{"title":"Towards theoretically-founded learning-based denoising","authors":"Wenda Zhou, S. Jalali","doi":"10.1109/ISIT.2019.8849348","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849348","url":null,"abstract":"Denoising a stationary process (Xi)i∈ℤ corrupted by additive white Gaussian noise (Zi)i∈ℤ, i.e., recovering Xn from Yn = Xn + Zn, is a classic and fundamental problem in information theory and statistical signal processing. Theoretically-founded and computationally-efficient denoising algorithms which are applicable to general sources are yet to be found. In a Bayesian setup, given the distribution of Xn, a minimum mean square error (MMSE) denoiser computes E[Xn|Yn]. However, for general sources, computing E[Xn|Yn] is computationally very challenging, if not infeasible. In this paper, starting from a Bayesian setup, a novel denoiser, namely, quantized maximum a posteriori (Q-MAP) denoiser, is proposed and its asymptotic performance is analyzed. Both for memoryless sources, and for structured first-order Markov sources, it is shown that, asymptotically, as σ2 (noise variance) converges to zero, $frac{1}{{{sigma ^2}}}{text{E}}left[ {{{left( {{X_i} - hat X_i^{{text{Q - MAP}}}} right)}^2}} right]$ converges to the information dimension of the source. For the studied memoryless sources, this limit is known to be optimal. A key advantage of the Q-MAP denoiser is that, unlike a MMSE denoiser, it highlights the key properties of the source distribution that are to be used in its denoising. This naturally leads to a learning-based denoising algorithm. Using ImageNet database for training, initial simulation results exploring the performance of such a learning-based denoiser in image denoising are presented.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"43 1","pages":"2714-2718"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73737656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proof of de Bruijn Identity based on Generalized Price’s Theorem","authors":"J. Riba, Ferran de Cabrera","doi":"10.1109/ISIT.2019.8849368","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849368","url":null,"abstract":"This paper shows that de Bruijn identity, which relates entropy with Fisher information, can be obtained as a particular case of an immediate generalization of Price’s theorem, which is a tool used in the analysis of nonlinear memoryless systems with Gaussian inputs. It is shown that, while the general Price’s theorem follows since the density of the perturbation satisfies the heat equation, the particular case of de Bruijn identity follows since the score function is zero-mean, which is the well-known condition that provides the insightful Cramér- Rao bound expression based on the negative second derivative of the log-likelihood function. The unified framework uses the characteristic function as a main tool and becomes a more intuitive alternative to the classical technical proof obtained by integrating by parts. Second-order Tsallis entropy is also briefly explored under this general framework.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"53 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74015306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Geometry of Community Detection via the MMSE Matrix","authors":"G. Reeves, Vaishakhi Mayya, A. Volfovsky","doi":"10.1109/ISIT.2019.8849594","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849594","url":null,"abstract":"The information-theoretic limits of community detection have been studied extensively for network models with high levels of symmetry or homogeneity. The contribution of this paper is to study a broader class of network models that allow for variability in the sizes and behaviors of the different communities, and thus better reflect the behaviors observed in real-world networks. Our results show that the ability to detect communities can be described succinctly in terms of a matrix of effective signal-to-noise ratios that provides a geometrical representation of the relationships between the different communities. This characterization follows from a matrix version of the I-MMSE relationship and generalizes the concept of an effective scalar signal-to-noise ratio introduced in previous work. We provide explicit formulas for the asymptotic per-node mutual information and upper bounds on the minimum mean-squared error. The theoretical results are supported by numerical simulations.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"8 1","pages":"400-404"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75177231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoding of Generalized Three-Layer Integrated Interleaved Codes","authors":"Xinmiao Zhang","doi":"10.1109/ISIT.2019.8849285","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849285","url":null,"abstract":"Generalized integrated interleaved (GII) codes nest sub-codewords, also called interleaves, to generate parities shared by the interleaves. They achieve better tradeoffs compared to other locally recoverable erasure codes and are good candidates for hyper-speed data storage and communications. By nesting the interleaves in a hierarchical manner, the recent three-layer GII codes further improve the decoding locality. However, due to the fundamentally different structure and larger size of the nesting matrix, three-layer GII decoding faces many issues that do not exist previously. In this paper, constraints on the relative correction capabilities of the nested codes are defined to achieve the target correction goal. The bottleneck on syndrome conversion matrix inversion is eliminated by transforming the conversion matrices and syndrome vectors. The overall decoding process is optimized to increase correction capability and reduce complexity.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"14 1","pages":"2424-2428"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75212598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity of dynamical storage systems","authors":"Ohad Elishco, A. Barg","doi":"10.1109/ISIT.2019.8849745","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849745","url":null,"abstract":"We define a time-dependent model of erasure coding for distributed storage and estimate the average capacity of the network in the simple case of fixed link bandwidth that takes one of two given values. We show that if k data blocks are encoded into n blocks placed on n nodes of which n1 have links with bandwidth greater than the remaining n − n1 nodes by γ symbols, then the average capacity increases by Ω(γ(k – n1)2) symbols compared to the static model.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"1562-1566"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75666821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phase Transition in Mixed ℓ2/ℓ1-norm Minimization for Block-Sparse Compressed Sensing","authors":"Toshiyuki Tanaka","doi":"10.1109/ISIT.2019.8849798","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849798","url":null,"abstract":"We have evaluated, via the replica method, phase transition thresholds for the mixed ℓ2/ℓ1-norm minimization applied to block-sparse compressed sensing with randomly generated measurement matrices. Our analysis takes into account that the matrix elements may be of non-zero mean, and shows that the phase transition threshold for the mixed ℓ2/ℓ1-norm minimization improves when the matrix elements have non-zero mean and the distribution of non-zero blocks of the target vector to be estimated has a certain imbalance.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"124 1","pages":"2848-2852"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75813283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bounded Single Insertion/Deletion Correcting Codes","authors":"Takayuki Nozaki","doi":"10.1109/ISIT.2019.8849583","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849583","url":null,"abstract":"A code is bounded single insertion/deletion correcting if a decoder corrects a single insertion or single deletion with side information about a range of positions occurring an inserted symbol or deleted symbol. This paper constructs two bounded single insertion/deletion correcting codes and gives decoding algorithms for these. Moreover, we evaluate the number of codewords of these codes. As a result, the constructed codes have larger cardinalities than the existing ones.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"102 1","pages":"2379-2383"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75697490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Sum-Rate Capacity Results for Multi-User Interference Channels","authors":"Reza Khosravi-Farsani","doi":"10.1109/ISIT.2019.8849858","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849858","url":null,"abstract":"The Interference Channels (ICs) represent fundamental building blocks of many wireless communication networks. Despite considerable progress in network information theory, available capacity results for ICs, specifically those with more than two users, are still very limited. One of the main difficulties in the analysis of these networks is how to establish useful capacity outer bounds for them. In this paper, novel techniques requiring subtle sequential applications of the Csiszar-Korner identity are developed to establish efficient single-letter outer bounds on the sum-rate capacity of interference networks. Then, by using the derived outer bounds, a full characterization of the sum-rate capacity is obtained for various multi-user ICs under specific conditions. Our capacity results hold for both discrete and Gaussian networks.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"41 1","pages":"1277-1281"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74227670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community Detection with Side Information via Semidefinite Programming","authors":"Mohammadjafar Esmaeili, H. Saad, Aria Nosratinia","doi":"10.1109/ISIT.2019.8849686","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849686","url":null,"abstract":"Semidefinite programming is known to be both efficient and asymptotically optimal in solving community detection problems, but it has been studied in this context only when observations are purely graphical in nature. In this paper, we extend the use of semidefinite programming in community detection to observations that have both a graphical and a nongraphical component. We consider the binary censored block model with n nodes and study the effect of partially revealed labels on the performance of semidefinite programming. We address the question: do partially revealed labels help the semidefinite programming solution as much as they help the maximum likelihood solutionƒ Our results are twofold. First, we show that partially revealed labels change the phase transition of exact recovery if and only if the information they provide grows no slower than Ω(log(n)). Second, we show that the semidefinite programming relaxation of maximum likelihood can achieve exact recovery down to the optimal threshold under partially revealed labels.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"09 1","pages":"420-424"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80119712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Deletion/Insertion of Zeros and Asymmetric Error Control Codes*","authors":"L. Tallini, Nawaf Alqwaifly, B. Bose","doi":"10.1109/ISIT.2019.8849470","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849470","url":null,"abstract":"This paper gives some theory and efficient design of binary block codes capable of correcting the deletions of the symbol \"0\" (referred to as 0-deletions) and/or the insertions of the symbol \"0\" (referred to as 0-insertions). This problem of correcting 0-deletions and/or 0-insertions (referred to as 0-errors) is shown to be equivalent to the efficient design of some L1 metric asymmetric error control codes over the natural alphabet, ℕ. In particular, it is shown that t 0-insertion correcting codes are actually capable of correcting t 0-errors, detecting (t+1) 0-errors and, simultaneously, detecting all occurrences of only 0-deletions or only 0-insertions in every received word (briefly, they are t-Sy0EC/(t + 1)-Sy0ED/AU0ED codes). From the relations with the L1 distance error control codes, new improved bounds are given for the optimal t 0-error correcting codes. In addition, some optimal non-systematic code designs are also given. Decoding can be efficiently performed by algebraic means with the Extended Euclidean Algorithm.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"578 1","pages":"2384-2388"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85737778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}