首页 > 最新文献

2022 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Irregular Repetition Slotted ALOHA in an Information-Theoretic Setting 信息论环境下的不规则重复开槽ALOHA
Pub Date : 2022-06-26 DOI: 10.48550/arXiv.2207.06495
E. Paolini, Lorenzo Valentini, V. Tralli, M. Chiani
An information-theoretic approach to irregular repetition slotted ALOHA (IRSA) is proposed. In contrast with previous works, in which IRSA analysis is conducted only based on quantities that are typical of collision models such as the traffic, the new approach also captures more fundamental quantities. Specifically, a suitable codebook construction for the adder channel model is adopted to establish a link with successive interference cancellation over the multi-packet reception channel. This perspective allows proving achievability and converse results for the average sum rate of IRSA multiple access schemes.
提出了一种不规则重复开槽ALOHA (IRSA)的信息论方法。与之前的研究相比,IRSA分析仅基于交通等典型碰撞模型的数量进行,新方法还捕获了更基本的数量。具体而言,针对加法器信道模型,采用合适的码本结构,在多包接收信道上建立具有逐次干扰消除的链路。从这个角度可以证明IRSA多址方案的平均和速率的可实现性和相反的结果。
{"title":"Irregular Repetition Slotted ALOHA in an Information-Theoretic Setting","authors":"E. Paolini, Lorenzo Valentini, V. Tralli, M. Chiani","doi":"10.48550/arXiv.2207.06495","DOIUrl":"https://doi.org/10.48550/arXiv.2207.06495","url":null,"abstract":"An information-theoretic approach to irregular repetition slotted ALOHA (IRSA) is proposed. In contrast with previous works, in which IRSA analysis is conducted only based on quantities that are typical of collision models such as the traffic, the new approach also captures more fundamental quantities. Specifically, a suitable codebook construction for the adder channel model is adopted to establish a link with successive interference cancellation over the multi-packet reception channel. This perspective allows proving achievability and converse results for the average sum rate of IRSA multiple access schemes.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning Maximum Margin Channel Decoders for Non-linear Gaussian Channels 学习非线性高斯信道的最大边际信道解码器
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834818
Amit Tsvieli, N. Weinberger
The problem of learning a channel decoder for an unknown non-linear white Gaussian noise channel is considered. The learner is provided with a fixed codebook and a dataset comprised of n independent input-output samples of the channel, and is required to select a matrix for a nearest neighbor decoder with a linear kernel. The objective of maximizing the margin of the decoder is addressed. Accordingly, a regularized loss minimization problem with a codebook-related regularization term and a hinge-like loss function is developed, which is inspired by the support vector machine paradigm for classification problems. Expected generalization error bound for that hinge loss is provided for the solution of the regularized loss minimization, and shown to scale at a rate of O(1/(λn)), where λ is a regularization tradeoff parameter. In addition, a high probability uniform generalization error bound is provided for the hypothesis class, and shown to scale at a rate of $O(1/sqrt n )$. A stochastic sub-gradient descent algorithm for solving the regularized loss minimization problem is proposed, and an optimization error bound is stated, which scales at a rate of $tilde O(1/(lambda T))$. The performance of the this algorithm is demonstrated by an example.
研究了未知非线性高斯白噪声信道的信道解码器学习问题。为学习者提供一个固定的码本和一个由通道的n个独立输入输出样本组成的数据集,并要求学习者为具有线性核的最近邻解码器选择一个矩阵。解决了解码器余量最大化的目标。因此,受分类问题的支持向量机范例的启发,提出了一种具有码本相关正则化项和类铰链损失函数的正则化损失最小化问题。该铰链损失的期望泛化误差界为正则化损失最小化的解提供,并以O(1/(λn))的速率缩放,其中λ是正则化权衡参数。此外,为假设类提供了一个高概率均匀泛化误差界,并以$O(1/sqrt n )$的速率缩放。提出了一种求解正则化损失最小化问题的随机次梯度下降算法,并给出了优化误差界,其尺度为$tilde O(1/(lambda T))$。通过算例验证了该算法的性能。
{"title":"Learning Maximum Margin Channel Decoders for Non-linear Gaussian Channels","authors":"Amit Tsvieli, N. Weinberger","doi":"10.1109/ISIT50566.2022.9834818","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834818","url":null,"abstract":"The problem of learning a channel decoder for an unknown non-linear white Gaussian noise channel is considered. The learner is provided with a fixed codebook and a dataset comprised of n independent input-output samples of the channel, and is required to select a matrix for a nearest neighbor decoder with a linear kernel. The objective of maximizing the margin of the decoder is addressed. Accordingly, a regularized loss minimization problem with a codebook-related regularization term and a hinge-like loss function is developed, which is inspired by the support vector machine paradigm for classification problems. Expected generalization error bound for that hinge loss is provided for the solution of the regularized loss minimization, and shown to scale at a rate of O(1/(λn)), where λ is a regularization tradeoff parameter. In addition, a high probability uniform generalization error bound is provided for the hypothesis class, and shown to scale at a rate of $O(1/sqrt n )$. A stochastic sub-gradient descent algorithm for solving the regularized loss minimization problem is proposed, and an optimization error bound is stated, which scales at a rate of $tilde O(1/(lambda T))$. The performance of the this algorithm is demonstrated by an example.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"68 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124246161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sequentially Mixing Randomly Arriving Packets Improves Channel Dispersion Over Block-Based Designs 顺序混合随机到达的数据包比基于块的设计改善了信道分散
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834408
Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, Chih-Chun Wang
Channel dispersion quantifies the convergence speed of coding rate to channel capacity under different latency constraints. Under the setting of packet erasure channels (PECs) with Bernoulli packet arrivals, this work characterizes the channel dispersions of random linear streaming codes (RLSCs) and MDS block codes, respectively. New techniques are developed to quantify the channel dispersion of sequential (non-block-based) coding, the first in the literature. The channel dispersion expressions are then used to compare the levels of error protection between RLSCs and MDS block codes. The results show that if and only if the target error probability pe is smaller than a threshold (≈0.1774), RLSCs offer strictly stronger error protection than MDS block codes, which is on top of the already significant 50% latency savings of RLSCs that eliminate the queueing delay completely.
信道色散量化了在不同时延约束下编码速率对信道容量的收敛速度。在具有伯努利数据包到达的分组擦除信道(PECs)设置下,本研究分别表征了随机线性流码(RLSCs)和MDS分组码的信道色散。新技术的开发,以量化顺序(非基于块)编码的信道色散,第一次在文献中。然后使用信道色散表达式来比较RLSCs和MDS分组码之间的错误保护水平。结果表明,当且仅当目标错误概率pe小于阈值(≈0.1774)时,RLSCs比MDS分组码提供严格更强的错误保护,这是在RLSCs完全消除队列延迟的50%延迟节省的基础上实现的。
{"title":"Sequentially Mixing Randomly Arriving Packets Improves Channel Dispersion Over Block-Based Designs","authors":"Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, Chih-Chun Wang","doi":"10.1109/ISIT50566.2022.9834408","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834408","url":null,"abstract":"Channel dispersion quantifies the convergence speed of coding rate to channel capacity under different latency constraints. Under the setting of packet erasure channels (PECs) with Bernoulli packet arrivals, this work characterizes the channel dispersions of random linear streaming codes (RLSCs) and MDS block codes, respectively. New techniques are developed to quantify the channel dispersion of sequential (non-block-based) coding, the first in the literature. The channel dispersion expressions are then used to compare the levels of error protection between RLSCs and MDS block codes. The results show that if and only if the target error probability pe is smaller than a threshold (≈0.1774), RLSCs offer strictly stronger error protection than MDS block codes, which is on top of the already significant 50% latency savings of RLSCs that eliminate the queueing delay completely.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124544721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-user Privacy Cooperation Game by Leveraging Users’ Service Flexibility 利用用户服务灵活性的多用户隐私合作博弈
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834703
Shu Hong, Lingjie Duan
In location-based services (LBSs), it is promising for multiple users to cache and share their Point-of-Interest (PoI) information with each other to reduce overall query frequency and preserve location privacy. Yet most studies on multi-user privacy preservation overlook the opportunity of leveraging service flexibility, where many users are flexible and may add obfuscation to individual LBS query. This paper is the first to study how multiple users cooperate to query with obfuscation against the adversary’s optimal inference attack, by leveraging their mutual service flexibility. Unlike the literature, even if a user already finds the shared PoI information useful, we prove it beneficial for him to further query with obfuscated location to confuse the adversary. To save the computational complexity of the max-min adversarial game problem and derive the closed-form solution, we also propose a binary approximate solution, which is proved to guarantee good privacy performance for an average user. Perhaps surprisingly, the user with greater service flexibility should choose to query the LBS with less misreported location, to maximally confuse the adversary. Finally, we numerically compare our optimal and approximate solutions with the existing approaches to show our effective privacy improvement.
在基于位置的服务(lbs)中,多个用户可以缓存并彼此共享他们的兴趣点(PoI)信息,以减少总体查询频率并保护位置隐私。然而,大多数关于多用户隐私保护的研究都忽略了利用服务灵活性的机会,因为许多用户都是灵活的,可能会给单个LBS查询增加混淆。本文首次研究了多用户如何利用其相互服务的灵活性,合作进行带有混淆的查询来对抗对手的最优推理攻击。与文献不同的是,即使用户已经发现共享的PoI信息很有用,我们也证明了使用模糊位置进行进一步查询以迷惑对手是有益的。为了节省最大最小对抗博弈问题的计算复杂度并推导出封闭形式的解,我们还提出了一个二进制近似解,并证明了该近似解可以保证普通用户的良好隐私性能。也许令人惊讶的是,具有更大服务灵活性的用户应该选择查询具有较少错误报告位置的LBS,以最大限度地迷惑对手。最后,我们将我们的最优解和近似解与现有方法进行数值比较,以表明我们有效地改善了隐私。
{"title":"Multi-user Privacy Cooperation Game by Leveraging Users’ Service Flexibility","authors":"Shu Hong, Lingjie Duan","doi":"10.1109/ISIT50566.2022.9834703","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834703","url":null,"abstract":"In location-based services (LBSs), it is promising for multiple users to cache and share their Point-of-Interest (PoI) information with each other to reduce overall query frequency and preserve location privacy. Yet most studies on multi-user privacy preservation overlook the opportunity of leveraging service flexibility, where many users are flexible and may add obfuscation to individual LBS query. This paper is the first to study how multiple users cooperate to query with obfuscation against the adversary’s optimal inference attack, by leveraging their mutual service flexibility. Unlike the literature, even if a user already finds the shared PoI information useful, we prove it beneficial for him to further query with obfuscated location to confuse the adversary. To save the computational complexity of the max-min adversarial game problem and derive the closed-form solution, we also propose a binary approximate solution, which is proved to guarantee good privacy performance for an average user. Perhaps surprisingly, the user with greater service flexibility should choose to query the LBS with less misreported location, to maximally confuse the adversary. Finally, we numerically compare our optimal and approximate solutions with the existing approaches to show our effective privacy improvement.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Efficient Repair and Coding of Binary MDS Array Codes with Small Sub-packetization 基于小分组的二进制MDS阵列码的高效修复与编码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834869
Hanxu Hou, Y. Han, Bo Bai, Gong Zhang
Large-scale high code-rate maximum distance separable (MDS) codes are critical and important in distributed storage systems that can provide high fault tolerance with extremely small storage redundancy. Repair access (defined as the total amount of symbols accessed in repairing one single-node failure) is a key metric of designing MDS codes. In large-scale MDS codes, one single-node failure can be recovered by connecting a large number of helper nodes. However, one or more helper nodes may be busy and can not send symbols during the repair process. In this paper, we define the total amount of symbols accessed in repairing one single-node failure with one or more busy nodes as the repair access with busy-node. We then propose a class of MDS array codes over a well-designed binary cyclic ring that is with small sub-packetization, small repair access, small repair access with busy-node, and small encoding complexity.
大规模高码率最大距离可分离码(MDS)在分布式存储系统中是非常重要的,它可以在极小的存储冗余下提供高容错性。修复访问(定义为修复单个节点故障时访问的符号总数)是设计MDS代码的关键指标。在大规模MDS代码中,可以通过连接大量辅助节点来恢复单个节点的故障。但是,一个或多个辅助节点可能很忙,无法在修复过程中发送符号。本文将用一个或多个忙节点修复一个单节点故障所访问的符号总量定义为带忙节点的修复访问。然后,我们提出了一类经过精心设计的二元循环环上的MDS阵列编码,该编码具有小的子分组、小的修复访问、小的繁忙节点修复访问和小的编码复杂度。
{"title":"Towards Efficient Repair and Coding of Binary MDS Array Codes with Small Sub-packetization","authors":"Hanxu Hou, Y. Han, Bo Bai, Gong Zhang","doi":"10.1109/ISIT50566.2022.9834869","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834869","url":null,"abstract":"Large-scale high code-rate maximum distance separable (MDS) codes are critical and important in distributed storage systems that can provide high fault tolerance with extremely small storage redundancy. Repair access (defined as the total amount of symbols accessed in repairing one single-node failure) is a key metric of designing MDS codes. In large-scale MDS codes, one single-node failure can be recovered by connecting a large number of helper nodes. However, one or more helper nodes may be busy and can not send symbols during the repair process. In this paper, we define the total amount of symbols accessed in repairing one single-node failure with one or more busy nodes as the repair access with busy-node. We then propose a class of MDS array codes over a well-designed binary cyclic ring that is with small sub-packetization, small repair access, small repair access with busy-node, and small encoding complexity.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved lower bound for device-to-device coded caching 设备到设备编码缓存的改进下界
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834513
Aniruddha Phatak, M. Varanasi
Device-to-device (D2D) coded caching is considered in which there is a server hosting a library of files and a set of users. Each user is equipped with a cache memory of equal size. The system operates in two phases: first, the placement phase, in which the users’ cache memory is filled with data from the file library, followed by the delivery phase, in which each user demands one file from the library. These demands are then satisfied via user-to-user multicast transmissions only, without any involvement from the central server. For such a system, we obtain a novel lower bound on the optimal D2D sum rate. Moreover, the best known achievable D2D sum rate is shown to be within a constant multiplicative factor of 3.17 of our lower bound, improving upon the previously best known lower bound. Hence, the result in this paper further closes the gap between the best known achievable sum rate and the optimal sum rate for D2D coded caching.
考虑设备到设备(D2D)编码缓存,其中有一台服务器托管一个文件库和一组用户。每个用户都配备了大小相等的缓存存储器。系统分两个阶段运行:首先是放置阶段,在这个阶段中,用户的缓存内存被文件库中的数据填充;其次是交付阶段,在这个阶段中,每个用户需要从文件库中获取一个文件。然后,这些需求仅通过用户到用户的多播传输来满足,而无需中央服务器的任何参与。对于这样的系统,我们得到了最优D2D和速率的一个新的下界。此外,最已知的可实现的D2D和速率被证明在我们的下界的3.17的常数乘法因子内,改进了以前最已知的下界。因此,本文的结果进一步缩小了已知的可实现和速率与D2D编码缓存的最优和速率之间的差距。
{"title":"An improved lower bound for device-to-device coded caching","authors":"Aniruddha Phatak, M. Varanasi","doi":"10.1109/ISIT50566.2022.9834513","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834513","url":null,"abstract":"Device-to-device (D2D) coded caching is considered in which there is a server hosting a library of files and a set of users. Each user is equipped with a cache memory of equal size. The system operates in two phases: first, the placement phase, in which the users’ cache memory is filled with data from the file library, followed by the delivery phase, in which each user demands one file from the library. These demands are then satisfied via user-to-user multicast transmissions only, without any involvement from the central server. For such a system, we obtain a novel lower bound on the optimal D2D sum rate. Moreover, the best known achievable D2D sum rate is shown to be within a constant multiplicative factor of 3.17 of our lower bound, improving upon the previously best known lower bound. Hence, the result in this paper further closes the gap between the best known achievable sum rate and the optimal sum rate for D2D coded caching.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Useful Is Delayed Feedback in AoI Minimization — A Study on Systems With Queues in Both Forward and Backward Directions 延迟反馈在AoI最小化中的作用——对具有正向和反向队列的系统的研究
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834697
Chih-Chun Wang
One canonical example of Age-Of-Information (AoI) minimization is the update-through-queues models. Existing results fall into two categories: The open-loop setting for which the sender is oblivious of the actual packet departure time, versus the closed-loop setting for which the decision is based on instantaneous Acknowledgement (ACK). Neither setting perfectly reflects modern networked systems, which almost always rely on feedback that experiences some delay. Motivated by this observation, this work subjects the ACK traffic to an independent queue so that the closed-loop decision is made based on delayed feedback. Near-optimal schedulers have been devised, which smoothly transition from the instantaneous-ACK to the openloop schemes depending on how long the feedback delay is. The results thus quantify the benefits of delayed feedback for AoI minimization in the update-through-queues systems.
信息年龄(Age-Of-Information, AoI)最小化的一个典型示例是通过队列更新模型。现有的结果分为两类:开环设置(发送方不知道实际的数据包出发时间)和闭环设置(决策基于瞬时确认(ACK))。这两种设置都不能完美地反映现代网络系统,因为现代网络系统几乎总是依赖于有一定延迟的反馈。基于这一观察结果,这项工作将ACK流量置于一个独立的队列中,以便基于延迟反馈做出闭环决策。设计了接近最优的调度器,根据反馈延迟的长短,从瞬时ack方案平稳地过渡到开环方案。因此,结果量化了延迟反馈对通过队列更新系统中AoI最小化的好处。
{"title":"How Useful Is Delayed Feedback in AoI Minimization — A Study on Systems With Queues in Both Forward and Backward Directions","authors":"Chih-Chun Wang","doi":"10.1109/ISIT50566.2022.9834697","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834697","url":null,"abstract":"One canonical example of Age-Of-Information (AoI) minimization is the update-through-queues models. Existing results fall into two categories: The open-loop setting for which the sender is oblivious of the actual packet departure time, versus the closed-loop setting for which the decision is based on instantaneous Acknowledgement (ACK). Neither setting perfectly reflects modern networked systems, which almost always rely on feedback that experiences some delay. Motivated by this observation, this work subjects the ACK traffic to an independent queue so that the closed-loop decision is made based on delayed feedback. Near-optimal schedulers have been devised, which smoothly transition from the instantaneous-ACK to the openloop schemes depending on how long the feedback delay is. The results thus quantify the benefits of delayed feedback for AoI minimization in the update-through-queues systems.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129464250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting Semantic Information Using An Efficient Secret Key 使用有效的密钥保护语义信息
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834462
Tao Guo, Jie Han, Huihui Wu, Yizhu Wang, Bo Bai, Wei Han
We consider a semantic cipher system, in which we protect only the semantic information of the source. The optimal tradeoff is characterized among the coding rate, the secret key rate, the semantic information leakage rate, the source reconstruction distortion, and the semantic distortion. It is shown that an efficient key with a small size suffices to protect the semantic information.
我们考虑一个语义密码系统,在这个系统中我们只保护源的语义信息。在编码率、密钥率、语义信息泄漏率、信源重构失真和语义失真之间进行了最优权衡。结果表明,一个小尺寸的高效密钥足以保护语义信息。
{"title":"Protecting Semantic Information Using An Efficient Secret Key","authors":"Tao Guo, Jie Han, Huihui Wu, Yizhu Wang, Bo Bai, Wei Han","doi":"10.1109/ISIT50566.2022.9834462","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834462","url":null,"abstract":"We consider a semantic cipher system, in which we protect only the semantic information of the source. The optimal tradeoff is characterized among the coding rate, the secret key rate, the semantic information leakage rate, the source reconstruction distortion, and the semantic distortion. It is shown that an efficient key with a small size suffices to protect the semantic information.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130556187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Source-Channel Polar-Coded Modulation 联合源信道极编码调制
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834492
Bo Wu, Jincheng Dai, K. Niu
In this paper, we investigate the joint design and optimization of source-channel polar coding with 2m-ary transmission. A joint framework is proposed which includes a source polar code to compress the redundant source, followed by a set of component polar codes over a 2m-ary modulation to protect the source against errors and achieve increased spectral efficiency. We prove that our scheme suffices to achieve the theoretical limit of source-channel separation theorem. For finite-length cases, a joint decoder that exploits both the residual redundancy and channel characteristics is also derived to further reduce the error rate. Simulation results verify the effectiveness of the scheme.
本文研究了一种传输距离为2m的源信道极化编码联合设计与优化。提出了一种联合框架,该框架包括压缩冗余源的源极性码,然后是一组在2m-ary调制下的分量极性码,以保护源免受误差的影响并提高频谱效率。我们证明了我们的方案足以达到源信道分离定理的理论极限。在有限长度的情况下,还推导了一种利用剩余冗余和信道特性的联合解码器,以进一步降低误码率。仿真结果验证了该方案的有效性。
{"title":"Joint Source-Channel Polar-Coded Modulation","authors":"Bo Wu, Jincheng Dai, K. Niu","doi":"10.1109/ISIT50566.2022.9834492","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834492","url":null,"abstract":"In this paper, we investigate the joint design and optimization of source-channel polar coding with 2m-ary transmission. A joint framework is proposed which includes a source polar code to compress the redundant source, followed by a set of component polar codes over a 2m-ary modulation to protect the source against errors and achieve increased spectral efficiency. We prove that our scheme suffices to achieve the theoretical limit of source-channel separation theorem. For finite-length cases, a joint decoder that exploits both the residual redundancy and channel characteristics is also derived to further reduce the error rate. Simulation results verify the effectiveness of the scheme.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Upper Confidence Interval Strategies for Multi-Armed Bandits with Entropy Rewards 熵奖励下多武装盗匪的上置信区间策略
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834746
N. Weinberger, M. Yemini
We introduce a multi-armed bandit problem with information-based rewards. At each round, a player chooses an arm, observes a symbol, and receives an unobserved reward in the form of the symbol’s self-information. The player aims to maximize the expected total reward associated with the entropy values of the arms played. We propose two algorithms based on upper confidence bounds (UCB) for this model. The first algorithm optimistically corrects the bias term in the entropy estimation. The second algorithm relies on data-dependent UCBs that adapt to sources with small entropy values. We provide performance guarantees by upper bounding the expected regret of each of the algorithms, and compare their asymptotic behavior to the Lai-Robbins lower bound. Finally, we provide numerical results illustrating the regret of the algorithms presented.
我们引入了一个基于信息奖励的多武装强盗问题。在每一轮中,玩家选择一只手臂,观察一个符号,并以符号的自我信息的形式获得一个未被观察到的奖励。玩家的目标是最大化与所玩武器的熵值相关的预期总奖励。我们提出了两种基于上置信度(UCB)的算法。第一种算法乐观地修正了熵估计中的偏差项。第二种算法依赖于数据依赖的ucb,该ucb适应具有小熵值的源。我们通过每个算法的期望遗憾上限来提供性能保证,并将它们的渐近行为与Lai-Robbins下界进行比较。最后,我们提供了数值结果来说明所提出算法的缺点。
{"title":"Upper Confidence Interval Strategies for Multi-Armed Bandits with Entropy Rewards","authors":"N. Weinberger, M. Yemini","doi":"10.1109/ISIT50566.2022.9834746","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834746","url":null,"abstract":"We introduce a multi-armed bandit problem with information-based rewards. At each round, a player chooses an arm, observes a symbol, and receives an unobserved reward in the form of the symbol’s self-information. The player aims to maximize the expected total reward associated with the entropy values of the arms played. We propose two algorithms based on upper confidence bounds (UCB) for this model. The first algorithm optimistically corrects the bias term in the entropy estimation. The second algorithm relies on data-dependent UCBs that adapt to sources with small entropy values. We provide performance guarantees by upper bounding the expected regret of each of the algorithms, and compare their asymptotic behavior to the Lai-Robbins lower bound. Finally, we provide numerical results illustrating the regret of the algorithms presented.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1