
Private information retrieval (PIR) allows a user to retrieve a desired
message from a set of databases without revealing the identity of the desired
message. The replicated databases scenario was considered by Sun and Jafar,
2016, where $N$ databases can store the same $K$ messages completely. A PIR
scheme was developed to achieve the optimal download cost given by $\left(1+
\frac{1}{N}+ \frac{1}{N^{2}}+ \cdots + \frac{1}{N^{K1}}\right)$. In this work,
we consider the problem of PIR for uncoded storage constrained databases. Each
database has a storage capacity of $\mu KL$ bits, where $L$ is the size of each
message in bits, and $\mu \in [1/N, 1]$ is the normalized storage. On one
extreme, $\mu=1$ is the replicated databases case previously settled. On the
other hand, when $\mu= 1/N$, then in order to retrieve a message privately, the
user has to download all the messages from the databases achieving a download
cost of $1/K$. We aim to characterize the optimal download cost versus storage
tradeoff for any storage capacity in the range $\mu \in [1/N, 1]$. In the
storage constrained PIR problem, there are two key challenges: a) construction
of communication efficient schemes through storage content design at each
database that allow download efficient PIR; and b) characterizing the optimal
download cost via informationtheoretic lower bounds. The novel aspect of this
work is to characterize the optimum download cost of PIR with storage
constrained databases for any value of storage. In particular, for any $(N,K)$,
we show that the optimal tradeoff between storage, $\mu$, and the download
cost, $D(\mu)$, is given by the lower convex hull of the $N$ pairs
$\left(\frac{t}{N}, \left(1+ \frac{1}{t}+ \frac{1}{t^{2}}+ \cdots +
\frac{1}{t^{K1}}\right)\right)$ for $t=1,2,\ldots, N$.

Fog Radio Access Network (FRAN) architectures can leverage both cloud
processing and edge caching for content delivery to the users. To this end,
FRAN utilizes caches at the edge nodes (ENs) and fronthaul links connecting a
cloud processor to ENs. Assuming timeinvariant content popularity, existing
informationtheoretic analyses of content delivery in FRANs rely on offline
caching with separate content placement and delivery phases. In contrast, this
work focuses on the scenario in which the set of popular content is
timevarying, hence necessitating the online replenishment of the ENs' caches
along with the delivery of the requested files. The analysis is centered on the
characterization of the longterm Normalized Delivery Time (NDT), which
captures the temporal dependence of the coding latencies accrued across
multiple time slots in the high signaltonoise ratio regime. Online edge
caching and delivery schemes are investigated for both serial and pipelined
transmission modes across fronthaul and edge segments. Analytical results
demonstrate that, in the presence of a timevarying content popularity, the
rate of fronthaul links sets a fundamental limit to the longterm NDT of F RAN
system. Analytical results are further verified by numerical simulation,
yielding important design insights.

In this paper, localized information privacy (LIP) is proposed, as a new
privacy definition, which allows statistical aggregation while protecting
users' privacy without relying on a trusted third party. The notion of
contextawareness is incorporated in LIP by the introduction of priors, which
enables the design of privacypreserving data aggregation with knowledge of
priors. We show that LIP relaxes the Localized Differential Privacy (LDP)
notion by explicitly modeling the adversary's knowledge. However, it is
stricter than $2\epsilon$LDP and $\epsilon$mutual information privacy. The
incorporation of local priors allows LIP to achieve higher utility compared to
other approaches. We then present an optimization framework for
privacypreserving data aggregation, with the goal of minimizing the expected
squared error while satisfying the LIP privacy constraints. Utilityprivacy
tradeoffs are obtained under several models in closedform. We then validate
our analysis by {numerical analysis} using both synthetic and realworld data.
Results show that our LIP mechanism provides better utilityprivacy tradeoffs
than LDP and when the prior is not uniformly distributed, the advantage of LIP
is even more significant.

A fogaided wireless network architecture is studied in which edgenodes
(ENs), such as base stations, are connected to a cloud processor via dedicated
fronthaul links, while also being endowed with caches. Cloud processing enables
the centralized implementation of cooperative transmission strategies at the
ENs, albeit at the cost of an increased latency due to fronthaul transfer. In
contrast, the proactive caching of popular content at the ENs allows for the
lowlatency delivery of the cached files, but with generally limited
opportunities for cooperative transmission among the ENs. The interplay between
cloud processing and edge caching is addressed from an informationtheoretic
viewpoint by investigating the fundamental limits of a high
SignaltoNoiseRatio (SNR) metric, termed normalized delivery time (NDT),
which captures the worstcase coding latency for delivering any requested
content to the users. The NDT is defined under the assumptions of either serial
or pipelined fronthauledge transmission, and is studied as a function of
fronthaul and cache capacity constraints. Placement and delivery strategies
across both fronthaul and wireless, or edge, segments are proposed with the aim
of minimizing the NDT. Informationtheoretic lower bounds on the NDT are also
derived. Achievability arguments and lower bounds are leveraged to characterize
the minimal NDT in a number of important special cases, including systems with
no caching capabilities, as well as to prove that the proposed schemes achieve
optimality within a constant multiplicative factor of 2 for all values of the
problem parameters.

In this paper, the $K$user interference channel with secrecy constraints is
considered with delayed channel state information at transmitters (CSIT). We
propose a novel secure retrospective interference alignment scheme in which the
transmitters carefully mix information symbols with artificial noises to ensure
confidentiality. Achieving positive secure degrees of freedom (SDoF) is
challenging due to the delayed nature of CSIT, and the distributed nature of
the transmitters. Our scheme works over two phases: phase one in which each
transmitter sends information symbols mixed with artificial noises, and repeats
such transmission over multiple rounds. In the next phase, each transmitter
uses delayed CSIT of the previous phase and sends a function of the net
interference and artificial noises (generated in previous phase), which is
simultaneously useful for all receivers. These phases are designed to ensure
the decodability of the desired messages while satisfying the secrecy
constraints. We present our achievable scheme for three models, namely: 1)
$K$user interference channel with confidential messages (ICCM), and we show
that $\frac{1}{2} (\sqrt{K} 6) $ SDoF is achievable, 2) $K$user interference
channel with an external eavesdropper (ICEE), and 3) $K$user IC with
confidential messages and an external eavesdropper (ICCMEE). We show that for
the $K$user ICEE, $\frac{1}{2} (\sqrt{K} 3) $ SDoF is achievable, and for
the $K$user ICCMEE, $\frac{1}{2} (\sqrt{K} 6) $ is achievable. To the best
of our knowledge, this is the first result on the $K$user interference channel
with secrecy constrained models and delayed CSIT that achieves a SDoF which
scales with $K$, the number of users.

Data shuffling between distributed cluster of nodes is one of the critical
steps in implementing largescale learning algorithms. Randomly shuffling the
dataset among a cluster of workers allows different nodes to obtain fresh data
assignments at each learning epoch. This process has been shown to provide
improvements in the learning process. However, the statistical benefits of
distributed data shuffling come at the cost of extra communication overhead
from the master node to worker nodes, and can act as one of the major
bottlenecks in the overall time for computation. There has been significant
recent interest in devising approaches to minimize this communication overhead.
One approach is to provision for extra storage at the computing nodes. The
other emerging approach is to leverage coded communication to minimize the
overall communication overhead.
The focus of this work is to understand the fundamental tradeoff between the
amount of storage and the communication overhead for distributed data
shuffling. In this work, we first present an information theoretic formulation
for the data shuffling problem, accounting for the underlying problem
parameters (number of workers, $K$, number of data points, $N$, and the
available storage, $S$ per node). We then present an information theoretic
lower bound on the communication overhead for data shuffling as a function of
these parameters. We next present a novel coded communication scheme and show
that the resulting communication overhead of the proposed scheme is within a
multiplicative factor of at most $\frac{K}{K1}$ from the informationtheoretic
lower bound. Furthermore, we present the aligned coded shuffling scheme for
some storage values, which achieves the optimal storage vs communication
tradeoff for $K<5$, and further reduces the maximum multiplicative gap down to
$\frac{K\frac{1}{3}}{K1}$, for $K\geq 5$.

The problem of cache enabled private information retrieval (PIR) is
considered in which a user wishes to privately retrieve one out of $K$
messages, each of size $L$ bits from $N$ distributed databases. The user has a
local cache of storage $SL$ bits which can be used to store any function of the
$K$ messages. The main contribution of this work is the exact characterization
of the capacity of cache aided PIR as a function of the storage parameter $S$.
In particular, for a given cache storage parameter $S$, the
informationtheoretically optimal download cost $D^{*}(S)/L$ (or the inverse of
capacity) is shown to be equal to $(1 \frac{S}{K})\left(1+ \frac{1}{N}+ \ldots
+ \frac{1}{N^{K1}}\right)$. Special cases of this result correspond to the
settings when $S=0$, for which the optimal download cost was shown by Sun and
Jafar to be $\left(1+ \frac{1}{N}+ \ldots + \frac{1}{N^{K1}}\right)$, and the
case when $S=K$, i.e., cache size is large enough to store all messages
locally, for which the optimal download cost is $0$. The intermediate points
$S\in (0, K)$ can be readily achieved through a simple memorysharing based PIR
scheme. The key technical contribution of this work is the converse, i.e., a
lower bound on the download cost as a function of storage $S$ which shows that
memory sharing is informationtheoretically optimal.

In a Fog Radio Access Network (FRAN) architecture, edge nodes (ENs), such as
base stations, are equipped with limitedcapacity caches, as well as with
fronthaul links that can support given transmission rates from a cloud
processor. Existing informationtheoretic analyses of content delivery in
FRANs have focused on offline caching with separate content placement and
delivery phases. In contrast, this work considers an online caching setup, in
which the set of popular files is timevarying and both cache replenishment and
content delivery can take place in each time slot. The analysis is centered on
the characterization of the longterm Normalized Delivery Time (NDT), which
captures the temporal dependence of the coding latencies accrued across
multiple time slots in the high signalto noise ratio regime. Online caching
and delivery schemes based on reactive and proactive caching are investigated,
and their performance is compared to optimal offline caching schemes both
analytically and via numerical results.

This paper considers a $K$cell multiple access channel with intersymbol
interference. The primary finding of this paper is that, without instantaneous
channel state information at the transmitters (CSIT), the sum
degreesoffreedom (DoF) of the considered channel is $\frac{\beta 1}{\beta}K$
with $\beta \geq 2$ when the number of users per cell is sufficiently large,
where $\beta$ is the ratio of the maximum channelimpulseresponse (CIR) length
of desired links to that of interfering links in each cell. Our finding implies
that even without instantaneous CSIT, \textit{interferencefree DoF per cell}
is achievable as $\beta$ approaches infinity with a sufficiently large number
of users per cell. This achievability is shown by a blind interference
management method that exploits the relativity in delay spreads between desired
and interfering links. In this method, all intercellinterference signals are
aligned to the same direction by using a discreteFouriertransformbased
precoding with cyclic prefix that only depends on the number of CIR taps. Using
this method, we also characterize the achievable sum rate of the considered
channel, in a closedform expression.

Distributed learning platforms for processing large scale datasets are
becoming increasingly prevalent. In typical distributed implementations, a
centralized master node breaks the dataset into smaller batches for parallel
processing across distributed workers to achieve speedup and efficiency.
Several computational tasks are of sequential nature, and involve multiple
passes over the data. At each iteration over the data, it is common practice to
randomly reshuffle the data at the master node, assigning different batches
for each worker to process. This random reshuffling operation comes at the
cost of extra communication overhead, since at each shuffle, new data points
need to be delivered to the distributed workers.
In this paper, we focus on characterizing the information theoretically
optimal communication overhead for the distributed data shuffling problem. We
propose a novel coded data delivery scheme for the case of no excess storage,
where every worker can only store the assigned data batches under processing.
Our scheme exploits a new type of coding opportunity and is applicable to any
arbitrary shuffle, and for any number of workers. We also present an
information theoretic lower bound on the minimum communication overhead for
data shuffling, and show that the proposed scheme matches this lower bound for
the worstcase communication overhead.

Data shuffling is one of the fundamental building blocks for distributed
learning algorithms, that increases the statistical gain for each step of the
learning process. In each iteration, different shuffled data points are
assigned by a central node to a distributed set of workers to perform local
computations, which leads to communication bottlenecks. The focus of this paper
is on formalizing and understanding the fundamental informationtheoretic
tradeoff between storage (per worker) and the worstcase communication
overhead for the data shuffling problem. We completely characterize the
information theoretic tradeoff for $K=2$, and $K=3$ workers, for any value of
storage capacity, and show that increasing the storage across workers can
reduce the communication overhead by leveraging coding. We propose a novel and
systematic data delivery and storage update strategy for each data shuffle
iteration, which preserves the structural properties of the storage across the
workers, and aids in minimizing the communication overhead in subsequent data
shuffling iterations.

Caching at the network edge has emerged as a viable solution for alleviating
the severe capacity crunch in modern content centric wireless networks by
leveraging network loadbalancing in the form of localized content storage and
delivery. In this work, we consider a cacheaided network where the cache
storage phase is assisted by a central server and users can demand multiple
files at each transmission interval. To service these demands, we consider two
delivery models  $(1)$ centralized content delivery where user demands at each
transmission interval are serviced by the central server via multicast
transmissions; and $(2)$ devicetodevice (D2D) assisted distributed delivery
where users multicast to each other in order to service file demands. For such
cacheaided networks, we present new results on the fundamental cache storage
vs. transmission rate tradeoff. Specifically, we develop a new technique for
characterizing information theoretic lower bounds on the storagerate tradeoff
and show that the new lower bounds are strictly tighter than cutset bounds
from literature. Furthermore, using the new lower bounds, we establish the
optimal storagerate tradeoff to within a constant multiplicative gap. We show
that, for multiple demands per user, achievable schemes based on repetition of
schemes for single demands are orderoptimal under both delivery models.

Change detection (CD) in time series data is a critical problem as it reveal
changes in the underlying generative processes driving the time series. Despite
having received significant attention, one important unexplored aspect is how
to efficiently utilize additional correlated information to improve the
detection and the understanding of changepoints. We propose hierarchical
quickest change detection (HQCD), a framework that formalizes the process of
incorporating additional correlated sources for early changepoint detection.
The core ideas behind HQCD are rooted in the theory of quickest detection and
HQCD can be regarded as its novel generalization to a hierarchical setting. The
sources are classified into targets and surrogates, and HQCD leverages this
structure to systematically assimilate observed data to update changepoint
statistics across layers. The decision on actual changepoints are provided by
minimizing the delay while still maintaining reliability bounds. In addition,
HQCD also uncovers interesting relations between changes at targets from
changes across surrogates. We validate HQCD for reliability and performance
against several stateoftheart methods for both synthetic dataset (known
changepoints) and several reallife examples (unknown changepoints). Our
experiments indicate that we gain significant robustness without loss of
detection delay through HQCD. Our reallife experiments also showcase the
usefulness of the hierarchical setting by connecting the surrogate sources
(such as Twitter chatter) to target sources (such as Employment related
protests that ultimately lead to major uprisings).

Feedforward deep neural networks have been used extensively in various
machine learning applications. Developing a precise understanding of the
underling behavior of neural networks is crucial for their efficient
deployment. In this paper, we use an information theoretic approach to study
the flow of information in a neural network and to determine how entropy of
information changes between consecutive layers. Moreover, using the Information
Bottleneck principle, we develop a constrained optimization problem that can be
used in the training process of a deep neural network. Furthermore, we
determine a lower bound for the level of data representation that can be
achieved in a deep neural network with an acceptable level of distortion.

We investigate the fundamental information theoretic limits of cacheaided
wireless networks, in which edge nodes (or transmitters) are endowed with
caches that can store popular content, such as multimedia files. This
architecture aims to localize popular multimedia content by proactively pushing
it closer to the edge of the wireless network, thereby alleviating backhaul
load. An information theoretic model of such networks is presented, that
includes the introduction of a new metric, namely normalized delivery time
(NDT), which captures the worst case time to deliver any requested content to
the users. We present new results on the tradeoff between latency, measured
via the NDT, and the cache storage capacity of the edge nodes. In particular, a
novel information theoretic lower bound on NDT is presented for cache aided
networks. The optimality of this bound is shown for several system parameters.

In this paper, the $\eta$Nash equilibrium ($\eta$NE) region of the twouser
Gaussian interference channel (IC) with perfect output feedback is approximated
to within $1$ bit/s/Hz and $\eta$ arbitrarily close to $1$ bit/s/Hz. The
relevance of the $\eta$NE region is that it provides the set of ratepairs
that are achievable and stable in the IC when both transmitterreceiver pairs
autonomously tune their own transmitreceive configurations seeking an
$\eta$optimal individual transmission rate. Therefore, any rate tuple outside
the $\eta$NE region is not stable as there always exists one link able to
increase by at least $\eta$ bits/s/Hz its own transmission rate by updating its
own transmitreceive configuration. The main insights that arise from this work
are: $(i)$ The $\eta$NE region achieved with feedback is larger than or equal
to the $\eta$NE region without feedback. More importantly, for each rate pair
achievable at an $\eta$NE without feedback, there exists at least one rate
pair achievable at an $\eta$NE with feedback that is weakly Pareto superior.
$(ii)$ There always exists an $\eta$NE transmitreceive configuration that
achieves a rate pair that is at most $1$ bit/s/Hz per user away from the outer
bound of the capacity region.

The increase in data storage and power consumption at datacenters has made
it imperative to design energy efficient Distributed Storage Systems (DSS). The
energy efficiency of DSS is strongly influenced not only by the volume of data,
frequency of data access and redundancy in data storage, but also by the
heterogeneity exhibited by the DSS in these dimensions. To this end, we propose
and analyze the energy efficiency of a heterogeneous distributed storage system
in which $n$ storage servers (disks) store the data of $R$ distinct classes.
Data of class $i$ is encoded using a $(n,k_{i})$ erasure code and the (random)
data retrieval requests can also vary across classes. We show that the energy
efficiency of such systems is closely related to the average latency and hence
motivates us to study the energy efficiency via the lens of average latency.
Through this connection, we show that erasure coding serves the dual purpose of
reducing latency and increasing energy efficiency. We present a queuing
theoretic analysis of the proposed model and establish upper and lower bounds
on the average latency for each data class under various scheduling policies.
Through extensive simulations, we present qualitative insights which reveal the
impact of coding rate, number of servers, service distribution and number of
redundant requests on the average latency and energy efficiency of the DSS.

We study the impact of heterogeneity of channelstateinformation available
at the transmitters (CSIT) on the capacity of broadcast channels with a
multipleantenna transmitter and $k$ singleantenna receivers (MISO BC). In
particular, we consider the $k$user MISO BC, where the CSIT with respect to
each receiver can be either instantaneous/perfect, delayed, or not available;
and we study the impact of this heterogeneity of CSIT on the degreesoffreedom
(DoF) of such network. We first focus on the $3$user MISO BC; and we
completely characterize the DoF region for all possible heterogeneous CSIT
configurations, assuming linear encoding strategies at the transmitters. The
result shows that the stateoftheart achievable schemes in the literature are
indeed sumDoF optimal, when restricted to linear encoding schemes. To prove
the result, we develop a novel bound, called Interference Decomposition Bound,
which provides a lower bound on the interference dimension at a receiver which
supplies delayed CSIT based on the average dimension of constituents of that
interference, thereby decomposing the interference into its individual
components. Furthermore, we extend our outer bound on the DoF region to the
general $k$user MISO BC, and demonstrate that it leads to an approximate
characterization of linear sumDoF to within an additive gap of $0.5$ for a
broad range of CSIT configurations. Moreover, for the special case where only
one receiver supplies delayed CSIT, we completely characterize the linear
sumDoF.

The two user multipleinput singleoutput (MISO) broadcast channel with
confidential messages (BCCM) is studied in which the nature of channel state
information at the transmitter (CSIT) from each user can be of the form
$I_{i}$, $i=1,2$ where $I_{1}, I_{2}\in \{\mathsf{P}, \mathsf{D},
\mathsf{N}\}$, and the forms $\mathsf{P}$, $\mathsf{D}$ and $\mathsf{N}$
correspond to perfect and instantaneous, completely delayed, and no CSIT,
respectively. Thus, the overall CSIT can alternate between $9$ possible states
corresponding to all possible values of $I_{1}I_{2}$, with each state occurring
for $\lambda_{I_{1}I_{2}}$ fraction of the total duration. The main
contribution of this paper is to establish the secure degrees of freedom
(s.d.o.f.) region of the MISO BCCM with alternating CSIT with the symmetry
assumption, where $\lambda_{I_{1} I_{2}}=\lambda_{I_{2}I_{1}}$.
The main technical contributions include developing a) novel achievable
schemes for MISO BCCM with alternating CSIT with security constraints which
also highlight the synergistic benefits of interstate coding for secrecy, b)
new converse proofs via local statistical equivalence and channel enhancement;
and c) showing the interplay between various aspects of channel knowledge and
their impact on s.d.o.f.

Caching is emerging as a vital tool for alleviating the severe capacity
crunch in modern contentcentric wireless networks. The main idea behind
caching is to store parts of popular content in endusers' memory and leverage
the locally stored content to reduce peak data rates. By jointly designing
content placement and delivery mechanisms, recent works have shown orderwise
reduction in transmission rates in contrast to traditional methods. In this
work, we consider the secure caching problem with the additional goal of
minimizing information leakage to an external wiretapper. The fundamental cache
memory vs. transmission rate tradeoff for the secure caching problem is
characterized. Rather surprisingly, these results show that security can be
introduced at a negligible cost, particularly for large number of files and
users. It is also shown that the rate achieved by the proposed caching scheme
with secure delivery is within a constant multiplicative factor from the
informationtheoretic optimal rate for almost all parameter values of practical
interest.

This paper proposes an interference alignment method with distributed and
delayed channel state information at the transmitter (CSIT) for a class of
interference networks. The core idea of the proposed method is to align
interference signals over time at the unintended receivers in a distributed
manner. With the proposed method, achievable tradeoffs between the sum of
degrees of freedom (sumDoF) and feedback delay of CSI are characterized in
both the Xchannel and threeuser interference channel to reveal the impact on
how the CSI feedback delay affects the sumDoF of the interference networks. A
major implication of derived results is that distributed and moderately
delayed CSIT is useful to strictly improve the sumDoF over the case of no CSI
at the transmitter in a certain class of interference networks. For a class of
Xchannels, the results show how to optimally use distributed and
moderatelydelayed CSIT to yield the same sumDoF as instantaneous and global
CSIT. Further, leveraging the proposed transmission method and the known outer
bound results, the sumcapacity of the twouser Xchannel with a particular set
of channel coefficients is characterized within a constant number of bits.

The 3user multipleinput singleoutput (MISO) broadcast channel (BC) with
hybrid channel state information at the transmitter (CSIT) is considered. In
this framework, there is perfect and instantaneous CSIT from a subset of users
and delayed CSIT from the remaining users. We present new results on the
degrees of freedom (DoF) of the 3user MISO BC with hybrid CSIT. In particular,
for the case of 2 transmit antennas, we show that with perfect CSIT from one
user and delayed CSIT from the remaining two users, the optimal DoF is 5/3. For
the case of 3 transmit antennas and the same hybrid CSIT setting, it is shown
that a higher DoF of 9/5 is achievable and this result improves upon the best
known bound. Furthermore, with 3 transmit antennas, and the hybrid CSIT setting
in which there is perfect CSIT from two users and delayed CSIT from the third
one, a novel scheme is presented which achieves 9/4 DoF. Our results also
reveal new insights on how to utilize hybrid channel knowledge for multiuser
scenarios.

Distributed storage systems in the presence of a wiretapper are considered. A
distributed storage system (DSS) is parameterized by three parameters (n, k,d),
in which a file stored across n distributed nodes, can be recovered from any k
out of n nodes. If a node fails, any d out of (n1) nodes help in the repair of
the failed node. For such a (n,k,d)DSS, two types of wiretapping scenarios are
investigated: (a) TypeI (node) adversary which can wiretap the data stored on
any l<k nodes; and a more severe (b) TypeII (repair data) adversary which can
wiretap the contents of the repair data that is used to repair a set of l
failed nodes over time. The focus of this work is on the practically relevant
setting of exact repair regeneration in which the repair process must replace a
failed node by its exact replica. We make new progress on several nontrivial
instances of this problem which prior to this work have been open. The main
contribution of this paper is the optimal characterization of the secure
storagevsexactrepairbandwidth tradeoff region of a (n,k,d)DSS, with n<=4
and any l<k in the presence of both TypeI and TypeII adversaries. While the
problem remains open for a general (n,k,d)DSS with n>4, we present extensions
of these results to a (n, n1,n1)DSS, in presence of a TypeII adversary that
can observe the repair data of any l=(n2) nodes. The key technical
contribution of this work is in developing novel information theoretic converse
proofs for the TypeII adversarial scenario. From our results, we show that in
the presence of TypeII attacks, the only efficient point in the
storagevsexactrepairbandwidth tradeoff is the MBR (minimum bandwidth
regenerating) point. This is in sharp contrast to the case of a TypeI attack
in which the storagevsexactrepairbandwidth tradeoff allows a spectrum of
operating points beyond the MBR point.

Jamming attacks can significantly impact the performance of wireless
communication systems. In addition to reducing the capacity, such attacks may
lead to insurmountable overhead in terms of retransmissions and increased
power consumption. In this paper, we consider the multipleinput singleoutput
(MISO) broadcast channel (BC) in the presence of a jamming attack in which a
subset of the receivers can be jammed at any given time. Further,
countermeasures for mitigating the effects of such jamming attacks are
presented. The effectiveness of these antijamming countermeasures is
quantified in terms of the degreesoffreedom (DoF) of the MISO BC under
various assumptions regarding the availability of the channel state information
(CSIT) and the jammer state information at the transmitter (JSIT). The main
contribution of this paper is the characterization of the DoF region of the two
user MISO BC under various assumptions on the availability of CSIT and JSIT.
Partial extensions to the multiuser broadcast channels are also presented.

The symmetric K user interference channel with fully connected topology is
considered, in which (a) each receiver suffers interference from all other
(K1) transmitters, and (b) each transmitter has causal and noiseless feedback
from its respective receiver. The number of generalized degrees of freedom
(GDoF) is characterized in terms of \alpha, where the interferencetonoise
ratio (INR) is given by INR=SNR^\alpha. It is shown that the peruser GDoF of
this network is the same as that of the 2user interference channel with
feedback, except for \alpha=1, for which existence of feedback does not help in
terms of GDoF. The coding scheme proposed for this network, termed cooperative
interference alignment, is based on two key ingredients, namely, interference
alignment and interference decoding. Moreover, an approximate characterization
is provided for the symmetric feedback capacity of the network, when the SNR
and INR are far apart from each other.