{"title":"Evasive Active Hypothesis Testing","authors":"Meng-Che Chang, M. Bloch","doi":"10.1109/ISIT44484.2020.9174021","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174021","url":null,"abstract":"We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128245916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISIT 2020 Technical Program Committee","authors":"","doi":"10.1109/isit44484.2020.9174214","DOIUrl":"https://doi.org/10.1109/isit44484.2020.9174214","url":null,"abstract":"","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128097395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noisy Guesses","authors":"N. Merhav","doi":"10.1109/ISIT44484.2020.9174096","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174096","url":null,"abstract":"We consider the problem of guessing a random, finite–alphabet, secret n–vector, where the guesses are transmitted via a noisy channel. We provide a single–letter formula for the best achievable exponential growth rate of the ρ–th moment of the number of guesses, as a function of n. This formula exhibits a fairly clear insight concerning the penalty due to the noise. We describe two different randomized schemes that achieve the optimal guessing exponent. One of them is fully universal in the sense of being independent of source (that governs the vector to be guessed), the channel (that corrupts the guesses), and the moment power ρ. Interestingly, it turns out that, in general, the optimal guessing exponent function exhibits a phase transition when it is examined either as a function of the channel parameters, or as a function of ρ: as long as the channel is not too distant (in a certain sense to be defined precisely) from the identity channel (i.e., the clean channel), or equivalently, as long ρ is larger than a certain critical value, ρc, there is no penalty at all in the guessing exponent, compared to the case of noiseless guessing.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardness of Successive-Cancellation Decoding of Linear Codes","authors":"Arman Fazeli, A. Vardy, Hanwen Yao","doi":"10.1109/ISIT44484.2020.9174469","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174469","url":null,"abstract":"Successive-cancellation decoding has gained much renewed interest since the advent of polar coding a decade ago. For polar codes, successive-cancellation decoding can be accomplished in time O(n log n). However, the complexity of successive-cancellation decoding for other families of codes remains largely unexplored. Herein, we prove that successive-cancellation decoding of general binary linear codes is NP-hard. In order to establish this result, we reduce from maximum-likelihood decoding of linear codes, a well-known NP-complete problem. Unlike maximum-likelihood decoding, however, the successive-cancellation decoding problem depends on the choice of a generator matrix. Thus we further strengthen our result by showing that there exist codes for which successive-cancellation decoding remains hard for every possible choice of the generator matrix. On the other hand, we also observe that polynomial-time successive-cancellation decoding can be extended from polar codes to many other linear codes. Finally, we show that every binary linear code can be encoded as a polar code with dynamically frozen bits. This approach makes it possible to use list-decoding of polar codes to approximate the maximum-likelihood decoding performance of arbitrary codes.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Water Filling Multi-Path Packet Scheduling","authors":"Arno Schneuwly, Derya Malak, M. Médard","doi":"10.1109/ISIT44484.2020.9174386","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174386","url":null,"abstract":"We study the performance of a coded point-to-point multi-path (MP) packet erasure channel (PEC) network model consisting of one sender (Tx) and one receiver (Rx). A network coded discrete water filling (DWF) scheduler is the core invention of this work. We provide an optimization framework to allocate coded packets over multiple network paths of varying channel conditions while minimizing the transmission delay. Applying the DWF framework to a feedback-based protocol shows significant throughput gains, delay and efficiency improvements compared to single path (SP) systems: In an example network with 4 paths we improve the transmission rate by a factor up to 2. This is not only beneficial for throughput-demanding applications such as large file downloads, but also for real-time systems such as livevideo streams which require low-latency environments. Moreover, we provide the optimization formulation for the DWF algorithm and a low-complexity implementation. The presented findings pave the way for efficient scheduling in next-generation transmission protocols for network coded MP and mesh networks.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Deduplication with Random Substitutions","authors":"Hao Lou, Farzad Farnoud","doi":"10.1109/ISIT44484.2020.9174380","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174380","url":null,"abstract":"Data deduplication saves storage space by identifying and removing repeats in the data stream. In this paper, we provide an information-theoretic analysis of the performance of deduplication algorithms with data streams where repeats are not exact. We introduce a source model in which probabilistic substitutions are considered. Two modified versions of fixed-length deduplication are studied and proven to have performance within a constant factor of optimal with the knowledge of repeat length. We also study the variable-length scheme and show that as entropy becomes smaller, the size of the compressed string vanishes relative to the length of the uncompressed string.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity of Line-of-Sight MIMO Channels","authors":"Heedong Do, N. Lee, A. Lozano","doi":"10.1109/ISIT44484.2020.9173939","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9173939","url":null,"abstract":"We establish an upper bound on the informationtheoretic capacity of line-of-sight (LOS) multiantenna channels with arbitrary antenna arrangements and identify array structures that, properly configured, can attain at least 96.6% of such capacity at every signal-to-noise ratio (SNR). In the process, we determine how to configure the arrays as a function of the SNR. At low- and high-SNR specifically, the configured arrays revert to simpler structures and become capacity-achieving.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"15 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114085667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exact Expressions in Source and Channel Coding Problems Using Integral Representations","authors":"N. Merhav, I. Sason","doi":"10.1109/ISIT44484.2020.9174294","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174294","url":null,"abstract":"We explore known integral representations of the logarithmic and power functions, and demonstrate their usefulness for information-theoretic analyses. We obtain compact, easily–computable exact formulas for several source and channel coding problems that involve expectations and higher moments of the logarithm of a positive random variable and the moment of order ρ>0 of a non-negative random variable (or the sum of i.i.d. positive random variables). These integral representations are used in a variety of applications, including the calculation of the degradation in mutual information between the channel input and output as a result of jamming, universal lossless data compression, Shannon and Rényi entropy evaluations, and the ergodic capacity evaluation of the single-input, multiple–output (SIMO) Gaussian channel with random parameters (known to both transmitter and receiver). The integral representation of the logarithmic function and its variants are anticipated to serve as a rigorous alternative to the popular (but non–rigorous) replica method (at least in some situations).","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sparse Activity Detection in Cell-Free Massive MIMO systems","authors":"Mangqing Guo, M. C. Gursoy, P. Varshney","doi":"10.1109/ISIT44484.2020.9174169","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174169","url":null,"abstract":"We investigate the sparse activity detection problem in cell-free massive multiple-input multiple-output (MIMO) systems in this paper. With the approximate message passing (AMP) algorithm, the received pilot signals at the access points (APs) are decomposed into independent circularly symmetric complex Gaussian noise corrupted components. By using the minimum mean-squared error (MMSE) denoiser during the AMP procedure, we obtain a threshold detection rule, and analytically describe the noise covariance matrix of the corrupted components via the state evolution equations, which is helpful for the performance analysis of the detection rule. Using the law of large numbers, it can be shown that the error probability of this threshold detection rule tends to zero when the number of APs, pilots and users tend to infinity while the ratio of the number of pilots and users is kept constant. Numerical results show that the error probability decreases while the number of APs increases, corroborating our theoretical analysis. In addition, we investigate the relationship between the error probability of the threshold detection rule and the number of symbols used for pilot transmissions during each channel coherence interval via numerical results.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126239251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"k-Connectivity in Random Graphs induced by Pairwise Key Predistribution Schemes","authors":"Mansi Sood, Osman Yağan","doi":"10.1109/ISIT44484.2020.9174528","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174528","url":null,"abstract":"Random key predistribution schemes serve as a viable solution for facilitating secure communication in Wireless Sensor Networks (WSNs). We analyze reliable connectivity of a heterogeneous WSN under the random pairwise key predistribution scheme of Chan et al. According to this scheme, each of the n sensor nodes is classified as type-1 (respectively, type-2) with probability μ (respectively, 1 − μ) where 0 < μ < 1. Each type-1 (respectively, type-2) node is paired with 1 (respectively, Kn) other node selected uniformly at random; each pair is then assigned a unique pairwise key so that they can securely communicate with each other. A main question in the design of secure and heterogeneous WSNs is how should the parameters n, μ, and Kn be selected such that resulting network exhibits certain desirable properties with high probability. Of particular interest is the strength of connectivity often studied in terms of k-connectivity; i.e., with k = 1, 2, …, the property that the network remains connected despite the removal of any k − 1 nodes or links. In this paper, we answer this question by analyzing the inhomogeneous random K-out graph model naturally induced under the heterogeneous pairwise scheme. It was recently established that this graph is 1-connected asymptotically almost surely (a.a.s.) if and only if Kn = ω(1). Here, we show that for k = 2, 3, …, we need to set ${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n + omega (1)} right)$ for the network to be k-connected a.a.s. The result is given in the form of a zero-one law indicating that the network is a.a.s. not k-connected when ${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n - omega (1)} right)$. We present simulation results to demonstrate the usefulness of the results in the finite node regime.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122908141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}