-
Probabilistic and Differentiable Wireless Simulation with Geometric Transformers
Authors:
Thomas Hehn,
Markus Peschl,
Tribhuvanesh Orekondy,
Arash Behboodi,
Johann Brehmer
Abstract:
Modelling the propagation of electromagnetic signals is critical for designing modern communication systems. While there are precise simulators based on ray tracing, they do not lend themselves to solving inverse problems or the integration in an automated design loop. We propose to address these challenges through differentiable neural surrogates that exploit the geometric aspects of the problem.…
▽ More
Modelling the propagation of electromagnetic signals is critical for designing modern communication systems. While there are precise simulators based on ray tracing, they do not lend themselves to solving inverse problems or the integration in an automated design loop. We propose to address these challenges through differentiable neural surrogates that exploit the geometric aspects of the problem. We first introduce the Wireless Geometric Algebra Transformer (Wi-GATr), a generic backbone architecture for simulating wireless propagation in a 3D environment. It uses versatile representations based on geometric algebra and is equivariant with respect to E(3), the symmetry group of the underlying physics. Second, we study two algorithmic approaches to signal prediction and inverse problems based on differentiable predictive modelling and diffusion models. We show how these let us predict received power, localize receivers, and reconstruct the 3D environment from the received signal. Finally, we introduce two large, geometry-focused datasets of wireless signal propagation in indoor scenes. In experiments, we show that our geometry-forward approach achieves higher-fidelity predictions with less data than various baselines.
△ Less
Submitted 21 June, 2024;
originally announced June 2024.
-
Simulating, Fast and Slow: Learning Policies for Black-Box Optimization
Authors:
Fabio Valerio Massoli,
Tim Bakker,
Thomas Hehn,
Tribhuvanesh Orekondy,
Arash Behboodi
Abstract:
In recent years, solving optimization problems involving black-box simulators has become a point of focus for the machine learning community due to their ubiquity in science and engineering. The simulators describe a forward process $f_{\mathrm{sim}}: (ψ, x) \rightarrow y$ from simulation parameters $ψ$ and input data $x$ to observations $y$, and the goal of the optimization problem is to find par…
▽ More
In recent years, solving optimization problems involving black-box simulators has become a point of focus for the machine learning community due to their ubiquity in science and engineering. The simulators describe a forward process $f_{\mathrm{sim}}: (ψ, x) \rightarrow y$ from simulation parameters $ψ$ and input data $x$ to observations $y$, and the goal of the optimization problem is to find parameters $ψ$ that minimize a desired loss function. Sophisticated optimization algorithms typically require gradient information regarding the forward process, $f_{\mathrm{sim}}$, with respect to the parameters $ψ$. However, obtaining gradients from black-box simulators can often be prohibitively expensive or, in some cases, impossible. Furthermore, in many applications, practitioners aim to solve a set of related problems. Thus, starting the optimization ``ab initio", i.e. from scratch, each time might be inefficient if the forward model is expensive to evaluate. To address those challenges, this paper introduces a novel method for solving classes of similar black-box optimization problems by learning an active learning policy that guides a differentiable surrogate's training and uses the surrogate's gradients to optimize the simulation parameters with gradient descent. After training the policy, downstream optimization of problems involving black-box simulators requires up to $\sim$90\% fewer expensive simulator calls compared to baselines such as local surrogate-based approaches, numerical optimization, and Bayesian methods.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Transformer-Based Neural Surrogate for Link-Level Path Loss Prediction from Variable-Sized Maps
Authors:
Thomas M. Hehn,
Tribhuvanesh Orekondy,
Ori Shental,
Arash Behboodi,
Juan Bucheli,
Akash Doshi,
June Namgoong,
Taesang Yoo,
Ashwin Sampath,
Joseph B. Soriaga
Abstract:
Estimating path loss for a transmitter-receiver location is key to many use-cases including network planning and handover. Machine learning has become a popular tool to predict wireless channel properties based on map data. In this work, we present a transformer-based neural network architecture that enables predicting link-level properties from maps of various dimensions and from sparse measureme…
▽ More
Estimating path loss for a transmitter-receiver location is key to many use-cases including network planning and handover. Machine learning has become a popular tool to predict wireless channel properties based on map data. In this work, we present a transformer-based neural network architecture that enables predicting link-level properties from maps of various dimensions and from sparse measurements. The map contains information about buildings and foliage. The transformer model attends to the regions that are relevant for path loss prediction and, therefore, scales efficiently to maps of different size. Further, our approach works with continuous transmitter and receiver coordinates without relying on discretization. In experiments, we show that the proposed model is able to efficiently learn dominant path losses from sparse training data and generalizes well when tested on novel maps.
△ Less
Submitted 10 October, 2023; v1 submitted 6 October, 2023;
originally announced October 2023.
-
How do Cross-View and Cross-Modal Alignment Affect Representations in Contrastive Learning?
Authors:
Thomas M. Hehn,
Julian F. P. Kooij,
Dariu M. Gavrila
Abstract:
Various state-of-the-art self-supervised visual representation learning approaches take advantage of data from multiple sensors by aligning the feature representations across views and/or modalities. In this work, we investigate how aligning representations affects the visual features obtained from cross-view and cross-modal contrastive learning on images and point clouds. On five real-world datas…
▽ More
Various state-of-the-art self-supervised visual representation learning approaches take advantage of data from multiple sensors by aligning the feature representations across views and/or modalities. In this work, we investigate how aligning representations affects the visual features obtained from cross-view and cross-modal contrastive learning on images and point clouds. On five real-world datasets and on five tasks, we train and evaluate 108 models based on four pretraining variations. We find that cross-modal representation alignment discards complementary visual information, such as color and texture, and instead emphasizes redundant depth cues. The depth cues obtained from pretraining improve downstream depth prediction performance. Also overall, cross-modal alignment leads to more robust encoders than pre-training by cross-view alignment, especially on depth prediction, instance segmentation, and object detection.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
Hearing What You Cannot See: Acoustic Vehicle Detection Around Corners
Authors:
Yannick Schulz,
Avinash Kini Mattar,
Thomas M. Hehn,
Julian F. P. Kooij
Abstract:
This work proposes to use passive acoustic perception as an additional sensing modality for intelligent vehicles. We demonstrate that approaching vehicles behind blind corners can be detected by sound before such vehicles enter in line-of-sight. We have equipped a research vehicle with a roof-mounted microphone array, and show on data collected with this sensor setup that wall reflections provide…
▽ More
This work proposes to use passive acoustic perception as an additional sensing modality for intelligent vehicles. We demonstrate that approaching vehicles behind blind corners can be detected by sound before such vehicles enter in line-of-sight. We have equipped a research vehicle with a roof-mounted microphone array, and show on data collected with this sensor setup that wall reflections provide information on the presence and direction of occluded approaching vehicles. A novel method is presented to classify if and from what direction a vehicle is approaching before it is visible, using as input Direction-of-Arrival features that can be efficiently computed from the streaming microphone array data. Since the local geometry around the ego-vehicle affects the perceived patterns, we systematically study several environment types, and investigate generalization across these environments. With a static ego-vehicle, an accuracy of 0.92 is achieved on the hidden vehicle classification task. Compared to a state-of-the-art visual detector, Faster R-CNN, our pipeline achieves the same accuracy more than one second ahead, providing crucial reaction time for the situations we study. While the ego-vehicle is driving, we demonstrate positive results on acoustic detection, still achieving an accuracy of 0.84 within one environment type. We further study failure cases across environments to identify future research directions.
△ Less
Submitted 25 February, 2021; v1 submitted 30 July, 2020;
originally announced July 2020.
-
A Security Credential Management System for V2X Communications
Authors:
Benedikt Brecht,
Dean Therriault,
André Weimerskirch,
William Whyte,
Virendra Kumar,
Thorsten Hehn,
Roy Goudy
Abstract:
The US Department of Transportation (USDOT) issued a proposed rule on January 12th, 2017 to mandate vehicle-to-vehicle (V2V) safety communications in light vehicles in the US. Cybersecurity and privacy are major challenges for such a deployment. The authors present a Security Credential Management System (SCMS) for vehicle-to-everything (V2X) communications in this paper, which has been developed…
▽ More
The US Department of Transportation (USDOT) issued a proposed rule on January 12th, 2017 to mandate vehicle-to-vehicle (V2V) safety communications in light vehicles in the US. Cybersecurity and privacy are major challenges for such a deployment. The authors present a Security Credential Management System (SCMS) for vehicle-to-everything (V2X) communications in this paper, which has been developed by the Crash Avoidance Metrics Partners LLC (CAMP) under a Cooperative Agreement with the USDOT. This system design is currently transitioning from research to Proof-of-Concept, and is a leading candidate to support the establishment of a nationwide Public Key Infrastructure (PKI) for V2X security. It issues digital certificates to participating vehicles and infrastructure nodes for trustworthy communications among them, which is necessary for safety and mobility applications that are based on V2X communications. The main design goal is to provide both security and privacy to the largest extent reasonable and possible. To achieve a reasonable level of privacy in this context, vehicles are issued pseudonym certificates, and the generation and provisioning of those certificates are divided among multiple organizations. Given the large number of pseudonym certificates per vehicle, one of the main challenges is to facilitate efficient revocation of misbehaving or malfunctioning vehicles, while preserving privacy against attacks from insiders. The proposed SCMS supports all identified V2X use-cases and certificate types necessary for V2X communication security.
This paper is based upon work supported by the USDOT. Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the Authors ("we") and do not necessarily reflect the view of the USDOT.
△ Less
Submitted 14 February, 2018;
originally announced February 2018.
-
End-to-end Learning of Deterministic Decision Trees
Authors:
Thomas Hehn,
Fred A. Hamprecht
Abstract:
Conventional decision trees have a number of favorable properties, including interpretability, a small computational footprint and the ability to learn from little training data. However, they lack a key quality that has helped fuel the deep learning revolution: that of being end-to-end trainable, and to learn from scratch those features that best allow to solve a given supervised learning problem…
▽ More
Conventional decision trees have a number of favorable properties, including interpretability, a small computational footprint and the ability to learn from little training data. However, they lack a key quality that has helped fuel the deep learning revolution: that of being end-to-end trainable, and to learn from scratch those features that best allow to solve a given supervised learning problem. Recent work (Kontschieder 2015) has addressed this deficit, but at the cost of losing a main attractive trait of decision trees: the fact that each sample is routed along a small subset of tree nodes only. We here propose a model and Expectation-Maximization training scheme for decision trees that are fully probabilistic at train time, but after a deterministic annealing process become deterministic at test time. We also analyze the learned oblique split parameters on image datasets and show that Neural Networks can be trained at each split node. In summary, we present the first end-to-end learning scheme for deterministic decision trees and present results on par with or superior to published standard oblique decision tree algorithms.
△ Less
Submitted 7 December, 2017;
originally announced December 2017.
-
Multiple-Bases Belief-Propagation Decoding of High-Density Cyclic Codes
Authors:
Thorsten Hehn,
Johannes B. Huber,
Olgica Milenkovic,
Stefan Laendner
Abstract:
We introduce a new method for decoding short and moderate length linear block codes with dense parity-check matrix representations of cyclic form, termed multiple-bases belief-propagation (MBBP). The proposed iterative scheme makes use of the fact that a code has many structurally diverse parity-check matrices, capable of detecting different error patterns. We show that this inherent code proper…
▽ More
We introduce a new method for decoding short and moderate length linear block codes with dense parity-check matrix representations of cyclic form, termed multiple-bases belief-propagation (MBBP). The proposed iterative scheme makes use of the fact that a code has many structurally diverse parity-check matrices, capable of detecting different error patterns. We show that this inherent code property leads to decoding algorithms with significantly better performance when compared to standard BP decoding. Furthermore, we describe how to choose sets of parity-check matrices of cyclic form amenable for multiple-bases decoding, based on analytical studies performed for the binary erasure channel. For several cyclic and extended cyclic codes, the MBBP decoding performance can be shown to closely follow that of maximum-likelihood decoders.
△ Less
Submitted 1 May, 2009;
originally announced May 2009.
-
MBBP for improved iterative channel decoding in 802.16e WiMAX systems
Authors:
Thorsten Hehn,
Johannes B. Huber,
Stefan Laendner
Abstract:
We propose the application of multiple-bases belief-propagation, an optimized iterative decoding method, to a set of rate-1/2 LDPC codes from the IEEE 802.16e WiMAX standard. The presented approach allows for improved decoding performance when signaling over the AWGN channel. As all required operations for this method can be run in parallel, the decoding delay of this method and standard belief-…
▽ More
We propose the application of multiple-bases belief-propagation, an optimized iterative decoding method, to a set of rate-1/2 LDPC codes from the IEEE 802.16e WiMAX standard. The presented approach allows for improved decoding performance when signaling over the AWGN channel. As all required operations for this method can be run in parallel, the decoding delay of this method and standard belief-propagation decoding are equal. The obtained results are compared to the performance of LDPC codes optimized with the progressive edge-growth algorithm and to bounds from information theory. It will be shown that the discussed method mitigates the gap to the well-known random coding bound by about 20 percent.
△ Less
Submitted 8 September, 2008;
originally announced September 2008.
-
The lowest-possible BER and FER for any discrete memoryless channel with given capacity
Authors:
Johannes B. Huber,
Thorsten Hehn
Abstract:
We investigate properties of a channel coding scheme leading to the minimum-possible frame error ratio when transmitting over a memoryless channel with rate R>C. The results are compared to the well-known properties of a channel coding scheme leading to minimum bit error ratio. It is concluded that these two optimization requests are contradicting. A valuable application of the derived results i…
▽ More
We investigate properties of a channel coding scheme leading to the minimum-possible frame error ratio when transmitting over a memoryless channel with rate R>C. The results are compared to the well-known properties of a channel coding scheme leading to minimum bit error ratio. It is concluded that these two optimization requests are contradicting. A valuable application of the derived results is presented.
△ Less
Submitted 20 March, 2009; v1 submitted 7 January, 2008;
originally announced January 2008.
-
Permutation Decoding and the Stop** Redundancy Hierarchy of Cyclic and Extended Cyclic Codes
Authors:
Thorsten Hehn,
Olgica Milenkovic,
Stefan Laendner,
Johannes B. Huber
Abstract:
We introduce the notion of the stop** redundancy hierarchy of a linear block code as a measure of the trade-off between performance and complexity of iterative decoding for the binary erasure channel. We derive lower and upper bounds for the stop** redundancy hierarchy via Lovasz's Local Lemma and Bonferroni-type inequalities, and specialize them for codes with cyclic parity-check matrices.…
▽ More
We introduce the notion of the stop** redundancy hierarchy of a linear block code as a measure of the trade-off between performance and complexity of iterative decoding for the binary erasure channel. We derive lower and upper bounds for the stop** redundancy hierarchy via Lovasz's Local Lemma and Bonferroni-type inequalities, and specialize them for codes with cyclic parity-check matrices. Based on the observed properties of parity-check matrices with good stop** redundancy characteristics, we develop a novel decoding technique, termed automorphism group decoding, that combines iterative message passing and permutation decoding. We also present bounds on the smallest number of permutations of an automorphism group decoder needed to correct any set of erasures up to a prescribed size. Simulation results demonstrate that for a large number of algebraic codes, the performance of the new decoding method is close to that of maximum likelihood decoding.
△ Less
Submitted 3 July, 2008; v1 submitted 7 August, 2007;
originally announced August 2007.
-
Permutation Decoding and the Stop** Redundancy Hierarchy of Linear Block Codes
Authors:
Thorsten Hehn,
Olgica Milenkovic,
Stefan Laendner,
Johannes B. Huber
Abstract:
We investigate the stop** redundancy hierarchy of linear block codes and its connection to permutation decoding techniques. An element in the ordered list of stop** redundancy values represents the smallest number of possibly linearly dependent rows in any parity-check matrix of a code that avoids stop** sets of a given size. Redundant parity-check equations can be shown to have a similar…
▽ More
We investigate the stop** redundancy hierarchy of linear block codes and its connection to permutation decoding techniques. An element in the ordered list of stop** redundancy values represents the smallest number of possibly linearly dependent rows in any parity-check matrix of a code that avoids stop** sets of a given size. Redundant parity-check equations can be shown to have a similar effect on decoding performance as permuting the coordinates of the received codeword according to a selected set of automorphisms of the code. Based on this finding we develop new decoding strategies for data transmission over the binary erasure channel that combine iterative message passing and permutation decoding in order to avoid errors confined to stop** sets. We also introduce the notion of s-SAD sets, containing the smallest number of automorphisms of a code with the property that they move any set of not more than s erasures into positions that do not correspond to stop** sets within a judiciously chosen parity-check matrix.
△ Less
Submitted 13 February, 2007; v1 submitted 8 February, 2007;
originally announced February 2007.
-
The Trap** Redundancy of Linear Block Codes
Authors:
Stefan Laendner,
Thorsten Hehn,
Olgica Milenkovic,
Johannes B. Huber
Abstract:
We generalize the notion of the stop** redundancy in order to study the smallest size of a trap** set in Tanner graphs of linear block codes. In this context, we introduce the notion of the trap** redundancy of a code, which quantifies the relationship between the number of redundant rows in any parity-check matrix of a given code and the size of its smallest trap** set. Trap** sets wi…
▽ More
We generalize the notion of the stop** redundancy in order to study the smallest size of a trap** set in Tanner graphs of linear block codes. In this context, we introduce the notion of the trap** redundancy of a code, which quantifies the relationship between the number of redundant rows in any parity-check matrix of a given code and the size of its smallest trap** set. Trap** sets with certain parameter sizes are known to cause error-floors in the performance curves of iterative belief propagation decoders, and it is therefore important to identify decoding matrices that avoid such sets. Bounds on the trap** redundancy are obtained using probabilistic and constructive methods, and the analysis covers both general and elementary trap** sets. Numerical values for these bounds are computed for the [2640,1320] Margulis code and the class of projective geometry codes, and compared with some new code-specific trap** set size estimates.
△ Less
Submitted 17 September, 2008; v1 submitted 30 December, 2006;
originally announced January 2007.