Skip to main content

Showing 1–50 of 68 results for author: Duffy, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.14756  [pdf, ps, other

    cs.IT eess.SP

    Joint Error Correction and Fading Channel Estimation Enhancement Leveraging GRAND

    Authors: Charles Wiame, Ken R. Duffy, Muriel Médard

    Abstract: We present a novel method for error correction in the presence of fading channel estimation errors (CEE). When such errors are significant, considerable performance losses can be observed if the wireless transceiver is not adapted. Instead of refining the estimate by increasing the pilot sequence length or improving the estimation algorithm, we propose two new approaches based on Guessing Random A… ▽ More

    Submitted 17 June, 2025; originally announced June 2025.

  2. arXiv:2504.00698  [pdf

    cs.CL cs.AI cs.LG

    Command A: An Enterprise-Ready Large Language Model

    Authors: Team Cohere, :, Aakanksha, Arash Ahmadian, Marwan Ahmed, Jay Alammar, Milad Alizadeh, Yazeed Alnumay, Sophia Althammer, Arkady Arkhangorodsky, Viraat Aryabumi, Dennis Aumiller, Raphaël Avalos, Zahara Aviv, Sammie Bae, Saurabh Baji, Alexandre Barbet, Max Bartolo, Björn Bebensee, Neeral Beladia, Walter Beller-Morales, Alexandre Bérard, Andrew Berneshawi, Anna Bialas, Phil Blunsom , et al. (205 additional authors not shown)

    Abstract: In this report we describe the development of Command A, a powerful large language model purpose-built to excel at real-world enterprise use cases. Command A is an agent-optimised and multilingual-capable model, with support for 23 languages of global business, and a novel hybrid architecture balancing efficiency with top of the range performance. It offers best-in-class Retrieval Augmented Genera… ▽ More

    Submitted 14 April, 2025; v1 submitted 1 April, 2025; originally announced April 2025.

    Comments: 55 pages

  3. arXiv:2503.22885  [pdf, other

    cs.IT

    SOGRAND Assisted Guesswork Reduction

    Authors: Lukas Rapp, Muriel Médard, Ken R. Duffy

    Abstract: Proposals have been made to reduce the guesswork of Guessing Random Additive Noise Decoding (GRAND) for binary linear codes by leveraging codebook structure at the expense of degraded block error rate (BLER). We establish one can preserve guesswork reduction while eliminating BLER degradation through dynamic list decoding terminated based on Soft Output GRAND's error probability estimate. We illus… ▽ More

    Submitted 28 March, 2025; originally announced March 2025.

  4. arXiv:2503.19033  [pdf, other

    cs.IT

    A Balanced Tree Transformation to Reduce GRAND Queries

    Authors: Lukas Rapp, Jiewei Feng, Muriel Médard, Ken R. Duffy

    Abstract: Guessing Random Additive Noise Decoding (GRAND) and its variants, known for their near-maximum likelihood performance, have been introduced in recent years. One such variant, Segmented GRAND, reduces decoding complexity by generating only noise patterns that meet specific constraints imposed by the linear code. In this paper, we introduce a new method to efficiently derive multiple constraints fro… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

  5. arXiv:2503.16677  [pdf, other

    cs.IT

    Leveraging Code Structure to Improve Soft Output for GRAND, GCD, OSD, and SCL

    Authors: Jiewei Feng, Ken R. Duffy, Muriel Médard

    Abstract: In addition to a proposed codeword, error correction decoders that provide blockwise soft output (SO) return an estimate of the likelihood that the decoding is correct. Following Forney, such estimates are traditionally only possible for list decoders where the soft output is the likelihood that a decoding is correct given it is assumed to be in the list. Recently, it has been established that Gue… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

  6. arXiv:2503.14603  [pdf, other

    cs.CL cs.LG

    Command R7B Arabic: A Small, Enterprise Focused, Multilingual, and Culturally Aware Arabic LLM

    Authors: Yazeed Alnumay, Alexandre Barbet, Anna Bialas, William Darling, Shaan Desai, Joan Devassy, Kyle Duffy, Stephanie Howe, Olivia Lasche, Justin Lee, Anirudh Shrinivason, Jennifer Tracey

    Abstract: Building high-quality large language models (LLMs) for enterprise Arabic applications remains challenging due to the limited availability of digitized Arabic data. In this work, we present a data synthesis and refinement strategy to help address this problem, namely, by leveraging synthetic data generation and human-in-the-loop annotation to expand our Arabic training corpus. We further present ou… ▽ More

    Submitted 18 March, 2025; originally announced March 2025.

  7. arXiv:2412.14017  [pdf, other

    cs.IT

    Turbo product decoding of cubic tensor codes

    Authors: Sarah Khalifeh, Ken R. Duffy, Muriel Medard

    Abstract: Long, powerful soft detection forward error correction codes are typically constructed by concatenation of shorter component codes that are decoded through iterative Soft-Input Soft-Output (SISO) procedures. The current gold-standard is Low Density Parity Check (LDPC) codes, which are built from weak single parity check component codes that are capable of producing accurate SO. Due to the recent d… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

  8. arXiv:2412.03623  [pdf, ps, other

    cs.IT

    Soft-Output Successive Cancellation List Decoding

    Authors: Peihong Yuan, Ken R. Duffy, Muriel Médard

    Abstract: We introduce an algorithm for approximating the codebook probability that is compatible with all successive cancellation (SC)-based decoding algorithms, including SC list (SCL) decoding. This approximation is based on an auxiliary distribution that mimics the dynamics of decoding algorithms with an SC decoding schedule. Based on this codebook probability and SCL decoding, we introduce soft-output… ▽ More

    Submitted 4 December, 2024; originally announced December 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2402.05004

  9. arXiv:2411.09803  [pdf, ps, other

    cs.IT

    Using a Single-Parity-Check to Reduce the Guesswork of Guessing Codeword Decoding

    Authors: Joseph Griffin, Peihong Yuan, Ken R. Duffy, Muriel Medard

    Abstract: Guessing Codeword Decoding (GCD) is a recently proposed soft-input forward error correction decoder for arbitrary binary linear codes. Inspired by recent proposals that leverage binary linear codebook structure to reduce the number of queries made by Guessing Random Additive Noise Decoding (GRAND), for binary linear codes that include a full-message single parity-check (SPC) bit, we show that it i… ▽ More

    Submitted 20 December, 2024; v1 submitted 14 November, 2024; originally announced November 2024.

    Comments: 6 pages, 11 figures

  10. arXiv:2410.22650  [pdf, ps, other

    cs.IT eess.SP

    Error correction in interference-limited wireless systems

    Authors: Charles Wiame, Ken R. Duffy, Muriel Médard

    Abstract: We introduce a novel approach to error correction decoding in the presence of additive alpha-stable noise, which serves as a model of interference-limited wireless systems. In the absence of modifications to decoding algorithms, treating alpha-stable distributions as Gaussian results in significant performance loss. Building on Guessing Random Additive Noise Decoding (GRAND), we consider two appro… ▽ More

    Submitted 29 October, 2024; originally announced October 2024.

  11. arXiv:2408.07892  [pdf, other

    cs.CY

    Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online

    Authors: Steven Adler, Zoë Hitzig, Shrey Jain, Catherine Brewer, Wayne Chang, Renée DiResta, Eddy Lazzarin, Sean McGregor, Wendy Seltzer, Divya Siddarth, Nouran Soliman, Tobin South, Connor Spelliscy, Manu Sporny, Varya Srivastava, John Bailey, Brian Christian, Andrew Critch, Ronnie Falcon, Heather Flanagan, Kim Hamilton Duffy, Eric Ho, Claire R. Leibowicz, Srikanth Nadhamuni, Alan Z. Rozenshtein , et al. (7 additional authors not shown)

    Abstract: Anonymity is an important principle online. However, malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes. With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations, intensifying the challenge of balancing anonymity and trustworthiness online. In this p… ▽ More

    Submitted 17 January, 2025; v1 submitted 14 August, 2024; originally announced August 2024.

    Comments: 63 pages, 7 figures, 5 tables; minor additions to acknowledgments and wording changes for clarity; corrected typo; updated email address reference for author

  12. arXiv:2407.11696  [pdf, other

    cs.LG physics.ao-ph

    Global atmospheric data assimilation with multi-modal masked autoencoders

    Authors: Thomas J. Vandal, Kate Duffy, Daniel McDuff, Yoni Nachmany, Chris Hartshorn

    Abstract: Global data assimilation enables weather forecasting at all scales and provides valuable data for studying the Earth system. However, the computational demands of physics-based algorithms used in operational systems limits the volume and diversity of observations that are assimilated. Here, we present "EarthNet", a multi-modal foundation model for data assimilation that learns to predict a global… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: 24 pages, 9 figures, 6 tables

  13. arXiv:2406.11782  [pdf, ps, other

    cs.IT

    Soft-output Guessing Codeword Decoding

    Authors: Ken R. Duffy, Peihong Yuan, Joseph Griffin, Muriel Medard

    Abstract: We establish that it is possible to extract accurate blockwise and bitwise soft output from Guessing Codeword Decoding with minimal additional computational complexity by considering it as a variant of Guessing Random Additive Noise Decoding. Blockwise soft output can be used to control decoding misdetection rate while bitwise soft output results in a soft-input soft-output decoder that can be use… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  14. arXiv:2405.05107  [pdf, other

    cs.ET cs.AR eess.SY

    Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin D. Kim, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Ken R. Duffy, Muriel Médard

    Abstract: The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  15. arXiv:2402.05004  [pdf, ps, other

    cs.IT

    Near-Optimal Generalized Decoding of Polar-like Codes

    Authors: Peihong Yuan, Ken R. Duffy, Muriel Médard

    Abstract: We present a framework that can exploit the tradeoff between the undetected error rate (UER) and block error rate (BLER) of polar-like codes. It is compatible with all successive cancellation (SC)-based decoding methods and relies on a novel approximation that we call codebook probability. This approximation is based on an auxiliary distribution that mimics the dynamics of decoding algorithms foll… ▽ More

    Submitted 2 May, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: being published at IEEE ISIT 2024

  16. arXiv:2310.10737  [pdf, ps, other

    cs.IT

    Soft-output (SO) GRAND and Iterative Decoding to Outperform LDPCs

    Authors: Peihong Yuan, Muriel Medard, Kevin Galligan, Ken R. Duffy

    Abstract: We establish that a large, flexible class of long, high redundancy error correcting codes can be efficiently and accurately decoded with guessing random additive noise decoding (GRAND). Performance evaluation demonstrates that it is possible to construct simple product codes with lengths of approximately 200 to 4000 bits and rates between 0.2 and 0.8 that outperform low-density parity-check (LDPC)… ▽ More

    Submitted 18 December, 2024; v1 submitted 16 October, 2023; originally announced October 2023.

  17. arXiv:2307.16795  [pdf, other

    cs.CL cs.AI cs.LG

    Structural Transfer Learning in NL-to-Bash Semantic Parsers

    Authors: Kyle Duffy, Satwik Bhattamishra, Phil Blunsom

    Abstract: Large-scale pre-training has made progress in many fields of natural language processing, though little is understood about the design of pre-training datasets. We propose a methodology for obtaining a quantitative understanding of structural overlap between machine translation tasks. We apply our methodology to the natural language to Bash semantic parsing task (NLBash) and show that it is largel… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

  18. arXiv:2305.05777  [pdf, ps, other

    cs.IT

    Upgrade error detection to prediction with GRAND

    Authors: Kevin Galligan, Peihong Yuan, Muriel Médard, Ken R. Duffy

    Abstract: Guessing Random Additive Noise Decoding (GRAND) is a family of hard- and soft-detection error correction decoding algorithms that provide accurate decoding of any moderate redundancy code of any length. Here we establish a method through which any soft-input GRAND algorithm can provide soft output in the form of an accurate a posteriori estimate of the likelihood that a decoding is correct or, in… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  19. arXiv:2304.00047  [pdf, other

    cs.LG cs.CR cs.IT

    PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels

    Authors: Homa Esfahanizadeh, Adam Yala, Rafael G. L. D'Oliveira, Andrea J. D. Jaba, Victor Quach, Ken R. Duffy, Tommi S. Jaakkola, Vinod Vaikuntanathan, Manya Ghobadi, Regina Barzilay, Muriel Médard

    Abstract: Allowing organizations to share their data for training of machine learning (ML) models without unintended information leakage is an open problem in practice. A promising technique for this still-open problem is to train models on the encoded data. Our approach, called Privately Encoded Open Datasets with Public Labels (PEOPL), uses a certain class of randomly constructed transforms to encode sens… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security

  20. arXiv:2303.07461  [pdf, other

    cs.IT

    Using channel correlation to improve decoding -- ORBGRAND-AI

    Authors: Ken R. Duffy, Moritz Grundei, Muriel Medard

    Abstract: To meet the Ultra Reliable Low Latency Communication (URLLC) needs of modern applications, there have been significant advances in the development of short error correction codes and corresponding soft detection decoders. A substantial hindrance to delivering low-latency is, however, the reliance on interleaving to break up omnipresent channel correlations to ensure that decoder input matches deco… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  21. arXiv:2301.09778  [pdf, other

    cs.IT

    GRAND-EDGE: A Universal, Jamming-resilient Algorithm with Error-and-Erasure Decoding

    Authors: Furkan Ercan, Kevin Galligan, David Starobinski, Muriel Medard, Ken R. Duffy, Rabia Tugce Yazicigil

    Abstract: Random jammers that overpower transmitted signals are a practical concern for many wireless communication protocols. As such, wireless receivers must be able to cope with standard channel noise and jamming (intentional or unintentional). To address this challenge, we propose a novel method to augment the resilience of the recent family of universal error-correcting GRAND algorithms. This method, c… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

    Comments: 7 pages, 7 figures, accepted for IEEE ICC 2023 conference

  22. arXiv:2212.05309  [pdf, other

    cs.IT

    Soft detection physical layer insecurity

    Authors: Ken R. Duffy, Muriel Medard

    Abstract: We establish that during the execution of any Guessing Random Additive Noise Decoding (GRAND) algorithm, an interpretable, useful measure of decoding confidence can be evaluated. This measure takes the form of a log-likelihood ratio (LLR) of the hypotheses that, should a decoding be found by a given query, the decoding is correct versus its being incorrect. That LLR can be used as soft output for… ▽ More

    Submitted 12 April, 2023; v1 submitted 10 December, 2022; originally announced December 2022.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  23. Physical layer insecurity

    Authors: Muriel Médard, Ken R. Duffy

    Abstract: In the classic wiretap model, Alice wishes to reliably communicate to Bob without being overheard by Eve who is eavesdropping over a degraded channel. Systems for achieving that physical layer security often rely on an error correction code whose rate is below the Shannon capacity of Alice and Bob's channel, so Bob can reliably decode, but above Alice and Eve's, so Eve cannot reliably decode. For… ▽ More

    Submitted 16 December, 2022; v1 submitted 2 December, 2022; originally announced December 2022.

    Journal ref: 57th Annual Conference on Information Sciences and Systems (CISS), 2023

  24. arXiv:2210.16187  [pdf, ps, other

    cs.IT

    GRAND-assisted Optimal Modulation

    Authors: Basak Ozaydin, Muriel Médard, Ken Duffy

    Abstract: Optimal modulation (OM) schemes for Gaussian channels with peak and average power constraints are known to require nonuniform probability distributions over signal points, which presents practical challenges. An established way to map uniform binary sources to non-uniform symbol distributions is to assign a different number of bits to different constellation points. Doing so, however, means that e… ▽ More

    Submitted 31 October, 2022; v1 submitted 28 October, 2022; originally announced October 2022.

    Comments: Presented at IEEE Globecom 2022

  25. arXiv:2210.04061  [pdf, other

    cs.IT cs.CR

    A General Security Approach for Soft-information Decoding against Smart Bursty Jammers

    Authors: Furkan Ercan, Kevin Galligan, Ken R. Duffy, Muriel Medard, David Starobinski, Rabia Tugce Yazicigil

    Abstract: Malicious attacks such as jamming can cause significant disruption or complete denial of service (DoS) to wireless communication protocols. Moreover, jamming devices are getting smarter, making them difficult to detect. Forward error correction, which adds redundancy to data, is commonly deployed to protect communications against the deleterious effects of channel noise. Soft-information error cor… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: Accepted for GLOBECOM 2022 Workshops. Contains 7 pages and 7 figures

  26. arXiv:2207.11991  [pdf, other

    cs.IT

    Soft decoding without soft demapping with ORBGRAND

    Authors: Wei An, Muriel Medard, Ken R. Duffy

    Abstract: For spectral efficiency, higher order modulation symbols confer information on more than one bit. As soft detection forward error correction decoders assume the availability of information at binary granularity, however, soft demappers are required to compute per-bit reliabilities from complex-valued signals. Here we show that the recently introduced universal soft detection decoder ORBGRAND can b… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Journal ref: 2023 IEEE International Symposium on Information Theory (ISIT)

  27. arXiv:2207.11149  [pdf, other

    cs.IT

    Block turbo decoding with ORBGRAND

    Authors: Kevin Galligan, Muriel Médard, Ken R. Duffy

    Abstract: Guessing Random Additive Noise Decoding (GRAND) is a family of universal decoding algorithms suitable for decoding any moderate redundancy code of any length. We establish that, through the use of list decoding, soft-input variants of GRAND can replace the Chase algorithm as the component decoder in the turbo decoding of product codes. In addition to being able to decode arbitrary product codes, r… ▽ More

    Submitted 9 August, 2022; v1 submitted 22 July, 2022; originally announced July 2022.

  28. GRAND for Fading Channels using Pseudo-soft Information

    Authors: Hadi Sarieddeen, Muriel Médard, Ken. R. Duffy

    Abstract: Guessing random additive noise decoding (GRAND) is a universal maximum-likelihood decoder that recovers code-words by guessing rank-ordered putative noise sequences and inverting their effect until one or more valid code-words are obtained. This work explores how GRAND can leverage additive-noise statistics and channel-state information in fading channels. Instead of computing per-bit reliability… ▽ More

    Submitted 2 September, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: To appear in the IEEE GLOBECOM 2022 proceedings. arXiv admin note: text overlap with arXiv:2207.10836

    Journal ref: 2022 IEEE Global Communications Conference

  29. Soft-input, soft-output joint detection and GRAND

    Authors: Hadi Sarieddeen, Muriel Médard, Ken. R. Duffy

    Abstract: Guessing random additive noise decoding (GRAND) is a maximum likelihood (ML) decoding method that identifies the noise effects corrupting code-words of arbitrary code-books. In a joint detection and decoding framework, this work demonstrates how GRAND can leverage crude soft information in received symbols and channel state information to generate, through guesswork, soft bit reliability outputs i… ▽ More

    Submitted 2 September, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: To appear in the IEEE GLOBECOM 2022 proceedings

    Journal ref: 2022 IEEE Global Communications Conference

  30. arXiv:2203.13552  [pdf, ps, other

    cs.IT

    On the Role of Quantization of Soft Information in GRAND

    Authors: Peihong Yuan, Ken R. Duffy, Evan P. Gabhart, Muriel Médard

    Abstract: In this work, we investigate guessing random additive noise decoding (GRAND) with quantized soft input. First, we analyze the achievable rate of ordered reliability bits GRAND (ORBGRAND), which uses the rank order of the reliability as quantized soft information. We show that multi-line ORBGRAND can approach capacity for any signal-to-noise ratio (SNR). We then introduce discretized soft GRAND (DS… ▽ More

    Submitted 24 November, 2022; v1 submitted 25 March, 2022; originally announced March 2022.

  31. arXiv:2203.12047  [pdf, other

    cs.IT cs.CR

    AES as Error Correction: Cryptosystems for Reliable Communication

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Jongchan Woo, Muriel Médard

    Abstract: In this paper, we show that the Advanced Encryption Standard (AES) cryptosystem can be used as an error-correcting code to obtain reliability over noisy communication and data systems. Moreover, we characterize a family of computational cryptosystems that can potentially be used as well performing error correcting codes. In particular, we show that simple padding followed by a cryptosystem with un… ▽ More

    Submitted 9 September, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

  32. Ordered Reliability Bits Guessing Random Additive Noise Decoding

    Authors: Ken R. Duffy, Wei An, Muriel Medard

    Abstract: Error correction techniques traditionally focus on the co-design of restricted code-structures in tandem with code-specific decoders that are computationally efficient when decoding long codes in hardware. Modern applications are, however, driving demand for ultra-reliable low-latency communications (URLLC), rekindling interest in the performance of shorter, higher-rate error correcting codes, and… ▽ More

    Submitted 29 August, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    MSC Class: 94A15; 68P30

  33. arXiv:2202.03002  [pdf, other

    cs.IT cs.CR

    Partial Encryption after Encoding for Security and Reliability in Data Systems

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard

    Abstract: We consider the problem of secure and reliable communication over a noisy multipath network. Previous work considering a noiseless version of our problem proposed a hybrid universal network coding cryptosystem (HUNCC). By combining an information-theoretically secure encoder together with partial encryption, HUNCC is able to obtain security guarantees, even in the presence of an all-observing eave… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  34. arXiv:2201.12406  [pdf, other

    cs.LG cs.CR cs.CV

    Syfer: Neural Obfuscation for Private Data Release

    Authors: Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard, Tommi S. Jaakkola, Regina Barzilay

    Abstract: Balancing privacy and predictive utility remains a central challenge for machine learning in healthcare. In this paper, we develop Syfer, a neural obfuscation method to protect against re-identification attacks. Syfer composes trained layers with random neural networks to encode the original data (e.g. X-rays) while maintaining the ability to predict diagnoses from the encoded data. The randomness… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  35. arXiv:2201.02596  [pdf

    physics.ao-ph cs.LG

    Explainable deep learning for insights in El Niño and river flows

    Authors: Yumin Liu, Kate Duffy, Jennifer G. Dy, Auroop R. Ganguly

    Abstract: The El Niño Southern Oscillation (ENSO) is a semi-periodic fluctuation in sea surface temperature (SST) over the tropical central and eastern Pacific Ocean that influences interannual variability in regional hydrology across the world through long-range dependence or teleconnections. Recent research has demonstrated the value of Deep Learning (DL) methods for improving ENSO prediction as well as C… ▽ More

    Submitted 23 January, 2023; v1 submitted 7 January, 2022; originally announced January 2022.

    Journal ref: Nat Commun 14, 339 (2023)

  36. arXiv:2106.02484  [pdf, other

    cs.CR cs.AI

    NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training

    Authors: Adam Yala, Homa Esfahanizadeh, Rafael G. L. D' Oliveira, Ken R. Duffy, Manya Ghobadi, Tommi S. Jaakkola, Vinod Vaikuntanathan, Regina Barzilay, Muriel Medard

    Abstract: Balancing the needs of data privacy and predictive utility is a central challenge for machine learning in healthcare. In particular, privacy concerns have led to a dearth of public datasets, complicated the construction of multi-hospital cohorts and limited the utilization of external machine learning resources. To remedy this, new methods are required to enable data owners, such as hospitals, to… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

  37. CRC Codes as Error Correction Codes

    Authors: Wei An, Muriel Médard, Ken R. Duffy

    Abstract: CRC codes have long since been adopted in a vast range of applications. The established notion that they are suitable primarily for error detection can be set aside through use of the recently proposed Guessing Random Additive Noise Decoding (GRAND). Hard-detection (GRAND-SOS) and soft-detection (ORBGRAND) variants can decode any short, high-rate block code, making them suitable for error correcti… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

    Comments: This work has been submitted to the IEEE for possible publication

    Journal ref: IEEE ICC 2021

  38. arXiv:2101.11123  [pdf, other

    cs.IT eess.SP

    A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues

    Authors: Luca D'Alessio, Litian Liu, Ken Duffy, Yonina C. Eldar, Muriel Medard, Mehrtash Babadi

    Abstract: High-throughput and quantitative experimental technologies are experiencing rapid advances in the biological sciences. One important recent technique is multiplexed fluorescence in situ hybridization (mFISH), which enables the identification and localization of large numbers of individual strands of RNA within single cells. Core to that technology is a coding problem: with each RNA sequence of int… ▽ More

    Submitted 2 February, 2021; v1 submitted 26 January, 2021; originally announced January 2021.

    Comments: This paper is accepted to The International Symposium on Information Theory and Its Applications (ISITA) 2020

  39. Keep the bursts and ditch the interleavers

    Authors: Wei An, Muriel Médard, Ken R. Duffy

    Abstract: To facilitate applications in IoT, 5G, and beyond, there is an engineering need to enable high-rate, low-latency communications. Errors in physical channels typically arrive in clumps, but most decoders are designed assuming that channels are memoryless. As a result, communication networks rely on interleaving over tens of thousands of bits so that channel conditions match decoder assumptions. Eve… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 6 pages

    Journal ref: 2020 IEEE Global Communications Conference

  40. arXiv:2010.07791  [pdf, other

    cs.IT

    Noise Recycling

    Authors: Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard

    Abstract: We introduce Noise Recycling, a method that enhances decoding performance of channels subject to correlated noise without joint decoding. The method can be used with any combination of codes, code-rates and decoding techniques. In the approach, a continuous realization of noise is estimated from a lead channel by subtracting its decoded output from its received signal. This estimate is then used t… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: Appear in IEEE International Symposium on Information Theory, ISIT 2020, based on arXiv:2006.04897

  41. arXiv:2006.04897  [pdf, other

    cs.IT

    Noise Recycling

    Authors: Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard

    Abstract: We introduce Noise Recycling, a method that substantially enhances decoding performance of orthogonal channels subject to correlated noise without the need for joint encoding or decoding. The method can be used with any combination of codes, code-rates and decoding techniques. In the approach, a continuous realization of noise is estimated from a lead channel by subtracting its decoded output from… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

  42. arXiv:2001.03089  [pdf, other

    cs.IT

    Soft Maximum Likelihood Decoding using GRAND

    Authors: Amit Solomon, Ken R. Duffy, Muriel Médard

    Abstract: Maximum Likelihood (ML) decoding of forward error correction codes is known to be optimally accurate, but is not used in practice as it proves too challenging to efficiently implement. Here we introduce a ML decoder called SGRAND, which is a development of a previously described hard detection ML decoder called GRAND, that fully avails of soft detection information and is suitable for use with any… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

  43. Ordered Reliability Bits Guessing Random Additive Noise Decoding

    Authors: Ken R. Duffy

    Abstract: Modern applications are driving demand for ultra-reliable low-latency communications, rekindling interest in the performance of short, high-rate error correcting codes. To that end, here we introduce a soft-detection variant of Guessing Random Additive Noise Decoding (GRAND) called Ordered Reliability Bits GRAND that can decode any short, high-rate block-code. For a code of $n$ bits, it avails of… ▽ More

    Submitted 4 October, 2020; v1 submitted 2 January, 2020; originally announced January 2020.

    Journal ref: IEEE ICASSP 2021

  44. arXiv:1910.13408  [pdf, other

    cs.LG eess.IV stat.ML

    A framework for deep learning emulation of numerical models with a case study in satellite remote sensing

    Authors: Kate Duffy, Thomas Vandal, Weile Wang, Ramakrishna Nemani, Auroop R. Ganguly

    Abstract: Numerical models based on physics represent the state-of-the-art in earth system modeling and comprise our best tools for generating insights and predictions. Despite rapid growth in computational power, the perceived need for higher model resolutions overwhelms the latest-generation computers, reducing the ability of modelers to generate simulations for understanding parameter sensitivities and c… ▽ More

    Submitted 7 January, 2022; v1 submitted 29 October, 2019; originally announced October 2019.

    Comments: 6 pages, 8 figures, 4 tables

  45. arXiv:1907.11052  [pdf, other

    cs.PF math.PR

    MDS coding is better than replication for job completion times

    Authors: Ken Duffy, Seva Shneer

    Abstract: In a multi-server system, how can one get better performance than random assignment of jobs to servers if queue-states cannot be queried by the dispatcher? A replication strategy has recently been proposed where $d$ copies of each arriving job are sent to servers chosen at random. The job's completion time is the first time that the service of any of its copies is complete. On completion, redundan… ▽ More

    Submitted 8 December, 2019; v1 submitted 25 July, 2019; originally announced July 2019.

  46. arXiv:1907.01077  [pdf, other

    cs.IT

    5G NR CA-Polar Maximum Likelihood Decoding by GRAND

    Authors: Ken Duffy, Amit Solomon, Kishori M. Konwar, Muriel Medard

    Abstract: CA-Polar codes have been selected for all control channel communications in 5G NR, but accurate, computationally feasible decoders are still subject to development. Here we report the performance of a recently proposed class of optimally precise Maximum Likelihood (ML) decoders, GRAND, that can be used with any block-code. As published theoretical results indicate that GRAND is computationally eff… ▽ More

    Submitted 18 February, 2021; v1 submitted 1 July, 2019; originally announced July 2019.

    MSC Class: 94A05 ACM Class: E.4

    Journal ref: 2020 54th Annual Conference on Information Sciences and Systems (CISS)

  47. arXiv:1902.04604  [pdf, other

    cs.CV

    Progressively Growing Generative Adversarial Networks for High Resolution Semantic Segmentation of Satellite Images

    Authors: Edward Collier, Kate Duffy, Sangram Ganguly, Geri Madanguit, Subodh Kalia, Gayaka Shreekant, Ramakrishna Nemani, Andrew Michaelis, Shuang Li, Auroop Ganguly, Supratik Mukhopadhyay

    Abstract: Machine learning has proven to be useful in classification and segmentation of images. In this paper, we evaluate a training methodology for pixel-wise segmentation on high resolution satellite images using progressive growing of generative adversarial networks. We apply our model to segmenting building rooftops and compare these results to conventional methods for rooftop segmentation. We present… ▽ More

    Submitted 12 February, 2019; originally announced February 2019.

    Comments: Accepted too and presented at DMESS 2018 as part of IEEE ICDM 2018

  48. arXiv:1902.03796  [pdf, other

    cs.IT

    Guessing random additive noise decoding with symbol reliability information (SRGRAND)

    Authors: Ken R. Duffy, Muriel Médard, Wei An

    Abstract: The design and implementation of error correcting codes has long been informed by two fundamental results: Shannon's 1948 capacity theorem, which established that long codes use noisy channels most efficiently; and Berlekamp, McEliece, and Van Tilborg's 1978 theorem on the NP-hardness of decoding linear codes. These results shifted focus away from creating code-independent decoders, but recent low… ▽ More

    Submitted 23 August, 2021; v1 submitted 11 February, 2019; originally announced February 2019.

    Comments: This work has been submitted to the IEEE for possible publication

    MSC Class: E.4 ACM Class: E.4

  49. arXiv:1808.07269  [pdf, other

    hep-ex cs.CV physics.data-an physics.ins-det

    A Deep Neural Network for Pixel-Level Electromagnetic Particle Identification in the MicroBooNE Liquid Argon Time Projection Chamber

    Authors: MicroBooNE collaboration, C. Adams, M. Alrashed, R. An, J. Anthony, J. Asaadi, A. Ashkenazi, M. Auger, S. Balasubramanian, B. Baller, C. Barnes, G. Barr, M. Bass, F. Bay, A. Bhat, K. Bhattacharya, M. Bishai, A. Blake, T. Bolton, L. Camilleri, D. Caratelli, I. Caro Terrazas, R. Carr, R. Castillo Fernandez, F. Cavanna , et al. (148 additional authors not shown)

    Abstract: We have developed a convolutional neural network (CNN) that can make a pixel-level prediction of objects in image data recorded by a liquid argon time projection chamber (LArTPC) for the first time. We describe the network design, training techniques, and software tools developed to train this network. The goal of this work is to develop a complete deep neural network based data reconstruction cha… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

    Journal ref: Phys. Rev. D 99, 092001 (2019)

  50. Capacity-achieving Guessing Random Additive Noise Decoding (GRAND)

    Authors: Ken R. Duffy, Jiange Li, Muriel Médard

    Abstract: We introduce a new algorithm for realizing Maximum Likelihood (ML) decoding in discrete channels with or without memory. In it, the receiver rank orders noise sequences from most likely to least likely. Subtracting noise from the received signal in that order, the first instance that results in a member of the code-book is the ML decoding. We name this algorithm GRAND for Guessing Random Additive… ▽ More

    Submitted 22 March, 2019; v1 submitted 20 February, 2018; originally announced February 2018.

    Comments: IEEE Transactions on Information Theory, to appear

    MSC Class: 94A24 ACM Class: E.4

    Journal ref: IEEE Transactions on Information Theory, 65 (7), 4023-4040, 2019