Skip to main content

Showing 1–50 of 228 results for author: Ulukus, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15541  [pdf, other

    cs.IT cs.NI cs.PF eess.SY

    Cyclic Scheduler Design for Minimizing Age of Information in Massive Scale Networks Susceptible to Packet Errors

    Authors: Sahan Liyanaarachchi, Sennur Ulukus, Nail Akar

    Abstract: In multi-source status update systems, sources need to be scheduled appropriately to maintain timely communication between each of the sources and the monitor. A cyclic schedule is an age-agnostic schedule in which the sources are served according to a fixed finite transmission pattern, which upon completion, repeats itself. Such a scheme has a low $O(1)$ runtime complexity, which is desirable in… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2406.08373  [pdf, ps, other

    cs.IT cs.LG eess.SP

    Deep Learning Based Joint Multi-User MISO Power Allocation and Beamforming Design

    Authors: Cemil Vahapoglu, Timothy J. O'Shea, Tamoghna Roy, Sennur Ulukus

    Abstract: The evolution of fifth generation (5G) wireless communication networks has led to an increased need for wireless resource management solutions that provide higher data rates, wide coverage, low latency, and power efficiency. Yet, many of existing traditional approaches remain non-practical due to computational limitations, and unrealistic presumptions of static network conditions and algorithm ini… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  3. arXiv:2405.19310  [pdf, other

    cs.IT cs.NI eess.SP

    Network Connectivity--Information Freshness Tradeoff in Information Dissemination Over Networks

    Authors: Arunabh Srivastava, Sennur Ulukus

    Abstract: We consider a gossip network consisting of a source generating updates and $n$ nodes connected according to a given graph structure. The source keeps updates of a process, that might be generated or observed, and shares them with the gossi** network. The nodes in the network communicate with their neighbors and disseminate these version updates using a push-style gossip strategy. We use the vers… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2307.08670, arXiv:2308.12266

  4. arXiv:2405.15744  [pdf, other

    cs.LG cs.DC cs.IT

    CAFe: Cost and Age aware Federated Learning

    Authors: Sahan Liyanaarachchi, Kanchana Thilakarathna, Sennur Ulukus

    Abstract: In many federated learning (FL) models, a common strategy employed to ensure the progress in the training process, is to wait for at least $M$ clients out of the total $N$ clients to send back their local gradients based on a reporting deadline $T$, once the parameter server (PS) has broadcasted the global model. If enough clients do not report back within the deadline, the particular round is con… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  5. arXiv:2405.04526  [pdf, ps, other

    cs.CR cs.DC cs.DM cs.IT

    PoW Security-Latency under Random Delays and the Effect of Transaction Fees

    Authors: Mustafa Doger, Sennur Ulukus, Nail Akar

    Abstract: Safety guarantees and security-latency problem of Nakamoto consensus have been extensively studied in the last decade with a bounded delay model. Recent studies have shown that PoW protocol is secure under random delay models as well. In this paper, we analyze the security-latency problem, i.e., how secure a block is, after it becomes k-deep in the blockchain, under general random delay distributi… ▽ More

    Submitted 9 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

  6. arXiv:2405.01521  [pdf, other

    cs.CV cs.IT cs.LG eess.SP

    Transformer-Aided Semantic Communications

    Authors: Matin Mortaheb, Erciyes Karakaya, Mohammad A. Amir Khojastepour, Sennur Ulukus

    Abstract: The transformer structure employed in large language models (LLMs), as a specialized category of deep neural networks (DNNs) featuring attention mechanisms, stands out for their ability to identify and highlight the most relevant aspects of input data. Such a capability is particularly beneficial in addressing a variety of communication challenges, notably in the realm of semantic communication wh… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  7. arXiv:2405.00665  [pdf, other

    cs.IT cs.NI eess.SP

    Optimizing Profitability in Timely Gossip Networks

    Authors: Priyanka Kaswan, Melih Bastopcu, Sennur Ulukus, S. Rasoul Etesami, Tamer Başar

    Abstract: We consider a communication system where a group of users, interconnected in a bidirectional gossip network, wishes to follow a time-varying source, e.g., updates on an event, in real-time. The users wish to maintain their expected version ages below a threshold, and can either rely on gossip from their neighbors or directly subscribe to a server publishing about the event, if the former option do… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  8. arXiv:2404.19749  [pdf, other

    cs.IT cs.LG cs.MA cs.NI eess.SP

    Scale-Robust Timely Asynchronous Decentralized Learning

    Authors: Purbesh Mitra, Sennur Ulukus

    Abstract: We consider an asynchronous decentralized learning system, which consists of a network of connected devices trying to learn a machine learning model without any centralized parameter server. The users in the network have their own local training data, which is used for learning across all the nodes in the network. The learning method consists of two processes, evolving simultaneously without any n… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  9. arXiv:2404.16009  [pdf, other

    cs.IT cs.NI eess.SP

    How to Make Money From Fresh Data: Subscription Strategies in Age-Based Systems

    Authors: Priyanka Kaswan, Melih Bastopcu, Sennur Ulukus, S. Rasoul Etesami, Tamer Başar

    Abstract: We consider a communication system consisting of a server that tracks and publishes updates about a time-varying data source or event, and a gossip network of users interested in closely tracking the event. The timeliness of the information is measured through the version age of information. The users wish to have their expected version ages remain below a threshold, and have the option to either… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  10. arXiv:2404.02898  [pdf, ps, other

    cs.IT cs.GT cs.NI eess.SY

    A Mean Field Game Model for Timely Computation in Edge Computing Systems

    Authors: Shubham Aggarwal, Muhammad Aneeq uz Zaman, Melih Bastopcu, Sennur Ulukus, Tamer Başar

    Abstract: We consider the problem of task offloading in multi-access edge computing (MEC) systems constituting $N$ devices assisted by an edge server (ES), where the devices can split task execution between a local processor and the ES. Since the local task execution and communication with the ES both consume power, each device must judiciously choose between the two. We model the problem as a large populat… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE for possible publication

  11. arXiv:2404.01229  [pdf, other

    cs.IT cs.NI cs.PF

    Age of Information in a Single-Source Generate-at-Will Dual-Server Status Update System

    Authors: Nail Akar, Sennur Ulukus

    Abstract: We study age of information (AoI) in a single-source dual-server status update system for the generate at will (GAW) scenario, consisting of an information source, dual servers, and a monitor. For this system, the method of stochastic hybrid systems (SHS) was used to obtain the mean AoI for the work-conserving ZW (zero wait) policy with out-of-order packet discarding at the monitor. In this paper,… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: 10 pages, 7 figures

  12. arXiv:2402.10138  [pdf, ps, other

    cs.CR cs.DC cs.DM cs.IT

    Transaction Capacity, Security and Latency in Blockchains

    Authors: Mustafa Doger, Sennur Ulukus

    Abstract: We analyze how secure a block is after the block becomes k-deep, i.e., security-latency, for Nakamoto consensus under an exponential network delay model. We give parameter regimes for which transactions are safe when sufficiently deep in the chain. We compare our results for Nakamoto consensus under bounded network delay models and obtain analogous bounds for safety violation threshold. Next, mode… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  13. arXiv:2402.00845  [pdf, ps, other

    cs.IT cs.GT cs.NI eess.SP eess.SY

    When to Preempt in a Status Update System?

    Authors: Subhankar Banerjee, Sennur Ulukus

    Abstract: We consider a time-slotted status update system with an error-free preemptive queue. The goal of the sampler-scheduler pair is to minimize the age of information at the monitor by sampling and transmitting the freshly sampled update packets to the monitor. The sampler-scheduler pair also has a choice to preempt an old update packet from the server and transmit a new update packet to the server. We… ▽ More

    Submitted 20 May, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

  14. arXiv:2401.18063  [pdf, other

    cs.IT eess.SP eess.SY

    AoII-Optimum Sampling of CTMC Information Sources Under Sampling Rate Constraints

    Authors: Ismail Cosandal, Nail Akar, Sennur Ulukus

    Abstract: We consider a sensor that samples an $N$-state continuous-time Markov chain (CTMC)-based information source process, and transmits the observed state of the source, to a remote monitor tasked with timely tracking of the source process. The mismatch between the source and monitor processes is quantified by age of incorrect information (AoII), which penalizes the mismatch as it stays longer, and our… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

  15. arXiv:2401.17252  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP quant-ph

    Quantum $X$-Secure $B$-Byzantine $T$-Colluding Private Information Retrieval

    Authors: Mohamed Nomeir, Alptug Aytekin, Sennur Ulukus

    Abstract: We consider the problems arising from the presence of Byzantine servers in a quantum private information retrieval (QPIR) setting. This is the first work to precisely define what the capabilities of Byzantine servers could be in a QPIR context. We show that quantum Byzantine servers have more capabilities than their classical counterparts due to the possibilities created by quantum encoding proced… ▽ More

    Submitted 7 May, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

  16. arXiv:2401.16390  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP quant-ph

    Quantum Private Membership Aggregation

    Authors: Alptug Aytekin, Mohamed Nomeir, Sennur Ulukus

    Abstract: We consider the problem of private set membership aggregation of $N$ parties by using an entangled quantum state. In this setting, the $N$ parties, which share an entangled state, aim to \emph{privately} know the number of times each element (message) is repeated among the $N$ parties, with respect to a universal set $\mathcal{K}$. This problem has applications in private comparison, ranking, voti… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  17. arXiv:2401.13653  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP

    HetDAPAC: Distributed Attribute-Based Private Access Control with Heterogeneous Attributes

    Authors: Shreya Meel, Sennur Ulukus

    Abstract: Verifying user attributes to provide fine-grained access control to databases is fundamental to an attribute-based authentication system. In such systems, either a single (central) authority verifies all attributes, or multiple independent authorities verify individual attributes distributedly to allow a user to access records stored on the servers. While a \emph{central} setup is more communicati… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  18. arXiv:2401.12962  [pdf, other

    cs.IT cs.NI eess.SY

    Minimizing the Age of Two Heterogeneous Sources With Packet Drops Via Cyclic Schedulers

    Authors: Sahan Liyanaarachchi, Sennur Ulukus, Nail Akar

    Abstract: In a communication setting where multiple sources share a single channel to provide status updates to a remote monitor, source transmissions need to be scheduled appropriately to maintain timely communication between each of the sources and the monitor. We consider age-agnostic scheduling policies which are advantageous due to their simplicity of implementation. Further, we focus on a special clas… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  19. arXiv:2401.04904  [pdf, other

    cs.IT cs.NI cs.PF

    Scalable Cyclic Schedulers for Age of Information Optimization in Large-Scale Status Update Systems

    Authors: Nail Akar, Sahan Liyanaarachchi, Sennur Ulukus

    Abstract: We study cyclic scheduling for generate-at-will (GAW) multi-source status update systems with heterogeneous service times and packet drop probabilities, with the aim of minimizing the weighted sum age of information (AoI), called system AoI, or the weighted sum peak AoI (PAoI), called system PAoI. In particular, we obtain well-performing cyclic schedulers which can easily scale to thousands of inf… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 7 pages, 5 figures

  20. arXiv:2401.04098  [pdf, other

    cs.IT cs.NI eess.SP eess.SY

    Modeling AoII in Push- and Pull-Based Sampling of Continuous Time Markov Chains

    Authors: Ismail Cosandal, Nail Akar, Sennur Ulukus

    Abstract: Age of incorrect information (AoII) has recently been proposed as an alternative to existing information freshness metrics for real-time sampling and estimation problems involving information sources that are tracked by remote monitors. Different from existing metrics, AoII penalizes the incorrect information by increasing linearly with time as long as the source and the monitor are de-synchronize… ▽ More

    Submitted 11 January, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

  21. arXiv:2401.01531  [pdf, other

    cs.NI cs.CR cs.IT cs.LG eess.SP

    Will 6G be Semantic Communications? Opportunities and Challenges from Task Oriented and Secure Communications to Integrated Sensing

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper explores opportunities and challenges of task (goal)-oriented and semantic communications for next-generation (NextG) communication networks through the integration of multi-task learning. This approach employs deep neural networks representing a dedicated encoder at the transmitter and multiple task-specific decoders at the receiver, collectively trained to handle diverse tasks includi… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  22. arXiv:2312.17220  [pdf, other

    cs.IT cs.NI eess.SP

    Timeliness: A New Design Metric and a New Attack Surface

    Authors: Priyanka Kaswan, Sennur Ulukus

    Abstract: As the landscape of time-sensitive applications gains prominence in 5G/6G communications, timeliness of information updates at network nodes has become crucial, which is popularly quantified in the literature by the age of information metric. However, as we devise policies to improve age of information of our systems, we inadvertently introduce a new vulnerability for adversaries to exploit. In th… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

  23. arXiv:2312.16163  [pdf, other

    cs.IT cs.NI eess.SP

    Age of Information in Gossip Networks: A Friendly Introduction and Literature Survey

    Authors: Priyanka Kaswan, Purbesh Mitra, Arunabh Srivastava, Sennur Ulukus

    Abstract: Gossi** is a communication mechanism, used for fast information dissemination in a network, where each node of the network randomly shares its information with the neighboring nodes. To characterize the notion of fastness in the context of gossip networks, age of information (AoI) is used as a timeliness metric. In this article, we summarize the recent works related to timely gossi** in a netw… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

  24. arXiv:2312.13931  [pdf, other

    cs.NI cs.AI cs.IT cs.LG eess.SP

    Joint Sensing and Task-Oriented Communications with Image and Wireless Data Modalities for Dynamic Spectrum Access

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper introduces a deep learning approach to dynamic spectrum access, leveraging the synergy of multi-modal image and spectrum data for the identification of potential transmitters. We consider an edge device equipped with a camera that is taking images of potential objects such as vehicles that may harbor transmitters. Recognizing the computational constraints and trust issues associated wit… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  25. arXiv:2312.02112  [pdf, other

    cs.IT cs.CR cs.NI eess.SP

    Distributed Optimization with Feasible Set Privacy

    Authors: Shreya Meel, Sennur Ulukus

    Abstract: We consider the setup of a constrained optimization problem with two agents $E_1$ and $E_2$ who jointly wish to learn the optimal solution set while kee** their feasible sets $\mathcal{P}_1$ and $\mathcal{P}_2$ private from each other. The objective function $f$ is globally known and each feasible set is a collection of points from a global alphabet. We adopt a sequential symmetric private infor… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  26. arXiv:2311.18791  [pdf, other

    cs.IT cs.NI

    Minimizing Weighted Sum Age of Information with Open-Loop Cyclic Scheduling

    Authors: Ege Orkun Gamgam, Nail Akar, Sennur Ulukus

    Abstract: We study the scheduling problem in a status update system composed of an arbitrary number of information sources with different service time distributions and weights for the purpose of minimizing the weighted sum age of information (AoI). In particular, we study open-loop schedulers which rely only on the statistics (specifically, only on the first two moments) of the source service times, in con… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: 10 pages, 5 figures

  27. arXiv:2311.12918  [pdf, other

    eess.IV cs.IT cs.LG cs.NI eess.SY

    Deep Learning-Based Real-Time Quality Control of Standard Video Compression for Live Streaming

    Authors: Matin Mortaheb, Mohammad A. Amir Khojastepour, Srimat T. Chakradhar, Sennur Ulukus

    Abstract: Ensuring high-quality video content for wireless users has become increasingly vital. Nevertheless, maintaining a consistent level of video quality faces challenges due to the fluctuating encoded bitrate, primarily caused by dynamic video content, especially in live streaming scenarios. Video compression is typically employed to eliminate unnecessary redundancies within and between video frames, t… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: text overlap with arXiv:2310.06857

  28. arXiv:2311.08383  [pdf, other

    cs.IT cs.NI eess.SP

    Choosing Outdated Information to Achieve Reliability in Age-Based Gossi**

    Authors: Priyanka Kaswan, Sennur Ulukus

    Abstract: We consider a system model with two sources, a reliable source and an unreliable source, who are responsible for disseminating updates regarding a process to an age-based gossip network of $n$ nodes. Nodes wish to have fresh information, however, they have preference for packets that originated at the reliable source and are willing to sacrifice their version age of information by up to $G$ versio… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  29. arXiv:2311.05017  [pdf, other

    cs.NI cs.AI cs.IT cs.LG eess.SP

    Joint Sensing and Semantic Communications with Multi-Task Deep Learning

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper explores the integration of deep learning techniques for joint sensing and communications, with an extension to semantic communications. The integrated system comprises a transmitter and receiver operating over a wireless channel, subject to noise and fading effects. The transmitter employs a deep neural network, namely an encoder, for joint operations of source coding, channel coding,… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  30. arXiv:2310.06857  [pdf, other

    cs.NI cs.IT cs.LG eess.SP eess.SY

    Deep Learning-Based Real-Time Rate Control for Live Streaming on Wireless Networks

    Authors: Matin Mortaheb, Mohammad A. Amir Khojastepour, Srimat T. Chakradhar, Sennur Ulukus

    Abstract: Providing wireless users with high-quality video content has become increasingly important. However, ensuring consistent video quality poses challenges due to variable encoded bitrate caused by dynamic video content and fluctuating channel bitrate caused by wireless fading effects. Suboptimal selection of encoder parameters can lead to video quality loss due to underutilized bandwidth or the intro… ▽ More

    Submitted 27 September, 2023; originally announced October 2023.

  31. arXiv:2310.02223  [pdf, ps, other

    cs.IT cs.NI cs.PF

    Query-Based Sampling of Heterogeneous CTMCs: Modeling and Optimization with Binary Freshness

    Authors: Nail Akar, Sennur Ulukus

    Abstract: We study a remote monitoring system in which a mutually independent and heterogeneous collection of finite-state irreducible continuous time Markov chain (CTMC) based information sources is considered. In this system, a common remote monitor queries the instantaneous states of the individual CTMCs according to a Poisson process with possibly different intensities across the sources, in order to ma… ▽ More

    Submitted 30 May, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: 10 pages, 6 figures

  32. arXiv:2310.01396  [pdf, other

    cs.IT cs.LG cs.MA cs.NI eess.SP

    A Learning Based Scheme for Fair Timeliness in Sparse Gossip Networks

    Authors: Purbesh Mitra, Sennur Ulukus

    Abstract: We consider a gossip network, consisting of $n$ nodes, which tracks the information at a source. The source updates its information with a Poisson arrival process and also sends updates to the nodes in the network. The nodes themselves can exchange information among themselves to become as timely as possible. However, the network structure is sparse and irregular, i.e., not every node is connected… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  33. arXiv:2309.16603  [pdf, ps, other

    cs.IT cs.LG eess.SP

    Deep Learning Based Uplink Multi-User SIMO Beamforming Design

    Authors: Cemil Vahapoglu, Timothy J. O'Shea, Tamoghna Roy, Sennur Ulukus

    Abstract: The advancement of fifth generation (5G) wireless communication networks has created a greater demand for wireless resource management solutions that offer high data rates, extensive coverage, minimal latency and energy-efficient performance. Nonetheless, traditional approaches have shortcomings when it comes to computational complexity and their ability to adapt to dynamic conditions, creating a… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

  34. arXiv:2309.03872  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP

    Private Membership Aggregation

    Authors: Mohamed Nomeir, Sajani Vithana, Sennur Ulukus

    Abstract: We consider the problem of private membership aggregation (PMA), in which a user counts the number of times a certain element is stored in a system of independent parties that store arbitrary sets of elements from a universal alphabet. The parties are not allowed to learn which element is being counted by the user. Further, neither the user nor the other parties are allowed to learn the stored ele… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

  35. arXiv:2308.15456  [pdf, other

    cs.IT cs.NI eess.SP

    Timely Multi-Goal Transmissions With an Intermittently Failing Sensor

    Authors: Ismail Cosandal, Sennur Ulukus

    Abstract: A sensor observes a random phenomenon and transmits updates about the observed phenomenon to a remote monitor. The sensor may experience intermittent failures in which case the monitor will not receive any updates until the sensor has recovered. The monitor wants to keep a timely view of the observed process, as well as to detect any sensor failures, using the timings of the updates. We analyze th… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

  36. arXiv:2308.12266  [pdf, other

    cs.IT cs.MA cs.NI eess.SP

    Age of Gossip on Generalized Rings

    Authors: Arunabh Srivastava, Sennur Ulukus

    Abstract: We consider a gossip network consisting of a source forwarding updates and $n$ nodes placed geometrically in a ring formation. Each node gossips with $f(n)$ nodes on either side, thus communicating with $2f(n)$ nodes in total. $f(n)$ is a sub-linear, non-decreasing and positive function. The source keeps updates of a process, that might be generated or observed, and shares them with the nodes in t… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

  37. arXiv:2308.11604  [pdf, other

    cs.LG cs.IT eess.SP

    Semantic Multi-Resolution Communications

    Authors: Matin Mortaheb, Mohammad A. Amir Khojastepour, Srimat T. Chakradhar, Sennur Ulukus

    Abstract: Deep learning based joint source-channel coding (JSCC) has demonstrated significant advancements in data reconstruction compared to separate source-channel coding (SSCC). This superiority arises from the suboptimality of SSCC when dealing with finite block-length data. Moreover, SSCC falls short in reconstructing data in a multi-user and/or multi-resolution fashion, as it only tries to satisfy the… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  38. arXiv:2308.10883  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP quant-ph

    Quantum Symmetric Private Information Retrieval with Secure Storage and Eavesdroppers

    Authors: Alptug Aytekin, Mohamed Nomeir, Sajani Vithana, Sennur Ulukus

    Abstract: We consider both the classical and quantum variations of $X$-secure, $E$-eavesdropped and $T$-colluding symmetric private information retrieval (SPIR). This is the first work to study SPIR with $X$-security in classical or quantum variations. We first develop a scheme for classical $X$-secure, $E$-eavesdropped and $T$-colluding SPIR (XSETSPIR) based on a modified version of cross subspace alignmen… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

  39. arXiv:2308.07905  [pdf, other

    cs.IT cs.NI eess.SP eess.SY

    The Role of Early Sampling in Age of Information Minimization in the Presence of ACK Delays

    Authors: Sahan Liyanaarachchi, Sennur Ulukus

    Abstract: We study the structure of the optimal sampling policy to minimize the average age of information when the channel state (i.e., busy or idle) is not immediately perceived by the transmitter upon the delivery of a sample due to random delays in the feedback (ACK) channel. In this setting, we show that it is not always optimal to wait for ACKs before sampling, and thus, early sampling before the arri… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  40. arXiv:2308.06884  [pdf, other

    cs.NI cs.IT cs.LG eess.SP

    Multi-Receiver Task-Oriented Communications via Multi-Task Deep Learning

    Authors: Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus

    Abstract: This paper studies task-oriented, otherwise known as goal-oriented, communications, in a setting where a transmitter communicates with multiple receivers, each with its own task to complete on a dataset, e.g., images, available at the transmitter. A multi-task deep learning approach that involves training a common encoder at the transmitter and individual decoders at the receivers is presented for… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

  41. arXiv:2307.09443  [pdf, other

    cs.IT cs.NI eess.SP

    Age-Based Cache Updating Under Timestom**

    Authors: Subhankar Banerjee, Priyanka Kaswan, Sennur Ulukus

    Abstract: We consider a slotted communication system consisting of a source, a cache, a user and a timestom** adversary. The time horizon consists of total $T$ time slots, such that the source transmits update packets to the user directly over $T_{1}$ time slots and to the cache over $T_{2}$ time slots. We consider $T_{1}\ll T_{2}$, $T_{1}+T_{2} < T$, such that the source transmits to the user once betwee… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

  42. arXiv:2307.08670  [pdf, other

    cs.IT cs.MA cs.NI eess.SP

    Age of Gossip on a Grid

    Authors: Arunabh Srivastava, Sennur Ulukus

    Abstract: We consider a gossip network consisting of a source generating updates and $n$ nodes connected in a two-dimensional square grid. The source keeps updates of a process, that might be generated or observed, and shares them with the grid network. The nodes in the grid network communicate with their neighbors and disseminate these version updates using a push-style gossip strategy. We use the version… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  43. arXiv:2307.06323  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP

    Information-Theoretically Private Federated Submodel Learning with Storage Constrained Databases

    Authors: Sajani Vithana, Sennur Ulukus

    Abstract: In federated submodel learning (FSL), a machine learning model is divided into multiple submodels based on different types of data used for training. Each user involved in the training process only downloads and updates the submodel relevant to the user's local data, which significantly reduces the communication cost compared to classical federated learning (FL). However, the index of the submodel… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.03670

  44. arXiv:2307.04727  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP

    Deceptive Information Retrieval

    Authors: Sajani Vithana, Sennur Ulukus

    Abstract: We introduce the problem of deceptive information retrieval (DIR), in which a user wishes to download a required file out of multiple independent files stored in a system of databases while \emph{deceiving} the databases by making the databases' predictions on the user-required file index incorrect with high probability. Conceptually, DIR is an extension of private information retrieval (PIR). In… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  45. arXiv:2306.12400  [pdf, ps, other

    cs.IT cs.DC cs.LG cs.NI eess.SP

    Timely Asynchronous Hierarchical Federated Learning: Age of Convergence

    Authors: Purbesh Mitra, Sennur Ulukus

    Abstract: We consider an asynchronous hierarchical federated learning (AHFL) setting with a client-edge-cloud framework. The clients exchange the trained parameters with their corresponding edge servers, which update the locally aggregated model. This model is then transmitted to all the clients in the local cluster. The edge servers communicate to the central cloud server for global model aggregation. The… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  46. arXiv:2306.05402  [pdf, ps, other

    cs.IT cs.CR cs.DB eess.SP

    Fully Robust Federated Submodel Learning in a Distributed Storage System

    Authors: Zhusheng Wang, Sennur Ulukus

    Abstract: We consider the federated submodel learning (FSL) problem in a distributed storage system. In the FSL framework, the full learning model at the server side is divided into multiple submodels such that each selected client needs to download only the required submodel(s) and upload the corresponding update(s) in accordance with its local training data. The server comprises multiple independent datab… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  47. arXiv:2305.10392  [pdf, ps, other

    cs.IT cs.NI eess.SP

    To Re-transmit or Not to Re-transmit for Freshness

    Authors: Subhankar Banerjee, Sennur Ulukus, Anthony Ephremides

    Abstract: We consider a time slotted communication network with a base station (BS) and a user. At each time slot a fresh update packet arrives at the BS with probability $p>0$. When the BS transmits an update packet for the first time, it goes through with a success probability of $q_1$. In all subsequent re-transmissions, the packet goes through with a success probability of $q_2$ where $q_2>q_1$, due to… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  48. arXiv:2305.05649  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP

    Asymmetric $X$-Secure $T$-Private Information Retrieval: More Databases is Not Always Better

    Authors: Mohamed Nomeir, Sajani Vithana, Sennur Ulukus

    Abstract: We consider a special case of $X$-secure $T$-private information retrieval (XSTPIR), where the security requirement is \emph{asymmetric} due to possible missing communication links between the $N$ databases considered in the system. We define the problem with a communication matrix that indicates all possible communications among the databases, and propose a database grou** mechanism that collec… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  49. arXiv:2305.04913  [pdf, other

    cs.IT cs.NI eess.SP

    Information Mutation and Spread of Misinformation in Timely Gossip Networks

    Authors: Priyanka Kaswan, Sennur Ulukus

    Abstract: We consider a network of $n$ user nodes that receives updates from a source and employs an age-based gossip protocol for faster dissemination of version updates to all nodes. When a node forwards its packet to another node, the packet information gets mutated with probability $p$ during transmission, creating misinformation. The receiver node does not know whether an incoming packet information is… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

  50. arXiv:2304.14397  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP

    Private Information Retrieval and Its Applications: An Introduction, Open Problems, Future Directions

    Authors: Sajani Vithana, Zhusheng Wang, Sennur Ulukus

    Abstract: Private information retrieval (PIR) is a privacy setting that allows a user to download a required message from a set of messages stored in a system of databases without revealing the index of the required message to the databases. PIR was introduced under computational privacy guarantees, and is recently re-formulated to provide information-theoretic guarantees, resulting in \emph{information the… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.