
Centrality is widely recognized as one of the most critical measures to
provide insight in the structure and function of complex networks. While
various centrality measures have been proposed for singlelayer networks, a
general framework for studying centrality in multilayer networks (i.e.,
multicentrality) is still lacking. In this study, a tensorbased framework is
introduced to study eigenvector multicentrality, which enables the
quantification of the impact of interlayer influence on multicentrality,
providing a systematic way to describe how multicentrality propagates across
different layers. This framework can leverage prior knowledge about the
interplay among layers to better characterize multicentrality for varying
scenarios. Two interesting cases are presented to illustrate how to model
multilayer influence by choosing appropriate functions of interlayer influence
and design algorithms to calculate eigenvector multicentrality. This framework
is applied to analyze several empirical multilayer networks, and the results
corroborate that it can quantify the influence among layers and multicentrality
of nodes effectively.

It is well known that the mutual information between two random variables can
be expressed as the difference of two relative entropies that depend on an
auxiliary distribution, a relation sometimes referred to as the golden formula.
This paper is concerned with a finiteblocklength extension of this relation.
This extension consists of two elements: 1) a finiteblocklength channelcoding
converse bound by Polyanskiy and Verd\'{u} (2014), which involves the ratio of
two NeymanPearson $\beta$ functions (betabeta converse bound); and 2) a novel
betabeta channelcoding achievability bound, expressed again as the ratio of
two NeymanPearson $\beta$ functions.
To demonstrate the usefulness of this finiteblocklength extension of the
golden formula, the betabeta achievability and converse bounds are used to
obtain a finiteblocklength extension of Verd\'{u}'s (2002) widebandslope
approximation. The proof parallels the derivation of the latter, with the
betabeta bounds used in place of the golden formula.
The betabeta (achievability) bound is also shown to be useful in cases where
the capacityachieving output distribution is not a product distribution due
to, e.g., a cost constraint or structural constraints on the codebook, such as
orthogonality or constant composition. As an example, the bound is used to
characterize the channel dispersion of the additive exponentialnoise channel
and to obtain a finiteblocklength achievability bound (the tightest to date)
for multipleinput multipleoutput Rayleighfading channels with perfect
channel state information at the receiver.

A downlink singleinput singleoutput (SISO) nonorthogonal multiple access
(NOMA) system is considered where a base station (BS) is communicating with two
legitimate users in the presence of an external eavesdropper. A number of
trusted cooperative halfduplex relay nodes, that are powered by the BS, are
introduced to assist the BS's transmission. The goal is to design relaying
schemes such that the legitimate users' secrecy rate region is maximized
subject to a total power constraint on the BS and the relays' transmission. We
investigate three relaying schemes: cooperative jamming, decodeandforward,
and amplifyandforward. Depending on the scheme, we carefully design a
transmit beamforming signal at the relay nodes that either diminishes the
eavesdropper's rate without affecting that of the legitimate users, or
increases the legitimate users' rates without increasing that of the
eavesdropper. The results show that there is no relaying scheme that fits all
conditions; the best relaying scheme depends on the system parameters, namely,
the relays' and eavesdropper's distances from the BS, and the number of relays.
They also show that the relatively simple cooperative jamming scheme
outperforms other schemes when the relays are far away from the BS and/or close
to the eavesdropper.

Tight bounds on the minimum mean square error for the additive Gaussian noise
channel are derived, when the input distribution is constrained to be
epsilonclose to a Gaussian reference distribution in terms of the
KullbackLeibler divergence. The distributions that attain the bounds are
shown be Gaussian whose means are identical to that of the reference
distribution and whose covariance matrices are defined implicitly via systems
of matrix equations. The estimator that attains the upper bound is identified
as a minimax optimal estimator that is robust against deviations from the
assumed prior. The lower bound is shown to provide a potentially tighter
alternative to the CramerRao bound. Both properties are illustrated with
numerical examples.

Cellfree massive multipleinput multipleoutput (MIMO) is a potential key
technology for fifth generation wireless communication networks. A mixed
qualityofservice (QoS) problem is investigated in the uplink of a cellfree
massive MIMO system where the minimum rate of nonreal time users is maximized
with per user power constraints whilst the rate of the realtime users (RTUs)
meet their target rates. First an approximated uplink user rate is derived
based on available channel statistics. Next, the original mixed QoS problem is
formulated in terms of receiver filter coefficients and user power allocations
which can iteratively be solved through two subproblems, namely, receiver
filter coefficient design and power allocation, which are dealt with using a
generalized eigenvalue problem and geometric programming, respectively.
Numerical results show that with the proposed scheme, while the rates of RTUs
meet the QoS constraints, the $90\%$likely throughput improves significantly,
compared to a simple benchmark scheme.

This paper studies the capacity of an $n$dimensional vector Gaussian noise
channel subject to the constraint that an input must lie in the ball of radius
$R$ centered at the origin. It is known that in this setting the optimizing
input distribution is supported on a finite number of concentric spheres.
However, the number, the positions and the probabilities of the spheres are
generally unknown. This paper characterizes the necessary and sufficient
conditions on the constraint $R$ such that the input distribution supported on
a single sphere is optimal. The maximum $\bar{R}_n$, such that using only a
single sphere is optimal, is shown to be a solution of an integral equation.
Moreover, it is shown that $\bar{R}_n$ scales as $\sqrt{n}$ and the exact limit
of $\frac{\bar{R}_n}{\sqrt{n}}$ is found.

The nextgeneration energy network, the socalled (SG), promises a tremendous
increase in efficiency, safety and flexibility of managing the electricity grid
as compared to the legacy energy network. This is needed today more than ever,
as the global energy consumption is growing at an unprecedented rate, and
renewable energy sources have to be seamlessly integrated into the grid to
assure a sustainable human development. Smart meters (SMs) are among the
crucial enablers of the SG concept; they supply accurate highfrequency
information about users' household energy consumption to a utility provider,
which is essential for time of use pricing, rapid fault detection, energy theft
prevention, while also providing consumers with more flexibility and control
over their consumption. However, highly accurate and granular SM data also
poses a threat to consumer privacy as nonintrusive load monitoring techniques
enable a malicious attacker to infer many details of a user's private life.
This article focuses on privacyenhancing energy management techniques that
provide accurate energy consumption information to the grid operator, without
sacrificing consumer privacy. In particular, we focus on techniques that shape
and modify the actual user energy consumption by means of physical resources,
such as rechargeable batteries, renewable energy sources or demand shaping. A
rigorous mathematical analysis of privacy is presented under various physical
constraints on the available physical resources. Finally, open questions and
challenges that need to be addressed to pave the way to the effective
protection of users' privacy in future SGs are presented.

This paper considers the coexistence of two important communication
techniques, nonorthogonal multiple access (NOMA) and mobile edge computing
(MEC). Both NOMA uplink and downlink transmissions are applied to MEC, and
analytical results are developed to demonstrate that the use of NOMA can
efficiently reduce the latency and energy consumption of MEC offloading. In
addition, various asymptotic studies are carried out to reveal the impact of
the users' channel conditions and transmit powers on the application of NOMA to
MEC is quite different to those in conventional NOMA scenarios. Computer
simulation results are also provided to facilitate the performance evaluation
of NOMAMEC and also verify the accuracy of the developed analytical results.

The paper deals with minimax optimal statistical tests for two composite
hypotheses, where each hypothesis is defined by a nonparametric uncertainty
set of feasible distributions. It is shown that for every pair of uncertainty
sets of the fdivergence ball type, a pair of uncertainty sets of the density
band type can be constructed, which is equivalent in the sense that it admits
the same pair of least favorable distributions. This result implies that robust
tests under $f$divergence ball uncertainty, which are typically only minimax
optimal for the single sample case, are also fixed sample size minimax optimal
with respect to the equivalent density band uncertainty sets.

The effect of "good", pointtopoint capacity achieving, code sequences on an
additional signal, of bounded variance, transmitted over the additive Gaussian
noise channel is examined. For such code sequences, it is shown that their
effect, in terms of mutual information, on the additional bounded variance
signal, is as if additional additive Gaussian noise has been transmitted.
Moreover, the analysis shows that for reliable communication the bounded
variance signal must be completely estimated by the receiver (i.e., the minimum
meansquare error tends to zero). This result resolves the "Costa Conjecture"
regarding the corner points of the twouser Gaussian interference channel for
code sequences of bounded variance, and shows that both messages must be
reliably decoded.

A recent result of the authors shows a socalled IMMSElike relationship
that, for the twouser Gaussian interference channel, an IMMSE relationship
holds in the limit, as n $\to \infty$, between the interference and the
interferedwith receiver, assuming that the interferedwith transmission is an
optimal pointtopoint sequence (achieves the pointtopoint capacity). This
result was further used to provide a proof of the "missing corner points" of
the twouser Gaussian interference channel. This paper provides an information
theoretic proof of the abovementioned IMMSElike relationship which follows
the incremental channel approach, an approach which was used by Guo, Shamai and
Verd\'u to provide an insightful proof of the original IMMSE relationship for
pointtopoint channels. Finally, some additional applications of this result
are shown for other multiuser settings: the Gaussian multipleaccess channel
with interference and specific Kuser Gaussian Zinterference channel settings.

In this paper, storage efficient caching based on time domain buffer sharing
is considered. The caching policy allows a user to determine whether and how
long it should cache a content item according to the prediction of its random
request time, also referred to as the request delay information (RDI). In
particular, the aim is to maximize the caching gain for communications while
limiting its storage cost. To achieve this goal, a queueing theoretic model for
caching with infinite buffers is first formulated, in which Little's law is
adopted to obtain the tradeoff between the hit ratio and the average buffer
consumption. When there exist multiple content classes with different RDIs, the
storage efficiency is further optimized by carefully allocating the storage
cost. For more practical finitebuffer caching, a $G/GI/L/0$ queue model is
formulated, in which a diffusion approximation and ErlangB formula are adopted
to determine the buffer overflow probability and the corresponding hit ratio.
The optimal hit ratio is shown to be limited by the demand probability and
buffer size for large and small buffers respectively. In practice, a user may
exploit probabilistic caching with random maximum caching time and arithmetic
caching without any need for content arrival statistics to efficiently harvest
content files in air.

This paper investigates the downlink performance of Ktier heteregeneous
cellular networks (HCNs) under general settings. First, Gaussian approximation
bounds for the standardized aggregate wireless interference (AWI) in dense
Ktier HCNs are obtained for when base stations (BSs) in each tier are
distributed over the plane according to a spatial and general Poisson point
process. The KolmogorovSmirnov (KS) distance is used to measure deviations of
the distribution of the standardized AWI from the standard normal distribution.
An explicit and analytical expression bounding the KS distance between these
two distributions is obtained as a function of a broad range of network
parameters such as pertier transmission power levels, pertier BS intensity,
BS locations, general fading statistics, and general bounded pathloss models.
Bounds achieve a good statistical match between the standardized AWI
distribution and its normal approximation even for moderately dense HCNs.
Second, various spatial performance metrics of interest such as outage
capacity, ergodic capacity and area spectral efficiency in the downlink of
Ktier HCNs for general signal propogation models are investigated by making
use of the derived distribution approximation results. Considering two specific
BS association policies, it is shown that the derived performance bounds track
the actual performance metrics reasonably well for a wide range of BS
intensities, with the gap among them becoming negligibly small for denser HCN
deployments.

Radio waves carry both energy and information simultaneously. Nevertheless,
RadioFrequency (RF) transmission of these quantities have traditionally been
treated separately. Currently, we are experiencing a paradigm shift in wireless
network design, namely unifying wireless transmission of information and power
so as to make the best use of the RF spectrum and radiations as well as the
network infrastructure for the dual purpose of communicating and energizing. In
this paper, we review and discuss recent progress on laying the foundations of
the envisioned dual purpose networks by establishing a signal theory and design
for Wireless Information and Power Transmission (WIPT) and identifying the
fundamental tradeoff between conveying information and power wirelessly. We
start with an overview of WIPT challenges and technologies, namely Simultaneous
Wireless Information and Power Transfer (SWIPT),Wirelessly Powered
Communication Network (WPCN), and Wirelessly Powered Backscatter Communication
(WPBC). We then characterize energy harvesters and show how WIPT signal and
system designs crucially revolve around the underlying energy harvester model.
To that end, we highlight three different energy harvester models, namely one
linear model and two nonlinear models, and show how WIPT designs differ for
each of them in singleuser and multiuser deployments. Topics discussed
include rateenergy region characterization, transmitter and receiver
architecture, waveform design, modulation, beamforming and input distribution
optimizations, resource allocation, and RF spectrum use. We discuss and check
the validity of the different energy harvester models and the resulting signal
theory and design based on circuit simulations, prototyping and
experimentation. We also point out numerous directions that are promising for
future research.

Peertopeer (P2P) energy trading has emerged as a nextgeneration energy
management mechanism for the smart grid that enables each prosumer of the
network to participate in energy trading with one another and the grid. This
poses a significant challenge in terms of modeling the decisionmaking process
of each participant with conflicting interest and motivating prosumers to
participate in energy trading and to cooperate, if necessary, for achieving
different energy management goals. Therefore, such decisionmaking process
needs to be built on solid mathematical and signal processing tools that can
ensure an efficient operation of the smart grid. This paper provides an
overview of the use of game theoretic approaches for P2P energy trading as a
feasible and effective means of energy management. As such, we discuss various
games and auction theoretic approaches by following a systematic classification
to provide information on the importance of game theory for smart energy
research. Then, the paper focuses on the P2P energy trading describing its key
features and giving an introduction to an existing P2P testbed. Further, the
paper zooms into the detail of some specific game and auction theoretic models
that have recently been used in P2P energy trading and discusses some important
finding of these schemes.

This paper investigates two strategies to reduce the communication delay in
future wireless networks: traffic dispersion and network densification. A
hybrid scheme that combines these two strategies is also considered. The
probabilistic delay and effective capacity are used to evaluate performance.
For probabilistic delay, the violation probability of delay, i.e., the
probability that the delay exceeds a given tolerance level, is characterized in
terms of upper bounds, which are derived by applying stochastic network
calculus theory. In addition, to characterize the maximum affordable arrival
traffic for mmWave systems, the effective capacity, i.e., the service
capability with a given qualityofservice (QoS) requirement, is studied. The
derived bounds on the probabilistic delay and effective capacity are validated
through simulations. These numerical results show that, for a given average
system gain, traffic dispersion, network densification, and the hybrid scheme
exhibit different potentials to reduce the endtoend communication delay. For
instance, traffic dispersion outperforms network densification, given high
average system gain and arrival rate, while it could be the worst option,
otherwise. Furthermore, it is revealed that, increasing the number of
independent paths and/or relay density is always beneficial, while the
performance gain is related to the arrival rate and average system gain,
jointly. Therefore, a proper transmission scheme should be selected to optimize
the delay performance, according to the given conditions on arrival traffic and
system service capability.

Traditionally, differential privacy mechanism design has been tailored for a
scalarvalued query function. Although many mechanisms such as the Laplace and
Gaussian mechanisms can be extended to a matrixvalued query function by adding
i.i.d. noise to each element of the matrix, this method is often suboptimal as
it forfeits an opportunity to exploit the structural characteristics typically
associated with matrix analysis. In this work, we consider the design of
differential privacy mechanism specifically for a matrixvalued query function.
The proposed solution is to utilize a matrixvariate noise, as opposed to the
traditional scalarvalued noise. Particularly, we propose a novel differential
privacy mechanism called the MatrixVariate Gaussian (MVG) mechanism, which
adds a matrixvalued noise drawn from a matrixvariate Gaussian distribution.
We prove that the MVG mechanism preserves $(\epsilon,\delta)$differential
privacy, and show that it allows the structural characteristics of the
matrixvalued query function to naturally be exploited. Furthermore, due to the
multidimensional nature of the MVG mechanism and the matrixvalued query, we
introduce the concept of directional noise, which can be utilized to mitigate
the impact the noise has on the utility of the query. Finally, we demonstrate
the performance of the MVG mechanism and the advantages of directional noise
using three matrixvalued queries on three privacysensitive datasets. We find
that the MVG mechanism notably outperforms four previous stateoftheart
approaches, and provides comparable utility to the nonprivate baseline. Our
work thus presents a promising prospect for both future research and
implementation of differential privacy for matrixvalued query functions.

Differential privacy mechanism design has traditionally been tailored for a
scalarvalued query function. Although many mechanisms such as the Laplace and
Gaussian mechanisms can be extended to a matrixvalued query function by adding
i.i.d. noise to each element of the matrix, this method is often suboptimal as
it forfeits an opportunity to exploit the structural characteristics typically
associated with matrix analysis. To address this challenge, we propose a novel
differential privacy mechanism called the MatrixVariate Gaussian (MVG)
mechanism, which adds a matrixvalued noise drawn from a matrixvariate
Gaussian distribution, and we rigorously prove that the MVG mechanism preserves
$(\epsilon,\delta)$differential privacy. Furthermore, we introduce the concept
of directional noise made possible by the design of the MVG mechanism.
Directional noise allows the impact of the noise on the utility of the
matrixvalued query function to be moderated. Finally, we experimentally
demonstrate the performance of our mechanism using three matrixvalued queries
on three privacysensitive datasets. We find that the MVG mechanism notably
outperforms four previous stateoftheart approaches, and provides comparable
utility to the nonprivate baseline.

A sensor node that is sending measurement updates regarding some physical
phenomenon to a destination is considered. The sensor relies on energy
harvested from nature to transmit its updates, and is equipped with a finite
$B$sized battery to save its harvested energy. Energy recharges the battery
incrementally in units, according to a Poisson process, and one update consumes
one energy unit to reach the destination. The setting is online, where the
energy arrival times are revealed causally after the energy is harvested. The
goal is to update the destination in a timely manner, namely, such that the
long term average age of information is minimized, subject to energy causality
constraints. The age of information at a given time is defined as the time
spent since the latest update has reached the destination. It is shown that the
optimal update policy follows a renewal structure, where the interupdate times
are independent, and the time durations between any two consecutive events of
submitting an update and having $k$ units of energy remaining in the battery
are independent and identically distributed for a given $k\leq B1$. The
optimal renewal policy for the case of $B=2$ energy units is explicitly
characterized, and it is shown that it has an energydependent threshold
structure, where the sensor updates only if the age grows above a certain
threshold that is a function of the amount of energy in its battery.

Recently, nonorthogonal multiple access (NOMA) has attracted considerable
interest as one of the 5Genabling techniques. However, users with better
channel conditions in downlink communications intrinsically benefits from NOMA
thanks to successive decoding, judicious designs are required to guarantee user
fairness. In this paper, a twouser downlink NOMA system over fading channels
is considered. For delaytolerant transmission, the average sumrate is
maximized subject to both average and peak power constraints as well as a
minimum average user rate constraint. The optimal resource allocation is
obtained using Lagrangian dual decomposition under full channel state
information at the transmitter (CSIT), while an effective power allocation
policy under partial CSIT is also developed based on analytical results. In
parallel, for delaylimited transmission, the sum of delaylimited throughput
(DLT) is maximized subject to a maximum allowable user outage constraint under
full CSIT, and the analysis for the sum of DLT is also performed under partial
CSIT. Furthermore, an optimal orthogonal multiple access (OMA) scheme is also
studied as a benchmark to prove the superiority of NOMA over OMA under full
CSIT. Finally, the theoretical analysis is verified by simulations via
different tradeoffs for the average sumrate (sumDLT) versus the minimum
(maximum) average user rate (outage) requirement.

A wireless network of multiple transmitteruser pairs overheard by an
eavesdropper, where the transmitters are equipped with multiple antennas while
the users and eavesdropper are equipped with a single antenna, is considered.
At different levels of wireless channel knowledge, the problem of interest is
beamforming to optimize the users' qualityofservice (QoS) in terms of their
secrecy throughputs or maximize the network's energy efficiency under users'
QoS. All these problems are seen as very difficult optimization problems with
many nonconvex constraints and nonlinear equality constraints in beamforming
vectors. The paper develops pathfollowing computational procedures of
lowcomplexity and rapid convergence for the optimal beamforming solution.
Their practicability is demonstrated through numerical examples.

The problem of secure broadcasting with independent secret keys is studied.
The particular scenario is analyzed in which a common message has to be
broadcast to two legitimate receivers, while keeping an external eavesdropper
ignorant of it. The transmitter shares independent secret keys of sufficiently
high rates with both legitimate receivers, which can be used in different ways:
they can be used as onetime pads to encrypt the common message, as fictitious
messages for wiretap coding, or as a hybrid of these. In this paper, capacity
results are established when the broadcast channels involving the three
receivers are degraded. If both legitimate channels are degraded versions of
the eavesdropper's channel, it is shown that the onetime pad approach is
optimal for several cases, yielding corresponding capacity expressions.
Alternatively, the wiretap coding approach is shown to be optimal if the
eavesdropper's channel is degraded with respect to both legitimate channels,
establishing capacity in this case as well. If the eavesdropper's channel is
neither the strongest nor the weakest, an intricate scheme that carefully
combines both concepts of onetime pad and wiretap coding with fictitious
messages turns out to be capacityachieving. Finally we also obtain some
results for the general nondegraded broadcast channel.

This paper studies the potential of harvesting energy from the
selfinterference of a fullduplex base station. The base station is equipped
with a selfinterference cancellation switch, which is turnedoff for a
fraction of the transmission period for harvesting the energy from the
selfinterference that arises due to the downlink transmission. For the
remaining transmission period, the switch is on such that the uplink
transmission takes place simultaneously with the downlink transmission. A novel
energyefficiency maximization problem is formulated for the joint design of
downlink beamformers, uplink power allocations and transmission timesplitting
factor. The optimization problem is nonconvex, and hence, a rapidly converging
iterative algorithm is proposed by employing the successive convex
approximation approach. Numerical simulation results show significant
improvement in the energyefficiency by allowing selfenergy recycling.

A smart meter (SM) measures a consumer's electricity consumption and reports
it automatically to a utility provider (UP) in almost real time. Despite many
advantages of SMs, their use also leads to serious concerns about consumer
privacy. In this paper, SM privacy is studied by considering the presence of a
renewable energy source (RES) and a rechargeable battery (RB), which can be
used to partially hide the consumer's energy consumption behavior. Privacy is
measured by the information leakage rate, which denotes the average mutual
information between the user's real energy consumption and the energy requested
from the grid, which the SM reads and reports to the UP. The impact of the
knowledge of the amount of energy generated by the RES at the UP is also
considered. The minimum information leakage rate is characterized as a
computable information theoretic singleletter expression in the two extreme
cases, that is, when the battery capacity is infinite or zero. Numerical
results are presented for the finite battery capacity case to illustrate the
potential privacy gains from the existence of an RB. It is shown that, while
the information leakage rate decreases with increasing availability of an RES,
larger storage capacity is needed to fully exploit the available energy to
improve the privacy.

In this paper, the kth order autoregressive moving average (ARMA(k))
Gaussian wiretap channel with noiseless causal feedback is considered, in which
an eavesdropper receives noisy observations of the signals in both forward and
feedback channels. It is shown that a variant of the generalized
SchalkwijkKailath scheme, a capacityachieving coding scheme for the feedback
Gaussian channel, achieves the same maximum rate for the same channel with the
presence of an eavesdropper. Therefore, the secrecy capacity is equal to the
feedback capacity without the presence of an eavesdropper for the feedback
channel. Furthermore, the results are extended to the additive white Gaussian
noise (AWGN) channel with quantized feedback. It is shown that the proposed
coding scheme achieves a positive secrecy rate. As the amplitude of the
quantization noise decreases to zero, the secrecy rate converges to the
capacity of the AWGN channel.