-
Riemannian Langevin Monte Carlo schemes for sampling PSD matrices with fixed rank
Authors:
Tianmin Yu,
Shixin Zheng,
Jianfeng Lu,
Govind Menon,
Xiangxiong Zhang
Abstract:
This paper introduces two explicit schemes to sample matrices from Gibbs distributions on $\mathcal S^{n,p}_+$, the manifold of real positive semi-definite (PSD) matrices of size $n\times n$ and rank $p$. Given an energy function $\mathcal E:\mathcal S^{n,p}_+\to \mathbb{R}$ and certain Riemannian metrics $g$ on $\mathcal S^{n,p}_+$, these schemes rely on an Euler-Maruyama discretization of the Ri…
▽ More
This paper introduces two explicit schemes to sample matrices from Gibbs distributions on $\mathcal S^{n,p}_+$, the manifold of real positive semi-definite (PSD) matrices of size $n\times n$ and rank $p$. Given an energy function $\mathcal E:\mathcal S^{n,p}_+\to \mathbb{R}$ and certain Riemannian metrics $g$ on $\mathcal S^{n,p}_+$, these schemes rely on an Euler-Maruyama discretization of the Riemannian Langevin equation (RLE) with Brownian motion on the manifold. We present numerical schemes for RLE under two fundamental metrics on $\mathcal S^{n,p}_+$: (a) the metric obtained from the embedding of $\mathcal S^{n,p}_+ \subset \mathbb{R}^{n\times n} $; and (b) the Bures-Wasserstein metric corresponding to quotient geometry. We also provide examples of energy functions with explicit Gibbs distributions that allow numerical validation of these schemes.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Deep Linear Networks for Matrix Completion -- An Infinite Depth Limit
Authors:
Nadav Cohen,
Govind Menon,
Zsolt Veraszto
Abstract:
The deep linear network (DLN) is a model for implicit regularization in gradient based optimization of overparametrized learning architectures. Training the DLN corresponds to a Riemannian gradient flow, where the Riemannian metric is defined by the architecture of the network and the loss function is defined by the learning task. We extend this geometric framework, obtaining explicit expressions…
▽ More
The deep linear network (DLN) is a model for implicit regularization in gradient based optimization of overparametrized learning architectures. Training the DLN corresponds to a Riemannian gradient flow, where the Riemannian metric is defined by the architecture of the network and the loss function is defined by the learning task. We extend this geometric framework, obtaining explicit expressions for the volume form, including the case when the network has infinite depth. We investigate the link between the Riemannian geometry and the training asymptotics for matrix completion with rigorous analysis and numerics. We propose that implicit regularization is a result of bias towards high state space volume.
△ Less
Submitted 10 May, 2023; v1 submitted 22 October, 2022;
originally announced October 2022.
-
Hardware Impaired Ambient Backscatter NOMA Systems: Reliability and Security
Authors:
Xingwang Li,
Mengle Zhao,
Ming Zeng,
Shahid Mumtaz,
Varun G Menon,
Zhiguo Ding,
Octavia A. Dobre
Abstract:
Non-orthogonal multiple access (NOMA) and ambient backscatter communication have been envisioned as two promising technologies for the Internet-of-things due to their high spectral efficiency and energy efficiency. Motivated by this fact, we consider an ambient backscatter NOMA system in the presence of a malicious eavesdropper. Under some realistic assumptions of residual hardware impairments (RH…
▽ More
Non-orthogonal multiple access (NOMA) and ambient backscatter communication have been envisioned as two promising technologies for the Internet-of-things due to their high spectral efficiency and energy efficiency. Motivated by this fact, we consider an ambient backscatter NOMA system in the presence of a malicious eavesdropper. Under some realistic assumptions of residual hardware impairments (RHIs), channel estimation errors (CEEs) and imperfect successive interference cancellation (ipSIC), we investigate the physical layer security (PLS) of the ambient backscatter NOMA systems focusing on reliability and security. In order to further improve the security of the considered system, an artificial noise scheme is proposed where the radio frequency (RF) source acts as a jammer that transmits interference signal to the legitimate receivers and eavesdropper. On this basis, the analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived. To gain more insights, the asymptotic analysis and diversity orders for the OP in the high signal-to-noise ratio (SNR) regime are carried out, and the asymptotic behaviors of the IP in the high main-to-eavesdropper ratio (MER) region are explored as well. Numerical results show that: 1) RHIs, CEEs and ipSIC have negative effects on the OP but positive effects on the IP; 2) Compared with CEEs, RHIs have a more serious impact on the reliability and security of the considered system; 3) There exists a trade-off between reliability and security, and this trade-off can be optimized by reducing the power coefficient of the artificial noise or increasing the interfering factor of readers; 4) There are error floors for the OP due to the CEEs and the reflection coefficient; 5) As MER grows large, the security for Rnand Rf is improved, while the security for T is reduced.
△ Less
Submitted 13 August, 2020;
originally announced August 2020.
-
I/Q Imbalance Aware Nonlinear Wireless-Powered Relaying of B5G Networks: Security and Reliability Analysis
Authors:
Xingwang Li,
Mengyan Huang,
Yuanwei Liu,
Varun G Menon,
Anand Paul,
Zhiguo Ding
Abstract:
Physical layer security is known as a promising paradigm to ensure security for the beyond 5G (B5G) networks in the presence of eavesdroppers. In this paper, we elaborate on a tractable analysis framework to evaluate the reliability and security of wireless-powered decode-and-forward (DF) multi-relay networks. The nonlinear energy harvesters, in-phase and quadrature-phase imbalance (IQI) and chann…
▽ More
Physical layer security is known as a promising paradigm to ensure security for the beyond 5G (B5G) networks in the presence of eavesdroppers. In this paper, we elaborate on a tractable analysis framework to evaluate the reliability and security of wireless-powered decode-and-forward (DF) multi-relay networks. The nonlinear energy harvesters, in-phase and quadrature-phase imbalance (IQI) and channel estimation errors (CEEs) are taken into account in the considered system. To further improve the secure performance, two relay selection strategies are presented: 1) suboptimal relay selection (SRS); 2) optimal relay selection (ORS). Specifically, exact analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived in closed-form. For the IP, we consider that the eavesdropper can wiretap the signal from the source or the relay. In order to obtain more useful insights, we carry out the asymptotic analysis and diversity orders for the OP in the high signal-to-noise ratio (SNR) regime under non-ideal and ideal conditions. Numerical results show that: 1) Although the mismatches of amplitude/phase of transmitter (TX)/receiver (RX) limit the OP performance, it can enhance IP performance; 2) Large number of relays yields better OP performance; 3) There are error floors for the OP because of the CEEs; 4) There is a trade-off for the OP and IO to obtain the balance between reliability and security.
△ Less
Submitted 6 June, 2020;
originally announced June 2020.