Latest in math.it

total 27938took 0.13s
The Age of Incorrect Information: A New Performance Metric for Status UpdatesJul 15 2019In this paper, we introduce a new performance metric in the framework of status updates that we will refer to as the Age of Incorrect Information (AoII). This new metric deals with the shortcomings of both the Age of Information (AoI) and the conventional ... More
Empirical Coordination Subject to a Fidelity CriterionJul 15 2019We study the problem of empirical coordination subject to a fidelity criterion for a general set-up. We prove a result which indicates a strong connection between our framework and the framework of empirical coordination developed in [1]. It turns out ... More
On the Polarization of Rényi EntropyJul 15 2019Existing polarization theories have mostly been concerned with Shannon's information measures, such as Shannon entropy and mutual information, and some related measures such as the Bhattacharyya parameter. In this work, we extend polarization theories ... More
Single-Component Privacy Guarantees in Helper Data Systems and Sparse CodingJul 15 2019We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about ... More
Reliability-Latency Performance of Frameless ALOHA with and without FeedbackJul 15 2019This paper presents a finite length analysis of multi-slot type frameless ALOHA based on a dynamic programming approach. The analysis is exact, but its evaluation is only feasible for short contention periods due to the computational complexity. The analysis ... More
Entanglement-assisted Quantum Codes from Algebraic Geometry CodesJul 15 2019Quantum error correcting codes play the role of suppressing noise and decoherence in quantum systems by introducing redundancy. Some strategies can be used to improve the parameters of these codes. For example, entanglement can provide a way for quantum ... More
Resource theory of asymmetric distinguishability for quantum channelsJul 15 2019This paper develops the resource theory of asymmetric distinguishability for quantum channels, generalizing the related resource theory for states [arXiv:1006.0302, arXiv:1905.11629]. The key constituents of the channel resource theory are quantum channel ... More
Combinatorial t-designs from quadratic functionsJul 14 2019Combinatorial $t$-designs have been an interesting topic in combinatorics for decades. It was recently reported that the image sets of a fixed size of certain special polynomials may constitute a $t$-design. Till now only a small amount of work on constructing ... More
Necessary and sufficient condition for equilibrium of the Hotelling modelJul 14 2019We study a model of vendors competing to sell a homogeneous product to customers spread evenly along a linear city. This model is based on Hotelling's celebrated paper in 1929. Our aim in this paper is to present a necessary and sufficient condition for ... More
Hybrid Offline-Online Design for UAV-Enabled Data Harvesting in Probabilistic LoS ChannelJul 14 2019This paper considers an unmanned aerial vehicle (UAV)-enabled wireless sensor network (WSN) in urban areas, where a UAV is deployed to collect data from distributed sensor nodes (SNs) within a given duration. To characterize the occasional building blockage ... More
Compressed Subspace Learning Based on Canonical Angle Preserving PropertyJul 14 2019A standard way to tackle the challenging task of learning from high-dimensional data is to exploit its underlying low-dimensional structure. Union of Subspaces (UoS) is a popular and powerful model to describe such structure which assumes that the data ... More
Energy-Efficient Activation and Uplink Transmission for Cellular IoTJul 14 2019Consider a large-scale cellular network in which base stations (BSs) serve massive Internet-of-Things (IoT) devices. Since IoT devices are powered by a capacity-limited battery, how to prolong their working lifetime is a paramount problem for the success ... More
On Discrete-Time/Frequency-Periodic End-to-End Fiber-Optical Channel ModelsJul 13 2019A discrete-time end-to-end fiber-optical channel model is derived based on the first-order perturbation approach. The model relates the discrete-time input symbol sequences of co-propagating wavelength channels to the received symbol sequence after matched ... More
Skew Generalized Cyclic Code over $ R[x_1;σ_1,δ_1][x_2;σ_2,δ_2]$Jul 13 2019This article studies two dimensional skew generalized cyclic (SGC) codes, i.e., SGC codes over the ring $ R[x_1;\sigma_1,\delta_1][x_2;\sigma_2,\delta_2]$, where $R$ is a ring with unity. Here, we discuss the structural properties of SGC codes, and a ... More
Lower Bound for RIP Constants and Concentration of Sum of Top Order StatisticsJul 13 2019Restricted Isometry Property (RIP) is of fundamental importance in the theory of compressed sensing and forms the base of many exact and robust recovery guarantees in this field. A quantitative description of RIP involves bounding the so-called RIP constants ... More
Energy-Efficient Radio Resource Allocation for Federated Edge LearningJul 13 2019Edge machine learning involves the development of learning algorithms at the network edge to leverage massive distributed data and computation resources. Among others, the framework of federated edge learning (FEEL) is particularly promising for its data-privacy ... More
Intelligent Reflecting Surface: Practical Phase Shift Model and Beamforming OptimizationJul 13 2019Intelligent reflecting surface (IRS) that enables the control of the wireless propagation environment has been looked upon as a promising technology for boosting the spectrum and energy efficiency in future wireless communication systems. Prior works ... More
Local Distribution Obfuscation via Probability CouplingJul 13 2019We introduce a general model for the local obfuscation of probability distributions and investigate its theoretical properties. Specifically, we relax a notion of distribution privacy by generalizing it to divergence, and investigate local obfuscation ... More
On the Differential Linear Connectivity Table of Vectorial Boolean FunctionsJul 13 2019Vectorial Boolean functions are crucial building blocks in symmetric ciphers. Different known attacks on block ciphers have resulted in diverse cryptographic criteria of vectorial Boolean functions,such as differential distribution table and nonlinearity. ... More
Distributed Black-Box Optimization via Error Correcting CodesJul 13 2019We introduce a novel distributed derivative-free optimization framework that is resilient to stragglers. The proposed method employs coded search directions at which the objective function is evaluated, and a decoding step to find the next iterate. Our ... More
Linear programming bounds for cliques in Paley graphsJul 12 2019The Lov\'{a}sz theta number is a semidefinite programming bound on the clique number of (the complement of) a given graph. Given a vertex-transitive graph, every vertex belongs to a maximal clique, and so one can instead apply this semidefinite programming ... More
Multi-Hop Wireless Optical Backhauling for LiFi Attocell Networks: Bandwidth Scheduling and Power ControlJul 12 2019The backhaul of hundreds of light fidelity (LiFi) base stations (BSs) constitutes a major challenge. Indoor wireless optical backhauling is a novel approach whereby the interconnections between adjacent LiFi BSs are provided by way of directed line-of-sight ... More
Random Khatri-Rao-Product Codes for Numerically-Stable Distributed Matrix MultiplicationJul 12 2019We propose a class of codes called random Khatri-Rao-Product (RKRP) codes for distributed matrix multiplication in the presence of stragglers. The main advantage of the proposed codes is that decoding of RKRP codes is highly numerically stable in comparison ... More
Efficient average-case population recovery in the presence of insertions and deletionsJul 12 2019Several recent works have considered the \emph{trace reconstruction problem}, in which an unknown source string $x\in\{0,1\}^n$ is transmitted through a probabilistic channel which may randomly delete coordinates or insert random bits, resulting in a ... More
Quantum codes from a new construction of self-orthogonal algebraic geometry codesJul 12 2019We present new quantum codes with good parameters which are constructed from self-orthogonal algebraic geometry codes. Our method permits a wide class of curves to be used in the formation of these codes, which greatly extends the class of a previous ... More
Beamforming Design in Multiple-Input-Multiple-Output Symbiotic Radio Backscatter SystemsJul 12 2019Symbiotic radio (SR) backscatter systems are possible techniques for the future low-power wireless communications for Internet of Things devices. In this paper, we propose a multiple-input-multiple-output (MIMO) SR backscatter system, where the secondary ... More
Non-Orthogonal Multiple Access in UAV-to-Everything (U2X) NetworksJul 12 2019This article investigates the non-orthogonal multiple access (NOMA) enhanced unmanned aerial vehicle (UAV)-to-Everything (U2X) frameworks. A novel 3-Dimension framework for providing wireless services to randomly roaming NOMA receivers (Rxs) in the sphere ... More
Weighted Sum Power Maximization for Intelligent Reflecting Surface Aided SWIPTJul 12 2019The low efficiency of far-field wireless power transfer (WPT) limits the fundamental rate-energy (R-E) performance trade-off of the simultaneous wireless information and power transfer (SWIPT) system. To address this challenge, we propose in this letter ... More
Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future DirectionsJul 12 2019Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add ... More
The Landscape of Non-convex Empirical Risk with Degenerate Population RiskJul 11 2019The landscape of empirical risk has been widely studied in a series of machine learning problems, including low-rank matrix factorization, matrix sensing, matrix completion, and phase retrieval. In this work, we focus on the situation where the corresponding ... More
On some automorphisms of rational functions and their applications in rank metric codesJul 11 2019Recently, there is a growing interest in the study of rank metric codes. These codes have applications in network coding and cryptography. In this paper, we investigate some automorpshisms on polynomial rings over finite fields. We show how the linear ... More
Entropy Estimation of Physically Unclonable Functions via Chow ParametersJul 11 2019A physically unclonable function (PUF) is an electronic circuit that produces an intrinsic identifier in response to a challenge. These identifiers depend on uncontrollable variations of the manufacturing process, which make them hard to predict or to ... More
Generalized Mutual InformationJul 11 2019Mutual information is one of the essential building blocks of information theory. Yet, it is only finitely defined for distributions with fast decaying tails on a countable joint alphabet of two random elements. The unboundedness of mutual information ... More
Coverage Probability Analysis Under Clustered Ambient Backscatter NodesJul 11 2019In this paper, we consider a new large-scale communication scheme where randomly distributed AmBC nodes are involved as secondary users to primary transmitter (PT) and primary receiver (PR) pairs. The secondary communication between a backscatter transmitter ... More
Data by Proxy -- Material Traces as Autographic VisualizationsJul 11 2019Information visualization limits itself, per definition, to the domain of symbolic information. This paper discusses arguments why the field should also consider forms of data that are not symbolically encoded, including physical traces and material indicators. ... More
Timely Cloud Computing: Preemption and WaitingJul 11 2019The notion of timely status updating is investigated in the context of cloud computing. Measurements of a time-varying process of interest are acquired by a sensor node, and uploaded to a cloud server to undergo some required computations. These computations ... More
Using Chinese Characters To Generate Text-Based Passwords For Information SecurityJul 11 2019Graphical passwords (GPWs) are in many areas of the current world. Topological graphic passwords (Topsnut-gpws) are a new type of cryptography, and they differ from the existing GPWs. A Topsnut-gpw consists of two parts: one is a topological structure ... More
Minimax Theorems for Finite Blocklength Lossy Joint Source-Channel Coding over an AVCJul 11 2019Motivated by applications in the security of cyber-physical systems, we pose the finite blocklength communication problem in the presence of a jammer as a zero-sum game between the encoder-decoder team and the jammer, by allowing the communicating team ... More
Computing sharp recovery structures for Locally Recoverable codesJul 11 2019A locally recoverable code is an error-correcting code such that any erasure in a single coordinate of a codeword can be recovered from a small subset of other coordinates. In this article we develop an algorithm that computes a recovery structure as ... More
Information-Centric Grant-Free Access for IoT Fog Networks: Edge vs Cloud Detection and LearningJul 11 2019A multi-cell Fog-Radio Access Network (F-RAN) architecture is considered in which Internet of Things (IoT) devices periodically make noisy observations of a Quantity of Interest (QoI) and transmit using grant-free access in the uplink. The devices in ... More
Information-Centric Grant-Free Access for IoT Fog Networks: Edge vs Cloud Detection and LearningJul 11 2019Jul 12 2019A multi-cell Fog-Radio Access Network (F-RAN) architecture is considered in which Internet of Things (IoT) devices periodically make noisy observations of a Quantity of Interest (QoI) and transmit using grant-free access in the uplink. The devices in ... More
Error Exponents for Asynchronous Multiple Access Channels. Controlled Asynchronism may Outperform SynchronismJul 11 2019Exponential error bounds are derived for frame-asynchronous discrete memoryless multiple access channels with two senders. By numerical evaluation for a particular case, it follows that the reliability function for synchronous transmission may be beaten ... More
Towards a Connected Sky: Performance of Beamforming with Down-tilted Antennas for Ground and UAV User Co-existenceJul 11 2019Providing connectivity to aerial users such as cellular connected unmanned aerial vehicles is a key challenge for future cellular systems. In this paper, the use of conjugate beamforming for simultaneous content delivery to an AU coexisting with multiple ... More
Recovery and Repair Schemes for Shift-XOR Regenerating CodesJul 11 2019Recovery and repair schemes are proposed for shift-exclusive-or (shift-XOR) product-matrix (PM) regenerating codes, which outperform those of the existing PM codes in terms of both communication and computation costs. In particular, for the minimum bandwidth ... More
Kolmogorov complexity in the USSR (1975--1982): isolation and its endJul 11 2019These reminiscences are about the "dark ages" of algorithmic information theory in the USSR. After a great interest in this topic in 1960s and the beginning of 1970s the number of people working in this area in the USSR decreased significantly. At that ... More
Terahertz Band: The Last Piece of RF Spectrum Puzzle for Communication SystemsJul 11 2019Ultra-high bandwidth, negligible latency and seamless communication for devices and applications are envisioned as major milestones that will revolutionize the way by which societies create, distribute and consume information. The remarkable expansion ... More
On Analysis of the Bitcoin and Prism Backbone ProtocolsJul 11 2019Bitcoin is a peer-to-peer payment system proposed by Nakamoto in 2008. Properties of the bitcoin backbone protocol have been investigated in some depth: the blockchain growth property quantifies the number of blocks added to the blockchain during any ... More
Message passing-based link configuration in short range millimeter wave systemsJul 11 2019Millimeter wave (mmWave) communication in typical wearable and data center settings is short range. As the distance between the transmitter and the receiver in short range scenarios can be comparable to the length of the antenna arrays, the common far ... More
Learning the Wireless V2I Channels Using Deep Neural NetworksJul 10 2019For high data rate wireless communication systems, developing an efficient channel estimation approach is extremely vital for channel detection and signal recovery. With the trend of high-mobility wireless communications between vehicles and vehicles-to-infrastructure ... More
Entropy and Compression: A simple proof of an inequality of KhinchinJul 10 2019We prove that Entropy is a lower bound for the average compression ratio of any lossless compressor by giving a simple proof of an inequality that is a slightly variation of an inequality firstly proved by A. I. Khinchin in 1953.
Cooperative Localization with Angular Measurements and Posterior LinearizationJul 10 2019The application of cooperative localization in vehicular networks is attractive to improve accuracy and coverage. Conventional distance measurements between vehicles are limited by the need for synchronization and provide no heading information of the ... More
Minimal linear codes arising from blocking setsJul 10 2019Minimal linear codes are algebraic objects which gained interest in the last twenty years, due to their link with Massey's secret sharing schemes. In this context, Ashikhmin and Barg provided a useful and a quite easy to handle sufficient condition for ... More
Adding Common Randomness Can Remove the Secrecy Constraints in Communication NetworksJul 10 2019In communication networks secrecy constraints usually incur an extra limit in capacity or generalized degrees-of-freedom (GDoF), in the sense that a penalty in capacity or GDoF is incurred due to the secrecy constraints. Over the past decades a significant ... More
User Detection Performance Analysis for Grant-Free Uplink Transmission in Large-Scale Antenna SystemsJul 10 2019In this paper, user detection performance of a grant-free uplink transmission in a large scale antenna system is analyzed, in which a general grant-free multiple access is considered as the system model and Zadoff-Chu sequence is used for the uplink pilot. ... More
Ultrareliable and Low-Latency Communication Techniques for Tactile Internet ServicesJul 10 2019This paper presents novel ultrareliable and low-latency communication (URLLC) techniques for URLLC services, such as Tactile Internet services. Among typical use-cases of URLLC services are tele-operation, immersive virtual reality, cooperative automated ... More
Polynomial Linear System Solving with Errors by Simultaneous Polynomial Reconstruction of Interleaved Reed-Solomon CodesJul 09 2019In this paper we present a new algorithm for Polynomial Linear System Solving (via evaluation/interpolation) with errors. In this scenario, errors can occur in the black box evaluation step. We improve the bound on the number of errors that we can correct, ... More
A Geometric Approach to Rank Metric Codes and a Classification of Constant Weight CodesJul 09 2019In this work we develop a geometric approach to the study of rank metric codes. Using this method, we introduce a simpler definition for generalized rank weight of linear codes. We give a complete classification of constant rank weight codes and we give ... More
Interactive Verifiable Polynomial EvaluationJul 09 2019Cloud computing platforms have created the possibility for computationally limited users to delegate demanding tasks to strong but untrusted servers. Verifiable computing algorithms help build trust in such interactions by enabling the server to provide ... More
On the 3-D Placement of Airborne Base Stations Using Tethered UAVsJul 09 2019One of the main challenges slowing the deployment of airborne base stations (BSs) using unmanned aerial vehicles (UAVs) is the limited on-board energy and flight time. One potential solution to such problem, is to provide the UAV with power supply through ... More
A Simple Derivation of AMP and its State Evolution via First-Order CancellationJul 09 2019We consider the linear regression problem, where the goal is to recover the vector $\boldsymbol{x}\in\mathbb{R}^n$ from measurements $\boldsymbol{y}=\boldsymbol{A}\boldsymbol{x}+\boldsymbol{w}\in\mathbb{R}^m$ under known matrix $\boldsymbol{A}$ and unknown ... More
Fundamental limits of quantum-secure covert communication over bosonic channelsJul 09 2019We investigate the fundamental limit of quantum-secure covert communication over the lossy thermal noise bosonic channel, the quantum-mechanical model underlying many practical channels. We assume that the adversary has unlimited quantum information processing ... More
On the Exact Recovery Conditions of 3D Human Motion from 2D Landmark Motion with Sparse Articulated MotionJul 09 2019In this paper, we address the problem of exact recovery condition in retrieving 3D human motion from 2D landmark motion. We use a skeletal kinematic model to represent the 3D human motion as a vector of angular articulation motion. We address this problem ... More
Deep Learning-Aided Dynamic Read Thresholds Design For Multi-Level-Cell Flash MemoriesJul 09 2019The practical NAND flash memory suffers from various non-stationary noises that are difficult to be predicted. Furthermore, the data retention noise induced channel offset is unknown during the readback process. This severely affects the data recovery ... More
Near-optimal Repair of Reed-Solomon Codes with Low Sub-packetizationJul 09 2019Minimum storage regenerating (MSR) codes are MDS codes which allow for recovery of any single erased symbol with optimal repair bandwidth, based on the smallest possible fraction of the contents downloaded from each of the other symbols. Recently, certain ... More
Collaborative Machine Learning at the Wireless Edge with Blind TransmittersJul 08 2019We study wireless collaborative machine learning (ML), where mobile edge devices, each with its own dataset, carry out distributed stochastic gradient descent (DSGD) over-the-air with the help of a wireless access point acting as the parameter server ... More
Control of Status Updates for Energy Harvesting Devices that Monitor Processes with AlarmsJul 08 2019In this work, we derive optimal transmission policies in an energy harvesting status update system. The system monitors a stochastic process which can be either in a normal or in an alarm state of operation. We capture the freshness of status updates ... More
Distributed Approximation of Functions over Fast Fading Channels with Applications to Distributed Learning and the Max-Consensus ProblemJul 08 2019In this work, we consider the problem of distributed approximation of functions over multiple-access channels with additive noise. In contrast to previous works, we take fast fading into account and give explicit probability bounds for the approximation ... More
Asymmetric LOCO Codes: Constrained Codes for Flash MemoriesJul 08 2019In data storage and data transmission, certain patterns are more likely to be subject to error when written (transmitted) onto the media. In magnetic recording systems with binary data and bipolar non-return-to-zero signaling, patterns that have consecutive ... More
Distance from the Nucleus to a Uniformly Random Point in the Typical and the Crofton Cells of the Poisson-Voronoi TessellationJul 08 2019Consider the distances $R_o$ and $\tilde{R}_o$ from the nucleus to a uniformly random point in the typical and Crofton cells, respectively, of the $d$-dimensional Poisson-Voronoi (PV) tessellation. The main objective of this paper is to characterize the ... More
Enabling Ultra Reliable Wireless Communications for Factory Automation with Distributed MIMOJul 08 2019Factory automation is one of the most challenging use cases for 5G-and-beyond mobile networks due to strict latency, availability and reliability constraints. In this work, an indoor factory scenario is considered, and distributed multiple-input multiple-output ... More
Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random KeysJul 08 2019It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to $z$ network links, to assume that the source node is the only node that generates random keys. In this setting, the secure multicast rate ... More
Vertex-Frequency Graph Signal ProcessingJul 08 2019Graph signal processing deals with signals which are observed on an irregular graph domain. While many approaches have been developed in classical graph theory to cluster vertices and segment large graphs in a signal independent way, signal localization ... More
Graph Signal Processing -- Part I: Graphs, Graph Spectra, and Spectral ClusteringJul 08 2019The area of Data Analytics on graphs promises a paradigm shift as we approach information processing of classes of data, which are typically acquired on irregular but structured domains (social networks, various ad-hoc sensor networks). Yet, despite its ... More
Capacity and Algorithms for a Cognitive Network with Primary-Secondary User CooperationJul 08 2019In this work, we examine cognitive radio networks, where secondary users may act as relays for messages sent by the primary user, hence offering performance improvement of primary transmissions, while at the same time obtaining more transmission opportunities ... More
Channel Impulse Response-based Source Localization in a Diffusion-based Molecular Communication SystemJul 08 2019This work localizes a molecular source in a diffusion based molecular communication (DbMC) system via a set of passive sensors and a fusion center. Molecular source localization finds its applications in future healthcare systems, including proactive ... More
One-step Majority-logic Decoding with Subspace DesignsJul 07 2019Rudoph (1967) introduced one-step majority logic decoding for linear codes derived from combinatorial designs. The decoder is easily realizable in hardware and requires that the dual code has to contain the blocks of so called geometric designs as codewords. ... More
Deep Learning based Wireless Resource Allocation with Application to Vehicular NetworksJul 07 2019It has been a long-held belief that judicious resource allocation is critical to mitigating interference, improving network efficiency, and ultimately optimizing wireless communication performance. The traditional wisdom is to explicitly formulate resource ... More
Max-Min Rate of Cell-Free Massive MIMO Uplink with Optimal Uniform QuantizationJul 07 2019Cell-free Massive multiple-input multiple-output (MIMO) is considered, where distributed access points (APs) multiply the received signal by the conjugate of the estimated channel, and send back a quantized version of this weighted signal to a central ... More
Placement Delivery Arrays from Combinations of Strong Edge ColoringsJul 06 2019It has recently been pointed out in both of the works [C. Shanguan, Y. Zhang, and G. Ge, {\em IEEE Trans. Inform. Theory}, 64(8):5755-5766 (2018)] and [Q. Yan, X. Tang, Q. Chen, and M. Cheng, {\em IEEE Commun. Lett.}, 22(2):236-239 (2018)] that placement ... More
Placement Delivery Arrays from Combinations of Strong Edge ColoringsJul 06 2019Jul 09 2019It has recently been pointed out in both of the works [C. Shanguan, Y. Zhang, and G. Ge, {\em IEEE Trans. Inform. Theory}, 64(8):5755-5766 (2018)] and [Q. Yan, X. Tang, Q. Chen, and M. Cheng, {\em IEEE Commun. Lett.}, 22(2):236-239 (2018)] that placement ... More
Error Probability Bounds for Gaussian Channels under Maximal and Average Power ConstraintsJul 06 2019This paper studies the performance of block coding on an additive white Gaussian noise channel under different power limitations at the transmitter. Lower bounds are presented for the minimum error probability of codes satisfying maximal and average power ... More
Topological Information Data AnalysisJul 06 2019This paper presents methods that quantify the structure of statistical interactions within a given data set, and was first used in \cite{Tapia2018}. It establishes new results on the k-multivariate mutual-informations (I_k) inspired by the topological ... More
Intelligent Reflecting Surface Assisted Non-Orthogonal Multiple AccessJul 06 2019Intelligent reflecting surface (IRS) which consists of a large number of low-cost passive reflecting elements and can digitally manipulating electromagnetic waves, is a new and disruptive technology to achieve spectrum- and energy-efficient as well as ... More
Regularizing linear inverse problems with convolutional neural networksJul 06 2019Deep convolutional neural networks trained on large datsets have emerged as an intriguing alternative for compressing images and solving inverse problems such as denoising and compressive sensing. However, it has only recently been realized that even ... More
Estimating location parameters in entangled single-sample distributionsJul 06 2019We consider the problem of estimating the common mean of independently sampled data, where samples are drawn in a possibly non-identical manner from symmetric, unimodal distributions with a common mean. This generalizes the setting of Gaussian mixture ... More
Resource Allocation for Secure IRS-assisted Multiuser MISO SystemsJul 06 2019In this paper, we study resource allocation design for secure communication in intelligent reflecting surface (IRS)-assisted multiuser multiple-input single-output (MISO) communication systems. To enhance physical layer security, artificial noise (AN) ... More
Resource Allocation for Secure IRS-assisted Multiuser MISO SystemsJul 06 2019Jul 12 2019In this paper, we study resource allocation design for secure communication in intelligent reflecting surface (IRS)-assisted multiuser multiple-input single-output (MISO) communication systems. To enhance physical layer security, artificial noise (AN) ... More
Fusion-Based Cooperative Support Identification for Compressive Networked SensingJul 06 2019This paper proposes a fusion-based cooperative support identification scheme for distributed compressive sparse signal recovery via resource-constrained wireless sensor networks. The proposed support identification protocol involves: (i) local sparse ... More
A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine-ResilienceJul 05 2019We study a setting where a group of agents, each receiving partially informative private signals, seek to collaboratively learn the true underlying state of the world (from a finite set of hypotheses) that generates their joint observation profiles. To ... More
Analysis and Optimisation of Distribution Matching for the Nonlinear Fibre ChannelJul 05 2019Enhanced Gaussian noise models are used to demonstrate that the per-block SNR after fibre transmission varies significantly due to the variable-composition nature of modern probabilistic shaping schemes. We propose a nonlinearity-optimised distribution ... More
Optimal Blocklength Allocation towards Reduced Age of Information in Wireless Sensor NetworksJul 05 2019The freshness or timeliness of data at server is a significant key performance indicator of sensor networks, especially in tolerance critical applications such as factory automation. As an effective and intuitive measurement to data timeliness, the metric ... More
Distributed User Clustering and Resource Allocation for Imperfect NOMA in Heterogeneous NetworksJul 05 2019In this paper, we propose a distributed cluster formation (CF) and resource allocation (RA) framework for non-ideal non-orthogonal multiple access (NOMA) schemes in heterogeneous networks. The imperfection of the underlying NOMA scheme is due to the receiver ... More
Wireless Federated Distillation for Distributed Edge Learning with Heterogeneous DataJul 05 2019Cooperative training methods for distributed machine learning typically assume noiseless and ideal communication channels. This work studies some of the opportunities and challenges arising from the presence of wireless communication links. We specifically ... More
Subspaces intersecting in at most a pointJul 05 2019We improve on the lower bound of the maximum number of planes in $\operatorname{PG}(8,q)\cong\F_q^{9}$ pairwise intersecting in at most a point. In terms of constant dimension codes this leads to $A_q(9,4;3)\ge q^{12}+ 2q^8+2q^7+q^6+2q^5+2q^4-2q^2-2q+1$. ... More
Spherical Large Intelligent SurfacesJul 05 2019As an emerging technology, large intelligent surfaces (LIS) have gain much interest recently. Earlier proposed LISs are in two-dimensional (2D) forms and act as electromagnetic planar surfaces transmitting and receiving radiating signals. In this letter, ... More
Importance of Small Probability Events in Big Data: Information Measures, Applications, and ChallengesJul 05 2019In many applications (e.g., anomaly detection and security systems) of smart cities, rare events dominate the importance of the total information of big data collected by Internet of Things (IoTs). That is, it is pretty crucial to explore the valuable ... More
Importance of Small Probability Events in Big Data: Information Measures, Applications, and ChallengesJul 05 2019Jul 08 2019In many applications (e.g., anomaly detection and security systems) of smart cities, rare events dominate the importance of the total information of big data collected by Internet of Things (IoTs). That is, it is pretty crucial to explore the valuable ... More
Low-power and Reliable Solid-state Drive with Inverted Limited Weight CodingJul 04 2019In this work, we propose a novel coding scheme which based on the characteristics of NAND flash cells, generates codewords that reduce the energy consumption and improve the reliability of solid-state drives. This novel coding scheme, namely Inverted ... More
Early Detection for Optimal-Latency Communications in Multi-Hop LinksJul 04 2019Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate ... More
Early Detection for Optimal-Latency Communications in Multi-Hop LinksJul 04 2019Jul 08 2019Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate ... More