Skip to main content

Showing 1–27 of 27 results for author: Yemini, M

.
  1. arXiv:2407.06541  [pdf, other

    eess.SY cs.MA cs.RO math.OC

    Fast Distributed Optimization over Directed Graphs under Malicious Attacks using Trust

    Authors: Arif Kerem Dayı, Orhan Eren Akgün, Stephanie Gil, Michal Yemini, Angelia Nedić

    Abstract: In this work, we introduce the Resilient Projected Push-Pull (RP3) algorithm designed for distributed optimization in multi-agent cyber-physical systems with directed communication graphs and the presence of malicious agents. Our algorithm leverages stochastic inter-agent trust values and gradient tracking to achieve geometric convergence rates in expectation even in adversarial environments. We i… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: 31 pages, 2 figures

  2. arXiv:2406.03766  [pdf, other

    eess.SP cs.DC cs.IT cs.LG eess.SY

    Privacy Preserving Semi-Decentralized Mean Estimation over Intermittently-Connected Networks

    Authors: Rajarshi Saha, Mohamed Seif, Michal Yemini, Andrea J. Goldsmith, H. Vincent Poor

    Abstract: We consider the problem of privately estimating the mean of vectors distributed across different nodes of an unreliable wireless network, where communications between nodes can fail intermittently. We adopt a semi-decentralized setup, wherein to mitigate the impact of intermittently connected links, nodes can collaborate with their neighbors to compute a local consensus, which they relay to a cent… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 14 pages, 6 figures. arXiv admin note: text overlap with arXiv:2303.00035

  3. arXiv:2404.10995  [pdf, other

    math.OC cs.CR cs.LG

    Clipped SGD Algorithms for Privacy Preserving Performative Prediction: Bias Amplification and Remedies

    Authors: Qiang Li, Michal Yemini, Hoi-To Wai

    Abstract: Clipped stochastic gradient descent (SGD) algorithms are among the most popular algorithms for privacy preserving optimization that reduces the leakage of users' identity in model training. This paper studies the convergence properties of these algorithms in a performative prediction setting, where the data distribution may shift due to the deployed prediction model. For example, the latter is cau… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 22 pages, 11 figures

  4. arXiv:2404.07838  [pdf, other

    cs.MA cs.RO eess.SP eess.SY

    The Role of Confidence for Trust-based Resilient Consensus (Extended Version)

    Authors: Luca Ballotta, Michal Yemini

    Abstract: We consider a multi-agent system where agents aim to achieve a consensus despite interactions with malicious agents that communicate misleading information. Physical channels supporting communication in cyberphysical systems offer attractive opportunities to detect malicious agents, nevertheless, trustworthiness indications coming from the channel are subject to uncertainty and need to be treated… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: 10 pages, 2 figures; proof details for ACC'24 paper "The Role of Confidence for Trust-based Resilient Consensus"

  5. arXiv:2311.07492  [pdf, other

    cs.RO cs.MA cs.NI eess.SY

    How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems

    Authors: Stephanie Gil, Michal Yemini, Arsenia Chorti, Angelia Nedić, H. Vincent Poor, Andrea J. Goldsmith

    Abstract: Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and security. The unique characteristics of these systems prompt a reevaluation of their security concepts, including their vulnerabilities, and mechanisms to mitigate these vulnerabilities. This survey paper examines how advancement in wireless networking, coupled with the sensing and computing in cyberphysical s… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  6. arXiv:2303.04075  [pdf, other

    cs.RO

    Exploiting Trust for Resilient Hypothesis Testing with Malicious Robots (evolved version)

    Authors: Matthew Cavorsi, Orhan Eren Akgün, Michal Yemini, Andrea Goldsmith, Stephanie Gil

    Abstract: We develop a resilient binary hypothesis testing framework for decision making in adversarial multi-robot crowdsensing tasks. This framework exploits stochastic trust observations between robots to arrive at tractable, resilient decision making at a centralized Fusion Center (FC) even when i) there exist malicious robots in the network and their number may be larger than the number of legitimate r… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: 21 pages, 5 figures, 1 table. arXiv admin note: substantial text overlap with arXiv:2209.12285

  7. arXiv:2303.00035  [pdf, other

    cs.IT cs.CR cs.DC cs.LG

    Collaborative Mean Estimation over Intermittently Connected Networks with Peer-To-Peer Privacy

    Authors: Rajarshi Saha, Mohamed Seif, Michal Yemini, Andrea J. Goldsmith, H. Vincent Poor

    Abstract: This work considers the problem of Distributed Mean Estimation (DME) over networks with intermittent connectivity, where the goal is to learn a global statistic over the data samples localized across distributed nodes with the help of a central server. To mitigate the impact of intermittent links, nodes can collaborate with their neighbors to compute local consensus which they forward to the centr… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    Comments: 10 pages, 4 figures

  8. arXiv:2212.02459  [pdf, ps, other

    cs.RO eess.SP eess.SY

    Resilient Distributed Optimization for Multi-Agent Cyberphysical Systems

    Authors: Michal Yemini, Angelia Nedić, Andrea J. Goldsmith, Stephanie Gil

    Abstract: This work focuses on the problem of distributed optimization in multi-agent cyberphysical systems, where a legitimate agents' iterates are influenced both by the values it receives from potentially malicious neighboring agents, and by its own self-serving target function. We develop a new algorithmic and analytical framework to achieve resilience for the class of problems where stochastic values o… ▽ More

    Submitted 6 June, 2024; v1 submitted 5 December, 2022; originally announced December 2022.

  9. arXiv:2209.12285  [pdf, other

    cs.RO

    Exploiting Trust for Resilient Hypothesis Testing with Malicious Robots

    Authors: Matthew Cavorsi, Orhan Eren Akgün, Michal Yemini, Andrea Goldsmith, Stephanie Gil

    Abstract: We develop a resilient binary hypothesis testing framework for decision making in adversarial multi-robot crowdsensing tasks. This framework exploits stochastic trust observations between robots to arrive at tractable, resilient decision making at a centralized Fusion Center (FC) even when i) there exist malicious robots in the network and their number may be larger than the number of legitimate r… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

    Comments: 12 pages, 4 figures, extended version of conference submission

  10. arXiv:2209.02211  [pdf, ps, other

    cs.IT cs.LG

    Multi-Armed Bandits with Self-Information Rewards

    Authors: Nir Weinberger, Michal Yemini

    Abstract: This paper introduces the informational multi-armed bandit (IMAB) model in which at each round, a player chooses an arm, observes a symbol, and receives an unobserved reward in the form of the symbol's self-information. Thus, the expected reward of an arm is the Shannon entropy of the probability mass function of the source that generates its symbols. The player aims to maximize the expected total… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  11. arXiv:2205.10998  [pdf, other

    cs.LG cs.DC cs.MA

    Semi-Decentralized Federated Learning with Collaborative Relaying

    Authors: Michal Yemini, Rajarshi Saha, Emre Ozfatura, Deniz Gündüz, Andrea J. Goldsmith

    Abstract: We present a semi-decentralized federated learning algorithm wherein clients collaborate by relaying their neighbors' local updates to a central parameter server (PS). At every communication round to the PS, each client computes a local consensus of the updates from its neighboring clients and eventually transmits a weighted average of its own update and those of its neighbors to the PS. We approp… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: Accepted for presentation at the IEEE ISIT 2022. This is a conference version of arXiv:2202.11850

  12. arXiv:2202.13665  [pdf, other

    cs.LG eess.SP

    Restless Multi-Armed Bandits under Exogenous Global Markov Process

    Authors: Tomer Gafni, Michal Yemini, Kobi Cohen

    Abstract: We consider an extension to the restless multi-armed bandit (RMAB) problem with unknown arm dynamics, where an unknown exogenous global Markov process governs the rewards distribution of each arm. Under each global state, the rewards process of each arm evolves according to an unknown Markovian rule, which is non-identical among different arms. At each time, a player chooses an arm out of N arms t… ▽ More

    Submitted 9 October, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    Comments: Accepted for presentation at IEEE ICASSP 2022. arXiv admin note: substantial text overlap with arXiv:2112.09484

  13. arXiv:2202.11850  [pdf, other

    cs.DC cs.LG cs.MA

    Robust Federated Learning with Connectivity Failures: A Semi-Decentralized Framework with Collaborative Relaying

    Authors: Michal Yemini, Rajarshi Saha, Emre Ozfatura, Deniz Gündüz, Andrea J. Goldsmith

    Abstract: Intermittent connectivity of clients to the parameter server (PS) is a major bottleneck in federated edge learning frameworks. The lack of constant connectivity induces a large generalization gap, especially when the local data distribution amongst clients exhibits heterogeneity. To overcome intermittent communication outages between clients and the central PS, we introduce the concept of collabor… ▽ More

    Submitted 20 October, 2022; v1 submitted 23 February, 2022; originally announced February 2022.

  14. Learning in Restless Bandits under Exogenous Global Markov Process

    Authors: Tomer Gafni, Michal Yemini, Kobi Cohen

    Abstract: We consider an extension to the restless multi-armed bandit (RMAB) problem with unknown arm dynamics, where an unknown exogenous global Markov process governs the rewards distribution of each arm. Under each global state, the rewards process of each arm evolves according to an unknown Markovian rule, which is non-identical among different arms. At each time, a player chooses an arm out of $N$ arms… ▽ More

    Submitted 10 February, 2022; v1 submitted 17 December, 2021; originally announced December 2021.

    Comments: 13 pages, 6 figures. arXiv admin note: text overlap with arXiv:1906.08120

  15. arXiv:2110.01119  [pdf, ps, other

    eess.SP cs.IR cs.RO

    Cloud-Cluster Architecture for Detection in Intermittently Connected Sensor Networks

    Authors: Michal Yemini, Stephanie Gil, Andrea J. Goldsmith

    Abstract: We consider a centralized detection problem where sensors experience noisy measurements and intermittent connectivity to a centralized fusion center. The sensors collaborate locally within predefined sensor clusters and fuse their noisy sensor data to reach a common local estimate of the detected event in each cluster. The connectivity of each sensor cluster is intermittent and depends on the avai… ▽ More

    Submitted 21 August, 2022; v1 submitted 3 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in the IEEE Transactions on Wireless Communications. Preliminary results were presented in part at the IEEE Global Communications Conference 2020, arXiv:2005.12495

  16. arXiv:2103.05464  [pdf, other

    math.OC cs.RO eess.SP eess.SY

    Characterizing Trust and Resilience in Distributed Consensus for Cyberphysical Systems

    Authors: Michal Yemini, Angelia Nedić, Andrea Goldsmith, Stephanie Gil

    Abstract: This work considers the problem of resilient consensus where stochastic values of trust between agents are available. Specifically, we derive a unified mathematical framework to characterize convergence, deviation of the consensus from the true consensus value, and expected convergence rate, when there exists additional information of trust between agents. We show that under certain conditions on… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

  17. arXiv:2010.16100  [pdf, ps, other

    eess.SP cs.IT

    Interference Reduction in Virtual Cell Optimization

    Authors: Michal Yemini, Elza Erkip, Andrea J. Goldsmith

    Abstract: Virtual cell optimization clusters cells into neighborhoods and performs optimized resource allocation over each neighborhood. In prior works we proposed resource allocation schemes to mitigate the interference caused by transmissions in the same virtual cell. This work aims at mitigating both the interference caused by the transmissions of users in the same virtual cell and the interference betwe… ▽ More

    Submitted 13 November, 2021; v1 submitted 30 October, 2020; originally announced October 2020.

  18. arXiv:2005.12495  [pdf, other

    eess.SY eess.SP

    Exploiting Local and Cloud Sensor Fusion in Intermittently Connected Sensor Networks

    Authors: Michal Yemini, Stephanie Gil, Andrea Goldsmith

    Abstract: We consider a detection problem where sensors experience noisy measurements and intermittent communication opportunities to a centralized fusion center (or cloud). The objective of the problem is to arrive at the correct estimate of event detection in the environment. The sensors may communicate locally with other sensors (local clusters) where they fuse their noisy sensor data to estimate the det… ▽ More

    Submitted 21 September, 2020; v1 submitted 25 May, 2020; originally announced May 2020.

    Comments: This paper was accepted to the 2020 IEEE Global Communications Conference (IEEE GLOBECOM)

  19. arXiv:1911.03436  [pdf, other

    cs.IT eess.SP

    Virtual Cell Clustering with Optimal Resource Allocation to Maximize Capacity

    Authors: Michal Yemini, Andrea J. Goldsmith

    Abstract: This work proposes a new resource allocation optimization and network management framework for wireless networks using neighborhood-based optimization rather than fully centralized or fully decentralized methods. We propose hierarchical clustering with a minimax linkage criterion for the formation of the virtual cells. Once the virtual cells are formed, we consider two cooperation models: the inte… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1905.02891

  20. arXiv:1910.10271  [pdf, other

    cs.LG eess.SP stat.ML

    The Restless Hidden Markov Bandit with Linear Rewards and Side Information

    Authors: Michal Yemini, Amir Leshem, Anelia Somekh-Baruch

    Abstract: In this paper we present a model for the hidden Markovian bandit problem with linear rewards. As opposed to current work on Markovian bandits, we do not assume that the state is known to the decision maker before making the decision. Furthermore, we assume structural side information where the decision maker knows in advance that there are two types of hidden states; one is common to all arms and… ▽ More

    Submitted 21 January, 2021; v1 submitted 22 October, 2019; originally announced October 2019.

    Comments: Accepted for publication in the IEEE Transactions on Signal Processing. A summary of the results presented in this paper was accepted to the 59th Conference on Decision and Control (CDC 2020)

  21. arXiv:1905.02891  [pdf, other

    cs.IT

    Virtual Cell Clustering with Optimal Resource Allocation to Maximize Cellular System Capacity

    Authors: Michal Yemini, Andrea J. Goldsmith

    Abstract: This work presents a new network optimization framework for cellular networks using neighborhood-based optimization. Under this optimization framework resources are allocated within virtual cells encompassing several base-stations and the users within their coverage areas. We form the virtual cells using hierarchical clustering with a minimax linkage criterion given a particular number of such cel… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: arXiv admin note: text overlap with arXiv:1901.06669, arXiv:1905.02184

  22. arXiv:1905.02184  [pdf, other

    cs.IT

    Optimal Resource Allocation for Cellular Networks with Virtual Cell Joint Decoding

    Authors: Michal Yemini, Andrea J. Goldsmith

    Abstract: This work presents a new resource allocation optimization framework for cellular networks using neighborhood-based optimization. Under this optimization framework resources are allocated within virtual cells encompassing several base-stations and the users within their coverage area. Incorporating the virtual cell concept enables the utilization of more sophisticated cooperative communication sche… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: Accepted to the International Symposium on Information Theory (ISIT-2019)

  23. arXiv:1901.06669  [pdf, other

    cs.IT

    "Fog" Optimization via Virtual Cells in Cellular Network Resource Allocation

    Authors: Michal Yemini, Andrea J. Goldsmith

    Abstract: This work proposes a new resource allocation optimization framework for cellular networks using "fog" or neighborhood-based optimization rather than fully centralized or fully decentralized methods. In neighborhood-based optimization resources are allocated within virtual cells encompassing several base-stations and the users within their coverage area. As the number of base-stations within a virt… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

  24. Phase Noise Compensation for OFDM Systems

    Authors: Amir Leshem, Michal Yemini

    Abstract: We describe a low complexity method for time domain compensation of phase noise in OFDM systems. We extend existing methods in several respects. First we suggest using the Karhunen-Loéve representation of the phase noise process to estimate the phase noise. We then derive an improved datadirected choice of basis elements for LS phase noise estimation and present its total least square counterpart… ▽ More

    Submitted 17 August, 2017; originally announced August 2017.

    Comments: This paper was accepted for publication in IEEE Transactions on Signal Processing

  25. arXiv:1601.04471  [pdf, other

    cs.NI math.PR

    On Simultaneous Percolation with Two Disk Types

    Authors: Michal Yemini, Anelia Somekh-Baruch, Reuven Cohen, Amir Leshem

    Abstract: In this paper we consider the simultaneous percolation of two Gilbert disk models. The two models are connected through excluding disks, which prevent elements of the second model to be in the vicinity of the first model. Under these assumptions we characterize the region of densities in which the two models both have a unique infinite connected component. The motivation for this work is the co-ex… ▽ More

    Submitted 9 August, 2016; v1 submitted 18 January, 2016; originally announced January 2016.

  26. arXiv:1503.08413  [pdf, other

    cs.IT

    On the Multiple Access Channel with Asynchronous Cognition

    Authors: Michal Yemini, Anelia Somekh-Baruch, Amir Leshem

    Abstract: In this paper we introduce the two-user asynchronous cognitive multiple access channel (ACMAC). This channel model includes two transmitters, an uninformed one, and an informed one which knows prior to the beginning of a transmission the message which the uninformed transmitter is about to send. We assume that the channel from the uninformed transmitter to the receiver suffers a fixed but unknown… ▽ More

    Submitted 9 August, 2016; v1 submitted 29 March, 2015; originally announced March 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1402.1617

  27. Asynchronous Transmission over Single-User State-Dependent Channels

    Authors: Michal Yemini, Anelia Somekh-Baruch, Amir Leshem

    Abstract: Several channels with asynchronous side information are introduced. We first consider single-user state-dependent channels with asynchronous side information at the transmitter. It is assumed that the state information sequence is a possibly delayed version of the state sequence, and that the encoder and the decoder are aware of the fact that the state information might be delayed. It is additiona… ▽ More

    Submitted 29 March, 2015; v1 submitted 7 February, 2014; originally announced February 2014.

    Comments: The paper "On channels with asynchronous side information" was split into two separate papers: the enclosed paper which considers only point-to-point channels and an additional paper named "On the multiple access channel with asynchronous cognition" which discusses the multiuser setups