Skip to main content

Showing 1–50 of 190 results for author: Skoglund, M

.
  1. arXiv:2407.01167  [pdf, other

    cs.IT cs.CR

    Information Density Bounds for Privacy

    Authors: Sara Saeidian, Leonhard Grosse, Parastoo Sadeghi, Mikael Skoglund, Tobias J. Oechtering

    Abstract: This paper explores the implications of guaranteeing privacy by imposing a lower bound on the information density between the private and the public data. We introduce an operationally meaningful privacy measure called pointwise maximal cost (PMC) and demonstrate that imposing an upper bound on PMC is equivalent to enforcing a lower bound on the information density. PMC quantifies the information… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.19002  [pdf, ps, other

    cs.IT

    Coded Cooperative Networks for Semi-Decentralized Federated Learning

    Authors: Shudi Weng, Ming Xiao, Mikael Skoglund

    Abstract: To enhance straggler resilience in federated learning (FL) systems, a semi-decentralized approach has been recently proposed, enabling collaboration between clients. Unlike the existing semi-decentralized schemes, which adaptively adjust the collaboration weight according to the network topology, this letter proposes a deterministic coded network that leverages wireless diversity for semi-decentra… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  3. arXiv:2406.17393  [pdf, ps, other

    cs.IT

    Timely and Painless Breakups: Off-the-grid Blind Message Recovery and Users' Demixing

    Authors: Sajad Daei, Saeed Razavikia, Mikael Skoglund, Gabor Fodor, Carlo Fischione

    Abstract: In the near future, the Internet of Things will interconnect billions of devices, forming a vast network where users sporadically transmit short messages through multi-path wireless channels. These channels are characterized by the superposition of a small number of scaled and delayed copies of Dirac spikes. At the receiver, the observed signal is a sum of these convolved signals, and the task is… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  4. arXiv:2405.08709  [pdf, other

    cs.IT

    Multi-Task Private Semantic Communication

    Authors: Amirreza Zamani, Sajad Daei, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study a multi-task private semantic communication problem, in which an encoder has access to an information source arbitrarily correlated with some latent private data. A user has $L$ tasks with priorities. The encoder designs a message to be revealed which is called the semantic of the information source. Due to the privacy constraints the semantic can not be disclosed directly and the encoder… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  5. arXiv:2405.07906  [pdf, other

    eess.SP

    Improved Downlink Channel Estimation in Time-Varying FDD Massive MIMO Systems

    Authors: Sajad Daei, Mikael Skoglund, Gabor Fodor

    Abstract: In this work, we address the challenge of accurately obtaining channel state information at the transmitter (CSIT) for frequency division duplexing (FDD) multiple input multiple output systems. Although CSIT is vital for maximizing spatial multiplexing gains, traditional CSIT estimation methods often suffer from impracticality due to the substantial training and feedback overhead they require. To… ▽ More

    Submitted 24 June, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

  6. arXiv:2405.07895  [pdf, other

    eess.SP cs.IT

    Optimal Transmitter Design and Pilot Spacing in MIMO Non-Stationary Aging Channels

    Authors: Sajad Daei, Gabor Fodor, Mikael Skoglund

    Abstract: This work considers an uplink wireless communication system where multiple users with multiple antennas transmit data frames over dynamic channels. Previous studies have shown that multiple transmit and receive antennas can substantially enhance the sum-capacity of all users when the channel is known at the transmitter and in the case of uncorrelated transmit and receive antennas. However, spatial… ▽ More

    Submitted 24 June, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

  7. arXiv:2405.07890  [pdf, other

    eess.SP cs.IT

    Subspace-Informed Matrix Completion

    Authors: Hamideh. Sadat Fazael Ardakani, Sajad Daei, Arash Amini, Mikael Skoglund, Gabor Fodor

    Abstract: In this work, we consider the matrix completion problem, where the objective is to reconstruct a low-rank matrix from a few observed entries. A commonly employed approach involves nuclear norm minimization. For this method to succeed, the number of observed entries needs to scale at least proportional to both the rank of the ground-truth matrix and the coherence parameter. While the only prior inf… ▽ More

    Submitted 24 June, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2111.00235

  8. arXiv:2405.07882  [pdf, other

    eess.SP

    Exploiting Spatial and Temporal Correlations in Massive MIMO Systems Over Non-Stationary Aging Channels

    Authors: Sajad Daei, Gabor Fodor, Mikael Skoglund

    Abstract: This work investigates a multi-user, multi-antenna uplink wireless system, where multiple users transmit signals to a base station. Previous research has explored the potential for linear growth in spectral efficiency by employing multiple transmit and receive antennas. This gain depends on the quality of channel state information and uncorrelated antennas. However, spatial correlations, arising f… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2401.13368 by other authors

  9. arXiv:2405.07275  [pdf, other

    cs.IT

    Distribution-Preserving Integrated Sensing and Communication with Secure Reconstruction

    Authors: Yiqi Chen, Tobias Oechtering, Holger Boche, Mikael Skoglund, Yuan Luo

    Abstract: Distribution-preserving integrated sensing and communication with secure reconstruction is investigated in this paper. In addition to the distortion constraint, we impose another constraint on the distance between the reconstructed sequence distribution and the original state distribution to force the system to preserve the statistical property of the channel states. An inner bound of the distribu… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: Accepted by ISIT2024

  10. arXiv:2404.19643  [pdf, other

    cs.SE

    Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines

    Authors: Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai, Martin Skoglund, Marvin Damschen

    Abstract: The increased importance of cybersecurity in autonomous machinery is becoming evident in the forestry domain. Forestry worksites are becoming more complex with the involvement of multiple systems and system of systems. Hence, there is a need to investigate how to address cybersecurity challenges for autonomous systems of systems in the forestry domain. Using a literature review and adapting standa… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  11. arXiv:2404.15359  [pdf, ps, other

    math.OC

    Dynamically Iterated Filters: A unified framework for improved iterated filtering and smoothing

    Authors: Anton Kullberg, Martin A. Skoglund, Isaac Skog, Gustaf Hendeby

    Abstract: Typical iterated filters, such as the iterated extended Kalman filter (IEKF), iterated unscented Kalman filter (IUKF), and iterated posterior linearization filter (IPLF), have been developed to improve the linearization point (or density) of the likelihood linearization in the well-known extended Kalman filter (EKF) and unscented Kalman filter (UKF). A shortcoming of typical iterated filters is th… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: 12 pages. Submitted to Journal of Advances in Information Fusion for possible publication

  12. arXiv:2404.11314  [pdf, other

    cs.IT eess.SP

    Destructive and constructive RIS beamforming in an ISAC-multi-user MIMO network

    Authors: Steven Rivetti, Ozlem Tugfe Demir, Emil Bjornson, Mikael Skoglund

    Abstract: Integrated sensing and communication (ISAC) has already established itself as a promising solution to the spectrum scarcity problem, even more so when paired with a reconfigurable intelligent surface (RIS) as RISs can shape the propagation environment by adjusting their phase-shift coefficients. Albeit the potential performance gain, a RIS also poses a security threat to the system: in this paper,… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: submitted to IEEE GLOBECOMM

  13. arXiv:2404.00780  [pdf, ps, other

    eess.SP

    Cooperative Gradient Coding for Collaborative Federated Learning

    Authors: Shudi Weng, Chengxi Li, Ming Xiao, Mikael Skoglund

    Abstract: We investigate federated learning (FL) in the presence of stragglers, with emphasis on wireless scenarios where the power-constrained edge devices collaboratively train a global model on their local datasets and transmit local model updates through fading channels. To tackle stragglers resulting from link disruptions without requiring accurate prior information on connectivity or dataset sharing,… ▽ More

    Submitted 22 April, 2024; v1 submitted 31 March, 2024; originally announced April 2024.

  14. arXiv:2403.16681  [pdf, other

    stat.ML cs.LG

    A note on generalization bounds for losses with finite moments

    Authors: Borja Rodríguez-Gálvez, Omar Rivasplata, Ragnar Thobaben, Mikael Skoglund

    Abstract: This paper studies the truncation method from Alquier [1] to derive high-probability PAC-Bayes bounds for unbounded losses with heavy tails. Assuming that the $p$-th moment is bounded, the resulting bounds interpolate between a slow rate $1 / \sqrt{n}$ when $p=2$, and a fast rate $1 / n$ when $p \to \infty$ and the loss is essentially bounded. Moreover, the paper derives a high-probability PAC-Bay… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 9 pages: 5 of main text, 1 of references, and 3 of appendices

  15. arXiv:2403.14905  [pdf, other

    eess.SP cs.CR cs.LG

    Adaptive Coded Federated Learning: Privacy Preservation and Straggler Mitigation

    Authors: Chengxi Li, Ming Xiao, Mikael Skoglund

    Abstract: In this article, we address the problem of federated learning in the presence of stragglers. For this problem, a coded federated learning framework has been proposed, where the central server aggregates gradients received from the non-stragglers and gradient computed from a privacy-preservation global coded dataset to mitigate the negative impact of the stragglers. However, when aggregating these… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

  16. arXiv:2403.14716  [pdf

    cs.LG cs.DC

    Distributed Learning based on 1-Bit Gradient Coding in the Presence of Stragglers

    Authors: Chengxi Li, Mikael Skoglund

    Abstract: This paper considers the problem of distributed learning (DL) in the presence of stragglers. For this problem, DL methods based on gradient coding have been widely investigated, which redundantly distribute the training data to the workers to guarantee convergence when some workers are stragglers. However, these methods require the workers to transmit real-valued vectors during the process of lear… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: Accepted by IEEE TCOM

  17. arXiv:2403.03361  [pdf, ps, other

    stat.ML cs.LG

    Chained Information-Theoretic bounds and Tight Regret Rate for Linear Bandit Problems

    Authors: Amaury Gouverneur, Borja Rodríguez-Gálvez, Tobias J. Oechtering, Mikael Skoglund

    Abstract: This paper studies the Bayesian regret of a variant of the Thompson-Sampling algorithm for bandit problems. It builds upon the information-theoretic framework of [Russo and Van Roy, 2015] and, more specifically, on the rate-distortion analysis from [Dong and Van Roy, 2020], where they proved a bound with regret rate of $O(d\sqrt{T \log(T)})$ for the $d$-dimensional linear bandit setting. We focus… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: 15 pages: 8 of main text and 7 of appendices

  18. arXiv:2402.13351  [pdf, other

    eess.SP

    Malicious Reconfigurable Intelligent Surfaces: How Impactful can Destructive Beamforming be?

    Authors: Steven Rivetti, Ozlem Tugfe Demir, Emil Bjornson, Mikael Skoglund

    Abstract: Reconfigurable intelligent surfaces (RISs) have demonstrated significant potential for enhancing communication system performance if properly configured. However, a RIS might also pose a risk to the network security. In this letter, we explore the impact of a malicious RIS on a multi-user multiple-input single-output (MISO) system when the system is unaware of the RIS's malicious intentions. The o… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: Submitted to IEEE wireless communication letters

  19. arXiv:2402.12967  [pdf, other

    cs.IT cs.CR

    Quantifying Privacy via Information Density

    Authors: Leonhard Grosse, Sara Saeidian, Parastoo Sadeghi, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We examine the relationship between privacy metrics that utilize information density to measure information leakage between a private and a disclosed random variable. Firstly, we prove that bounding the information density from above or below in turn implies a lower or upper bound on the information density, respectively. Using this result, we establish new relationships between local information… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    MSC Class: 94A17 ACM Class: H.1.1

  20. arXiv:2402.04193  [pdf, other

    cs.LG eess.SP

    Gradient Coding in Decentralized Learning for Evading Stragglers

    Authors: Chengxi Li, Mikael Skoglund

    Abstract: In this paper, we consider a decentralized learning problem in the presence of stragglers. Although gradient coding techniques have been developed for distributed learning to evade stragglers, where the devices send encoded gradients with redundant training data, it is difficult to apply those techniques directly to decentralized learning scenarios. To deal with this problem, we propose a new goss… ▽ More

    Submitted 14 June, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

  21. arXiv:2401.13368  [pdf, other

    eess.SP

    Towards Optimal Pilot Spacing and Power Control in Multi-Antenna Systems Operating Over Non-Stationary Rician Aging Channels

    Authors: Sajad Daei, Gabor Fodor, Mikael Skoglund, Miklos Telek

    Abstract: Several previous works have addressed the inherent trade-off between allocating resources in the power and time domains to pilot and data signals in multiple input multiple output systems over block-fading channels. In particular, when the channel changes rapidly in time, channel aging degrades the performance in terms of spectral efficiency without proper pilot spacing and power control. Despite… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  22. arXiv:2401.12901  [pdf, other

    cs.IT eess.SP

    Secure Spatial Signal Design for ISAC in a Cell-Free MIMO Network

    Authors: Steven Rivetti, Emil Bjornson, Mikael Skoglund

    Abstract: In this paper, we study a cell-free multiple-input multiple-output network equipped with integrated sensing and communication (ISAC) access points (APs). The distributed APs are used to jointly serve the communication needs of user equipments (UEs) while sensing a target, assumed to be an eavesdropper (Eve). To increase the system's robustness towards said Eve, we develop an ISAC waveform model th… ▽ More

    Submitted 3 June, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: Corrected version of the paper presented at WCNC24

  23. arXiv:2312.15244  [pdf, ps, other

    cs.IT eess.SP

    Fluid Antenna Array Enhanced Over-the-Air Computation

    Authors: Deyou Zhang, Sicong Ye, Ming Xiao, Kezhi Wang, Marco Di Renzo, Mikael Skoglund

    Abstract: Over-the-air computation (AirComp) has emerged as a promising technology for fast wireless data aggregation by harnessing the superposition property of wireless multiple-access channels. This paper investigates a fluid antenna (FA) array-enhanced AirComp system, employing the new degrees of freedom achieved by antenna movements. Specifically, we jointly optimize the transceiver design and antenna… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

  24. arXiv:2311.18418  [pdf, ps, other

    cs.IT eess.SP

    Beamforming Design for Active RIS-Aided Over-the-Air Computation

    Authors: Deyou Zhang, Ming Xiao, Mikael Skoglund, H. Vincent Poor

    Abstract: Over-the-air computation (AirComp) is emerging as a promising technology for wireless data aggregation. However, its performance is hampered by users with poor channel conditions. To mitigate such a performance bottleneck, this paper introduces an active reconfigurable intelligence surface (RIS) into the AirComp system. Specifically, we begin by exploring the ideal RIS model and propose a joint op… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

  25. arXiv:2311.04059  [pdf, ps, other

    cs.IT

    Over-the-Air Computation Empowered Federated Learning: A Joint Uplink-Downlink Design

    Authors: Deyou Zhang, Ming Xiao, Mikael Skoglund

    Abstract: In this paper, we investigate the communication designs of over-the-air computation (AirComp) empowered federated learning (FL) systems considering uplink model aggregation and downlink model dissemination jointly. We first derive an upper bound on the expected difference between the training loss and the optimal loss, which reveals that optimizing the FL performance is equivalent to minimizing th… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: This paper has been accepted by the IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, China, 2023

  26. arXiv:2311.03982  [pdf, ps, other

    cs.IT eess.SP

    Federated Learning via Active RIS Assisted Over-the-Air Computation

    Authors: Deyou Zhang, Ming Xiao, Mikael Skoglund, H. Vincent Poor

    Abstract: In this paper, we propose leveraging the active reconfigurable intelligence surface (RIS) to support reliable gradient aggregation for over-the-air computation (AirComp) enabled federated learning (FL) systems. An analysis of the FL convergence property reveals that minimizing gradient aggregation errors in each training round is crucial for narrowing the convergence gap. As such, we formulate an… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: This paper was submitted to the IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), Stockholm, Sweden, 2024

  27. Private Variable-Length Coding with Zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A private compression design problem is studied, where an encoder observes useful data $Y$, wishes to compress it using variable length code and communicates it through an unsecured channel. Since $Y$ is correlated with private attribute $X$, the encoder uses a private compression mechanism to design encoded message $\cal C$ and sends it over the channel. An adversary is assumed to have access to… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2306.13184, arXiv:2309.09034, arXiv:2211.15525, arXiv:2310.19122

    Journal ref: 2023 IEEE International Workshop on Information Forensics and Security (WIFS)

  28. arXiv:2310.19122  [pdf, ps, other

    cs.IT

    Private Variable-Length Coding with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: A private compression design problem is studied, where an encoder observes useful data $Y$, wishes to compress it using variable length code and communicates it through an unsecured channel. Since $Y$ is correlated with private data $X$, the encoder uses a private compression mechanism to design encoded message $\cal C$ and sends it over the channel. An adversary is assumed to have access to the o… ▽ More

    Submitted 20 November, 2023; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2306.13184

  29. arXiv:2310.11080  [pdf, other

    cs.IT

    On General Capacity-Distortion Formulas of Integrated Sensing and Communication

    Authors: Yiqi Chen, Tobias Oechtering, Mikael Skoglund, Yuan Luo

    Abstract: The integrated sensing and communication (ISAC) problem with general state and channel distributions is investigated. General formulas of the capacity-distortion tradeoff for the ISAC problem under maximal and average distortion constraints are provided. The results cover some existing communication models such as the general point-to-point channel and Gel'fand-Pinsker channel. More details includ… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: 27 pages, 1 figure

  30. arXiv:2309.09034  [pdf, other

    cs.IT

    Private Variable-Length Coding with Sequential Encoder

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A multi-user private data compression problem is studied. A server has access to a database of $N$ files, $(Y_1,...,Y_N)$, each of size $F$ bits and is connected to an encoder. The encoder is connected through an unsecured link to a user. We assume that each file $Y_i$ is arbitrarily correlated with a private attribute $X$, which is assumed to be accessible by the encoder. Moreover, an adversary i… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2306.13184

  31. arXiv:2309.09033  [pdf, other

    cs.IT

    New Privacy Mechanism Design With Direct Access to the Private Data

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: The design of a statistical signal processing privacy problem is studied where the private data is assumed to be observable. In this work, an agent observes useful data $Y$, which is correlated with private data $X$, and wants to disclose the useful information to a user. A statistical privacy mechanism is employed to generate data $U$ based on $(X,Y)$ that maximizes the revealed information about… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2201.08738, arXiv:2212.12475

  32. arXiv:2309.07636  [pdf, other

    eess.SP

    On the Relationship Between Iterated Statistical Linearization and Quasi-Newton Methods

    Authors: Anton Kullberg, Martin A. Skoglund, Isaac Skog, Gustaf Hendeby

    Abstract: This letter investigates relationships between iterated filtering algorithms based on statistical linearization, such as the iterated unscented Kalman filter (IUKF), and filtering algorithms based on quasi-Newton (QN) methods, such as the QN iterated extended Kalman filter (QN-IEKF). Firstly, it is shown that the IUKF and the iterated posterior linearization filter (IPLF) can be viewed as QN algor… ▽ More

    Submitted 20 November, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: 4 pages, Accepted to IEEE Signal Processing Letters

  33. arXiv:2308.03518  [pdf, ps, other

    cs.IT eess.SP

    Off-the-grid Blind Deconvolution and Demixing

    Authors: Saeed Razavikia, Sajad Daei, Mikael Skoglund, Gabor Fodor, Carlo Fischione

    Abstract: We consider the problem of gridless blind deconvolution and demixing (GB2D) in scenarios where multiple users communicate messages through multiple unknown channels, and a single base station (BS) collects their contributions. This scenario arises in various communication fields, including wireless communications, the Internet of Things, over-the-air computation, and integrated sensing and communi… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  34. arXiv:2306.14323  [pdf, other

    cs.IT

    On Strong Secrecy for Multiple Access Channels with States and Causal CSI

    Authors: Yiqi Chen, Tobias Oechtering, Mikael Skoglund, Yuan Luo

    Abstract: Strong secrecy communication over a discrete memoryless state-dependent multiple access channel (SD-MAC) with an external eavesdropper is investigated. The channel is governed by discrete memoryless and i.i.d. channel states and the channel state information (CSI) is revealed to the encoders in a causal manner. Inner and outer bounds are provided. To establish the inner bound, we investigate codin… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

    Comments: Journal version of the ISIT paper 'On Strong Secrecy for Multiple Access Channel with States and Causal CSI'. arXiv admin note: substantial text overlap with arXiv:2305.01393

  35. arXiv:2306.13184  [pdf, other

    cs.IT

    Cache-Aided Private Variable-Length Coding with Zero and Non-Zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A private cache-aided compression problem is studied, where a server has access to a database of $N$ files, $(Y_1,...,Y_N)$, each of size $F$ bits and is connected through a shared link to $K$ users, each equipped with a local cache of size $MF$ bits. In the placement phase, the server fills the users$'$ caches without knowing their demands, while the delivery phase takes place after the users sen… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  36. arXiv:2306.12228  [pdf, ps, other

    eess.SP

    Blind Asynchronous Goal-Oriented Detection for Massive Connectivity

    Authors: Sajad Daei, Saeed Razavikia, Marios Kountouris, Mikael Skoglund, Gabor Fodor, Carlo Fischione

    Abstract: Resource allocation and multiple access schemes are instrumental for the success of communication networks, which facilitate seamless wireless connectivity among a growing population of uncoordinated and non-synchronized users. In this paper, we present a novel random access scheme that addresses one of the most severe barriers of current strategies to achieve massive connectivity and ultra-reliab… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  37. arXiv:2306.12214  [pdf, other

    stat.ML cs.LG

    More PAC-Bayes bounds: From bounded losses, to losses with general tail behaviors, to anytime validity

    Authors: Borja Rodríguez-Gálvez, Ragnar Thobaben, Mikael Skoglund

    Abstract: In this paper, we present new high-probability PAC-Bayes bounds for different types of losses. Firstly, for losses with a bounded range, we recover a strengthened version of Catoni's bound that holds uniformly for all parameter values. This leads to new fast-rate and mixed-rate bounds that are interpretable and tighter than previous bounds in the literature. In particular, the fast-rate bound is e… ▽ More

    Submitted 4 June, 2024; v1 submitted 21 June, 2023; originally announced June 2023.

    Comments: 43 pages: ~20 of main text, ~6.5 of references, and ~17.5 of appendices. Published at JMLR

  38. arXiv:2305.06038  [pdf, other

    cs.IT

    Secure Block Joint Source-Channel Coding with Sequential Encoding

    Authors: Hamid Ghourchian, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We extend the results of Ghourchian et al. [IEEE JSAIT-2021], to joint source-channel coding with eavesdrop**. Our work characterizes the sequential encoding process using the cumulative rate distribution functions (CRDF) and includes a security constraint using the cumulative leakage distribution functions (CLF). The information leakage is defined based on the mutual information between the sou… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: Long version of the accepted paper in the International Symposium on Information Theory (ISIT 2023). 23 pages, 1 figure. arXiv admin note: text overlap with arXiv:2108.13295

  39. arXiv:2305.01393  [pdf, other

    cs.IT

    On Strong Secrecy for Multiple Access Channel with States and Causal CSI

    Authors: Yiqi Chen, Tobias Oechtering, Mikael Skoglund, Yuan Luo

    Abstract: Strong secrecy communication over a discrete memoryless state-dependent multiple access channel (SD-MAC) with an external eavesdropper is investigated. The channel is governed by discrete memoryless and i.i.d. channel states and the channel state information (CSI) is revealed to the encoders in a causal manner. An inner bound of the capacity is provided. To establish the inner bound, we investigat… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: Accepted for presentation at ISIT2023

  40. arXiv:2304.13593  [pdf, ps, other

    stat.ML cs.LG

    Thompson Sampling Regret Bounds for Contextual Bandits with sub-Gaussian rewards

    Authors: Amaury Gouverneur, Borja Rodríguez-Gálvez, Tobias J. Oechtering, Mikael Skoglund

    Abstract: In this work, we study the performance of the Thompson Sampling algorithm for Contextual Bandit problems based on the framework introduced by Neu et al. and their concept of lifted information ratio. First, we prove a comprehensive bound on the Thompson Sampling expected cumulative regret that depends on the mutual information of the environment parameters and the history. Then, we introduce new b… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 8 pages: 5 of the main text, 1 of references, and 2 of appendices. Accepted to ISIT 2023

  41. arXiv:2304.07722  [pdf, ps, other

    cs.IT cs.CR

    Pointwise Maximal Leakage on General Alphabets

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Pointwise maximal leakage (PML) is an operationally meaningful privacy measure that quantifies the amount of information leaking about a secret $X$ to a single outcome of a related random variable $Y$. In this paper, we extend the notion of PML to random variables on arbitrary probability spaces. We develop two new definitions: First, we extend PML to countably infinite random variables by conside… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

    Comments: Accepted for presentation at ISIT2023

  42. arXiv:2303.07782  [pdf, ps, other

    cs.CR cs.IT

    Inferential Privacy: From Impossibility to Database Privacy

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We investigate the possibility of guaranteeing inferential privacy for mechanisms that release useful information about some data containing sensitive information, denoted by $X$. We describe a general model of utility and privacy in which utility is achieved by disclosing the value of low-entropy features of $X$, while privacy is maintained by kee** high-entropy features of $X$ secret. Adopting… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

  43. arXiv:2302.13553  [pdf, other

    cs.HC cs.SD eess.AS

    Predicting EEG Responses to Attended Speech via Deep Neural Networks for Speech

    Authors: Emina Alickovic, Tobias Dorszewski, Thomas U. Christiansen, Kasper Eskelund, Leonardo Gizzi, Martin A. Skoglund, Dorothea Wendt

    Abstract: Attending to the speech stream of interest in multi-talker environments can be a challenging task, particularly for listeners with hearing impairment. Research suggests that neural responses assessed with electroencephalography (EEG) are modulated by listener`s auditory attention, revealing selective neural tracking (NT) of the attended speech. NT methods mostly rely on hand-engineered acoustic an… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  44. arXiv:2212.13556  [pdf, other

    cs.LG stat.ML

    Limitations of Information-Theoretic Generalization Bounds for Gradient Descent Methods in Stochastic Convex Optimization

    Authors: Mahdi Haghifam, Borja Rodríguez-Gálvez, Ragnar Thobaben, Mikael Skoglund, Daniel M. Roy, Gintare Karolina Dziugaite

    Abstract: To date, no "information-theoretic" frameworks for reasoning about generalization error have been shown to establish minimax rates for gradient descent in the setting of stochastic convex optimization. In this work, we consider the prospect of establishing such rates via several existing information-theoretic frameworks: input-output mutual information bounds, conditional mutual information bounds… ▽ More

    Submitted 13 July, 2023; v1 submitted 27 December, 2022; originally announced December 2022.

    Comments: 49 pages, 2 figures. This version corrects a mistake in the proof of Theorem 17. Proc. International Conference on Algorithmic Learning Theory (ALT), 2023

  45. arXiv:2212.12475  [pdf, other

    cs.IT

    On the Privacy-Utility Trade-off With and Without Direct Access to the Private Data

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study an information theoretic privacy mechanism design problem for two scenarios where the private data is either observable or hidden. In each scenario, we first consider bounded mutual information as privacy leakage criterion, then we use two different per-letter privacy constraints. In the first scenario, an agent observes useful data $Y$ that is correlated with private data $X$, and wishes… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2205.04881, arXiv:2201.08738

  46. arXiv:2211.15525  [pdf, other

    cs.IT

    Multi-User Privacy Mechanism Design with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data $Y=(Y_1,...,Y_N)$ that is correlated with private data $X=(X_1,...,X_N)$ which is assumed to be also accessible by the agent. Here, we consider $K$ users where user $i$ demands a sub-vector of $Y$, denoted by $C_{i}$. The agent wishes to disclose $C_{i}$ to user $i$. Si… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2205.04881, arXiv:2201.08738

  47. arXiv:2211.05873  [pdf, ps, other

    cs.IT

    Information-Energy Regions in the Finite Block-Length Regime with Finite Channel Inputs

    Authors: Sadaf Ul Zuhra, Samir M. Perlaza, H. Vincent Poor, Mikael Skoglund

    Abstract: This paper characterizes the trade-offs between information and energy transmission over an additive white Gaussian noise channel in the finite block-length regime with finite sets of channel input symbols. These trade-offs are characterized using impossibility and achievability bounds on the information transmission rate, energy transmission rate, decoding error probability (DEP) and energy outag… ▽ More

    Submitted 24 May, 2023; v1 submitted 10 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2202.05002, arXiv:2110.01882

  48. arXiv:2209.07886  [pdf, ps, other

    cs.IT eess.SP

    Beam Tracking for Dynamic mmWave Channels: A New Training Beam Sequence Design Approach

    Authors: Deyou Zhang, Ming Xiao, Mikael Skoglund

    Abstract: In this paper, we develop an efficient training beam sequence design approach for millimeter wave MISO tracking systems. We impose a discrete state Markov process assumption on the evolution of the angle of departure and introduce the maximum a posteriori criterion to track it in each beam training period. Since it is infeasible to derive an explicit expression for the resultant tracking error pro… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

  49. arXiv:2207.08735  [pdf, ps, other

    cs.LG stat.ML

    An Information-Theoretic Analysis of Bayesian Reinforcement Learning

    Authors: Amaury Gouverneur, Borja Rodríguez-Gálvez, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Building on the framework introduced by Xu and Raginksy [1] for supervised learning problems, we study the best achievable performance for model-based Bayesian reinforcement learning problems. With this purpose, we define minimum Bayesian regret (MBR) as the difference between the maximum expected cumulative reward obtainable either by learning from the collected data or by knowing the environment… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

    Comments: 10 pages: 6 of the main text, 1 of references, and 3 of appendices

  50. Goodput Maximization with Quantized Feedback in the Finite Blocklength Regime for Quasi-Static Channels

    Authors: Hasan Basri Celebi, Mikael Skoglund

    Abstract: In this paper, we study a quantized feedback scheme to maximize the goodput of a finite blocklength communication scenario over a quasi-static fading channel. It is assumed that the receiver has perfect channel state information (CSI) and sends back the CSI to the transmitter over a resolution-limited error-free feedback channel. With this partial CSI, the transmitter is supposed to select the opt… ▽ More

    Submitted 1 July, 2022; v1 submitted 30 June, 2022; originally announced June 2022.

    Journal ref: IEEE Transactions on Communications, 2022