Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 85 results for author: Wunder, G

.
  1. arXiv:2406.04718  [pdf, ps, other

    cs.CR math.NT

    From Worst to Average Case to Incremental Search Bounds of the Strong Lucas Test

    Authors: Semira Einsele, Gerhard Wunder

    Abstract: The strong Lucas test is a widely used probabilistic primality test in cryptographic libraries. When combined with the Miller-Rabin primality test, it forms the Baillie-PSW primality test, known for its absence of false positives, undermining the relevance of a complete understanding of the strong Lucas test. In primality testing, the worst-case error probability serves as an upper bound on the li… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: To be published in the proceedings (LNCS Springer) of the conference Number-Theoretic Methods in Cryptology 2024

  2. Expectation Entropy as a Password Strength Metric

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: The classical combinatorics-based password strength formula provides a result in tens of bits, whereas the NIST Entropy Estimation Suite give a result between 0 and 1 for Min-entropy. In this work, we present a newly developed metric -- Expectation entropy that can be applied to estimate the strength of any random or random-like password. Expectation entropy provides the strength of a password on… ▽ More

    Submitted 18 March, 2024; originally announced April 2024.

  3. arXiv:2404.06952  [pdf, other

    cs.IT

    Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel

    Authors: Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß

    Abstract: Secret key generation (SKG) between authenticated devices is a pivotal task for secure communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In this paper, we shall invent and analyze a new security primitive that is specifically designed for WPAN. For WPAN, wireless channel-based SKG has been proposed but was not widely deployed due to its critical dependence on th… ▽ More

    Submitted 23 April, 2024; v1 submitted 10 April, 2024; originally announced April 2024.

  4. arXiv:2403.13020  [pdf, other

    cs.CR cs.NI

    ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: The existing high-friction device onboarding process hinders the promise and potentiality of Internet of Things (IoT). Even after several attempts by various device manufacturers and working groups, no widely adopted standard solution came to fruition. The latest attempt by Fast Identity Online (FIDO) Alliance promises a zero touch solution for mass market IoT customers, but the burden is transfer… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  5. arXiv:2401.16414  [pdf, other

    cs.IT

    A Causal Model for Quantifying Multipartite Classical and Quantum Correlations

    Authors: Shuchan Wang, Gerhard Wunder

    Abstract: We give an operational definition of information-theoretic resources within a given multipartite classical or quantum correlation. We present our causal model that serves as the source coding side of this correlation and introduce a novel concept of resource rate. We argue that, beyond classical secrecy, additional resources exist that are useful for the security of distributed computing problems,… ▽ More

    Submitted 2 April, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: 23 pages, 12 figures. Changes in v3: Theorem 5 improved; v2: Appendix B added, some notations changed

  6. arXiv:2401.14056  [pdf, other

    cs.NI

    Model CBOR Serialization for Federated Learning

    Authors: Koen Zandberg, Mayank Gulati, Gerhard Wunder, Emmanuel Baccelli

    Abstract: The typical federated learning workflow requires communication between a central server and a large set of clients synchronizing model parameters between each other. The current frameworks use communication protocols not suitable for resource-constrained devices and are either hard to deploy or require high-throughput links not available on these devices. In this paper, we present a generic messag… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  7. arXiv:2308.09381  [pdf, other

    cs.LG

    On Gradient-like Explanation under a Black-box Setting: When Black-box Explanations Become as Good as White-box

    Authors: Yi Cai, Gerhard Wunder

    Abstract: Attribution methods shed light on the explainability of data-driven approaches such as deep learning models by uncovering the most influential features in a to-be-explained decision. While determining feature attributions via gradients delivers promising results, the internal access required for acquiring gradients can be impractical under safety concerns, thus limiting the applicability of gradie… ▽ More

    Submitted 14 May, 2024; v1 submitted 18 August, 2023; originally announced August 2023.

  8. arXiv:2304.11336  [pdf, other

    cs.LG

    Differentially Private Synthetic Data Generation via Lipschitz-Regularised Variational Autoencoders

    Authors: Benedikt Groß, Gerhard Wunder

    Abstract: Synthetic data has been hailed as the silver bullet for privacy preserving data analysis. If a record is not real, then how could it violate a person's privacy? In addition, deep-learning based generative models are employed successfully to approximate complex high-dimensional distributions from data and draw realistic samples from this learned distribution. It is often overlooked though that gene… ▽ More

    Submitted 13 July, 2023; v1 submitted 22 April, 2023; originally announced April 2023.

  9. arXiv:2302.07733  [pdf, other

    cs.CL cs.LG

    Explaining text classifiers through progressive neighborhood approximation with realistic samples

    Authors: Yi Cai, Arthur Zimek, Eirini Ntoutsi, Gerhard Wunder

    Abstract: The importance of neighborhood construction in local explanation methods has been already highlighted in the literature. And several attempts have been made to improve neighborhood quality for high-dimensional data, for example, texts, by adopting generative models. Although the generators produce more realistic samples, the intuitive sampling approaches in the existing solutions leave the latent… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

  10. arXiv:2210.11993  [pdf, other

    cs.IT math.NA

    Bisparse Blind Deconvolution through Hierarchical Sparse Recovery

    Authors: Axel Flinth, Ingo Roth, Gerhard Wunder

    Abstract: The bi-sparse blind deconvolution problem is studied -- that is, from the knowledge of $h*(Qb)$, where $Q$ is some linear operator, recovering $h$ and $b$, which are both assumed to be sparse. The approach rests upon lifting the problem to a linear one, and then applying the hierarchical sparsity framework. In particular, the efficient HiHTP algorithm is proposed for performing the recovery. Then,… ▽ More

    Submitted 19 February, 2024; v1 submitted 20 October, 2022; originally announced October 2022.

    Comments: V2: Completely revised version, entirely different proof, resulting in the recovery guarantee improved by a factor s

  11. One-Shot Messaging at Any Load Through Random Sub-Channeling in OFDM

    Authors: Gerhard Wunder, Axel Flinth, Benedikt Groß

    Abstract: Compressive Sensing has well boosted massive random access protocols over the last decade. In this paper we apply an orthogonal FFT basis as it is used in OFDM, but subdivide its image into so-called sub-channels and let each sub-channel take only a fraction of the load. In a random fashion the subdivision is consecutively applied over a suitable number of time-slots. Within the time-slots the use… ▽ More

    Submitted 13 July, 2023; v1 submitted 22 September, 2022; originally announced September 2022.

  12. arXiv:2209.09975  [pdf, other

    cs.CL cs.LG

    Power of Explanations: Towards automatic debiasing in hate speech detection

    Authors: Yi Cai, Arthur Zimek, Gerhard Wunder, Eirini Ntoutsi

    Abstract: Hate speech detection is a common downstream application of natural language processing (NLP) in the real world. In spite of the increasing accuracy, current data-driven approaches could easily learn biases from the imbalanced data distributions originating from humans. The deployment of biased models could further enhance the existing social biases. But unlike handling tabular data, defining and… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: IEEE DSAA'22

  13. arXiv:2207.05516  [pdf, other

    eess.SY

    Age-of-Information in Clocked Networks

    Authors: R. Schoeffauer, G. Wunder

    Abstract: We derive key features of the Age-of-Information distribution in a system whose activities are strictly limited to periodic instances on a global time grid. In particular, one agent periodically generates updates while the other agent periodically uses the most recently received of those updates. Likewise, transmission of those updates over a network can only occur periodically. All periods may di… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  14. arXiv:2206.05510  [pdf, other

    eess.SY cs.MA

    An Algorithm for Exact Numerical Age-of-Information Evaluation in Multi-Agent Systems

    Authors: Richard Schoeffauer, Gerhard Wunder

    Abstract: We present an algorithm for the numerical evaluation of the state-space distribution of an Age-of-Information network. Given enough computational resources, the evaluation can be performed to an arbitrary high precision. An Age-of-Information network is described by a vector of natural numbers, that track how outdated status information from various agents is. Our algorithm yields the means to det… ▽ More

    Submitted 11 June, 2022; originally announced June 2022.

  15. arXiv:2204.12227  [pdf, other

    cs.CR

    Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?

    Authors: Felix Klement, Stefan Katzenbeisser, Vincent Ulitzsch, Juliane Krämer, Slawomir Stanczak, Zoran Utkovski, Igor Bjelakovic, Gerhard Wunder

    Abstract: The Open RAN architecture is a promising and future-oriented architecture. It is intended to open up the radio access network (RAN) and enable more innovation and competition in the market. This will lead to RANs for current 5G networks, but especially for future 6G networks, evolving from the current highly integrated, vendor-specific RAN architecture towards disaggregated architectures with open… ▽ More

    Submitted 22 June, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: Updates in Section III

  16. arXiv:2111.06676  [pdf, other

    cs.IT cs.LG

    A Reverse Jensen Inequality Result with Application to Mutual Information Estimation

    Authors: Gerhard Wunder, Benedikt Groß, Rick Fritschek, Rafael F. Schaefer

    Abstract: The Jensen inequality is a widely used tool in a multitude of fields, such as for example information theory and machine learning. It can be also used to derive other standard inequalities such as the inequality of arithmetic and geometric means or the Hölder inequality. In a probabilistic setting, the Jensen inequality describes the relationship between a convex function and the expected value. I… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

    Comments: 6 pages, ITW 2021

  17. arXiv:2111.03486  [pdf, ps, other

    cs.IT math.NA

    Guaranteed blind deconvolution and demixing via hierarchically sparse reconstruction

    Authors: Axel Flinth, Ingo Roth, Benedikt Groß, Jens Eisert, Gerhard Wunder

    Abstract: The blind deconvolution problem amounts to reconstructing both a signal and a filter from the convolution of these two. It constitutes a prominent topic in mathematical and engineering literature. In this work, we analyze a sparse version of the problem: The filter $h\in \mathbb{R}^μ$ is assumed to be $s$-sparse, and the signal $b \in \mathbb{R}^n$ is taken to be $σ$-sparse, both supports being un… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: 6 pages, 5 figures

  18. arXiv:2110.05837  [pdf, other

    eess.SP

    Explicit CSI Feedback Compression via Learned Approximate Message Passing

    Authors: Benedikt Groß, Rana Ahmed Salem, Thorsten Wild, Gerhard Wunder

    Abstract: Explicit channel state information at the transmitter side is helpful to improve downlink precoding performance for multi-user MIMO systems. In order to reduce feedback signalling overhead, compression of Channel State Information (CSI) is essential. In this work different low complexity compressed sensing algorithms are compared in the context of an explicit CSI feedback scheme for 5G new radio.… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

  19. arXiv:2106.00343  [pdf, other

    cs.IT cs.LG

    Reinforce Security: A Model-Free Approach Towards Secure Wiretap Coding

    Authors: Rick Fritschek, Rafael F. Schaefer, Gerhard Wunder

    Abstract: The use of deep learning-based techniques for approximating secure encoding functions has attracted considerable interest in wireless communications due to impressive results obtained for general coding and decoding tasks for wireless communication systems. Of particular importance is the development of model-free techniques that work without knowledge about the underlying channel. Such techniques… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Accepted for ICC 2021, 6 pages

  20. arXiv:2105.10270  [pdf, other

    cs.IT eess.SP

    Measure Concentration on the OFDM-based Random Access Channel

    Authors: Gerhard Wunder, Axel Flinth, Benedikt Groß

    Abstract: It is well known that CS can boost massive random access protocols. Usually, the protocols operate in some overloaded regime where the sparsity can be exploited. In this paper, we consider a different approach by taking an orthogonal FFT base, subdivide its image into appropriate sub-channels and let each subchannel take only a fraction of the load. To show that this approach can actually achieve… ▽ More

    Submitted 21 May, 2021; originally announced May 2021.

    Comments: 5 pages, IEEE Statistical Signal Processing Workshop (SSP) 2021, Track: Massive Machine-Type Communications (invited paper)

  21. arXiv:2105.03169  [pdf, other

    cs.IT eess.SP

    Hierarchical sparse recovery from hierarchically structured measurements with application to massive random access

    Authors: Benedikt Groß, Axel Flinth, Ingo Roth, Jens Eisert, Gerhard Wunder

    Abstract: A new family of operators, coined hierarchical measurement operators, is introduced and discussed within the well-known hierarchical sparse recovery framework. Such operator is a composition of block and mixing operations and notably contains the Kronecker product as a special case. Results on their hierarchical restricted isometry property (HiRIP) are derived, generalizing prior work on recovery… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: 5 pages, 2 figures. arXiv admin note: text overlap with arXiv:2005.10379

  22. arXiv:2104.02721  [pdf, other

    cs.IT eess.SP quant-ph

    Hierarchical compressed sensing

    Authors: Jens Eisert, Axel Flinth, Benedikt Groß, Ingo Roth, Gerhard Wunder

    Abstract: Compressed sensing is a paradigm within signal processing that provides the means for recovering structured signals from linear measurements in a highly efficient manner. Originally devised for the recovery of sparse signals, it has become clear that a similar methodology would also carry over to a wealth of other classes of structured signals. In this work, we provide an overview over the theory… ▽ More

    Submitted 8 December, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

    Comments: This book chapter is a report on findings within the DFG-funded priority program `Compressed Sensing in Information Processing' (CoSIP)

  23. arXiv:2103.06763  [pdf, other

    cs.CR

    ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi devices Using Physical Layer Security

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: Secure and scalable device provisioning is a notorious challenge in Wi-Fi. WPA2/WPA3 solutions take user interaction and a strong passphrase for granted. However, the often weak passphrases are subject to guessing attacks. Notably, there has been a significant rise of cyberattacks on Wi-Fi home or small office networks during the COVID-19 pandemic. This paper addresses the device provisioning prob… ▽ More

    Submitted 27 April, 2021; v1 submitted 11 March, 2021; originally announced March 2021.

    Comments: Accepted in IMIS-2021

  24. arXiv:2103.05526  [pdf, other

    eess.SY

    Using AoI Forecasts in Communicating and Robust Distributed Model-Predictive Control

    Authors: Jannik Hahn, Richard Schoeffauer, Gerhard Wunder, Olaf Stursberg

    Abstract: In order to enhance the performance of cyber-physical systems, this paper proposes the integrated de-sign of distributed controllers for distributed plants andthe control of the communication network. Conventionaldesign methods use static interfaces between both enti-ties and therefore rely on worst-case estimations of com-munication delay, often leading to conservative behaviorof the overall syst… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

  25. arXiv:2011.10402  [pdf, other

    cs.IT

    WiFi-Based Channel Impulse Response Estimation and Localization via Multi-Band Splicing

    Authors: Mahdi Barzegar Khalilsarai, Benedikt Gross, Stelios Stefanatos, Gerhard Wunder, Giuseppe Caire

    Abstract: Using commodity WiFi data for applications such as indoor localization, object identification and tracking and channel sounding has recently gained considerable attention. We study the problem of channel impulse response (CIR) estimation from commodity WiFi channel state information (CSI). The accuracy of a CIR estimation method in this setup is limited by both the available channel bandwidth as w… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    Comments: 6 pages, 2 figures

  26. arXiv:2006.16015  [pdf, other

    cs.IT

    Neural Mutual Information Estimation for Channel Coding: State-of-the-Art Estimators, Analysis, and Performance Comparison

    Authors: Rick Fritschek, Rafael F. Schaefer, Gerhard Wunder

    Abstract: Deep learning based physical layer design, i.e., using dense neural networks as encoders and decoders, has received considerable interest recently. However, while such an approach is naturally training data-driven, actions of the wireless channel are mimicked using standard channel models, which only partially reflect the physical ground truth. Very recently, neural network based mutual informatio… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.

    Comments: Accepted at SPAWC 2020

  27. arXiv:2006.14277  [pdf, other

    math.PR eess.SY

    Stability Results on Synchronized Queues in Discrete-Time for Arbitrary Dimension

    Authors: Richard Schoeffauer, Gerhard Wunder

    Abstract: In a batch of synchronized queues, customers can only be serviced all at once or not at all, implying that service remains idle if at least one queue is empty. We propose that a batch of $n$ synchronized queues in a discrete-time setting is quasi-stable for $n \in \{2,3\}$ and unstable for $n \geq 4$. A correspondence between such systems and a random-walk-like discrete-time Markov chain (DTMC), w… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  28. Hierarchical Isometry Properties of Hierarchical Measurements

    Authors: Axel Flinth, Benedikt Groß, Ingo Roth, Jens Eisert, Gerhard Wunder

    Abstract: A new class of measurement operators, coined hierarchical measurement operators, and prove results guaranteeing the efficient, stable and robust recovery of hierarchically structured signals from such measurements. We derive bounds on their hierarchical restricted isometry properties based on the restricted isometry constants of their constituent matrices, generalizing and extending prior work on… ▽ More

    Submitted 14 December, 2021; v1 submitted 20 May, 2020; originally announced May 2020.

    Comments: 22 pages, 5 figures. v3: Significant rework of previous version. Section on incoherent blocks added, as well as more numerical experiments. v4: Revision of the manuscript. Several previous mistakes have been corrected

    Journal ref: Applied and Computational Harmonic Analysis 58, 27-49 (2022)

  29. arXiv:2004.01985  [pdf, other

    eess.SY

    Model-Predictive Control for Discrete-Time Queueing Networks with Varying Topology

    Authors: Richard Schoeffauer, Gerhard Wunder

    Abstract: In this paper, we equip the conventional discrete-time queueing network with a Markovian input process, that, in addition to the usual short-term stochastics, governs the mid- to long-term behavior of the links between the network nodes. This is reminiscent of so-called Jump-Markov systems in control theory and allows the network topology to change over time. We argue that the common back-pressure… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

    Comments: 11 Pages

  30. arXiv:1909.10639  [pdf, other

    cs.IT

    The Method of Conditional Expectations for PAPR and Cubic Metric Reduction

    Authors: Saeed Afrasiabi-Gorgani, Gerhard Wunder

    Abstract: The OFDM waveform exhibits high fluctuation in the signal envelope which causes distortion in the nonlinear power amplifier of the transmitter. Peak-to-Average Power Ratio (PAPR) and Cubic Metric (CM) are the common metrics to quantify the phenomenon. A promising approach for PAPR or CM reduction is Sign Selection which is based on altering the signs of the data symbols. In this paper, the Method… ▽ More

    Submitted 25 March, 2020; v1 submitted 23 September, 2019; originally announced September 2019.

    Comments: 30 pages single-column, journal submission

  31. arXiv:1907.01349  [pdf, other

    cs.IT

    Predictive Network Control in Multi-Connectivity Mobility for URLLC Services

    Authors: David Guzman, Richard Schoeffauer, Gerhard Wunder

    Abstract: This paper proposes a centralized predictive flow controller to handle multi-connectivity for ultra-reliable low latency communication (URLLC) services. The prediction is based on channel state information (CSI) and buffer state reports from the system nodes. For this, we extend CSI availability to a packet data convergence protocol (PDCP) controller. The controller captures CSI in a discrete time… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: 6 pages, 4 figures

  32. arXiv:1905.03019  [pdf, other

    cs.IT

    The Method of Conditional Expectations for Cubic Metric Reduction in OFDM

    Authors: Saeed Afrasiabi-Gorgani, Gerhard Wunder

    Abstract: High variations in the OFDM signal envelope cause nonlinear distortion in the power amplifier of the transmitter, which is a major drawback. Peak-to-Average Power Ratio (PAPR) and Cubic Metric (CM) are commonly used for quantifying this characteristic of the signal. Despite the reportedly higher accuracy compared to PAPR, limited research has been done on reduction algorithms for CM. In this paper… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: 5 pages, accepted for presentation in IEEE SPAWC'19

  33. arXiv:1903.05864  [pdf, other

    cs.IT

    Non-Coherent Joint Transmission in Poisson Cellular Networks Under Pilot Contamination

    Authors: Stelios Stefanatos, Gerhard Wunder

    Abstract: This paper investigates the performance of downlink cellular networks with non-coherent joint (mutlipoint) transmissions and practical channel estimation. Under a stochastic geometry framework, the spatial average signal-to-noise-ratio (SNR) is characterized, taking into account the effect of channel estimation error due to pilot contamination. A simple, easy to compute SNR expression is obtained… ▽ More

    Submitted 1 July, 2019; v1 submitted 14 March, 2019; originally announced March 2019.

    Comments: 12 two-column pages

  34. arXiv:1903.02865  [pdf, other

    cs.IT cs.LG

    Deep Learning for Channel Coding via Neural Mutual Information Estimation

    Authors: Rick Fritschek, Rafael F. Schaefer, Gerhard Wunder

    Abstract: End-to-end deep learning for communication systems, i.e., systems whose encoder and decoder are learned, has attracted significant interest recently, due to its performance which comes close to well-developed classical encoder-decoder designs. However, one of the drawbacks of current learning approaches is that a differentiable channel model is needed for the training of the underlying neural netw… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: 5 pages, 6 figures

  35. arXiv:1903.02367  [pdf, other

    cs.NI cs.IT

    WiFi-Based Indoor Localization via Multi-Band Splicing and Phase Retrieval

    Authors: Mahdi Barzegar Khalilsarai, Stelios Stefanatos, Gerhard Wunder, Giuseppe Caire

    Abstract: We study the problem of indoor localization using commodity WiFi channel state information (CSI) measurements. The accuracy of methods developed to address this problem is limited by the overall bandwidth used by the WiFi device as well as various types of signal distortions imposed by the underlying hardware. In this paper, we propose a localization method that performs channel impulse response (… ▽ More

    Submitted 6 March, 2019; originally announced March 2019.

    Comments: 5 pages, 1 figure

  36. arXiv:1810.12655  [pdf, other

    cs.IT

    Deep Learning for the Gaussian Wiretap Channel

    Authors: Rick Fritschek, Rafael F. Schaefer, Gerhard Wunder

    Abstract: End-to-end learning of communication systems with neural networks and particularly autoencoders is an emerging research direction which gained popularity in the last year. In this approach, neural networks learn to simultaneously optimize encoding and decoding functions to establish reliable message transmission. In this paper, this line of thinking is extended to communication scenarios in which… ▽ More

    Submitted 11 March, 2019; v1 submitted 30 October, 2018; originally announced October 2018.

    Comments: 6 pages, 11 figures

  37. arXiv:1809.05277  [pdf, ps, other

    eess.SY eess.SP

    Distributed MPC with Prediction of Time-Varying Communication Delay

    Authors: Jannik Hahn, Richard Schoeffauer, Gerhard Wunder, Olaf Stursberg

    Abstract: The novel idea presented in this paper is to interweave distributed model predictive control with a reliable scheduling of the information that is interchanged between local controllers of the plant subsystems. To this end, a dynamic model of the communication network and a predictive scheduling algorithm are proposed, the latter providing predictions of the delay between sending and receiving inf… ▽ More

    Submitted 14 September, 2018; originally announced September 2018.

    Comments: 6 Pages, NecSys 2018

  38. arXiv:1809.05273  [pdf, ps, other

    eess.SP

    A linear algorithm for reliable predictive network control

    Authors: Richard Schoeffauer, Gerhard Wunder

    Abstract: This paper introduces a novel control approach for network scheduling and routing that is predictive and reliable in its nature, yet builds upon a linear program, making it fast in execution. First, we describe the canonical system model and how we expand it to be able to predict the success of transmissions. Furthermore, we define a notion of reliability and then explain the algorithm. With exten… ▽ More

    Submitted 14 September, 2018; originally announced September 2018.

    Comments: 6 Pages, GlobeCom 2018

  39. arXiv:1806.02754  [pdf, other

    cs.IT

    Performance of Hierarchical Sparse Detectors for Massive MTC

    Authors: Gerhard Wunder, Ingo Roth, Rick Fritschek, Jens Eisert

    Abstract: Recently, a new class of so-called \emph{hierarchical thresholding algorithms} was introduced to optimally exploit the sparsity structure in joint user activity and channel detection problems. In this paper, we take a closer look at the user detection performance of such algorithms under noise and relate its performance to the classical block correlation detector with orthogonal signatures. More s… ▽ More

    Submitted 19 October, 2018; v1 submitted 7 June, 2018; originally announced June 2018.

    Comments: 15 pages, 12 figures

  40. arXiv:1806.00815  [pdf, other

    cs.IT

    Low-Overhead Hierarchically-Sparse Channel Estimation for Multiuser Wideband Massive MIMO

    Authors: Gerhard Wunder, Stelios Stefanatos, Axel Flinth, Ingo Roth, Giuseppe Caire

    Abstract: The problem of excessive pilot overhead required for uplink massive MIMO channel estimation is well known, let alone when it is considered along with wideband (OFDM) transmissions. Towards channel estimators that are both efficient and require low-training overhead, compressive sensing (CS) approaches have been increasingly popular, exploiting the sparse nature of the physical channel. However, no… ▽ More

    Submitted 10 December, 2018; v1 submitted 3 June, 2018; originally announced June 2018.

    Comments: 14 two-column pages; submitted to IEEE Trans. Wireless Commun

  41. arXiv:1806.00813  [pdf, other

    cs.IT

    Wideband Massive MIMO Channel Estimation via Sequential Atomic Norm Minimization

    Authors: Stelios Stefanatos, Mahdi Barzegar Khalilsarai, Gerhard Wunder

    Abstract: The recently introduced atomic norm minimization (ANM) framework for parameter estimation is a promising candidate towards low overhead channel estimation in wireless communications. However, previous works on ANM-based channel estimation evaluated performance on channels with artificially imposed channel path separability, which cannot be guaranteed in practice. In addition, direct application of… ▽ More

    Submitted 3 September, 2018; v1 submitted 3 June, 2018; originally announced June 2018.

    Comments: extended version of paper submitted to globalSIP 2018

  42. arXiv:1804.01701  [pdf, other

    cs.IT

    Towards Massive Connectivity Support for Scalable mMTC Communications in 5G networks

    Authors: Carsten Bockelmann, Nuno K. Pratas, Gerhard Wunder, Stephan Saur, Monica Navarro, David Gregoratti, Guillaume Vivier, Elisabeth de Carvalho, Yalei Ji, Cedomir Stefanovic, Petar Popovski, Qi Wang, Malte Schellmann, Evangelos Kosmatos, Panagiotis Demestichas, Miruna Raceala-Motoc, Peter Jung, Slawomir Stanczak, Armin Dekorsy

    Abstract: The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service wi… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  43. arXiv:1804.00481  [pdf, other

    eess.SP math.OC

    Predictive Network Control and Throughput Sub-Optimality of MaxWeight

    Authors: Richard Schoeffauer, Gerhard Wunder

    Abstract: We present a novel control policy, called Predictive Network Control (PNC) to control wireless communication networks (on packet level), based on paradigms of Model Predictive Control (MPC). In contrast to common myopic policies, who use one step ahead prediction, PNC predicts the future behavior of the system for an extended horizon, thus facilitating performance gains. We define an advanced syst… ▽ More

    Submitted 31 August, 2018; v1 submitted 2 April, 2018; originally announced April 2018.

    Comments: 6 pages, 7 figures

  44. arXiv:1803.10994  [pdf, other

    cs.IT

    Hierarchical Sparse Channel Estimation for Massive MIMO

    Authors: Gerhard Wunder, Ingo Roth, Axel Flinth, Mahdi Barzegar, Saeid Haghighatshoar, Giuseppe Caire, Gitta Kutyniok

    Abstract: The problem of wideband massive MIMO channel estimation is considered. Targeting for low complexity algorithms as well as small training overhead, a compressive sensing (CS) approach is pursued. Unfortunately, due to the Kronecker-type sensing (measurement) matrix corresponding to this setup, application of standard CS algorithms and analysis methodology does not apply. By recognizing that the cha… ▽ More

    Submitted 29 March, 2018; originally announced March 2018.

    Comments: 8 pages, 5 figures

  45. arXiv:1801.10433  [pdf, ps, other

    cs.IT

    Hierarchical restricted isometry property for Kronecker product measurements

    Authors: I. Roth, A. Flinth, R. Kueng, J. Eisert, G. Wunder

    Abstract: Hierarchically sparse signals and Kronecker product structured measurements arise naturally in a variety of applications. The simplest example of a hierarchical sparsity structure is two-level $(s,σ)$-hierarchical sparsity which features $s$-block-sparse signals with $σ$-sparse blocks. For a large class of algorithms recovery guarantees can be derived based on the restricted isometry property (RIP… ▽ More

    Submitted 31 January, 2018; originally announced January 2018.

    Comments: 5 pages

  46. arXiv:1801.09628  [pdf, other

    cs.IT quant-ph

    Secure Massive IoT Using Hierarchical Fast Blind Deconvolution

    Authors: Gerhard Wunder, Ingo Roth, Rick Fritschek, Benedikt Groß, Jens Eisert

    Abstract: The Internet of Things and specifically the Tactile Internet give rise to significant challenges for notions of security. In this work, we introduce a novel concept for secure massive access. The core of our approach is a fast and low-complexity blind deconvolution algorithm exploring a bi-linear and hierarchical compressed sensing framework. We show that blind deconvolution has two appealing feat… ▽ More

    Submitted 31 January, 2018; v1 submitted 29 January, 2018; originally announced January 2018.

    Comments: submitted to WCNC2018 (accepted)

  47. arXiv:1712.04274  [pdf, other

    cs.IT

    On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds

    Authors: Rick Fritschek, Gerhard Wunder

    Abstract: We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approach u… ▽ More

    Submitted 23 April, 2018; v1 submitted 12 December, 2017; originally announced December 2017.

    Comments: 15 pages, submitted to IEEE Transactions on Information Forensics and Security; Revision: changed the structure of the paper and improved readability

  48. arXiv:1711.03996  [pdf, other

    eess.SP

    Estimation of Angles of Arrival Through Superresolution -- A Soft Recovery Approach for General Antenna Geometries

    Authors: Mahdi Barzegar, Guiseppe Caire, Axel Flinth, Saeid Haghighatshoar, Gitta Kutyniok, Gerhard Wunder

    Abstract: The estimation of direction of arrivals with help of $TV$-minimization is studied. Contrary to prior work in this direction, which has only considered certain antenna placement designs, we consider general antenna geometries. Applying the soft-recovery framework, we are able to derive a theoretic guarantee for a certain direction of arrival to be approximately recovered. We discuss the impact of t… ▽ More

    Submitted 10 November, 2017; originally announced November 2017.

  49. arXiv:1710.10796  [pdf, other

    cs.IT

    Performance Limits of Compressive Sensing Channel Estimation in Dense Cloud RAN

    Authors: Stelios Stefanatos, Gerhard Wunder

    Abstract: Towards reducing the training signaling overhead in large scale and dense cloud radio access networks (CRAN), various approaches have been proposed based on the channel sparsification assumption, namely, only a small subset of the deployed remote radio heads (RRHs) are of significance to any user in the system. Motivated by the potential of compressive sensing (CS) techniques in this setting, this… ▽ More

    Submitted 8 February, 2018; v1 submitted 30 October, 2017; originally announced October 2017.

    Comments: 6 pages, two-column format; ICC 2018

  50. arXiv:1707.00644  [pdf, other

    cs.IT

    Compressive Coded Random Access for Massive MTC Traffic in 5G Systems

    Authors: Gerhard Wunder, Cedomir Stefanovic, Petar Popovski, Lars Thiele

    Abstract: Massive MTC support is an important future market segment, but not yet efficiently supported in cellular systems. In this paper we follow-up on recent concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection. Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol. We will a… ▽ More

    Submitted 29 June, 2017; originally announced July 2017.

    Comments: Presented at 49th Asilomar Conference on Signals, Systems and Computers 2015. arXiv admin note: text overlap with arXiv:1504.05318