{"title":"Deep Reinforcement One-Shot Learning for Change Point Detection","authors":"A. Puzanov, Kobi Cohen","doi":"10.1109/ALLERTON.2018.8635928","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635928","url":null,"abstract":"We consider the problem of detecting a change in a time series quickly and reliably, where only a few training instances are available. Examples include identifying changes in network traffic due to zero-day attacks, and computer vision applications where changes in series of images that represent significant events needed to be detected. These are known as cases of one-shot learning. We develop a novel Deep Reinforcement One-shot Learning (DeROL) framework to address this challenge. The basic idea of the DeROL algorithm is to train a deep-Q network to obtain a policy which is oblivious to the unseen classes in the testing data. Then, in real-time, DeROL maps the current state of the one-shot learning process to operational actions based on the trained deep-Q network, to maximize the objective function. We tested the algorithm using the OMNIGLOT dataset to demonstrate the efficiency of the DeROL framework.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125860617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2D Linear Detector Based on Generalized Belief Propagation Algorithm","authors":"C. Matcha, S. Garani","doi":"10.1109/ALLERTON.2018.8636002","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8636002","url":null,"abstract":"Various ideas have been borrowed from 1D inter symbol interference (ISI) detectors towards approximation of near maximum likelihood (ML) detection over 2D ISI channels. Generalized belief propagation (GBP) algorithm is a graph based algorithm different from these algorithms and is observed to give the best bit error rate (BER) performance by minimizing KL-distance metric. GBP algorithm passes messages between regions instead of messages between nodes in an iterative fashion. However, GBP algorithm has a very high computational complexity and is not suitable for practical deployment. In this paper, we propose a GBP based signal detection algorithm using a quadratic approximation of the KL-distance metric. This allows us to minimize the cost function by solving a set of linear equations i.e., obtain a one shot solution instead of the iterative message passing in the GBP algorithm. We also provide an intuition into the nature of the hard decisions given by the algorithm. The idea opens up various approximations of the GBP algorithm using different convex approximations of the cost function with the desired nature of obtaining the solution. We show the efficacy of the proposed algorithm by detecting 5×5 pages of binary data over a chosen channel with 3×3 ISI span. The quadratic approximation is observed to give 1.5 dB inferior performance in signal-to-noise ratio (SNR) as compared to the GBP algorithm.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"50 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127235972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Many Sensors to Localize the Source? The Double Metric Dimension of Random Networks","authors":"Brunella Spinelli, L. E. Celis, Patrick Thiran","doi":"10.1109/ALLERTON.2018.8635897","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635897","url":null,"abstract":"We consider the problem of detecting the source of an epidemic that spreads in a network. The only information about the epidemic comes from a subset of nodes, which we call sensors, and which can reveal if and when they become infected. How many sensors do we need to guarantee that the epidemic source is correctly identified? The answer to this question is a known network property, called the double metric dimension (DMD); unfortunately, it is hard to compute. We compute tight bounds for the DMD of $mathcal{G}(N, p)$ random networks. Interestingly, these bounds are non-monotonic functions of the edge density p: this implies in turn that the detectability of the source is influenced by the edge density p in a non-monotonic fashion in $mathcal{G}(N,p)$ networks. We show empirically that this property applies to other topologies as well.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131182794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coded Energy-Efficient Beam-Alignment for Millimeter-Wave Networks","authors":"Muddassar Hussain, Nicolò Michelusi","doi":"10.1109/ALLERTON.2018.8635944","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635944","url":null,"abstract":"Millimeter-wave communications rely on narrow-beam transmissions to cope with the strong signal attenuation at these frequencies, thus demanding precise alignment between transmitter and receiver. However, the beam-alignment procedure may entail a huge overhead and its performance may be degraded by detection errors. This paper proposes a coded energy-efficient beam-alignment scheme, robust against detection errors. Specifically, the beam-alignment sequence is designed such that the error-free feedback sequences are generated from a codebook with the desired error correction capabilities. Therefore, in the presence of detection errors, the error-free feedback sequences can be recovered with high probability. The assignment of beams to codewords is designed to optimize energy efficiency, and a water-filling solution is proved. The numerical results with analog beams depict up to 4dB and 8dB gains over exhaustive and uncoded beam-alignment schemes, respectively.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Code-Based Distributed Gradient Descent Method","authors":"Elie Atallah, N. Rahnavard","doi":"10.1109/ALLERTON.2018.8635869","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635869","url":null,"abstract":"Distributed gradient descent is an optimization algorithm that is used to solve a minimization problem distributed over a network through minimizing local functions that sum up to form the overall objective function. These local functions fi contribute to local gradients adding up incrementally to form the overall gradient. Recently, the gradient coding paradigm was introduced for networks with a centralized fusion center to resolve the problem of straggler nodes. Through introducing some kind of redundancy on each node, such coding schemes are utilized to form new coded local functions gi from the original local functions fi. In this work, we consider a distributed network with a defined network topology and no fusion center. At each node, linear combinations of the local coded gradients $nablaoverline{g}_{i}$ can be constructed to form the overall gradient. Our iterative method, referred to as Code-Based Distributed Gradient Descent (CDGD), updates each node's local estimate by applying an adequate weighing scheme. This scheme adapts the coded local gradient descent step along with local estimates from neighboring nodes. We provide the convergence analysis for CDGD and we analytically show that we enhance the convergence rate by a scaling factor over conventional incremental methods without any predefined tuning. Furthermore, we demonstrate through numerical results significant performance and enhancements for convergence rates.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Economic Dispatch and Price Evolution under Ramping Constraints and Uncertain Demand","authors":"Abhishek K. Gupta, Balsam Dakhil, R. Jain","doi":"10.1109/ALLERTON.2018.8635638","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635638","url":null,"abstract":"Consider $N$ generators with limited ramping capabilities that need to meet the stochastic demand over $T$ time steps by ramping up or ramping down their generation at every time step. We formulate this problem as a stochastic dynamic optimization problem with stochastic constraints, and compute the evolution of nodal prices over time (Lagrange multipliers corresponding to the constraints).","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132538034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramin Soltani, D. Goeckel, D. Towsley, A. Houmansadr
{"title":"Fundamental Limits of Covert Bit Insertion in Packets","authors":"Ramin Soltani, D. Goeckel, D. Towsley, A. Houmansadr","doi":"10.1109/ALLERTON.2018.8635975","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635975","url":null,"abstract":"Covert communication is necessary when revealing the mere existence of a message leaks sensitive information to an attacker. Consider a network link where an authorized transmitter Jack sends packets to an authorized receiver Steve, and the packets visit Alice, Willie, and Bob, respectively, before they reach Steve. Covert transmitter Alice wishes to alter the packet stream in some way to send information to covert receiver Bob without watchful and capable adversary Willie being able to detect the presence of the message. In our previous works, we addressed two techniques for such covert transmission from Alice to Bob: packet insertion and packet timing. In this paper, we consider covert communication via bit insertion in packets with available space (e.g., with size less than the maximum transmission unit). We consider three scenarios: 1) packet sizes are independent and identically distributed (i.i.d.) with a probability mass function (pmf) whose support is a set of one bit spaced values; 2) packet sizes are i.i.d. with a pmf whose support is arbitrary; 3) packet sizes may be dependent. For the first and second assumptions, we show that Alice can covertly insert $O(sqrt{n})$ bits of information in a flow of n packets; conversely, if she inserts $omega(sqrt{n})$ bits of information, Willie can detect her with arbitrarily small error probability. For the third assumption, we prove Alice can covertly insert on average $O(c(n)/sqrt{n})$ bits in a sequence of n packets, where $c(n)$ is the average number of conditional pmf of packet sizes given the history, with a support of at least size two.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131346427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Detection of Cyber-physical Attacks in Distributed Sensor Networks","authors":"Aquib Mustafa, H. Modares","doi":"10.1109/ALLERTON.2018.8635989","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635989","url":null,"abstract":"This paper analyzes and detects the adverse effects of cyber-physical attacks on distributed Kalman filters in sensor networks. To this end, we first evaluate the effect of adversaries on the performance of the sensor network in the distributed state estimation problem. More specifically, we consider attacks on both the sensors and the wireless communication channels and show that how an attacker affects the state estimation error covariance recursion and, consequently, the network performance. We then introduce novel Kullback-Liebler divergence based detectors to capture attacks by using the innovation sequence of each sensor and the innovation sequences that it estimates for its neighbors. Simulation result validates the effectiveness of presented work.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"27 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASY-SONATA: Achieving Linear Convergence in Distributed Asynchronous Multiagent Optimization","authors":"Ye Tian, Ying Sun, G. Scutari","doi":"10.1109/ALLERTON.2018.8636055","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8636055","url":null,"abstract":"This papers studies multi-agent (convex and nonconvex) optimization over static digraphs. We propose a general distributed asynchronous algorithmic framework whereby i) agents can update their local variables as well as communicate with their neighbors at any time, without any form of coordination; and ii) they can perform their local computations using (possibly) delayed, out-of-sync information from their neighbors. Delays need not be known to the agents or obey any specific profile, and can also be time-varying (but bounded). The algorithm builds on a tracking mechanism that is robust against asynchrony (in the above sense), whose goal is to estimate locally the sum of agents’ gradients. When applied to strongly convex functions, we prove that it converges at an R-linear (geometric) rate as long as the step-size is sufficiently small. A sublinear convergence rate is proved, when nonconvex problems and/or diminishing, uncoordinated step-sizes are employed. To the best of our knowledge, this is the first distributed algorithm with provable geometric convergence rate in such a general asynchonous setting.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115537161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication Link Elimination in Static LQG Teams","authors":"Jiacheng Tang, Abhishek K. Gupta","doi":"10.1109/ALLERTON.2018.8635873","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635873","url":null,"abstract":"We consider here a scenario in which a team of agents switch to a secure shared communication channel with limited bandwidth to prevent man-in-the-middle attacks. To deal with the limited bandwidth, the agents identify which communication links in the team can be eliminated without paying a high penalty in terms of the performance of the control task. We formulate this problem as an LQG team problem with communication link elimination. Using Schur Complement Eigenvalue Interlacing Property, we bound the achievable optimal cost for removing only one communication link within the team problem. Under certain assumptions on the eigenvalues of the cost and covariance matrices, we identify an (heuristic) index-based link elimination policy with some tight performance guarantees. We substantiate our bounds with numerical simulation on random instances of static team problems and identify interesting directions for future research.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"16 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}