首页 > 最新文献

IEEE journal on selected areas in information theory最新文献

英文 中文
Robust Causal Bandits for Linear Models 线性模型的稳健因果匪帮
Pub Date : 2024-03-06 DOI: 10.1109/JSAIT.2024.3373595
Zirui Yan;Arpan Mukherjee;Burak Varıcı;Ali Tajer
The sequential design of experiments for optimizing a reward function in causal systems can be effectively modeled by the sequential design of interventions in causal bandits (CBs). In the existing literature on CBs, a critical assumption is that the causal models remain constant over time. However, this assumption does not necessarily hold in complex systems, which constantly undergo temporal model fluctuations. This paper addresses the robustness of CBs to such model fluctuations. The focus is on causal systems with linear structural equation models (SEMs). The SEMs and the time-varying pre- and post-interventional statistical models are all unknown. Cumulative regret is adopted as the design criteria, based on which the objective is to design a sequence of interventions that incur the smallest cumulative regret with respect to an oracle aware of the entire causal model and its fluctuations. First, it is established that the existing approaches fail to maintain regret sub-linearity with even a few instances of model deviation. Specifically, when the number of instances with model deviation is as few as $T^{frac {1}{2L}}$ , where $T$ is the time horizon and $L$ is the length of the longest causal path in the graph, the existing algorithms will have linear regret in $T$ . For instance, when $T=10^{5}$ and $L=3$ , model deviations in 6 out of 105 instances result in a linear regret. Next, a robust CB algorithm is designed, and its regret is analyzed, where upper and information-theoretic lower bounds on the regret are established. Specifically, in a graph with $N$ nodes and maximum degree $d$ , under a general measure of model deviation $C$ , the cumulative regret is upper bounded by $tilde {mathcal {O}}left({d^{L-{}frac {1}{2}}(sqrt {NT} + NC)}right)$ and lower bounded by $Omega left({d^{frac {L}{2}-2}max {sqrt {T};, ; d^{2}C}}right)$ . Comparing these bounds establishes that the proposed algorithm achieves nearly optimal $tilde{mathcal {O}} (sqrt {T})$ regret when $C$ is $o(sqrt {T})$ and maintains sub-linear regret for a broader range of $C$ .
在因果系统中,优化奖励函数的实验顺序设计可以通过因果匪帮(CBs)中干预措施的顺序设计进行有效建模。在现有的因果匪帮文献中,一个关键的假设是因果模型随时间保持不变。然而,这一假设在复杂系统中并不一定成立,因为复杂系统会不断发生时间模型波动。本文探讨了 CB 对这种模型波动的稳健性。重点是具有线性结构方程模型(SEM)的因果系统。SEM 和时变的干预前后统计模型都是未知的。采用累积遗憾作为设计标准,其目的是设计一系列干预措施,使其对了解整个因果模型及其波动的甲骨文产生的累积遗憾最小。首先,我们发现现有的方法即使在模型出现少量偏差的情况下也无法保持遗憾的亚线性。具体来说,当模型偏差实例的数量少至 $T^{frac {1}{2L}}$ 时,其中 $T$ 是时间跨度,$L$ 是图中最长因果路径的长度,现有算法将在 $T$ 中具有线性遗憾。例如,当 $T=10^{5}$ 和 $L=3$ 时,105 个实例中有 6 个的模型偏差会导致线性遗憾。接下来,我们设计了一种稳健的 CB 算法,并对其遗憾值进行了分析,确定了遗憾值的上限和信息论下限。具体来说,在一个节点数为 $N$、最大度数为 $d$ 的图中,在模型偏差的一般度量 $C$ 、累积遗憾值的上限为 $tilde {mathcal {O}}left({d^{L-{}frac {1}{2}}(sqrt {NT} + NC)}right)$ ,下限为 $Omega left({d^{frac {L}{2}-2}max {sqrt {T};, d^{2}C}right)$ 。比较这些界限可以确定,所提出的算法几乎达到了最优的 $tilde{mathcal {O}} 。(sqrt {T})$ 当 $C$ 为 $o(sqrt {T})$ 时的遗憾值,并在更宽的 $C$ 范围内保持亚线性遗憾值。
{"title":"Robust Causal Bandits for Linear Models","authors":"Zirui Yan;Arpan Mukherjee;Burak Varıcı;Ali Tajer","doi":"10.1109/JSAIT.2024.3373595","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3373595","url":null,"abstract":"The sequential design of experiments for optimizing a reward function in causal systems can be effectively modeled by the sequential design of interventions in causal bandits (CBs). In the existing literature on CBs, a critical assumption is that the causal models remain constant over time. However, this assumption does not necessarily hold in complex systems, which constantly undergo temporal model fluctuations. This paper addresses the robustness of CBs to such model fluctuations. The focus is on causal systems with linear structural equation models (SEMs). The SEMs and the time-varying pre- and post-interventional statistical models are all unknown. Cumulative regret is adopted as the design criteria, based on which the objective is to design a sequence of interventions that incur the smallest cumulative regret with respect to an oracle aware of the entire causal model and its fluctuations. First, it is established that the existing approaches fail to maintain regret sub-linearity with even a few instances of model deviation. Specifically, when the number of instances with model deviation is as few as \u0000<inline-formula> <tex-math>$T^{frac {1}{2L}}$ </tex-math></inline-formula>\u0000, where \u0000<inline-formula> <tex-math>$T$ </tex-math></inline-formula>\u0000 is the time horizon and \u0000<inline-formula> <tex-math>$L$ </tex-math></inline-formula>\u0000 is the length of the longest causal path in the graph, the existing algorithms will have linear regret in \u0000<inline-formula> <tex-math>$T$ </tex-math></inline-formula>\u0000. For instance, when \u0000<inline-formula> <tex-math>$T=10^{5}$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$L=3$ </tex-math></inline-formula>\u0000, model deviations in 6 out of 105 instances result in a linear regret. Next, a robust CB algorithm is designed, and its regret is analyzed, where upper and information-theoretic lower bounds on the regret are established. Specifically, in a graph with \u0000<inline-formula> <tex-math>$N$ </tex-math></inline-formula>\u0000 nodes and maximum degree \u0000<inline-formula> <tex-math>$d$ </tex-math></inline-formula>\u0000, under a general measure of model deviation \u0000<inline-formula> <tex-math>$C$ </tex-math></inline-formula>\u0000, the cumulative regret is upper bounded by \u0000<inline-formula> <tex-math>$tilde {mathcal {O}}left({d^{L-{}frac {1}{2}}(sqrt {NT} + NC)}right)$ </tex-math></inline-formula>\u0000 and lower bounded by \u0000<inline-formula> <tex-math>$Omega left({d^{frac {L}{2}-2}max {sqrt {T};, ; d^{2}C}}right)$ </tex-math></inline-formula>\u0000. Comparing these bounds establishes that the proposed algorithm achieves nearly optimal \u0000<inline-formula> <tex-math>$tilde{mathcal {O}} (sqrt {T})$ </tex-math></inline-formula>\u0000 regret when \u0000<inline-formula> <tex-math>$C$ </tex-math></inline-formula>\u0000 is \u0000<inline-formula> <tex-math>$o(sqrt {T})$ </tex-math></inline-formula>\u0000 and maintains sub-linear regret for a broader range of \u0000<inline-formula> <tex-math>$C$ </tex-math></inline-formula>\u0000.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"78-93"},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140605970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Sketch-and-Solve for Community Detection via Semidefinite Programming 通过半有限编程进行社群检测的差分私有化草图求解法
Pub Date : 2024-03-06 DOI: 10.1109/JSAIT.2024.3396400
Mohamed Seif;Yanxi Chen;Andrea J. Goldsmith;H. Vincent Poor
We study the community detection problem over binary symmetric stochastic block models (SBMs) while preserving the privacy of the individual connections between the vertices. We present and analyze the associated information-theoretic tradeoff for differentially private exact recovery of the underlying communities by deriving sufficient separation conditions between the intra-community and inter-community connection probabilities while taking into account the privacy budget and graph sketching as a speed-up technique to improve the computational complexity of maximum likelihood (ML) based recovery algorithms.
我们研究了二元对称随机块模型(SBM)上的社群检测问题,同时保留了顶点之间单个连接的隐私性。我们提出并分析了相关的信息理论权衡,通过推导出社群内和社群间连接概率之间的充分分离条件,同时考虑到隐私预算和图草图作为一种加速技术来提高基于最大似然(ML)的恢复算法的计算复杂度,从而实现底层社群的不同隐私精确恢复。
{"title":"Differentially Private Sketch-and-Solve for Community Detection via Semidefinite Programming","authors":"Mohamed Seif;Yanxi Chen;Andrea J. Goldsmith;H. Vincent Poor","doi":"10.1109/JSAIT.2024.3396400","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3396400","url":null,"abstract":"We study the community detection problem over binary symmetric stochastic block models (SBMs) while preserving the privacy of the individual connections between the vertices. We present and analyze the associated information-theoretic tradeoff for differentially private exact recovery of the underlying communities by deriving sufficient separation conditions between the intra-community and inter-community connection probabilities while taking into account the privacy budget and graph sketching as a speed-up technique to improve the computational complexity of maximum likelihood (ML) based recovery algorithms.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"331-346"},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141251112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noisy Computing of the OR and MAX Functions OR 和 MAX 函数的噪声计算
Pub Date : 2024-03-06 DOI: 10.1109/JSAIT.2024.3396787
Banghua Zhu;Ziao Wang;Nadim Ghaddar;Jiantao Jiao;Lele Wang
We consider the problem of computing a function of n variables using noisy queries, where each query is incorrect with some fixed and known probability $p in (0,1/2)$ . Specifically, we consider the computation of the $textsf {OR}$ function of n bits (where queries correspond to noisy readings of the bits) and the $textsf {MAX}$ function of n real numbers (where queries correspond to noisy pairwise comparisons). We show that an expected number of queries of $(1 pm o(1)) {}frac {nlog {}frac {1}{delta }}{D_{textsf {KL}}(p | 1-p)}$ is both sufficient and necessary to compute both functions with a vanishing error probability $delta = o(1)$ , where $D_{textsf {KL}}(p | 1-p)$ denotes the Kullback-Leibler divergence between $textsf {Bern}(p)$ and $textsf {Bern}(1-p)$ distributions. Compared to previous work, our results tighten the dependence on p in both the upper and lower bounds for the two functions.
我们考虑的问题是使用噪声查询计算 n 个变量的函数,其中每个查询都是不正确的,其概率是固定且已知的 $p in (0,1/2)$。具体来说,我们考虑计算 n 个比特的 $textsf {OR}$ 函数(其中查询对应于比特的噪声读数)和 n 个实数的 $textsf {MAX}$ 函数(其中查询对应于噪声成对比较)。我们证明,$(1 pm o(1)) {}frac {nlog {}frac {1}{delta }}{D_{textsf {KL}}(p | 1-p)}$ 的预期查询次数对于以消失的错误概率 $delta = o(1)$ 计算这两个函数来说既充分又必要、其中,$D_{textsf {KL}}(p | 1-p)$ 表示 $textsf {Bern}(p)$ 和 $textsf {Bern}(1-p)$ 分布之间的库尔贝-莱布勒发散。与之前的工作相比,我们的结果在两个函数的上界和下界中都加强了对 p 的依赖。
{"title":"Noisy Computing of the OR and MAX Functions","authors":"Banghua Zhu;Ziao Wang;Nadim Ghaddar;Jiantao Jiao;Lele Wang","doi":"10.1109/JSAIT.2024.3396787","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3396787","url":null,"abstract":"We consider the problem of computing a function of n variables using noisy queries, where each query is incorrect with some fixed and known probability \u0000<inline-formula> <tex-math>$p in (0,1/2)$ </tex-math></inline-formula>\u0000. Specifically, we consider the computation of the \u0000<inline-formula> <tex-math>$textsf {OR}$ </tex-math></inline-formula>\u0000 function of n bits (where queries correspond to noisy readings of the bits) and the \u0000<inline-formula> <tex-math>$textsf {MAX}$ </tex-math></inline-formula>\u0000 function of n real numbers (where queries correspond to noisy pairwise comparisons). We show that an expected number of queries of \u0000<inline-formula> <tex-math>$(1 pm o(1)) {}frac {nlog {}frac {1}{delta }}{D_{textsf {KL}}(p | 1-p)}$ </tex-math></inline-formula>\u0000 is both sufficient and necessary to compute both functions with a vanishing error probability \u0000<inline-formula> <tex-math>$delta = o(1)$ </tex-math></inline-formula>\u0000, where \u0000<inline-formula> <tex-math>$D_{textsf {KL}}(p | 1-p)$ </tex-math></inline-formula>\u0000 denotes the Kullback-Leibler divergence between \u0000<inline-formula> <tex-math>$textsf {Bern}(p)$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$textsf {Bern}(1-p)$ </tex-math></inline-formula>\u0000 distributions. Compared to previous work, our results tighten the dependence on p in both the upper and lower bounds for the two functions.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"302-313"},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141084767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Sparse Mixtures With Differential Privacy 利用差异隐私检测稀疏混合物
Pub Date : 2024-03-06 DOI: 10.1109/JSAIT.2024.3396079
Ruizhi Zhang
Detection of sparse signals arises in many modern applications such as signal processing, bioinformatics, finance, and disease surveillance. However, in many of these applications, the data may contain sensitive personal information, which is desirable to be protected during the data analysis. In this article, we consider the problem of $(epsilon,delta)$ -differentially private detection of a general sparse mixture with a focus on how privacy affects the detection power. By investigating the nonasymptotic upper bound for the summation of error probabilities, we find any $(epsilon,delta)$ -differentially private test cannot detect the sparse signal if the privacy constraint is too strong or if the model parameters are in the undetectable region (Cai and Wu, 2014). Moreover, we study the private clamped log-likelihood ratio test proposed by Canonne et al., 2019 and show it achieves vanishing error probabilities in some conditions on the model parameters and privacy parameters. Then, for the case when the null distribution is a standard normal distribution, we propose an adaptive $(epsilon,delta)$ -differentially private test, which achieves vanishing error probabilities in the same detectable region (Cai and Wu, 2014) when the privacy parameters satisfy certain sufficient conditions. Several numerical experiments are conducted to verify our theoretical results and illustrate the performance of our proposed test.
稀疏信号的检测在信号处理、生物信息学、金融和疾病监测等许多现代应用中都会出现。然而,在许多此类应用中,数据可能包含敏感的个人信息,这就需要在数据分析过程中加以保护。在本文中,我们考虑了一般稀疏混合物的$(epsilon,delta)$差异隐私检测问题,重点关注隐私如何影响检测能力。通过研究误差概率求和的非渐近上界,我们发现如果隐私约束太强或模型参数处于不可检测区域,任何$(epsilon,delta)$-差异隐私检测都无法检测到稀疏信号(Cai and Wu,2014)。此外,我们还研究了 Canonne 等人 2019 年提出的私有钳位对数似然比检验,结果表明它在模型参数和隐私参数的某些条件下实现了虚化误差概率。然后,对于空分布是标准正态分布的情况,我们提出了一种自适应的$(epsilon,delta)$-差异私有检验,当隐私参数满足某些充分条件时,它在相同的可检测区域内实现了消失的误差概率(Cai and Wu, 2014)。我们进行了一些数值实验来验证我们的理论结果,并说明我们提出的测试的性能。
{"title":"Detection of Sparse Mixtures With Differential Privacy","authors":"Ruizhi Zhang","doi":"10.1109/JSAIT.2024.3396079","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3396079","url":null,"abstract":"Detection of sparse signals arises in many modern applications such as signal processing, bioinformatics, finance, and disease surveillance. However, in many of these applications, the data may contain sensitive personal information, which is desirable to be protected during the data analysis. In this article, we consider the problem of \u0000<inline-formula> <tex-math>$(epsilon,delta)$ </tex-math></inline-formula>\u0000-differentially private detection of a general sparse mixture with a focus on how privacy affects the detection power. By investigating the nonasymptotic upper bound for the summation of error probabilities, we find any \u0000<inline-formula> <tex-math>$(epsilon,delta)$ </tex-math></inline-formula>\u0000-differentially private test cannot detect the sparse signal if the privacy constraint is too strong or if the model parameters are in the undetectable region (Cai and Wu, 2014). Moreover, we study the private clamped log-likelihood ratio test proposed by Canonne et al., 2019 and show it achieves vanishing error probabilities in some conditions on the model parameters and privacy parameters. Then, for the case when the null distribution is a standard normal distribution, we propose an adaptive \u0000<inline-formula> <tex-math>$(epsilon,delta)$ </tex-math></inline-formula>\u0000-differentially private test, which achieves vanishing error probabilities in the same detectable region (Cai and Wu, 2014) when the privacy parameters satisfy certain sufficient conditions. Several numerical experiments are conducted to verify our theoretical results and illustrate the performance of our proposed test.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"347-356"},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow-Based Distributionally Robust Optimization 基于流量的分布式鲁棒优化
Pub Date : 2024-02-27 DOI: 10.1109/JSAIT.2024.3370699
Chen Xu;Jonghyeok Lee;Xiuyuan Cheng;Yao Xie
We present a computationally efficient framework, called FlowDRO, for solving flow-based distributionally robust optimization (DRO) problems with Wasserstein uncertainty sets while aiming to find continuous worst-case distribution (also called the Least Favorable Distribution, LFD) and sample from it. The requirement for LFD to be continuous is so that the algorithm can be scalable to problems with larger sample sizes and achieve better generalization capability for the induced robust algorithms. To tackle the computationally challenging infinitely dimensional optimization problem, we leverage flow-based models and continuous-time invertible transport maps between the data distribution and the target distribution and develop a Wasserstein proximal gradient flow type algorithm. In theory, we establish the equivalence of the solution by optimal transport map to the original formulation, as well as the dual form of the problem through Wasserstein calculus and Brenier theorem. In practice, we parameterize the transport maps by a sequence of neural networks progressively trained in blocks by gradient descent. We demonstrate its usage in adversarial learning, distributionally robust hypothesis testing, and a new mechanism for data-driven distribution perturbation differential privacy, where the proposed method gives strong empirical performance on high-dimensional real data.
我们提出了一种计算高效的框架,称为 FlowDRO,用于解决具有 Wasserstein 不确定性集的基于流量的分布鲁棒优化(DRO)问题,同时旨在找到连续的最坏情况分布(也称为最小有利分布,LFD)并从中采样。LFD 必须是连续的,这样算法才能扩展到样本量更大的问题,并为诱导鲁棒算法实现更好的泛化能力。为了解决在计算上具有挑战性的无限维优化问题,我们利用基于流的模型和数据分布与目标分布之间的连续时间可逆传输映射,开发了一种 Wasserstein 近似梯度流类型算法。在理论上,我们建立了最优传输映射解与原始公式的等价性,并通过瓦瑟斯坦微积分和布雷尼尔定理建立了问题的对偶形式。在实践中,我们通过梯度下降法对神经网络序列进行分块渐进式训练,从而确定传输图的参数。我们展示了该方法在对抗学习、分布稳健假设检验以及数据驱动分布扰动差分隐私新机制中的应用,所提出的方法在高维真实数据上具有很强的经验性能。
{"title":"Flow-Based Distributionally Robust Optimization","authors":"Chen Xu;Jonghyeok Lee;Xiuyuan Cheng;Yao Xie","doi":"10.1109/JSAIT.2024.3370699","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3370699","url":null,"abstract":"We present a computationally efficient framework, called \u0000<monospace>FlowDRO</monospace>\u0000, for solving flow-based distributionally robust optimization (DRO) problems with Wasserstein uncertainty sets while aiming to find continuous worst-case distribution (also called the Least Favorable Distribution, LFD) and sample from it. The requirement for LFD to be continuous is so that the algorithm can be scalable to problems with larger sample sizes and achieve better generalization capability for the induced robust algorithms. To tackle the computationally challenging infinitely dimensional optimization problem, we leverage flow-based models and continuous-time invertible transport maps between the data distribution and the target distribution and develop a Wasserstein proximal gradient flow type algorithm. In theory, we establish the equivalence of the solution by optimal transport map to the original formulation, as well as the dual form of the problem through Wasserstein calculus and Brenier theorem. In practice, we parameterize the transport maps by a sequence of neural networks progressively trained in blocks by gradient descent. We demonstrate its usage in adversarial learning, distributionally robust hypothesis testing, and a new mechanism for data-driven distribution perturbation differential privacy, where the proposed method gives strong empirical performance on high-dimensional real data.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"62-77"},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140297078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forking Uncertainties: Reliable Prediction and Model Predictive Control With Sequence Models via Conformal Risk Control 分叉不确定性:通过共形风险控制利用序列模型进行可靠预测和模型预测控制
Pub Date : 2024-02-26 DOI: 10.1109/JSAIT.2024.3368229
Matteo Zecchin;Sangwoo Park;Osvaldo Simeone
In many real-world problems, predictions are leveraged to monitor and control cyber-physical systems, demanding guarantees on the satisfaction of reliability and safety requirements. However, predictions are inherently uncertain, and managing prediction uncertainty presents significant challenges in environments characterized by complex dynamics and forking trajectories. In this work, we assume access to a pre-designed probabilistic implicit or explicit sequence model, which may have been obtained using model-based or model-free methods. We introduce probabilistic time series-conformal risk prediction (PTS-CRC), a novel post-hoc calibration procedure that operates on the predictions produced by any pre-designed probabilistic forecaster to yield reliable error bars. In contrast to existing art, PTS-CRC produces predictive sets based on an ensemble of multiple prototype trajectories sampled from the sequence model, supporting the efficient representation of forking uncertainties. Furthermore, unlike the state of the art, PTS-CRC can satisfy reliability definitions beyond coverage. This property is leveraged to devise a novel model predictive control (MPC) framework that addresses open-loop and closed-loop control problems under general average constraints on the quality or safety of the control policy. We experimentally validate the performance of PTS-CRC prediction and control by studying a number of use cases in the context of wireless networking. Across all the considered tasks, PTS-CRC predictors are shown to provide more informative predictive sets, as well as safe control policies with larger returns.
在现实世界的许多问题中,预测被用来监测和控制网络物理系统,要求保证满足可靠性和安全性要求。然而,预测本身具有不确定性,在以复杂动态和分叉轨迹为特征的环境中,管理预测的不确定性会带来巨大挑战。在这项工作中,我们假设可以访问预先设计的隐式或显式概率序列模型,该模型可能是通过基于模型或无模型方法获得的。我们引入了概率时间序列-共形风险预测(PTS-CRC),这是一种新颖的事后校准程序,可对任何预先设计的概率预测器生成的预测结果进行操作,以产生可靠的误差条。与现有技术不同的是,PTS-CRC 基于从序列模型中采样的多个原型轨迹的集合生成预测集,支持对分叉不确定性的有效表示。此外,与现有技术不同的是,PTS-CRC 可以满足超出覆盖范围的可靠性定义。利用这一特性,我们设计了一个新颖的模型预测控制(MPC)框架,在控制策略的质量或安全性的一般平均约束条件下解决开环和闭环控制问题。我们通过研究无线网络背景下的一些使用案例,在实验中验证了 PTS-CRC 预测和控制的性能。在所有考虑的任务中,PTS-CRC 预测器都能提供信息量更大的预测集,以及回报率更高的安全控制策略。
{"title":"Forking Uncertainties: Reliable Prediction and Model Predictive Control With Sequence Models via Conformal Risk Control","authors":"Matteo Zecchin;Sangwoo Park;Osvaldo Simeone","doi":"10.1109/JSAIT.2024.3368229","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3368229","url":null,"abstract":"In many real-world problems, predictions are leveraged to monitor and control cyber-physical systems, demanding guarantees on the satisfaction of reliability and safety requirements. However, predictions are inherently uncertain, and managing prediction uncertainty presents significant challenges in environments characterized by complex dynamics and forking trajectories. In this work, we assume access to a pre-designed probabilistic implicit or explicit sequence model, which may have been obtained using model-based or model-free methods. We introduce probabilistic time series-conformal risk prediction (PTS-CRC), a novel post-hoc calibration procedure that operates on the predictions produced by any pre-designed probabilistic forecaster to yield reliable error bars. In contrast to existing art, PTS-CRC produces predictive sets based on an ensemble of multiple prototype trajectories sampled from the sequence model, supporting the efficient representation of forking uncertainties. Furthermore, unlike the state of the art, PTS-CRC can satisfy reliability definitions beyond coverage. This property is leveraged to devise a novel model predictive control (MPC) framework that addresses open-loop and closed-loop control problems under general average constraints on the quality or safety of the control policy. We experimentally validate the performance of PTS-CRC prediction and control by studying a number of use cases in the context of wireless networking. Across all the considered tasks, PTS-CRC predictors are shown to provide more informative predictive sets, as well as safe control policies with larger returns.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"44-61"},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140297113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continual Mean Estimation Under User-Level Privacy 用户级隐私下的连续平均值估计
Pub Date : 2024-02-22 DOI: 10.1109/JSAIT.2024.3366086
Anand Jerry George;Lekshmi Ramesh;Aditya Vikram Singh;Himanshu Tyagi
We consider the problem of continually releasing an estimate of the population mean of a stream of samples that is user-level differentially private (DP). At each time instant, a user contributes a sample, and the users can arrive in arbitrary order. Until now these requirements of continual release and user-level privacy were considered in isolation. But, in practice, both these requirements come together as the users often contribute data repeatedly and multiple queries are made. We provide an algorithm that outputs a mean estimate at every time instant t such that the overall release is user-level $varepsilon $ -DP and has the following error guarantee: Denoting by $m_{t}$ the maximum number of samples contributed by a user, as long as $tilde {Omega }(1/varepsilon)$ users have $m_{t}/2$ samples each, the error at time t is $tilde {O}(1/sqrt {t}+sqrt {m}_{t}/tvarepsilon)$ . This is a universal error guarantee which is valid for all arrival patterns of the users. Furthermore, it (almost) matches the existing lower bounds for the single-release setting at all time instants when users have contributed equal number of samples.
我们考虑的问题是,如何持续发布用户级差异保密(DP)样本流的总体均值估计值。在每个时间瞬间,用户都会贡献一个样本,而且用户可以以任意顺序到达。到目前为止,人们一直在孤立地考虑持续发布和用户级隐私的要求。但在实践中,由于用户经常重复提供数据并进行多次查询,这两个要求会同时出现。我们提供了一种算法,它能在每个时间瞬间 t 输出一个平均估计值,从而使整体发布达到用户级 $varepsilon $ -DP,并具有以下误差保证:用 $m_{t}$ 表示用户贡献的最大样本数,只要 $tilde {Omega }(1/varepsilon)$ 用户每人有 $m_{t}/2$ 样本,时间 t 的误差就是 $tilde {O}(1/sqrt {t}+sqrt {m}_{t}/tvarepsilon)$ 。这是一个通用误差保证,对所有用户的到达模式都有效。此外,当用户贡献的样本数量相等时,它(几乎)与现有的单次发布设置在所有时间时刻的下限相匹配。
{"title":"Continual Mean Estimation Under User-Level Privacy","authors":"Anand Jerry George;Lekshmi Ramesh;Aditya Vikram Singh;Himanshu Tyagi","doi":"10.1109/JSAIT.2024.3366086","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3366086","url":null,"abstract":"We consider the problem of continually releasing an estimate of the population mean of a stream of samples that is user-level differentially private (DP). At each time instant, a user contributes a sample, and the users can arrive in arbitrary order. Until now these requirements of continual release and user-level privacy were considered in isolation. But, in practice, both these requirements come together as the users often contribute data repeatedly and multiple queries are made. We provide an algorithm that outputs a mean estimate at every time instant t such that the overall release is user-level \u0000<inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula>\u0000-DP and has the following error guarantee: Denoting by \u0000<inline-formula> <tex-math>$m_{t}$ </tex-math></inline-formula>\u0000 the maximum number of samples contributed by a user, as long as \u0000<inline-formula> <tex-math>$tilde {Omega }(1/varepsilon)$ </tex-math></inline-formula>\u0000 users have \u0000<inline-formula> <tex-math>$m_{t}/2$ </tex-math></inline-formula>\u0000 samples each, the error at time t is \u0000<inline-formula> <tex-math>$tilde {O}(1/sqrt {t}+sqrt {m}_{t}/tvarepsilon)$ </tex-math></inline-formula>\u0000. This is a universal error guarantee which is valid for all arrival patterns of the users. Furthermore, it (almost) matches the existing lower bounds for the single-release setting at all time instants when users have contributed equal number of samples.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"28-43"},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140297133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Message Shuffled Privacy in Federated Learning 联盟学习中的多信息洗牌隐私保护
Pub Date : 2024-02-15 DOI: 10.1109/JSAIT.2024.3366225
Antonious M. Girgis;Suhas Diggavi
We study the distributed mean estimation (DME) problem under privacy and communication constraints in the local differential privacy (LDP) and multi-message shuffled (MMS) privacy frameworks. The DME has wide applications in both federated learning and analytics. We propose a communication-efficient and differentially private algorithm for DME of bounded $ell _{2}$ -norm and $ell _{infty }$ -norm vectors. We analyze our proposed DME schemes showing that our algorithms have order-optimal privacy-communication-performance trade-offs. Our algorithms are designed by giving unequal privacy assignments at different resolutions of the vector (through binary expansion) and appropriately combining it with coordinate sampling. These results are directly applied to give guarantees on private federated learning algorithms. We also numerically evaluate the performance of our private DME algorithms.
我们在局部差分隐私(LDP)和多信息洗牌(MMS)隐私框架中研究了隐私和通信约束下的分布式均值估计(DME)问题。分布式均值估计在联合学习和分析中都有广泛的应用。我们为有界$ell _{2}$ -norm和$ell _{infty }$ -norm向量的DME提出了一种通信效率高、差异隐私的算法。我们对提出的 DME 方案进行了分析,结果表明我们的算法具有阶次最优的隐私-通信-性能权衡。我们的算法是通过在向量的不同分辨率下给出不平等的隐私分配(通过二进制扩展),并与坐标采样适当结合而设计的。这些结果可直接用于为私有联合学习算法提供保证。我们还对私有 DME 算法的性能进行了数值评估。
{"title":"Multi-Message Shuffled Privacy in Federated Learning","authors":"Antonious M. Girgis;Suhas Diggavi","doi":"10.1109/JSAIT.2024.3366225","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3366225","url":null,"abstract":"We study the distributed mean estimation (DME) problem under privacy and communication constraints in the local differential privacy (LDP) and multi-message shuffled (MMS) privacy frameworks. The DME has wide applications in both federated learning and analytics. We propose a communication-efficient and differentially private algorithm for DME of bounded \u0000<inline-formula> <tex-math>$ell _{2}$ </tex-math></inline-formula>\u0000-norm and \u0000<inline-formula> <tex-math>$ell _{infty }$ </tex-math></inline-formula>\u0000-norm vectors. We analyze our proposed DME schemes showing that our algorithms have order-optimal privacy-communication-performance trade-offs. Our algorithms are designed by giving unequal privacy assignments at different resolutions of the vector (through binary expansion) and appropriately combining it with coordinate sampling. These results are directly applied to give guarantees on private federated learning algorithms. We also numerically evaluate the performance of our private DME algorithms.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"12-27"},"PeriodicalIF":0.0,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140052943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quickest Change Detection With Controlled Sensing 通过受控传感技术实现最快速的变化检测
Pub Date : 2024-02-06 DOI: 10.1109/JSAIT.2024.3362324
Venugopal V. Veeravalli;Georgios Fellouris;George V. Moustakides
In the problem of quickest change detection, a change occurs at some unknown time in the distribution of a sequence of random vectors that are monitored in real time, and the goal is to detect this change as quickly as possible subject to a certain false alarm constraint. In this work we consider this problem in the presence of parametric uncertainty in the post-change regime and controlled sensing. That is, the post-change distribution contains an unknown parameter, and the distribution of each observation, before and after the change, is affected by a control action. In this context, in addition to a stopping rule that determines the time at which it is declared that the change has occurred, one also needs to determine a sequential control policy, which chooses the control action at each time based on the already collected observations. We formulate this problem mathematically using Lorden’s minimax criterion, and assuming that there are finitely many possible actions and post-change parameter values. We then propose a specific procedure for this problem that employs an adaptive CuSum statistic in which (i) the estimate of the parameter is based on a fixed number of the more recent observations, and (ii) each action is selected to maximize the Kullback-Leibler divergence of the next observation based on the current parameter estimate, apart from a small number of exploration times. We show that this procedure, which we call the Windowed Chernoff-CuSum (WCC), is first-order asymptotically optimal under Lorden’s minimax criterion, for every possible value of the unknown post-change parameter, as the mean time to false alarm goes to infinity. We also provide simulation results to illustrate the performance of the WCC procedure.
在最快变化检测问题中,实时监测的随机向量序列的分布在某个未知时间发生了变化,目标是在一定的误报约束条件下尽快检测到这一变化。在这项工作中,我们考虑的是在变化后机制和受控传感中存在参数不确定性的情况下的这一问题。也就是说,变化后的分布包含一个未知参数,而变化前后每次观测的分布都会受到控制行动的影响。在这种情况下,除了决定何时宣布发生变化的停止规则外,还需要确定顺序控制策略,根据已收集到的观测数据选择每次的控制行动。我们使用 Lorden 的最小准则,并假设存在有限多个可能的行动和变化后的参数值,对这一问题进行了数学表述。然后,我们针对这个问题提出了一个具体的程序,该程序采用自适应 CuSum 统计法,其中 (i) 参数估计基于固定数量的较新观测值,(ii) 除了少量探索次数外,每次行动的选择都是为了最大化基于当前参数估计的下一个观测值的库尔贝-莱布勒发散。我们将这一程序称为 Windowed Chernoff-CuSum (WCC),它在 Lorden 的 minimax 准则下,对于未知变化后参数的每一个可能值,都是一阶渐近最优的,因为误报的平均时间会达到无穷大。我们还提供了模拟结果,以说明 WCC 程序的性能。
{"title":"Quickest Change Detection With Controlled Sensing","authors":"Venugopal V. Veeravalli;Georgios Fellouris;George V. Moustakides","doi":"10.1109/JSAIT.2024.3362324","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3362324","url":null,"abstract":"In the problem of quickest change detection, a change occurs at some unknown time in the distribution of a sequence of random vectors that are monitored in real time, and the goal is to detect this change as quickly as possible subject to a certain false alarm constraint. In this work we consider this problem in the presence of parametric uncertainty in the post-change regime and controlled sensing. That is, the post-change distribution contains an unknown parameter, and the distribution of each observation, before and after the change, is affected by a control action. In this context, in addition to a stopping rule that determines the time at which it is declared that the change has occurred, one also needs to determine a sequential control policy, which chooses the control action at each time based on the already collected observations. We formulate this problem mathematically using Lorden’s minimax criterion, and assuming that there are finitely many possible actions and post-change parameter values. We then propose a specific procedure for this problem that employs an adaptive CuSum statistic in which (i) the estimate of the parameter is based on a fixed number of the more recent observations, and (ii) each action is selected to maximize the Kullback-Leibler divergence of the next observation based on the current parameter estimate, apart from a small number of exploration times. We show that this procedure, which we call the Windowed Chernoff-CuSum (WCC), is first-order asymptotically optimal under Lorden’s minimax criterion, for every possible value of the unknown post-change parameter, as the mean time to false alarm goes to infinity. We also provide simulation results to illustrate the performance of the WCC procedure.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10423411","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140052897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pull or Wait: How to Optimize Query Age of Information 拉动或等待:如何优化查询信息时代
Pub Date : 2023-12-29 DOI: 10.1109/JSAIT.2023.3346308
M. Emrullah Ildiz;Orhan T. Yavascan;Elif Uysal;O. Tugberk Kartal
We study a pull-based status update communication model where a source node submits update packets to a channel with random transmission delay, at times requested by a remote destination node. The objective is to minimize the average query-age-of-information (QAoI), defined as the average age-of-information (AoI) measured at query instants that occur at the destination side according to a stochastic arrival process. In reference to a push-based problem formulation defined in the literature where the source decides to update or wait at will, with the objective of minimizing the time average AoI at the destination, we name this problem the Pull-or-Wait (PoW) problem. We identify the PoW problem in the case of a single query as a stochastic shortest path (SSP) problem with uncountable state and action spaces, which has not been solved in previous literature. We derive an optimal solution for this SSP problem and use it as a building block for the solution of the PoW problem under periodic query arrivals.
我们研究了一种基于拉动的状态更新通信模型,源节点在远程目的节点要求的时间向具有随机传输延迟的信道提交更新数据包。目标是最小化平均查询信息年龄 (QAoI),QAoI 定义为根据随机到达过程在目的端发生的查询时刻测量的平均信息年龄 (AoI)。参照文献中定义的基于推送的问题表述,即信源决定随意更新或等待,目标是最小化目的地的时间平均 AoI,我们将此问题命名为 "拉动或等待(Pull-or-Wait,PoW)"问题。我们将单个查询情况下的 PoW 问题确定为一个随机最短路径(SSP)问题,其状态和行动空间都是不可数的。我们推导出了该 SSP 问题的最优解,并将其作为解决周期性查询到达情况下 PoW 问题的基石。
{"title":"Pull or Wait: How to Optimize Query Age of Information","authors":"M. Emrullah Ildiz;Orhan T. Yavascan;Elif Uysal;O. Tugberk Kartal","doi":"10.1109/JSAIT.2023.3346308","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3346308","url":null,"abstract":"We study a pull-based status update communication model where a source node submits update packets to a channel with random transmission delay, at times requested by a remote destination node. The objective is to minimize the average query-age-of-information (QAoI), defined as the average age-of-information (AoI) measured at query instants that occur at the destination side according to a stochastic arrival process. In reference to a push-based problem formulation defined in the literature where the source decides to update or wait at will, with the objective of minimizing the time average AoI at the destination, we name this problem the Pull-or-Wait (PoW) problem. We identify the PoW problem in the case of a single query as a stochastic shortest path (SSP) problem with uncountable state and action spaces, which has not been solved in previous literature. We derive an optimal solution for this SSP problem and use it as a building block for the solution of the PoW problem under periodic query arrivals.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"794-807"},"PeriodicalIF":0.0,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139572589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE journal on selected areas in information theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1