640 research outputs found
Causal Sampling, Compressing, and Channel Coding of Streaming Data
With the emergence of the Internet of Things, communication systems, such as those employed in distributed control and tracking scenarios, are becoming increasingly dynamic, interactive, and delay-sensitive. The data in such real-time systems arrive at the encoder progressively in a streaming fashion. An intriguing question is: what codes can transmit streaming data with both high reliability and low latency? Classical non-causal (block) encoding schemes can transmit data reliably but under the assumption that the encoder knows the entire data block before the transmission. While this is a realistic assumption in delay-tolerant systems, it is ill-suited to real-time systems due to the delay introduced by collecting data into a block. This thesis studies causal encoding: the encoder transmits information based on the causally received data while the data is still streaming in and immediately incorporates the newly received data into a continuing transmission on the fly.
This thesis investigates causal encoding of streaming data in three scenarios: causal sampling, causal lossy compressing, and causal joint source-channel coding (JSCC). In the causal sampling scenario, a sampler observes a continuous-time source process and causally decides when to transmit real-valued samples of it under a constraint on the average number of samples per second; an estimator uses the causally received samples to approximate the source process in real time. We propose a causal sampling policy that achieves the best tradeoff between the sampling frequency and the end-to-end real-time estimation distortion for a class of continuous Markov processes. In the causal lossy compressing scenario, the sampling frequency constraint in the causal sampling scenario is replaced by a rate constraint on the average number of bits per second. We propose a causal code that achieves the best causal distortion-rate tradeoff for the same class of processes. In the causal JSCC scenario, the noiseless channel and the continuous-time process in the previous scenarios are replaced by a discrete memoryless channel with feedback and a sequence of streaming symbols, respectively. We propose a causal joint sourcechannel code that achieves the maximum exponentially decaying rate of the error probability compatible with a given rate. Remarkably, the fundamental limits in the causal lossy compressing and the causal JSCC scenarios achieved by our causal codes are no worse than those achieved by the best non-causal codes. In addition to deriving the fundamental limits and presenting the causal codes that achieve the limits, we also show that our codes apply to control systems, are resilient to system deficiencies such as channel delay and noise, and have low complexities.</p
Learning-based Wavelet-like Transforms For Fully Scalable and Accessible Image Compression
The goal of this thesis is to improve the existing wavelet transform with the aid of machine learning techniques, so as to enhance coding efficiency of wavelet-based image compression frameworks, such as JPEG 2000.
In this thesis, we first propose to augment the conventional base wavelet transform with two additional learned lifting steps -- a high-to-low step followed by a low-to-high step. The high-to-low step suppresses aliasing in the low-pass band by using the detail bands at the same resolution, while the low-to-high step aims to further remove redundancy from detail bands by using the corresponding low-pass band. These two additional steps reduce redundancy (notably aliasing information) amongst the wavelet subbands, and also improve the visual quality of reconstructed images at reduced resolutions.
To train these two networks in an end-to-end fashion, we develop a backward annealing approach to overcome the non-differentiability of the quantization and cost functions during back-propagation. Importantly, the two additional networks share a common architecture, named a proposal-opacity topology, which is inspired and guided by a specific theoretical argument related to geometric flow. This particular network topology is compact and with limited non-linearities, allowing a fully scalable system; one pair of trained network parameters are applied for all levels of decomposition and for all bit-rates of interest. By employing the additional lifting networks within the JPEG2000 image coding standard, we can achieve up to 17.4% average BD bit-rate saving over a wide range of bit-rates, while retaining the quality and resolution scalability features of JPEG2000.
Built upon the success of the high-to-low and low-to-high steps, we then study more broadly the extension of neural networks to all lifting steps that correspond to the base wavelet transform. The purpose of this comprehensive study is to understand what is the most effective way to develop learned wavelet-like transforms for highly scalable and accessible image compression. Specifically, we examine the impact of the number of learned lifting steps, the number of layers and the number of channels in each learned lifting network, and kernel support in each layer. To facilitate the study, we develop a generic training methodology that is simultaneously appropriate to all lifting structures considered. Experimental results ultimately suggest that to improve the existing wavelet transform, it is more profitable to augment a larger wavelet transform with more diverse high-to-low and low-to-high steps, rather than developing deep fully learned lifting structures
In-band-full-duplex integrated access and backhaul enabled next generation wireless networks
In sixth generation (6G) wireless networks, the severe traffic congestion in the microwave frequencies motivates the exploration of the large available bandwidth in the millimetre-wave (mmWave) frequencies to achieve higher network capacity and data rate. Since large-scale antenna arrays and dense base station deployment are required, the hybrid beamforming architecture and the recently proposed integrated access and backhaul (IAB) networks become potential candidates for providing cost and hardware-friendly techniques for 6G wireless networks. In addition, in-band-full-duplex (IBFD) has been recently paid much more research attention since it can make the transmission and reception occur in the same time and frequency band, which nearly doubles the communication spectral efficiency (SE) compared with state-of-the-art half-duplex (HD) systems. Since 6G will explore sensing as its new capability, future wireless networks can go far beyond communications. Motivated by this, the development of integrated sensing and communications (ISAC) systems, where radar and communication systems share the same spectrum resources and hardware, has become one of the major goals in 6G. This PhD thesis focuses on the design and analysis of IBFD-IAB wireless networks in the frequency range 2 (FR2) band (≥ 24.250 GHz) at mmWave frequencies for the potential use in 6G.
Firstly, we develop a novel design for the single-cell FR2-IBFD-IAB networks with subarray-based hybrid beamforming, which can enhance the SE and coverage while reducing the latency. The radio frequency (RF) beamformers are obtained via RF codebooks given by a modified matrix-wise Linde-Buzo-Gray (LBG) algorithm. The self-interference (SI) is cancelled in three stages, where the first stage of antenna isolation is assumed to be successfully deployed. The second stage consists of the optical domain-based RF cancellation, where cancellers are connected with the RF chain pairs. The third stage is comprised of the digital cancellation via successive interference cancellation followed by minimum mean-squared error (MSE) baseband receiver. Multiuser interference in the access link is cancelled by zero-forcing at the IAB-node transmitter. The proposed codebook algorithm avoids undesirable low-rank behaviour, while the proposed staged-SI cancellation (SIC) shows satisfactory cancellation performance in the wideband IBFD scenario.
However, the system performance can be affected by the hardware impairments (HWI) and RF effective channel estimation errors.
Secondly, we study an FR2-IBFD-ISAC-IAB network for vehicle-to-everything communications, where the IAB-node acts as a roadside unit performing sensing and communication simultaneously (i.e., at the same time and frequency band). The SI due to the IBFD operation will be cancelled in the propagation, analogue, and digital domains; only the residual SI (RSI) is reserved for performance analysis. Considering the subarray-based hybrid beamforming structure, including HWI and RF effective SI channel estimation error, the unscented Kalman filter is used for tracking multiple vehicles in the studied scenario. The proposed system shows an enhanced SE compared with the HD system, and the tracking MSEs averaged across all vehicles of each state parameter are close to their posterior Cramér-Rao lower bounds.
Thirdly, we analyse the performance of the multi-cell wideband single-hop backhaul FR2-IBFD-IAB networks by using stochastic geometry analysis. We model the wired-connected next generation NodeBs (gNBs) as the Matérn hard-core point process (MHCPP) to meet the real-world deployment requirement and reduce the cost caused by wired connection in the network. We first derive association probabilities that reflect how likely the typical user-equipment is served by a gNB or an IAB-node based on the maximum long-term averaged biased-received-desired-signal power criteria. Further, by leveraging the composite Gamma-Lognormal distribution, we derive results for the signal to interference plus noise ratio coverage, capacity with outage, and ergodic capacity of the network. In order to assess the impact of noise, we consider the sidelobe gain on inter-cell interference links and the analogue to digital converter quantization noise. Compared with the HD transmission, the designated system shows an enhanced capacity when the SIC operates successfully. We also study how the power bias and density ratio of the IAB-node to gNB, and the hard-core distance can affect system performance.
Overall, this thesis aims to contribute to the research efforts of shaping the 6G wireless networks by designing and analysing the FR2-IBFD-IAB inspired networks in the FR2 band at mmWave frequencies that will be potentially used in 6G for both communication only and ISAC scenarios
Analytics over Encrypted Traffic and Defenses
Encrypted traffic flows have been known to leak information about their underlying content through statistical properties such as packet lengths and timing. While traffic fingerprinting attacks exploit such information leaks and threaten user privacy by disclosing website visits, videos streamed, and user activity on messaging platforms, they can also be helpful in network management and intelligence services.
Most recent and best-performing such attacks are based on deep learning models. In this thesis, we identify multiple limitations in the currently available attacks and defenses against them. First, these deep learning models do not provide any insights into their decision-making process. Second, most attacks that have achieved very high accuracies are still limited by unrealistic assumptions that affect their practicality. For example, most attacks assume a closed world setting and focus on traffic classification after event completion. Finally, current state-of-the-art defenses still incur high overheads to provide reasonable privacy, which limits their applicability in real-world applications.
In order to address these limitations, we first propose an inline traffic fingerprinting attack based on variable-length sequence modeling to facilitate real-time analytics. Next, we attempt to understand the inner workings of deep learning-based attacks with the dual goals of further improving attacks and designing efficient defenses against such attacks. Then, based on the observations from this analysis, we propose two novel defenses against traffic fingerprinting attacks that provide privacy under more realistic constraints and at lower bandwidth overheads. Finally, we propose a robust framework for open set classification that targets network traffic with this added advantage of being more suitable for deployment in resource-constrained in-network devices
Privacy-oriented manipulation of speaker representations
Speaker embeddings are ubiquitous, with applications ranging from speaker
recognition and diarization to speech synthesis and voice anonymisation. The
amount of information held by these embeddings lends them versatility, but also
raises privacy concerns. Speaker embeddings have been shown to contain
information on age, sex, health and more, which speakers may want to keep
private, especially when this information is not required for the target task.
In this work, we propose a method for removing and manipulating private
attributes from speaker embeddings that leverages a Vector-Quantized
Variational Autoencoder architecture, combined with an adversarial classifier
and a novel mutual information loss. We validate our model on two attributes,
sex and age, and perform experiments with ignorant and fully-informed
attackers, and with in-domain and out-of-domain data
Extracting Signals and Graphical Models from Compressed Measurements
The thesis is to give an integrated approach to efficiently learn the interdependency relation among high dimensional signal components and reconstruct signals from observations collected in a linear sensing system, Broadly speaking, the research topics consists of three parts: (i) interdependency relation learning; (ii) sensing system design; and (iii) signal reconstruction. In the interdependency relation learning part, we considered both the parametric and non-parametric methods to learn the graphical structure under the noisy indirect measurements. In the sensing system design part, we introduced a density evolution framework to design sensing systems for compressive sensing for the first time. In the signal reconstruction part, we focused on the signal reconstruction with a given sensing system, which consists of three parts: signal reconstruction with inexact knowledge of the sensing system; signal reconstruction with the signal being contaminated by undesired noise; signal reconstruction with the signal belonging to a union of convex sets.Ph.D
A Secure Federated Learning Framework for Residential Short Term Load Forecasting
Smart meter measurements, though critical for accurate demand forecasting,
face several drawbacks including consumers' privacy, data breach issues, to
name a few. Recent literature has explored Federated Learning (FL) as a
promising privacy-preserving machine learning alternative which enables
collaborative learning of a model without exposing private raw data for short
term load forecasting. Despite its virtue, standard FL is still vulnerable to
an intractable cyber threat known as Byzantine attack carried out by faulty
and/or malicious clients. Therefore, to improve the robustness of federated
short-term load forecasting against Byzantine threats, we develop a
state-of-the-art differentially private secured FL-based framework that ensures
the privacy of the individual smart meter's data while protect the security of
FL models and architecture. Our proposed framework leverages the idea of
gradient quantization through the Sign Stochastic Gradient Descent (SignSGD)
algorithm, where the clients only transmit the `sign' of the gradient to the
control centre after local model training. As we highlight through our
experiments involving benchmark neural networks with a set of Byzantine attack
models, our proposed approach mitigates such threats quite effectively and thus
outperforms conventional Fed-SGD models
- …