We gratefully acknowledge support from
the Simons Foundation and member institutions.

Information Theory

New submissions

[ total of 23 entries: 1-23 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Thu, 13 Aug 20

[1]  arXiv:2008.05031 [pdf, other]
Title: Covert Transmission Assisted by Intelligent Reflecting Surface
Subjects: Information Theory (cs.IT)

Covert transmission is studied for an intelligent reflecting surface (IRS) aided communication system, where Alice aims to transmit messages to Bob without being detected by the warden Willie. Specifically, an IRS is used to increase the data rate at Bob under a covert constraint. For the considered model, when Alice is equipped with a single antenna, the transmission power at Alice and phase shifts at the IRS are jointly optimized to maximize the covert transmission rate with either instantaneous or partial channel state information (CSI) of Willie's link. In addition, when multiple antennas are deployed at Alice, we formulate a joint transmit beamforming and IRS phase shift optimization problem to maximize the covert transmission rate. One optimal algorithm and two low-complexity suboptimal algorithms are proposed to solve the problem. Furthermore, for the case of imperfect CSI of Willie's link, the optimization problem is reformulated by using the triangle and the Cauchy-Schwarz inequalities. The reformulated optimization problems are solved using an alterative algorithm, semidefinite relaxation (SDR) and Gaussian randomization techniques. Finally, simulations are performed to verify our analysis. The simulation results show that an IRS can degrade the covert transmission rate when Willie is closer to the IRS than Bob.

[2]  arXiv:2008.05067 [pdf, ps, other]
Title: Enhanced Secrecy Rate Maximization for Directional Modulation Networks via IRS
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

Intelligent reflecting surface (IRS) is of low-cost and energy-efficiency and will be a promising technology for the future wireless communications like sixth generation. To address the problem of conventional directional modulation (DM) that Alice only transmits single confidential bit stream (CBS) to Bob with multiple antennas in a line-of-sight channel, IRS is proposed to create friendly multipaths for DM such that two CBSs can be transmitted from Alice to Bob. This will significantly enhance the secrecy rate (SR) of DM. To maximize the SR (Max-SR), a general non-convex optimization problem is formulated with the unit-modulus constraint of IRS phase-shift matrix (PSM), and the general alternating iterative (GAI) algorithm is proposed to jointly obtain the transmit beamforming vectors (TBVs) and PSM by alternately optimizing one and fixing another. To reduce its high complexity, a low-complexity iterative algorithm for Max-SR is proposed by placing the constraint of null-space (NS) on the TBVs, called NS projection (NSP). Here, each CBS is transmitted separately in the NSs of other CBS and AN channels. Simulation results show that the SRs of the proposed GAI and NSP can approximately double that of IRS-based DM with single CBS for massive IRS in the high signal-to-noise ratio region.

[3]  arXiv:2008.05071 [pdf, ps, other]
Title: Signal-Dependent Performance Analysis of Orthogonal Matching Pursuit for Exact Sparse Recovery
Comments: 16 pages, 12 figures. To appear in IEEE Transactions on Signal Processing
Subjects: Information Theory (cs.IT)

Exact recovery of $K$-sparse signals $x \in \mathbb{R}^{n}$ from linear measurements $y=Ax$, where $A\in \mathbb{R}^{m\times n}$ is a sensing matrix, arises from many applications. The orthogonal matching pursuit (OMP) algorithm is widely used for reconstructing $x$. A fundamental question in the performance analysis of OMP is the characterizations of the probability of exact recovery of $x$ for random matrix $A$ and the minimal $m$ to guarantee a target recovery performance. In many practical applications, in addition to sparsity, $x$ also has some additional properties. This paper shows that these properties can be used to refine the answer to the above question. In this paper, we first show that the prior information of the nonzero entries of $x$ can be used to provide an upper bound on $\|x\|_1^2/\|x\|_2^2$. Then, we use this upper bound to develop a lower bound on the probability of exact recovery of $x$ using OMP in $K$ iterations. Furthermore, we develop a lower bound on the number of measurements $m$ to guarantee that the exact recovery probability using $K$ iterations of OMP is no smaller than a given target probability. Finally, we show that when $K=O(\sqrt{\ln n})$, as both $n$ and $K$ go to infinity, for any $0<\zeta\leq 1/\sqrt{\pi}$, $m=2K\ln (n/\zeta)$ measurements are sufficient to ensure that the probability of exact recovering any $K$-sparse $x$ is no lower than $1-\zeta$ with $K$ iterations of OMP. For $K$-sparse $\alpha$-strongly decaying signals and for $K$-sparse $x$ whose nonzero entries independently and identically follow the Gaussian distribution, the number of measurements sufficient for exact recovery with probability no lower than $1-\zeta$ reduces further to $m=(\sqrt{K}+4\sqrt{\frac{\alpha+1}{\alpha-1}\ln(n/\zeta)})^2$ and asymptotically $m\approx 1.9K\ln (n/\zeta)$, respectively.

[4]  arXiv:2008.05092 [pdf, ps, other]
Title: Vectorized Hankel Lift: A Convex Approach for Blind Super-Resolution of Point Sources
Subjects: Information Theory (cs.IT)

We consider the problem of resolving $ r$ point sources from $n$ samples at the low end of the spectrum when point spread functions (PSFs) are not known. Assuming that the spectrum samples of the PSFs lie in low dimensional subspace (let $s$ denote the dimension), this problem can be reformulated as a matrix recovery problem. By exploiting the low rank structure of the vectorized Hankel matrix associated with the target matrix, a convex approach called Vectorized Hankel Lift is proposed in this paper. It is shown that $n\gtrsim rs\log^4 n$ samples are sufficient for Vectorized Hankel Lift to achieve the exact recovery. In addition, a new variant of the MUSIC method available for spectrum estimation in the multiple snapshots scenario arises naturally from the vectorized Hankel lift framework, which is of independent interest.

[5]  arXiv:2008.05141 [pdf, other]
Title: Coded Elastic Computing on Machines with Heterogeneous Storage and Computation Speed
Comments: 30 pages, 4 figures
Subjects: Information Theory (cs.IT); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC)

We study the optimal design of heterogeneous Coded Elastic Computing (CEC) where machines have varying computation speeds and storage. CEC introduced by Yang et al. in 2018 is a framework that mitigates the impact of elastic events, where machines can join and leave at arbitrary times. In CEC, data is distributed among machines using a Maximum Distance Separable (MDS) code such that subsets of machines can perform the desired computations. However, state-of-the-art CEC designs only operate on homogeneous networks where machines have the same speeds and storage. This may not be practical. In this work, based on an MDS storage assignment, we develop a novel computation assignment approach for heterogeneous CEC networks to minimize the overall computation time. We first consider the scenario where machines have heterogeneous computing speeds but same storage and then the scenario where both heterogeneities are present. We propose a novel combinatorial optimization formulation and solve it exactly by decomposing it into a convex optimization problem for finding the optimal computation load and a "filling problem" for finding the exact computation assignment. A low-complexity "filling algorithm" is adapted and can be completed within a number of iterations equals at most the number of available machines.

[6]  arXiv:2008.05317 [pdf, ps, other]
Title: Reconfigurable Intelligent Surfaces Assisted Communications with Discrete Phase Shifts: How Many Quantization Levels are Required to Achieve Full Diversity?
Comments: 5 pages, 2 figures
Subjects: Information Theory (cs.IT)

Due to hardware limitations, the phase shifts of the reflecting elements of reconfigurable intelligent surfaces (RISs) need to be quantized into discrete values. This letter aims to unveil the minimum required number of phase quantization levels $L$ in order to achieve the full diversity order in RIS-assisted wireless communication systems. With the aid of an upper bound of the outage probability, we first prove that the full diversity order is achievable provided that $L$ is not less than three. If $L=2$, on the other hand, we prove that the achievable diversity order cannot exceed $(N+1)/2$, where $N$ is the number of reflecting elements. This is obtained with the aid of a lower bound of the outage probability. Therefore, we prove that the minimum required value of $L$ to achieve the full diversity order is $L=3$. Simulation results verify the theoretical analysis and the impact of phase quantization levels on RIS-assisted communication systems.

[7]  arXiv:2008.05341 [pdf, other]
Title: Near-Optimal Performance Bounds for Orthogonal and Permutation Group Synchronization via Spectral Methods
Authors: Shuyang Ling
Subjects: Information Theory (cs.IT); Machine Learning (stat.ML)

Group synchronization asks to recover group elements from their pairwise measurements. It has found numerous applications across various scientific disciplines. In this work, we focus on orthogonal and permutation group synchronization which are widely used in computer vision such as object matching and Structure from Motion. Among many available approaches, spectral methods have enjoyed great popularity due to its efficiency and convenience. We will study the performance guarantees of spectral methods in solving these two synchronization problems by investigating how well the computed eigenvectors approximate each group element individually. We establish our theory by applying the recent popular~\emph{leave-one-out} technique and derive a~\emph{block-wise} performance bound for the recovery of each group element via eigenvectors. In particular, for orthogonal group synchronization, we obtain a near-optimal performance bound for the group recovery in presence of Gaussian noise. For permutation group synchronization under random corruption, we show that the widely-used two-step procedure (spectral method plus rounding) can recover all the group elements exactly if the SNR (signal-to-noise ratio) is close to the information theoretical limit. Our numerical experiments confirm our theory and indicate a sharp phase transition for the exact group recovery.

Cross-lists for Thu, 13 Aug 20

[8]  arXiv:2006.15751 (cross-list from cs.NI) [pdf, other]
Title: Optimal and Quantized Mechanism Design for Fresh Data Acquisition
Comments: Submitted to IEEE JSAC
Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT)

The proliferation of real-time applications has spurred much interest in data freshness, captured by the {\it age-of-information} (AoI) metric. When strategic data sources have private market information, a fundamental economic challenge is how to incentivize them to acquire fresh data and optimize the age-related performance. In this work, we consider an information update system in which a destination acquires, and pays for, fresh data updates from multiple sources. The destination incurs an age-related cost, modeled as a general increasing function of the AoI. Each source is strategic and incurs a sampling cost, which is its private information and may not be truthfully reported to the destination. The destination decides on the price of updates, when to get them, and who should generate them, based on the sources' reported sampling costs. We show that a benchmark that naively trusts the sources' reports can lead to an arbitrarily bad outcome compared to the case where sources truthfully report. To tackle this issue, we design an optimal (economic) mechanism for timely information acquisition following Myerson's seminal work. To this end, our proposed optimal mechanism minimizes the sum of the destination's age-related cost and its payment to the sources, while ensuring that the sources truthfully report their private information and will voluntarily participate in the mechanism. However, finding the optimal mechanisms may suffer from \textit{prohibitively expensive computational overheads} as it involves solving a nonlinear infinite-dimensional optimization problem. We further propose a quantized version of the optimal mechanism that achieves asymptotic optimality, maintains the other economic properties, and enables one to tradeoff between optimality and computational overheads.

[9]  arXiv:2006.16805 (cross-list from cs.NI) [pdf, other]
Title: Pricing Fresh Data
Comments: Submitted to IEEE JSAC. arXiv admin note: text overlap with arXiv:1904.06899
Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT)

We introduce the concept of {\it fresh data trading}, in which a destination user requests, and pays for, fresh data updates from a source provider, and data freshness is captured by the {\it age of information} (AoI) metric. Keeping data fresh relies on frequent data updates by the source, which motivates the source to {\it price fresh data}. In this work, the destination incurs an age-related cost, modeled as a general increasing function of the AoI. The source designs a pricing mechanism to maximize its profit; the destination chooses a data update schedule to trade off its payments to the source and its age-related cost. Depending on different real-time applications and scenarios, we study both a predictable-deadline and an unpredictable-deadline models. The key challenge of designing the optimal pricing scheme lies in the destination's time-interdependent valuations, due to the nature of AoI and the infinite-dimensional and dynamic optimization. To this end, we consider three pricing schemes that exploit and understand the profitability of three different dimensions in designing pricing: a {\it time-dependent} pricing scheme, in which the price for each update depends on when it is requested; a {\it quantity-based} pricing scheme, in which the price of each update depends on how many updates have been previously requested; a {\it subscription-based} pricing scheme, in which the price for each update is flat-rate but the source charges an additional subscription fee. Our analysis reveals that the optimal subscription-based pricing maximizes the source's profit among all possible pricing schemes under both predictable deadline and unpredictable deadline models; the optimal quantity-based pricing scheme is only optimal with a predictable deadline; the time-dependent pricing scheme, under the unpredictable deadline, is asymptotically optimal under significant time discounting.

[10]  arXiv:2008.04964 (cross-list from quant-ph) [pdf, ps, other]
Title: Multi-User Distillation of Common Randomness and Entanglement from Quantum States
Subjects: Quantum Physics (quant-ph); Information Theory (cs.IT)

We construct new protocols for the tasks of converting noisy multipartite quantum correlations into noiseless classical and quantum ones using local operations and classical communications (LOCC). For the former, known as common randomness (CR) distillation, two new lower bounds on the "distillable common randomness", an operational measure of the total genuine (classical) correlations in a quantum state, are obtained. Our proof relies on a generalization of communication for omniscience (CO) [Csiszar and Narayan, IEEE Trans. Inf. Theory 50:3047-3061, 2004]. Our contribution here is a novel simultaneous decoder for the compression of correlated classical sources by random binning with quantum side information at the decoder. For the latter, we derive two new lower bounds on the rate at which Greenberger-Horne-Zeilinger (GHZ) states can be asymptotically distilled from any given pure state under LOCC. Our approach consists in "making coherent" the proposed CR distillation protocols and recycling of resources [Devetak et al. IEEE Trans. Inf. Theory 54(10):4587-4618, 2008]. The first lower bound is identical to a recent result by Vrana and Christandl [IEEE Trans. Inf. Theory 65(9):5945-5958, 2019], which is based on a combinatorial method to achieve the same rate. Our second lower bound generalises and improves upon this result, and unifies a number of other known lower bounds on GHZ distillation.

[11]  arXiv:2008.05051 (cross-list from quant-ph) [pdf, other]
Title: Short Shor-style syndrome sequences
Comments: 23 pages, 15 figures
Subjects: Quantum Physics (quant-ph); Information Theory (cs.IT)

We optimize fault-tolerant quantum error correction to reduce the number of syndrome bit measurements. Speeding up error correction will also speed up an encoded quantum computation, and should reduce its effective error rate. We give both code-specific and general methods, using a variety of techniques and in a variety of settings. We design new quantum error-correcting codes specifically for efficient error correction, e.g., allowing single-shot error correction. For codes with multiple logical qubits, we give methods for combining error correction with partial logical measurements. There are tradeoffs in choosing a code and error-correction technique. While to date most work has concentrated on optimizing the syndrome-extraction procedure, we show that there are also substantial benefits to optimizing how the measured syndromes are chosen and used. As an example, we design single-shot measurement sequences for fault-tolerant quantum error correction with the 16-qubit extended Hamming code. Our scheme uses 10 syndrome bit measurements, compared to 40 measurements with the Shor scheme. We design single-shot logical measurements as well: any logical Z measurement can be made together with fault-tolerant error correction using only 11 measurements. For comparison, using the Shor scheme a basic implementation of such a non-destructive logical measurement uses 63 measurements. We also offer ten open problems, the solutions of which could lead to substantial improvements of fault-tolerant error correction.

[12]  arXiv:2008.05091 (cross-list from eess.SP) [pdf, ps, other]
Title: Rate-Splitting Multiple Access for Multigroup Multicast and Multibeam Satellite Systems
Comments: Submitted for publication
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)

This work focuses on the promising Rate-Splitting Multiple Access (RSMA) and its beamforming design problem to achieve max-min fairness (MMF) among multiple co-channel multicast groups with imperfect channel state information at the transmitter (CSIT). Contrary to the conventional linear precoding (NoRS) that relies on fully treating any residual interference as noise, we consider a novel multigroup multicast beamforming strategy based on RSMA. RSMA relies on linearly precoded Rate-Splitting (RS) at the transmitter and Successive Interference Cancellation (SIC) at the receivers, and has recently been shown to enable a flexible framework for non-orthogonal transmission and robust interference management in multi-antenna wireless networks. In this work, we characterize the MMF Degrees-of-Freedom (DoF) achieved by RS and NoRS in multigroup multicast with imperfect CSIT and demonstrate the benefits of RS strategies for both underloaded and overloaded scenarios. Motivated by the DoF analysis, we then formulate a generic transmit power constrained optimization problem to achieve MMF rate performance. The superiority of RS-based multigroup multicast beamforming compared with NoRS is demonstrated via simulations in both terrestrial and multibeam satellite systems. In particular, due to the characteristics and challenges of multibeam satellite communications, our proposed RS strategy is shown promising to manage its interbeam interference.

[13]  arXiv:2008.05174 (cross-list from cs.CY) [pdf, ps, other]
Title: Information Verification for Humanitarians: A Critical Review
Subjects: Computers and Society (cs.CY); Information Theory (cs.IT); Social and Information Networks (cs.SI)

Quality humanitarian information is essential for efficient, effective and coordinated humanitarian responses. During crises, however, humanitarian responders rarely have access to quality information in order to provide the much-needed relief in a timely fashion. Traditional methods for the acquisition and evaluation of humanitarian information typically confront challenges such as poor accessibility, limited sources, and the capacity of monitoring and documentation. The more recent emergence of user generated content from online social platforms addressed some challenges faced by traditional methods, but it also raised many concerns regarding information quality and verifiability, among others, that affect both the public and humanitarian actors. This paper provides an overview of information verification methods in literature and reviews information collection and verification practices and tools used by news agencies and humanitarian organizations. Twenty crowd-sourced information projects in humanitarian and human rights nature are surveyed. We discuss the findings and give recommendations for future research.

Replacements for Thu, 13 Aug 20

[14]  arXiv:1607.04849 (replaced) [pdf, other]
Title: Secure Group Testing
Subjects: Information Theory (cs.IT)
[15]  arXiv:1901.01626 (replaced) [pdf, ps, other]
Title: Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels
Comments: a spelling error corrected
Subjects: Information Theory (cs.IT)
[16]  arXiv:1904.09653 (replaced) [pdf, ps, other]
Title: Enhanced Channel Estimation in Massive MIMO via Coordinated Pilot Design
Comments: 14 pages, 7 figures
Subjects: Information Theory (cs.IT)
[17]  arXiv:1909.00631 (replaced) [pdf, other]
Title: Design of Ambient Backscatter Training for Wireless Power Transfer
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)
[18]  arXiv:1909.13368 (replaced) [pdf, ps, other]
Title: Threshold-Secure Coding with Shared Key
Subjects: Information Theory (cs.IT)
[19]  arXiv:1910.11574 (replaced) [pdf, ps, other]
Title: Peterson-Gorenstein-Zierler algorithm for differential convolutional codes
Comments: Revised version: some typos have been fixed and references updated
Subjects: Information Theory (cs.IT); Rings and Algebras (math.RA)
[20]  arXiv:2001.02612 (replaced) [pdf, ps, other]
Title: Adaptive Coding for Two-Way Lossy Source-Channel Communication
Comments: a spelling error corrected
Subjects: Information Theory (cs.IT)
[21]  arXiv:2004.03954 (replaced) [pdf, ps, other]
Title: A Simple Capacity Outer Bound for Two-Way Channels and Capacity Approximation Results
Comments: a spelling error corrected
Subjects: Information Theory (cs.IT)
[22]  arXiv:2004.08409 (replaced) [pdf, other]
Title: Gauss-Markov Source Tracking with Side Information: Lower Bounds
Subjects: Information Theory (cs.IT); Systems and Control (eess.SY)
[23]  arXiv:2006.06797 (replaced) [pdf, ps, other]
Title: Tensor-Based Modulation for Unsourced Massive Random Access
Subjects: Information Theory (cs.IT)
[ total of 23 entries: 1-23 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2008, contact, help  (Access key information)