• Centrality is widely recognized as one of the most critical measures to provide insight in the structure and function of complex networks. While various centrality measures have been proposed for single-layer networks, a general framework for studying centrality in multilayer networks (i.e., multicentrality) is still lacking. In this study, a tensor-based framework is introduced to study eigenvector multicentrality, which enables the quantification of the impact of interlayer influence on multicentrality, providing a systematic way to describe how multicentrality propagates across different layers. This framework can leverage prior knowledge about the interplay among layers to better characterize multicentrality for varying scenarios. Two interesting cases are presented to illustrate how to model multilayer influence by choosing appropriate functions of interlayer influence and design algorithms to calculate eigenvector multicentrality. This framework is applied to analyze several empirical multilayer networks, and the results corroborate that it can quantify the influence among layers and multicentrality of nodes effectively.
  • It is well known that the mutual information between two random variables can be expressed as the difference of two relative entropies that depend on an auxiliary distribution, a relation sometimes referred to as the golden formula. This paper is concerned with a finite-blocklength extension of this relation. This extension consists of two elements: 1) a finite-blocklength channel-coding converse bound by Polyanskiy and Verd\'{u} (2014), which involves the ratio of two Neyman-Pearson $\beta$ functions (beta-beta converse bound); and 2) a novel beta-beta channel-coding achievability bound, expressed again as the ratio of two Neyman-Pearson $\beta$ functions. To demonstrate the usefulness of this finite-blocklength extension of the golden formula, the beta-beta achievability and converse bounds are used to obtain a finite-blocklength extension of Verd\'{u}'s (2002) wideband-slope approximation. The proof parallels the derivation of the latter, with the beta-beta bounds used in place of the golden formula. The beta-beta (achievability) bound is also shown to be useful in cases where the capacity-achieving output distribution is not a product distribution due to, e.g., a cost constraint or structural constraints on the codebook, such as orthogonality or constant composition. As an example, the bound is used to characterize the channel dispersion of the additive exponential-noise channel and to obtain a finite-blocklength achievability bound (the tightest to date) for multiple-input multiple-output Rayleigh-fading channels with perfect channel state information at the receiver.
  • A downlink single-input single-output (SISO) non-orthogonal multiple access (NOMA) system is considered where a base station (BS) is communicating with two legitimate users in the presence of an external eavesdropper. A number of trusted cooperative half-duplex relay nodes, that are powered by the BS, are introduced to assist the BS's transmission. The goal is to design relaying schemes such that the legitimate users' secrecy rate region is maximized subject to a total power constraint on the BS and the relays' transmission. We investigate three relaying schemes: cooperative jamming, decode-and-forward, and amplify-and-forward. Depending on the scheme, we carefully design a transmit beamforming signal at the relay nodes that either diminishes the eavesdropper's rate without affecting that of the legitimate users, or increases the legitimate users' rates without increasing that of the eavesdropper. The results show that there is no relaying scheme that fits all conditions; the best relaying scheme depends on the system parameters, namely, the relays' and eavesdropper's distances from the BS, and the number of relays. They also show that the relatively simple cooperative jamming scheme outperforms other schemes when the relays are far away from the BS and/or close to the eavesdropper.
  • Tight bounds on the minimum mean square error for the additive Gaussian noise channel are derived, when the input distribution is constrained to be epsilon-close to a Gaussian reference distribution in terms of the Kullback--Leibler divergence. The distributions that attain the bounds are shown be Gaussian whose means are identical to that of the reference distribution and whose covariance matrices are defined implicitly via systems of matrix equations. The estimator that attains the upper bound is identified as a minimax optimal estimator that is robust against deviations from the assumed prior. The lower bound is shown to provide a potentially tighter alternative to the Cramer--Rao bound. Both properties are illustrated with numerical examples.
  • Cell-free massive multiple-input multiple-output (MIMO) is a potential key technology for fifth generation wireless communication networks. A mixed quality-of-service (QoS) problem is investigated in the uplink of a cell-free massive MIMO system where the minimum rate of non-real time users is maximized with per user power constraints whilst the rate of the real-time users (RTUs) meet their target rates. First an approximated uplink user rate is derived based on available channel statistics. Next, the original mixed QoS problem is formulated in terms of receiver filter coefficients and user power allocations which can iteratively be solved through two sub-problems, namely, receiver filter coefficient design and power allocation, which are dealt with using a generalized eigenvalue problem and geometric programming, respectively. Numerical results show that with the proposed scheme, while the rates of RTUs meet the QoS constraints, the $90\%$-likely throughput improves significantly, compared to a simple benchmark scheme.
  • This paper studies the capacity of an $n$-dimensional vector Gaussian noise channel subject to the constraint that an input must lie in the ball of radius $R$ centered at the origin. It is known that in this setting the optimizing input distribution is supported on a finite number of concentric spheres. However, the number, the positions and the probabilities of the spheres are generally unknown. This paper characterizes the necessary and sufficient conditions on the constraint $R$ such that the input distribution supported on a single sphere is optimal. The maximum $\bar{R}_n$, such that using only a single sphere is optimal, is shown to be a solution of an integral equation. Moreover, it is shown that $\bar{R}_n$ scales as $\sqrt{n}$ and the exact limit of $\frac{\bar{R}_n}{\sqrt{n}}$ is found.
  • The next-generation energy network, the so-called (SG), promises a tremendous increase in efficiency, safety and flexibility of managing the electricity grid as compared to the legacy energy network. This is needed today more than ever, as the global energy consumption is growing at an unprecedented rate, and renewable energy sources have to be seamlessly integrated into the grid to assure a sustainable human development. Smart meters (SMs) are among the crucial enablers of the SG concept; they supply accurate high-frequency information about users' household energy consumption to a utility provider, which is essential for time of use pricing, rapid fault detection, energy theft prevention, while also providing consumers with more flexibility and control over their consumption. However, highly accurate and granular SM data also poses a threat to consumer privacy as non-intrusive load monitoring techniques enable a malicious attacker to infer many details of a user's private life. This article focuses on privacy-enhancing energy management techniques that provide accurate energy consumption information to the grid operator, without sacrificing consumer privacy. In particular, we focus on techniques that shape and modify the actual user energy consumption by means of physical resources, such as rechargeable batteries, renewable energy sources or demand shaping. A rigorous mathematical analysis of privacy is presented under various physical constraints on the available physical resources. Finally, open questions and challenges that need to be addressed to pave the way to the effective protection of users' privacy in future SGs are presented.
  • This paper considers the coexistence of two important communication techniques, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC). Both NOMA uplink and downlink transmissions are applied to MEC, and analytical results are developed to demonstrate that the use of NOMA can efficiently reduce the latency and energy consumption of MEC offloading. In addition, various asymptotic studies are carried out to reveal the impact of the users' channel conditions and transmit powers on the application of NOMA to MEC is quite different to those in conventional NOMA scenarios. Computer simulation results are also provided to facilitate the performance evaluation of NOMA-MEC and also verify the accuracy of the developed analytical results.
  • The paper deals with minimax optimal statistical tests for two composite hypotheses, where each hypothesis is defined by a non-parametric uncertainty set of feasible distributions. It is shown that for every pair of uncertainty sets of the f-divergence ball type, a pair of uncertainty sets of the density band type can be constructed, which is equivalent in the sense that it admits the same pair of least favorable distributions. This result implies that robust tests under $f$-divergence ball uncertainty, which are typically only minimax optimal for the single sample case, are also fixed sample size minimax optimal with respect to the equivalent density band uncertainty sets.
  • The effect of "good", point-to-point capacity achieving, code sequences on an additional signal, of bounded variance, transmitted over the additive Gaussian noise channel is examined. For such code sequences, it is shown that their effect, in terms of mutual information, on the additional bounded variance signal, is as if additional additive Gaussian noise has been transmitted. Moreover, the analysis shows that for reliable communication the bounded variance signal must be completely estimated by the receiver (i.e., the minimum mean-square error tends to zero). This result resolves the "Costa Conjecture" regarding the corner points of the two-user Gaussian interference channel for code sequences of bounded variance, and shows that both messages must be reliably decoded.
  • A recent result of the authors shows a so-called I-MMSE-like relationship that, for the two-user Gaussian interference channel, an I-MMSE relationship holds in the limit, as n $\to \infty$, between the interference and the interfered-with receiver, assuming that the interfered-with transmission is an optimal point-to-point sequence (achieves the point-to-point capacity). This result was further used to provide a proof of the "missing corner points" of the two-user Gaussian interference channel. This paper provides an information theoretic proof of the above-mentioned I-MMSE-like relationship which follows the incremental channel approach, an approach which was used by Guo, Shamai and Verd\'u to provide an insightful proof of the original I-MMSE relationship for point-to-point channels. Finally, some additional applications of this result are shown for other multi-user settings: the Gaussian multiple-access channel with interference and specific K-user Gaussian Z-interference channel settings.
  • In this paper, storage efficient caching based on time domain buffer sharing is considered. The caching policy allows a user to determine whether and how long it should cache a content item according to the prediction of its random request time, also referred to as the request delay information (RDI). In particular, the aim is to maximize the caching gain for communications while limiting its storage cost. To achieve this goal, a queueing theoretic model for caching with infinite buffers is first formulated, in which Little's law is adopted to obtain the tradeoff between the hit ratio and the average buffer consumption. When there exist multiple content classes with different RDIs, the storage efficiency is further optimized by carefully allocating the storage cost. For more practical finite-buffer caching, a $G/GI/L/0$ queue model is formulated, in which a diffusion approximation and Erlang-B formula are adopted to determine the buffer overflow probability and the corresponding hit ratio. The optimal hit ratio is shown to be limited by the demand probability and buffer size for large and small buffers respectively. In practice, a user may exploit probabilistic caching with random maximum caching time and arithmetic caching without any need for content arrival statistics to efficiently harvest content files in air.
  • This paper investigates the downlink performance of K-tier heteregeneous cellular networks (HCNs) under general settings. First, Gaussian approximation bounds for the standardized aggregate wireless interference (AWI) in dense K-tier HCNs are obtained for when base stations (BSs) in each tier are distributed over the plane according to a spatial and general Poisson point process. The Kolmogorov-Smirnov (KS) distance is used to measure deviations of the distribution of the standardized AWI from the standard normal distribution. An explicit and analytical expression bounding the KS distance between these two distributions is obtained as a function of a broad range of network parameters such as per-tier transmission power levels, per-tier BS intensity, BS locations, general fading statistics, and general bounded path-loss models. Bounds achieve a good statistical match between the standardized AWI distribution and its normal approximation even for moderately dense HCNs. Second, various spatial performance metrics of interest such as outage capacity, ergodic capacity and area spectral efficiency in the downlink of K-tier HCNs for general signal propogation models are investigated by making use of the derived distribution approximation results. Considering two specific BS association policies, it is shown that the derived performance bounds track the actual performance metrics reasonably well for a wide range of BS intensities, with the gap among them becoming negligibly small for denser HCN deployments.
  • Radio waves carry both energy and information simultaneously. Nevertheless, Radio-Frequency (RF) transmission of these quantities have traditionally been treated separately. Currently, we are experiencing a paradigm shift in wireless network design, namely unifying wireless transmission of information and power so as to make the best use of the RF spectrum and radiations as well as the network infrastructure for the dual purpose of communicating and energizing. In this paper, we review and discuss recent progress on laying the foundations of the envisioned dual purpose networks by establishing a signal theory and design for Wireless Information and Power Transmission (WIPT) and identifying the fundamental tradeoff between conveying information and power wirelessly. We start with an overview of WIPT challenges and technologies, namely Simultaneous Wireless Information and Power Transfer (SWIPT),Wirelessly Powered Communication Network (WPCN), and Wirelessly Powered Backscatter Communication (WPBC). We then characterize energy harvesters and show how WIPT signal and system designs crucially revolve around the underlying energy harvester model. To that end, we highlight three different energy harvester models, namely one linear model and two nonlinear models, and show how WIPT designs differ for each of them in single-user and multi-user deployments. Topics discussed include rate-energy region characterization, transmitter and receiver architecture, waveform design, modulation, beamforming and input distribution optimizations, resource allocation, and RF spectrum use. We discuss and check the validity of the different energy harvester models and the resulting signal theory and design based on circuit simulations, prototyping and experimentation. We also point out numerous directions that are promising for future research.
  • Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes.
  • This paper investigates two strategies to reduce the communication delay in future wireless networks: traffic dispersion and network densification. A hybrid scheme that combines these two strategies is also considered. The probabilistic delay and effective capacity are used to evaluate performance. For probabilistic delay, the violation probability of delay, i.e., the probability that the delay exceeds a given tolerance level, is characterized in terms of upper bounds, which are derived by applying stochastic network calculus theory. In addition, to characterize the maximum affordable arrival traffic for mmWave systems, the effective capacity, i.e., the service capability with a given quality-of-service (QoS) requirement, is studied. The derived bounds on the probabilistic delay and effective capacity are validated through simulations. These numerical results show that, for a given average system gain, traffic dispersion, network densification, and the hybrid scheme exhibit different potentials to reduce the end-to-end communication delay. For instance, traffic dispersion outperforms network densification, given high average system gain and arrival rate, while it could be the worst option, otherwise. Furthermore, it is revealed that, increasing the number of independent paths and/or relay density is always beneficial, while the performance gain is related to the arrival rate and average system gain, jointly. Therefore, a proper transmission scheme should be selected to optimize the delay performance, according to the given conditions on arrival traffic and system service capability.
  • Traditionally, differential privacy mechanism design has been tailored for a scalar-valued query function. Although many mechanisms such as the Laplace and Gaussian mechanisms can be extended to a matrix-valued query function by adding i.i.d. noise to each element of the matrix, this method is often sub-optimal as it forfeits an opportunity to exploit the structural characteristics typically associated with matrix analysis. In this work, we consider the design of differential privacy mechanism specifically for a matrix-valued query function. The proposed solution is to utilize a matrix-variate noise, as opposed to the traditional scalar-valued noise. Particularly, we propose a novel differential privacy mechanism called the Matrix-Variate Gaussian (MVG) mechanism, which adds a matrix-valued noise drawn from a matrix-variate Gaussian distribution. We prove that the MVG mechanism preserves $(\epsilon,\delta)$-differential privacy, and show that it allows the structural characteristics of the matrix-valued query function to naturally be exploited. Furthermore, due to the multi-dimensional nature of the MVG mechanism and the matrix-valued query, we introduce the concept of directional noise, which can be utilized to mitigate the impact the noise has on the utility of the query. Finally, we demonstrate the performance of the MVG mechanism and the advantages of directional noise using three matrix-valued queries on three privacy-sensitive datasets. We find that the MVG mechanism notably outperforms four previous state-of-the-art approaches, and provides comparable utility to the non-private baseline. Our work thus presents a promising prospect for both future research and implementation of differential privacy for matrix-valued query functions.
  • Differential privacy mechanism design has traditionally been tailored for a scalar-valued query function. Although many mechanisms such as the Laplace and Gaussian mechanisms can be extended to a matrix-valued query function by adding i.i.d. noise to each element of the matrix, this method is often suboptimal as it forfeits an opportunity to exploit the structural characteristics typically associated with matrix analysis. To address this challenge, we propose a novel differential privacy mechanism called the Matrix-Variate Gaussian (MVG) mechanism, which adds a matrix-valued noise drawn from a matrix-variate Gaussian distribution, and we rigorously prove that the MVG mechanism preserves $(\epsilon,\delta)$-differential privacy. Furthermore, we introduce the concept of directional noise made possible by the design of the MVG mechanism. Directional noise allows the impact of the noise on the utility of the matrix-valued query function to be moderated. Finally, we experimentally demonstrate the performance of our mechanism using three matrix-valued queries on three privacy-sensitive datasets. We find that the MVG mechanism notably outperforms four previous state-of-the-art approaches, and provides comparable utility to the non-private baseline.
  • A sensor node that is sending measurement updates regarding some physical phenomenon to a destination is considered. The sensor relies on energy harvested from nature to transmit its updates, and is equipped with a finite $B$-sized battery to save its harvested energy. Energy recharges the battery incrementally in units, according to a Poisson process, and one update consumes one energy unit to reach the destination. The setting is online, where the energy arrival times are revealed causally after the energy is harvested. The goal is to update the destination in a timely manner, namely, such that the long term average age of information is minimized, subject to energy causality constraints. The age of information at a given time is defined as the time spent since the latest update has reached the destination. It is shown that the optimal update policy follows a renewal structure, where the inter-update times are independent, and the time durations between any two consecutive events of submitting an update and having $k$ units of energy remaining in the battery are independent and identically distributed for a given $k\leq B-1$. The optimal renewal policy for the case of $B=2$ energy units is explicitly characterized, and it is shown that it has an energy-dependent threshold structure, where the sensor updates only if the age grows above a certain threshold that is a function of the amount of energy in its battery.
  • Recently, non-orthogonal multiple access (NOMA) has attracted considerable interest as one of the 5G-enabling techniques. However, users with better channel conditions in downlink communications intrinsically benefits from NOMA thanks to successive decoding, judicious designs are required to guarantee user fairness. In this paper, a two-user downlink NOMA system over fading channels is considered. For delay-tolerant transmission, the average sum-rate is maximized subject to both average and peak power constraints as well as a minimum average user rate constraint. The optimal resource allocation is obtained using Lagrangian dual decomposition under full channel state information at the transmitter (CSIT), while an effective power allocation policy under partial CSIT is also developed based on analytical results. In parallel, for delay-limited transmission, the sum of delay-limited throughput (DLT) is maximized subject to a maximum allowable user outage constraint under full CSIT, and the analysis for the sum of DLT is also performed under partial CSIT. Furthermore, an optimal orthogonal multiple access (OMA) scheme is also studied as a benchmark to prove the superiority of NOMA over OMA under full CSIT. Finally, the theoretical analysis is verified by simulations via different trade-offs for the average sum-rate (sum-DLT) versus the minimum (maximum) average user rate (outage) requirement.
  • A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of wireless channel knowledge, the problem of interest is beamforming to optimize the users' quality-of-service (QoS) in terms of their secrecy throughputs or maximize the network's energy efficiency under users' QoS. All these problems are seen as very difficult optimization problems with many nonconvex constraints and nonlinear equality constraints in beamforming vectors. The paper develops path-following computational procedures of low-complexity and rapid convergence for the optimal beamforming solution. Their practicability is demonstrated through numerical examples.
  • The problem of secure broadcasting with independent secret keys is studied. The particular scenario is analyzed in which a common message has to be broadcast to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of sufficiently high rates with both legitimate receivers, which can be used in different ways: they can be used as one-time pads to encrypt the common message, as fictitious messages for wiretap coding, or as a hybrid of these. In this paper, capacity results are established when the broadcast channels involving the three receivers are degraded. If both legitimate channels are degraded versions of the eavesdropper's channel, it is shown that the one-time pad approach is optimal for several cases, yielding corresponding capacity expressions. Alternatively, the wiretap coding approach is shown to be optimal if the eavesdropper's channel is degraded with respect to both legitimate channels, establishing capacity in this case as well. If the eavesdropper's channel is neither the strongest nor the weakest, an intricate scheme that carefully combines both concepts of one-time pad and wiretap coding with fictitious messages turns out to be capacity-achieving. Finally we also obtain some results for the general non-degraded broadcast channel.
  • This paper studies the potential of harvesting energy from the self-interference of a full-duplex base station. The base station is equipped with a self-interference cancellation switch, which is turned-off for a fraction of the transmission period for harvesting the energy from the self-interference that arises due to the downlink transmission. For the remaining transmission period, the switch is on such that the uplink transmission takes place simultaneously with the downlink transmission. A novel energy-efficiency maximization problem is formulated for the joint design of downlink beamformers, uplink power allocations and transmission time-splitting factor. The optimization problem is nonconvex, and hence, a rapidly converging iterative algorithm is proposed by employing the successive convex approximation approach. Numerical simulation results show significant improvement in the energy-efficiency by allowing self-energy recycling.
  • A smart meter (SM) measures a consumer's electricity consumption and reports it automatically to a utility provider (UP) in almost real time. Despite many advantages of SMs, their use also leads to serious concerns about consumer privacy. In this paper, SM privacy is studied by considering the presence of a renewable energy source (RES) and a rechargeable battery (RB), which can be used to partially hide the consumer's energy consumption behavior. Privacy is measured by the information leakage rate, which denotes the average mutual information between the user's real energy consumption and the energy requested from the grid, which the SM reads and reports to the UP. The impact of the knowledge of the amount of energy generated by the RES at the UP is also considered. The minimum information leakage rate is characterized as a computable information theoretic single-letter expression in the two extreme cases, that is, when the battery capacity is infinite or zero. Numerical results are presented for the finite battery capacity case to illustrate the potential privacy gains from the existence of an RB. It is shown that, while the information leakage rate decreases with increasing availability of an RES, larger storage capacity is needed to fully exploit the available energy to improve the privacy.
  • In this paper, the k-th order autoregressive moving average (ARMA(k)) Gaussian wiretap channel with noiseless causal feedback is considered, in which an eavesdropper receives noisy observations of the signals in both forward and feedback channels. It is shown that a variant of the generalized Schalkwijk-Kailath scheme, a capacity-achieving coding scheme for the feedback Gaussian channel, achieves the same maximum rate for the same channel with the presence of an eavesdropper. Therefore, the secrecy capacity is equal to the feedback capacity without the presence of an eavesdropper for the feedback channel. Furthermore, the results are extended to the additive white Gaussian noise (AWGN) channel with quantized feedback. It is shown that the proposed coding scheme achieves a positive secrecy rate. As the amplitude of the quantization noise decreases to zero, the secrecy rate converges to the capacity of the AWGN channel.