Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wee Peng Tay is active.

Publication


Featured researches published by Wee Peng Tay.


IEEE Network | 2012

Cloud robotics: architecture, challenges and applications

Guoqiang Hu; Wee Peng Tay; Yonggang Wen

We extend the computation and information sharing capabilities of networked robotics by proposing a cloud robotic architecture. The cloud robotic architecture leverages the combination of an ad-hoc cloud formed by machine-to-machine (M2M) communications among participating robots, and an infrastructure cloud enabled by machine-to-cloud (M2C) communications. Cloud robotics utilizes an elastic computing model, in which resources are dynamically allocated from a shared resource pool in the ubiquitous cloud, to support task offloading and information sharing in robotic applications. We propose and evaluate communication protocols, and several elastic computing models to handle different applications. We discuss the technical challenges in computation, communications and security, and illustrate the potential benefits of cloud robotics in different applications.


IEEE Transactions on Signal Processing | 2013

Identifying Infection Sources and Regions in Large Networks

Wuqiong Luo; Wee Peng Tay; Mei Leng

Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the damage caused by the infection through timely quarantine of the sources. We consider the problem of estimating the infection sources and the infection regions (subsets of nodes infected by each source) in a network, based only on knowledge of which nodes are infected and their connections, and when the number of sources is unknown a priori. We derive estimators for the infection sources and their infection regions based on approximations of the infection sequences count. We prove that if there are at most two infection sources in a geometric tree, our estimator identifies the true source or sources with probability going to one as the number of infected nodes increases. When there are more than two infection sources, and when the maximum possible number of infection sources is known, we propose an algorithm with quadratic complexity to estimate the actual number and identities of the infection sources. Simulations on various kinds of networks, including tree networks, small-world networks and real world power grid networks, and tests on two real data sets are provided to verify the performance of our estimators.


IEEE Transactions on Wireless Communications | 2015

Cross-Layer Resource Allocation With Elastic Service Scaling in Cloud Radio Access Network

Jianhua Tang; Wee Peng Tay; Tony Q. S. Quek

Cloud radio access network (C-RAN) aims to improve spectrum and energy efficiency of wireless networks by migrating conventional distributed base station functionalities into a centralized cloud baseband unit (BBU) pool. We propose and investigate a cross-layer resource allocation model for C-RAN to minimize the overall system power consumption in the BBU pool, fiber links and the remote radio heads (RRHs). We characterize the cross-layer resource allocation problem as a mixed-integer nonlinear programming (MINLP), which jointly considers elastic service scaling, RRH selection, and joint beamforming. The MINLP is however a combinatorial optimization problem and NP-hard. We relax the original MINLP problem into an extended sum-utility maximization (ESUM) problem, and propose two different solution approaches. We also propose a low-complexity Shaping-and-Pruning (SP) algorithm to obtain a sparse solution for the active RRH set. Simulation results suggest that the average sparsity of the solution given by our SP algorithm is close to that obtained by a recently proposed greedy selection algorithm, which has higher computational complexity. Furthermore, our proposed cross-layer resource allocation is more energy efficient than the greedy selection and successive selection algorithms.


IEEE Transactions on Information Theory | 2008

Data Fusion Trees for Detection: Does Architecture Matter?

Wee Peng Tay; John N. Tsitsiklis; Moe Z. Win

We consider the problem of decentralized detection in a network consisting of a large number of nodes arranged as a tree of bounded height, under the assumption of conditionally independent and identically distributed (i.i.d.) observations. We characterize the optimal error exponent under a Neyman-Pearson formulation. We show that the Type II error probability decays exponentially fast with the number of nodes, and the optimal error exponent is often the same as that corresponding to a parallel configuration. We provide sufficient, as well as necessary, conditions for this to happen. For those networks satisfying the sufficient conditions, we propose a simple strategy that nearly achieves the optimal error exponent, and in which all non-leaf nodes need only send 1-bit messages.


international symposium on neural networks | 2012

Extreme learning machines for intrusion detection

Chi Cheng; Wee Peng Tay; Guang-Bin Huang

We consider the problem of intrusion detection in a computer network, and investigate the use of extreme learning machines (ELMs) to classify and detect the intrusions. With increasing connectivity between networks, the risk of information systems to external attacks or intrusions has increased tremendously. Machine learning methods like support vector machines (SVMs) and neural networks have been widely used for intrusion detection. These methods generally suffer from long training times, require parameter tuning, or do not perform well in multi-class classification. We propose a basic ELM method based on random features, and a kernel based ELM method for classification. We compare our methods with commonly used SVM techniques in both binary and multi-class classifications. Simulation results show that the proposed basic ELM approach outperforms SVM in training and testing speed, while the proposed kernel based ELM achieves higher detection accuracy than SVM in multi-class classification case.


IEEE Journal of Selected Topics in Signal Processing | 2014

How to Identify an Infection Source With Limited Observations

Wuqiong Luo; Wee Peng Tay; Mei Leng

A rumor spreading in a social network or a disease propagating in a community can be modeled as an infection spreading in a network. Finding the infection source is a challenging problem, which is made more difficult in many applications where we have access only to a limited set of observations. We consider the problem of estimating an infection source for a Susceptible-Infected model, in which not all infected nodes can be observed. When the network is a tree, we show that an estimator for the source node associated with the most likely infection path that yields the limited observations is given by a Jordan center, i.e., a node with minimum distance to the set of observed infected nodes. We also propose approximate source estimators for general networks. Simulation results on various synthetic networks and real world networks suggest that our estimators perform better than distance, closeness, and betweenness centrality based heuristics .


IEEE Transactions on Information Theory | 2008

On the Subexponential Decay of Detection Error Probabilities in Long Tandems

Wee Peng Tay; John N. Tsitsiklis; Moe Z. Win

We consider the problem of Bayesian decentralized binary hypothesis testing in a network of sensors arranged in a tandem. We show that the rate of error probability decay is always subexponential, establishing the validity of a long-standing conjecture. Under the additional assumption of bounded Kullback-Leibler (KL) divergences, we show that for all d > 1/2, the error probability is Omega(e - c nd), where c is a positive constant. Furthermore, the bound Omega(e - c (logn)d) , for all d > 1, holds under an additional mild condition on the distributions. This latter bound is shown to be tight.


IEEE Transactions on Signal Processing | 2009

Bayesian Detection in Bounded Height Tree Networks

Wee Peng Tay; John N. Tsitsiklis; Moe Z. Win

We study the detection performance of large scale sensor networks, configured as trees with bounded height, in which information is progressively compressed as it moves towards the root of the tree. We show that, under a Bayesian formulation, the error probability decays exponentially fast, and we provide bounds for the error exponent. We then focus on the case where the tree has certain symmetry properties. We derive the form of the optimal exponent within a restricted class of easily implementable strategies, as well as optimal strategies within that class. We also find conditions under which (suitably defined) majority rules are optimal. Finally, we provide evidence that in designing a network it is preferable to keep the branching factor small for nodes other than the neighbors of the leaves.


IEEE Transactions on Wireless Communications | 2013

Interference Alignment in a Poisson Field of MIMO Femtocells

Tri Minh Nguyen; Youngmin Jeong; Tony Q. S. Quek; Wee Peng Tay; Hyundong Shin

The need for bandwidth and the incitation to reduce power consumption lead to the reduction of cell size in wireless networks. This allows reducing the distance between a user and the base station, thus increasing the capacity. A relatively inexpensive way of deploying small-cell networks is to use femtocells. However, the reduction in cell size causes problems for coordination and network deployment, especially due to the intra- and cross-tier interference. In this paper, we consider a two-tier multiple-input multiple-output (MIMO) network in the downlink, where a single macrocell base station with multiple transmit antennas coexists with multiple closed-access MIMO femtocells. With multiple receive antennas at both the macrocell and femtocell users, we propose an opportunistic interference alignment scheme to design the transmit and receive beamformers in order to mitigate intra- (or inter-) and cross-tier interference. Moreover, to reduce the number of macrocell and femtocell users coexisting in the same spectrum, we apply a random spectrum allocation on top of the opportunistic interference alignment. Using stochastic geometry, we analyze the proposed scheme in terms of the distribution of a received signal-to-interference-plus-noise ratio, spatial average capacity, network throughput, and energy efficiency. In the presence of imperfect channel state information, we further quantify the performance loss in spatial average capacity. Numerical results show the effectiveness of our proposed scheme in improving the performance of random MIMO femtocell networks.


international conference on acoustics, speech, and signal processing | 2007

On the Sub-Exponential Decay of Detection Error Probabilities in Long Tandems

Wee Peng Tay; John N. Tsitsiklis; Moe Z. Win

We consider the problem of Bayesian decentralized binary hypothesis testing in a network of sensors arranged in a tandem. We show that the rate of error probability decay is always subexponential, establishing the validity of a long-standing conjecture. Under the additional assumption of bounded Kullback-Leibler (KL) divergences, we show that for all <i>d</i> > 1/2, the error probability is Omega(<i>e</i> <sup>-</sup> <i>c</i> <i>nd</i>), where <i>c</i> is a positive constant. Furthermore, the bound Omega(<i>e</i> <sup>-</sup> <i>c</i> (log<i>n</i>)<i>d</i>) , for all <i>d</i> > 1, holds under an additional mild condition on the distributions. This latter bound is shown to be tight.

Collaboration


Dive into the Wee Peng Tay's collaboration.

Top Co-Authors

Avatar

Mei Leng

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

François Quitin

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Wuqiong Luo

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

John N. Tsitsiklis

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Moe Z. Win

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sirajudeen Gulam Razul

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Feng Ji

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Wuhua Hu

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xionghu Zhong

Nanyang Technological University

View shared research outputs
Researchain Logo
Decentralizing Knowledge