Skip to main content

Showing 1–12 of 12 results for author: Akyol, E

Searching in archive math. Search in all archives.
.
  1. arXiv:1804.02609  [pdf, other

    eess.SY cs.IT math.OC

    On Remote Estimation with Multiple Communication Channels

    Authors: Xiaobin Gao, Emrah Akyol, Tamer Basar

    Abstract: This paper considers a sequential sensor scheduling and remote estimation problem with multiple communication channels. Departing from the classical remote estimation paradigm, which involves one communication channel (noiseless or noisy), we consider here the more realistic setting of two channels with different characteristics (one is cheap but noisy, the other one is costly but noiseless). We f… ▽ More

    Submitted 7 April, 2018; originally announced April 2018.

  2. arXiv:1803.06377  [pdf, other

    cs.SI cs.MA eess.SY math.OC

    Spread of Information with Confirmation Bias in Cyber-Social Networks

    Authors: Yanbing Mao, Sadegh Bolouki, Emrah Akyol

    Abstract: This paper provides a model to investigate information spreading over cyber-social network of agents communicating with each other. The cyber-social network considered here comprises individuals and news agencies. Each individual holds a belief represented by a scalar. Individuals receive information from news agencies that are closer to their belief, confirmation bias is explicitly incorporated i… ▽ More

    Submitted 16 March, 2018; originally announced March 2018.

  3. arXiv:1711.11183  [pdf, ps, other

    eess.SY cs.MA math.OC

    Strategic Topology Switching for Security-Part I: Consensus & Switching Times

    Authors: Yanbing Mao, Emrah Akyol, Ziang Zhang

    Abstract: In this two-part paper, we consider strategic topology switching for the second-order multi-agent systems under a special class of stealthy attacks, namely the "zero-dynamics" attack (ZDA). The main mathematical tool proposed here is to strategically switch the network topology to detect a possible ZDA. However, it is not clear a priori that such a switching strategy still yields consensus in this… ▽ More

    Submitted 4 March, 2019; v1 submitted 29 November, 2017; originally announced November 2017.

    Comments: working paper, 12 pages

  4. arXiv:1711.11181  [pdf, ps, other

    cs.MA math.OC

    Strategic Topology Switching for Security-Part II: Detection & Switching Topologies

    Authors: Yanbing Mao, Emrah Akyol, Ziang Zhang

    Abstract: This two-part paper considers strategic topology switching for security in the second-order multi-agent system. In Part II, we propose a strategy on switching topologies to detect zero-dynamics attack (ZDA), whose attack-starting time is allowed to be not the initial time. We first characterize the sufficient and necessary condition for detectability of ZDA, in terms of the network topologies to b… ▽ More

    Submitted 4 March, 2019; v1 submitted 29 November, 2017; originally announced November 2017.

    Comments: working paper, 12 pages, second part of a two-part paper

  5. arXiv:1610.05471  [pdf, other

    math.OC cs.IT eess.SY

    Optimal Communication Scheduling and Remote Estimation over an Additive Noise Channel

    Authors: Xiaobin Gao, Emrah Akyol, Tamer Basar

    Abstract: This paper considers a sequential sensor scheduling and remote estimation problem with one sensor and one estimator. The sensor makes sequential observations about the state of an underlying memoryless stochastic process and makes a decision as to whether or not to send this measurement to the estimator. The sensor and the estimator have the common objective of minimizing expected distortion in th… ▽ More

    Submitted 18 October, 2016; originally announced October 2016.

    Comments: Extended version of a journal submission

  6. arXiv:1609.09448  [pdf, other

    cs.GT math.OC

    Hierarchical Multistage Gaussian Signaling Games in Noncooperative Communication and Control Systems

    Authors: Muhammed O. Sayin, Emrah Akyol, Tamer Basar

    Abstract: We analyze in this paper finite horizon hierarchical signaling games between (information provider) senders and (decision maker) receivers in a dynamic environment. The underlying information evolves in time while sender and receiver interact repeatedly. Different from the classical communication (control) models, however, the sender (sensor) and the receiver (controller) have different objectives… ▽ More

    Submitted 11 June, 2019; v1 submitted 29 September, 2016; originally announced September 2016.

    Journal ref: Automatica, Volume 107, September 2019

  7. arXiv:1602.06375  [pdf, other

    cs.IT cs.RO math.OC stat.AP

    Power-Distortion Metrics for Path Planning over Gaussian Sensor Networks

    Authors: Emrah Akyol, Urbashi Mitra

    Abstract: Path planning is an important component of au- tonomous mobile sensing systems. This paper studies upper and lower bounds of communication performance over Gaussian sen- sor networks, to drive power-distortion metrics for path planning problems. The Gaussian multiple-access channel is employed as a channel model and two source models are considered. In the first setting, the underlying source is e… ▽ More

    Submitted 20 February, 2016; originally announced February 2016.

    Comments: will appear in Trans. on Communications

  8. arXiv:1510.00764  [pdf, other

    cs.IT cs.GT math.OC

    Information-Theoretic Approach to Strategic Communication as a Hierarchical Game

    Authors: Emrah Akyol, Cedric Langbort, Tamer Basar

    Abstract: This paper analyzes the information disclosure problems originated in economics through the lens of information theory. Such problems are radically different from the conventional communication paradigms in information theory since they involve different objectives for the encoder and the decoder, which are aware of this mismatch and act accordingly. This leads, in our setting, to a hierarchical c… ▽ More

    Submitted 11 July, 2016; v1 submitted 2 October, 2015; originally announced October 2015.

    Comments: in press, the Proceedings of the IEEE, Special Issue on Principles and Applications of Science of Information

  9. arXiv:1403.5315  [pdf, other

    eess.SY cs.IT math.OC

    A Deterministic Annealing Optimization Approach for Witsenhausen's and Related Decentralized Control Settings

    Authors: Mustafa Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper studies the problem of mapping optimization in decentralized control problems. A global optimization algorithm is proposed based on the ideas of ``deterministic annealing" - a powerful non-convex optimization framework derived from information theoretic principles with analogies to statistical physics. The key idea is to randomize the mappings and control the Shannon entropy of the syst… ▽ More

    Submitted 20 March, 2014; originally announced March 2014.

    Comments: submitted to CDC'14

  10. arXiv:1402.0525  [pdf, other

    cs.IT eess.SY math.OC

    A Deterministic Annealing Approach to Witsenhausen's Counterexample

    Authors: Mustafa Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper proposes a numerical method, based on information theoretic ideas, to a class of distributed control problems. As a particular test case, the well-known and numerically "over-mined" problem of decentralized control and implicit communication, commonly referred to as Witsenhausen's counterexample, is considered. The method provides a small improvement over the best numerical result so fa… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Comments: submitted to ISIT'14

  11. arXiv:1305.3931  [pdf, other

    cs.IT eess.SY math.OC

    Gaussian Sensor Networks with Adversarial Nodes

    Authors: Emrah Akyol, Kenneth Rose, Tamer Basar

    Abstract: This paper studies a particular sensor network model which involves one single Gaussian source observed by many sensors, subject to additive independent Gaussian observation noise. Sensors communicate with the receiver over an additive Gaussian multiple access channel. The aim of the receiver is to reconstruct the underlying source with minimum mean squared error. The scenario of interest here is… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: 5 pages, will be presented at ISIT 2013, Istanbul, Turkey

  12. arXiv:1303.3049  [pdf, other

    math.OC cs.IT eess.SY

    On Optimal Jamming Over an Additive Noise Channel

    Authors: Emrah Akyol, Kenneth Rose, Tamer Basar

    Abstract: This paper considers the problem of optimal zero-delay jamming over an additive noise channel. Early work had already solved this problem for a Gaussian source and channel. Building on a sequence of recent results on conditions for linearity of optimal estimation, and of optimal mappings in source-channel coding, we derive the saddle-point solution to the jamming problem for general sources and ch… ▽ More

    Submitted 12 March, 2013; originally announced March 2013.

    Comments: Submitted to 2013 Conference on Decision and Control