-
Dynamic Estimation Loss Control in Variational Quantum Sensing via Online Conformal Inference
Authors:
Ivana Nikoloska,
Hamdi Joudeh,
Ruud van Sloun,
Osvaldo Simeone
Abstract:
Quantum sensing exploits non-classical effects to overcome limitations of classical sensors, with applications ranging from gravitational-wave detection to nanoscale imaging. However, practical quantum sensors built on noisy intermediate-scale quantum (NISQ) devices face significant noise and sampling constraints, and current variational quantum sensing (VQS) methods lack rigorous performance guar…
▽ More
Quantum sensing exploits non-classical effects to overcome limitations of classical sensors, with applications ranging from gravitational-wave detection to nanoscale imaging. However, practical quantum sensors built on noisy intermediate-scale quantum (NISQ) devices face significant noise and sampling constraints, and current variational quantum sensing (VQS) methods lack rigorous performance guarantees. This paper proposes an online control framework for VQS that dynamically updates the variational parameters while providing deterministic error bars on the estimates. By leveraging online conformal inference techniques, the approach produces sequential estimation sets with a guaranteed long-term risk level. Experiments on a quantum magnetometry task confirm that the proposed dynamic VQS approach maintains the required reliability over time, while still yielding precise estimates. The results demonstrate the practical benefits of combining variational quantum algorithms with online conformal inference to achieve reliable quantum sensing on NISQ devices.
△ Less
Submitted 29 May, 2025;
originally announced May 2025.
-
Expected Free Energy-based Planning as Variational Inference
Authors:
Bert de Vries,
Wouter Nuijten,
Thijs van de Laar,
Wouter Kouw,
Sepideh Adamiat,
Tim Nisslbeck,
Mykola Lukashchuk,
Hoang Minh Huu Nguyen,
Marco Hidalgo Araya,
Raphael Tresor,
Thijs Jenneskens,
Ivana Nikoloska,
Raaja Ganapathy Subramanian,
Bart van Erp,
Dmitry Bagaev,
Albert Podusenko
Abstract:
We address the problem of planning under uncertainty, where an agent must choose actions that not only achieve desired outcomes but also reduce uncertainty. Traditional methods often treat exploration and exploitation as separate objectives, lacking a unified inferential foundation. Active inference, grounded in the Free Energy Principle, provides such a foundation by minimizing Expected Free Ener…
▽ More
We address the problem of planning under uncertainty, where an agent must choose actions that not only achieve desired outcomes but also reduce uncertainty. Traditional methods often treat exploration and exploitation as separate objectives, lacking a unified inferential foundation. Active inference, grounded in the Free Energy Principle, provides such a foundation by minimizing Expected Free Energy (EFE), a cost function that combines utility with epistemic drives, such as ambiguity resolution and novelty seeking. However, the computational burden of EFE minimization had remained a significant obstacle to its scalability. In this paper, we show that EFE-based planning arises naturally from minimizing a variational free energy functional on a generative model augmented with preference and epistemic priors. This result reinforces theoretical consistency with the Free Energy Principle by casting planning under uncertainty itself as a form of variational inference. Our formulation yields policies that jointly support goal achievement and information gain, while incorporating a complexity term that accounts for bounded computational resources. This unifying framework connects and extends existing methods, enabling scalable, resource-aware implementations of active inference agents.
△ Less
Submitted 23 April, 2025; v1 submitted 21 April, 2025;
originally announced April 2025.
-
Robust Blind Channel Estimation for Bursty Impulsive Noise with a Constrained EM Approach
Authors:
Chin-Hung Chen,
Ivana Nikoloska,
Wim van Houtum,
Yan Wu,
Boris Karanov,
Alex Alvarado
Abstract:
Impulsive noise (IN) commonly generated by power devices can severely degrade the performance of high sensitivity wireless receivers. Accurate channel state information (CSI) knowledge is essential for designing optimal maximum a posteriori detectors. This paper examines blind channel estimation methods based on the expectation-maximization (EM) algorithm tailored for scenarios impacted by bursty…
▽ More
Impulsive noise (IN) commonly generated by power devices can severely degrade the performance of high sensitivity wireless receivers. Accurate channel state information (CSI) knowledge is essential for designing optimal maximum a posteriori detectors. This paper examines blind channel estimation methods based on the expectation-maximization (EM) algorithm tailored for scenarios impacted by bursty IN, which can be described by the Markov-Middleton model. We propose a constrained EM algorithm that exploits the trellis structure of the IN model and the transmitted binary phase shift keying (BPSK) symbols. By enforcing shared variance among specific trellis states and symmetry in the transition matrix, the proposed constrained EM algorithm adapted for the bursty IN channel has an almost two times faster convergence rate and better estimation performance than the standard EM approach. We comprehensively evaluate the robustness of both standard and constrained EM estimators under different types of CSI uncertainties. The results indicate that the final estimations of both EM estimators are robust enough to mismatch Markov-Middleton model parameters. However, as the level of CSI uncertainty increases, the convergence rate decreases.
△ Less
Submitted 22 March, 2025;
originally announced April 2025.
-
Modified Baum-Welch Algorithm for Joint Blind Channel Estimation and Turbo Equalization
Authors:
Chin-Hung Chen,
Boris Karanov,
Ivana Nikoloska,
Wim van Houtum,
Yan Wu,
Alex Alvarado
Abstract:
Blind estimation of intersymbol interference channels based on the Baum-Welch (BW) algorithm, a specific implementation of the expectation-maximization (EM) algorithm for training hidden Markov models, is robust and does not require labeled data. However, it is known for its extensive computation cost, slow convergence, and frequently converges to a local maximum. In this paper, we modified the tr…
▽ More
Blind estimation of intersymbol interference channels based on the Baum-Welch (BW) algorithm, a specific implementation of the expectation-maximization (EM) algorithm for training hidden Markov models, is robust and does not require labeled data. However, it is known for its extensive computation cost, slow convergence, and frequently converges to a local maximum. In this paper, we modified the trellis structure of the BW algorithm by associating the channel parameters with two consecutive states. This modification enables us to reduce the number of required states by half while maintaining the same performance. Moreover, to improve the convergence rate and the estimation performance, we construct a joint turbo-BW-equalization system by exploiting the extrinsic information produced by the turbo decoder to refine the BW-based estimator at each EM iteration. Our experiments demonstrate that the joint system achieves convergence in 10 EM iterations, which is 8 iterations less than a separate system design for a signal-to-noise ratio (SNR) of 4dB. Additionally, the joint system provides improved estimation accuracy with a mean square error (MSE) of $10^{-4}$ for an SNR of 6dB. We also identify scenarios where a joint design is not preferable, especially when the channel is noisy (e.g., SNR=2dB) and the decoder cannot provide reliable extrinsic information for a BW-based estimator.
△ Less
Submitted 20 December, 2024; v1 submitted 10 December, 2024;
originally announced December 2024.
-
Time-Warping Invariant Quantum Recurrent Neural Networks via Quantum-Classical Adaptive Gating
Authors:
Ivana Nikoloska,
Osvaldo Simeone,
Leonardo Banchi,
Petar Veličković
Abstract:
Adaptive gating plays a key role in temporal data processing via classical recurrent neural networks (RNN), as it facilitates retention of past information necessary to predict the future, providing a mechanism that preserves invariance to time warping transformations. This paper builds on quantum recurrent neural networks (QRNNs), a dynamic model with quantum memory, to introduce a novel class of…
▽ More
Adaptive gating plays a key role in temporal data processing via classical recurrent neural networks (RNN), as it facilitates retention of past information necessary to predict the future, providing a mechanism that preserves invariance to time warping transformations. This paper builds on quantum recurrent neural networks (QRNNs), a dynamic model with quantum memory, to introduce a novel class of temporal data processing quantum models that preserve invariance to time-warping transformations of the (classical) input-output sequences. The model, referred to as time warping-invariant QRNN (TWI-QRNN), augments a QRNN with a quantum-classical adaptive gating mechanism that chooses whether to apply a parameterized unitary transformation at each time step as a function of the past samples of the input sequence via a classical recurrent model. The TWI-QRNN model class is derived from first principles, and its capacity to successfully implement time-warping transformations is experimentally demonstrated on examples with classical or quantum dynamics.
△ Less
Submitted 9 June, 2023; v1 submitted 19 January, 2023;
originally announced January 2023.
-
Learning with Limited Samples -- Meta-Learning and Applications to Communication Systems
Authors:
Lisha Chen,
Sharu Theresa Jose,
Ivana Nikoloska,
Sangwoo Park,
Tianyi Chen,
Osvaldo Simeone
Abstract:
Deep learning has achieved remarkable success in many machine learning tasks such as image classification, speech recognition, and game playing. However, these breakthroughs are often difficult to translate into real-world engineering systems because deep learning models require a massive number of training samples, which are costly to obtain in practice. To address labeled data scarcity, few-shot…
▽ More
Deep learning has achieved remarkable success in many machine learning tasks such as image classification, speech recognition, and game playing. However, these breakthroughs are often difficult to translate into real-world engineering systems because deep learning models require a massive number of training samples, which are costly to obtain in practice. To address labeled data scarcity, few-shot meta-learning optimizes learning algorithms that can efficiently adapt to new tasks quickly. While meta-learning is gaining significant interest in the machine learning literature, its working principles and theoretic fundamentals are not as well understood in the engineering community.
This review monograph provides an introduction to meta-learning by covering principles, algorithms, theory, and engineering applications. After introducing meta-learning in comparison with conventional and joint learning, we describe the main meta-learning algorithms, as well as a general bilevel optimization framework for the definition of meta-learning techniques. Then, we summarize known results on the generalization capabilities of meta-learning from a statistical learning viewpoint. Applications to communication systems, including decoding and power allocation, are discussed next, followed by an introduction to aspects related to the integration of meta-learning with emerging computing technologies, namely neuromorphic and quantum computing. The monograph is concluded with an overview of open research challenges.
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
Quantum-Aided Meta-Learning for Bayesian Binary Neural Networks via Born Machines
Authors:
Ivana Nikoloska,
Osvaldo Simeone
Abstract:
Near-term noisy intermediate-scale quantum circuits can efficiently implement implicit probabilistic models in discrete spaces, supporting distributions that are practically infeasible to sample from using classical means. One of the possible applications of such models, also known as Born machines, is probabilistic inference, which is at the core of Bayesian methods. This paper studies the use of…
▽ More
Near-term noisy intermediate-scale quantum circuits can efficiently implement implicit probabilistic models in discrete spaces, supporting distributions that are practically infeasible to sample from using classical means. One of the possible applications of such models, also known as Born machines, is probabilistic inference, which is at the core of Bayesian methods. This paper studies the use of Born machines for the problem of training binary Bayesian neural networks. In the proposed approach, a Born machine is used to model the variational distribution of the binary weights of the neural network, and data from multiple tasks is used to reduce training data requirements on new tasks. The method combines gradient-based meta-learning and variational inference via Born machines, and is shown in a prototypical regression problem to outperform conventional joint learning strategies.
△ Less
Submitted 5 April, 2022; v1 submitted 31 March, 2022;
originally announced March 2022.
-
Training Hybrid Classical-Quantum Classifiers via Stochastic Variational Optimization
Authors:
Ivana Nikoloska,
Osvaldo Simeone
Abstract:
Quantum machine learning has emerged as a potential practical application of near-term quantum devices. In this work, we study a two-layer hybrid classical-quantum classifier in which a first layer of quantum stochastic neurons implementing generalized linear models (QGLMs) is followed by a second classical combining layer. The input to the first, hidden, layer is obtained via amplitude encoding i…
▽ More
Quantum machine learning has emerged as a potential practical application of near-term quantum devices. In this work, we study a two-layer hybrid classical-quantum classifier in which a first layer of quantum stochastic neurons implementing generalized linear models (QGLMs) is followed by a second classical combining layer. The input to the first, hidden, layer is obtained via amplitude encoding in order to leverage the exponential size of the fan-in of the quantum neurons in the number of qubits per neuron. To facilitate implementation of the QGLMs, all weights and activations are binary. While the state of the art on training strategies for this class of models is limited to exhaustive search and single-neuron perceptron-like bit-flip strategies, this letter introduces a stochastic variational optimization approach that enables the joint training of quantum and classical layers via stochastic gradient descent. Experiments show the advantages of the approach for a variety of activation functions implemented by QGLM neurons.
△ Less
Submitted 21 January, 2022;
originally announced January 2022.
-
Bayesian Active Meta-Learning for Black-Box Optimization
Authors:
Ivana Nikoloska,
Osvaldo Simeone
Abstract:
Data-efficient learning algorithms are essential in many practical applications for which data collection is expensive, e.g., for the optimal deployment of wireless systems in unknown propagation scenarios. Meta-learning can address this problem by leveraging data from a set of related learning tasks, e.g., from similar deployment settings. In practice, one may have available only unlabeled data s…
▽ More
Data-efficient learning algorithms are essential in many practical applications for which data collection is expensive, e.g., for the optimal deployment of wireless systems in unknown propagation scenarios. Meta-learning can address this problem by leveraging data from a set of related learning tasks, e.g., from similar deployment settings. In practice, one may have available only unlabeled data sets from the related tasks, requiring a costly labeling procedure to be carried out before use in meta-learning. For instance, one may know the possible positions of base stations in a given area, but not the performance indicators achievable with each deployment. To decrease the number of labeling steps required for meta-learning, this paper introduces an information-theoretic active task selection mechanism, and evaluates an instantiation of the approach for Bayesian optimization of black-box models.
△ Less
Submitted 23 May, 2022; v1 submitted 19 October, 2021;
originally announced October 2021.
-
Modular Meta-Learning for Power Control via Random Edge Graph Neural Networks
Authors:
Ivana Nikoloska,
Osvaldo Simeone
Abstract:
In this paper, we consider the problem of power control for a wireless network with an arbitrarily time-varying topology, including the possible addition or removal of nodes. A data-driven design methodology that leverages graph neural networks (GNNs) is adopted in order to efficiently parametrize the power control policy mapping the channel state information (CSI) to transmit powers. The specific…
▽ More
In this paper, we consider the problem of power control for a wireless network with an arbitrarily time-varying topology, including the possible addition or removal of nodes. A data-driven design methodology that leverages graph neural networks (GNNs) is adopted in order to efficiently parametrize the power control policy mapping the channel state information (CSI) to transmit powers. The specific GNN architecture, known as random edge GNN (REGNN), defines a non-linear graph convolutional filter whose spatial weights are tied to the channel coefficients. While prior work assumed a joint training approach whereby the REGNN-based policy is shared across all topologies, this paper targets adaptation of the power control policy based on limited CSI data regarding the current topology. To this end, we propose a novel modular meta-learning technique that enables the efficient optimization of module assignment. While black-box meta-learning optimizes a general-purpose adaptation procedure via (stochastic) gradient descent, modular meta-learning finds a set of reusable modules that can form components of a solution for any new network topology. Numerical results validate the benefits of meta-learning for power control problems over joint training schemes, and demonstrate the advantages of modular meta-learning when data availability is extremely limited.
△ Less
Submitted 23 May, 2022; v1 submitted 4 August, 2021;
originally announced August 2021.
-
Fast Power Control Adaptation via Meta-Learning for Random Edge Graph Neural Networks
Authors:
Ivana Nikoloska,
Osvaldo Simeone
Abstract:
Power control in decentralized wireless networks poses a complex stochastic optimization problem when formulated as the maximization of the average sum rate for arbitrary interference graphs. Recent work has introduced data-driven design methods that leverage graph neural network (GNN) to efficiently parametrize the power control policy mapping channel state information (CSI) to the power vector.…
▽ More
Power control in decentralized wireless networks poses a complex stochastic optimization problem when formulated as the maximization of the average sum rate for arbitrary interference graphs. Recent work has introduced data-driven design methods that leverage graph neural network (GNN) to efficiently parametrize the power control policy mapping channel state information (CSI) to the power vector. The specific GNN architecture, known as random edge GNN (REGNN), defines a non-linear graph convolutional architecture whose spatial weights are tied to the channel coefficients, enabling a direct adaption to channel conditions. This paper studies the higher-level problem of enabling fast adaption of the power control policy to time-varying topologies. To this end, we apply first-order meta-learning on data from multiple topologies with the aim of optimizing for a few-shot adaptation to new network configurations.
△ Less
Submitted 2 May, 2021;
originally announced May 2021.
-
Deep Reinforcement Learning-Aided Random Access
Authors:
Ivana Nikoloska,
Nikola Zlatanov
Abstract:
We consider a system model comprised of an access point (AP) and K Internet of Things (IoT) nodes that sporadically become active in order to send data to the AP. The AP is assumed to have N time-frequency resource blocks that it can allocate to the IoT nodes that wish to send data, where N < K. The main problem is how to allocate the N time-frequency resource blocks to the IoT nodes in each time…
▽ More
We consider a system model comprised of an access point (AP) and K Internet of Things (IoT) nodes that sporadically become active in order to send data to the AP. The AP is assumed to have N time-frequency resource blocks that it can allocate to the IoT nodes that wish to send data, where N < K. The main problem is how to allocate the N time-frequency resource blocks to the IoT nodes in each time slot such that the average packet rate is maximized. For this problem, we propose a deep reinforcement learning (DRL)-aided random access (RA) scheme, where an intelligent DRL agent at the AP learns to predict the activity of the IoT nodes in each time slot and grants time-frequency resource blocks to the IoT nodes predicted as active. Next, the IoT nodes that are missclassified as non-active by the DRL agent, as well as unseen or newly arrived nodes in the cell, employ the standard RA scheme in order to obtain time-frequency resource blocks. We leverage expert knowledge for faster training of the DRL agent. Our numerical results show significant improvements in terms of average packet rate when the proposed DRL-aided RA scheme is implemented compared to the existing solution used in practice, the standard RA scheme.
△ Less
Submitted 5 April, 2020;
originally announced April 2020.
-
Inference over Wireless IoT Links with Importance-Filtered Updates
Authors:
Ivana Nikoloska,
Josefine Holm,
Anders Kalør,
Petar Popovski,
Nikola Zlatanov
Abstract:
We consider a communication cell comprised of Internet-of-Things (IoT) nodes transmitting to a common Access Point (AP). The nodes in the cell are assumed to generate data samples periodically, which are to be transmitted to the AP. The AP hosts a machine learning model, such as a neural network, which is trained on the received data samples to make accurate inferences. We address the following tr…
▽ More
We consider a communication cell comprised of Internet-of-Things (IoT) nodes transmitting to a common Access Point (AP). The nodes in the cell are assumed to generate data samples periodically, which are to be transmitted to the AP. The AP hosts a machine learning model, such as a neural network, which is trained on the received data samples to make accurate inferences. We address the following tradeoff: The more often the IoT nodes transmit, the higher the accuracy of the inference made by the AP, but also the higher the energy expenditure at the IoT nodes. We propose a data filtering scheme employed by the IoT nodes, which we refer to as distributed importance filtering in order to filter out redundant data samples already at the IoT nodes. The IoT nodes do not have large on-device machine learning models and the data filtering scheme operates under periodic instructions from the model placed at the AP. The proposed scheme is evaluated using neural networks on a benchmark machine vision dataset, as well as in two practical scenarios: leakage detection in water distribution networks and air-pollution detection in urban areas. The results show that the proposed scheme offers significant benefits in terms of network longevity as it preserves the devices' resources, whilst maintaining high inference accuracy. Our approach reduces the the computational complexity for training the model and obviates the need for data pre-processing, which makes it highly applicable in practical IoT scenarios.
△ Less
Submitted 1 December, 2020; v1 submitted 21 January, 2020;
originally announced January 2020.
-
On the Secrecy Capacity of a Full-Duplex Wirelessly Powered Communication System
Authors:
Ivana Nikoloska,
Nikola Zlatanov,
Zoran Hadzi-Velkov,
Rui Zhang
Abstract:
In this paper, we investigate the secrecy capacity of a point-to-point, full-duplex (FD) wirelesly powered communication system in the presence of a passive eavesdropper (EVE). The considered system is comprised of an energy transmitter (ET), an energy harvesting user (EHU), and a passive EVE. The ET transmits radio-frequency energy, which is used for powering the EHU as well as for generating int…
▽ More
In this paper, we investigate the secrecy capacity of a point-to-point, full-duplex (FD) wirelesly powered communication system in the presence of a passive eavesdropper (EVE). The considered system is comprised of an energy transmitter (ET), an energy harvesting user (EHU), and a passive EVE. The ET transmits radio-frequency energy, which is used for powering the EHU as well as for generating interference at the EVE. The EHU uses the energy harvested from the ET to transmit confidential messages back to the ET. As a consequence of the FD mode of operation, both the EHU and the ET are subjected to self-interference, which has different effects at the two nodes. In particular, the self-interference impairs the decoding of the received message at the ET, whilst it serves as an additional energy source at the EHU. For this system model, we derive an upper and a lower bound on the secrecy capacity. For the lower bound, we propose a simple achievability scheme. Our numerical results show significant improvements in terms of achievable secrecy rate when the proposed communication scheme is employed against its half-duplex counterpart, even for practical self-interference values at the ET.
△ Less
Submitted 26 August, 2019; v1 submitted 24 April, 2018;
originally announced April 2018.
-
Capacity of a Full-Duplex Wirelessly Powered Communication System with Self-Interference and Processing Cost
Authors:
Ivana Nikoloska,
Nikola Zlatanov,
Zoran Hadzi-Velkov
Abstract:
In this paper, we investigate the capacity of a point-to-point, full-duplex (FD), wirelessly powered communication system impaired by self-interference. This system is comprised of an energy transmitter (ET) and an energy harvesting user (EHU), both operating in a FD mode. The ET transmits energy towards the EHU. The EHU harvests this energy and uses it to transmit information back to the ET. As a…
▽ More
In this paper, we investigate the capacity of a point-to-point, full-duplex (FD), wirelessly powered communication system impaired by self-interference. This system is comprised of an energy transmitter (ET) and an energy harvesting user (EHU), both operating in a FD mode. The ET transmits energy towards the EHU. The EHU harvests this energy and uses it to transmit information back to the ET. As a result of the FD mode, both nodes are affected by self-interference. The self-interference has a different effect at the two nodes: it impairs the decoding of the received signal at the ET, however, it provides an additional source of energy for the EHU. This paper derives the capacity of this communication system assuming a processing cost at the EHU and additive white Gaussian noise channel with block fading. Thereby, we show that the capacity achieving scheme is relatively simple and therefore applicable to devices with limited resources. Moreover, our numerical results show significant improvements in terms of data rate when the capacity achieving strategy is employed compared to half-duplex transmission. Moreover, we show the positive and negative effects of the self-interference at the EHU and the ET, respectively. Furthermore, we show the crippling effect of the processing cost and demonstrate that failing to take it into consideration gives a false impression in terms of achievable rate.
△ Less
Submitted 6 October, 2017;
originally announced October 2017.
-
Wireless Networks with Energy Harvesting and Power Transfer: Joint Power and Time Allocation
Authors:
Zoran Hadzi-Velkov,
Ivana Nikoloska,
George K. Karagiannidis,
Trung Q. Duong
Abstract:
In this paper, we consider wireless powered communication networks which could operate perpetually, as the base station (BS) broadcasts energy to the multiple energy harvesting (EH) information transmitters. These employ "harvest then transmit" mechanism, as they spend all of their energy harvested during the previous BS energy broadcast to transmit the information towards the BS. Assuming time di…
▽ More
In this paper, we consider wireless powered communication networks which could operate perpetually, as the base station (BS) broadcasts energy to the multiple energy harvesting (EH) information transmitters. These employ "harvest then transmit" mechanism, as they spend all of their energy harvested during the previous BS energy broadcast to transmit the information towards the BS. Assuming time division multiple access (TDMA), we propose a novel transmission scheme for jointly optimal allocation of the BS broadcasting power and time sharing among the wireless nodes, which maximizes the overall network throughput, under the constraint of average transmit power and maximum transmit power at the BS. The proposed scheme significantly outperforms "state of the art" schemes that employ only the optimal time allocation. If a single EH transmitter is considered, we generalize the optimal solutions for the case of fixed circuit power consumption, which refers to a much more practical scenario.
△ Less
Submitted 1 March, 2016; v1 submitted 19 January, 2016;
originally announced January 2016.