ترغب بنشر مسار تعليمي؟ اضغط هنا

We consider a wireless federated learning system where multiple data holder edge devices collaborate to train a global model via sharing their parameter updates with an honest-but-curious parameter server. We demonstrate that the inherent hardware-in duced distortion perturbing the model updates of the edge devices can be exploited as a privacy-preserving mechanism. In particular, we model the distortion as power-dependent additive Gaussian noise and present a power allocation strategy that provides privacy guarantees within the framework of differential privacy. We conduct numerical experiments to evaluate the performance of the proposed power allocation scheme under different levels of hardware impairments.
We introduce a framework for linear precoder design over a massive multiple-input multiple-output downlink system and in presence of nonlinear power amplifiers (PAs). By studying the spatial characteristics of the distortion, we demonstrate that conv entional linear precoding techniques steer nonlinear distortions in the direction of the users. We show that, by taking into account PA nonlinearity characteristics, one can design linear precoders that reduce, and in single-user scenarios, even remove completely the distortion transmitted in the direction of the users. This, however, is achieved at the price of a considerably reduced array gain. To address this issue, we present precoder optimization algorithms which simultaneously take into account the effects of array gain, distortion, multiuser interference, and receiver noise. Specifically, we derive an expression for the achievable sum rate and propose an iterative algorithm that attempts to find the precoding matrix maximizing this expression. Moreover, using a model for PA power consumption, we propose an algorithm that attempts to find the precoding matrix minimizing the consumed power for a given minimum achievable sum rate. Our numerical results demonstrate that the proposed distortion-aware precoding techniques yield considerable improvements in terms of spectral and energy efficiency compared to conventional linear precoding techniques.
Finite-length codes are learned for the Gaussian wiretap channel in an end-to-end manner assuming that the communication parties are equipped with deep neural networks (DNNs), and communicate through binary phase-shift keying (BPSK) modulation scheme . The goal is to find codes via DNNs which allow a pair of transmitter and receiver to communicate reliably and securely in the presence of an adversary aiming at decoding the secret messages. Following the information-theoretic secrecy principles, the security is evaluated in terms of mutual information utilizing a deep learning tool called MINE (mutual information neural estimation). System performance is evaluated for different DNN architectures, designed based on the existing secure coding schemes, at the transmitter. Numerical results demonstrate that the legitimate parties can indeed establish a secure transmission in this setting as the learned codes achieve points on almost the boundary of the equivocation region.
In this work, we propose an iterative scheme for computing a linear precoder that takes into account the impact of hardware impairments in the multiuser multiple-input single-output downlink. We particularly focus on the case when the transmitter is equipped with nonlinear power amplifiers. Using Bussgangs theorem, we formulate a lower bound on the achievable sum rate in the presence of hardware impairments, and maximize it using projected gradient ascent. We provide numerical examples that demonstrate the efficacy of the proposed distortion-aware scheme for precoding over a millimeter-wave~channel.
Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا