-
Hierarchical Personalized Federated Learning Over Massive Mobile Edge Computing Networks
Authors:
Chaoqun You,
Kun Guo,
Howard H. Yang,
Tony Q. S. Quek
Abstract:
Personalized Federated Learning (PFL) is a new Federated Learning (FL) paradigm, particularly tackling the heterogeneity issues brought by various mobile user equipments (UEs) in mobile edge computing (MEC) networks. However, due to the ever-increasing number of UEs and the complicated administrative work it brings, it is desirable to switch the PFL algorithm from its conventional two-layer framew…
▽ More
Personalized Federated Learning (PFL) is a new Federated Learning (FL) paradigm, particularly tackling the heterogeneity issues brought by various mobile user equipments (UEs) in mobile edge computing (MEC) networks. However, due to the ever-increasing number of UEs and the complicated administrative work it brings, it is desirable to switch the PFL algorithm from its conventional two-layer framework to a multiple-layer one. In this paper, we propose hierarchical PFL (HPFL), an algorithm for deploying PFL over massive MEC networks. The UEs in HPFL are divided into multiple clusters, and the UEs in each cluster forward their local updates to the edge server (ES) synchronously for edge model aggregation, while the ESs forward their edge models to the cloud server semi-asynchronously for global model aggregation. The above training manner leads to a tradeoff between the training loss in each round and the round latency. HPFL combines the objectives of training loss minimization and round latency minimization while jointly determining the optimal bandwidth allocation as well as the ES scheduling policy in the hierarchical learning framework. Extensive experiments verify that HPFL not only guarantees convergence in hierarchical aggregation frameworks but also has advantages in round training loss maximization and round latency minimization.
△ Less
Submitted 19 March, 2023;
originally announced March 2023.
-
Joint Beamforming for RIS-Assisted Integrated Sensing and Communication Systems
Authors:
Yongqing Xu,
Yong Li,
J. Andrew Zhang,
Marco Di Renzo,
Tony Q. S. Quek
Abstract:
Integrated sensing and communications (ISAC) is an emerging critical technique for the next generation of communication systems. However, due to multiple performance metrics used for communication and sensing, the limited degrees-of-freedom (DoF) in optimizing ISAC systems poses a challenge. Reconfigurable intelligent surfaces (RIS) can introduce new DoF for beamforming in ISAC systems, thereby en…
▽ More
Integrated sensing and communications (ISAC) is an emerging critical technique for the next generation of communication systems. However, due to multiple performance metrics used for communication and sensing, the limited degrees-of-freedom (DoF) in optimizing ISAC systems poses a challenge. Reconfigurable intelligent surfaces (RIS) can introduce new DoF for beamforming in ISAC systems, thereby enhancing the performance of communication and sensing simultaneously. In this paper, we propose two optimization techniques for beamforming in RIS-assisted ISAC systems. The first technique is an alternating optimization (AO) algorithm based on the semidefinite relaxation (SDR) method and a one-dimension iterative (ODI) algorithm, which can maximize the radar mutual information (MI) while imposing constraints on the communication rates. The second technique is an AO algorithm based on the Riemannian gradient (RG) method, which can maximize the weighted ISAC performance metrics. Simulation results verify the effectiveness of the proposed schemes. The AO-SDR-ODI method is shown to achieve better communication and sensing performance, than the AO-RG method, at a higher complexity. It is also shown that the mean-squared-error (MSE) of the estimates of the sensing parameters decreases as the radar MI increases.
△ Less
Submitted 24 January, 2024; v1 submitted 3 March, 2023;
originally announced March 2023.
-
A Cooperative Content Dissemination Framework for Fog-Based Internet of Vehicles
Authors:
Weihua Wu,
Peng Wang,
Yuan Zhang,
Weijia Han,
He Yi,
Tony Q. S. Quek
Abstract:
As the fog-based internet of vehicles (IoV) is equipped with rich perception, computing, communication and storage resources, it provides a new solution for the bulk data processing. However, the impact caused by the mobility of vehicles brings a challenge to the content scheduling and resource allocation of content dissemination service. In this paper, we propose a time-varying resource relations…
▽ More
As the fog-based internet of vehicles (IoV) is equipped with rich perception, computing, communication and storage resources, it provides a new solution for the bulk data processing. However, the impact caused by the mobility of vehicles brings a challenge to the content scheduling and resource allocation of content dissemination service. In this paper, we propose a time-varying resource relationship graph to model the intertwined impact of the perception, computation, communication and storage resources across multiple snapshots on the content dissemination process of IoV. Based on this graph model, the content dissemination process is modeled as a mathematical optimization problem, where the quality of service of both delay tolerant and delay sensitive services are considered. Owing to its NP-completeness, the optimization problem is decomposed into a joint link and subchannel scheduling subproblem and as well a joint power and flow control subproblem. Then, a cascaded low complexity scheduling algorithm is proposed for the joint link and subchannel scheduling subproblem. Moreover, a robust resource management algorithm is developed for the power and flow control subproblem, where the channel uncertainties in future snapshots are fully considered in the algorithm. Finally, we conduct simulations to show that the effectiveness of the proposed approaches outperforms other state-of-art approaches.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Personalizing Federated Learning with Over-the-Air Computations
Authors:
Zihan Chen,
Zeshen Li,
Howard H. Yang,
Tony Q. S. Quek
Abstract:
Federated edge learning is a promising technology to deploy intelligence at the edge of wireless networks in a privacy-preserving manner. Under such a setting, multiple clients collaboratively train a global generic model under the coordination of an edge server. But the training efficiency is often throttled by challenges arising from limited communication and data heterogeneity. This paper prese…
▽ More
Federated edge learning is a promising technology to deploy intelligence at the edge of wireless networks in a privacy-preserving manner. Under such a setting, multiple clients collaboratively train a global generic model under the coordination of an edge server. But the training efficiency is often throttled by challenges arising from limited communication and data heterogeneity. This paper presents a distributed training paradigm that employs analog over-the-air computation to address the communication bottleneck. Additionally, we leverage a bi-level optimization framework to personalize the federated learning model so as to cope with the data heterogeneity issue. As a result, it enhances the generalization and robustness of each client's local model. We elaborate on the model training procedure and its advantages over conventional frameworks. We provide a convergence analysis that theoretically demonstrates the training efficiency. We also conduct extensive experiments to validate the efficacy of the proposed framework.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Differentially Private Deep Q-Learning for Pattern Privacy Preservation in MEC Offloading
Authors:
Shuying Gan,
Marie Siew,
Chao Xu,
Tony Q. S. Quek
Abstract:
Mobile edge computing (MEC) is a promising paradigm to meet the quality of service (QoS) requirements of latency-sensitive IoT applications. However, attackers may eavesdrop on the offloading decisions to infer the edge server's (ES's) queue information and users' usage patterns, thereby incurring the pattern privacy (PP) issue. Therefore, we propose an offloading strategy which jointly minimizes…
▽ More
Mobile edge computing (MEC) is a promising paradigm to meet the quality of service (QoS) requirements of latency-sensitive IoT applications. However, attackers may eavesdrop on the offloading decisions to infer the edge server's (ES's) queue information and users' usage patterns, thereby incurring the pattern privacy (PP) issue. Therefore, we propose an offloading strategy which jointly minimizes the latency, ES's energy consumption, and task dropping rate, while preserving PP. Firstly, we formulate the dynamic computation offloading procedure as a Markov decision process (MDP). Next, we develop a Differential Privacy Deep Q-learning based Offloading (DP-DQO) algorithm to solve this problem while addressing the PP issue by injecting noise into the generated offloading decisions. This is achieved by modifying the deep Q-network (DQN) with a Function-output Gaussian process mechanism. We provide a theoretical privacy guarantee and a utility guarantee (learning error bound) for the DP-DQO algorithm and finally, conduct simulations to evaluate the performance of our proposed algorithm by comparing it with greedy and DQN-based algorithms.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Understanding the Gain of Deploying IRSs in Large-scale Heterogeneous Cellular Networks
Authors:
Hu Cheng,
Hongguang Sun,
Linyi Zhang,
Jiahui Li,
Xijun Wangg,
Tony Q. S. Quek
Abstract:
As the superior improvement on wireless network coverage, spectrum efficiency and energy efficiency, Intelligent reflecting surface (IRS) has received more and more attention. In this work, we consider a large-scale IRS-assisted heterogeneous cellular network (HCN) consisting of $K$ ($K \geq 2$) tiers of base stations (BSs) and one tier of passive IRSs. With tools from stochastic geometry, we anal…
▽ More
As the superior improvement on wireless network coverage, spectrum efficiency and energy efficiency, Intelligent reflecting surface (IRS) has received more and more attention. In this work, we consider a large-scale IRS-assisted heterogeneous cellular network (HCN) consisting of $K$ ($K \geq 2$) tiers of base stations (BSs) and one tier of passive IRSs. With tools from stochastic geometry, we analyze the coverage probability and network spatial throughput of the downlink IRS-assisted $K$-tier HCN. Compared with the conventional HCN, we observe the significant gain achieved by IRSs in coverage probability and network spatial throughput. The proposed analytical framework can be used to understand the limit of gain achieved by IRSs in HCN.
△ Less
Submitted 6 February, 2023;
originally announced February 2023.
-
Differentially Private Federated Clustering over Non-IID Data
Authors:
Yiwei Li,
Shuai Wang,
Chong-Yung Chi,
Tony Q. S. Quek
Abstract:
In this paper, we investigate federated clustering (FedC) problem, that aims to accurately partition unlabeled data samples distributed over massive clients into finite clusters under the orchestration of a parameter server, meanwhile considering data privacy. Though it is an NP-hard optimization problem involving real variables denoting cluster centroids and binary variables denoting the cluster…
▽ More
In this paper, we investigate federated clustering (FedC) problem, that aims to accurately partition unlabeled data samples distributed over massive clients into finite clusters under the orchestration of a parameter server, meanwhile considering data privacy. Though it is an NP-hard optimization problem involving real variables denoting cluster centroids and binary variables denoting the cluster membership of each data sample, we judiciously reformulate the FedC problem into a non-convex optimization problem with only one convex constraint, accordingly yielding a soft clustering solution. Then a novel FedC algorithm using differential privacy (DP) technique, referred to as DP-FedC, is proposed in which partial clients participation and multiple local model updating steps are also considered. Furthermore, various attributes of the proposed DP-FedC are obtained through theoretical analyses of privacy protection and convergence rate, especially for the case of non-identically and independently distributed (non-i.i.d.) data, that ideally serve as the guidelines for the design of the proposed DP-FedC. Then some experimental results on two real datasets are provided to demonstrate the efficacy of the proposed DP-FedC together with its much superior performance over some state-of-the-art FedC algorithms, and the consistency with all the presented analytical results.
△ Less
Submitted 30 October, 2023; v1 submitted 3 January, 2023;
originally announced January 2023.
-
Beyond ADMM: A Unified Client-variance-reduced Adaptive Federated Learning Framework
Authors:
Shuai Wang,
Yanqing Xu,
Zhiguo Wang,
Tsung-Hui Chang,
Tony Q. S. Quek,
Defeng Sun
Abstract:
As a novel distributed learning paradigm, federated learning (FL) faces serious challenges in dealing with massive clients with heterogeneous data distribution and computation and communication resources. Various client-variance-reduction schemes and client sampling strategies have been respectively introduced to improve the robustness of FL. Among others, primal-dual algorithms such as the altern…
▽ More
As a novel distributed learning paradigm, federated learning (FL) faces serious challenges in dealing with massive clients with heterogeneous data distribution and computation and communication resources. Various client-variance-reduction schemes and client sampling strategies have been respectively introduced to improve the robustness of FL. Among others, primal-dual algorithms such as the alternating direction of method multipliers (ADMM) have been found being resilient to data distribution and outperform most of the primal-only FL algorithms. However, the reason behind remains a mystery still. In this paper, we firstly reveal the fact that the federated ADMM is essentially a client-variance-reduced algorithm. While this explains the inherent robustness of federated ADMM, the vanilla version of it lacks the ability to be adaptive to the degree of client heterogeneity. Besides, the global model at the server under client sampling is biased which slows down the practical convergence. To go beyond ADMM, we propose a novel primal-dual FL algorithm, termed FedVRA, that allows one to adaptively control the variance-reduction level and biasness of the global model. In addition, FedVRA unifies several representative FL algorithms in the sense that they are either special instances of FedVRA or are close to it. Extensions of FedVRA to semi/un-supervised learning are also presented. Experiments based on (semi-)supervised image classification tasks demonstrate superiority of FedVRA over the existing schemes in learning scenarios with massive heterogeneous clients and client sampling.
△ Less
Submitted 18 January, 2023; v1 submitted 2 December, 2022;
originally announced December 2022.
-
Coverage Analysis for Cellular-Connected Random 3D Mobile UAVs with Directional Antennas
Authors:
Hongguang Sun,
Chao Ma,
Linyi Zhang,
Jiahui Li,
Xijun Wang,
Shuqin Li,
Tony Q. S. Quek
Abstract:
This letter proposes an analytical framework to evaluate the coverage performance of a cellular-connected unmanned aerial vehicle (UAV) network in which UAV user equipments (UAV-UEs) are equipped with directional antennas and move according to a three-dimensional (3D) mobility model. The ground base stations (GBSs) equipped with practical down-tilted antennas are distributed according to a Poisson…
▽ More
This letter proposes an analytical framework to evaluate the coverage performance of a cellular-connected unmanned aerial vehicle (UAV) network in which UAV user equipments (UAV-UEs) are equipped with directional antennas and move according to a three-dimensional (3D) mobility model. The ground base stations (GBSs) equipped with practical down-tilted antennas are distributed according to a Poisson point process (PPP). With tools from stochastic geometry, we derive the handover probability and coverage probability of a random UAV-UE under the strongest average received signal strength (RSS) association strategy. The proposed analytical framework allows to investigate the effect of UAV-UE antenna beamwidth, mobility speed, cell association, and vertical motions on both the handover probability and coverage probability. We conclude that the optimal UAV-UE antenna beamwidth decreases with the GBS density, and the omnidirectional antenna model is preferred in the sparse network scenario. What's more, the superiority of the strongest average RSS association over the nearest association diminishes with the increment of GBS density.
△ Less
Submitted 26 November, 2022;
originally announced November 2022.
-
Social Welfare Maximization for Collaborative Edge Computing: A Deep Reinforcement Learning-Based Approach
Authors:
Xingqiu He,
Yuhang Shen,
Hongxi Zhu,
Sheng Wang,
Chaoqun You,
Tony Q. S. Quek
Abstract:
Collaborative Edge Computing (CEC) is an effective method that improves the performance of Mobile Edge Computing (MEC) systems by offloading computation tasks from busy edge servers (ESs) to idle ones. However, ESs usually belong to different MEC service providers so they have no incentive to help others. To motivate cooperation among them, this paper proposes a cooperative mechanism where idle ES…
▽ More
Collaborative Edge Computing (CEC) is an effective method that improves the performance of Mobile Edge Computing (MEC) systems by offloading computation tasks from busy edge servers (ESs) to idle ones. However, ESs usually belong to different MEC service providers so they have no incentive to help others. To motivate cooperation among them, this paper proposes a cooperative mechanism where idle ESs can earn extra profits by sharing their spare computational resources. To achieve the optimal resource allocation, we formulate the social welfare maximization problem as a Markov Decision Process (MDP) and decompose it into two stages involving the allocation and execution of offloaded tasks. The first stage is solved by extending the well-known Deep Deterministic Policy Gradient (DDPG) algorithm. For the second stage, we first show that we only need to decide the processing order of tasks and the utilized computational resources. After that, we propose a dynamic programming and a Deep Reinforcement Learning (DRL)-based algorithm to solve the two types of decisions, respectively. Numerical results indicate that our algorithm significantly improves social welfare under various situations.
△ Less
Submitted 13 November, 2022;
originally announced November 2022.
-
MDC Enhanced IoT Networks: Network Modeling and Performance Analysis
Authors:
Hongguang Sun,
Yajun Ma,
Tony Q. S. Quek,
Xijun Wang,
Kun Guo,
Hongming Zhang
Abstract:
As a promising architecture, Mobile Data Collector (MDC) enhanced Internet of Things (IoT) exhibits broad prospects in efficient data collection and data aggregation especially for sparse deployment scenarios. Combining the tools from queueing theory and stochastic geometry, we propose an analytical framework to study the network performance of an MDC enhanced IoT network, in terms of coverage pro…
▽ More
As a promising architecture, Mobile Data Collector (MDC) enhanced Internet of Things (IoT) exhibits broad prospects in efficient data collection and data aggregation especially for sparse deployment scenarios. Combining the tools from queueing theory and stochastic geometry, we propose an analytical framework to study the network performance of an MDC enhanced IoT network, in terms of coverage probability, end-to-end delay and energy consumption. We derive the closed-form expressions for average contact and inter-contact time between a sensor and its associated MDC. By modeling the data collection system between a sensor and its associated MDCs as an M/G/1 queue system with vacations and general limited (G-limited) service, we first derive the queueing delay at the tagged sensor, and further obtain the end-to-end delay. The proposed analytical framework enables us to quantify the effect on network performance of key system parameters, such as MDC velocity, packet arrival rate, densities of sensors and MDCs, and contact radius. This study reveals that the MDC velocity has little impact on the coverage probability, and provides guidelines to minimize the end-to-end delay by optimizing the density and contact radius of sensors, and the velocity and density of MDCs.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
IRS-Assisted RF-powered IoT Networks:System Modeling and Performance Analysis
Authors:
Hongguang Sun,
Zelun Zhao,
Hu Cheng,
Jiangbin Lyu,
Xijun Wang,
Yan Zhang,
Tony Q. S. Quek
Abstract:
Emerged as a promising solution for future wireless communication systems, intelligent reflecting surface (IRS) is capable of reconfiguring the wireless propagation environment by adjusting the phase-shift of a large number of reflecting elements. To quantify the gain achieved by IRSs in the radio frequency (RF) powered Internet of Things (IoT) networks, in this work, we consider an IRS-assisted c…
▽ More
Emerged as a promising solution for future wireless communication systems, intelligent reflecting surface (IRS) is capable of reconfiguring the wireless propagation environment by adjusting the phase-shift of a large number of reflecting elements. To quantify the gain achieved by IRSs in the radio frequency (RF) powered Internet of Things (IoT) networks, in this work, we consider an IRS-assisted cellular-based RFpowered IoT network, where the cellular base stations (BSs) broadcast energy signal to IoT devices for energy harvesting (EH) in the charging stage, which is utilized to support the uplink (UL) transmissions in the subsequent UL stage. With tools from stochastic geometry, we first derive the distributions of the average signal power and interference power which are then used to obtain the energy coverage probability, UL coverage probability, overall coverage probability, spatial throughput and power efficiency, respectively. With the proposed analytical framework, we finally evaluate the effect on network performance of key system parameters, such as IRS density, IRS reflecting element number, charging stage ratio, etc. Compared with the conventional RF-powered IoT network, IRS passive beamforming brings the same level of enhancement in both energy coverage and UL coverage, leading to the unchanged optimal charging stage ratio when maximizing spatial throughput.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
FIRE: A Failure-Adaptive Reinforcement Learning Framework for Edge Computing Migrations
Authors:
Marie Siew,
Shikhar Sharma,
Zekai Li,
Kun Guo,
Chao Xu,
Tania Lorido-Botran,
Tony Q. S. Quek,
Carlee Joe-Wong
Abstract:
In edge computing, users' service profiles are migrated due to user mobility. Reinforcement learning (RL) frameworks have been proposed to do so, often trained on simulated data. However, existing RL frameworks overlook occasional server failures, which although rare, impact latency-sensitive applications like autonomous driving and real-time obstacle detection. Nevertheless, these failures (rare…
▽ More
In edge computing, users' service profiles are migrated due to user mobility. Reinforcement learning (RL) frameworks have been proposed to do so, often trained on simulated data. However, existing RL frameworks overlook occasional server failures, which although rare, impact latency-sensitive applications like autonomous driving and real-time obstacle detection. Nevertheless, these failures (rare events), being not adequately represented in historical training data, pose a challenge for data-driven RL algorithms. As it is impractical to adjust failure frequency in real-world applications for training, we introduce FIRE, a framework that adapts to rare events by training a RL policy in an edge computing digital twin environment. We propose ImRE, an importance sampling-based Q-learning algorithm, which samples rare events proportionally to their impact on the value function. FIRE considers delay, migration, failure, and backup placement costs across individual and shared service profiles. We prove ImRE's boundedness and convergence to optimality. Next, we introduce novel deep Q-learning (ImDQL) and actor critic (ImACRE) versions of our algorithm to enhance scalability. We extend our framework to accommodate users with varying risk tolerances. Through trace driven experiments, we show that FIRE reduces costs compared to vanilla RL and the greedy baseline in the event of failures.
△ Less
Submitted 22 September, 2024; v1 submitted 28 September, 2022;
originally announced September 2022.
-
Semi-Synchronous Personalized Federated Learning over Mobile Edge Networks
Authors:
Chaoqun You,
Daquan Feng,
Kun Guo,
Howard H. Yang,
Tony Q. S. Quek
Abstract:
Personalized Federated Learning (PFL) is a new Federated Learning (FL) approach to address the heterogeneity issue of the datasets generated by distributed user equipments (UEs). However, most existing PFL implementations rely on synchronous training to ensure good convergence performances, which may lead to a serious straggler problem, where the training time is heavily prolonged by the slowest U…
▽ More
Personalized Federated Learning (PFL) is a new Federated Learning (FL) approach to address the heterogeneity issue of the datasets generated by distributed user equipments (UEs). However, most existing PFL implementations rely on synchronous training to ensure good convergence performances, which may lead to a serious straggler problem, where the training time is heavily prolonged by the slowest UE. To address this issue, we propose a semi-synchronous PFL algorithm, termed as Semi-Synchronous Personalized FederatedAveraging (PerFedS$^2$), over mobile edge networks. By jointly optimizing the wireless bandwidth allocation and UE scheduling policy, it not only mitigates the straggler problem but also provides convergent training loss guarantees. We derive an upper bound of the convergence rate of PerFedS2 in terms of the number of participants per global round and the number of rounds. On this basis, the bandwidth allocation problem can be solved using analytical solutions and the UE scheduling policy can be obtained by a greedy algorithm. Experimental results verify the effectiveness of PerFedS2 in saving training time as well as guaranteeing the convergence of training loss, in contrast to synchronous and asynchronous PFL algorithms.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Joint User Association and Resource Pricing for Metaverse: Distributed and Centralized Approaches
Authors:
Xumin Huang,
Weifeng Zhong,
Jiangtian Nie,
Qin Hu,
Zehui Xiong,
Jiawen Kang,
Tony Q. S. Quek
Abstract:
Metaverse as the next-generation Internet provides users with physical-virtual world interactions. To improve the quality of immersive experience, users access to Metaverse service providers (MSPs) and purchase bandwidth resource to reduce the communication latency of the Metaverse services. The MSPs decide selling price of the bandwidth resource to maximize the revenue. This leads to a joint user…
▽ More
Metaverse as the next-generation Internet provides users with physical-virtual world interactions. To improve the quality of immersive experience, users access to Metaverse service providers (MSPs) and purchase bandwidth resource to reduce the communication latency of the Metaverse services. The MSPs decide selling price of the bandwidth resource to maximize the revenue. This leads to a joint user association and resource pricing problem between all users and MSPs. To tackle the problem, we formulate a Stackelberg game where the MSPs are game leaders and users are game followers. We resolve the Stackelberg equilibrium via the distributed and centralized approaches, according to different privacy requirements. In the distributed approach, the MSPs compete against each other to maximize the individual revenue, and a user selects an MSP in a probabilistic manner. The Stackelberg equilibrium is achieved in a privacy-friendly way. In the centralized approach, all MSPs and users accept the unified management and their strategies are instructed. The centralized approach acquires the superior decision-making performance but sacrifices the privacy of the game players. Finally, we provide numerical results to demonstrate the effectiveness and efficiency of our schemes.
△ Less
Submitted 13 August, 2022;
originally announced August 2022.
-
Hierarchical Multi-resource Fair Queueing for Packet Processing
Authors:
C. You,
Y. Zhao,
G. Feng,
T. Q. S. Quek,
L. Li
Abstract:
Various middleboxes are ubiquitously deployed in networks to perform packet processing functions, such as firewalling, proxy, scheduling, etc., for the flows passing through them. With the explosion of network traffic and the demand for multiple types of network resources, it has never been more challenging for a middlebox to provide Quality-of-Service (QoS) guarantees to grouped flows. Unfortunat…
▽ More
Various middleboxes are ubiquitously deployed in networks to perform packet processing functions, such as firewalling, proxy, scheduling, etc., for the flows passing through them. With the explosion of network traffic and the demand for multiple types of network resources, it has never been more challenging for a middlebox to provide Quality-of-Service (QoS) guarantees to grouped flows. Unfortunately, all currently existing fair queueing algorithms fail in supporting hierarchical scheduling, which is necessary to provide QoS guarantee to the grouped flows of multiple service classes. In this paper, we present two new multi-resource fair queueing algorithms to support hierarchical scheduling, collapsed Hierarchical Dominant Resource Fair Queueing (collapsed H-DRFQ) and dove-tailing H-DRFQ. Particularly, collapsed H-DRFQ transforms the hierarchy of grouped flows into a flat structure for flat scheduling while dove-tailing H-DRFQ iteratively performs flat scheduling to sibling nodes on the original hierarchy. Through rigorous theoretical analysis, we find that both algorithms can provide hierarchical share guarantees to individual flows, while the upper bound of packet delay in dove-tailing H-DRFQ is smaller than that of collapsed H-DRFQ. We implement the proposed algorithms on Click modular router and the experimental results verify our analytical results.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
UAV Trajectory, User Association and Power Control for Multi-UAV Enabled Energy Harvesting Communications: Offline Design and Online Reinforcement Learning
Authors:
Chien-Wei Fu,
Meng-Lin Ku,
Yu-Jia Chen,
Tony Q. S. Quek
Abstract:
In this paper, we consider multiple solar-powered wireless nodes which utilize the harvested solar energy to transmit collected data to multiple unmanned aerial vehicles (UAVs) in the uplink. In this context, we jointly design UAV flight trajectories, UAV-node communication associations, and uplink power control to effectively utilize the harvested energy and manage co-channel interference within…
▽ More
In this paper, we consider multiple solar-powered wireless nodes which utilize the harvested solar energy to transmit collected data to multiple unmanned aerial vehicles (UAVs) in the uplink. In this context, we jointly design UAV flight trajectories, UAV-node communication associations, and uplink power control to effectively utilize the harvested energy and manage co-channel interference within a finite time horizon. To ensure the fairness of wireless nodes, the design goal is to maximize the worst user rate. The joint design problem is highly non-convex and requires causal (future) knowledge of the instantaneous energy state information (ESI) and channel state information (CSI), which are difficult to predict in reality. To overcome these challenges, we propose an offline method based on convex optimization that only utilizes the average ESI and CSI. The problem is solved by three convex subproblems with successive convex approximation (SCA) and alternative optimization. We further design an online convex-assisted reinforcement learning (CARL) method to improve the system performance based on real-time environmental information. An idea of multi-UAV regulated flight corridors, based on the optimal offline UAV trajectories, is proposed to avoid unnecessary flight exploration by UAVs and enables us to improve the learning efficiency and system performance, as compared with the conventional reinforcement learning (RL) method. Computer simulations are used to verify the effectiveness of the proposed methods. The proposed CARL method provides 25% and 12% improvement on the worst user rate over the offline and conventional RL methods.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Analysis of Age of Information in Dual Updating Systems
Authors:
Zhengchuan Chen,
Dapeng Deng,
Howard H. Yang,
Nikolaos Pappas,
Limei Hu,
Yunjian Jia,
Min Wang,
Tony Q. S. Quek
Abstract:
We study the average Age of Information (AoI) and peak AoI (PAoI) of a dual-queue status update system that monitors a common stochastic process. Although the double queue parallel transmission is instrumental in reducing AoI, the out of order of data arrivals also imposes a significant challenge to the performance analysis. We consider two settings: the M-M system where the service time of two se…
▽ More
We study the average Age of Information (AoI) and peak AoI (PAoI) of a dual-queue status update system that monitors a common stochastic process. Although the double queue parallel transmission is instrumental in reducing AoI, the out of order of data arrivals also imposes a significant challenge to the performance analysis. We consider two settings: the M-M system where the service time of two servers is exponentially distributed; the M-D system in which the service time of one server is exponentially distributed and that of the other is deterministic. For the two dual-queue systems, closed-form expressions of average AoI and PAoI are derived by resorting to the graphic method and state flow graph analysis method. Our analysis reveals that compared with the single-queue system with an exponentially distributed service time, the average PAoI and the average AoI of the M-M system can be reduced by 33.3% and 37.5%, respectively. For the M-D system, the reduction in average PAoI and the average AoI are 27.7% and 39.7%, respectively. Numerical results show that the two dual-queue systems also outperform the M/M/2 single queue dual-server system with optimized arrival rate in terms of average AoI and PAoI.
△ Less
Submitted 2 July, 2022;
originally announced July 2022.
-
Towards Federated Long-Tailed Learning
Authors:
Zihan Chen,
Songshang Liu,
Hualiang Wang,
Howard H. Yang,
Tony Q. S. Quek,
Zuozhu Liu
Abstract:
Data privacy and class imbalance are the norm rather than the exception in many machine learning tasks. Recent attempts have been launched to, on one side, address the problem of learning from pervasive private data, and on the other side, learn from long-tailed data. However, both assumptions might hold in practical applications, while an effective method to simultaneously alleviate both issues i…
▽ More
Data privacy and class imbalance are the norm rather than the exception in many machine learning tasks. Recent attempts have been launched to, on one side, address the problem of learning from pervasive private data, and on the other side, learn from long-tailed data. However, both assumptions might hold in practical applications, while an effective method to simultaneously alleviate both issues is yet under development. In this paper, we focus on learning with long-tailed (LT) data distributions under the context of the popular privacy-preserved federated learning (FL) framework. We characterize three scenarios with different local or global long-tailed data distributions in the FL framework, and highlight the corresponding challenges. The preliminary results under different scenarios reveal that substantial future work are of high necessity to better resolve the characterized federated long-tailed learning tasks.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Age of Information: A Two-Sensor Status Update System Monitoring The Same Process
Authors:
Tianqing Yang,
Zhengchuan Chen,
Howard H. Yang,
Min Wang,
Yunjian Jia,
Tony Q. S. Quek
Abstract:
This work studies the average age of information (AoI) of a monitoring system in which two sensors are sensing the same physical process and update status to a common monitor using their dedicated channels. Generally, using redundant devices to update the status of a process can improve the information timeliness at the monitor, but the disordered arrivals of updates also make the AoI analysis cha…
▽ More
This work studies the average age of information (AoI) of a monitoring system in which two sensors are sensing the same physical process and update status to a common monitor using their dedicated channels. Generally, using redundant devices to update the status of a process can improve the information timeliness at the monitor, but the disordered arrivals of updates also make the AoI analysis challenging. To that end, we model the system as two M/M/1/1 parallel status updating queues. By leveraging tools from stochastic hybrid system (SHS), we provide a general approach to analyze the average AoI, whereas a closed-form expression can be obtained when the status arrival rates and/or the service rates are the same for the two sensors. Numerical results validate the correctness of the theoretical analysis.
△ Less
Submitted 12 June, 2022;
originally announced June 2022.
-
Server Free Wireless Federated Learning: Architecture, Algorithm, and Analysis
Authors:
Howard H. Yang,
Zihan Chen,
Tony Q. S. Quek
Abstract:
We demonstrate that merely analog transmissions and match filtering can realize the function of an edge server in federated learning (FL). Therefore, a network with massively distributed user equipments (UEs) can achieve large-scale FL without an edge server. We also develop a training algorithm that allows UEs to continuously perform local computing without being interrupted by the global paramet…
▽ More
We demonstrate that merely analog transmissions and match filtering can realize the function of an edge server in federated learning (FL). Therefore, a network with massively distributed user equipments (UEs) can achieve large-scale FL without an edge server. We also develop a training algorithm that allows UEs to continuously perform local computing without being interrupted by the global parameter uploading, which exploits the full potential of UEs' processing power. We derive convergence rates for the proposed schemes to quantify their training efficiency. The analyses reveal that when the interference obeys a Gaussian distribution, the proposed algorithm retrieves the convergence rate of a server-based FL. But if the interference distribution is heavy-tailed, then the heavier the tail, the slower the algorithm converges. Nonetheless, the system run time can be largely reduced by enabling computation in parallel with communication, whereas the gain is particularly pronounced when communication latency is high. These findings are corroborated via excessive simulations.
△ Less
Submitted 15 April, 2022;
originally announced April 2022.
-
FedCorr: Multi-Stage Federated Learning for Label Noise Correction
Authors:
Jingyi Xu,
Zihan Chen,
Tony Q. S. Quek,
Kai Fong Ernest Chong
Abstract:
Federated learning (FL) is a privacy-preserving distributed learning paradigm that enables clients to jointly train a global model. In real-world FL implementations, client data could have label noise, and different clients could have vastly different label noise levels. Although there exist methods in centralized learning for tackling label noise, such methods do not perform well on heterogeneous…
▽ More
Federated learning (FL) is a privacy-preserving distributed learning paradigm that enables clients to jointly train a global model. In real-world FL implementations, client data could have label noise, and different clients could have vastly different label noise levels. Although there exist methods in centralized learning for tackling label noise, such methods do not perform well on heterogeneous label noise in FL settings, due to the typically smaller sizes of client datasets and data privacy requirements in FL. In this paper, we propose $\texttt{FedCorr}$, a general multi-stage framework to tackle heterogeneous label noise in FL, without making any assumptions on the noise models of local clients, while still maintaining client data privacy. In particular, (1) $\texttt{FedCorr}$ dynamically identifies noisy clients by exploiting the dimensionalities of the model prediction subspaces independently measured on all clients, and then identifies incorrect labels on noisy clients based on per-sample losses. To deal with data heterogeneity and to increase training stability, we propose an adaptive local proximal regularization term that is based on estimated local noise levels. (2) We further finetune the global model on identified clean clients and correct the noisy labels for the remaining noisy clients after finetuning. (3) Finally, we apply the usual training on all clients to make full use of all local data. Experiments conducted on CIFAR-10/100 with federated synthetic label noise, and on a real-world noisy dataset, Clothing1M, demonstrate that $\texttt{FedCorr}$ is robust to label noise and substantially outperforms the state-of-the-art methods at multiple noise levels.
△ Less
Submitted 10 April, 2022;
originally announced April 2022.
-
Minimizing Age-upon-Decisions in Bufferless System: Service Scheduling and Decision Interval
Authors:
Shutong Chen,
Tianci Zhang,
Zhengchuan Chen,
Yunquan Dong,
Min Wang,
Yunjian Jia,
Tony Q. S. Quek
Abstract:
In Internet of Things (IoT), the decision timeliness of time-sensitive applications is jointly affected by the statistics of update process and decision process. This work considers an update-and-decision system with a Poisson-arrival bufferless queue, where updates are delivered and processed for making decisions with exponential or periodic intervals. We use age-upon-decisions (AuD) to character…
▽ More
In Internet of Things (IoT), the decision timeliness of time-sensitive applications is jointly affected by the statistics of update process and decision process. This work considers an update-and-decision system with a Poisson-arrival bufferless queue, where updates are delivered and processed for making decisions with exponential or periodic intervals. We use age-upon-decisions (AuD) to characterize timeliness of updates at decision moments, and the missing probability to specify whether updates are useful for decision-making. Our theoretical analyses 1) present the average AuDs and the missing probabilities for bufferless systems with exponential or deterministic decision intervals under different service time distributions; 2) show that for service scheduling, the deterministic service time achieves a lower average AuD and a smaller missing probability than the uniformly distributed and the negative exponentially distributed service time; 3) prove that the average AuD of periodical decision system is larger than and will eventually drop to that of Poisson decision system along with the increase of decision rate; however, the missing probability in periodical decision system is smaller than that of Poisson decision system. The numerical results and simulations verify the correctness of our analyses, and demonstrate that the bufferless systems outperform the systems applying infinite buffer length.
△ Less
Submitted 31 March, 2022; v1 submitted 23 March, 2022;
originally announced March 2022.
-
UAV Trajectory and Beamforming Optimization for Integrated Periodic Sensing and Communication
Authors:
Kaitao Meng,
Qingqing Wu,
Shaodan Ma,
Wen Chen,
Tony Q. S. Quek
Abstract:
Unmanned aerial vehicle (UAV) is expected to bring transformative improvement to the integrated sensing and communication (ISAC) system. However, due to shared spectrum resources, it is challenging to achieve a critical trade-off between these two integrated functionalities. To address this issue, we propose in this paper a new integrated \emph{periodic} sensing and communication mechanism for the…
▽ More
Unmanned aerial vehicle (UAV) is expected to bring transformative improvement to the integrated sensing and communication (ISAC) system. However, due to shared spectrum resources, it is challenging to achieve a critical trade-off between these two integrated functionalities. To address this issue, we propose in this paper a new integrated \emph{periodic} sensing and communication mechanism for the UAV-enable ISAC system. Specifically, the user achievable rate is maximized via jointly optimizing UAV trajectory, transmit precoder, and sensing start instant, subject to the sensing frequency and beam pattern gain constraints. Despite that this problem is highly non-convex and involves an infinite number of variables, we obtain the optimal transmit precoder and derive the optimal achievable rate in closed-form for any given UAV location to facilitate the UAV trajectory design. Furthermore, we first prove the structural symmetry between optimal solutions in different ISAC frames without location constraints and then propose a high-quality UAV trajectory and sensing optimization algorithm for the general location-constrained case. Simulation results corroborate the effectiveness of the proposed design and also unveil a more flexible trade-off in ISAC systems over benchmark schemes.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
Towards Effective Resource Procurement in MEC: a Resource Re-selling Framework
Authors:
Marie Siew,
Shikhar Sharma,
Kun Guo,
Desmond Cai,
Wanli Wen,
Carlee Joe-Wong,
Tony Q. S. Quek
Abstract:
On-demand and resource reservation pricing models have been widely used in cloud computing, catering to different user requirements. Nevertheless, in Multi-Access Edge Computing (MEC), as the edge has limited resources compared to the cloud, on-demand users may not get their jobs served on time, or at all, if too many resources were reserved by reservation plan users. Concurrently, reservation pla…
▽ More
On-demand and resource reservation pricing models have been widely used in cloud computing, catering to different user requirements. Nevertheless, in Multi-Access Edge Computing (MEC), as the edge has limited resources compared to the cloud, on-demand users may not get their jobs served on time, or at all, if too many resources were reserved by reservation plan users. Concurrently, reservation plan users may possess excess un-utilized quota. To optimize this resource mismatch scenario, we propose a Sharing Quota Model (SQM) where reservation plan users can re-sell unused resource quota to on-demand users, with the mobile network operator (MNO) taking a commission. To analyze the user's aggregate behavior at equilibrium and investigate the MNO's incentive of allowing re-selling, we formulate a 3-stage non-cooperative Stackelberg Game. Solving this game, we characterize the optimal strategies of buyers and re-sellers. We show that on aggregate, users' optimal strategies give rise to 4 disjoint regions, dependent on the MNO's prices and supply levels. Based on this, we characterise the MNO's optimal prices for on-demand users. Numerical results show that having both the sharing and on-demand pool gives the MNO an optimal revenue when the on-demand pool's supply is low, and when the MNO's commission is low.
△ Less
Submitted 8 November, 2023; v1 submitted 1 March, 2022;
originally announced March 2022.
-
Federated Stochastic Gradient Descent Begets Self-Induced Momentum
Authors:
Howard H. Yang,
Zuozhu Liu,
Yaru Fu,
Tony Q. S. Quek,
H. Vincent Poor
Abstract:
Federated learning (FL) is an emerging machine learning method that can be applied in mobile edge systems, in which a server and a host of clients collaboratively train a statistical model utilizing the data and computation resources of the clients without directly exposing their privacy-sensitive data. We show that running stochastic gradient descent (SGD) in such a setting can be viewed as addin…
▽ More
Federated learning (FL) is an emerging machine learning method that can be applied in mobile edge systems, in which a server and a host of clients collaboratively train a statistical model utilizing the data and computation resources of the clients without directly exposing their privacy-sensitive data. We show that running stochastic gradient descent (SGD) in such a setting can be viewed as adding a momentum-like term to the global aggregation process. Based on this finding, we further analyze the convergence rate of a federated learning system by accounting for the effects of parameter staleness and communication resources. These results advance the understanding of the Federated SGD algorithm, and also forges a link between staleness analysis and federated computing systems, which can be useful for systems designers.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Networking of Internet of UAVs: Challenges and Intelligent Approaches
Authors:
Peng Yang,
Xianbin Cao,
Tony Q. S. Quek,
Dapeng Oliver Wu
Abstract:
Internet of unmanned aerial vehicle (I-UAV) networks promise to accomplish sensing and transmission tasks quickly, robustly, and cost-efficiently via effective cooperation among UAVs. To achieve the promising benefits, the crucial I-UAV networking issue should be tackled. This article argues that I-UAV networking can be classified into three categories, quality-of-service (QoS) driven networking,…
▽ More
Internet of unmanned aerial vehicle (I-UAV) networks promise to accomplish sensing and transmission tasks quickly, robustly, and cost-efficiently via effective cooperation among UAVs. To achieve the promising benefits, the crucial I-UAV networking issue should be tackled. This article argues that I-UAV networking can be classified into three categories, quality-of-service (QoS) driven networking, quality-of-experience (QoE) driven networking, and situation aware networking. Each category of networking poses emerging challenges which have severe effects on the safe and efficient accomplishment of I-UAV missions. This article elaborately analyzes these challenges and expounds on the corresponding intelligent approaches to tackle the I-UAV networking issue. Besides, considering the uplifting effect of extending the scalability of I-UAV networks through cooperating with high altitude platforms (HAPs), this article gives an overview of the integrated HAP and I-UAV networks and presents the corresponding networking challenges and intelligent approaches.
△ Less
Submitted 13 November, 2021;
originally announced November 2021.
-
Belief Propagation based Joint Detection and Decoding for Resistive Random Access Memories
Authors:
Ce Sun,
Kui Cai,
Guanghui Song,
Tony Q. S. Quek,
Zesong Fei
Abstract:
Despite the great promises that the resistive random access memory (ReRAM) has shown as the next generation of non-volatile memory technology, its crossbar array structure leads to a severe sneak path interference to the signal read back from the memory cell. In this paper, we first propose a novel belief propagation (BP) based detector for the sneak path interference in ReRAM. Based on the condit…
▽ More
Despite the great promises that the resistive random access memory (ReRAM) has shown as the next generation of non-volatile memory technology, its crossbar array structure leads to a severe sneak path interference to the signal read back from the memory cell. In this paper, we first propose a novel belief propagation (BP) based detector for the sneak path interference in ReRAM. Based on the conditions for a sneak path to occur and the dependence of the states of the memory cells that are involved in the sneak path, a Tanner graph for the ReRAM channel is constructed, inside which specific messages are updated iteratively to get a better estimation of the sneak path affected cells. We further combine the graph of the designed BP detector with that of the BP decoder of the polar codes to form a joint detector and decoder. Tailored for the joint detector and decoder over the ReRAM channel, effective polar codes are constructed using the genetic algorithm. Simulation results show that the BP detector can effectively detect the cells affected by the sneak path, and the proposed polar codes and the joint detector and decoder can significantly improve the error rate performance of ReRAM.
△ Less
Submitted 3 November, 2021; v1 submitted 2 November, 2021;
originally announced November 2021.
-
Distributed Reinforcement Learning for Privacy-Preserving Dynamic Edge Caching
Authors:
Shengheng Liu,
Chong Zheng,
Yongming Huang,
Tony Q. S. Quek
Abstract:
Mobile edge computing (MEC) is a prominent computing paradigm which expands the application fields of wireless communication. Due to the limitation of the capacities of user equipments and MEC servers, edge caching (EC) optimization is crucial to the effective utilization of the caching resources in MEC-enabled wireless networks. However, the dynamics and complexities of content popularities over…
▽ More
Mobile edge computing (MEC) is a prominent computing paradigm which expands the application fields of wireless communication. Due to the limitation of the capacities of user equipments and MEC servers, edge caching (EC) optimization is crucial to the effective utilization of the caching resources in MEC-enabled wireless networks. However, the dynamics and complexities of content popularities over space and time as well as the privacy preservation of users pose significant challenges to EC optimization. In this paper, a privacy-preserving distributed deep deterministic policy gradient (P2D3PG) algorithm is proposed to maximize the cache hit rates of devices in the MEC networks. Specifically, we consider the fact that content popularities are dynamic, complicated and unobservable, and formulate the maximization of cache hit rates on devices as distributed problems under the constraints of privacy preservation. In particular, we convert the distributed optimizations into distributed model-free Markov decision process problems and then introduce a privacy-preserving federated learning method for popularity prediction. Subsequently, a P2D3PG algorithm is developed based on distributed reinforcement learning to solve the distributed problems. Simulation results demonstrate the superiority of the proposed approach in improving EC hit rate over the baseline methods while preserving user privacy.
△ Less
Submitted 1 November, 2021; v1 submitted 19 October, 2021;
originally announced October 2021.
-
Optimal Distribution Design for Irregular Repetition Slotted ALOHA with Multi-Packet Reception
Authors:
Zhengchuan Chen,
Yifan Feng,
Chundie Feng,
Liang Liang,
Yunjian Jia,
Tony Q. S. Quek
Abstract:
Associated with multi-packet reception at the access point, irregular repetition slotted ALOHA (IRSA) holds a great potential in improving the access capacity of massive machine type communication systems. Considering the time-frequency resource efficiency, K = 2 (multi-packet reception capability) may be the most suitable scheme for scenarios that allow smaller resource efficiency in exchange for…
▽ More
Associated with multi-packet reception at the access point, irregular repetition slotted ALOHA (IRSA) holds a great potential in improving the access capacity of massive machine type communication systems. Considering the time-frequency resource efficiency, K = 2 (multi-packet reception capability) may be the most suitable scheme for scenarios that allow smaller resource efficiency in exchange for greater throughput. In this paper, we analytically derive an optimal transmission probability distribution for IRSA with K = 2, which achieves a significant higher load threshold than the existing benchmark distributions. In addition, the energy efficiency optimization in terms of the maximum repetition rate is also presented.
△ Less
Submitted 15 October, 2021;
originally announced October 2021.
-
Secrecy Offloading Rate Maximization for Multi-Access Mobile Edge Computing Networks
Authors:
Mingxiong Zhao,
Huiqi Bao,
Li Yin,
Jianping Yao,
Tony Q. S. Quek
Abstract:
This letter considers a multi-access mobile edge computing (MEC) network consisting of multiple users, multiple base stations, and a malicious eavesdropper. Specifically, the users adopt the partial offloading strategy by partitioning the computation task into several parts. One is executed locally and the others are securely offloaded to multiple MEC servers integrated into the base stations by l…
▽ More
This letter considers a multi-access mobile edge computing (MEC) network consisting of multiple users, multiple base stations, and a malicious eavesdropper. Specifically, the users adopt the partial offloading strategy by partitioning the computation task into several parts. One is executed locally and the others are securely offloaded to multiple MEC servers integrated into the base stations by leveraging the physical layer security to combat the eavesdropping. We jointly optimize power allocation, task partition, subcarrier allocation, and computation resource to maximize the secrecy offloading rate of the users, subject to communication and computation resource constraints. Numerical results demonstrate that our proposed scheme can respectively improve the secrecy offloading rate 1.11%--1.39% and 15.05%--17.35% (versus the increase of tasks' latency requirements), and 1.30%--1.75% and 6.08%--9.22% (versus the increase of the maximum transmit power) compared with the two benchmarks. Moreover, it further emphasizes the necessity of conducting computation offloading over multiple MEC servers.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
Spatiotemporal Analysis for Age of Information in Random Access Networks under Last-Come First-Serve with Replacement Protocol
Authors:
Howard H. Yang,
Ahmed Arafa,
Tony Q. S. Quek,
H. Vincent Poor
Abstract:
We investigate the age-of-information (AoI) in the context of random access networks, in which transmitters need to send a sequence of information packets to the intended receivers over a shared spectrum. Due to interference, the dynamics at the link pairs will interact with each other over both space and time, and the effects of these spatiotemporal interactions on the AoI are not well understood…
▽ More
We investigate the age-of-information (AoI) in the context of random access networks, in which transmitters need to send a sequence of information packets to the intended receivers over a shared spectrum. Due to interference, the dynamics at the link pairs will interact with each other over both space and time, and the effects of these spatiotemporal interactions on the AoI are not well understood. In this paper, we straddle queueing theory and stochastic geometry to establish an analytical framework, that accounts for the interplay between the temporal traffic attributes and spatial network topology, for such a study. Specifically, we derive accurate and tractable expressions to quantify the network average AoI as well as the outage probability of peak AoI. Besides, we develop a decentralized channel access policy that exploits the local observation at each node to make transmission decisions that minimize the AoI. Our analysis reveals that when the packet transmissions are scheduled in a last-come first-serve (LCFS) order, whereas the newly incoming packets can replace the undelivered ones, depending on the deployment density, there may or may not exist a tradeoff on the packet arrival rate that minimizes the network average AoI. Moreover, the slotted ALOHA protocol is shown to be instrumental in reducing the AoI when the packet arrival rates are high, yet it cannot contribute to decreasing the AoI in the regime of infrequent packet arrivals. The numerical results also confirm the efficacy of the proposed scheme, where the gain is particularly pronounced when the network grows in size because our method is able to adapt the channel access probabilities with the change of ambient environment.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Mobility-Aware Cluster Federated Learning in Hierarchical Wireless Networks
Authors:
Chenyuan Feng,
Howard H. Yang,
Deshun Hu,
Zhiwei Zhao,
Tony Q. S. Quek,
Geyong Min
Abstract:
Implementing federated learning (FL) algorithms in wireless networks has garnered a wide range of attention. However, few works have considered the impact of user mobility on the learning performance. To fill this research gap, firstly, we develop a theoretical model to characterize the hierarchical federated learning (HFL) algorithm in wireless networks where the mobile users may roam across mult…
▽ More
Implementing federated learning (FL) algorithms in wireless networks has garnered a wide range of attention. However, few works have considered the impact of user mobility on the learning performance. To fill this research gap, firstly, we develop a theoretical model to characterize the hierarchical federated learning (HFL) algorithm in wireless networks where the mobile users may roam across multiple edge access points, leading to incompletion of inconsistent FL training. Secondly, we provide the convergence analysis of HFL with user mobility. Our analysis proves that the learning performance of HFL deteriorates drastically with highly-mobile users. And this decline in the learning performance will be exacerbated with small number of participants and large data distribution divergences among local data of users. To circumvent these issues, we propose a mobility-aware cluster federated learning (MACFL) algorithm by redesigning the access mechanism, local update rule and model aggregation scheme. Finally, we provide experiments to evaluate the learning performance of HFL and our MACFL. The results show that our MACFL can enhance the learning performance, especially for three different cases, namely, the case of users with non-independent and identical distribution data, the case of users with high mobility, and the cases with a small number of users.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Dynamic Attention-based Communication-Efficient Federated Learning
Authors:
Zihan Chen,
Kai Fong Ernest Chong,
Tony Q. S. Quek
Abstract:
Federated learning (FL) offers a solution to train a global machine learning model while still maintaining data privacy, without needing access to data stored locally at the clients. However, FL suffers performance degradation when client data distribution is non-IID, and a longer training duration to combat this degradation may not necessarily be feasible due to communication limitations. To addr…
▽ More
Federated learning (FL) offers a solution to train a global machine learning model while still maintaining data privacy, without needing access to data stored locally at the clients. However, FL suffers performance degradation when client data distribution is non-IID, and a longer training duration to combat this degradation may not necessarily be feasible due to communication limitations. To address this challenge, we propose a new adaptive training algorithm $\texttt{AdaFL}$, which comprises two components: (i) an attention-based client selection mechanism for a fairer training scheme among the clients; and (ii) a dynamic fraction method to balance the trade-off between performance stability and communication efficiency. Experimental results show that our $\texttt{AdaFL}$ algorithm outperforms the usual $\texttt{FedAvg}$ algorithm, and can be incorporated to further improve various state-of-the-art FL algorithms, with respect to three aspects: model accuracy, performance stability, and communication efficiency.
△ Less
Submitted 12 August, 2021;
originally announced August 2021.
-
Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach
Authors:
Mao V. Ngo,
Tie Luo,
Tony Q. S. Quek
Abstract:
The advances in deep neural networks (DNN) have significantly enhanced real-time detection of anomalous data in IoT applications. However, the complexity-accuracy-delay dilemma persists: complex DNN models offer higher accuracy, but typical IoT devices can barely afford the computation load, and the remedy of offloading the load to the cloud incurs long delay. In this paper, we address this challe…
▽ More
The advances in deep neural networks (DNN) have significantly enhanced real-time detection of anomalous data in IoT applications. However, the complexity-accuracy-delay dilemma persists: complex DNN models offer higher accuracy, but typical IoT devices can barely afford the computation load, and the remedy of offloading the load to the cloud incurs long delay. In this paper, we address this challenge by proposing an adaptive anomaly detection scheme with hierarchical edge computing (HEC). Specifically, we first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer. Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network. We also incorporate a parallelism policy training method to accelerate the training process by taking advantage of distributed models. We build an HEC testbed using real IoT devices, implement and evaluate our contextual-bandit approach with both univariate and multivariate IoT datasets. In comparison with both baseline and state-of-the-art schemes, our adaptive approach strikes the best accuracy-delay tradeoff on the univariate dataset, and achieves the best accuracy and F1-score on the multivariate dataset with only negligibly longer delay than the best (but inflexible) scheme.
△ Less
Submitted 9 August, 2021;
originally announced August 2021.
-
When to Preprocess? Keeping Information Fresh for Computing Enable Internet of Things
Authors:
Xijun Wang,
Minghao Fang,
Chao Xu,
Howard H. Yang,
Xinghua Sun,
Xiang Chen,
Tony Q. S. Quek
Abstract:
Age of information (AoI), a notion that measures the information freshness, is an essential performance measure for time-critical applications in Internet of Things (IoT). With the surge of computing resources at the IoT devices, it is possible to preprocess the information packets that contain the status update before sending them to the destination so as to alleviate the transmission burden. How…
▽ More
Age of information (AoI), a notion that measures the information freshness, is an essential performance measure for time-critical applications in Internet of Things (IoT). With the surge of computing resources at the IoT devices, it is possible to preprocess the information packets that contain the status update before sending them to the destination so as to alleviate the transmission burden. However, the additional time and energy expenditure induced by computing also make the optimal updating a non-trivial problem. In this paper, we consider a time-critical IoT system, where the IoT device is capable of preprocessing the status update before the transmission. Particularly, we aim to jointly design the preprocessing and transmission so that the weighted sum of the average AoI of the destination and the energy consumption of the IoT device is minimized. Due to the heterogeneity in transmission and computation capacities, the durations of distinct actions of the IoT device are non-uniform. Therefore, we formulate the status updating problem as an infinite horizon average cost semi-Markov decision process (SMDP) and then transform it into a discrete-time Markov decision process. We demonstrate that the optimal policy is of threshold type with respect to the AoI. Equipped with this, a structure-aware relative policy iteration algorithm is proposed to obtain the optimal policy of the SMDP. Our analysis shows that preprocessing is more beneficial in regimes of high AoIs, given it can reduce the time required for updates. We further prove the switching structure of the optimal policy in a special scenario, where the status updates are transmitted over a reliable channel, and derive the optimal threshold. Finally, simulation results demonstrate the efficacy of preprocessing and show that the proposed policy outperforms two baseline policies.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Revisiting Analog Over-the-Air Machine Learning: The Blessing and Curse of Interference
Authors:
Howard H. Yang,
Zihan Chen,
Tony Q. S. Quek,
H. Vincent Poor
Abstract:
We study a distributed machine learning problem carried out by an edge server and multiple agents in a wireless network. The objective is to minimize a global function that is a sum of the agents' local loss functions. And the optimization is conducted by analog over-the-air model training. Specifically, each agent modulates its local gradient onto a set of waveforms and transmits to the edge serv…
▽ More
We study a distributed machine learning problem carried out by an edge server and multiple agents in a wireless network. The objective is to minimize a global function that is a sum of the agents' local loss functions. And the optimization is conducted by analog over-the-air model training. Specifically, each agent modulates its local gradient onto a set of waveforms and transmits to the edge server simultaneously. From the received analog signal the edge server extracts a noisy aggregated gradient which is distorted by the channel fading and interference, and uses it to update the global model and feedbacks to all the agents for another round of local computing. Since the electromagnetic interference generally exhibits a heavy-tailed intrinsic, we use the $α$-stable distribution to model its statistic. In consequence, the global gradient has an infinite variance that hinders the use of conventional techniques for convergence analysis that rely on second-order moments' existence. To circumvent this challenge, we take a new route to establish the analysis of convergence rate, as well as generalization error, of the algorithm. Our analyses reveal a two-sided effect of the interference on the overall training procedure. On the negative side, heavy tail noise slows down the convergence rate of the model training: the heavier the tail in the distribution of interference, the slower the algorithm converges. On the positive side, heavy tail noise has the potential to increase the generalization power of the trained model: the heavier the tail, the better the model generalizes. This perhaps counterintuitive conclusion implies that the prevailing thinking on interference -- that it is only detrimental to the edge learning system -- is outdated and we shall seek new techniques that exploit, rather than simply mitigate, the interference for better machine learning in wireless networks.
△ Less
Submitted 2 December, 2021; v1 submitted 25 July, 2021;
originally announced July 2021.
-
Feeling of Presence Maximization: mmWave-Enabled Virtual Reality Meets Deep Reinforcement Learning
Authors:
Peng Yang,
Tony Q. S. Quek,
Jingxuan Chen,
Chaoqun You,
Xianbin Cao
Abstract:
This paper investigates the problem of providing ultra-reliable and energy-efficient virtual reality (VR) experiences for wireless mobile users. To ensure reliable ultra-high-definition (UHD) video frame delivery to mobile users and enhance their immersive visual experiences, a coordinated multipoint (CoMP) transmission technique and millimeter wave (mmWave) communications are exploited. Owing to…
▽ More
This paper investigates the problem of providing ultra-reliable and energy-efficient virtual reality (VR) experiences for wireless mobile users. To ensure reliable ultra-high-definition (UHD) video frame delivery to mobile users and enhance their immersive visual experiences, a coordinated multipoint (CoMP) transmission technique and millimeter wave (mmWave) communications are exploited. Owing to user movement and time-varying wireless channels, the wireless VR experience enhancement problem is formulated as a sequence-dependent and mixed-integer problem with a goal of maximizing users' feeling of presence (FoP) in the virtual world, subject to power consumption constraints on access points (APs) and users' head-mounted displays (HMDs). The problem, however, is hard to be directly solved due to the lack of users' accurate tracking information and the sequence-dependent and mixed-integer characteristics. To overcome this challenge, we develop a parallel echo state network (ESN) learning method to predict users' tracking information by training fresh and historical tracking samples separately collected by APs. With the learnt results, we propose a deep reinforcement learning (DRL) based optimization algorithm to solve the formulated problem. In this algorithm, we implement deep neural networks (DNNs) as a scalable solution to produce integer decision variables and solving a continuous power control problem to criticize the integer decision variables. Finally, the performance of the proposed algorithm is compared with various benchmark algorithms, and the impact of different design parameters is also discussed. Simulation results demonstrate that the proposed algorithm is more 4.14% energy-efficient than the benchmark algorithms.
△ Less
Submitted 8 July, 2021; v1 submitted 3 June, 2021;
originally announced July 2021.
-
Learning Autonomy in Management of Wireless Random Networks
Authors:
Hoon Lee,
Sang Hyun Lee,
Tony Q. S. Quek
Abstract:
This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes. Individual nodes decide their optimal states with distributed coordination among other nodes through randomly varying backhaul links. This poses a technical challenge in distributed universal optimization policy robust to a ra…
▽ More
This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes. Individual nodes decide their optimal states with distributed coordination among other nodes through randomly varying backhaul links. This poses a technical challenge in distributed universal optimization policy robust to a random topology of the wireless network, which has not been properly addressed by conventional deep neural networks (DNNs) with rigid structural configurations. We develop a flexible DNN formalism termed distributed message-passing neural network (DMPNN) with forward and backward computations independent of the network topology. A key enabler of this approach is an iterative message-sharing strategy through arbitrarily connected backhaul links. The DMPNN provides a convergent solution for iterative coordination by learning numerous random backhaul interactions. The DMPNN is investigated for various configurations of the power control in wireless networks, and intensive numerical results prove its universality and viability over conventional optimization and DNN approaches.
△ Less
Submitted 15 June, 2021;
originally announced June 2021.
-
Optimal Status Update for Caching Enabled IoT Networks: A Dueling Deep R-Network Approach
Authors:
Chao Xu,
Yiping Xie,
Xijun Wang,
Howard H. Yang,
Dusit Niyato,
Tony Q. S. Quek
Abstract:
In the Internet of Things (IoT) networks, caching is a promising technique to alleviate energy consumption of sensors by responding to users' data requests with the data packets cached in the edge caching node (ECN). However, without an efficient status update strategy, the information obtained by users may be stale, which in return would inevitably deteriorate the accuracy and reliability of deri…
▽ More
In the Internet of Things (IoT) networks, caching is a promising technique to alleviate energy consumption of sensors by responding to users' data requests with the data packets cached in the edge caching node (ECN). However, without an efficient status update strategy, the information obtained by users may be stale, which in return would inevitably deteriorate the accuracy and reliability of derived decisions for real-time applications. In this paper, we focus on striking the balance between the information freshness, in terms of age of information (AoI), experienced by users and energy consumed by sensors, by appropriately activating sensors to update their current status. Particularly, we first depict the evolutions of the AoI with each sensor from different users' perspective with time steps of non-uniform duration, which are determined by both the users' data requests and the ECN's status update decision. Then, we formulate a non-uniform time step based dynamic status update optimization problem to minimize the long-term average cost, jointly considering the average AoI and energy consumption. To this end, a Markov Decision Process is formulated and further, a dueling deep R-network based dynamic status update algorithm is devised by combining dueling deep Q-network and tabular R-learning, with which challenges from the curse of dimensionality and unknown of the environmental dynamics can be addressed. Finally, extensive simulations are conducted to validate the effectiveness of our proposed algorithm by comparing it with five baseline deep reinforcement learning algorithms and policies.
△ Less
Submitted 13 June, 2021;
originally announced June 2021.
-
Training Classifiers that are Universally Robust to All Label Noise Levels
Authors:
Jingyi Xu,
Tony Q. S. Quek,
Kai Fong Ernest Chong
Abstract:
For classification tasks, deep neural networks are prone to overfitting in the presence of label noise. Although existing methods are able to alleviate this problem at low noise levels, they encounter significant performance reduction at high noise levels, or even at medium noise levels when the label noise is asymmetric. To train classifiers that are universally robust to all noise levels, and th…
▽ More
For classification tasks, deep neural networks are prone to overfitting in the presence of label noise. Although existing methods are able to alleviate this problem at low noise levels, they encounter significant performance reduction at high noise levels, or even at medium noise levels when the label noise is asymmetric. To train classifiers that are universally robust to all noise levels, and that are not sensitive to any variation in the noise model, we propose a distillation-based framework that incorporates a new subcategory of Positive-Unlabeled learning. In particular, we shall assume that a small subset of any given noisy dataset is known to have correct labels, which we treat as "positive", while the remaining noisy subset is treated as "unlabeled". Our framework consists of the following two components: (1) We shall generate, via iterative updates, an augmented clean subset with additional reliable "positive" samples filtered from "unlabeled" samples; (2) We shall train a teacher model on this larger augmented clean set. With the guidance of the teacher model, we then train a student model on the whole dataset. Experiments were conducted on the CIFAR-10 dataset with synthetic label noise at multiple noise levels for both symmetric and asymmetric noise. The results show that our framework generally outperforms at medium to high noise levels. We also evaluated our framework on Clothing1M, a real-world noisy dataset, and we achieved 2.94% improvement in accuracy over existing state-of-the-art methods.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
Physical Layer Security for UAV Communications in 5G and Beyond Networks
Authors:
Jue Wang,
Xuanxuan Wang,
Ruifeng Gao,
Chengleyang Lei,
Wei Feng,
Ning Ge,
Shi Jin,
Tony Q. S. Quek
Abstract:
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing unprecedented interest in both military and civil applications to enable agile wireless communications and provide ubiquitous connectivity. Mainly operating in an open environment, UAV communications can benefit from dominant line-of-sight links; however, it on the other hand renders the UAVs more vulnerable…
▽ More
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing unprecedented interest in both military and civil applications to enable agile wireless communications and provide ubiquitous connectivity. Mainly operating in an open environment, UAV communications can benefit from dominant line-of-sight links; however, it on the other hand renders the UAVs more vulnerable to malicious eavesdropping or jamming attacks. Recently, physical layer security (PLS), which exploits the inherent randomness of the wireless channels for secure communications, has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches. In this paper, a comprehensive survey on the current achievements of the UAV-aided wireless communications is conducted from the PLS perspective. We first introduce the basic concepts of UAV communications including the typical static/mobile deployment scenarios, the unique characteristics of air-to-ground channels, as well as various roles that a UAV may act when PLS is concerned. Then, we introduce the widely used secrecy performance metrics and start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems, and extend the discussion to a more general scenario where the UAVs' mobility is further exploited. For both cases, respectively, we summarize the commonly adopted methodologies in the corresponding analysis and design, then describe important works in the literature in detail. Finally, potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS in 5G and beyond networks.
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
Learning-Based Robust Resource allocation for D2D Underlaying Cellular Network
Authors:
Weihua Wu,
Runzi Liu,
Qinghai Yang,
Tony Q. S. Quek
Abstract:
In this paper, we study the resource allocation in D2D underlaying cellular network with uncertain channel state information (CSI). For satisfying the diversity requirements of different users, i.e. the minimum rate requirement for cellular user and the reliability requirement for D2D user, we attempt to maximize the cellular user's throughput whilst ensuring a chance constraint for D2D user. Then…
▽ More
In this paper, we study the resource allocation in D2D underlaying cellular network with uncertain channel state information (CSI). For satisfying the diversity requirements of different users, i.e. the minimum rate requirement for cellular user and the reliability requirement for D2D user, we attempt to maximize the cellular user's throughput whilst ensuring a chance constraint for D2D user. Then, a robust resource allocation framework is proposed for solving the highly intractable chance constraint about D2D reliability requirement, where the CSI uncertainties are represented as a deterministic set and the reliability requirement is enforced to hold for any uncertain CSI within it. Then, a symmetrical-geometry-based learning approach is developed to model the uncertain CSI into polytope, ellipsoidal and box. After that, we derive the robust counterpart of the chance constraint under these uncertainty sets as the computation convenient convex sets. To overcome the conservatism of the symmetrical-geometry-based uncertainty sets, we develop a support vector clustering (SVC)-based approach to model uncertain CSI as a compact convex uncertainty set. Based on that, the chance constraint of D2D is converted into a linear convex set. Then, we develop a bisection search-based power allocation algorithm for solving the resource allocation in D2D underlaying cellular network with different robust counterparts. Finally, we conduct the simulation to compare the proposed robust optimization approaches with the non-robust one.
△ Less
Submitted 18 May, 2021;
originally announced May 2021.
-
Two-Stage Stochastic Optimization via Primal-Dual Decomposition and Deep Unrolling
Authors:
An Liu,
Rui Yang,
Tony Q. S. Quek,
Min-Jian Zhao
Abstract:
We consider a two-stage stochastic optimization problem, in which a long-term optimization variable is coupled with a set of short-term optimization variables in both objective and constraint functions. Despite that two-stage stochastic optimization plays a critical role in various engineering and scientific applications, there still lack efficient algorithms, especially when the long-term and sho…
▽ More
We consider a two-stage stochastic optimization problem, in which a long-term optimization variable is coupled with a set of short-term optimization variables in both objective and constraint functions. Despite that two-stage stochastic optimization plays a critical role in various engineering and scientific applications, there still lack efficient algorithms, especially when the long-term and short-term variables are coupled in the constraints. To overcome the challenge caused by tightly coupled stochastic constraints, we first establish a two-stage primal-dual decomposition (PDD) method to decompose the two-stage problem into a long-term problem and a family of short-term subproblems. Then we propose a PDD-based stochastic successive convex approximation (PDD-SSCA) algorithmic framework to find KKT solutions for two-stage stochastic optimization problems. At each iteration, PDD-SSCA first runs a short-term sub-algorithm to find stationary points of the short-term subproblems associated with a mini-batch of the state samples. Then it constructs a convex surrogate for the long-term problem based on the deep unrolling of the short-term sub-algorithm and the back propagation method. Finally, the optimal solution of the convex surrogate problem is solved to generate the next iterate. We establish the almost sure convergence of PDD-SSCA and customize the algorithmic framework to solve two important application problems. Simulations show that PDD-SSCA can achieve superior performance over existing solutions.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Hybrid Satellite-UAV-Terrestrial Networks for 6G Ubiquitous Coverage: A Maritime Communications Perspective
Authors:
Yanmin Wang,
Wei Feng,
Jue Wang,
Tony Q. S. Quek
Abstract:
In the coming smart ocean era, reliable and efficient communications are crucial for promoting a variety of maritime activities. Current maritime communication networks (MCNs) mainly rely on marine satellites and on-shore base stations (BSs). The former generally provides limited transmission rate, while the latter lacks wide-area coverage capability. Due to these facts, the state-of-the-art MCN f…
▽ More
In the coming smart ocean era, reliable and efficient communications are crucial for promoting a variety of maritime activities. Current maritime communication networks (MCNs) mainly rely on marine satellites and on-shore base stations (BSs). The former generally provides limited transmission rate, while the latter lacks wide-area coverage capability. Due to these facts, the state-of-the-art MCN falls far behind terrestrial fifth-generation (5G) networks. To fill up the gap in the coming sixth-generation (6G) era, we explore the benefit of deployable BSs for maritime coverage enhancement. Both unmanned aerial vehicles (UAVs) and mobile vessels are used to configure deployable BSs. This leads to a hierarchical satellite-UAV-terrestrial network on the ocean. We address the joint link scheduling and rate adaptation problem for this hybrid network, to minimize the total energy consumption with quality of service (QoS) guarantees. Different from previous studies, we use only the large-scale channel state information (CSI), which is location-dependent and thus can be predicted through the position information of each UAV/vessel based on its specific trajectory/shipping lane. The problem is shown to be an NP-hard mixed integer nonlinear programming problem with a group of hidden non-linear equality constraints. We solve it suboptimally by using Min-Max transformation and iterative problem relaxation, leading to a process-oriented joint link scheduling and rate adaptation scheme. As observed by simulations, the scheme can provide agile on-demand coverage for all users with much reduced system overhead and a polynomial computation complexity. Moreover, it can achieve a prominent performance close to the optimal solution.
△ Less
Submitted 25 April, 2021;
originally announced April 2021.
-
Non-Terrestrial Networks for UAVs: Base Station Service Provisioning Schemes with Antenna Tilt
Authors:
Seongjun Kim,
Minsu Kim,
Jong Yeol Ryu,
Jemin Lee,
Tony Q. S. Quek
Abstract:
By focusing on unmanned aerial vehicle (UAV) communications in non-terrestrial networks (NTNs), this paper provides a guideline on the appropriate base station (BS) service provisioning scheme with considering the antenna tilt angle of BS. Specifically, two service provisioning schemes are considered including the inclusive-service BS (IS-BS) scheme, which makes BSs serve both ground users (GUs) a…
▽ More
By focusing on unmanned aerial vehicle (UAV) communications in non-terrestrial networks (NTNs), this paper provides a guideline on the appropriate base station (BS) service provisioning scheme with considering the antenna tilt angle of BS. Specifically, two service provisioning schemes are considered including the inclusive-service BS (IS-BS) scheme, which makes BSs serve both ground users (GUs) and aerial users (AUs) (i.e., UAVs) simultaneously, and the exclusive-service BS (ES-BS) scheme, which has BSs for GUs and BSs for AUs. By considering the antenna tilt angle-based channel gain, we derive the network outage probability for both IS-BS and ES-BS schemes, and show the existence of the optimal tilt angle that minimizes the network outage probability after analyzing the conflict impact of the antenna tilt angle. We also analyze the impact of various network parameters, including the ratio of GUs to total users and densities of total and interfering BSs, on the network outage probability. Finally, we analytically and numerically show in which environments each service provisioning scheme can be superior to the other one.
△ Less
Submitted 14 October, 2021; v1 submitted 14 April, 2021;
originally announced April 2021.
-
Optimizing the Long-Term Average Reward for Continuing MDPs: A Technical Report
Authors:
Chao Xu,
Yiping Xie,
Xijun Wang,
Howard H. Yang,
Dusit Niyato,
Tony Q. S. Quek
Abstract:
Recently, we have struck the balance between the information freshness, in terms of age of information (AoI), experienced by users and energy consumed by sensors, by appropriately activating sensors to update their current status in caching enabled Internet of Things (IoT) networks [1]. To solve this problem, we cast the corresponding status update procedure as a continuing Markov Decision Process…
▽ More
Recently, we have struck the balance between the information freshness, in terms of age of information (AoI), experienced by users and energy consumed by sensors, by appropriately activating sensors to update their current status in caching enabled Internet of Things (IoT) networks [1]. To solve this problem, we cast the corresponding status update procedure as a continuing Markov Decision Process (MDP) (i.e., without termination states), where the number of state-action pairs increases exponentially with respect to the number of considered sensors and users. Moreover, to circumvent the curse of dimensionality, we have established a methodology for designing deep reinforcement learning (DRL) algorithms to maximize (resp. minimize) the average reward (resp. cost), by integrating R-learning, a tabular reinforcement learning (RL) algorithm tailored for maximizing the long-term average reward, and traditional DRL algorithms, initially developed to optimize the discounted long-term cumulative reward rather than the average one. In this technical report, we would present detailed discussions on the technical contributions of this methodology.
△ Less
Submitted 14 April, 2021; v1 submitted 13 April, 2021;
originally announced April 2021.
-
CoMP-Enabled RAN Slicing for Tactile Internet
Authors:
Peng Yang,
Xing Xi,
Tony Q. S. Quek,
Hyundong Shin
Abstract:
Tactile Internet (TI) enables the omnipresence and exchange of tactile experiences across the global via the ultra-reliable and ultra-responsive connectivity. This article argues for coordinated multi-point (CoMP) enabled radio access network (RAN) slicing as an efficient solution that satisfies the stringent reliable and responsive connectivity requirements for supporting tactile applications. Th…
▽ More
Tactile Internet (TI) enables the omnipresence and exchange of tactile experiences across the global via the ultra-reliable and ultra-responsive connectivity. This article argues for coordinated multi-point (CoMP) enabled radio access network (RAN) slicing as an efficient solution that satisfies the stringent reliable and responsive connectivity requirements for supporting tactile applications. This article presents the emerging challenges when accommodating CoMP-enabled RAN slicing in the TI ecosystem and expounds the functional split of CoMP-enabled RAN. Besides, this article elaborates on the implementation prototype of CoMP-enabled RAN slicing for TI with the coexistence of diverse vertical applications. Finally, this article studies a use case of enabling TI-included application multiplexing as an example of CoMP-enabled RAN slicing for TI.
△ Less
Submitted 17 April, 2021; v1 submitted 17 March, 2021;
originally announced March 2021.
-
Joint Network Topology Inference via Structured Fusion Regularization
Authors:
Yanli Yuan,
De Wen Soh,
Xiao Yang,
Kun Guo,
Tony Q. S. Quek
Abstract:
Joint network topology inference represents a canonical problem of jointly learning multiple graph Laplacian matrices from heterogeneous graph signals. In such a problem, a widely employed assumption is that of a simple common component shared among multiple networks. However, in practice, a more intricate topological pattern, comprising simultaneously of sparse, homogeneity and heterogeneity comp…
▽ More
Joint network topology inference represents a canonical problem of jointly learning multiple graph Laplacian matrices from heterogeneous graph signals. In such a problem, a widely employed assumption is that of a simple common component shared among multiple networks. However, in practice, a more intricate topological pattern, comprising simultaneously of sparse, homogeneity and heterogeneity components, would exhibit in multiple networks. In this paper, we propose a general graph estimator based on a novel structured fusion regularization that enables us to jointly learn multiple graph Laplacian matrices with such complex topological patterns, and enjoys both high computational efficiency and rigorous theoretical guarantee. Moreover, in the proposed regularization term, the topological pattern among networks is characterized by a Gram matrix, endowing our graph estimator with the ability of flexible modelling different types of topological patterns by different choices of the Gram matrix. Computationally, the regularization term, coupling the parameters together, makes the formulated optimization problem intractable and thus, we develop a computationally-scalable algorithm based on the alternating direction method of multipliers (ADMM) to solve it efficiently. Theoretically, we provide a theoretical analysis of the proposed graph estimator, which establishes a non-asymptotic bound of the estimation error under the high-dimensional setting and reflects the effect of several key factors on the convergence rate of our algorithm. Finally, the superior performance of the proposed method is illustrated through simulated and real data examples.
△ Less
Submitted 8 July, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Fresh, Fair and Energy-Efficient Content Provision in a Private and Cache-Enabled UAV Network
Authors:
Peng Yang,
Kun Guo,
Xing Xi,
Tony Q. S. Quek,
Xianbin Cao,
Chenxi Liu
Abstract:
In this paper, we investigate a private and cache-enabled unmanned aerial vehicle (UAV) network for content provision. Aiming at delivering fresh, fair, and energy-efficient content files to terrestrial users, we formulate a joint UAV caching, UAV trajectory, and UAV transmit power optimization problem. This problem is confirmed to be a sequential decision problem with mixed-integer non-convex con…
▽ More
In this paper, we investigate a private and cache-enabled unmanned aerial vehicle (UAV) network for content provision. Aiming at delivering fresh, fair, and energy-efficient content files to terrestrial users, we formulate a joint UAV caching, UAV trajectory, and UAV transmit power optimization problem. This problem is confirmed to be a sequential decision problem with mixed-integer non-convex constraints, which is intractable directly. To this end, we propose a novel algorithm based on the techniques of subproblem decomposition and convex approximation. Particularly, we first propose to decompose the sequential decision problem into multiple repeated optimization subproblems via a Lyapunov technique. Next, an iterative optimization scheme incorporating a successive convex approximation (SCA) technique is explored to tackle the challenging mixed-integer non-convex subproblems. Besides, we analyze the convergence and computational complexity of the proposed algorithm and derive the theoretical value of the expected peak age of information (PAoI) to estimate the content freshness. Simulation results demonstrate that the proposed algorithm can achieve the expected PAoI close to the theoretical value and is more 22.11% and 70.51% energy-efficient and fairer than benchmark algorithms.
△ Less
Submitted 26 February, 2021; v1 submitted 25 February, 2021;
originally announced February 2021.