its reproduction. Under a given code rate, the tradeoff between these two distortion measures is characterized by the rate-distortion function, which is solved via the indirect rate-distortion theory and is termed as the semantic rate-distortion function of the source. As an application of the general model and its analysis, the case of Gaussian extrinsic observation is studied, assuming a linear relationship between the intrinsic state and the extrinsic observation, under a quadratic distortion structure. The semantic rate-distortion function is shown to be the solution of a convex programming programming problem with respect to an error covariance matrix, and a reverse water-filling type of solution is provided when the model further satisfies a diagonalizability condition.
△ Less
Submitted 1 June, 2022; v1 submitted 28 January, 2022;
originally announced January 2022.
-
Capacity of Finite State Channels with Feedback: Algorithmic and Optimization Theoretic Properties
Authors:
Andrea Grigorescu,
Holger Boche,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
The capacity of finite state channels (FSCs) with feedback has been shown to be a limit of a sequence of multi-letter expressions. Despite many efforts, a closed-form single-letter capacity characterization is unknown to date. In this paper, the feedback capacity is studied from a fundamental algorithmic point of view by addressing the question of whether or not the capacity can be algorithmically…
▽ More
The capacity of finite state channels (FSCs) with feedback has been shown to be a limit of a sequence of multi-letter expressions. Despite many efforts, a closed-form single-letter capacity characterization is unknown to date. In this paper, the feedback capacity is studied from a fundamental algorithmic point of view by addressing the question of whether or not the capacity can be algorithmically computed. To this aim, the concept of Turing machines is used, which provides fundamental performance limits of digital computers. It is shown that the feedback capacity of FSCs is not Banach-Mazur computable and therefore not Borel-Turing computable. As a consequence, it is shown that either achievability or converse is not Banach-Mazur computable, which means that there are computable FSCs for which it is impossible to find computable tight upper and lower bounds. Furthermore, it is shown that the feedback capacity cannot be characterized as the maximization of a finite-letter formula of entropic quantities.
△ Less
Submitted 4 February, 2022; v1 submitted 27 January, 2022;
originally announced January 2022.
-
Learning Mixtures of Linear Dynamical Systems
Authors:
Yanxi Chen,
H. Vincent Poor
Abstract:
We study the problem of learning a mixture of multiple linear dynamical systems (LDSs) from unlabeled short sample trajectories, each generated by one of the LDS models. Despite the wide applicability of mixture models for time-series data, learning algorithms that come with end-to-end performance guarantees are largely absent from existing literature. There are multiple sources of technical chall…
▽ More
We study the problem of learning a mixture of multiple linear dynamical systems (LDSs) from unlabeled short sample trajectories, each generated by one of the LDS models. Despite the wide applicability of mixture models for time-series data, learning algorithms that come with end-to-end performance guarantees are largely absent from existing literature. There are multiple sources of technical challenges, including but not limited to (1) the presence of latent variables (i.e. the unknown labels of trajectories); (2) the possibility that the sample trajectories might have lengths much smaller than the dimension $d$ of the LDS models; and (3) the complicated temporal dependence inherent to time-series data. To tackle these challenges, we develop a two-stage meta-algorithm, which is guaranteed to efficiently recover each ground-truth LDS model up to error $\tilde{O}(\sqrt{d/T})$, where $T$ is the total sample size. We validate our theoretical studies with numerical experiments, confirming the efficacy of the proposed algorithm.
△ Less
Submitted 25 May, 2022; v1 submitted 26 January, 2022;
originally announced January 2022.
-
Towards Ubiquitous Sensing and Localization With Reconfigurable Intelligent Surfaces
Authors:
Hongliang Zhang,
Boya Di,
Kaigui Bian,
Zhu Han,
H. Vincent Poor,
Lingyang Song
Abstract:
In future cellular systems, wireless localization and sensing functions will be built-in for specific applications, e.g., navigation, transportation, and healthcare, and to support flexible and seamless connectivity. Driven by this trend, the need rises for fine-resolution sensing solutions and cm-level localization accuracy, while the accuracy of current wireless systems is limited by the quality…
▽ More
In future cellular systems, wireless localization and sensing functions will be built-in for specific applications, e.g., navigation, transportation, and healthcare, and to support flexible and seamless connectivity. Driven by this trend, the need rises for fine-resolution sensing solutions and cm-level localization accuracy, while the accuracy of current wireless systems is limited by the quality of the propagation environment. Recently, with the development of new materials, reconfigurable intelligent surfaces (RISs) provide an opportunity to reshape and control the electromagnetic characteristics of the environment, which can be utilized to improve the performance of wireless sensing and localization. In this tutorial, we will first review the background and motivation to utilize wireless signals for sensing and localization. Next, we introduce how to incorporate RIS into applications of sensing and localization, including key challenges and enabling techniques, and then some case studies will be presented. Finally, future research directions will also be discussed.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
Performance Analysis of Multiple-Antenna Ambient Backscatter Systems at Finite Blocklengths
Authors:
Likun Sui,
Zihuai Lin,
Pei Xiao,
H. Vincent Poor,
Branka Vucetic
Abstract:
This paper analyzes the maximal achievable rate for a given blocklength and error probability over a multiple-antenna ambient backscatter channel with perfect channel state information at the receiver. The result consists of a finite blocklength channel coding achievability bound and a converse bound based on the Neyman-Pearson test and the normal approximation based on the Berry- Esseen Theorem.…
▽ More
This paper analyzes the maximal achievable rate for a given blocklength and error probability over a multiple-antenna ambient backscatter channel with perfect channel state information at the receiver. The result consists of a finite blocklength channel coding achievability bound and a converse bound based on the Neyman-Pearson test and the normal approximation based on the Berry- Esseen Theorem. Numerical evaluation of these bounds shows fast convergence to the channel capacity as the blocklength increases and also proves that the channel dispersion is an accurate measure of the backoff from capacity due to finite blocklength.
△ Less
Submitted 20 March, 2022; v1 submitted 24 January, 2022;
originally announced January 2022.
-
Toward Experience-Driven Traffic Management and Orchestration in Digital-Twin-Enabled 6G Networks
Authors:
Muhammad Tariq,
Faisal Naeem,
H. Vincent Poor
Abstract:
The envisioned 6G networks are expected to support extremely high data rates, low-latency, and radically new applications empowered by machine learning. The futuristic 6G networks require a novel framework that can be used to operate, manage, and optimize its underlying services such as ultra-reliable and low-latency communication, and Internet of everything. In recent years, artificial intelligen…
▽ More
The envisioned 6G networks are expected to support extremely high data rates, low-latency, and radically new applications empowered by machine learning. The futuristic 6G networks require a novel framework that can be used to operate, manage, and optimize its underlying services such as ultra-reliable and low-latency communication, and Internet of everything. In recent years, artificial intelligence (AI) has demonstrated significant success in optimizing and designing networks. The AI-enabled traffic orchestration can dynamically organize different network architectures and slices to provide quality of experience considering the dynamic nature of the wireless communication network.
In this paper, we propose a digital twin enabled network framework, empowered by AI to cater the variability and complexity of envisioned 6G networks, to provide smart resource management and intelligent service provisioning. Digital twin paves a way for achieving optimizing 6G services by creating a virtual representation of the 6G network along with its associated communication technologies (e.g., intelligent reflecting surfaces, terahertz and millimeter communication), computing systems (e.g., cloud computing and fog computing) with its associated algorithms (e.g., optimization and machine learning). We then discuss and review the existing AI-enabled traffic management and orchestration techniques and highlight future research directions and potential solutions in 6G networks.
△ Less
Submitted 11 January, 2022;
originally announced January 2022.
-
Rate-Splitting Multiple Access: Fundamentals, Survey, and Future Research Trends
Authors:
Yijie Mao,
Onur Dizdar,
Bruno Clerckx,
Robert Schober,
Petar Popovski,
H. Vincent Poor
Abstract:
Rate-splitting multiple access (RSMA) has emerged as a novel, general, and powerful framework for the design and optimization of non-orthogonal transmission, multiple access (MA), and interference management strategies for future wireless networks. Through information and communication theoretic analysis, RSMA has been shown to be optimal (from a Degrees-of-Freedom region perspective) in several t…
▽ More
Rate-splitting multiple access (RSMA) has emerged as a novel, general, and powerful framework for the design and optimization of non-orthogonal transmission, multiple access (MA), and interference management strategies for future wireless networks. Through information and communication theoretic analysis, RSMA has been shown to be optimal (from a Degrees-of-Freedom region perspective) in several transmission scenarios. Compared to the conventional MA strategies used in 5G, RSMA enables spectral efficiency (SE), energy efficiency (EE), coverage, user fairness, reliability, and quality of service (QoS) enhancements for a wide range of network loads (including both underloaded and overloaded regimes) and user channel conditions. Furthermore, it enjoys a higher robustness against imperfect channel state information at the transmitter (CSIT) and entails lower feedback overhead and complexity. Despite its great potential to fundamentally change the physical (PHY) layer and media access control (MAC) layer of wireless communication networks, RSMA is still confronted with many challenges on the road towards standardization. In this paper, we present the first comprehensive overview on RSMA by providing a survey of the pertinent state-of-the-art research, detailing its architecture, taxonomy, and various appealing applications, as well as comparing with existing MA schemes in terms of their overall frameworks, performance, and complexities. An in-depth discussion of future RSMA research challenges is also provided to inspire future research on RSMA-aided wireless communication for beyond 5G systems.
△ Less
Submitted 30 September, 2022; v1 submitted 10 January, 2022;
originally announced January 2022.
-
RIS-aided Zero-Forcing and Regularized Zero-Forcing Beamforming in Integrated Information and Energy Delivery
Authors:
H. Yu,
H. D. Tuan,
E. Dutkiewicz,
H. V. Poor,
L. Hanzo
Abstract:
This paper considers a network of a multi-antenna array base station (BS) and a reconfigurable intelligent surface (RIS) to deliver both information to information users (IUs) and power to energy users (EUs). The RIS links the connection between the IUs and the BS as there is no direct path between the former and the latter. The EUs are located nearby the BS in order to effectively harvest energy…
▽ More
This paper considers a network of a multi-antenna array base station (BS) and a reconfigurable intelligent surface (RIS) to deliver both information to information users (IUs) and power to energy users (EUs). The RIS links the connection between the IUs and the BS as there is no direct path between the former and the latter. The EUs are located nearby the BS in order to effectively harvest energy from the high-power signal from the BS, while the much weaker signal reflected from the RIS hardly contributes to the EUs' harvested energy. To provide reliable links for all users over the same time-slot, we adopt the transmit time-switching (transmit-TS) approach, under which information and energy are delivered over different time-slot fractions. This allows us to rely on conjugate beamforming for energy links and zero-forcing/regularized zero-forcing beamforming (ZFB/RZFB) and on the programmable reflecting coefficients (PRCs) of the RIS for information links. We show that ZFB/RZFB and PRCs can be still separately optimized in their joint design, where PRC optimization is based on iterative closed-form expressions. We then develop a path-following algorithm for solving our max-min IU throughput optimization problem subject to a realistic constraint on the quality-of-energy-service in terms of the EUs' harvested energy thresholds. We also propose a new RZFB for substantially improving the IUs' throughput.
△ Less
Submitted 8 January, 2022;
originally announced January 2022.
-
Towards Industry 5.0: Intelligent Reflecting Surface (IRS) in Smart Manufacturing
Authors:
Md. Noor-A-Rahim,
Fadhil Firyaguna,
Jobish John,
M. Omar Khyam,
Dirk Pesch,
Eddie Armstrong,
Holger Claussen,
H. Vincent Poor
Abstract:
Industry 5.0 envisions close cooperation between humans and machines requiring ultra-reliable and low latency communications (URLLC). The Intelligent Reflecting Surface (IRS) has the potential to play a crucial role in realizing wireless URLLC for Industry 5.0. IRS is forecast to be a key enabler of 6G wireless communication networks as it can significantly improve wireless network performance by…
▽ More
Industry 5.0 envisions close cooperation between humans and machines requiring ultra-reliable and low latency communications (URLLC). The Intelligent Reflecting Surface (IRS) has the potential to play a crucial role in realizing wireless URLLC for Industry 5.0. IRS is forecast to be a key enabler of 6G wireless communication networks as it can significantly improve wireless network performance by creating a controllable radio environment. In this paper, we first provide an overview of IRS technology and then conceptualize the potential for IRS implementation in a future smart manufacturing environment to support the emergence of Industry 5.0 with a series of applications. Finally, to stimulate future research in this area, we discuss the strength, open challenges, and opportunities of IRS technology in modern smart manufacturing.
△ Less
Submitted 23 June, 2022; v1 submitted 6 January, 2022;
originally announced January 2022.
-
Channel Estimation and Multipath Diversity Reception for RIS-Empowered Broadband Wireless Systems Based on Cyclic-Prefixed Single-Carrier Transmission
Authors:
Qiang Li,
Miaowen Wen,
Ertugrul Basar,
George C. Alexandropoulos,
Kyeong ** Kim,
H. Vincent Poor
Abstract:
In this paper, a cyclic-prefixed single-carrier (CPSC) transmission scheme with phase shift keying (PSK) signaling is presented for broadband wireless communications systems empowered by a reconfigurable intelligent surface (RIS). In the proposed CPSC-RIS, the RIS is configured according to the transmitted PSK symbols such that different cyclically delayed versions of the incident signal are creat…
▽ More
In this paper, a cyclic-prefixed single-carrier (CPSC) transmission scheme with phase shift keying (PSK) signaling is presented for broadband wireless communications systems empowered by a reconfigurable intelligent surface (RIS). In the proposed CPSC-RIS, the RIS is configured according to the transmitted PSK symbols such that different cyclically delayed versions of the incident signal are created by the RIS to achieve multipath diversity. A practical and efficient channel estimator is developed for CPSC-RIS and the mean square error of the channel estimation is expressed in closed-form. We analyze the bit error rate (BER) performance of CPSC-RIS over frequency-selective Nakagami-$m$ fading channels. An upper bound on the BER is derived by assuming the maximum-likelihood detection. Furthermore, by resorting to the concept of index modulation (IM), we propose an extension of CPSC-RIS, termed CPSC-RIS-IM, which enhances the spectral efficiency. In addition to conventional constellation information of PSK symbols, CPSC-RIS-IM uses the full permutations of cyclic delays caused by the RIS to carry information. A sub-optimal receiver is designed for CPSC-RIS-IM to aim at low computational complexity. Our simulation results in terms of BER corroborate the performance analysis and the superiority of CPSC-RIS(-IM) over the conventional CPSC without an RIS and orthogonal frequency division multiplexing with an RIS.
△ Less
Submitted 27 June, 2022; v1 submitted 6 January, 2022;
originally announced January 2022.
-
Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation
Authors:
Ke Sun,
Iñaki Esnaola,
Antonia M. Tulino,
H. Vincent Poor
Abstract:
Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of detection. For Gaussian distribut…
▽ More
Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of detection. For Gaussian distributed state variables, attack construction requires knowledge of the second order statistics of the state variables, which is estimated from a finite number of past realizations using a sample covariance matrix. Within this framework, the attack performance is studied for the attack construction with the sample covariance matrix. This results in an analysis of the amount of data required to learn the covariance matrix of the state variables used on the attack construction. The ergodic attack performance is characterized using asymptotic random matrix theory tools, and the variance of the attack performance is bounded. The ergodic performance and the variance bounds are assessed with simulations on IEEE test systems.
△ Less
Submitted 11 January, 2023; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Age of Information in Energy Harvesting Aided Massive Multiple Access Networks
Authors:
Zhengru Fang,
**g**g Wang,
Yong Ren,
Zhu Han,
H. Vincent Poor,
Lajos Hanzo
Abstract:
Given the proliferation of the massive machine type communication devices (MTCDs) in beyond 5G (B5G) wireless networks, energy harvesting (EH) aided next generation multiple access (NGMA) systems have drawn substantial attention in the context of energy-efficient data sensing and transmission. However, without adaptive time slot (TS) and power allocation schemes, NGMA systems relying on stochastic…
▽ More
Given the proliferation of the massive machine type communication devices (MTCDs) in beyond 5G (B5G) wireless networks, energy harvesting (EH) aided next generation multiple access (NGMA) systems have drawn substantial attention in the context of energy-efficient data sensing and transmission. However, without adaptive time slot (TS) and power allocation schemes, NGMA systems relying on stochastic sampling instants might lead to tardy actions associated both with high age of information (AoI) as well as high power consumption. For mitigating the energy consumption, we exploit a pair of sleep-scheduling policies, namely the multiple vacation (MV) policy and start-up threshold (ST) policy, which are characterized in the context of three typical multiple access protocols, including time-division multiple access (TDMA), frequency-division multiple access (FDMA) and non-orthogonal multiple access (NOMA). Furthermore, we derive closed-form expressions for the MTCD system's peak AoI, which are formulated as the optimization objective under the constraints of EH power, status update rate and stability conditions. An exact linear search based algorithm is proposed for finding the optimal solution by fixing the status update rate. As a design alternative, a low complexity concave-convex procedure (CCP) is also formulated for finding a near-optimal solution relying on the original problem's transformation into a form represented by the difference of two convex problems. Our simulation results show that the proposed algorithms are beneficial in terms of yielding a lower peak AoI at a low power consumption in the context of the multiple access protocols considered.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
Adversarial Neural Networks for Error Correcting Codes
Authors:
Hung T. Nguyen,
Steven Bottone,
Kwang Taik Kim,
Mung Chiang,
H. Vincent Poor
Abstract:
Error correcting codes are a fundamental component in modern day communication systems, demanding extremely high throughput, ultra-reliability and low latency. Recent approaches using machine learning (ML) models as the decoders offer both improved performance and great adaptability to unknown environments, where traditional decoders struggle. We introduce a general framework to further boost the…
▽ More
Error correcting codes are a fundamental component in modern day communication systems, demanding extremely high throughput, ultra-reliability and low latency. Recent approaches using machine learning (ML) models as the decoders offer both improved performance and great adaptability to unknown environments, where traditional decoders struggle. We introduce a general framework to further boost the performance and applicability of ML models. We propose to combine ML decoders with a competing discriminator network that tries to distinguish between codewords and noisy words, and, hence, guides the decoding models to recover transmitted codewords. Our framework is game-theoretic, motivated by generative adversarial networks (GANs), with the decoder and discriminator competing in a zero-sum game. The decoder learns to simultaneously decode and generate codewords while the discriminator learns to tell the differences between decoded outputs and codewords. Thus, the decoder is able to decode noisy received signals into codewords, increasing the probability of successful decoding. We show a strong connection of our framework with the optimal maximum likelihood decoder by proving that this decoder defines a Nash equilibrium point of our game. Hence, training to equilibrium has a good possibility of achieving the optimal maximum likelihood performance. Moreover, our framework does not require training labels, which are typically unavailable during communications, and, thus, seemingly can be trained online and adapt to channel dynamics. To demonstrate the performance of our framework, we combine it with the very recent neural decoders and show improved performance compared to the original models and traditional decoding algorithms on various codes.
△ Less
Submitted 21 December, 2021;
originally announced December 2021.
-
BScNets: Block Simplicial Complex Neural Networks
Authors:
Yuzhou Chen,
Yulia R. Gel,
H. Vincent Poor
Abstract:
Simplicial neural networks (SNN) have recently emerged as the newest direction in graph learning which expands the idea of convolutional architectures from node space to simplicial complexes on graphs. Instead of pre-dominantly assessing pairwise relations among nodes as in the current practice, simplicial complexes allow us to describe higher-order interactions and multi-node graph structures. By…
▽ More
Simplicial neural networks (SNN) have recently emerged as the newest direction in graph learning which expands the idea of convolutional architectures from node space to simplicial complexes on graphs. Instead of pre-dominantly assessing pairwise relations among nodes as in the current practice, simplicial complexes allow us to describe higher-order interactions and multi-node graph structures. By building upon connection between the convolution operation and the new block Hodge-Laplacian, we propose the first SNN for link prediction. Our new Block Simplicial Complex Neural Networks (BScNets) model generalizes the existing graph convolutional network (GCN) frameworks by systematically incorporating salient interactions among multiple higher-order graph structures of different dimensions. We discuss theoretical foundations behind BScNets and illustrate its utility for link prediction on eight real-world and synthetic datasets. Our experiments indicate that BScNets outperforms the state-of-the-art models by a significant margin while maintaining low computation costs. Finally, we show utility of BScNets as the new promising alternative for tracking spread of infectious diseases such as COVID-19 and measuring the effectiveness of the healthcare risk mitigation strategies.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Reconfigurable Holographic Surfaces for Future Wireless Communications
Authors:
Ruoqi Deng,
Boya Di,
Hongliang Zhang,
Dusit Niyato,
Zhu Han,
H. Vincent Poor,
Lingyang Song
Abstract:
Future wireless communications look forward to constructing a ubiquitous intelligent information network with high data rates through cost-efficient devices. Benefiting from the tunability and programmability of metamaterials, the reconfigurable holographic surface (RHS) composed of numerous metamaterial radiation elements is developed as a promising solution to fulfill such challenging visions. T…
▽ More
Future wireless communications look forward to constructing a ubiquitous intelligent information network with high data rates through cost-efficient devices. Benefiting from the tunability and programmability of metamaterials, the reconfigurable holographic surface (RHS) composed of numerous metamaterial radiation elements is developed as a promising solution to fulfill such challenging visions. The RHS is more likely to serve as an ultra-thin and lightweight surface antenna integrated with the transceiver to generate beams with desirable directions by leveraging the holographic principle. This is different from reconfigurable intelligent surfaces (RISs) widely used as passive relays due to the reflection characteristic. In this article, we investigate RHS-aided wireless communications. Starting with a basic introduction of the RHS including its hardware structure, holographic principle, and fabrication methodologies, we propose a hybrid beamforming scheme for RHS-aided multi-user communication systems. A joint sum-rate maximization algorithm is then developed where the digital beamforming performed at the base station and the holographic beamforming performed at the RHS are optimized iteratively. Furthermore, key challenges in RHS-aided wireless communications are also discussed.
△ Less
Submitted 12 December, 2021;
originally announced December 2021.
-
Collaborative Learning over Wireless Networks: An Introductory Overview
Authors:
Emre Ozfatura,
Deniz Gunduz,
H. Vincent Poor
Abstract:
In this chapter, we will mainly focus on collaborative training across wireless devices. Training a ML model is equivalent to solving an optimization problem, and many distributed optimization algorithms have been developed over the last decades. These distributed ML algorithms provide data locality; that is, a joint model can be trained collaboratively while the data available at each participati…
▽ More
In this chapter, we will mainly focus on collaborative training across wireless devices. Training a ML model is equivalent to solving an optimization problem, and many distributed optimization algorithms have been developed over the last decades. These distributed ML algorithms provide data locality; that is, a joint model can be trained collaboratively while the data available at each participating device remains local. This addresses, to some extend, the privacy concern. They also provide computational scalability as they allow exploiting computational resources distributed across many edge devices. However, in practice, this does not directly lead to a linear gain in the overall learning speed with the number of devices. This is partly due to the communication bottleneck limiting the overall computation speed. Additionally, wireless devices are highly heterogeneous in their computational capabilities, and both their computation speed and communication rate can be highly time-varying due to physical factors. Therefore, distributed learning algorithms, particularly those to be implemented at the wireless network edge, must be carefully designed taking into account the impact of time-varying communication network as well as the heterogeneous and stochastic computation capabilities of devices.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
A refined consumer behavior model for energy systems: Application to the pricing and energy-efficiency problems
Authors:
Chao Zhang,
Samson Lasaulce,
Li Wang,
Lucas Saludjian,
H. Vincent Poor
Abstract:
The sum-utility maximization problem is known to be important in the energy systems literature. The conventional assumption to address this problem is that the utility is concave. But for some key applications, such an assumption is not reasonable and does not reflect well the actual behavior of the consumer. To address this issue, the authors pose and address a more general optimization problem,…
▽ More
The sum-utility maximization problem is known to be important in the energy systems literature. The conventional assumption to address this problem is that the utility is concave. But for some key applications, such an assumption is not reasonable and does not reflect well the actual behavior of the consumer. To address this issue, the authors pose and address a more general optimization problem, namely by assuming the consumer's utility to be sigmoidal and in a given class of functions. The considered class of functions is very attractive for at least two reasons. First, the classical NP-hardness issue associated with sum-utility maximization is circumvented. Second, the considered class of functions encompasses well-known performance metrics used to analyze the problems of pricing and energy-efficiency. This allows one to design a new and optimal inclining block rates (IBR) pricing policy which also has the virtue of flattening the power consumption and reducing the peak power. We also show how to maximize the energy-efficiency by a low-complexity algorithm. When compared to existing policies, simulations fully support the benefit from using the proposed approach.
△ Less
Submitted 4 December, 2021;
originally announced December 2021.
-
STAR-RISs: A Correlated T&R Phase-Shift Model and Practical Phase-Shift Configuration Strategies
Authors:
Jiaqi Xu,
Yuanwei Liu,
Xidong Mu,
Robert Schober,
H. Vincent Poor
Abstract:
A correlated transmission and reflection (T&R) phase-shift model is proposed for passive lossless simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs). A STAR-RIS-aided two-user downlink communication system is investigated for both orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA). To evaluate the impact of the correlated T&R phase-sh…
▽ More
A correlated transmission and reflection (T&R) phase-shift model is proposed for passive lossless simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs). A STAR-RIS-aided two-user downlink communication system is investigated for both orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA). To evaluate the impact of the correlated T&R phase-shift model on the communication performance, three phase-shift configuration strategies are developed, namely the primary-secondary phase-shift configuration (PS-PSC), the diversity preserving phase-shift configuration (DP-PSC), and the T/R-group phase-shift configuration (TR-PSC) strategies. Furthermore, we derive the outage probabilities for the three proposed phase-shift configuration strategies as well as for those of the random phase-shift configuration and the independent phase-shift model, which constitute performance lower and upper bounds, respectively. Then, the diversity order of each strategy is investigated based on the obtained analytical results. It is shown that the proposed DP-PSC strategy achieves full diversity order simultaneously for users located on both sides of the STAR-RIS. Moreover, power scaling laws are derived for the three proposed strategies and for the random phase-shift configuration. Numerical simulations reveal a performance gain if the users on both sides of the STAR-RIS are served by NOMA instead of OMA. Moreover, it is shown that the proposed DP-PSC strategy yields the same diversity order as achieved by STAR-RISs under the independent phase-shift model and a comparable power scaling law with only 4 dB reduction in received power.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
Communication-Efficient Federated Learning via Quantized Compressed Sensing
Authors:
Yongjeong Oh,
Namyoon Lee,
Yo-Seb Jeon,
H. Vincent Poor
Abstract:
In this paper, we present a communication-efficient federated learning framework inspired by quantized compressed sensing. The presented framework consists of gradient compression for wireless devices and gradient reconstruction for a parameter server (PS). Our strategy for gradient compression is to sequentially perform block sparsification, dimensional reduction, and quantization. Thanks to grad…
▽ More
In this paper, we present a communication-efficient federated learning framework inspired by quantized compressed sensing. The presented framework consists of gradient compression for wireless devices and gradient reconstruction for a parameter server (PS). Our strategy for gradient compression is to sequentially perform block sparsification, dimensional reduction, and quantization. Thanks to gradient sparsification and quantization, our strategy can achieve a higher compression ratio than one-bit gradient compression. For accurate aggregation of the local gradients from the compressed signals at the PS, we put forth an approximate minimum mean square error (MMSE) approach for gradient reconstruction using the expectation-maximization generalized-approximate-message-passing (EM-GAMP) algorithm. Assuming Bernoulli Gaussian-mixture prior, this algorithm iteratively updates the posterior mean and variance of local gradients from the compressed signals. We also present a low-complexity approach for the gradient reconstruction. In this approach, we use the Bussgang theorem to aggregate local gradients from the compressed signals, then compute an approximate MMSE estimate of the aggregated gradient using the EM-GAMP algorithm. We also provide a convergence rate analysis of the presented framework. Using the MNIST dataset, we demonstrate that the presented framework achieves almost identical performance with the case that performs no compression, while significantly reducing communication overhead for federated learning.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
Fueling the Next Quantum Leap in Cellular Networks: Embracing AI in 5G Evolution towards 6G
Authors:
Xingqin Lin,
Mingzhe Chen,
Henrik Rydén,
Jaeseong Jeong,
Heunchul Lee,
MÃ¥rten Sundberg,
Roy Timo,
Hazhir S. Razaghi,
H. Vincent Poor
Abstract:
Cellular networks, such as 5G systems, are becoming increasingly complex for supporting various deployment scenarios and applications. Embracing artificial intelligence (AI) in 5G evolution is critical to managing the complexity and fueling the next quantum leap in 6G cellular networks. In this article, we share our experience and best practices in applying AI in cellular networks. We first presen…
▽ More
Cellular networks, such as 5G systems, are becoming increasingly complex for supporting various deployment scenarios and applications. Embracing artificial intelligence (AI) in 5G evolution is critical to managing the complexity and fueling the next quantum leap in 6G cellular networks. In this article, we share our experience and best practices in applying AI in cellular networks. We first present a primer on the state of the art of AI in cellular networks, including basic concepts and recent key advances. Then we discuss 3GPP standardization aspects and share various design rationales influencing standardization. We also present case studies with real network data to showcase how AI can improve network performance and enable network automation.
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
Low-to-Zero-Overhead IRS Reconfiguration: Decoupling Illumination and Channel Estimation
Authors:
Vahid Jamali,
George C. Alexandropoulos,
Robert Schober,
H. Vincent Poor
Abstract:
Most algorithms developed so far for the optimization of Intelligent Reflecting Surfaces (IRSs) require knowledge of full Channel State Information (CSI). However, the resulting acquisition overhead constitutes a major bottleneck for the realization of IRS-assisted wireless systems in practice. In contrast, in this paper, focusing on downlink transmissions from a Base Station (BS) to a Mobile User…
▽ More
Most algorithms developed so far for the optimization of Intelligent Reflecting Surfaces (IRSs) require knowledge of full Channel State Information (CSI). However, the resulting acquisition overhead constitutes a major bottleneck for the realization of IRS-assisted wireless systems in practice. In contrast, in this paper, focusing on downlink transmissions from a Base Station (BS) to a Mobile User (MU) that is located in a blockage region, we propose to optimize the IRS for illumination of the area centered around the MU. Hence, the proposed design requires the estimation of the MU's position and not the full CSI. For a given IRS phase-shift configuration, the end-to-end BS-IRS-MU channel can then be estimated using conventional channel estimation techniques. The IRS reconfiguration overhead for the proposed scheme depends on the MU mobility as well as how wide the coverage of the IRS illumination is. Therefore, we develop a general IRS phase-shift design, which is valid for both the near- and far-field regimes and features a parameter for tuning the size of the illumination area. Moreover, we study a special case where the IRS illuminates the entire blockage area, which implies that the IRS phase shifts do not change over time leading to zero overhead for IRS reconfiguration.
△ Less
Submitted 17 December, 2021; v1 submitted 14 October, 2021;
originally announced November 2021.
-
Federated Learning over Wireless IoT Networks with Optimized Communication and Resources
Authors:
Hao Chen,
Shaocheng Huang,
Deyou Zhang,
Ming Xiao,
Mikael Skoglund,
H. Vincent Poor
Abstract:
To leverage massive distributed data and computation resources, machine learning in the network edge is considered to be a promising technique especially for large-scale model training. Federated learning (FL), as a paradigm of collaborative learning techniques, has obtained increasing research attention with the benefits of communication efficiency and improved data privacy. Due to the lossy comm…
▽ More
To leverage massive distributed data and computation resources, machine learning in the network edge is considered to be a promising technique especially for large-scale model training. Federated learning (FL), as a paradigm of collaborative learning techniques, has obtained increasing research attention with the benefits of communication efficiency and improved data privacy. Due to the lossy communication channels and limited communication resources (e.g., bandwidth and power), it is of interest to investigate fast responding and accurate FL schemes over wireless systems. Hence, we investigate the problem of jointly optimized communication efficiency and resources for FL over wireless Internet of things (IoT) networks. To reduce complexity, we divide the overall optimization problem into two sub-problems, i.e., the client scheduling problem and the resource allocation problem. To reduce the communication costs for FL in wireless IoT networks, a new client scheduling policy is proposed by reusing stale local model parameters. To maximize successful information exchange over networks, a Lagrange multiplier method is first leveraged by decoupling variables including power variables, bandwidth variables and transmission indicators. Then a linear-search based power and bandwidth allocation method is developed. Given appropriate hyper-parameters, we show that the proposed communication-efficient federated learning (CEFL) framework converges at a strong linear rate. Through extensive experiments, it is revealed that the proposed CEFL framework substantially boosts both the communication efficiency and learning performance of both training loss and test accuracy for FL over wireless IoT networks compared to a basic FL approach with uniform resource allocation.
△ Less
Submitted 22 October, 2021;
originally announced October 2021.
-
Roles of Retailers in the Peer-to-Peer Electricity Market: A Single Retailer Perspective
Authors:
Wayes Tushar,
Chau Yuen,
Tapan Saha,
Deb Chattopadhyay,
Sohrab Nizami,
Sarmad Hanif,
Jan E Alam,
H. Vincent Poor
Abstract:
Despite extensive research in the past five years and several successfully completed and on-going pilot projects, regulators are still reluctant to implement peer-to-peer trading at a large-scale in today's electricity market. The reason could partly be attributed to the perceived disadvantage of current market participants like retailers due to their exclusion from market participation - a fundam…
▽ More
Despite extensive research in the past five years and several successfully completed and on-going pilot projects, regulators are still reluctant to implement peer-to-peer trading at a large-scale in today's electricity market. The reason could partly be attributed to the perceived disadvantage of current market participants like retailers due to their exclusion from market participation - a fundamental property of decentralised peer-to-peer trading. As a consequence, recently, there has been growing pressure from energy service providers in favour of retailers' participation in peer-to-peer trading. However, the role of retailers in the peer-to-peer market is yet to be established as no existing study has challenged this fundamental circumspection of decentralized trading. In this context, this perspective takes the first step to discuss the feasibility of retailers' involvement in the peer-to-peer market. In doing so, we identify key characteristics of retail-based and peer-to-peer electricity markets and discuss our viewpoint on how to incorporate a single retailer in a peer-to-peer market without compromising the fundamental decision-making characteristics of both markets. Finally, we give an example of a hypothetical business model to demonstrate how a retailer can be a part of a peer-to-peer market with a promise of collective benefits for the participants.
△ Less
Submitted 11 October, 2021;
originally announced October 2021.
-
Quickest Inference of Network Cascades with Noisy Information
Authors:
Anirudh Sridhar,
H. Vincent Poor
Abstract:
We study the problem of estimating the source of a network cascade given a time series of noisy information about the spread. Initially, there is a single vertex affected by the cascade (the source) and the cascade spreads in discrete time steps across the network. The cascade evolution is hidden, but one can observe a time series of noisy signals from each vertex. The time series of a vertex is a…
▽ More
We study the problem of estimating the source of a network cascade given a time series of noisy information about the spread. Initially, there is a single vertex affected by the cascade (the source) and the cascade spreads in discrete time steps across the network. The cascade evolution is hidden, but one can observe a time series of noisy signals from each vertex. The time series of a vertex is assumed to be a sequence of i.i.d. samples from a pre-change distribution $Q_0$ before the cascade affects the vertex, and the time series is a sequence of i.i.d. samples from a post-change distribution $Q_1$ once the cascade has affected the vertex. Given the time series of noisy signals, which can be viewed as a noisy measurement of the cascade evolution, we aim to devise a procedure to reliably estimate the cascade source as fast as possible.
We investigate Bayesian and minimax formulations of the source estimation problem, and derive near-optimal estimators for simple cascade dynamics and network topologies. In the Bayesian setting, an estimator which observes samples until the error of the Bayes-optimal estimator falls below a threshold achieves optimal performance. In the minimax setting, optimal performance is achieved by designing a novel multi-hypothesis sequential probability ratio test (MSPRT). We find that these optimal estimators require $\log \log n / \log (k - 1)$ observations of the noisy time series when the network topology is a $k$-regular tree, and $(\log n)^{\frac{1}{\ell + 1}}$ observations are required for $\ell$-dimensional lattices. Finally, we discuss how our methods may be extended to cascades on arbitrary graphs.
△ Less
Submitted 12 November, 2022; v1 submitted 15 October, 2021;
originally announced October 2021.
-
The Role of Masks in Mitigating Viral Spread on Networks
Authors:
Yurun Tian,
Anirudh Sridhar,
Chai Wah Wu,
Simon A. Levin,
Kathleen M. Carley,
H. Vincent Poor,
Osman Yagan
Abstract:
Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive quantitative analysis of the impact of mask-wearing. To this end, we propose a novel agent-based model of viral spread on networks where agents may either wear no mask or wear one of…
▽ More
Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive quantitative analysis of the impact of mask-wearing. To this end, we propose a novel agent-based model of viral spread on networks where agents may either wear no mask or wear one of several types of masks with different properties (e.g., cloth or surgical). We derive analytical expressions for three key epidemiological quantities: the probability of emergence, the epidemic threshold, and the expected epidemic size. In particular, we show how the aforementioned quantities depend on the structure of the contact network, viral transmission dynamics, and the distribution of the different types of masks within the population. Through extensive simulations, we then investigate the impact of different allocations of masks within the population and trade-offs between the outward efficiency and inward efficiency of the masks. Interestingly, we find that masks with high outward efficiency and low inward efficiency are most useful for controlling the spread in the early stages of an epidemic, while masks with high inward efficiency but low outward efficiency are most useful in reducing the size of an already large spread. Lastly, we study whether degree-based mask allocation is more effective in reducing the probability of epidemic as well as epidemic size compared to random allocation. The result echoes the previous findings that mitigation strategies should differ based on the stage of the spreading process, focusing on source control before the epidemic emerges and on self-protection after the emergence.
△ Less
Submitted 6 June, 2023; v1 submitted 8 October, 2021;
originally announced October 2021.
-
Simultaneously Transmitting and Reflecting (STAR)-RISs: A Coupled Phase-Shift Model
Authors:
Yuanwei Liu,
Xidong Mu,
Robert Schober,
H. Vincent Poor
Abstract:
A simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) aided communication system is investigated, where an access point sends information to two users located on each side of the STAR-RIS. Different from current works assuming that the phase-shift coefficients for transmission and reflection can be independently adjusted, which is non-trivial to realize for pur…
▽ More
A simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) aided communication system is investigated, where an access point sends information to two users located on each side of the STAR-RIS. Different from current works assuming that the phase-shift coefficients for transmission and reflection can be independently adjusted, which is non-trivial to realize for purely passive STAR-RISs, a coupled transmission and reflection phase-shift model is considered. Based on this model, a power consumption minimization problem is formulated for both non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA). In particular, the amplitude and phase-shift coefficients for transmission and reflection are jointly optimized, subject to the rate constraints of the users. To solve this non-convex problem, an efficient element-wise alternating optimization algorithm is developed to find a high-quality suboptimal solution, whose complexity scales only linearly with the number of STAR elements. Finally, numerical results are provided for both NOMA and OMA to validate the effectiveness of the proposed algorithm by comparing its performance with that of STAR-RISs using the independent phase-shift model and conventional reflecting/transmitting-only RISs.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
Rate Splitting Multiple Access for Semi-Grant-Free Transmissions
Authors:
Hongwu Liu,
Theodoros A. Tsiftsis,
Bruno Clerckx,
Kyeong ** Kim,
Kyung Sup Kwak,
H. Vincent Poor
Abstract:
Enabled by hybrid grant-based (GB) and grant-free (GF) transmission techniques, GF users of internet of things (IoT) devices and massive machine-type communications (mMTC) meet opportunities to share wireless resources with GB users. In this paper, we propose a rate splitting multiple access (RSMA) strategy for an emerging semi-grant-free (SGF) transmission system to increase connectivity and reli…
▽ More
Enabled by hybrid grant-based (GB) and grant-free (GF) transmission techniques, GF users of internet of things (IoT) devices and massive machine-type communications (mMTC) meet opportunities to share wireless resources with GB users. In this paper, we propose a rate splitting multiple access (RSMA) strategy for an emerging semi-grant-free (SGF) transmission system to increase connectivity and reliability. In the proposed RSMA assisted SGF (RSMA-SGF) scheme, the GF users apply the rate splitting principle to realize distributed contentions and utilize transmit power most effectively for robust transmissions, meanwhile kee** themselves transparent to the GB user. Compared to existing non-orthogonal multiple access (NOMA) assisted SGF schemes, the RSMA-SGF scheme significantly decreases outage probability and achieves full multiuser diversity gain without restricting the GB and GF users' target rates to a limited value region. Exact expressions and asymptotic analysis for the outage probability are provided to facilitate the system performance evaluation of the proposed RSMA-SGF scheme. Computer simulation results clarify the superior outage performance of the RSMA-SGF scheme and verify the accuracy of the developed analytical results.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
Data-Driven Detection and Identification of IoT-Enabled Load-Altering Attacks in Power Grids
Authors:
Subhash Lakshminarayana,
Saurav Sthapit,
Hamidreza Jahangir,
Carsten Maple,
H Vincent Poor
Abstract:
Advances in edge computing are powering the development and deployment of Internet of Things (IoT) systems to provide advanced services and resource efficiency. However, large-scale IoT-based load-altering attacks (LAAs) can seriously impact power grid operations, such as destabilising the grid's control loops. Timely detection and identification of any compromised nodes are essential to minimise…
▽ More
Advances in edge computing are powering the development and deployment of Internet of Things (IoT) systems to provide advanced services and resource efficiency. However, large-scale IoT-based load-altering attacks (LAAs) can seriously impact power grid operations, such as destabilising the grid's control loops. Timely detection and identification of any compromised nodes are essential to minimise the adverse effects of these attacks on power grid operations. In this work, two data-driven algorithms are proposed to detect and identify compromised nodes and the attack parameters of the LAAs. The first method, based on the Sparse Identification of Nonlinear Dynamics (SINDy) approach, adopts a sparse regression framework to identify attack parameters that best describe the observed dynamics. The second method, based on physics-informed neural networks (PINN), employs neural networks to infer the attack parameters from the measurements. Both algorithms are presented utilising edge computing for deployment over decentralised architectures. Extensive simulations are performed on IEEE 6-,14- and 39-bus systems to verify the effectiveness of the proposed methods. Numerical results confirm that the proposed algorithms outperform existing approaches, such as those based on unscented Kalman filter, support vector machines (SVM), and neural networks (NN), and effectively detect and identify locations of attack in a timely manner.
△ Less
Submitted 22 March, 2022; v1 submitted 1 October, 2021;
originally announced October 2021.
-
Cooperative Task Offloading and Block Mining in Blockchain-based Edge Computing with Multi-agent Deep Reinforcement Learning
Authors:
Dinh C. Nguyen,
Ming Ding,
Pubudu N. Pathirana,
Aruna Seneviratne,
Jun Li,
H. Vincent Poor
Abstract:
The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in mobile networks, by offering task offloading solutions with security enhancement empowered by blockchain mining. Nevertheless, these important enabling technologies have been studied separately in most existing works. This article proposes a novel cooperative task offloading and block mi…
▽ More
The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in mobile networks, by offering task offloading solutions with security enhancement empowered by blockchain mining. Nevertheless, these important enabling technologies have been studied separately in most existing works. This article proposes a novel cooperative task offloading and block mining (TOBM) scheme for a blockchain-based MEC system where each edge device not only handles data tasks but also deals with block mining for improving the system utility. To address the latency issues caused by the blockchain operation in MEC, we develop a new Proof-of-Reputation consensus mechanism based on a lightweight block verification strategy. A multi-objective function is then formulated to maximize the system utility of the blockchain-based MEC system, by jointly optimizing offloading decision, channel selection, transmit power allocation, and computational resource allocation. We propose a novel distributed deep reinforcement learning-based approach by using a multi-agent deep deterministic policy gradient algorithm. We then develop a game-theoretic solution to model the offloading and mining competition among edge devices as a potential game, and prove the existence of a pure Nash equilibrium. Simulation results demonstrate the significant system utility improvements of our proposed scheme over baseline approaches.
△ Less
Submitted 29 September, 2021;
originally announced September 2021.
-
Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications
Authors:
Zhongxiang Wei,
Christos Masouros,
H. Vincent Poor,
Athina P. Petropulu,
Lajos Hanzo
Abstract:
Next-generation systems aim to increase both the speed and responsiveness of wireless communications, while supporting compelling applications such as edge and cloud computing, remote-Health, vehicle-to-infrastructure communications, etc. As these applications are expected to carry confidential personal data, ensuring user privacy becomes a critical issue. In contrast to traditional security and p…
▽ More
Next-generation systems aim to increase both the speed and responsiveness of wireless communications, while supporting compelling applications such as edge and cloud computing, remote-Health, vehicle-to-infrastructure communications, etc. As these applications are expected to carry confidential personal data, ensuring user privacy becomes a critical issue. In contrast to traditional security and privacy designs that aim to prevent confidential information from being eavesdropped upon by adversaries, or learned by unauthorized parties, in this paper we consider designs that mask the users' identities during communication, hence resulting in anonymous communications. In particular, we examine the recent interest in physical layer (PHY) anonymous solutions. This line of research departs from conventional higher layer anonymous authentication, encryption and routing protocols, and judiciously manipulates the signaling pattern of transmitted signals in order to mask the senders' PHY characteristics. We first discuss the concept of anonymity at the PHY, and illustrate a strategy that is able to unmask the sender's identity by analyzing his or her PHY information only, i.e., signalling patterns and the inherent fading characteristics. Subsequently, we overview the emerging area of anonymous precoding to preserve the sender's anonymity, while ensuring high receiver-side signal-to-interference-plus-noise ratio (SINR) for communication. This family of anonymous precoding designs represents a new approach to providing anonymity at the PHY, introducing a new dimension for privacy-preserving techniques.
△ Less
Submitted 18 September, 2021;
originally announced September 2021.
-
Spatiotemporal Analysis for Age of Information in Random Access Networks under Last-Come First-Serve with Replacement Protocol
Authors:
Howard H. Yang,
Ahmed Arafa,
Tony Q. S. Quek,
H. Vincent Poor
Abstract:
We investigate the age-of-information (AoI) in the context of random access networks, in which transmitters need to send a sequence of information packets to the intended receivers over a shared spectrum. Due to interference, the dynamics at the link pairs will interact with each other over both space and time, and the effects of these spatiotemporal interactions on the AoI are not well understood…
▽ More
We investigate the age-of-information (AoI) in the context of random access networks, in which transmitters need to send a sequence of information packets to the intended receivers over a shared spectrum. Due to interference, the dynamics at the link pairs will interact with each other over both space and time, and the effects of these spatiotemporal interactions on the AoI are not well understood. In this paper, we straddle queueing theory and stochastic geometry to establish an analytical framework, that accounts for the interplay between the temporal traffic attributes and spatial network topology, for such a study. Specifically, we derive accurate and tractable expressions to quantify the network average AoI as well as the outage probability of peak AoI. Besides, we develop a decentralized channel access policy that exploits the local observation at each node to make transmission decisions that minimize the AoI. Our analysis reveals that when the packet transmissions are scheduled in a last-come first-serve (LCFS) order, whereas the newly incoming packets can replace the undelivered ones, depending on the deployment density, there may or may not exist a tradeoff on the packet arrival rate that minimizes the network average AoI. Moreover, the slotted ALOHA protocol is shown to be instrumental in reducing the AoI when the packet arrival rates are high, yet it cannot contribute to decreasing the AoI in the regime of infrequent packet arrivals. The numerical results also confirm the efficacy of the proposed scheme, where the gain is particularly pronounced when the network grows in size because our method is able to adapt the channel access probabilities with the change of ambient environment.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Learning from Peers: Deep Transfer Reinforcement Learning for Joint Radio and Cache Resource Allocation in 5G RAN Slicing
Authors:
Hao Zhou,
Melike Erol-Kantarci,
Vincent Poor
Abstract:
Network slicing is a critical technique for 5G communications that covers radio access network (RAN), edge, transport and core slicing.The evolving network architecture requires the orchestration of multiple network resources such as radio and cache resources. In recent years, machine learning (ML) techniques have been widely applied for network management. However, most existing works do not take…
▽ More
Network slicing is a critical technique for 5G communications that covers radio access network (RAN), edge, transport and core slicing.The evolving network architecture requires the orchestration of multiple network resources such as radio and cache resources. In recent years, machine learning (ML) techniques have been widely applied for network management. However, most existing works do not take advantage of the knowledge transfer capability in ML. In this paper, we propose a deep transfer reinforcement learning (DTRL) scheme for joint radio and cache resource allocation to serve 5G RAN slicing. We first define a hierarchical architecture for joint resource allocation. Then we propose two DTRL algorithms: Q-value-based deep transfer reinforcement learning (QDTRL) and action selection-based deep transfer reinforcement learning (ADTRL). In the proposed schemes, learner agents utilize expert agents' knowledge to improve their performance on current tasks. The proposed algorithms are compared with both the model-free exploration bonus deep Q-learning (EB-DQN) and the model-based priority proportional fairness and time-to-live (PPF-TTL) algorithms. Compared with EB-DQN, our proposed DTRL-based method presents 21.4% lower delay for Ultra Reliable Low Latency Communications (URLLC) slice and 22.4% higher throughput for enhanced Mobile Broad Band (eMBB) slice, while achieving significantly faster convergence than EB-DQN. Moreover, 40.8% lower URLLC delay and 59.8% higher eMBB throughput are observed with respect to PPF-TTL.
△ Less
Submitted 31 August, 2022; v1 submitted 16 September, 2021;
originally announced September 2021.
-
Timely Status Updating Over Erasure Channels Using an Energy Harvesting Sensor: Single and Multiple Sources
Authors:
Ahmed Arafa,
**g Yang,
Sennur Ulukus,
H. Vincent Poor
Abstract:
A status updating system is considered in which data from multiple sources are sampled by an energy harvesting sensor and transmitted to a remote destination through an erasure channel. The goal is to deliver status updates of all sources in a timely manner, such that the cumulative long-term average age-of-information (AoI) is minimized. The AoI for each source is defined as the time elapsed sinc…
▽ More
A status updating system is considered in which data from multiple sources are sampled by an energy harvesting sensor and transmitted to a remote destination through an erasure channel. The goal is to deliver status updates of all sources in a timely manner, such that the cumulative long-term average age-of-information (AoI) is minimized. The AoI for each source is defined as the time elapsed since the generation time of the latest successful status update received at the destination from that source. Transmissions are subject to energy availability, which arrives in units according to a Poisson process, with each energy unit capable of carrying out one transmission from only one source. The sensor is equipped with a unit-sized battery to save the incoming energy. A scheduling policy is designed in order to determine which source is sampled using the available energy. The problem is studied in two main settings: no erasure status feedback, and perfect instantaneous feedback.
△ Less
Submitted 14 September, 2021;
originally announced September 2021.
-
Joint LED Selection and Precoding Optimization for Multiple-User Multiple-Cell VLC Systems
Authors:
Yang Yang,
Yujie Yang,
Mingzhe Chen,
Chunyan Feng,
Hailun Xia,
Shuguang Cui,
H. Vincent Poor
Abstract:
This paper proposes a hybrid dimming scheme based on joint LED selection and precoding design (TASP-HD) for multiple-user (MU) multiple-cell (MC) visible light communications (VLC) systems. In TASP-HD, both the LED selection and the precoding of each cell can be dynamically adjusted to reduce the intra- and inter-cell interferences while satisfying illumination constraints. First, a MU-MC-VLC syst…
▽ More
This paper proposes a hybrid dimming scheme based on joint LED selection and precoding design (TASP-HD) for multiple-user (MU) multiple-cell (MC) visible light communications (VLC) systems. In TASP-HD, both the LED selection and the precoding of each cell can be dynamically adjusted to reduce the intra- and inter-cell interferences while satisfying illumination constraints. First, a MU-MC-VLC system model is established, and then a sum-rate maximization problem under dimming level and illumination uniformity constraints is formulated. In this studied problem, the indices of activated LEDs and precoding matrices are optimized, which result in a complex non-convex mixed integer problem. To solve this problem, the original problem is separated into two subproblems. The first subproblem, which maximizes the sum-rate of users via optimizing the LED selection with a given precoding matrix, is a mixed integer problem solved by the penalty method. With the optimized LED selection matrix, the second subproblem which focuses on the maximization of the sum-rate via optimizing the precoding matrix is solved by the Lagrangian dual method. Finally, these two subproblems are iteratively solved to obtain a convergent solution. Simulation results verify that in a typical indoor scenario under a dimming level of 70%, the mean bandwidth efficiency of TASP-HD is 4.8 bit/s/Hz and 7.13 bit/s/Hz greater than AD and DD, respectively.
△ Less
Submitted 13 September, 2021; v1 submitted 29 August, 2021;
originally announced August 2021.
-
Multi-Dimensional Multiple Access with Resource Utilization Cost Awareness for Individualized Service Provisioning in 6G
Authors:
Jie Mei,
Wudan Han,
Xianbin Wang,
H. Vincent Poor
Abstract:
The increasingly diversified Quality-of-Service (QoS) requirements envisioned for future wireless networks call for more flexible and inclusive multiple access techniques for supporting emerging applications and communication scenarios. To achieve this, we propose a multi-dimensional multiple access (MDMA) protocol to meet individual User Equipment's (UE's) unique QoS demands while utilizing multi…
▽ More
The increasingly diversified Quality-of-Service (QoS) requirements envisioned for future wireless networks call for more flexible and inclusive multiple access techniques for supporting emerging applications and communication scenarios. To achieve this, we propose a multi-dimensional multiple access (MDMA) protocol to meet individual User Equipment's (UE's) unique QoS demands while utilizing multi-dimensional radio resources cost-effectively. In detail, the proposed scheme consists of two new aspects, i.e., selection of a tailored multiple access mode for each UE while considering the UE-specific radio resource utilization cost; and multi-dimensional radio resource allocation among coexisting UEs under dynamic network conditions. To reduce the UE-specific resource utilization cost, the base station (BS) organizes UEs with disparate multi-domain resource constraints as UE coalition by considering each UE's specific resource availability, perceived quality, and utilization capability. Each UE within a coalition could utilize its preferred radio resources, which leads to low utilization cost while avoiding resource-sharing conflicts with remaining UEs. Furthermore, to meet UE-specific QoS requirements and varying resource conditions at the UE side, the multi-dimensional radio resource allocation among coexisting UEs is formulated as an optimization problem to maximize the summation of cost-aware utility functions of all UEs. A solution to solve this NP-hard problem with low complexity is developed using the successive convex approximation and the Lagrange dual decomposition methods. The effectiveness of our proposed scheme is validated by numerical simulation and performance comparison with state-of-the-art schemes. In particular, the simulation results demonstrate that our proposed scheme outperforms these benchmark schemes by large margins.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Federated Distributionally Robust Optimization for Phase Configuration of RISs
Authors:
Chaouki Ben Issaid,
Sumudu Samarakoon,
Mehdi Bennis,
H. Vincent Poor
Abstract:
In this article, we study the problem of robust reconfigurable intelligent surface (RIS)-aided downlink communication over heterogeneous RIS types in the supervised learning setting. By modeling downlink communication over heterogeneous RIS designs as different workers that learn how to optimize phase configurations in a distributed manner, we solve this distributed learning problem using a distri…
▽ More
In this article, we study the problem of robust reconfigurable intelligent surface (RIS)-aided downlink communication over heterogeneous RIS types in the supervised learning setting. By modeling downlink communication over heterogeneous RIS designs as different workers that learn how to optimize phase configurations in a distributed manner, we solve this distributed learning problem using a distributionally robust formulation in a communication-efficient manner, while establishing its rate of convergence. By doing so, we ensure that the global model performance of the worst-case worker is close to the performance of other workers. Simulation results show that our proposed algorithm requires fewer communication rounds (about 50% lesser) to achieve the same worst-case distribution test accuracy compared to competitive baselines.
△ Less
Submitted 8 October, 2021; v1 submitted 20 August, 2021;
originally announced August 2021.
-
Two-Timescale Design for Reconfigurable Intelligent Surface-Aided Massive MIMO Systems with Imperfect CSI
Authors:
Kangda Zhi,
Cunhua Pan,
Hong Ren,
Kezhi Wang,
Maged Elkashlan,
Marco Di Renzo,
Robert Schober,
H. Vincent Poor,
Jiangzhou Wang,
Lajos Hanzo
Abstract:
This paper investigates the two-timescale transmission design for reconfigurable intelligent surface (RIS)-aided massive multiple-input multiple-output (MIMO) systems, where the beamforming at the base station (BS) is adapted to the rapidly-changing instantaneous channel state information (CSI), while the passive beamforming at the RIS is adapted to the slowly-changing statistical CSI.
Specifica…
▽ More
This paper investigates the two-timescale transmission design for reconfigurable intelligent surface (RIS)-aided massive multiple-input multiple-output (MIMO) systems, where the beamforming at the base station (BS) is adapted to the rapidly-changing instantaneous channel state information (CSI), while the passive beamforming at the RIS is adapted to the slowly-changing statistical CSI.
Specifically, we first propose a linear minimum mean square error (LMMSE) estimator to obtain the aggregated channel from the users to the BS in each channel coherence interval. Based on the estimated channel, we apply the low-complexity maximal ratio combining (MRC) beamforming at the BS, and then derive the ergodic achievable rate in a closed form expression.
To draw design insights, we perform a detailed theoretical analysis departing from the derived ergodic achievable rate. If the BS-RIS channel is Rician distributed, we prove that the transmit power can be scaled proportionally to $1/M$, as the number of BS antennas, $M$, grows to infinity while maintaining a non-zero rate.
If the BS-RIS channel is Rayleigh distributed, the transmit power can be scaled either proportionally to $1/\sqrt{M}$ as $M$ grows large, or proportionally to $1/N$ as the number of reflecting elements, $N$, grows large, while still maintaining a non-zero rate.
By capitalizing on the derived expression of the data rate under the statistical knowledge of the CSI, we maximize the minimum user rate by designing the passive beamforming at the RIS.
Numerical results confirm that, even in the presence of imperfect CSI, the integration of an RIS in massive MIMO systems results in promising performance gains. In addition, the obtained results reveal that it is favorable to place the RIS close to the users rather than close to the BS.
△ Less
Submitted 15 October, 2022; v1 submitted 17 August, 2021;
originally announced August 2021.
-
Rate-Splitting Multiple Access for Downlink MIMO: A Generalized Power Iteration Approach
Authors:
Jeonghun Park,
**seok Choi,
Namyoon Lee,
Wonjae Shin,
H. Vincent Poor
Abstract:
Rate-splitting multiple access (RSMA) is a general multiple access scheme for downlink multi-antenna systems embracing both classical spatial division multiple access and more recent non-orthogonal multiple access. Finding a linear precoding strategy that maximizes the sum spectral efficiency of RSMA is a challenging yet significant problem. In this paper, we put forth a novel precoder design fram…
▽ More
Rate-splitting multiple access (RSMA) is a general multiple access scheme for downlink multi-antenna systems embracing both classical spatial division multiple access and more recent non-orthogonal multiple access. Finding a linear precoding strategy that maximizes the sum spectral efficiency of RSMA is a challenging yet significant problem. In this paper, we put forth a novel precoder design framework that jointly finds the linear precoders for the common and private messages for RSMA. Our approach is first to approximate the non-smooth minimum function part in the sum spectral efficiency of RSMA using a LogSumExp technique. Then, we reformulate the sum spectral efficiency maximization problem as a form of the log-sum of Rayleigh quotients to convert it into a tractable form. By interpreting the first-order optimality condition of the reformulated problem as an eigenvector-dependent nonlinear eigenvalue problem, we reveal that the leading eigenvector of the derived optimality condition is a local optimal solution. To find the leading eigenvector, we propose an algorithm inspired by a power iteration. Simulation results show that the proposed RSMA transmission strategy provides significant improvement in the sum spectral efficiency compared to the state-of-the-art RSMA transmission methods.
△ Less
Submitted 2 June, 2022; v1 submitted 15 August, 2021;
originally announced August 2021.
-
MetaSketch: Wireless Semantic Segmentation by Metamaterial Surfaces
Authors:
**gzhi Hu,
Hongliang Zhang,
Kaigui Bian,
Zhu Han,
H. Vincent Poor,
Lingyang Song
Abstract:
Semantic segmentation is a process of partitioning an image into multiple segments for recognizing humans and objects, which can be widely applied in scenarios such as healthcare and safety monitoring. To avoid privacy violation, using RF signals instead of an image for human and object recognition has gained increasing attention. However, human and object recognition by using RF signals is usuall…
▽ More
Semantic segmentation is a process of partitioning an image into multiple segments for recognizing humans and objects, which can be widely applied in scenarios such as healthcare and safety monitoring. To avoid privacy violation, using RF signals instead of an image for human and object recognition has gained increasing attention. However, human and object recognition by using RF signals is usually a passive signal collection and analysis process without changing the radio environment, and the recognition accuracy is restricted significantly by unwanted multi-path fading, and/or the limited number of independent channels between RF transceivers in uncontrollable radio environments. This paper introduces MetaSketch, a novel RF-sensing system that performs semantic recognition and segmentation for humans and objects by making the radio environment reconfigurable. A metamaterial surface is incorporated into MetaSketch and diversifies the information carried by RF signals. Using compressive sensing techniques, MetaSketch reconstructs a point cloud consisting of the reflection coefficients of humans and objects at different spatial points, and recognizes the semantic meaning of the points by using symmetric multilayer perceptron groups. Our evaluation results show that MetaSketch is capable of generating favorable radio environments and extracting exact point clouds, and labeling the semantic meaning of the points with an average error rate of less than 1% in an indoor space.
△ Less
Submitted 5 October, 2021; v1 submitted 13 August, 2021;
originally announced August 2021.
-
Simultaneously Transmitting and Reflecting (STAR) Intelligent Omni-Surfaces, Their Modeling and Implementation
Authors:
Jiaqi Xu,
Yuanwei Liu,
Xidong Mu,
Joey Tianyi Zhou,
Lingyang Song,
H. Vincent Poor,
Lajos Hanzo
Abstract:
With the rapid development of advanced electromagnetic manipulation technologies, researchers and engineers are starting to study smart surfaces that can achieve enhanced coverages, high reconfigurability, and are easy to deploy. Among these efforts, simultaneously transmitting and reflecting intelligent omni-surface (STAR-IOS) is one of the most promising categories. Although pioneering works hav…
▽ More
With the rapid development of advanced electromagnetic manipulation technologies, researchers and engineers are starting to study smart surfaces that can achieve enhanced coverages, high reconfigurability, and are easy to deploy. Among these efforts, simultaneously transmitting and reflecting intelligent omni-surface (STAR-IOS) is one of the most promising categories. Although pioneering works have demonstrated the benefits of STAR-IOSs in terms of its wireless communication performance gain, several important issues remain unclear including practical hardware implementations and physics-compliant models for STAR-IOSs. In this paper, we answer these pressing questions of STAR-IOSs by discussing four practical hardware implementations of STAR-IOSs, as well as three hardware modelling methods and five channel modelling methods. These discussions not only categorize existing smart surface technologies but also serve as a physicscompliant pipeline for further investigating the STAR-IOSs.
△ Less
Submitted 3 September, 2021; v1 submitted 13 August, 2021;
originally announced August 2021.
-
6G Internet of Things: A Comprehensive Survey
Authors:
Dinh C. Nguyen,
Ming Ding,
Pubudu N. Pathirana,
Aruna Seneviratne,
Jun Li,
Dusit Niyato,
Octavia Dobre,
H. Vincent Poor
Abstract:
The sixth generation (6G) wireless communication networks are envisioned to revolutionize customer services and applications via the Internet of Things (IoT) towards a future of fully intelligent and autonomous systems. In this article, we explore the emerging opportunities brought by 6G technologies in IoT networks and applications, by conducting a holistic survey on the convergence of 6G and IoT…
▽ More
The sixth generation (6G) wireless communication networks are envisioned to revolutionize customer services and applications via the Internet of Things (IoT) towards a future of fully intelligent and autonomous systems. In this article, we explore the emerging opportunities brought by 6G technologies in IoT networks and applications, by conducting a holistic survey on the convergence of 6G and IoT. We first shed light on some of the most fundamental 6G technologies that are expected to empower future IoT networks, including edge intelligence, reconfigurable intelligent surfaces, space-air-ground-underwater communications, Terahertz communications, massive ultra-reliable and low-latency communications, and blockchain. Particularly, compared to the other related survey papers, we provide an in-depth discussion of the roles of 6G in a wide range of prospective IoT applications via five key domains, namely Healthcare Internet of Things, Vehicular Internet of Things and Autonomous Driving, Unmanned Aerial Vehicles, Satellite Internet of Things, and Industrial Internet of Things. Finally, we highlight interesting research challenges and point out potential directions to spur further research in this promising area.
△ Less
Submitted 10 August, 2021;
originally announced August 2021.
-
RIS-assisted UAV Communications for IoT with Wireless Power Transfer Using Deep Reinforcement Learning
Authors:
Khoi Khac Nguyen,
Antonino Masaracchia,
Tan Do-Duy,
H. Vincent Poor,
Trung Q. Duong
Abstract:
Many of the devices used in Internet-of-Things (IoT) applications are energy-limited, and thus supplying energy while maintaining seamless connectivity for IoT devices is of considerable importance. In this context, we propose a simultaneous wireless power transfer and information transmission scheme for IoT devices with support from reconfigurable intelligent surface (RIS)-aided unmanned aerial v…
▽ More
Many of the devices used in Internet-of-Things (IoT) applications are energy-limited, and thus supplying energy while maintaining seamless connectivity for IoT devices is of considerable importance. In this context, we propose a simultaneous wireless power transfer and information transmission scheme for IoT devices with support from reconfigurable intelligent surface (RIS)-aided unmanned aerial vehicle (UAV) communications. In particular, in a first phase, IoT devices harvest energy from the UAV through wireless power transfer; and then in a second phase, the UAV collects data from the IoT devices through information transmission. To characterise the agility of the UAV, we consider two scenarios: a hovering UAV and a mobile UAV. Aiming at maximizing the total network sum-rate, we jointly optimize the trajectory of the UAV, the energy harvesting scheduling of IoT devices, and the phaseshift matrix of the RIS. We formulate a Markov decision process and propose two deep reinforcement learning algorithms to solve the optimization problem of maximizing the total network sum-rate. Numerical results illustrate the effectiveness of the UAV's flying path optimization and the network's throughput of our proposed techniques compared with other benchmark schemes. Given the strict requirements of the RIS and UAV, the significant improvement in processing time and throughput performance demonstrates that our proposed scheme is well applicable for practical IoT applications.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.