-
Compressed Sensor Caching and Collaborative Sparse Data Recovery with Anchor Alignment
Authors:
Yi-Jen Yang,
Ming-Hsun Yang,
Jwo-Yuh Wu,
Y. -W. Peter Hong
Abstract:
This work examines the compressed sensor caching problem in wireless sensor networks and devises efficient distributed sparse data recovery algorithms to enable collaboration among multiple caches. In this problem, each cache is only allowed to access measurements from a small subset of sensors within its vicinity to reduce both cache size and data acquisition overhead. To enable reliable data rec…
▽ More
This work examines the compressed sensor caching problem in wireless sensor networks and devises efficient distributed sparse data recovery algorithms to enable collaboration among multiple caches. In this problem, each cache is only allowed to access measurements from a small subset of sensors within its vicinity to reduce both cache size and data acquisition overhead. To enable reliable data recovery with limited access to measurements, we propose a distributed sparse data recovery method, called the collaborative sparse recovery by anchor alignment (CoSR-AA) algorithm, where collaboration among caches is enabled by aligning their locally recovered data at a few anchor nodes. The proposed algorithm is based on the consensus alternating direction method of multipliers (ADMM) algorithm but with message exchange that is reduced by considering the proposed anchor alignment strategy. Then, by the deep unfolding of the ADMM iterations, we further propose the Deep CoSR-AA algorithm that can be used to significantly reduce the number of iterations. We obtain a graph neural network architecture where message exchange is done more efficiently by an embedded autoencoder. Simulations are provided to demonstrate the effectiveness of the proposed collaborative recovery algorithms in terms of the improved reconstruction quality and the reduced communication overhead due to anchor alignment.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
A Mathematical Theory for Learning Semantic Languages by Abstract Learners
Authors:
Kuo-Yu Liao,
Cheng-Shang Chang,
Y. -W. Peter Hong
Abstract:
Recent advances in Large Language Models (LLMs) have demonstrated the emergence of capabilities (learned skills) when the number of system parameters and the size of training data surpass certain thresholds. The exact mechanisms behind such phenomena are not fully understood and remain a topic of active research. Inspired by the skill-text bipartite graph model proposed by Arora and Goyal for mode…
▽ More
Recent advances in Large Language Models (LLMs) have demonstrated the emergence of capabilities (learned skills) when the number of system parameters and the size of training data surpass certain thresholds. The exact mechanisms behind such phenomena are not fully understood and remain a topic of active research. Inspired by the skill-text bipartite graph model proposed by Arora and Goyal for modeling semantic languages, we develop a mathematical theory to explain the emergence of learned skills, taking the learning (or training) process into account. Our approach models the learning process for skills in the skill-text bipartite graph as an iterative decoding process in Low-Density Parity Check (LDPC) codes and Irregular Repetition Slotted ALOHA (IRSA). Using density evolution analysis, we demonstrate the emergence of learned skills when the ratio of the number of training texts to the number of skills exceeds a certain threshold. Our analysis also yields a scaling law for testing errors relative to this ratio. Upon completion of the training, the association of learned skills can also be acquired to form a skill association graph. We use site percolation analysis to derive the conditions for the existence of a giant component in the skill association graph. Our analysis can also be extended to the setting with a hierarchy of skills, where a fine-tuned model is built upon a foundation model. It is also applicable to the setting with multiple classes of skills and texts. As an important application, we propose a method for semantic compression and discuss its connections to semantic communication.
△ Less
Submitted 15 May, 2024; v1 submitted 10 April, 2024;
originally announced April 2024.
-
An Attribute-Aligned Strategy for Learning Speech Representation
Authors:
Yu-Lin Huang,
Bo-Hao Su,
Y. -W. Peter Hong,
Chi-Chun Lee
Abstract:
Advancement in speech technology has brought convenience to our life. However, the concern is on the rise as speech signal contains multiple personal attributes, which would lead to either sensitive information leakage or bias toward decision. In this work, we propose an attribute-aligned learning strategy to derive speech representation that can flexibly address these issues by attribute-selectio…
▽ More
Advancement in speech technology has brought convenience to our life. However, the concern is on the rise as speech signal contains multiple personal attributes, which would lead to either sensitive information leakage or bias toward decision. In this work, we propose an attribute-aligned learning strategy to derive speech representation that can flexibly address these issues by attribute-selection mechanism. Specifically, we propose a layered-representation variational autoencoder (LR-VAE), which factorizes speech representation into attribute-sensitive nodes, to derive an identity-free representation for speech emotion recognition (SER), and an emotionless representation for speaker verification (SV). Our proposed method achieves competitive performances on identity-free SER and a better performance on emotionless SV, comparing to the current state-of-the-art method of using adversarial learning applied on a large emotion corpora, the MSP-Podcast. Also, our proposed learning strategy reduces the model and training process needed to achieve multiple privacy-preserving tasks.
△ Less
Submitted 8 September, 2021; v1 submitted 5 June, 2021;
originally announced June 2021.
-
Sparse Affine Sampling: Ambiguity-Free and Efficient Sparse Phase Retrieval
Authors:
Ming-Hsun Yang,
Y. -W. Peter Hong,
Jwo-Yuh Wu
Abstract:
Conventional sparse phase retrieval schemes can recover sparse signals from the magnitude of linear measurements only up to a global phase ambiguity. This work proposes a novel approach that instead utilizes the magnitude of affine measurements to achieve ambiguity-free signal reconstruction. The proposed method relies on two-stage approach that consists of support identification followed by the e…
▽ More
Conventional sparse phase retrieval schemes can recover sparse signals from the magnitude of linear measurements only up to a global phase ambiguity. This work proposes a novel approach that instead utilizes the magnitude of affine measurements to achieve ambiguity-free signal reconstruction. The proposed method relies on two-stage approach that consists of support identification followed by the exact recovery of nonzero signal entries. In the noise-free case, perfect support identification using a simple counting rule is guaranteed subject to a mild condition on the signal sparsity, and subsequent exact recovery of the nonzero signal entries can be obtained in closed-form. The proposed approach is then extended to two noisy scenarios, namely, sparse noise (or outliers) and non-sparse bounded noise. For both cases, perfect support identification is still ensured under mild conditions on the noise model, namely, the support size for sparse outliers and the power of the bounded noise. Under perfect support identification, exact signal recovery can be achieved using a simple majority rule for the sparse noise scenario, and reconstruction up to a bounded error can be achieved using linear least-squares (LS) estimation for the non-sparse bounded noise scenario. The obtained analytic performance guarantee for the latter case also sheds light on the construction of the sensing matrix and bias vector. In fact, we show that a near optimal performance can be achieved with high probability by the random generation of the nonzero entries of the sparse sensing matrix and bias vector according to the uniform distribution over a circle. Computer simulations using both synthetic and real-world data sets are provided to demonstrate the effectiveness of the proposed scheme.
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
On the Role of Artificial Noise in Training and Data Transmission for Secret Communications
Authors:
Ta-Yuan Liu,
Shih-Chun Lin,
Y. -W. Peter Hong
Abstract:
This work considers the joint design of training and data transmission in physical-layer secret communication systems, and examines the role of artificial noise (AN) in both of these phases. In particular, AN in the training phase is used to prevent the eavesdropper from obtaining accurate channel state information (CSI) whereas AN in the data transmission phase can be used to mask the transmissio…
▽ More
This work considers the joint design of training and data transmission in physical-layer secret communication systems, and examines the role of artificial noise (AN) in both of these phases. In particular, AN in the training phase is used to prevent the eavesdropper from obtaining accurate channel state information (CSI) whereas AN in the data transmission phase can be used to mask the transmission of the confidential message. By considering AN-assisted training and secrecy beamforming schemes, we first derive bounds on the achievable secrecy rate and obtain a closed-form approximation that is asymptotically tight at high SNR. Then, by maximizing the approximate achievable secrecy rate, the optimal power allocation between signal and AN in both training and data transmission phases is obtained for both conventional and AN-assisted training based schemes. We show that the use of AN is necessary to achieve a high secrecy rate at high SNR, and its use in the training phase can be more efficient than that in the data transmission phase when the coherence time is large. However, at low SNR, the use of AN provides no advantage since CSI is difficult to obtain in this case. Numerical results are presented to verify our theoretical claims.
△ Less
Submitted 5 November, 2015;
originally announced November 2015.
-
Optimized Random Deployment of Energy Harvesting Sensors for Field Reconstruction in Analog and Digital Forwarding Systems
Authors:
Teng-Cheng Hsu,
Y. -W. Peter Hong,
Tsang-Yi Wang
Abstract:
This work examines the large-scale deployment of energy harvesting sensors for the purpose of sensing and reconstruction of a spatially correlated Gaussian random field. The sensors are powered solely by energy harvested from the environment and are deployed randomly according to a spatially nonhomogeneous Poisson point process whose density depends on the energy arrival statistics at different lo…
▽ More
This work examines the large-scale deployment of energy harvesting sensors for the purpose of sensing and reconstruction of a spatially correlated Gaussian random field. The sensors are powered solely by energy harvested from the environment and are deployed randomly according to a spatially nonhomogeneous Poisson point process whose density depends on the energy arrival statistics at different locations. Random deployment is suitable for applications that require deployment over a wide and/or hostile area. During an observation period, each sensor takes a local sample of the random field and reports the data to the closest data-gathering node if sufficient energy is available for transmission. The realization of the random field is then reconstructed at the fusion center based on the reported sensor measurements. For the purpose of field reconstruction, the sensors should, on the one hand, be more spread out over the field to gather more informative samples, but should, on the other hand, be more concentrated at locations with high energy arrival rates or large channel gains toward the closest data-gathering node. This tradeoff is exploited in the optimization of the random sensor deployment in both analog and digital forwarding systems. More specifically, given the statistics of the energy arrival at different locations and a constraint on the average number of sensors, the spatially-dependent sensor density and the energy-aware transmission policy at the sensors are determined for both cases by minimizing an upper bound on the average mean-square reconstruction error. The efficacy of the proposed schemes are demonstrated through numerical simulations.
△ Less
Submitted 19 May, 2015;
originally announced May 2015.
-
Coordinated Multicasting with Opportunistic User Selection in Multicell Wireless Systems
Authors:
Y. -W. Peter Hong,
Wei-Chiang Li,
Tsung-Hui Chang,
Chia-Han Lee
Abstract:
Physical layer multicasting with opportunistic user selection (OUS) is examined for multicell multi-antenna wireless systems. By adopting a two-layer encoding scheme, a rate-adaptive channel code is applied in each fading block to enable successful decoding by a chosen subset of users (which varies over different blocks) and an application layer erasure code is employed across multiple blocks to e…
▽ More
Physical layer multicasting with opportunistic user selection (OUS) is examined for multicell multi-antenna wireless systems. By adopting a two-layer encoding scheme, a rate-adaptive channel code is applied in each fading block to enable successful decoding by a chosen subset of users (which varies over different blocks) and an application layer erasure code is employed across multiple blocks to ensure that every user is able to recover the message after decoding successfully in a sufficient number of blocks. The transmit signal and code-rate in each block determine opportunistically the subset of users that are able to successfully decode and can be chosen to maximize the long-term multicast efficiency. The employment of OUS not only helps avoid rate-limitations caused by the user with the worst channel, but also helps coordinate interference among different cells and multicast groups. In this work, efficient algorithms are proposed for the design of the transmit covariance matrices, the physical layer code-rates, and the target user subsets in each block. In the single group scenario, the system parameters are determined by maximizing the group-rate, defined as the physical layer code-rate times the fraction of users that can successfully decode in each block. In the multi-group scenario, the system parameters are determined by considering a group-rate balancing optimization problem, which is solved by a successive convex approximation (SCA) approach. To further reduce the feedback overhead, we also consider the case where only part of the users feed back their channel vectors in each block and propose a design based on the balancing of the expected group-rates. In addition to SCA, a sample average approximation technique is also introduced to handle the probabilistic terms arising in this problem. The effectiveness of the proposed schemes is demonstrated by computer simulations.
△ Less
Submitted 15 April, 2015;
originally announced April 2015.
-
Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems
Authors:
Chao-Wei Huang,
Tsung-Hui Chang,
Xiangyun Zhou,
Y. -W. Peter Hong
Abstract:
This work examines the use of two-way training to efficiently discriminate the channel estimation performances at a legitimate receiver (LR) and an unauthorized receiver (UR) in a multiple-input multiple-output (MIMO) wireless system. This work improves upon the original discriminatory channel estimation (DCE) scheme proposed by Chang et al where multiple stages of feedback and retraining were use…
▽ More
This work examines the use of two-way training to efficiently discriminate the channel estimation performances at a legitimate receiver (LR) and an unauthorized receiver (UR) in a multiple-input multiple-output (MIMO) wireless system. This work improves upon the original discriminatory channel estimation (DCE) scheme proposed by Chang et al where multiple stages of feedback and retraining were used. While most studies on physical layer secrecy are under the information-theoretic framework and focus directly on the data transmission phase, studies on DCE focus on the training phase and aim to provide a practical signal processing technique to discriminate between the channel estimation performances at LR and UR. A key feature of DCE designs is the insertion of artificial noise (AN) in the training signal to degrade the channel estimation performance at UR. To do so, AN must be placed in a carefully chosen subspace based on the transmitter's knowledge of LR's channel in order to minimize its effect on LR. In this paper, we adopt the idea of two-way training that allows both the transmitter and LR to send training signals to facilitate channel estimation at both ends. Both reciprocal and non-reciprocal channels are considered and a two-way DCE scheme is proposed for each scenario. {For mathematical tractability, we assume that all terminals employ the linear minimum mean square error criterion for channel estimation. Based on the mean square error (MSE) of the channel estimates at all terminals,} we formulate and solve an optimization problem where the optimal power allocation between the training signal and AN is found by minimizing the MSE of LR's channel estimate subject to a constraint on the MSE achievable at UR. Numerical results show that the proposed DCE schemes can effectively discriminate between the channel estimation and hence the data detection performances at LR and UR.
△ Less
Submitted 19 January, 2013;
originally announced January 2013.
-
Clean relaying aided cognitive radio under the coexistence constraint
Authors:
Pin-Hsun Lin,
Shih-Chun Lin,
Hsuan-Jung Su,
Y. -W. Peter Hong
Abstract:
We consider the interference-mitigation based cognitive radio where the primary and secondary users can coexist at the same time and frequency bands, under the constraint that the rate of the primary user (PU) must remain the same with a single-user decoder. To meet such a coexistence constraint, the relaying from the secondary user (SU) can help the PU's transmission under the interference from t…
▽ More
We consider the interference-mitigation based cognitive radio where the primary and secondary users can coexist at the same time and frequency bands, under the constraint that the rate of the primary user (PU) must remain the same with a single-user decoder. To meet such a coexistence constraint, the relaying from the secondary user (SU) can help the PU's transmission under the interference from the SU. However, the relayed signal in the known dirty paper coding (DPC) based scheme is interfered by the SU's signal, and is not "clean". In this paper, under the half-duplex constraints, we propose two new transmission schemes aided by the clean relaying from the SU's transmitter and receiver without interference from the SU. We name them as the clean transmitter relaying (CT) and clean transmitter-receiver relaying (CTR) aided cognitive radio, respectively. The rate and multiplexing gain performances of CT and CTR in fading channels with various availabilities of the channel state information at the transmitters (CSIT) are studied. Our CT generalizes the celebrated DPC based scheme proposed previously. With full CSIT, the multiplexing gain of the CTR is proved to be better (or no less) than that of the previous DPC based schemes. This is because the silent period for decoding the PU's messages for the DPC may not be necessary in the CTR. With only the statistics of CSIT, we further prove that the CTR outperforms the rate performance of the previous scheme in fast Rayleigh fading channels. The numerical examples also show that in a large class of channels, the proposed CT and CTR provide significant rate gains over the previous scheme with small complexity penalties.
△ Less
Submitted 18 April, 2011;
originally announced April 2011.