Information Theory
New submissions
[ showing up to 2000 entries per page: fewer  more ]
New submissions for Thu, 13 Aug 20
 [1] arXiv:2008.05031 [pdf, other]

Title: Covert Transmission Assisted by Intelligent Reflecting SurfaceSubjects: Information Theory (cs.IT)
Covert transmission is studied for an intelligent reflecting surface (IRS) aided communication system, where Alice aims to transmit messages to Bob without being detected by the warden Willie. Specifically, an IRS is used to increase the data rate at Bob under a covert constraint. For the considered model, when Alice is equipped with a single antenna, the transmission power at Alice and phase shifts at the IRS are jointly optimized to maximize the covert transmission rate with either instantaneous or partial channel state information (CSI) of Willie's link. In addition, when multiple antennas are deployed at Alice, we formulate a joint transmit beamforming and IRS phase shift optimization problem to maximize the covert transmission rate. One optimal algorithm and two lowcomplexity suboptimal algorithms are proposed to solve the problem. Furthermore, for the case of imperfect CSI of Willie's link, the optimization problem is reformulated by using the triangle and the CauchySchwarz inequalities. The reformulated optimization problems are solved using an alterative algorithm, semidefinite relaxation (SDR) and Gaussian randomization techniques. Finally, simulations are performed to verify our analysis. The simulation results show that an IRS can degrade the covert transmission rate when Willie is closer to the IRS than Bob.
 [2] arXiv:2008.05067 [pdf, ps, other]

Title: Enhanced Secrecy Rate Maximization for Directional Modulation Networks via IRSAuthors: Feng Shu, Jiayu Li, Mengxing Huang, Weiping Shi, Yin Teng, Jun Li, Yongpeng Wu, Jiangzhou WangSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
Intelligent reflecting surface (IRS) is of lowcost and energyefficiency and will be a promising technology for the future wireless communications like sixth generation. To address the problem of conventional directional modulation (DM) that Alice only transmits single confidential bit stream (CBS) to Bob with multiple antennas in a lineofsight channel, IRS is proposed to create friendly multipaths for DM such that two CBSs can be transmitted from Alice to Bob. This will significantly enhance the secrecy rate (SR) of DM. To maximize the SR (MaxSR), a general nonconvex optimization problem is formulated with the unitmodulus constraint of IRS phaseshift matrix (PSM), and the general alternating iterative (GAI) algorithm is proposed to jointly obtain the transmit beamforming vectors (TBVs) and PSM by alternately optimizing one and fixing another. To reduce its high complexity, a lowcomplexity iterative algorithm for MaxSR is proposed by placing the constraint of nullspace (NS) on the TBVs, called NS projection (NSP). Here, each CBS is transmitted separately in the NSs of other CBS and AN channels. Simulation results show that the SRs of the proposed GAI and NSP can approximately double that of IRSbased DM with single CBS for massive IRS in the high signaltonoise ratio region.
 [3] arXiv:2008.05071 [pdf, ps, other]

Title: SignalDependent Performance Analysis of Orthogonal Matching Pursuit for Exact Sparse RecoveryComments: 16 pages, 12 figures. To appear in IEEE Transactions on Signal ProcessingSubjects: Information Theory (cs.IT)
Exact recovery of $K$sparse signals $x \in \mathbb{R}^{n}$ from linear measurements $y=Ax$, where $A\in \mathbb{R}^{m\times n}$ is a sensing matrix, arises from many applications. The orthogonal matching pursuit (OMP) algorithm is widely used for reconstructing $x$. A fundamental question in the performance analysis of OMP is the characterizations of the probability of exact recovery of $x$ for random matrix $A$ and the minimal $m$ to guarantee a target recovery performance. In many practical applications, in addition to sparsity, $x$ also has some additional properties. This paper shows that these properties can be used to refine the answer to the above question. In this paper, we first show that the prior information of the nonzero entries of $x$ can be used to provide an upper bound on $\x\_1^2/\x\_2^2$. Then, we use this upper bound to develop a lower bound on the probability of exact recovery of $x$ using OMP in $K$ iterations. Furthermore, we develop a lower bound on the number of measurements $m$ to guarantee that the exact recovery probability using $K$ iterations of OMP is no smaller than a given target probability. Finally, we show that when $K=O(\sqrt{\ln n})$, as both $n$ and $K$ go to infinity, for any $0<\zeta\leq 1/\sqrt{\pi}$, $m=2K\ln (n/\zeta)$ measurements are sufficient to ensure that the probability of exact recovering any $K$sparse $x$ is no lower than $1\zeta$ with $K$ iterations of OMP. For $K$sparse $\alpha$strongly decaying signals and for $K$sparse $x$ whose nonzero entries independently and identically follow the Gaussian distribution, the number of measurements sufficient for exact recovery with probability no lower than $1\zeta$ reduces further to $m=(\sqrt{K}+4\sqrt{\frac{\alpha+1}{\alpha1}\ln(n/\zeta)})^2$ and asymptotically $m\approx 1.9K\ln (n/\zeta)$, respectively.
 [4] arXiv:2008.05092 [pdf, ps, other]

Title: Vectorized Hankel Lift: A Convex Approach for Blind SuperResolution of Point SourcesSubjects: Information Theory (cs.IT)
We consider the problem of resolving $ r$ point sources from $n$ samples at the low end of the spectrum when point spread functions (PSFs) are not known. Assuming that the spectrum samples of the PSFs lie in low dimensional subspace (let $s$ denote the dimension), this problem can be reformulated as a matrix recovery problem. By exploiting the low rank structure of the vectorized Hankel matrix associated with the target matrix, a convex approach called Vectorized Hankel Lift is proposed in this paper. It is shown that $n\gtrsim rs\log^4 n$ samples are sufficient for Vectorized Hankel Lift to achieve the exact recovery. In addition, a new variant of the MUSIC method available for spectrum estimation in the multiple snapshots scenario arises naturally from the vectorized Hankel lift framework, which is of independent interest.
 [5] arXiv:2008.05141 [pdf, other]

Title: Coded Elastic Computing on Machines with Heterogeneous Storage and Computation SpeedComments: 30 pages, 4 figuresSubjects: Information Theory (cs.IT); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC)
We study the optimal design of heterogeneous Coded Elastic Computing (CEC) where machines have varying computation speeds and storage. CEC introduced by Yang et al. in 2018 is a framework that mitigates the impact of elastic events, where machines can join and leave at arbitrary times. In CEC, data is distributed among machines using a Maximum Distance Separable (MDS) code such that subsets of machines can perform the desired computations. However, stateoftheart CEC designs only operate on homogeneous networks where machines have the same speeds and storage. This may not be practical. In this work, based on an MDS storage assignment, we develop a novel computation assignment approach for heterogeneous CEC networks to minimize the overall computation time. We first consider the scenario where machines have heterogeneous computing speeds but same storage and then the scenario where both heterogeneities are present. We propose a novel combinatorial optimization formulation and solve it exactly by decomposing it into a convex optimization problem for finding the optimal computation load and a "filling problem" for finding the exact computation assignment. A lowcomplexity "filling algorithm" is adapted and can be completed within a number of iterations equals at most the number of available machines.
 [6] arXiv:2008.05317 [pdf, ps, other]

Title: Reconfigurable Intelligent Surfaces Assisted Communications with Discrete Phase Shifts: How Many Quantization Levels are Required to Achieve Full Diversity?Comments: 5 pages, 2 figuresSubjects: Information Theory (cs.IT)
Due to hardware limitations, the phase shifts of the reflecting elements of reconfigurable intelligent surfaces (RISs) need to be quantized into discrete values. This letter aims to unveil the minimum required number of phase quantization levels $L$ in order to achieve the full diversity order in RISassisted wireless communication systems. With the aid of an upper bound of the outage probability, we first prove that the full diversity order is achievable provided that $L$ is not less than three. If $L=2$, on the other hand, we prove that the achievable diversity order cannot exceed $(N+1)/2$, where $N$ is the number of reflecting elements. This is obtained with the aid of a lower bound of the outage probability. Therefore, we prove that the minimum required value of $L$ to achieve the full diversity order is $L=3$. Simulation results verify the theoretical analysis and the impact of phase quantization levels on RISassisted communication systems.
 [7] arXiv:2008.05341 [pdf, other]

Title: NearOptimal Performance Bounds for Orthogonal and Permutation Group Synchronization via Spectral MethodsAuthors: Shuyang LingSubjects: Information Theory (cs.IT); Machine Learning (stat.ML)
Group synchronization asks to recover group elements from their pairwise measurements. It has found numerous applications across various scientific disciplines. In this work, we focus on orthogonal and permutation group synchronization which are widely used in computer vision such as object matching and Structure from Motion. Among many available approaches, spectral methods have enjoyed great popularity due to its efficiency and convenience. We will study the performance guarantees of spectral methods in solving these two synchronization problems by investigating how well the computed eigenvectors approximate each group element individually. We establish our theory by applying the recent popular~\emph{leaveoneout} technique and derive a~\emph{blockwise} performance bound for the recovery of each group element via eigenvectors. In particular, for orthogonal group synchronization, we obtain a nearoptimal performance bound for the group recovery in presence of Gaussian noise. For permutation group synchronization under random corruption, we show that the widelyused twostep procedure (spectral method plus rounding) can recover all the group elements exactly if the SNR (signaltonoise ratio) is close to the information theoretical limit. Our numerical experiments confirm our theory and indicate a sharp phase transition for the exact group recovery.
Crosslists for Thu, 13 Aug 20
 [8] arXiv:2006.15751 (crosslist from cs.NI) [pdf, other]

Title: Optimal and Quantized Mechanism Design for Fresh Data AcquisitionComments: Submitted to IEEE JSACSubjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT)
The proliferation of realtime applications has spurred much interest in data freshness, captured by the {\it ageofinformation} (AoI) metric. When strategic data sources have private market information, a fundamental economic challenge is how to incentivize them to acquire fresh data and optimize the agerelated performance. In this work, we consider an information update system in which a destination acquires, and pays for, fresh data updates from multiple sources. The destination incurs an agerelated cost, modeled as a general increasing function of the AoI. Each source is strategic and incurs a sampling cost, which is its private information and may not be truthfully reported to the destination. The destination decides on the price of updates, when to get them, and who should generate them, based on the sources' reported sampling costs. We show that a benchmark that naively trusts the sources' reports can lead to an arbitrarily bad outcome compared to the case where sources truthfully report. To tackle this issue, we design an optimal (economic) mechanism for timely information acquisition following Myerson's seminal work. To this end, our proposed optimal mechanism minimizes the sum of the destination's agerelated cost and its payment to the sources, while ensuring that the sources truthfully report their private information and will voluntarily participate in the mechanism. However, finding the optimal mechanisms may suffer from \textit{prohibitively expensive computational overheads} as it involves solving a nonlinear infinitedimensional optimization problem. We further propose a quantized version of the optimal mechanism that achieves asymptotic optimality, maintains the other economic properties, and enables one to tradeoff between optimality and computational overheads.
 [9] arXiv:2006.16805 (crosslist from cs.NI) [pdf, other]

Title: Pricing Fresh DataComments: Submitted to IEEE JSAC. arXiv admin note: text overlap with arXiv:1904.06899Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT)
We introduce the concept of {\it fresh data trading}, in which a destination user requests, and pays for, fresh data updates from a source provider, and data freshness is captured by the {\it age of information} (AoI) metric. Keeping data fresh relies on frequent data updates by the source, which motivates the source to {\it price fresh data}. In this work, the destination incurs an agerelated cost, modeled as a general increasing function of the AoI. The source designs a pricing mechanism to maximize its profit; the destination chooses a data update schedule to trade off its payments to the source and its agerelated cost. Depending on different realtime applications and scenarios, we study both a predictabledeadline and an unpredictabledeadline models. The key challenge of designing the optimal pricing scheme lies in the destination's timeinterdependent valuations, due to the nature of AoI and the infinitedimensional and dynamic optimization. To this end, we consider three pricing schemes that exploit and understand the profitability of three different dimensions in designing pricing: a {\it timedependent} pricing scheme, in which the price for each update depends on when it is requested; a {\it quantitybased} pricing scheme, in which the price of each update depends on how many updates have been previously requested; a {\it subscriptionbased} pricing scheme, in which the price for each update is flatrate but the source charges an additional subscription fee. Our analysis reveals that the optimal subscriptionbased pricing maximizes the source's profit among all possible pricing schemes under both predictable deadline and unpredictable deadline models; the optimal quantitybased pricing scheme is only optimal with a predictable deadline; the timedependent pricing scheme, under the unpredictable deadline, is asymptotically optimal under significant time discounting.
 [10] arXiv:2008.04964 (crosslist from quantph) [pdf, ps, other]

Title: MultiUser Distillation of Common Randomness and Entanglement from Quantum StatesSubjects: Quantum Physics (quantph); Information Theory (cs.IT)
We construct new protocols for the tasks of converting noisy multipartite quantum correlations into noiseless classical and quantum ones using local operations and classical communications (LOCC). For the former, known as common randomness (CR) distillation, two new lower bounds on the "distillable common randomness", an operational measure of the total genuine (classical) correlations in a quantum state, are obtained. Our proof relies on a generalization of communication for omniscience (CO) [Csiszar and Narayan, IEEE Trans. Inf. Theory 50:30473061, 2004]. Our contribution here is a novel simultaneous decoder for the compression of correlated classical sources by random binning with quantum side information at the decoder. For the latter, we derive two new lower bounds on the rate at which GreenbergerHorneZeilinger (GHZ) states can be asymptotically distilled from any given pure state under LOCC. Our approach consists in "making coherent" the proposed CR distillation protocols and recycling of resources [Devetak et al. IEEE Trans. Inf. Theory 54(10):45874618, 2008]. The first lower bound is identical to a recent result by Vrana and Christandl [IEEE Trans. Inf. Theory 65(9):59455958, 2019], which is based on a combinatorial method to achieve the same rate. Our second lower bound generalises and improves upon this result, and unifies a number of other known lower bounds on GHZ distillation.
 [11] arXiv:2008.05051 (crosslist from quantph) [pdf, other]

Title: Short Shorstyle syndrome sequencesComments: 23 pages, 15 figuresSubjects: Quantum Physics (quantph); Information Theory (cs.IT)
We optimize faulttolerant quantum error correction to reduce the number of syndrome bit measurements. Speeding up error correction will also speed up an encoded quantum computation, and should reduce its effective error rate. We give both codespecific and general methods, using a variety of techniques and in a variety of settings. We design new quantum errorcorrecting codes specifically for efficient error correction, e.g., allowing singleshot error correction. For codes with multiple logical qubits, we give methods for combining error correction with partial logical measurements. There are tradeoffs in choosing a code and errorcorrection technique. While to date most work has concentrated on optimizing the syndromeextraction procedure, we show that there are also substantial benefits to optimizing how the measured syndromes are chosen and used. As an example, we design singleshot measurement sequences for faulttolerant quantum error correction with the 16qubit extended Hamming code. Our scheme uses 10 syndrome bit measurements, compared to 40 measurements with the Shor scheme. We design singleshot logical measurements as well: any logical Z measurement can be made together with faulttolerant error correction using only 11 measurements. For comparison, using the Shor scheme a basic implementation of such a nondestructive logical measurement uses 63 measurements. We also offer ten open problems, the solutions of which could lead to substantial improvements of faulttolerant error correction.
 [12] arXiv:2008.05091 (crosslist from eess.SP) [pdf, ps, other]

Title: RateSplitting Multiple Access for Multigroup Multicast and Multibeam Satellite SystemsComments: Submitted for publicationSubjects: Signal Processing (eess.SP); Information Theory (cs.IT)
This work focuses on the promising RateSplitting Multiple Access (RSMA) and its beamforming design problem to achieve maxmin fairness (MMF) among multiple cochannel multicast groups with imperfect channel state information at the transmitter (CSIT). Contrary to the conventional linear precoding (NoRS) that relies on fully treating any residual interference as noise, we consider a novel multigroup multicast beamforming strategy based on RSMA. RSMA relies on linearly precoded RateSplitting (RS) at the transmitter and Successive Interference Cancellation (SIC) at the receivers, and has recently been shown to enable a flexible framework for nonorthogonal transmission and robust interference management in multiantenna wireless networks. In this work, we characterize the MMF DegreesofFreedom (DoF) achieved by RS and NoRS in multigroup multicast with imperfect CSIT and demonstrate the benefits of RS strategies for both underloaded and overloaded scenarios. Motivated by the DoF analysis, we then formulate a generic transmit power constrained optimization problem to achieve MMF rate performance. The superiority of RSbased multigroup multicast beamforming compared with NoRS is demonstrated via simulations in both terrestrial and multibeam satellite systems. In particular, due to the characteristics and challenges of multibeam satellite communications, our proposed RS strategy is shown promising to manage its interbeam interference.
 [13] arXiv:2008.05174 (crosslist from cs.CY) [pdf, ps, other]

Title: Information Verification for Humanitarians: A Critical ReviewSubjects: Computers and Society (cs.CY); Information Theory (cs.IT); Social and Information Networks (cs.SI)
Quality humanitarian information is essential for efficient, effective and coordinated humanitarian responses. During crises, however, humanitarian responders rarely have access to quality information in order to provide the muchneeded relief in a timely fashion. Traditional methods for the acquisition and evaluation of humanitarian information typically confront challenges such as poor accessibility, limited sources, and the capacity of monitoring and documentation. The more recent emergence of user generated content from online social platforms addressed some challenges faced by traditional methods, but it also raised many concerns regarding information quality and verifiability, among others, that affect both the public and humanitarian actors. This paper provides an overview of information verification methods in literature and reviews information collection and verification practices and tools used by news agencies and humanitarian organizations. Twenty crowdsourced information projects in humanitarian and human rights nature are surveyed. We discuss the findings and give recommendations for future research.
Replacements for Thu, 13 Aug 20
 [14] arXiv:1607.04849 (replaced) [pdf, other]

Title: Secure Group TestingSubjects: Information Theory (cs.IT)
 [15] arXiv:1901.01626 (replaced) [pdf, ps, other]

Title: Joint SourceChannel Coding for the Transmission of Correlated Sources over TwoWay ChannelsComments: a spelling error correctedSubjects: Information Theory (cs.IT)
 [16] arXiv:1904.09653 (replaced) [pdf, ps, other]

Title: Enhanced Channel Estimation in Massive MIMO via Coordinated Pilot DesignComments: 14 pages, 7 figuresSubjects: Information Theory (cs.IT)
 [17] arXiv:1909.00631 (replaced) [pdf, other]

Title: Design of Ambient Backscatter Training for Wireless Power TransferSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
 [18] arXiv:1909.13368 (replaced) [pdf, ps, other]

Title: ThresholdSecure Coding with Shared KeySubjects: Information Theory (cs.IT)
 [19] arXiv:1910.11574 (replaced) [pdf, ps, other]

Title: PetersonGorensteinZierler algorithm for differential convolutional codesComments: Revised version: some typos have been fixed and references updatedSubjects: Information Theory (cs.IT); Rings and Algebras (math.RA)
 [20] arXiv:2001.02612 (replaced) [pdf, ps, other]

Title: Adaptive Coding for TwoWay Lossy SourceChannel CommunicationComments: a spelling error correctedSubjects: Information Theory (cs.IT)
 [21] arXiv:2004.03954 (replaced) [pdf, ps, other]

Title: A Simple Capacity Outer Bound for TwoWay Channels and Capacity Approximation ResultsComments: a spelling error correctedSubjects: Information Theory (cs.IT)
 [22] arXiv:2004.08409 (replaced) [pdf, other]

Title: GaussMarkov Source Tracking with Side Information: Lower BoundsSubjects: Information Theory (cs.IT); Systems and Control (eess.SY)
 [23] arXiv:2006.06797 (replaced) [pdf, ps, other]

Title: TensorBased Modulation for Unsourced Massive Random AccessSubjects: Information Theory (cs.IT)
[ showing up to 2000 entries per page: fewer  more ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, recent, 2008, contact, help (Access key information)