Skip to main content

Showing 1–15 of 15 results for author: Wong, T F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.15903  [pdf, other

    cs.LG cs.AI cs.NI

    ESFL: Efficient Split Federated Learning over Resource-Constrained Heterogeneous Wireless Devices

    Authors: Guangyu Zhu, Yiqin Deng, Xianhao Chen, Haixia Zhang, Yuguang Fang, Tan F. Wong

    Abstract: Federated learning (FL) allows multiple parties (distributed devices) to train a machine learning model without sharing raw data. How to effectively and efficiently utilize the resources on devices and the central server is a highly interesting yet challenging problem. In this paper, we propose an efficient split federated learning algorithm (ESFL) to take full advantage of the powerful computing… ▽ More

    Submitted 16 April, 2024; v1 submitted 24 February, 2024; originally announced February 2024.

  2. arXiv:2312.00933  [pdf, other

    cs.IT

    Privacy Preserving Event Detection

    Authors: Xiaoshan Wang, Tan F. Wong

    Abstract: This paper presents a privacy-preserving event detection scheme based on measurements made by a network of sensors. A diameter-like decision statistic made up of the marginal types of the measurements observed by the sensors is employed. The proposed detection scheme can achieve the best type-I error exponent as the type-II error rate is required to be negligible. Detection performance with finite… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: 26 pages, 9 figures, submitted to IEEE Transactions on Information Theory

  3. arXiv:1902.03909  [pdf, other

    cs.IT cs.CR

    Blind Channel Separation in Massive MIMO System under Pilot Spoofing and Jamming Attack

    Authors: Ruohan Cao, Ruohan Cao, Tan F. Wong, Hui Gao, Dongqing Wang, Yueming Lu

    Abstract: We consider a channel separation approach to counter the pilot attack in a massive MIMO system, where malicious users (MUs) perform pilot spoofing and jamming attack (PSJA) in uplink by sending symbols to the basestation (BS) during the channel estimation (CE) phase of the legitimate users (LUs). More specifically, the PSJA strategies employed by the MUs may include (i) sending the random symbols… ▽ More

    Submitted 8 February, 2019; originally announced February 2019.

  4. arXiv:1806.05589  [pdf, ps, other

    cs.IT

    Inducing information stability and applications thereof to obtaining information theoretic necessary conditions directly from operational requirements

    Authors: Eric Graves, Tan F. Wong

    Abstract: This work constructs a discrete random variable that, when conditioned upon, ensures information stability of quasi-images. Using this construction, a new methodology is derived to obtain information theoretic necessary conditions directly from operational requirements. In particular, this methodology is used to derive new necessary conditions for keyed authentication over discrete memoryless chan… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: Submitted for possible publication

  5. arXiv:1701.07347  [pdf, ps, other

    cs.IT

    Wiretap channel capacity: Secrecy criteria, strong converse, and phase change

    Authors: Eric Graves, Tan F. Wong

    Abstract: This paper employs equal-image-size source partitioning techniques to derive the capacities of the general discrete memoryless wiretap channel (DM-WTC) under four different secrecy criteria. These criteria respectively specify requirements on the expected values and tail probabilities of the differences, in absolute value and in exponent, between the joint probability of the secret message and the… ▽ More

    Submitted 15 February, 2018; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: Published in proceedings of ISIT2017, contains a correction in result statements

  6. Detecting Byzantine Attacks Without Clean Reference

    Authors: Ruohan Cao, Tan F. Wong, Tiejun Lv, Hui Gao, Shaoshi Yang

    Abstract: We consider an amplify-and-forward relay network composed of a source, two relays, and a destination. In this network, the two relays are untrusted in the sense that they may perform Byzantine attacks by forwarding altered symbols to the destination. Note that every symbol received by the destination may be altered, and hence no clean reference observation is available to the destination. For this… ▽ More

    Submitted 18 July, 2016; originally announced July 2016.

    Comments: 16 pages, 7 figures, accepted to appear on IEEE Transactions on Information Forensics and Security, July 2016

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2717 - 2731, Dec. 2016

  7. arXiv:1512.00824  [pdf, ps, other

    cs.IT

    Equal-image-size source partitioning: Creating strong Fano's inequalities for multi-terminal discrete memoryless channels

    Authors: Eric Graves, Tan F. Wong

    Abstract: This paper introduces equal-image-size source partitioning, a new tool for analyzing channel and joint source-channel coding in a multi-terminal discrete memoryless channel environment. Equal-image-size source partitioning divides the source (combination of messages and codewords) into a sub-exponential number of subsets. Over each of these subsets, the exponential orders of the minimum image size… ▽ More

    Submitted 9 January, 2016; v1 submitted 2 December, 2015; originally announced December 2015.

    Comments: Submitted to IEEE trans info theory. Presented in part at the 2014 International Symposium on Information Theory (ISIT) in Honolulu, HI, USA. 29 pages, 1 example. Comments welcome. This version fixes a mistake in the application example and corrects a number of typos

  8. arXiv:1404.6585  [pdf, ps, other

    cs.IT

    Equating the achievable exponent region to the achievable entropy region by partitioning the source

    Authors: Eric Graves, Tan F. Wong

    Abstract: In this paper we investigate the image size characterization problem. We show that any arbitrary source set may be decomposed into sets whose image size characterization is the same as its entropy characterization. We also show that the number of these sets required is small enough that one may consider that from a coding perspective the achievable entropy region and achievable exponent region are… ▽ More

    Submitted 25 April, 2014; originally announced April 2014.

    Comments: 5 Pages, ISIT 14

  9. LDPC Code Design for the BPSK-constrained Gaussian Wiretap Channel

    Authors: Chan Wong Wong, Tan F. Wong, John M. Shea

    Abstract: A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to send secret messages from a source over the Gaussian wiretap channel to a destination in the presence of a wiretapper, with the restriction that the source can send only binary phase-shift keyed (BPSK) symbols. The secrecy performance of the proposed coding scheme is measured by the secret message rate through… ▽ More

    Submitted 20 March, 2011; originally announced March 2011.

    Comments: submitted to IEEE GLOBECOM 2011 - Communication Theory Symposium

  10. Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel

    Authors: Chan Wong Wong, Tan F. Wong, John M. Shea

    Abstract: The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the source can transmit only binary phase shift keyed (BPSK) symb… ▽ More

    Submitted 20 January, 2011; v1 submitted 15 September, 2010; originally announced September 2010.

    Comments: submitted to IEEE Trans. on Information Forensics and Security, special issues on using the physical layer for securing the next generation of communication systems

  11. arXiv:1006.0964  [pdf, other

    cs.IT

    On Achievable Rate Regions for Half-Duplex Causal Cognitive Radio Channels

    Authors: Debdeep Chatterjee, Tan F. Wong, Ozgur Oyman

    Abstract: Coding for the causal cognitive radio channel, with the cognitive source subjected to a half-duplex constraint, is studied. A discrete memoryless channel model incorporating the half-duplex constraint is presented, and a new achievable rate region is derived for this channel. It is proved that this rate region contains the previously known causal achievable rate region of \cite{Devroye06} for Gaus… ▽ More

    Submitted 4 June, 2010; originally announced June 2010.

    Comments: 5 pages, 2 figures, ISIT 2010

  12. arXiv:0903.2820  [pdf, ps, other

    cs.IT

    Cooperative Transmission in a Wireless Relay Network based on Flow Management

    Authors: Debdeep Chatterjee, Tan F. Wong, Tat M. Lok

    Abstract: In this paper, a cooperative transmission design for a general multi-node half-duplex wireless relay network is presented. It is assumed that the nodes operate in half-duplex mode and that channel information is available at the nodes. The proposed design involves solving a convex flow optimization problem on a graph that models the relay network. A much simpler generalized-link selection protoc… ▽ More

    Submitted 16 November, 2009; v1 submitted 16 March, 2009; originally announced March 2009.

    Comments: 31 pages, 10 figures. First version submitted to Transactions on Communications, Nov. 2007. This is the revised detailed version. Further updated on Nov. 16, 2009 with minor modifications. To appear

  13. arXiv:0812.2719  [pdf, other

    cs.IT

    Secret Sharing over Fast-Fading MIMO Wiretap Channels

    Authors: Tan F. Wong, Matthieu Bloch, John M. Shea

    Abstract: Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of a wiretapper who also makes channel observations that are different from but correlated to those made by the destination. An interactive authenticated unrestricted public channel is also available for use by the sour… ▽ More

    Submitted 11 September, 2009; v1 submitted 14 December, 2008; originally announced December 2008.

    Comments: Revision submitted to EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, Sept. 2009. v.3: Fixes to proofs. Matthieu Bloch added as co-author for contributions to proofs

  14. arXiv:0708.2270  [pdf, ps, other

    cs.IT

    Capacity of the Degraded Half-Duplex Relay Channel

    Authors: Saravanan Vijayakumaran, Tan F. Wong, Tat M. Lok

    Abstract: A discrete memoryless half-duplex relay channel is constructed from a broadcast channel from the source to the relay and destination and a multiple access channel from the source and relay to the destination. When the relay listens, the channel operates in the broadcast mode. The channel switches to the multiple access mode when the relay transmits. If the broadcast component channel is physical… ▽ More

    Submitted 16 August, 2007; originally announced August 2007.

    Comments: 10 pages, 2 figures

  15. arXiv:cs/0701019  [pdf, ps, other

    cs.IT

    Flow-optimized Cooperative Transmission for the Relay Channel

    Authors: Tan F. Wong, Tat M. Lok, John M. Shea

    Abstract: This paper describes an approach for half-duplex cooperative transmission in a classical three-node relay channel. Assuming availability of channel state information at nodes, the approach makes use of this information to optimize distinct flows through the direct link from the source to the destination and the path via the relay, respectively. It is shown that such a design can effectively harn… ▽ More

    Submitted 13 September, 2007; v1 submitted 3 January, 2007; originally announced January 2007.

    Comments: Submitted to Transactions on Information Theory, December 2006. 34 pages, 4 figures. Correction, March 26, 2007. Revision, September 13, 2007: Revised text and provided additional proofs regarding diversity-multiplexing tradeoffs and delay-limited rates with optimal long-term power control