Featured Researches

Information Theory

Adversarial Attacks on Deep Learning Based Power Allocation in a Massive MIMO Network

Deep learning (DL) is becoming popular as a new tool for many applications in wireless communication systems. However, for many classification tasks (e.g., modulation classification) it has been shown that DL-based wireless systems are susceptible to adversarial examples; adversarial examples are well-crafted malicious inputs to the neural network (NN) with the objective to cause erroneous outputs. In this paper, we extend this to regression problems and show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network. Specifically, we extend the fast gradient sign method (FGSM), momentum iterative FGSM, and projected gradient descent adversarial attacks in the context of power allocation in a maMIMO system. We benchmark the performance of these attacks and show that with a small perturbation in the input of the NN, the white-box attacks can result in infeasible solutions up to 86%. Furthermore, we investigate the performance of black-box attacks. All the evaluations conducted in this work are based on an open dataset and NN models, which are publicly available.

Read more
Information Theory

Aerial-Ground Interference Mitigation for Cellular-Connected UAV

To support large-scale deployment of unmanned aerial vehicles (UAVs) in future, a new wireless communication paradigm, namely, cellular-connected UAV, has recently received an upsurge of interests in both academia and industry. Specifically, cellular base stations (BSs) and spectrum are reused to serve UAVs as new aerial user equipments (UEs) for meeting their communication requirements. However, compared to traditional terrestrial UEs, the high altitude of UAVs results in more frequent line-of-sight (LoS) channels with both their associated and non-associated BSs in a much wider area, which causes stronger aerial-ground interference to both UAVs and terrestrial UEs. As such, conventional techniques designed for mitigating the terrestrial interference become ineffective in coping with the new and more severe UAV-terrestrial interference. To tackle this challenge, we propose in this article new interference mitigation solutions for achieving spectral efficient operation of the cellular network with co-existing UAVs and terrestrial UEs. In particular, we exploit the powerful sensing capability of UAVs and inactive BSs in the network for interference mitigation/cancellation. Numerical results are presented to verify the efficacy of the proposed solutions and show their significant spectrum efficiency gains over terrestrial interference mitigation techniques.

Read more
Information Theory

Age Debt: A General Framework For Minimizing Age of Information

We consider the problem of minimizing age of information in general single-hop and multihop wireless networks. First, we formulate a way to convert AoI optimization problems into equivalent network stability problems. Then, we propose a heuristic low complexity approach for achieving stability that can handle general network topologies; unicast, multicast and broadcast flows; interference constraints; link reliabilities; and AoI cost functions. We provide numerical results to show that our proposed algorithms behave as well as the best known scheduling and routing schemes available in the literature for a wide variety of network settings.

Read more
Information Theory

Aggregated Network for Massive MIMO CSI Feedback

In frequency division duplexing (FDD) mode, it is necessary to send the channel state information (CSI) from user equipment to base station. The downlink CSI is essential for the massive multiple-input multiple-output (MIMO) system to acquire the potential gain. Recently, deep learning is widely adopted to massive MIMO CSI feedback task and proved to be effective compared with traditional compressed sensing methods. In this paper, a novel network named ACRNet is designed to boost the feedback performance with network aggregation and parametric RuLU activation. Moreover, valid approach to expand the network architecture in exchange of better performance is first discussed in CSI feedback task. Experiments show that ACRNet outperforms loads of previous state-of-the-art feedback networks without any extra information.

Read more
Information Theory

Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold

In Chen-Cramer Crypto 2006 paper \cite{cc} algebraic geometric secret sharing schemes were proposed such that the "Fundamental Theorem in Information-Theoretically Secure Multiparty Computation" by Ben-Or, Goldwasser and Wigderson \cite{BGW88} and Chaum, Crépeau and Damgård \cite{CCD88} can be established over constant-size base finite fields. These algebraic geometric secret sharing schemes defined by a curve of genus g over a constant size finite field F q is quasi-threshold in the following sense, any subset of u?�T?? players (non qualified) has no information of the secret and any subset of u?�T+2g players (qualified) can reconstruct the secret. It is natural to ask that how far from the threshold these quasi-threshold secret sharing schemes are? How many subsets of u?�[T,T+2g??] players can recover the secret or have no information of the secret? In this paper it is proved that almost all subsets of u?�[T,T+g??] players have no information of the secret and almost all subsets of u?�[T+g,T+2g??] players can reconstruct the secret when the size q goes to the infinity and the genus satisfies lim g q ??=0 . Then algebraic geometric secret sharing schemes over large finite fields are asymptotically threshold in this case. We also analyze the case when the size q of the base field is fixed and the genus goes to the infinity.

Read more
Information Theory

Almost Optimal Construction of Functional Batch Codes Using Hadamard Codes

A \textit{functional k -batch} code of dimension s consists of n servers storing linear combinations of s linearly independent information bits. Any multiset request of size k of linear combinations (or requests) of the information bits can be recovered by k disjoint subsets of the servers. The goal under this paradigm is to find the minimum number of servers for given values of s and k . A recent conjecture states that for any k= 2 s?? requests the optimal solution requires 2 s ?? servers. This conjecture is verified for s?? but previous work could only show that codes with n= 2 s ?? servers can support a solution for k= 2 s?? + 2 s?? +??2 s/2 24 ????requests. This paper reduces this gap and shows the existence of codes for k=??2 3 2 s?? ??requests with n= 2 s ?? servers. Another construction in the paper provides a code with n= 2 s+1 ?? servers and k= 2 s requests, which is an optimal result. %We provide some bounds on the minimum number of servers for functional k -batch codes. These constructions are mainly based on Hadamard codes and equivalently provide constructions for \textit{parallel Random I/O (RIO)} codes.

Read more
Information Theory

Alternating Beamforming with Intelligent Reflecting Surface Element Allocation

Intelligent reflecting surface (IRS) has become a promising technology to aid next generation wireless communication systems. In this paper, we develop an alternating beamforming technique with a novel concept of IRS element allocation for multiple-input multiple-output systems when a base station supports multiple single antenna users aided with a single IRS. Specifically, we allocate each IRS element separately to each user, thus, in the beamforming stage allowing the IRS element only consider a single user at a time. In result to this separation, the complexity is vastly decreased. The proposed beamforming technique tries to maximize the minimum rate of all users with minimal complexity. In the numerical results, we show that the proposed technique is comparable to the convex optimization-based benchmark with sufficiently less complexity.

Read more
Information Theory

Alternative Detectors for Spectrum Sensing by Exploiting Excess Bandwidth

The problems regarding spectrum sensing are studied by exploiting a priori and a posteriori in information of the received noise variance. First, the traditional Average Likelihood Ratio (ALR) and the General Likelihood Ratio Test (GLRT) detectors are investigated under a Gamma distributed function as a channel noise, for the first time, under the availability of a priori statistical distribution about the noise variance. Then, two robust detectors are proposed using the exiting excess bandwidth to deliver a posteriori probability on the received noise variance uncertainty. The first proposed detector that is based on traditional ALR employs marginal distribution of the observation under available a priori and a posteriori of the received signal, while the second proposed detector employs the Maximum a posteriori (MAP) estimation of the inverse of the noise power under the same hypothesizes as the first detector. In addition, analytical expressions for the performance of the proposed detectors are obtained in terms of the false-alarm and detection probabilities. The simulation results exhibit the superiority of the proposed detectors over the traditional counterparts.

Read more
Information Theory

Ambient Backscatter-Assisted Wireless-Powered Relaying

Internet-of-Things (IoT) is featured with low-power communications among a massive number of ubiquitously-deployed and energy-constrained electronics, e.g., sensors and actuators. To cope with the demand, wireless-powered cooperative relaying emerges as a promising communication paradigm to extend data transmission coverage and solve energy scarcity for the IoT devices. In this paper, we propose a novel hybrid relaying strategy by combining wireless-powered communication and ambient backscattering functions to improve applicability and performance of data transfer. In particular, the hybrid relay can harvest energy from radio frequency (RF) signals and use the energy for active transmission. Alternatively, the hybrid relay can choose to perform ambient backscattering of incident RF signals for passive transmission. To efficiently utilize the ambient RF resource, we design mode selection protocols to coordinate between the active and passive relaying in circumstances with and without instantaneous channel gain. With different mode selection protocols, we characterize the success probability and ergodic capacity of a dual-hop relaying system with the hybrid relay in the field of randomly located ambient transmitters. The analytical and the numerical results demonstrate the effectiveness of the mode selection protocols in adapting the hybrid relaying into the network environment and reveal the impacts of system parameters on the performance gain of the hybrid relaying. As applications of our analytical framework which is computationally tractable, we formulate optimization problems based on the derived expressions to optimize the system parameters with different objectives. The optimal solutions exhibit a tradeoff between the maximum energy efficiency and target success probability.

Read more
Information Theory

An Automated Theorem Proving Framework for Information-Theoretic Results

We present a versatile automated theorem proving framework which is capable of automated proofs of outer bounds in network information theory, discovery of inner bounds in network information theory (in conjunction with the method by Lee and Chung), simplification of capacity regions involving auxiliary random variables, deduction of properties of information-theoretic quantities (e.g. Wyner and Gács-Körner common information), and discovery of non-Shannon-type inequalities, under a unified framework. Our method is based on the linear programming approach for proving Shannon-type information inequalities studied by Yeung and Zhang, together with a novel pruning method for searching auxiliary random variables. We introduce the concept of existential information inequalities, which provides an axiomatic framework for a wide range of problems in information theory. To demonstrate the use of the framework, we present a new outer bound for the broadcast channel discovered by the framework.

Read more

Ready to get started?

Join us today