Electrical and Electronic Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 33
  • Item
    No Preview Available
    An Information-Theoretic Analysis for Transfer Learning: Error Bounds and Applications
    Wu, X ; Manton, JH ; Aickelin, U ; Zhu, J ( 2022-07-12)
    Transfer learning, or domain adaptation, is concerned with machine learning problems in which training and testing data come from possibly different probability distributions. In this work, we give an information-theoretic analysis on the generalization error and excess risk of transfer learning algorithms, following a line of work initiated by Russo and Xu. Our results suggest, perhaps as expected, that the Kullback-Leibler (KL) divergence D(μ||μ′) plays an important role in the characterizations where μ and μ′ denote the distribution of the training data and the testing test, respectively. Specifically, we provide generalization error upper bounds for the empirical risk minimization (ERM) algorithm where data from both distributions are available in the training phase. We further apply the analysis to approximated ERM methods such as the Gibbs algorithm and the stochastic gradient descent method. We then generalize the mutual information bound with ϕ-divergence and Wasserstein distance. These generalizations lead to tighter bounds and can handle the case when μ is not absolutely continuous with respect to μ′. Furthermore, we apply a new set of techniques to obtain an alternative upper bound which gives a fast (and optimal) learning rate for some learning problems. Finally, inspired by the derived bounds, we propose the InfoBoost algorithm in which the importance weights for source and target data are adjusted adaptively in accordance to information measures. The empirical results show the effectiveness of the proposed algorithm.
  • Item
    Thumbnail Image
    Achieving QoS for Real-Time Bursty Applications over Passive Optical Networks
    Roy, D ; Rao, AS ; Alpcan, T ; Das, G ; Palaniswami, M ( 2021-09-05)
    Emerging real-time applications such as those classified under ultra-reliable low latency (uRLLC) generate bursty traffic and have strict Quality of Service (QoS) requirements. Passive Optical Network (PON) is a popular access network technology, which is envisioned to handle such applications at the access segment of the network. However, the existing standards cannot handle strict QoS constraints. The available solutions rely on instantaneous heuristic decisions and maintain QoS constraints (mostly bandwidth) in an average sense. Existing works with optimal strategies are computationally complex and are not suitable for uRLLC applications. This paper presents a novel computationally-efficient, far-sighted bandwidth allocation policy design for facilitating bursty traffic in a PON framework while satisfying strict QoS (age of information/delay and bandwidth) requirements of modern applications. To this purpose, first we design a delay-tracking mechanism which allows us to model the resource allocation problem from a control-theoretic viewpoint as a Model Predictive Control (MPC). MPC helps in taking far-sighted decisions regarding resource allocations and captures the time-varying dynamics of the network. We provide computationally efficient polynomial-time solutions and show its implementation in the PON framework. Compared to existing approaches, MPC reduces delay violations by approximately 15% for a delay-constrained application of 1ms target. Our approach is also robust to varying traffic arrivals.
  • Item
    Thumbnail Image
    Achieving AI-enabled Robust End-to-End Quality of Experience over Radio Access Networks
    Roy, D ; Rao, AS ; Alpcan, T ; Das, G ; Palaniswami, M ( 2022-01-13)
    Emerging applications such as Augmented Reality, the Internet of Vehicles and Remote Surgery require both computing and networking functions working in harmony. The End-to-end (E2E) quality of experience (QoE) for these applications depends on the synchronous allocation of networking and computing resources. However, the relationship between the resources and the E2E QoE outcomes is typically stochastic and non-linear. In order to make efficient resource allocation decisions, it is essential to model these relationships. This article presents a novel machine-learning based approach to learn these relationships and concurrently orchestrate both resources for this purpose. The machine learning models further help make robust allocation decisions regarding stochastic variations and simplify robust optimization to a conventional constrained optimization. When resources are insufficient to accommodate all application requirements, our framework supports executing some of the applications with minimal degradation (graceful degradation) of E2E QoE. We also show how we can implement the learning and optimization methods in a distributed fashion by the Software-Defined Network (SDN) and Kubernetes technologies. Our results show that deep learning-based modelling achieves E2E QoE with approximately 99.8\% accuracy, and our robust joint-optimization technique allocates resources efficiently when compared to existing differential services alternatives.
  • Item
    Thumbnail Image
    Online Slice Reconfiguration for End-to-End QoE in 6G Applications
    Roy, D ; Rao, AS ; Alpcan, T ; Wick, A ; Das, G ; Palaniswami, M ( 2022-01-13)
  • Item
    Thumbnail Image
    On Eigenvalues of Laplacian Matrix for a Class of Directed Signed Graphs
    Ahmadizadeh, S ; Shames, I ; Martin, S ; Nesic, D ( 2017-05-12)
    The eigenvalues of the Laplacian matrix for a class of directed graphs with both positive and negative weights are studied. First, a class of directed signed graphs is investigated in which one pair of nodes (either connected or not) is perturbed with negative weights. A necessary condition is proposed to attain the following objective for the perturbed graph: the real parts of the non-zero eigenvalues of its Laplacian matrix are positive. A sufficient condition is also presented that ensures the aforementioned objective for unperturbed graph. It is then highlighted the case where the condition becomes necessary and sufficient. Secondly, for directed graphs, a subset of pairs of nodes are identified where if any of the pairs is connected by an edge with infinitesimal negative weight, the resulting Laplacian matrix will have at least one eigenvalue with negative real part. Illustrative examples are presented to show the applicability of our results.
  • Item
    Thumbnail Image
    Supervisory observer for parameter and state estimation of nonlinear systems using the DIRECT algorithm
    Chong, MS ; Postoyan, R ; Khong, SZ ; Nesic, D ( 2017-09-05)
    A supervisory observer is a multiple-model architecture, which estimates the parameters and the states of nonlinear systems. It consists of a bank of state observers, where each observer is designed for some nominal parameter values sampled in a known parameter set. A selection criterion is used to select a single observer at each time instant, which provides its state estimate and parameter value. The sampling of the parameter set plays a crucial role in this approach. Existing works require a sufficiently large number of parameter samples, but no explicit lower bound on this number is provided. The aim of this work is to overcome this limitation by sampling the parameter set automatically using an iterative global optimisation method, called DIviding RECTangles (DIRECT). Using this sampling policy, we start with 1 + 2np parameter samples where np is the dimension of the parameter set. Then, the algorithm iteratively adds samples to improve its estimation accuracy. Convergence guarantees are provided under the same assumptions as in previous works, which include a persistency of excitation condition. The efficacy of the supervisory observer with the DIRECT sampling policy is illustrated on a model of neural populations.
  • Item
    Thumbnail Image
    A Robust Circle-criterion Observer-based Estimator for Discrete-time Nonlinear Systems in the Presence of Sensor Attacks and Measurement Noise
    Yang, T ; Murguia, C ; Kuijper, M ; Nešić, D ( 2018-05-11)
    We address the problem of robust state estimation and attack isolation for a class of discrete-time nonlinear systems with positive-slope nonlinearities under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of circle-criterion observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose a estimator that provides robust estimates of the system state in spite of sensor attacks and measurement noise; and an algorithm for detecting and isolating sensor attacks. Our results make use of the ISS property of the observers to check whether the trajectories of observers are consistent with the attack-free trajectories of the system. Simulations results are presented to illustrate the performance of the results.
  • Item
    Thumbnail Image
    A Multi-Observer Approach for Attack Detection and Isolation of Discrete-Time Nonlinear Systems
    Yang, T ; Murguia, C ; Kuijper, M ; Nešić, D ( 2018-09-13)
    We address the problem of attack detection and isolation for a class of discrete-time nonlinear systems under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose two algorithms for detecting and isolating sensor attacks. These algorithms make use of the ISS property of the observers to check whether the trajectories of observers are “consistent” with the attack-free trajectories of the system. Simulations results are presented to illustrate the performance of the proposed algorithms.
  • Item
    Thumbnail Image
    Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint)
    Murguia, C ; Shames, I ; Ruths, J ; Nesic, D ( 2018-09-14)
    As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid being detected. In this manuscript, for a class of perturbed linear time-invariant systems, we propose two security metrics to quantify the potential impact that stealthy attacks could have on the system dynamics by tampering with sensor measurements. We provide analysis mathematical tools (in terms of linear matrix inequalities) to quantify these metrics for given system dynamics, control structure, system monitor, and set of sensors being attacked. Then, we provide synthesis tools (in terms of semidefinite programs) to redesign controllers and monitors such that the impact of stealthy attacks is minimized and the required attack-free system performance is guaranteed.
  • Item
    Thumbnail Image
    On Privacy of Quantized Sensor Measurements through Additive Noise
    Murguia, C ; Shames, I ; Farokhi, F ; Nesic, D ( 2018-09-10)
    We study the problem of maximizing privacy of quantized sensor measurements by adding random variables. In particular, we consider the setting where information about the state of a process is obtained using noisy sensor measurements. This information is quantized and sent to a remote station through an unsecured communication network. It is desired to keep the state of the process private; however, because the network is not secure, adversaries might have access to sensor information, which could be used to estimate the process state. To avoid an accurate state estimation, we add random numbers to the quantized sensor measurements and send the sum to the remote station instead. The distribution of these random variables is designed to minimize the mutual information between the sum and the quantized sensor measurements for a desired level of distortion -- how different the sum and the quantized sensor measurements are allowed to be. Simulations are presented to illustrate our results.