-
Chemical Shift Encoding based Double Bonds Quantification in Triglycerides using Deep Image Prior
Authors:
Chaoxing Huang,
Ziqiang Yu,
Zijian Gao,
Qiuyi Shen,
Queenie Chan,
Vincent Wai-Sun Wong,
Winnie Chiu-Wing Chu,
Weitian Chen
Abstract:
This study evaluated a deep learning-based method using Deep Image Prior (DIP) to quantify triglyceride double bonds from chemical-shift encoded multi-echo gradient echo images without network training. We employed a cost function based on signal constraints to iteratively update the neural network on a single dataset. The method was validated using phantom experiments and in vivo scans. Results s…
▽ More
This study evaluated a deep learning-based method using Deep Image Prior (DIP) to quantify triglyceride double bonds from chemical-shift encoded multi-echo gradient echo images without network training. We employed a cost function based on signal constraints to iteratively update the neural network on a single dataset. The method was validated using phantom experiments and in vivo scans. Results showed close alignment between measured and reference double bond values, with phantom experiments yielding a Pearson correlation coefficient of 0.96 (p = .0005). In vivo results demonstrated good agreement in subcutaneous fat. We conclude that Deep Image Prior shows feasibility for quantifying double bonds and fatty acid content from chemical-shift encoded multi-echo MRI.
△ Less
Submitted 3 July, 2024; v1 submitted 1 July, 2024;
originally announced July 2024.
-
Multiple Access Techniques for Intelligent and Multi-Functional 6G: Tutorial, Survey, and Outlook
Authors:
Bruno Clerckx,
Yijie Mao,
Zhaohui Yang,
Mingzhe Chen,
Ahmed Alkhateeb,
Liang Liu,
Min Qiu,
**hong Yuan,
Vincent W. S. Wong,
Juan Montojo
Abstract:
Multiple access (MA) is a crucial part of any wireless system and refers to techniques that make use of the resource dimensions to serve multiple users/devices/machines/services, ideally in the most efficient way. Given the needs of multi-functional wireless networks for integrated communications, sensing, localization, computing, coupled with the surge of machine learning / artificial intelligenc…
▽ More
Multiple access (MA) is a crucial part of any wireless system and refers to techniques that make use of the resource dimensions to serve multiple users/devices/machines/services, ideally in the most efficient way. Given the needs of multi-functional wireless networks for integrated communications, sensing, localization, computing, coupled with the surge of machine learning / artificial intelligence (AI) in wireless networks, MA techniques are expected to experience a paradigm shift in 6G and beyond. In this paper, we provide a tutorial, survey and outlook of past, emerging and future MA techniques and pay a particular attention to how wireless network intelligence and multi-functionality will lead to a re-thinking of those techniques. The paper starts with an overview of orthogonal, physical layer multicasting, space domain, power domain, ratesplitting, code domain MAs, and other domains, and highlight the importance of researching universal multiple access to shrink instead of grow the knowledge tree of MA schemes by providing a unified understanding of MA schemes across all resource dimensions. It then jumps into rethinking MA schemes in the era of wireless network intelligence, covering AI for MA such as AI-empowered resource allocation, optimization, channel estimation, receiver designs, user behavior predictions, and MA for AI such as federated learning/edge intelligence and over the air computation. We then discuss MA for network multi-functionality and the interplay between MA and integrated sensing, localization, and communications. We finish with studying MA for emerging intelligent applications before presenting a roadmap toward 6G standardization. We also point out numerous directions that are promising for future research.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
An Uncertainty Aided Framework for Learning based Liver $T_1ρ$ Map** and Analysis
Authors:
Chaoxing Huang,
Vincent Wai Sun Wong,
Queenie Chan,
Winnie Chiu Wing Chu,
Weitian Chen
Abstract:
Objective: Quantitative $T_1ρ$ imaging has potential for assessment of biochemical alterations of liver pathologies. Deep learning methods have been employed to accelerate quantitative $T_1ρ$ imaging. To employ artificial intelligence-based quantitative imaging methods in complicated clinical environment, it is valuable to estimate the uncertainty of the predicated $T_1ρ$ values to provide the con…
▽ More
Objective: Quantitative $T_1ρ$ imaging has potential for assessment of biochemical alterations of liver pathologies. Deep learning methods have been employed to accelerate quantitative $T_1ρ$ imaging. To employ artificial intelligence-based quantitative imaging methods in complicated clinical environment, it is valuable to estimate the uncertainty of the predicated $T_1ρ$ values to provide the confidence level of the quantification results. The uncertainty should also be utilized to aid the post-hoc quantitative analysis and model learning tasks. Approach: To address this need, we propose a parametric map refinement approach for learning-based $T_1ρ$ map** and train the model in a probabilistic way to model the uncertainty. We also propose to utilize the uncertainty map to spatially weight the training of an improved $T_1ρ$ map** network to further improve the map** performance and to remove pixels with unreliable $T_1ρ$ values in the region of interest. The framework was tested on a dataset of 51 patients with different liver fibrosis stages. Main results: Our results indicate that the learning-based map refinement method leads to a relative map** error of less than 3% and provides uncertainty estimation simultaneously. The estimated uncertainty reflects the actual error level, and it can be used to further reduce relative $T_1ρ$ map** error to 2.60% as well as removing unreliable pixels in the region of interest effectively. Significance: Our studies demonstrate the proposed approach has potential to provide a learning-based quantitative MRI system for trustworthy $T_1ρ$ map** of the liver.
△ Less
Submitted 9 October, 2023; v1 submitted 5 July, 2023;
originally announced July 2023.
-
Generating Dispatching Rules for the Interrupting Swap-Allowed Blocking Job Shop Problem Using Graph Neural Network and Reinforcement Learning
Authors:
Vivian W. H. Wong,
Sang Hun Kim,
Junyoung Park,
**kyoo Park,
Kincho H. Law
Abstract:
The interrupting swap-allowed blocking job shop problem (ISBJSSP) is a complex scheduling problem that is able to model many manufacturing planning and logistics applications realistically by addressing both the lack of storage capacity and unforeseen production interruptions. Subjected to random disruptions due to machine malfunction or maintenance, industry production settings often choose to ad…
▽ More
The interrupting swap-allowed blocking job shop problem (ISBJSSP) is a complex scheduling problem that is able to model many manufacturing planning and logistics applications realistically by addressing both the lack of storage capacity and unforeseen production interruptions. Subjected to random disruptions due to machine malfunction or maintenance, industry production settings often choose to adopt dispatching rules to enable adaptive, real-time re-scheduling, rather than traditional methods that require costly re-computation on the new configuration every time the problem condition changes dynamically. To generate dispatching rules for the ISBJSSP problem, we introduce a dynamic disjunctive graph formulation characterized by nodes and edges subjected to continuous deletions and additions. This formulation enables the training of an adaptive scheduler utilizing graph neural networks and reinforcement learning. Furthermore, a simulator is developed to simulate interruption, swap**, and blocking in the ISBJSSP setting. Employing a set of reported benchmark instances, we conduct a detailed experimental study on ISBJSSP instances with a range of machine shutdown probabilities to show that the scheduling policies generated can outperform or are at least as competitive as existing dispatching rules with predetermined priority. This study shows that the ISBJSSP, which requires real-time adaptive solutions, can be scheduled efficiently with the proposed method when production interruptions occur with random machine shutdowns.
△ Less
Submitted 28 September, 2023; v1 submitted 5 February, 2023;
originally announced February 2023.
-
Uncertainty-Aware Self-supervised Neural Network for Liver $T_{1ρ}$ Map** with Relaxation Constraint
Authors:
Chaoxing Huang,
Yurui Qian,
Simon Chun Ho Yu,
Jian Hou,
Baiyan Jiang,
Queenie Chan,
Vincent Wai-Sun Wong,
Winnie Chiu-Wing Chu,
Weitian Chen
Abstract:
$T_{1ρ}$ map** is a promising quantitative MRI technique for the non-invasive assessment of tissue properties. Learning-based approaches can map $T_{1ρ}$ from a reduced number of $T_{1ρ}$ weighted images, but requires significant amounts of high quality training data. Moreover, existing methods do not provide the confidence level of the $T_{1ρ}…
▽ More
$T_{1ρ}$ map** is a promising quantitative MRI technique for the non-invasive assessment of tissue properties. Learning-based approaches can map $T_{1ρ}$ from a reduced number of $T_{1ρ}$ weighted images, but requires significant amounts of high quality training data. Moreover, existing methods do not provide the confidence level of the $T_{1ρ}$ estimation. To address these problems, we proposed a self-supervised learning neural network that learns a $T_{1ρ}$ map** using the relaxation constraint in the learning process. Epistemic uncertainty and aleatoric uncertainty are modelled for the $T_{1ρ}$ quantification network to provide a Bayesian confidence estimation of the $T_{1ρ}$ map**. The uncertainty estimation can also regularize the model to prevent it from learning imperfect data. We conducted experiments on $T_{1ρ}$ data collected from 52 patients with non-alcoholic fatty liver disease. The results showed that our method outperformed the existing methods for $T_{1ρ}$ quantification of the liver using as few as two $T_{1ρ}$-weighted images. Our uncertainty estimation provided a feasible way of modelling the confidence of the self-supervised learning based $T_{1ρ}$ estimation, which is consistent with the reality in liver $T_{1ρ}$ imaging.
△ Less
Submitted 25 October, 2022; v1 submitted 7 July, 2022;
originally announced July 2022.
-
Automatic Volumetric Segmentation of Additive Manufacturing Defects with 3D U-Net
Authors:
Vivian Wen Hui Wong,
Max Ferguson,
Kincho H. Law,
Yung-Tsun Tina Lee,
Paul Witherell
Abstract:
Segmentation of additive manufacturing (AM) defects in X-ray Computed Tomography (XCT) images is challenging, due to the poor contrast, small sizes and variation in appearance of defects. Automatic segmentation can, however, provide quality control for additive manufacturing. Over recent years, three-dimensional convolutional neural networks (3D CNNs) have performed well in the volumetric segmenta…
▽ More
Segmentation of additive manufacturing (AM) defects in X-ray Computed Tomography (XCT) images is challenging, due to the poor contrast, small sizes and variation in appearance of defects. Automatic segmentation can, however, provide quality control for additive manufacturing. Over recent years, three-dimensional convolutional neural networks (3D CNNs) have performed well in the volumetric segmentation of medical images. In this work, we leverage techniques from the medical imaging domain and propose training a 3D U-Net model to automatically segment defects in XCT images of AM samples. This work not only contributes to the use of machine learning for AM defect detection but also demonstrates for the first time 3D volumetric segmentation in AM. We train and test with three variants of the 3D U-Net on an AM dataset, achieving a mean intersection of union (IOU) value of 88.4%.
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
Online Bitrate Selection for Viewport Adaptive 360-Degree Video Streaming
Authors:
Ming Tang,
Vincent W. S. Wong
Abstract:
360-degree video streaming provides users with immersive experience by letting users determine their field-of-views (FoVs) in real time. To enhance the users' quality of experience (QoE) given their limited bandwidth, recent works have proposed a viewport adaptive 360-degree video streaming model by exploiting the bitrate adaptation in spatial and temporal domains. Under this video streaming model…
▽ More
360-degree video streaming provides users with immersive experience by letting users determine their field-of-views (FoVs) in real time. To enhance the users' quality of experience (QoE) given their limited bandwidth, recent works have proposed a viewport adaptive 360-degree video streaming model by exploiting the bitrate adaptation in spatial and temporal domains. Under this video streaming model, in this paper, we consider a scenario with a newly generated 360-degree video without viewing history from other users. To maximize the user's QoE, we propose an online bitrate selection algorithm, called OBS360. The proposed online algorithm can adapt to the unknown and heterogeneous users' FoVs and downloading capacities. We prove that the proposed algorithm achieves sublinear dynamic regret under a convex decision set. This suggests that as the number of video segments increases, the performance of the online algorithm approaches the performance of the offline algorithm, where the users' FoVs and downloading capacities are known. We perform simulations with real-world dataset to evaluate the performance of the proposed algorithm. Results show that compared with several existing methods, our proposed algorithm can enhance the users' QoE significantly by improving the viewing bitrate and reducing the inter-segment and intra-segment degradation losses of the users.
△ Less
Submitted 10 April, 2020;
originally announced May 2020.
-
Deep Reinforcement Learning for Task Offloading in Mobile Edge Computing Systems
Authors:
Ming Tang,
Vincent W. S. Wong
Abstract:
In mobile edge computing systems, an edge node may have a high load when a large number of mobile devices offload their tasks to it. Those offloaded tasks may experience large processing delay or even be dropped when their deadlines expire. Due to the uncertain load dynamics at the edge nodes, it is challenging for each device to determine its offloading decision (i.e., whether to offload or not,…
▽ More
In mobile edge computing systems, an edge node may have a high load when a large number of mobile devices offload their tasks to it. Those offloaded tasks may experience large processing delay or even be dropped when their deadlines expire. Due to the uncertain load dynamics at the edge nodes, it is challenging for each device to determine its offloading decision (i.e., whether to offload or not, and which edge node it should offload its task to) in a decentralized manner. In this work, we consider non-divisible and delay-sensitive tasks as well as edge load dynamics, and formulate a task offloading problem to minimize the expected long-term cost. We propose a model-free deep reinforcement learning-based distributed algorithm, where each device can determine its offloading decision without knowing the task models and offloading decision of other devices. To improve the estimation of the long-term cost in the algorithm, we incorporate the long short-term memory (LSTM), dueling deep Q-network (DQN), and double-DQN techniques. Simulation results with 50 mobile devices and five edge nodes show that the proposed algorithm can reduce the ratio of dropped tasks and average task delay by 86.4%-95.4% and 18.0%-30.1%, respectively, when compared with several existing algorithms.
△ Less
Submitted 10 April, 2020;
originally announced May 2020.
-
A Deep Reinforcement Learning Approach for Dynamic Contents Caching in HetNets
Authors:
Manyou Ma,
Vincent W. S. Wong
Abstract:
The recent development in Internet of Things necessitates caching of dynamic contents, where new versions of contents become available around-the-clock and thus timely update is required to ensure their relevance. The age of information (AoI) is a performance metric that evaluates the freshness of contents. Existing works on AoI-optimization of cache content update algorithms focus on minimizing t…
▽ More
The recent development in Internet of Things necessitates caching of dynamic contents, where new versions of contents become available around-the-clock and thus timely update is required to ensure their relevance. The age of information (AoI) is a performance metric that evaluates the freshness of contents. Existing works on AoI-optimization of cache content update algorithms focus on minimizing the long-term average AoI of all cached contents. Sometimes user requests that need to be served in the future are known in advance and can be stored in user request queues. In this paper, we propose dynamic cache content update scheduling algorithms that exploit the user request queues. We consider a special use case where the trained neural networks (NNs) from deep learning models are being cached in a heterogeneous network. A queue-aware cache content update scheduling algorithm based on Markov decision process (MDP) is developed to minimize the average AoI of the NNs delivered to the users plus the cost related to content updating. By using deep reinforcement learning (DRL), we propose a low complexity suboptimal scheduling algorithm. Simulation results show that, under the same update frequency, our proposed algorithms outperform the periodic cache content update scheme and reduce the average AoI by up to 35%.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Joint User Pairing and Association for Multicell NOMA: A Pointer Network-based Approach
Authors:
Manyou Ma,
Vincent W. S. Wong
Abstract:
In this paper, we investigate the joint user pairing and association problem for multicell non-orthogonal multiple access (NOMA) systems. We consider a scenario where the user equipments (UEs) are located in a multicell network equipped with multiple base stations. Each base station has multiple orthogonal physical resource blocks (PRBs). Each PRB can be allocated to a pair of UEs using NOMA. Each…
▽ More
In this paper, we investigate the joint user pairing and association problem for multicell non-orthogonal multiple access (NOMA) systems. We consider a scenario where the user equipments (UEs) are located in a multicell network equipped with multiple base stations. Each base station has multiple orthogonal physical resource blocks (PRBs). Each PRB can be allocated to a pair of UEs using NOMA. Each UE has the additional freedom to be served by any one of the base stations, which further increases the complexity of the joint user pairing and association algorithm design. Leveraging the recent success on using machine learning to solve numerical optimization problems, we formulate the joint user pairing and association problem as a combinatorial optimization problem. The solution is found using an emerging deep learning architecture called Pointer Network (PtrNet), which has a lower computational complexity compared to solutions based on iterative algorithms and has been proven to achieve near-optimal performance. The training phase of the PtrNet is based on deep reinforcement learning (DRL), and does not require the use of the optimal solution of the formulated problem as training labels. Simulation results show that the proposed joint user pairing and association scheme achieves near-optimal performance in terms of the aggregate data rate, and outperforms the random user pairing and association heuristic by up to 30%.
△ Less
Submitted 15 April, 2020;
originally announced April 2020.
-
Cache-Aided Non-Orthogonal Multiple Access: The Two-User Case
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Xiaohu Ge,
Zhiguo Ding,
Vincent W. S. Wong,
Robert Schober
Abstract:
In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission. The proposed scheme not only reaps the benefits associated with NOMA and caching, but also exploits the data cached at the users for interference cancellation. As a consequence, caching can help to reduce the residual interference power, making multiple decoding orde…
▽ More
In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission. The proposed scheme not only reaps the benefits associated with NOMA and caching, but also exploits the data cached at the users for interference cancellation. As a consequence, caching can help to reduce the residual interference power, making multiple decoding orders at the users feasible. The resulting flexibility in decoding can be exploited for improved NOMA detection. We characterize the achievable rate region of cache-aided NOMA and derive the Pareto optimal rate tuples forming the boundary of the rate region. Moreover, we optimize cache-aided NOMA for minimization of the time required for completing file delivery. The optimal decoding order and the optimal transmit power and rate allocation are derived as functions of the cache status, the file sizes, and the channel conditions. Simulation results confirm that, compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region and increases the sum rate for downlink transmission, which translates into substantially reduced file delivery times.
△ Less
Submitted 19 March, 2019; v1 submitted 29 January, 2018;
originally announced January 2018.
-
Cache-Aided Non-Orthogonal Multiple Access
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Xiaohu Ge,
Zhiguo Ding,
Vincent W. S. Wong,
Robert Schober
Abstract:
In this paper, we propose a novel joint caching and non-orthogonal multiple access (NOMA) scheme to facilitate advanced downlink transmission for next generation cellular networks. In addition to rea** the conventional advantages of caching and NOMA transmission, the proposed cache-aided NOMA scheme also exploits cached data for interference cancellation which is not possible with separate cachi…
▽ More
In this paper, we propose a novel joint caching and non-orthogonal multiple access (NOMA) scheme to facilitate advanced downlink transmission for next generation cellular networks. In addition to rea** the conventional advantages of caching and NOMA transmission, the proposed cache-aided NOMA scheme also exploits cached data for interference cancellation which is not possible with separate caching and NOMA transmission designs. Furthermore, as caching can help to reduce the residual interference power, several decoding orders are feasible at the receivers, and these decoding orders can be flexibly selected for performance optimization. We characterize the achievable rate region of cache-aided NOMA and investigate its benefits for minimizing the time required to complete video file delivery. Our simulation results reveal that, compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region for downlink transmission, which translates into substantially reduced file delivery times.
△ Less
Submitted 29 January, 2018; v1 submitted 27 December, 2017;
originally announced December 2017.
-
Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Robert Schober,
Vincent W. S. Wong
Abstract:
In this paper, we propose a novel wireless caching scheme to enhance the physical layer security of video streaming in cellular networks with limited backhaul capacity. By proactively sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative joint transmission of several BSs can be dynamically enabled in accordance with the cache status…
▽ More
In this paper, we propose a novel wireless caching scheme to enhance the physical layer security of video streaming in cellular networks with limited backhaul capacity. By proactively sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative joint transmission of several BSs can be dynamically enabled in accordance with the cache status, the channel conditions, and the backhaul capacity. Assuming imperfect channel state information (CSI) at the transmitters, we formulate a two-stage non-convex mixed-integer robust optimization problem for minimizing the total transmit power while providing quality of service (QoS) and guaranteeing communication secrecy during video delivery, where the caching and the cooperative transmission policy are optimized in an offline video caching stage and an online video delivery stage, respectively. Although the formulated optimization problem turns out to be NP-hard, low-complexity polynomial-time algorithms, whose solutions are globally optimal under certain conditions, are proposed for cache training and video delivery control. Caching is shown to be beneficial as it reduces the data sharing overhead imposed on the capacity-constrained backhaul links, introduces additional secure degrees of freedom, and enables a power-efficient communication system design. Simulation results confirm that the proposed caching scheme achieves simultaneously a low secrecy outage probability and a high power efficiency. Furthermore, due to the proposed robust optimization, the performance loss caused by imperfect CSI knowledge can be significantly reduced when the cache capacity becomes large.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
On Identification of Distribution Grids
Authors:
Omid Ardakanian,
Vincent W. S. Wong,
Roel Dobbe,
Steven H. Low,
Alexandra von Meier,
Claire Tomlin,
Ye Yuan
Abstract:
Large-scale integration of distributed energy resources into residential distribution feeders necessitates careful control of their operation through power flow analysis. While the knowledge of the distribution system model is crucial for this type of analysis, it is often unavailable or outdated. The recent introduction of synchrophasor technology in low-voltage distribution grids has created an…
▽ More
Large-scale integration of distributed energy resources into residential distribution feeders necessitates careful control of their operation through power flow analysis. While the knowledge of the distribution system model is crucial for this type of analysis, it is often unavailable or outdated. The recent introduction of synchrophasor technology in low-voltage distribution grids has created an unprecedented opportunity to learn this model from high-precision, time-synchronized measurements of voltage and current phasors at various locations. This paper focuses on joint estimation of model parameters (admittance values) and operational structure of a poly-phase distribution network from the available telemetry data via the lasso, a method for regression shrinkage and selection. We propose tractable convex programs capable of tackling the low rank structure of the distribution system and develop an online algorithm for early detection and localization of critical events that induce a change in the admittance matrix. The efficacy of these techniques is corroborated through power flow studies on four three-phase radial distribution systems serving real household demands.
△ Less
Submitted 4 November, 2017;
originally announced November 2017.
-
Hierarchical Fog-Cloud Computing for IoT Systems: A Computation Offloading Game
Authors:
Hamed Shah-Mansouri,
Vincent W. S. Wong
Abstract:
Fog computing, which provides low-latency computing services at the network edge, is an enabler for the emerging Internet of Things (IoT) systems. In this paper, we study the allocation of fog computing resources to the IoT users in a hierarchical computing paradigm including fog and remote cloud computing services. We formulate a computation offloading game to model the competition between IoT us…
▽ More
Fog computing, which provides low-latency computing services at the network edge, is an enabler for the emerging Internet of Things (IoT) systems. In this paper, we study the allocation of fog computing resources to the IoT users in a hierarchical computing paradigm including fog and remote cloud computing services. We formulate a computation offloading game to model the competition between IoT users and allocate the limited processing power of fog nodes efficiently. Each user aims to maximize its own quality of experience (QoE), which reflects its satisfaction of using computing services in terms of the reduction in computation energy and delay. Utilizing a potential game approach, we prove the existence of a pure Nash equilibrium and provide an upper bound for the price of anarchy. Since the time complexity to reach the equilibrium increases exponentially in the number of users, we further propose a near-optimal resource allocation mechanism and prove that in a system with $N$ IoT users, it can achieve an $ε$-Nash equilibrium in $O(N/ε)$ time. Through numerical studies, we evaluate the users' QoE as well as the equilibrium efficiency. Our results reveal that by utilizing the proposed mechanism, more users benefit from computing services in comparison to an existing offloading mechanism. We further show that our proposed mechanism significantly reduces the computation delay and enables low-latency fog computing services for delay-sensitive IoT applications.
△ Less
Submitted 17 October, 2017;
originally announced October 2017.
-
Secure Video Streaming in Heterogeneous Small Cell Networks with Untrusted Cache Helpers
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Robert Schober,
Vincent W. S. Wong
Abstract:
This paper studies secure video streaming in cache-enabled small cell networks, where some of the cache-enabled small cell base stations (BSs) hel** in video delivery are untrusted. Unfavorably, caching improves the eavesdrop** capability of these untrusted helpers as they may intercept both the cached and the delivered video files. To address this issue, we propose joint caching and scalable…
▽ More
This paper studies secure video streaming in cache-enabled small cell networks, where some of the cache-enabled small cell base stations (BSs) hel** in video delivery are untrusted. Unfavorably, caching improves the eavesdrop** capability of these untrusted helpers as they may intercept both the cached and the delivered video files. To address this issue, we propose joint caching and scalable video coding (SVC) of video files to enable secure cooperative multiple-input multiple-output (MIMO) transmission and, at the same time, exploit the cache memory of both the trusted and untrusted BSs for improving the system performance. Considering imperfect channel state information (CSI) at the transmitters, we formulate a two-timescale non-convex mixed-integer robust optimization problem to minimize the total transmit power required for guaranteeing the quality of service (QoS) and secrecy during video streaming. We develop an iterative algorithm based on a modified generalized Benders decomposition (GBD) to solve the problem optimally, where the caching and the cooperative transmission policies are determined via offline (long-timescale) and online (short-timescale) optimization, respectively. Furthermore, inspired by the optimal algorithm, a low-complexity suboptimal algorithm based on a greedy heuristic is proposed. Simulation results show that the proposed schemes achieve significant gains in power efficiency and secrecy performance compared to several baseline schemes.
△ Less
Submitted 29 January, 2018; v1 submitted 25 July, 2017;
originally announced July 2017.
-
Cache-Enabled Physical-Layer Security for Video Streaming in Wireless Networks with Limited Backhaul
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Robert Schober,
Vincent W. S. Wong
Abstract:
In this paper, we investigate for the first time the benefits of wireless caching for the physical layer security (PLS) of wireless networks. In particular, a caching scheme enabling power-efficient PLS is proposed for cellular video streaming with constrained backhaul capacity. By sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperati…
▽ More
In this paper, we investigate for the first time the benefits of wireless caching for the physical layer security (PLS) of wireless networks. In particular, a caching scheme enabling power-efficient PLS is proposed for cellular video streaming with constrained backhaul capacity. By sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative transmission of several BSs is dynamically enabled in accordance with the cache status, the channel conditions, and the backhaul capacity. Thereby, caching reduces the data sharing overhead over the capacity-constrained backhaul links. More importantly, caching introduces additional secure degrees of freedom and enables a power-efficient design. We investigate the optimal caching and transmission policies for minimizing the total transmit power while providing quality of service (QoS) and guaranteeing secrecy during video delivery. A two-stage non-convex mixed-integer optimization problem is formulated, which optimizes the caching policy in an offline video caching stage and the cooperative transmission policy in an online video delivery stage. As the problem is NP-hard, suboptimal polynomial-time algorithms are proposed for low-complexity cache training and delivery control, respectively. Sufficient optimality conditions, under which the proposed schemes attain global optimal solutions, are also provided. Simulation results show that the proposed schemes achieve low secrecy outage probability and high power efficiency simultaneously.
△ Less
Submitted 4 December, 2016;
originally announced December 2016.
-
Temporal Matrix Completion with Locally Linear Latent Factors for Medical Applications
Authors:
Frodo Kin Sun Chan,
Andy J Ma,
Pong C Yuen,
Terry Cheuk-Fung Yip,
Yee-Kit Tse,
Vincent Wai-Sun Wong,
Grace Lai-Hung Wong
Abstract:
Regular medical records are useful for medical practitioners to analyze and monitor patient health status especially for those with chronic disease, but such records are usually incomplete due to unpunctuality and absence of patients. In order to resolve the missing data problem over time, tensor-based model is suggested for missing data imputation in recent papers because this approach makes use…
▽ More
Regular medical records are useful for medical practitioners to analyze and monitor patient health status especially for those with chronic disease, but such records are usually incomplete due to unpunctuality and absence of patients. In order to resolve the missing data problem over time, tensor-based model is suggested for missing data imputation in recent papers because this approach makes use of low rank tensor assumption for highly correlated data. However, when the time intervals between records are long, the data correlation is not high along temporal direction and such assumption is not valid. To address this problem, we propose to decompose a matrix with missing data into its latent factors. Then, the locally linear constraint is imposed on these factors for matrix completion in this paper. By using a publicly available dataset and two medical datasets collected from hospital, experimental results show that the proposed algorithm achieves the best performance by comparing with the existing methods.
△ Less
Submitted 31 October, 2016;
originally announced November 2016.
-
Cross-Layer Optimization of Fast Video Delivery in Cache-Enabled Relaying Networks
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Toufiqul Islam,
Robert Schober,
Vincent W. S. Wong
Abstract:
This paper investigates the cross-layer optimization of fast video delivery and caching for minimization of the overall video delivery time in a two-hop relaying network. The half-duplex relay nodes are equipped with both a cache and a buffer which facilitate joint scheduling of fetching and delivery to exploit the channel diversity for improving the overall delivery performance. The fast delivery…
▽ More
This paper investigates the cross-layer optimization of fast video delivery and caching for minimization of the overall video delivery time in a two-hop relaying network. The half-duplex relay nodes are equipped with both a cache and a buffer which facilitate joint scheduling of fetching and delivery to exploit the channel diversity for improving the overall delivery performance. The fast delivery control is formulated as a two-stage functional non-convex optimization problem. By exploiting the underlying convex and quasi-convex structures, the problem can be solved exactly and efficiently by the developed algorithm. Simulation results show that significant caching and buffering gains can be achieved with the proposed framework, which translates into a reduction of the overall video delivery time. Besides, a trade-off between caching and buffering gains is unveiled.
△ Less
Submitted 17 November, 2015;
originally announced November 2015.
-
Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of Network Coding
Authors:
Amir-Hamed Mohsenian-Rad,
Jianwei Huang,
Vincent W. S. Wong,
Sidharth Jaggi,
Robert Schober
Abstract:
A common assumption in the existing network coding literature is that the users are cooperative and non-selfish. However, this assumption can be violated in practice. In this paper, we analyze inter-session network coding in a wired network using game theory. We assume selfish users acting strategically to maximize their own utility, leading to a resource allocation game among users. In particul…
▽ More
A common assumption in the existing network coding literature is that the users are cooperative and non-selfish. However, this assumption can be violated in practice. In this paper, we analyze inter-session network coding in a wired network using game theory. We assume selfish users acting strategically to maximize their own utility, leading to a resource allocation game among users. In particular, we study the well-known butterfly network topology where a bottleneck link is shared by several network coding and routing flows. We prove the existence of a Nash equilibrium for a wide range of utility functions. We show that the number of Nash equilibria can be large (even infinite) for certain choices of system parameters. This is in sharp contrast to a similar game setting with traditional packet forwarding where the Nash equilibrium is always unique. We then characterize the worst-case efficiency bounds, i.e., the Price-of-Anarchy (PoA), compared to an optimal and cooperative network design. We show that by using a novel discriminatory pricing scheme which charges encoded and forwarded packets differently, we can improve the PoA. However, regardless of the discriminatory pricing scheme being used, the PoA is still worse than for the case when network coding is not applied. This implies that, although inter-session network coding can improve performance compared to ordinary routing, it is significantly more sensitive to users' strategic behaviour. For example, in a butterfly network where the side links have zero cost, the efficiency can be as low as 25%. If the side links have non-zero cost, then the efficiency can further reduce to only 20%. These results generalize the well-known result of guaranteed 67% worst-case efficiency for traditional packet forwarding networks.
△ Less
Submitted 19 April, 2009;
originally announced April 2009.