total 27938took 0.13s

The Age of Incorrect Information: A New Performance Metric for Status UpdatesJul 15 2019In this paper, we introduce a new performance metric in the framework of status updates that we will refer to as the Age of Incorrect Information (AoII). This new metric deals with the shortcomings of both the Age of Information (AoI) and the conventional ... More

Empirical Coordination Subject to a Fidelity CriterionJul 15 2019We study the problem of empirical coordination subject to a fidelity criterion for a general set-up. We prove a result which indicates a strong connection between our framework and the framework of empirical coordination developed in [1]. It turns out ... More

On the Polarization of Rényi EntropyJul 15 2019Existing polarization theories have mostly been concerned with Shannon's information measures, such as Shannon entropy and mutual information, and some related measures such as the Bhattacharyya parameter. In this work, we extend polarization theories ... More

Single-Component Privacy Guarantees in Helper Data Systems and Sparse CodingJul 15 2019We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about ... More

Reliability-Latency Performance of Frameless ALOHA with and without FeedbackJul 15 2019This paper presents a finite length analysis of multi-slot type frameless ALOHA based on a dynamic programming approach. The analysis is exact, but its evaluation is only feasible for short contention periods due to the computational complexity. The analysis ... More

Entanglement-assisted Quantum Codes from Algebraic Geometry CodesJul 15 2019Quantum error correcting codes play the role of suppressing noise and decoherence in quantum systems by introducing redundancy. Some strategies can be used to improve the parameters of these codes. For example, entanglement can provide a way for quantum ... More

Resource theory of asymmetric distinguishability for quantum channelsJul 15 2019This paper develops the resource theory of asymmetric distinguishability for quantum channels, generalizing the related resource theory for states [arXiv:1006.0302, arXiv:1905.11629]. The key constituents of the channel resource theory are quantum channel ... More

Combinatorial t-designs from quadratic functionsJul 14 2019Combinatorial $t$-designs have been an interesting topic in combinatorics for decades. It was recently reported that the image sets of a fixed size of certain special polynomials may constitute a $t$-design. Till now only a small amount of work on constructing ... More

Necessary and sufficient condition for equilibrium of the Hotelling modelJul 14 2019We study a model of vendors competing to sell a homogeneous product to customers spread evenly along a linear city. This model is based on Hotelling's celebrated paper in 1929. Our aim in this paper is to present a necessary and sufficient condition for ... More

Hybrid Offline-Online Design for UAV-Enabled Data Harvesting in Probabilistic LoS ChannelJul 14 2019This paper considers an unmanned aerial vehicle (UAV)-enabled wireless sensor network (WSN) in urban areas, where a UAV is deployed to collect data from distributed sensor nodes (SNs) within a given duration. To characterize the occasional building blockage ... More

Compressed Subspace Learning Based on Canonical Angle Preserving PropertyJul 14 2019A standard way to tackle the challenging task of learning from high-dimensional data is to exploit its underlying low-dimensional structure. Union of Subspaces (UoS) is a popular and powerful model to describe such structure which assumes that the data ... More

Energy-Efficient Activation and Uplink Transmission for Cellular IoTJul 14 2019Consider a large-scale cellular network in which base stations (BSs) serve massive Internet-of-Things (IoT) devices. Since IoT devices are powered by a capacity-limited battery, how to prolong their working lifetime is a paramount problem for the success ... More

On Discrete-Time/Frequency-Periodic End-to-End Fiber-Optical Channel ModelsJul 13 2019A discrete-time end-to-end fiber-optical channel model is derived based on the first-order perturbation approach. The model relates the discrete-time input symbol sequences of co-propagating wavelength channels to the received symbol sequence after matched ... More

Skew Generalized Cyclic Code over $ R[x_1;σ_1,δ_1][x_2;σ_2,δ_2]$Jul 13 2019This article studies two dimensional skew generalized cyclic (SGC) codes, i.e., SGC codes over the ring $ R[x_1;\sigma_1,\delta_1][x_2;\sigma_2,\delta_2]$, where $R$ is a ring with unity. Here, we discuss the structural properties of SGC codes, and a ... More

Lower Bound for RIP Constants and Concentration of Sum of Top Order StatisticsJul 13 2019Restricted Isometry Property (RIP) is of fundamental importance in the theory of compressed sensing and forms the base of many exact and robust recovery guarantees in this field. A quantitative description of RIP involves bounding the so-called RIP constants ... More

Energy-Efficient Radio Resource Allocation for Federated Edge LearningJul 13 2019Edge machine learning involves the development of learning algorithms at the network edge to leverage massive distributed data and computation resources. Among others, the framework of federated edge learning (FEEL) is particularly promising for its data-privacy ... More

Intelligent Reflecting Surface: Practical Phase Shift Model and Beamforming OptimizationJul 13 2019Intelligent reflecting surface (IRS) that enables the control of the wireless propagation environment has been looked upon as a promising technology for boosting the spectrum and energy efficiency in future wireless communication systems. Prior works ... More

Local Distribution Obfuscation via Probability CouplingJul 13 2019We introduce a general model for the local obfuscation of probability distributions and investigate its theoretical properties. Specifically, we relax a notion of distribution privacy by generalizing it to divergence, and investigate local obfuscation ... More

On the Differential Linear Connectivity Table of Vectorial Boolean FunctionsJul 13 2019Vectorial Boolean functions are crucial building blocks in symmetric ciphers. Different known attacks on block ciphers have resulted in diverse cryptographic criteria of vectorial Boolean functions,such as differential distribution table and nonlinearity. ... More

Distributed Black-Box Optimization via Error Correcting CodesJul 13 2019We introduce a novel distributed derivative-free optimization framework that is resilient to stragglers. The proposed method employs coded search directions at which the objective function is evaluated, and a decoding step to find the next iterate. Our ... More

Linear programming bounds for cliques in Paley graphsJul 12 2019The Lov\'{a}sz theta number is a semidefinite programming bound on the clique number of (the complement of) a given graph. Given a vertex-transitive graph, every vertex belongs to a maximal clique, and so one can instead apply this semidefinite programming ... More

Multi-Hop Wireless Optical Backhauling for LiFi Attocell Networks: Bandwidth Scheduling and Power ControlJul 12 2019The backhaul of hundreds of light fidelity (LiFi) base stations (BSs) constitutes a major challenge. Indoor wireless optical backhauling is a novel approach whereby the interconnections between adjacent LiFi BSs are provided by way of directed line-of-sight ... More

Random Khatri-Rao-Product Codes for Numerically-Stable Distributed Matrix MultiplicationJul 12 2019We propose a class of codes called random Khatri-Rao-Product (RKRP) codes for distributed matrix multiplication in the presence of stragglers. The main advantage of the proposed codes is that decoding of RKRP codes is highly numerically stable in comparison ... More

Efficient average-case population recovery in the presence of insertions and deletionsJul 12 2019Several recent works have considered the \emph{trace reconstruction problem}, in which an unknown source string $x\in\{0,1\}^n$ is transmitted through a probabilistic channel which may randomly delete coordinates or insert random bits, resulting in a ... More

Quantum codes from a new construction of self-orthogonal algebraic geometry codesJul 12 2019We present new quantum codes with good parameters which are constructed from self-orthogonal algebraic geometry codes. Our method permits a wide class of curves to be used in the formation of these codes, which greatly extends the class of a previous ... More

Beamforming Design in Multiple-Input-Multiple-Output Symbiotic Radio Backscatter SystemsJul 12 2019Symbiotic radio (SR) backscatter systems are possible techniques for the future low-power wireless communications for Internet of Things devices. In this paper, we propose a multiple-input-multiple-output (MIMO) SR backscatter system, where the secondary ... More

Non-Orthogonal Multiple Access in UAV-to-Everything (U2X) NetworksJul 12 2019This article investigates the non-orthogonal multiple access (NOMA) enhanced unmanned aerial vehicle (UAV)-to-Everything (U2X) frameworks. A novel 3-Dimension framework for providing wireless services to randomly roaming NOMA receivers (Rxs) in the sphere ... More

Weighted Sum Power Maximization for Intelligent Reflecting Surface Aided SWIPTJul 12 2019The low efficiency of far-field wireless power transfer (WPT) limits the fundamental rate-energy (R-E) performance trade-off of the simultaneous wireless information and power transfer (SWIPT) system. To address this challenge, we propose in this letter ... More

Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future DirectionsJul 12 2019Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add ... More

The Landscape of Non-convex Empirical Risk with Degenerate Population RiskJul 11 2019The landscape of empirical risk has been widely studied in a series of machine learning problems, including low-rank matrix factorization, matrix sensing, matrix completion, and phase retrieval. In this work, we focus on the situation where the corresponding ... More

On some automorphisms of rational functions and their applications in rank metric codesJul 11 2019Recently, there is a growing interest in the study of rank metric codes. These codes have applications in network coding and cryptography. In this paper, we investigate some automorpshisms on polynomial rings over finite fields. We show how the linear ... More

Entropy Estimation of Physically Unclonable Functions via Chow ParametersJul 11 2019A physically unclonable function (PUF) is an electronic circuit that produces an intrinsic identifier in response to a challenge. These identifiers depend on uncontrollable variations of the manufacturing process, which make them hard to predict or to ... More

Generalized Mutual InformationJul 11 2019Mutual information is one of the essential building blocks of information theory. Yet, it is only finitely defined for distributions with fast decaying tails on a countable joint alphabet of two random elements. The unboundedness of mutual information ... More

Coverage Probability Analysis Under Clustered Ambient Backscatter NodesJul 11 2019In this paper, we consider a new large-scale communication scheme where randomly distributed AmBC nodes are involved as secondary users to primary transmitter (PT) and primary receiver (PR) pairs. The secondary communication between a backscatter transmitter ... More

Data by Proxy -- Material Traces as Autographic VisualizationsJul 11 2019Information visualization limits itself, per definition, to the domain of symbolic information. This paper discusses arguments why the field should also consider forms of data that are not symbolically encoded, including physical traces and material indicators. ... More

Timely Cloud Computing: Preemption and WaitingJul 11 2019The notion of timely status updating is investigated in the context of cloud computing. Measurements of a time-varying process of interest are acquired by a sensor node, and uploaded to a cloud server to undergo some required computations. These computations ... More

Using Chinese Characters To Generate Text-Based Passwords For Information SecurityJul 11 2019Graphical passwords (GPWs) are in many areas of the current world. Topological graphic passwords (Topsnut-gpws) are a new type of cryptography, and they differ from the existing GPWs. A Topsnut-gpw consists of two parts: one is a topological structure ... More

Minimax Theorems for Finite Blocklength Lossy Joint Source-Channel Coding over an AVCJul 11 2019Motivated by applications in the security of cyber-physical systems, we pose the finite blocklength communication problem in the presence of a jammer as a zero-sum game between the encoder-decoder team and the jammer, by allowing the communicating team ... More

Computing sharp recovery structures for Locally Recoverable codesJul 11 2019A locally recoverable code is an error-correcting code such that any erasure in a single coordinate of a codeword can be recovered from a small subset of other coordinates. In this article we develop an algorithm that computes a recovery structure as ... More

Information-Centric Grant-Free Access for IoT Fog Networks: Edge vs Cloud Detection and LearningJul 11 2019A multi-cell Fog-Radio Access Network (F-RAN) architecture is considered in which Internet of Things (IoT) devices periodically make noisy observations of a Quantity of Interest (QoI) and transmit using grant-free access in the uplink. The devices in ... More

Information-Centric Grant-Free Access for IoT Fog Networks: Edge vs Cloud Detection and LearningJul 11 2019Jul 12 2019A multi-cell Fog-Radio Access Network (F-RAN) architecture is considered in which Internet of Things (IoT) devices periodically make noisy observations of a Quantity of Interest (QoI) and transmit using grant-free access in the uplink. The devices in ... More

Error Exponents for Asynchronous Multiple Access Channels. Controlled Asynchronism may Outperform SynchronismJul 11 2019Exponential error bounds are derived for frame-asynchronous discrete memoryless multiple access channels with two senders. By numerical evaluation for a particular case, it follows that the reliability function for synchronous transmission may be beaten ... More

Towards a Connected Sky: Performance of Beamforming with Down-tilted Antennas for Ground and UAV User Co-existenceJul 11 2019Providing connectivity to aerial users such as cellular connected unmanned aerial vehicles is a key challenge for future cellular systems. In this paper, the use of conjugate beamforming for simultaneous content delivery to an AU coexisting with multiple ... More

Recovery and Repair Schemes for Shift-XOR Regenerating CodesJul 11 2019Recovery and repair schemes are proposed for shift-exclusive-or (shift-XOR) product-matrix (PM) regenerating codes, which outperform those of the existing PM codes in terms of both communication and computation costs. In particular, for the minimum bandwidth ... More

Kolmogorov complexity in the USSR (1975--1982): isolation and its endJul 11 2019These reminiscences are about the "dark ages" of algorithmic information theory in the USSR. After a great interest in this topic in 1960s and the beginning of 1970s the number of people working in this area in the USSR decreased significantly. At that ... More

Terahertz Band: The Last Piece of RF Spectrum Puzzle for Communication SystemsJul 11 2019Ultra-high bandwidth, negligible latency and seamless communication for devices and applications are envisioned as major milestones that will revolutionize the way by which societies create, distribute and consume information. The remarkable expansion ... More

On Analysis of the Bitcoin and Prism Backbone ProtocolsJul 11 2019Bitcoin is a peer-to-peer payment system proposed by Nakamoto in 2008. Properties of the bitcoin backbone protocol have been investigated in some depth: the blockchain growth property quantifies the number of blocks added to the blockchain during any ... More

Message passing-based link configuration in short range millimeter wave systemsJul 11 2019Millimeter wave (mmWave) communication in typical wearable and data center settings is short range. As the distance between the transmitter and the receiver in short range scenarios can be comparable to the length of the antenna arrays, the common far ... More

Learning the Wireless V2I Channels Using Deep Neural NetworksJul 10 2019For high data rate wireless communication systems, developing an efficient channel estimation approach is extremely vital for channel detection and signal recovery. With the trend of high-mobility wireless communications between vehicles and vehicles-to-infrastructure ... More

Entropy and Compression: A simple proof of an inequality of KhinchinJul 10 2019We prove that Entropy is a lower bound for the average compression ratio of any lossless compressor by giving a simple proof of an inequality that is a slightly variation of an inequality firstly proved by A. I. Khinchin in 1953.

Cooperative Localization with Angular Measurements and Posterior LinearizationJul 10 2019The application of cooperative localization in vehicular networks is attractive to improve accuracy and coverage. Conventional distance measurements between vehicles are limited by the need for synchronization and provide no heading information of the ... More

Minimal linear codes arising from blocking setsJul 10 2019Minimal linear codes are algebraic objects which gained interest in the last twenty years, due to their link with Massey's secret sharing schemes. In this context, Ashikhmin and Barg provided a useful and a quite easy to handle sufficient condition for ... More

Adding Common Randomness Can Remove the Secrecy Constraints in Communication NetworksJul 10 2019In communication networks secrecy constraints usually incur an extra limit in capacity or generalized degrees-of-freedom (GDoF), in the sense that a penalty in capacity or GDoF is incurred due to the secrecy constraints. Over the past decades a significant ... More

User Detection Performance Analysis for Grant-Free Uplink Transmission in Large-Scale Antenna SystemsJul 10 2019In this paper, user detection performance of a grant-free uplink transmission in a large scale antenna system is analyzed, in which a general grant-free multiple access is considered as the system model and Zadoff-Chu sequence is used for the uplink pilot. ... More

Ultrareliable and Low-Latency Communication Techniques for Tactile Internet ServicesJul 10 2019This paper presents novel ultrareliable and low-latency communication (URLLC) techniques for URLLC services, such as Tactile Internet services. Among typical use-cases of URLLC services are tele-operation, immersive virtual reality, cooperative automated ... More

Polynomial Linear System Solving with Errors by Simultaneous Polynomial Reconstruction of Interleaved Reed-Solomon CodesJul 09 2019In this paper we present a new algorithm for Polynomial Linear System Solving (via evaluation/interpolation) with errors. In this scenario, errors can occur in the black box evaluation step. We improve the bound on the number of errors that we can correct, ... More

A Geometric Approach to Rank Metric Codes and a Classification of Constant Weight CodesJul 09 2019In this work we develop a geometric approach to the study of rank metric codes. Using this method, we introduce a simpler definition for generalized rank weight of linear codes. We give a complete classification of constant rank weight codes and we give ... More

Interactive Verifiable Polynomial EvaluationJul 09 2019Cloud computing platforms have created the possibility for computationally limited users to delegate demanding tasks to strong but untrusted servers. Verifiable computing algorithms help build trust in such interactions by enabling the server to provide ... More

On the 3-D Placement of Airborne Base Stations Using Tethered UAVsJul 09 2019One of the main challenges slowing the deployment of airborne base stations (BSs) using unmanned aerial vehicles (UAVs) is the limited on-board energy and flight time. One potential solution to such problem, is to provide the UAV with power supply through ... More

A Simple Derivation of AMP and its State Evolution via First-Order CancellationJul 09 2019We consider the linear regression problem, where the goal is to recover the vector $\boldsymbol{x}\in\mathbb{R}^n$ from measurements $\boldsymbol{y}=\boldsymbol{A}\boldsymbol{x}+\boldsymbol{w}\in\mathbb{R}^m$ under known matrix $\boldsymbol{A}$ and unknown ... More

Fundamental limits of quantum-secure covert communication over bosonic channelsJul 09 2019We investigate the fundamental limit of quantum-secure covert communication over the lossy thermal noise bosonic channel, the quantum-mechanical model underlying many practical channels. We assume that the adversary has unlimited quantum information processing ... More

On the Exact Recovery Conditions of 3D Human Motion from 2D Landmark Motion with Sparse Articulated MotionJul 09 2019In this paper, we address the problem of exact recovery condition in retrieving 3D human motion from 2D landmark motion. We use a skeletal kinematic model to represent the 3D human motion as a vector of angular articulation motion. We address this problem ... More

Deep Learning-Aided Dynamic Read Thresholds Design For Multi-Level-Cell Flash MemoriesJul 09 2019The practical NAND flash memory suffers from various non-stationary noises that are difficult to be predicted. Furthermore, the data retention noise induced channel offset is unknown during the readback process. This severely affects the data recovery ... More

Near-optimal Repair of Reed-Solomon Codes with Low Sub-packetizationJul 09 2019Minimum storage regenerating (MSR) codes are MDS codes which allow for recovery of any single erased symbol with optimal repair bandwidth, based on the smallest possible fraction of the contents downloaded from each of the other symbols. Recently, certain ... More

Collaborative Machine Learning at the Wireless Edge with Blind TransmittersJul 08 2019We study wireless collaborative machine learning (ML), where mobile edge devices, each with its own dataset, carry out distributed stochastic gradient descent (DSGD) over-the-air with the help of a wireless access point acting as the parameter server ... More

Control of Status Updates for Energy Harvesting Devices that Monitor Processes with AlarmsJul 08 2019In this work, we derive optimal transmission policies in an energy harvesting status update system. The system monitors a stochastic process which can be either in a normal or in an alarm state of operation. We capture the freshness of status updates ... More

Distributed Approximation of Functions over Fast Fading Channels with Applications to Distributed Learning and the Max-Consensus ProblemJul 08 2019In this work, we consider the problem of distributed approximation of functions over multiple-access channels with additive noise. In contrast to previous works, we take fast fading into account and give explicit probability bounds for the approximation ... More

Asymmetric LOCO Codes: Constrained Codes for Flash MemoriesJul 08 2019In data storage and data transmission, certain patterns are more likely to be subject to error when written (transmitted) onto the media. In magnetic recording systems with binary data and bipolar non-return-to-zero signaling, patterns that have consecutive ... More

Distance from the Nucleus to a Uniformly Random Point in the Typical and the Crofton Cells of the Poisson-Voronoi TessellationJul 08 2019Consider the distances $R_o$ and $\tilde{R}_o$ from the nucleus to a uniformly random point in the typical and Crofton cells, respectively, of the $d$-dimensional Poisson-Voronoi (PV) tessellation. The main objective of this paper is to characterize the ... More

Enabling Ultra Reliable Wireless Communications for Factory Automation with Distributed MIMOJul 08 2019Factory automation is one of the most challenging use cases for 5G-and-beyond mobile networks due to strict latency, availability and reliability constraints. In this work, an indoor factory scenario is considered, and distributed multiple-input multiple-output ... More

Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random KeysJul 08 2019It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to $z$ network links, to assume that the source node is the only node that generates random keys. In this setting, the secure multicast rate ... More

Vertex-Frequency Graph Signal ProcessingJul 08 2019Graph signal processing deals with signals which are observed on an irregular graph domain. While many approaches have been developed in classical graph theory to cluster vertices and segment large graphs in a signal independent way, signal localization ... More

Graph Signal Processing -- Part I: Graphs, Graph Spectra, and Spectral ClusteringJul 08 2019The area of Data Analytics on graphs promises a paradigm shift as we approach information processing of classes of data, which are typically acquired on irregular but structured domains (social networks, various ad-hoc sensor networks). Yet, despite its ... More

Capacity and Algorithms for a Cognitive Network with Primary-Secondary User CooperationJul 08 2019In this work, we examine cognitive radio networks, where secondary users may act as relays for messages sent by the primary user, hence offering performance improvement of primary transmissions, while at the same time obtaining more transmission opportunities ... More

Channel Impulse Response-based Source Localization in a Diffusion-based Molecular Communication SystemJul 08 2019This work localizes a molecular source in a diffusion based molecular communication (DbMC) system via a set of passive sensors and a fusion center. Molecular source localization finds its applications in future healthcare systems, including proactive ... More

One-step Majority-logic Decoding with Subspace DesignsJul 07 2019Rudoph (1967) introduced one-step majority logic decoding for linear codes derived from combinatorial designs. The decoder is easily realizable in hardware and requires that the dual code has to contain the blocks of so called geometric designs as codewords. ... More

Deep Learning based Wireless Resource Allocation with Application to Vehicular NetworksJul 07 2019It has been a long-held belief that judicious resource allocation is critical to mitigating interference, improving network efficiency, and ultimately optimizing wireless communication performance. The traditional wisdom is to explicitly formulate resource ... More

Max-Min Rate of Cell-Free Massive MIMO Uplink with Optimal Uniform QuantizationJul 07 2019Cell-free Massive multiple-input multiple-output (MIMO) is considered, where distributed access points (APs) multiply the received signal by the conjugate of the estimated channel, and send back a quantized version of this weighted signal to a central ... More

Placement Delivery Arrays from Combinations of Strong Edge ColoringsJul 06 2019It has recently been pointed out in both of the works [C. Shanguan, Y. Zhang, and G. Ge, {\em IEEE Trans. Inform. Theory}, 64(8):5755-5766 (2018)] and [Q. Yan, X. Tang, Q. Chen, and M. Cheng, {\em IEEE Commun. Lett.}, 22(2):236-239 (2018)] that placement ... More

Placement Delivery Arrays from Combinations of Strong Edge ColoringsJul 06 2019Jul 09 2019It has recently been pointed out in both of the works [C. Shanguan, Y. Zhang, and G. Ge, {\em IEEE Trans. Inform. Theory}, 64(8):5755-5766 (2018)] and [Q. Yan, X. Tang, Q. Chen, and M. Cheng, {\em IEEE Commun. Lett.}, 22(2):236-239 (2018)] that placement ... More

Error Probability Bounds for Gaussian Channels under Maximal and Average Power ConstraintsJul 06 2019This paper studies the performance of block coding on an additive white Gaussian noise channel under different power limitations at the transmitter. Lower bounds are presented for the minimum error probability of codes satisfying maximal and average power ... More

Topological Information Data AnalysisJul 06 2019This paper presents methods that quantify the structure of statistical interactions within a given data set, and was first used in \cite{Tapia2018}. It establishes new results on the k-multivariate mutual-informations (I_k) inspired by the topological ... More

Intelligent Reflecting Surface Assisted Non-Orthogonal Multiple AccessJul 06 2019Intelligent reflecting surface (IRS) which consists of a large number of low-cost passive reflecting elements and can digitally manipulating electromagnetic waves, is a new and disruptive technology to achieve spectrum- and energy-efficient as well as ... More

Regularizing linear inverse problems with convolutional neural networksJul 06 2019Deep convolutional neural networks trained on large datsets have emerged as an intriguing alternative for compressing images and solving inverse problems such as denoising and compressive sensing. However, it has only recently been realized that even ... More

Estimating location parameters in entangled single-sample distributionsJul 06 2019We consider the problem of estimating the common mean of independently sampled data, where samples are drawn in a possibly non-identical manner from symmetric, unimodal distributions with a common mean. This generalizes the setting of Gaussian mixture ... More

Resource Allocation for Secure IRS-assisted Multiuser MISO SystemsJul 06 2019In this paper, we study resource allocation design for secure communication in intelligent reflecting surface (IRS)-assisted multiuser multiple-input single-output (MISO) communication systems. To enhance physical layer security, artificial noise (AN) ... More

Resource Allocation for Secure IRS-assisted Multiuser MISO SystemsJul 06 2019Jul 12 2019In this paper, we study resource allocation design for secure communication in intelligent reflecting surface (IRS)-assisted multiuser multiple-input single-output (MISO) communication systems. To enhance physical layer security, artificial noise (AN) ... More

Fusion-Based Cooperative Support Identification for Compressive Networked SensingJul 06 2019This paper proposes a fusion-based cooperative support identification scheme for distributed compressive sparse signal recovery via resource-constrained wireless sensor networks. The proposed support identification protocol involves: (i) local sparse ... More

A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine-ResilienceJul 05 2019We study a setting where a group of agents, each receiving partially informative private signals, seek to collaboratively learn the true underlying state of the world (from a finite set of hypotheses) that generates their joint observation profiles. To ... More

Analysis and Optimisation of Distribution Matching for the Nonlinear Fibre ChannelJul 05 2019Enhanced Gaussian noise models are used to demonstrate that the per-block SNR after fibre transmission varies significantly due to the variable-composition nature of modern probabilistic shaping schemes. We propose a nonlinearity-optimised distribution ... More

Optimal Blocklength Allocation towards Reduced Age of Information in Wireless Sensor NetworksJul 05 2019The freshness or timeliness of data at server is a significant key performance indicator of sensor networks, especially in tolerance critical applications such as factory automation. As an effective and intuitive measurement to data timeliness, the metric ... More

Distributed User Clustering and Resource Allocation for Imperfect NOMA in Heterogeneous NetworksJul 05 2019In this paper, we propose a distributed cluster formation (CF) and resource allocation (RA) framework for non-ideal non-orthogonal multiple access (NOMA) schemes in heterogeneous networks. The imperfection of the underlying NOMA scheme is due to the receiver ... More

Wireless Federated Distillation for Distributed Edge Learning with Heterogeneous DataJul 05 2019Cooperative training methods for distributed machine learning typically assume noiseless and ideal communication channels. This work studies some of the opportunities and challenges arising from the presence of wireless communication links. We specifically ... More

Subspaces intersecting in at most a pointJul 05 2019We improve on the lower bound of the maximum number of planes in $\operatorname{PG}(8,q)\cong\F_q^{9}$ pairwise intersecting in at most a point. In terms of constant dimension codes this leads to $A_q(9,4;3)\ge q^{12}+ 2q^8+2q^7+q^6+2q^5+2q^4-2q^2-2q+1$. ... More

Spherical Large Intelligent SurfacesJul 05 2019As an emerging technology, large intelligent surfaces (LIS) have gain much interest recently. Earlier proposed LISs are in two-dimensional (2D) forms and act as electromagnetic planar surfaces transmitting and receiving radiating signals. In this letter, ... More

Importance of Small Probability Events in Big Data: Information Measures, Applications, and ChallengesJul 05 2019In many applications (e.g., anomaly detection and security systems) of smart cities, rare events dominate the importance of the total information of big data collected by Internet of Things (IoTs). That is, it is pretty crucial to explore the valuable ... More

Importance of Small Probability Events in Big Data: Information Measures, Applications, and ChallengesJul 05 2019Jul 08 2019In many applications (e.g., anomaly detection and security systems) of smart cities, rare events dominate the importance of the total information of big data collected by Internet of Things (IoTs). That is, it is pretty crucial to explore the valuable ... More

Low-power and Reliable Solid-state Drive with Inverted Limited Weight CodingJul 04 2019In this work, we propose a novel coding scheme which based on the characteristics of NAND flash cells, generates codewords that reduce the energy consumption and improve the reliability of solid-state drives. This novel coding scheme, namely Inverted ... More

Early Detection for Optimal-Latency Communications in Multi-Hop LinksJul 04 2019Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate ... More

Early Detection for Optimal-Latency Communications in Multi-Hop LinksJul 04 2019Jul 08 2019Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate ... More