首页 > 最新文献

arXiv - CS - Information Theory最新文献

英文 中文
Computation of the optimal error exponent function for fixed-length lossy source coding in discrete memoryless sources 计算离散无记忆源中固定长度有损源编码的最佳误差指数函数
Pub Date : 2023-12-06 DOI: arxiv-2312.03784
Yutaka Jitsumatsu
The error exponent of fixed-length lossy source coding was established byMarton. Ahlswede showed that this exponent can be discontinuous at a rate $R$,depending on the source distribution $P$ and the distortion measure $d(x,y)$.The reason for the discontinuity in the error exponent is that there exists adistortion measure $d(x,y)$ and a distortion level $Delta$ such that therate-distortion function $R(Delta|P)$ is neither concave nor quasi-concavewith respect to $P$. Arimoto's algorithm for computing the error exponent inlossy source coding is based on Blahut's parametric representation of the errorexponent. However, Blahut's parametric representation is a lower convexenvelope of Marton's exponent, and the two do not generally agree. A majorcontribution of this paper is to provide a parametric representation thatperfectly matches the inverse function of Marton's exponent, thereby preventingthe problems arising from the above-mentioned non-concavity of $R(Delta|P)$.For fixed parameters, an optimal distribution can be obtained using Arimoto'salgorithm. By performing a nonconvex optimization over the parameters, theinverse function of Marton's exponent is obtained.
固定长度有损信源编码的误差指数是由马顿确定的。误差指数不连续的原因是存在一个失真度量 $d(x,y)$ 和一个失真水平 $Delta$,使得有源失真函数 $R(Delta|P)$ 相对于 $P 既不凹也不准凹。有元算法计算有损信源编码中的误差指数是基于 Blahut 的误差指数参数表示法。然而,Blahut 的参数表示是 Marton 指数的下凸包络,二者一般并不一致。本文的一个主要贡献是提供了一种参数表示法,它与马顿指数的反函数完全匹配,从而避免了因上述 $R(Delta|P)$ 的非凹性而产生的问题。通过对参数进行非凸优化,可以得到马顿指数的反函数。
{"title":"Computation of the optimal error exponent function for fixed-length lossy source coding in discrete memoryless sources","authors":"Yutaka Jitsumatsu","doi":"arxiv-2312.03784","DOIUrl":"https://doi.org/arxiv-2312.03784","url":null,"abstract":"The error exponent of fixed-length lossy source coding was established by\u0000Marton. Ahlswede showed that this exponent can be discontinuous at a rate $R$,\u0000depending on the source distribution $P$ and the distortion measure $d(x,y)$.\u0000The reason for the discontinuity in the error exponent is that there exists a\u0000distortion measure $d(x,y)$ and a distortion level $Delta$ such that the\u0000rate-distortion function $R(Delta|P)$ is neither concave nor quasi-concave\u0000with respect to $P$. Arimoto's algorithm for computing the error exponent in\u0000lossy source coding is based on Blahut's parametric representation of the error\u0000exponent. However, Blahut's parametric representation is a lower convex\u0000envelope of Marton's exponent, and the two do not generally agree. A major\u0000contribution of this paper is to provide a parametric representation that\u0000perfectly matches the inverse function of Marton's exponent, thereby preventing\u0000the problems arising from the above-mentioned non-concavity of $R(Delta|P)$.\u0000For fixed parameters, an optimal distribution can be obtained using Arimoto's\u0000algorithm. By performing a nonconvex optimization over the parameters, the\u0000inverse function of Marton's exponent is obtained.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"228 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138553955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Group Fairness Evaluation via Conditional Value-at-Risk Testing 通过条件风险价值测试进行多组公平性评估
Pub Date : 2023-12-06 DOI: arxiv-2312.03867
Lucas Monteiro Paes, Ananda Theertha Suresh, Alex Beutel, Flavio P. Calmon, Ahmad Beirami
Machine learning (ML) models used in prediction and classification tasks maydisplay performance disparities across population groups determined bysensitive attributes (e.g., race, sex, age). We consider the problem ofevaluating the performance of a fixed ML model across population groups definedby multiple sensitive attributes (e.g., race and sex and age). Here, the samplecomplexity for estimating the worst-case performance gap across groups (e.g.,the largest difference in error rates) increases exponentially with the numberof group-denoting sensitive attributes. To address this issue, we propose anapproach to test for performance disparities based on Conditional Value-at-Risk(CVaR). By allowing a small probabilistic slack on the groups over which amodel has approximately equal performance, we show that the sample complexityrequired for discovering performance violations is reduced exponentially to beat most upper bounded by the square root of the number of groups. As abyproduct of our analysis, when the groups are weighted by a specific priordistribution, we show that R'enyi entropy of order $2/3$ of the priordistribution captures the sample complexity of the proposed CVaR testalgorithm. Finally, we also show that there exists a non-i.i.d. data collectionstrategy that results in a sample complexity independent of the number ofgroups.
在预测和分类任务中使用的机器学习(ML)模型可能会在由敏感属性(如种族、性别、年龄)决定的人群中显示出性能差异。我们考虑的问题是在由多个敏感属性(如种族、性别和年龄)定义的人群中评估固定 ML 模型的性能。在这种情况下,估计不同群体间最坏情况下的性能差距(例如误差率的最大差异)的样本复杂度会随着群体敏感属性的数量呈指数增长。为了解决这个问题,我们提出了一种基于条件风险值(CVaR)的性能差距测试方法。通过允许模型在性能大致相同的组别上有较小的概率松弛,我们证明发现性能违规所需的样本复杂度会以指数形式降低,最大上限值为组别数的平方根。作为我们分析的一个副产品,当各组由特定的优先级分布加权时,我们证明优先级分布的阶数为 2/3$ 的 R'enyi entropy 捕获了所提出的 CVaR 测试算法的样本复杂度。最后,我们还证明,存在一种非 i.i.d. 数据收集策略,其样本复杂度与组数无关。
{"title":"Multi-Group Fairness Evaluation via Conditional Value-at-Risk Testing","authors":"Lucas Monteiro Paes, Ananda Theertha Suresh, Alex Beutel, Flavio P. Calmon, Ahmad Beirami","doi":"arxiv-2312.03867","DOIUrl":"https://doi.org/arxiv-2312.03867","url":null,"abstract":"Machine learning (ML) models used in prediction and classification tasks may\u0000display performance disparities across population groups determined by\u0000sensitive attributes (e.g., race, sex, age). We consider the problem of\u0000evaluating the performance of a fixed ML model across population groups defined\u0000by multiple sensitive attributes (e.g., race and sex and age). Here, the sample\u0000complexity for estimating the worst-case performance gap across groups (e.g.,\u0000the largest difference in error rates) increases exponentially with the number\u0000of group-denoting sensitive attributes. To address this issue, we propose an\u0000approach to test for performance disparities based on Conditional Value-at-Risk\u0000(CVaR). By allowing a small probabilistic slack on the groups over which a\u0000model has approximately equal performance, we show that the sample complexity\u0000required for discovering performance violations is reduced exponentially to be\u0000at most upper bounded by the square root of the number of groups. As a\u0000byproduct of our analysis, when the groups are weighted by a specific prior\u0000distribution, we show that R'enyi entropy of order $2/3$ of the prior\u0000distribution captures the sample complexity of the proposed CVaR test\u0000algorithm. Finally, we also show that there exists a non-i.i.d. data collection\u0000strategy that results in a sample complexity independent of the number of\u0000groups.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138553758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variational Autoencoder for Channel Estimation: Real-World Measurement Insights 用于信道估计的变异自动编码器:真实世界的测量启示
Pub Date : 2023-12-06 DOI: arxiv-2312.03450
Michael Baur, Benedikt Böck, Nurettin Turan, Wolfgang Utschick
This work utilizes a variational autoencoder for channel estimation andevaluates it on real-world measurements. The estimator is trained solely onnoisy channel observations and parameterizes an approximation to the meansquared error-optimal estimator by learning observation-dependent conditionalfirst and second moments. The proposed estimator significantly outperformsrelated state-of-the-art estimators on real-world measurements. We investigatethe effect of pre-training with synthetic data and find that the proposedestimator exhibits comparable results to the related estimators if trained onsynthetic data and evaluated on the measurement data. Furthermore, pre-trainingon synthetic data also helps to reduce the required measurement trainingdataset size.
这项工作利用变异自动编码器进行信道估计,并在实际测量中对其进行评估。该估计器完全根据噪声信道观测数据进行训练,并通过学习与观测相关的条件第一矩和第二矩,对均方误差最优估计器的近似值进行参数化。在实际测量中,所提出的估计器明显优于相关的最先进估计器。我们研究了使用合成数据进行预训练的效果,发现如果在合成数据上进行训练并在测量数据上进行评估,所提出的估计器与相关估计器的结果相当。此外,在合成数据上进行预训练还有助于减少所需的测量训练数据集大小。
{"title":"Variational Autoencoder for Channel Estimation: Real-World Measurement Insights","authors":"Michael Baur, Benedikt Böck, Nurettin Turan, Wolfgang Utschick","doi":"arxiv-2312.03450","DOIUrl":"https://doi.org/arxiv-2312.03450","url":null,"abstract":"This work utilizes a variational autoencoder for channel estimation and\u0000evaluates it on real-world measurements. The estimator is trained solely on\u0000noisy channel observations and parameterizes an approximation to the mean\u0000squared error-optimal estimator by learning observation-dependent conditional\u0000first and second moments. The proposed estimator significantly outperforms\u0000related state-of-the-art estimators on real-world measurements. We investigate\u0000the effect of pre-training with synthetic data and find that the proposed\u0000estimator exhibits comparable results to the related estimators if trained on\u0000synthetic data and evaluated on the measurement data. Furthermore, pre-training\u0000on synthetic data also helps to reduce the required measurement training\u0000dataset size.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138547779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous radio access with multiple latency targets 具有多个延迟目标的异构无线接入
Pub Date : 2023-12-05 DOI: arxiv-2312.03131
Israel Leyva-Mayorga, Jose Manuel Gimenez-Guzman, Lorenzo Valentini, Petar Popovski
Since the advent of ultra-reliable and low-latency communications (URLLC),the requirements of low-latency applications tend to be completelycharacterized by a single pre-defined latency-reliability target. That is,operation is optimal whenever the pre-defined latency threshold is met but thesystem is assumed to be in error when the latency threshold is violated. Thisvision is severely limited and does not capture the real requirements of mostapplications, where multiple latency thresholds can be defined, together withincentives or rewards associated with meeting each of them. Such formulation isa generalization of the single-threshold case popularized by URLLC and, in theasymptotic case, approximates to defining a cost for each point in the supportof the latency distribution. In this paper, we explore the implications ofdefining multiple latency targets on the design of access protocols and on theoptimization of repetition-based access strategies in orthogonal andnon-orthogonal multiple access scenarios with users that present heterogeneoustraffic characteristics and requirements. We observe that the access strategiesof the users can be effectively adapted to the requirements of the applicationby carefully defining the latency targets and the associated rewards.
自从超可靠和低延迟通信(URLLC)出现以来,低延迟应用的要求往往完全被一个预定义的延迟-可靠目标所描述。也就是说,只要满足预定义的延迟阈值,系统就能达到最佳运行状态,但当违反延迟阈值时,系统就会被假定为出错。在大多数应用中,可以定义多个延迟阈值,以及与满足每个阈值相关的激励或奖励。这种表述是对 URLLC 推广的单阈值情况的概括,在渐近情况下,近似于为支持延迟分布的每个点定义一个成本。在本文中,我们探讨了定义多个延迟目标对接入协议设计的影响,以及在正交和非正交多路接入场景中优化基于重复的接入策略的影响。我们发现,通过仔细定义延迟目标和相关奖励,用户的接入策略可以有效地适应应用的要求。
{"title":"Heterogeneous radio access with multiple latency targets","authors":"Israel Leyva-Mayorga, Jose Manuel Gimenez-Guzman, Lorenzo Valentini, Petar Popovski","doi":"arxiv-2312.03131","DOIUrl":"https://doi.org/arxiv-2312.03131","url":null,"abstract":"Since the advent of ultra-reliable and low-latency communications (URLLC),\u0000the requirements of low-latency applications tend to be completely\u0000characterized by a single pre-defined latency-reliability target. That is,\u0000operation is optimal whenever the pre-defined latency threshold is met but the\u0000system is assumed to be in error when the latency threshold is violated. This\u0000vision is severely limited and does not capture the real requirements of most\u0000applications, where multiple latency thresholds can be defined, together with\u0000incentives or rewards associated with meeting each of them. Such formulation is\u0000a generalization of the single-threshold case popularized by URLLC and, in the\u0000asymptotic case, approximates to defining a cost for each point in the support\u0000of the latency distribution. In this paper, we explore the implications of\u0000defining multiple latency targets on the design of access protocols and on the\u0000optimization of repetition-based access strategies in orthogonal and\u0000non-orthogonal multiple access scenarios with users that present heterogeneous\u0000traffic characteristics and requirements. We observe that the access strategies\u0000of the users can be effectively adapted to the requirements of the application\u0000by carefully defining the latency targets and the associated rewards.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138547785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-complexity Linear Multicast Beamforming for Cache-aided MIMO Communications 高速缓存辅助多输入多输出通信的低复杂度线性多播波束成形
Pub Date : 2023-12-05 DOI: arxiv-2312.02839
Mohammad NaseriTehrani, MohammadJavad Salehi, Antti Tölli
A practical and scalable multicast beamformer design in multi-inputmulti-output~(MIMO) coded caching~(CC) systems is introduced in this paper. Theproposed approach allows multicast transmission to multiple groups withpartially overlapping user sets using receiver dimensions to distinguishbetween different group-specific streams. Additionally, it provides flexibilityin accommodating various parameter configurations of the MIMO-CC setup andovercomes practical limitations, such as the requirement to use successiveinterference cancellation~(SIC) at the receiver, while achieving the samedegrees-of-freedom~(DoF). To evaluate the proposed scheme, we define thesymmetric rate as the sum rate of the partially overlapping streams receivedper user, comprising a linear multistream multicast transmission vector and thelinear minimum mean square error~(LMMSE) receiver. The resulting non-convexsymmetric rate maximization problem is solved using alternative optimizationand successive convex approximation~(SCA). Moreover, a fast iterativeLagrangian-based algorithm is developed, significantly reducing thecomputational overhead compared to previous designs. The effectiveness of ourproposed method is demonstrated by extensive simulations.
本文介绍了多输入多输出(MIMO)编码缓存(CC)系统中一种实用且可扩展的多播波束成形器设计。所提出的方法允许向具有部分重叠用户集的多个组进行组播传输,并利用接收器维度来区分不同组的特定流。此外,它还能灵活地适应 MIMO-CC 设置的各种参数配置,并克服了一些实际限制,如要求在接收器上使用连续干扰消除(SIC),同时实现相同的自由度(DoF)。为了评估所提出的方案,我们将对称速率定义为每个用户接收到的部分重叠流的总和速率,包括线性多流组播传输矢量和线性最小均方误差(LMMSE)接收器。由此产生的非凸对称速率最大化问题通过替代优化和连续凸近似(SCA)来解决。此外,还开发了一种基于拉格朗日的快速迭代算法,与以前的设计相比,大大减少了计算开销。通过大量的仿真证明了我们提出的方法的有效性。
{"title":"Low-complexity Linear Multicast Beamforming for Cache-aided MIMO Communications","authors":"Mohammad NaseriTehrani, MohammadJavad Salehi, Antti Tölli","doi":"arxiv-2312.02839","DOIUrl":"https://doi.org/arxiv-2312.02839","url":null,"abstract":"A practical and scalable multicast beamformer design in multi-input\u0000multi-output~(MIMO) coded caching~(CC) systems is introduced in this paper. The\u0000proposed approach allows multicast transmission to multiple groups with\u0000partially overlapping user sets using receiver dimensions to distinguish\u0000between different group-specific streams. Additionally, it provides flexibility\u0000in accommodating various parameter configurations of the MIMO-CC setup and\u0000overcomes practical limitations, such as the requirement to use successive\u0000interference cancellation~(SIC) at the receiver, while achieving the same\u0000degrees-of-freedom~(DoF). To evaluate the proposed scheme, we define the\u0000symmetric rate as the sum rate of the partially overlapping streams received\u0000per user, comprising a linear multistream multicast transmission vector and the\u0000linear minimum mean square error~(LMMSE) receiver. The resulting non-convex\u0000symmetric rate maximization problem is solved using alternative optimization\u0000and successive convex approximation~(SCA). Moreover, a fast iterative\u0000Lagrangian-based algorithm is developed, significantly reducing the\u0000computational overhead compared to previous designs. The effectiveness of our\u0000proposed method is demonstrated by extensive simulations.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138547522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Neural Receiver for 5G NR Multi-user MIMO 用于 5G NR 多用户 MIMO 的神经接收器
Pub Date : 2023-12-05 DOI: arxiv-2312.02601
Sebastian Cammerer, Fayçal Aït Aoudia, Jakob Hoydis, Andreas Oeldemann, Andreas Roessler, Timo Mayer, Alexander Keller
We introduce a neural network (NN)-based multiuser multiple-inputmultiple-output (MU-MIMO) receiver with 5G New Radio (5G NR) physical uplinkshared channel (PUSCH) compatibility. The NN architecture is based onconvolution layers to exploit the time and frequency correlation of the channeland a graph neural network (GNN) to handle multiple users. The proposedarchitecture adapts to an arbitrary number of sub-carriers and supports avarying number of multiple-input multiple-output (MIMO) layers and userswithout the need for any retraining. The receiver operates on an entire 5G NRslot, i.e., processes the entire received orthogonal frequency divisionmultiplexing (OFDM) time-frequency resource grid by jointly performing channelestimation, equalization, and demapping. The proposed architecture operatesless than 1 dB away from a baseline using linear minimum mean square error(LMMSE) channel estimation with K-best detection but benefits from asignificantly lower computational complexity. We show the importance of acarefully designed training process such that the trained receiver is universalfor a wide range of different unseen channel conditions. Finally, wedemonstrate the results of a hardware-in-the-loop verification based on 3GPPcompliant conformance test scenarios.
我们介绍了一种基于神经网络(NN)的多用户多输入多输出(MU-MIMO)接收器,它兼容 5G 新无线电(5G NR)物理上行链路共享信道(PUSCH)。神经网络架构基于利用信道的时间和频率相关性的卷积层和处理多用户的图神经网络(GNN)。所提出的架构可适应任意数量的子载波,并支持不同数量的多输入多输出(MIMO)层和用户,无需任何再训练。接收器在整个 5G NRslot 上运行,即通过联合执行信道估计、均衡和解映射来处理整个接收到的正交频分复用(OFDM)时频资源网格。所提出的架构与使用线性最小均方误差(LMMSE)信道估计和 K-best 检测的基线相比,运行速度相差不到 1 dB,但计算复杂度却大大降低。我们展示了精心设计训练过程的重要性,这样训练出来的接收器就能普遍适用于各种不同的未知信道条件。最后,我们展示了基于符合 3GPP 标准的一致性测试场景的硬件在环验证结果。
{"title":"A Neural Receiver for 5G NR Multi-user MIMO","authors":"Sebastian Cammerer, Fayçal Aït Aoudia, Jakob Hoydis, Andreas Oeldemann, Andreas Roessler, Timo Mayer, Alexander Keller","doi":"arxiv-2312.02601","DOIUrl":"https://doi.org/arxiv-2312.02601","url":null,"abstract":"We introduce a neural network (NN)-based multiuser multiple-input\u0000multiple-output (MU-MIMO) receiver with 5G New Radio (5G NR) physical uplink\u0000shared channel (PUSCH) compatibility. The NN architecture is based on\u0000convolution layers to exploit the time and frequency correlation of the channel\u0000and a graph neural network (GNN) to handle multiple users. The proposed\u0000architecture adapts to an arbitrary number of sub-carriers and supports a\u0000varying number of multiple-input multiple-output (MIMO) layers and users\u0000without the need for any retraining. The receiver operates on an entire 5G NR\u0000slot, i.e., processes the entire received orthogonal frequency division\u0000multiplexing (OFDM) time-frequency resource grid by jointly performing channel\u0000estimation, equalization, and demapping. The proposed architecture operates\u0000less than 1 dB away from a baseline using linear minimum mean square error\u0000(LMMSE) channel estimation with K-best detection but benefits from a\u0000significantly lower computational complexity. We show the importance of a\u0000carefully designed training process such that the trained receiver is universal\u0000for a wide range of different unseen channel conditions. Finally, we\u0000demonstrate the results of a hardware-in-the-loop verification based on 3GPP\u0000compliant conformance test scenarios.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138547523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure-ISAC: Secure V2X Communication: An Integrated Sensing and Communication Perspective 安全- isac:安全V2X通信:集成传感和通信的视角
Pub Date : 2023-12-04 DOI: arxiv-2312.01720
Kan Yu, Zhiyong Feng, Dong Li, Jiguo Yu
In Vehicle-to-Everything (V2X) systems, reliable and secure informationexchange plays a pivotal role in road safety and traffic management. Due to theopen nature of the wireless medium and the constant or intermittent mobility ofvehicles, the security of transmissions in V2X is more challenging compared totraditional wireless networks. Physical layer security (PLS) leverages theinherent randomness of wireless communication channels to ensure theconfidentiality and security of information transmission. Current PLS schemesin integrated communications and sensing (ISAC) enabled V2X systems is toutilize communication interference to significantly impact the eavesdroppingchannel more than the legitimate channel. However, in an ISAC-enabled V2Xsystem, it is crucial to prioritize and address the issue of interferencecoupling as it significantly impacts the confidentiality and security ofinformation exchange. This goes beyond simply relying on the communicationinterference. Until now, no discussions or studies on integrating security withISAC (Seucue-ISAC) in ISAC-enabled V2X systems, specifically regarding theexploitation of sensing interference or coupling interference. In this article,we provide a comprehensive review on PLS metrics and security threatsencountered in V2X communication. And then, we discuss and analyze four popularPLS techniques and the main challenges associated with their implementation inISAC-enabled V2X systems. Finally, we share our vision for PLS studies inISAC-based V2X systems to promote Secure-ISAC.
在车联网(V2X)系统中,可靠和安全的信息交换在道路安全和交通管理中起着关键作用。由于无线媒体的开放性和车辆的持续或间歇性移动性,与传统无线网络相比,V2X传输的安全性更具挑战性。物理层安全(PLS)利用无线通信信道固有的随机性来保证信息传输的保密性和安全性。目前在集成通信和传感(ISAC)支持的V2X系统中的PLS方案是利用通信干扰来显著影响窃听信道,而不是合法信道。然而,在支持isac的v2x系统中,优先考虑和解决干扰耦合问题至关重要,因为它会严重影响信息交换的保密性和安全性。这超越了单纯依赖于通信干扰。到目前为止,还没有关于在isac支持的V2X系统中集成isac (seuue - isac)安全性的讨论或研究,特别是关于感知干扰或耦合干扰的利用。在本文中,我们对V2X通信中遇到的PLS度量和安全威胁进行了全面的回顾。然后,我们讨论和分析了四种流行的pls技术以及与它们在支持isac的V2X系统中实现相关的主要挑战。最后,我们分享了我们在基于isac的V2X系统中PLS研究的愿景,以促进安全isac。
{"title":"Secure-ISAC: Secure V2X Communication: An Integrated Sensing and Communication Perspective","authors":"Kan Yu, Zhiyong Feng, Dong Li, Jiguo Yu","doi":"arxiv-2312.01720","DOIUrl":"https://doi.org/arxiv-2312.01720","url":null,"abstract":"In Vehicle-to-Everything (V2X) systems, reliable and secure information\u0000exchange plays a pivotal role in road safety and traffic management. Due to the\u0000open nature of the wireless medium and the constant or intermittent mobility of\u0000vehicles, the security of transmissions in V2X is more challenging compared to\u0000traditional wireless networks. Physical layer security (PLS) leverages the\u0000inherent randomness of wireless communication channels to ensure the\u0000confidentiality and security of information transmission. Current PLS schemes\u0000in integrated communications and sensing (ISAC) enabled V2X systems is to\u0000utilize communication interference to significantly impact the eavesdropping\u0000channel more than the legitimate channel. However, in an ISAC-enabled V2X\u0000system, it is crucial to prioritize and address the issue of interference\u0000coupling as it significantly impacts the confidentiality and security of\u0000information exchange. This goes beyond simply relying on the communication\u0000interference. Until now, no discussions or studies on integrating security with\u0000ISAC (Seucue-ISAC) in ISAC-enabled V2X systems, specifically regarding the\u0000exploitation of sensing interference or coupling interference. In this article,\u0000we provide a comprehensive review on PLS metrics and security threats\u0000encountered in V2X communication. And then, we discuss and analyze four popular\u0000PLS techniques and the main challenges associated with their implementation in\u0000ISAC-enabled V2X systems. Finally, we share our vision for PLS studies in\u0000ISAC-based V2X systems to promote Secure-ISAC.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138535886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixed-point methods for long-term power control and beamforming design in large-scale MIMO 大规模MIMO中长期功率控制和波束成形设计的定点方法
Pub Date : 2023-12-04 DOI: arxiv-2312.02080
Lorenzo Miretti, Renato L. G. Cavalcante, Sławomir Stańczak
This study presents novel applications of fixed-point methods to solvepreviously open joint power control and beamforming design problems in modernlarge-scale MIMO systems, e.g., based on the cell-free massive MIMO and XL-MIMOconcepts. In particular, motivated by the need for scalable systemarchitectures, we revisit the classical sum power minimization and max-min fairdesign criteria by considering long-term power control and beamforming designbased on channel statistics and possibly limited channel state information(CSI) sharing across distributed processing units. This approach is believed tomitigate the severe scalability issues of competing short-term optimalalgorithms in the literature, which must be executed for every channelrealization by a central controller endowed with global CSI, hence imposingvery demanding requirements in terms of computation and interconnectioncapabilities. The obtained optimal algorithms are then illustrated and comparedagainst existing short-term and long-term approaches via numerical simulationsin a cell-free massive MIMO setup.
本研究提出了不动点方法的新应用,以解决现代大规模MIMO系统中先前开放的联合功率控制和波束形成设计问题,例如,基于无单元大规模MIMO和xml -MIMO概念。特别是,由于需要可扩展的系统架构,我们通过考虑基于信道统计和可能有限的信道状态信息(CSI)共享的长期功率控制和波束形成设计,重新审视了经典的和功率最小化和最大最小公平设计标准。这种方法被认为可以缓解文献中竞争的短期最优算法的严重可扩展性问题,这些算法必须由具有全局CSI的中央控制器执行每个通道实现,因此在计算和互连能力方面提出了非常苛刻的要求。然后通过无单元大规模MIMO设置的数值模拟,说明了所获得的最优算法,并与现有的短期和长期方法进行了比较。
{"title":"Fixed-point methods for long-term power control and beamforming design in large-scale MIMO","authors":"Lorenzo Miretti, Renato L. G. Cavalcante, Sławomir Stańczak","doi":"arxiv-2312.02080","DOIUrl":"https://doi.org/arxiv-2312.02080","url":null,"abstract":"This study presents novel applications of fixed-point methods to solve\u0000previously open joint power control and beamforming design problems in modern\u0000large-scale MIMO systems, e.g., based on the cell-free massive MIMO and XL-MIMO\u0000concepts. In particular, motivated by the need for scalable system\u0000architectures, we revisit the classical sum power minimization and max-min fair\u0000design criteria by considering long-term power control and beamforming design\u0000based on channel statistics and possibly limited channel state information\u0000(CSI) sharing across distributed processing units. This approach is believed to\u0000mitigate the severe scalability issues of competing short-term optimal\u0000algorithms in the literature, which must be executed for every channel\u0000realization by a central controller endowed with global CSI, hence imposing\u0000very demanding requirements in terms of computation and interconnection\u0000capabilities. The obtained optimal algorithms are then illustrated and compared\u0000against existing short-term and long-term approaches via numerical simulations\u0000in a cell-free massive MIMO setup.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138535888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Quantum Markov Chains 虚拟量子马尔可夫链
Pub Date : 2023-12-04 DOI: arxiv-2312.02031
Yu-Ao Chen, Chengkai Zhu, Keming He, Mingrui Jing, Xin Wang
Quantum Markov chains generalize classical Markov chains for random variablesto the quantum realm and exhibit unique inherent properties, making them animportant feature in quantum information theory. In this work, we propose theconcept of virtual quantum Markov chains (VQMCs), focusing on scenarios wheresubsystems retain classical information about global systems from measurementstatistics. As a generalization of quantum Markov chains, VQMCs characterizestates where arbitrary global shadow information can be recovered fromsubsystems through local quantum operations and measurements. We present analgebraic characterization for virtual quantum Markov chains and show that thevirtual quantum recovery is fully determined by the block matrices of a quantumstate on its subsystems. Notably, we find a distinction between two classes oftripartite entanglement by showing that the W state is a VQMC while the GHZstate is not. Furthermore, we establish semidefinite programs to determine theoptimal sampling overhead and the robustness of virtual quantum Markov chains.We demonstrate the optimal sampling overhead is additive, indicating no freelunch to further reduce the sampling cost of recovery from parallel calls ofthe VQMC states. Our findings elucidate distinctions between quantum Markovchains and virtual quantum Markov chains, extending our understanding ofquantum recovery to scenarios prioritizing classical information frommeasurement statistics.
量子马尔可夫链将随机变量的经典马尔可夫链推广到量子领域,并表现出独特的固有性质,是量子信息论的重要特征。在这项工作中,我们提出了虚拟量子马尔可夫链(vqmc)的概念,重点关注子系统从测量统计中保留全局系统经典信息的场景。作为量子马尔可夫链的一种推广,vqmc的特征是通过局部量子操作和测量可以从子系统中恢复任意全局阴影信息。我们给出了虚量子马尔可夫链的代数表征,并证明了虚量子恢复完全由子系统上量子态的块矩阵决定。值得注意的是,我们发现了两类三方纠缠的区别,表明W态是VQMC,而GHZstate不是。在此基础上,我们建立了半定规划来确定虚拟量子马尔可夫链的最优采样开销和鲁棒性。我们证明了最优采样开销是加性的,表明没有自由启动,以进一步降低从VQMC状态的并行调用中恢复的采样成本。我们的研究结果阐明了量子马尔可夫链和虚拟量子马尔可夫链之间的区别,将我们对量子恢复的理解扩展到从测量统计中优先考虑经典信息的场景。
{"title":"Virtual Quantum Markov Chains","authors":"Yu-Ao Chen, Chengkai Zhu, Keming He, Mingrui Jing, Xin Wang","doi":"arxiv-2312.02031","DOIUrl":"https://doi.org/arxiv-2312.02031","url":null,"abstract":"Quantum Markov chains generalize classical Markov chains for random variables\u0000to the quantum realm and exhibit unique inherent properties, making them an\u0000important feature in quantum information theory. In this work, we propose the\u0000concept of virtual quantum Markov chains (VQMCs), focusing on scenarios where\u0000subsystems retain classical information about global systems from measurement\u0000statistics. As a generalization of quantum Markov chains, VQMCs characterize\u0000states where arbitrary global shadow information can be recovered from\u0000subsystems through local quantum operations and measurements. We present an\u0000algebraic characterization for virtual quantum Markov chains and show that the\u0000virtual quantum recovery is fully determined by the block matrices of a quantum\u0000state on its subsystems. Notably, we find a distinction between two classes of\u0000tripartite entanglement by showing that the W state is a VQMC while the GHZ\u0000state is not. Furthermore, we establish semidefinite programs to determine the\u0000optimal sampling overhead and the robustness of virtual quantum Markov chains.\u0000We demonstrate the optimal sampling overhead is additive, indicating no free\u0000lunch to further reduce the sampling cost of recovery from parallel calls of\u0000the VQMC states. Our findings elucidate distinctions between quantum Markov\u0000chains and virtual quantum Markov chains, extending our understanding of\u0000quantum recovery to scenarios prioritizing classical information from\u0000measurement statistics.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138535818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Completely Monotone Conjecture for Rényi Entropy 关于r<s:1>熵的完全单调猜想
Pub Date : 2023-12-04 DOI: arxiv-2312.01819
Hao Wu, Lei Yu, Laigang Guo
In this paper, we generalize the completely monotone conjecture from Shannonentropy to the R'enyi entropy. We confirm this conjecture for the order ofderivative up to $3$, when the order of R'enyi entropy is in certain regimes.We also investigate concavity of R'enyi entropy power and the completelymonotone conjecture for Tsallis entropy. We observe that the completelymonotone conjecture is true for Tsallis entropy of order $2$. Our proofs inthis paper are based on the techniques of integration-by-parts andsum-of-squares.
本文将香农熵的完全单调猜想推广到R enyi熵。当R enyi熵的阶数在一定范围内时,我们证实了这一猜想。我们还研究了R′enyi熵幂的凹性和Tsallis熵的完全单调猜想。我们观察到,对于2阶的Tsallis熵,完全单调猜想是成立的。本文的证明是基于分部积分和平方和的方法。
{"title":"On the Completely Monotone Conjecture for Rényi Entropy","authors":"Hao Wu, Lei Yu, Laigang Guo","doi":"arxiv-2312.01819","DOIUrl":"https://doi.org/arxiv-2312.01819","url":null,"abstract":"In this paper, we generalize the completely monotone conjecture from Shannon\u0000entropy to the R'enyi entropy. We confirm this conjecture for the order of\u0000derivative up to $3$, when the order of R'enyi entropy is in certain regimes.\u0000We also investigate concavity of R'enyi entropy power and the completely\u0000monotone conjecture for Tsallis entropy. We observe that the completely\u0000monotone conjecture is true for Tsallis entropy of order $2$. Our proofs in\u0000this paper are based on the techniques of integration-by-parts and\u0000sum-of-squares.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138535887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1