H. Vincent PoorPrinceton University | PU · Department of Electrical Engineering
H. Vincent Poor
PhD, Princeton, 1977
About
3,171
Publications
526,388
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
158,742
Citations
Introduction
My research interests are primarily in the areas of information theory, machine learning and network science, and their applications in wireless networks, energy systems and related fields.
Skills and Expertise
Additional affiliations
September 1990 - present
Publications
Publications (3,171)
In real-world reinforcement learning (RL) systems, various forms of impaired observability can complicate matters. These situations arise when an agent is unable to observe the most recent state of the system due to latency or lossy channels, yet the agent must still make real-time decisions. This paper introduces a theoretical investigation into e...
The ubiquitous smart meters are expected to be a central feature of future smart grids because they enable the collection of massive amounts of fine-grained consumption data to support demand-side flexibility. However, current smart meters are not smart enough. They can only perform basic data collection and communication functions and cannot carry...
The wireless channel is a linear input-output relation that depends non-linearly on the RIS configuration: physics-compliant models involve the inversion of an “interaction” matrix. We identify two independent origins of this structural non-linearity:
i
) proximity-induced mutual coupling between close-by RIS elements;
ii
) reverberation-induce...
As we become more and more dependent on communication technologies, resilience against any attacks on communication networks is important to guarantee the digital sovereignty of our society. New developments of communication networks approach the problem of resilience through in-network computing approaches for higher protocol layers, while the phy...
This paper explores the computational complexity involved in determining the capacity of the band-limited additive colored Gaussian noise (ACGN) channel and its capacity-achieving power spectral density (p.s.d.). The study reveals that when the noise p.s.d. is a strictly positive computable continuous function, computing the capacity of the band-li...
Federated learning (FL) can suffer from communication bottlenecks when deployed in mobile networks, limiting participating clients and deterring FL convergence. In this context, the impact of practical air interfaces with discrete modulation schemes on FL has not previously been studied in depth. This paper proposes a new paradigm of flexible aggre...
Visible light communications (VLC) and physical-layer security (PLS) are key candidate technologies for 6G wireless communication. This paper combines these two technologies by considering an orthogonal frequency division multiplexing (OFDM) technique called DC-biased optical OFDM (DCO-OFDM) equipped with PLS as applied to indoor VLC systems. First...
Supporting increasingly higher rates in wireless networks requires highly accurate clock synchronization across the nodes. Motivated by this need, in this work we consider distributed clock synchronization for half-duplex (HD) TDMA wireless networks. We focus on pulse-coupling (PC)-based synchronization as it is practically advantageous for high-sp...
This paper proposes a joint design strategy for enhancing individual user rates in a multi-user system by optimizing both the programmable reflecting elements (PREs) of an active reconfigurable intelligent surface (aRIS) and the transmit beamforming at a base station. Given that the aRIS's PREs are bound by discrete constraints due to low-resolutio...
Smart factory is a new digital and intelligent platform requiring high throughput and ultra-reliable low-latency communications (URLLC). Industrial communications at sub-6 GHz faces spectrum congestion and bandwidth limitations, which seriously jeopardize the high data rate requirement of smart factory. Recently, millimeter wave (mmWave) and Terahe...
Traditional massive multiple-input multiple- output (MIMO) information theory adopts non-physically consistent assumptions, including white-noised, scalar-quantity, far-field, discretized, and monochromatic EM fields, which mismatch the nature of the underlying electromagnetic (EM) fields supporting the physical layer of wireless communication syst...
In reconfigurable intelligent surface (RIS)-assisted symbiotic radio (SR) systems, an RIS transmits a secondary signal by modulating its information bits over the radio frequency (RF) signals emitted from a primary transmitter (PTx), and simultaneously, the RIS assists the primary transmission by passive beamforming. Considering the inevitable chan...
In this work we study the rate-distortion function (RDF) for lossy compression of asynchronously-sampled continuous-time (CT) wide-sense cyclostationary (WSCS) Gaussian processes with memory. As the case of synchronous sampling, i.e., when the sampling interval is commensurate with the period of the cyclostationary statistics, has already been stud...
We consider a broadband over-the-air computation empowered model aggregation approach for wireless federated learning (FL) systems and propose to leverage an intelligent reflecting surface (IRS) to combat wireless fading and noise. We first investigate the conventional node-selection based framework, where a few edge nodes are dropped in model aggr...
We propose a federated version of adaptive gradient methods, particularly AdaGrad and Adam, within the framework of over-the-air model training. This approach capitalizes on the inherent superposition property of wireless channels, facilitating fast and scalable parameter aggregation. Meanwhile, it enhances the robustness of the model training proc...
The ubiquitous smart meters are expected to be a central feature of future smart grids by enabling the collection of massive fine-grained consumption data to support demand-side flexibility. However, the current smart meters are still not smart enough. They can only perform basic data collection and communication functionalities but fail to carry o...
We harness a stacked intelligent metasurfaces (SIM) for two-dimensional (2D) direction-of-arrival (DOA) estimation. In contrast to the conventional designs, an advanced SIM in front of the receiver array automatically carries out the 2D discrete Fourier transform (DFT) as the incident waves propagate through it. As a result, the receiver array dire...
We consider a wireless communication system with a passive eavesdropper, in which a transmitter and legitimate receiver generate and use key bits to secure the transmission of their data. These bits are added to and used from a pool of available key bits. In this work, we analyze the reliability of the system in terms of the probability that the bu...
In modern cell-less wireless networks, mobility management is undergoing a significant transformation, transitioning from single-link handover management to a more adaptable multi-connectivity cluster reconfiguration approach, including often conflicting objectives like energy-efficient power allocation and satisfying varying reliability requiremen...
In this work, we consider a federated learning model in a wireless system with multiple base stations and inter‐cell interference. We apply a differentially private scheme to transmit information from users to their corresponding base station during the learning phase. We show the convergence behavior of the learning process by deriving an upper bo...
Extremely large-scale multiple-input-multiple-output (XL-MIMO), which offers vast spatial degrees of freedom, has emerged as a potentially pivotal enabling technology for the sixth generation (6G) of wireless mobile networks. With its growing significance, both opportunities and challenges are concurrently manifesting. This paper presents a compreh...
Chaotic systems have attracted considerable attention due to their potential applications in aerodynamics, robotics, and power systems. Although there has been a lot of work on the state estimation of linear systems, how to efficiently reconstruct a nonlinear system, especially a chaotic system still remains open. In this paper, we are interested i...
Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and...
The fifth generation (5G) and beyond wireless networks are envisioned to provide an integrated communication and computing platform that will enable multipurpose and intelligent networks driven by a growing demand for both traditional end users and industry verticals. This evolution will be realized by innovations in both core and access capabiliti...
This paper proposes a novel, data-agnostic, model poisoning attack on Federated Learning (FL), by designing a new adversarial graph autoencoder (GAE)-based framework. The attack requires no knowledge of FL training data and achieves both effectiveness and undetectability. By listening to the benign local models and the global model, the attacker ex...
Future wireless systems are envisioned to create an endogenously holography-capable, intelligent, and programmable radio propagation environment, that will offer unprecedented capabilities for high spectral and energy efficiency, low latency, and massive connectivity. A potential and promising technology for supporting the expected extreme requirem...
The beam squint effect, which manifests in the different steering matrices in different sub-bands, has been widely considered a challenge in millimeter wave (mmWave) multi-input multi-output (MIMO) channel estimation. Existing methods either require specific forms of the precoding/combining matrix, which restrict their general practicality, or simp...
Digital Twin (DT) has been widely envisioned as a major intelligent application of 6 G wireless networks requiring stringent quality-of-service (QoS) for
massive ultra-reliable and low latency communications
(mURLLC) to support efficient interactions between physical and virtual objects. As a 6 G enabler, multi-tier caching, which is one of the k...
Networks allow us to describe a wide range of interaction phenomena that occur in complex systems arising in such diverse fields of knowledge as neuroscience, engineering, ecology, finance, and social sciences. Until very recently, the primary focus of network models and tools has been on describing the pairwise relationships between system entitie...
The distributed subgradient (DSG) method is a widely used algorithm for coping with large-scale distributed optimization problems in machine-learning applications. Most existing works on DSG focus on ideal communication between cooperative agents, where the shared information between agents is exact and perfect. This assumption, however, can lead t...
Modern communication systems need to fulfill multiple and often conflicting objectives at the same time. In particular, new applications require high reliability while operating at low transmit powers. Moreover, reliability constraints may vary over time depending on the current state of the system. One solution to address this problem is to use jo...
This is the first treatise on multiuser (MU) beam-forming designed for achieving long-term rate-fairness in full-dimensional MU massive multi-input multi-output (m-MIMO) systems. Explicitly, based on the channel covariances, which can be assumed to be known beforehand, we address this problem by optimizing the following objective functions: the use...
The
K
-receiver wiretap channel is a channel model where a transmitter broadcasts
K
independent messages to
K
intended receivers while keeping them secret from an eavesdropper. The capacity region of the
K
-receiver multiple-input multiple-output (MIMO) wiretap channel has been characterized by using dirty-paper coding and stochastic encodi...
In the Internet of Things (IoT) networks, edge learning for data-driven tasks provides intelligent applications and services. As the network size becomes large, different users may generate distinct datasets. Thus, to suit multiple edge learning tasks for large-scale IoT networks, this paper performs efficient communication under the task-oriented...
Low-rate and short-packet transmissions are important for ultra-reliable low-latency communications (URLLC). In this paper, we put forth a new family of sparse superposition codes for URLLC, called block orthogonal sparse superposition (BOSS) codes. We first present a code construction method for the efficient encoding of BOSS codes. The key idea i...
In this paper, we characterize the generalized degrees-of-freedom (GDoF) region of the two-user (
M
,
N
<sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub>
,
N
<sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub>
) multiple-input multiple-output...
p>With the continuous evolution of wireless communication and the explosive growth in data traffic, decentralized spectrum sensing has become essential for the optimal utilization of wireless resources. In this direction, we propose an over-the-air aggregation-based Federated Learning (FL) for a technology recognition model that can identify signal...
p>With the continuous evolution of wireless communication and the explosive growth in data traffic, decentralized spectrum sensing has become essential for the optimal utilization of wireless resources. In this direction, we propose an over-the-air aggregation-based Federated Learning (FL) for a technology recognition model that can identify signal...
This letter studies how the imperfect resolution of near-field beamforming, the key feature of near-field communications , can be used to improve the throughput and connectivity of wireless networks. In particular, a hybrid non-orthogonal multiple access (NOMA) transmission strategy is developed to use preconfigured near-field beams for serving add...
Generative adversarial networks (GANs) have attracted increasing attention recently owing to their impressive abilities to generate realistic samples with high privacy protection. Without directly interacting with training examples, the generative model can be used to estimate the underlying distribution of an original dataset while the discriminat...
This article discusses the interplay between mathematical models of physical entities and mathematical models of computing hardware, advocating its criticality concerning trustworthy virtual-twin technologies in near-future communication networks. The digital twinning of physical entities is widely recognized as a crucial factor in near-future info...
The aim of this paper is to exploit cognitive-radio inspired NOMA (CR-NOMA) transmission to reduce the age of information in wireless networks. In particular, two CR-NOMA transmission protocols are developed by utilizing the key features of different data generation models and applying CR-NOMA as an add-on to a legacy orthogonal multiple access (OM...
Modern communication systems need to fulfill multiple and often conflicting objectives at the same time. In particular, new applications require high reliability while operating at low transmit power. Moreover, reliability constraints may vary over time depending on the current state of the system. One solution to address this problem is to use joi...
Aimed at inspiring researchers and practitioners, this paper presents comprehensive and multidimensional discussions of the potential and benefits of integrating power line and wireless communication systems to enhance data communication in both indoor and outdoor environments. By systematically examining the strengths and weaknesses of power line...
A wireless network serving multiple users in the millimeter-wave or the sub-terahertz band by a base station is considered. High-throughput multi-user hybrid-transmit beamforming is conceived by maximizing the minimum rate of the users. For the sake of energy-efficient signal transmission, the array-of-subarrays structure is used for analog beamfor...
Staked intelligent metasurface (SIM) based techniques are developed to perform two-dimensional (2D) direction-of-arrival (DOA) estimation. In contrast to the conventional designs, an advanced SIM in front of the receiving array automatically performs the 2D discrete Fourier transform (DFT) as the incident waves propagate through it. It is demonstra...
Visible light communication (VLC) is envisioned as a core component of future wireless communication networks due to, among others, the huge unlicensed bandwidth it offers and the fact that it does not cause any interference to existing radio frequency (RF) communication systems. In order to take advantage of both RF and VLC, most research on their...
As a promising technique for high-mobility wireless communications, orthogonal time frequency space (OTFS) has been proved to enjoy excellent advantages with respect to traditional orthogonal frequency division multiplexing (OFDM). Although multiple studies have considered index modulation (IM) based OTFS (IM-OTFS) schemes to further improve system...
This study examines a downlink multiple-input single-output (MISO) system, where a base station (BS) with multiple antennas sends data to multiple single-antenna users with the help of a reconfigurable intelligent surface (RIS) and a half-duplex decode-and-forward (DF) relay. The system’s sum rate is maximized through joint optimization of active b...
This paper analyzes the maximal achievable rate for a given blocklength and maximal error probability over a multiple-antenna ambient backscatter channel. The result consists of a finite blocklength channel coding achievability bound and a converse bound for the legacy system with finite alphabet constraints and multiple-input-multiple-output based...
Intelligent metasurface has recently emerged as a promising technology that enables the customization of wireless environments by harnessing large numbers of inexpensive configurable scattering elements. However, prior studies have predominantly focused on single-layer metasurfaces, which have limitations in terms of the number of beam patterns the...
The capacity of a channel can usually be characterized as a maximization of certain entropic quantities. From a practical point of view it is of primary interest to not only compute the capacity value, but also to find the corresponding optimizer, i.e., the capacity-achieving input distribution. This paper addresses the general question of whether...
-1To efficiently exploit the massive amounts of raw data that are increasingly being generated in mobile edge networks, federated learning (FL) has emerged as a promising distributed learning technique by collaboratively training a shared learning model on edge devices. The number of resource blocks when using traditional orthogonal transmission st...
The aim of this letter is to develop a new design of cognitive radio inspired non-orthogonal multiple access (CR-NOMA), which ensures that multiple new users can be supported without causing disruption to the legacy network. Analytical results are developed to characterize the statistical properties of the number of supported new users. The develop...
The demand for broadband wireless access is driving research and standardization of 5G and beyond-5G wireless systems. In this article, we aim to identify emerging security challenges for these wireless systems and pose multiple research areas to address these challenges.
Motivated by the advancing computational capacity of distributed end-user equipment (UE), as well as the increasing concerns about sharing private data, there has been considerable recent interest in machine learning (ML) and artificial intelligence (AI) that can be processed on distributed UEs. Specifically, in this paradigm, parts of an ML proces...
p>The future electric grid is supported by a vast number of smart inverters interfacing with distributed energy resources at the edge. These inverters’ dynamics are typically characterized as impedances, which are crucial for ensuring grid stability and resiliency. However, the physical implementation of these inverters may change significantly fro...
A standard assumption in the design of ultra-reliable low-latency communication systems is that the duration between message arrivals is larger than the number of channel uses before the decoding deadline. Nevertheless, this assumption fails when messages arrive rapidly and reliability constraints require that the number of channel uses exceed the...
Physical-layer security (PLS) is a promising technique to complement communication security in beyond-5G wireless networks. However, PLS developments in current research are often based on the ideal assumption of infinite coding blocklengths or perfect knowledge of the wiretap link's channel state information (CSI). In this work, we study the perfo...
Unique digital circuit outputs, considered as physical unclonable function (PUF) circuit outputs, can facilitate a secure and reliable secret key agreement. To tackle noise and high correlations between the PUF circuit outputs, transform coding methods combined with scalar quantizers are typically applied to extract the uncorrelated bit sequences r...
We consider a line-of-sight communication link between two holographic surfaces (HoloSs). We provide a closed-form expression for the number of effective degrees of freedom (eDoF), i.e., the number of orthogonal communication modes that can be established between the HoloSs. The framework can be applied to general network deployments beyond the wid...
The criticality of prompt and precise traffic forecasting in optimizing traffic flow management in Intelligent Transportation Systems (ITS) has drawn substantial scholarly focus. Spatio-Temporal Graph Neural Networks (STGNNs) have been lauded for their adaptability to road graph structures. Yet, current research on STGNNs architectures often priori...
In this paper, we investigate the problem of estimating a complex-valued Laplacian matrix from a linear Gaussian model, with a focus on its application in the estimation of admittance matrices in power systems. The proposed approach is based on a constrained maximum likelihood estimator (CMLE) of the complex-valued Laplacian, which is formulated as...
With the rapid proliferation of smart mobile devices, federated learning (FL) has been widely considered for application in wireless networks for distributed model training. However, data heterogeneity, e.g., non-independently identically distributions and different sizes of training data among clients, poses major challenges to wireless FL. Limite...
We consider the physical layer security (PLS) problem in multi-user non-orthogonal multiple access (NOMA) enabled multiple-input multiple-output (MIMO) visible light communication systems intercepted by a passive eavesdropper (Eve). We propose a novel transmit precoding scheme based on receive spatial modulation (RSM) to degrade the signal-to-inter...
Integrated sensing and communication (ISAC) is a key enabler for next-generation wireless communication systems to improve spectral efficiency. However, the coexistence of sensing and communication functionalities can cause harmful interference. In this paper, we propose to use a reconfigurable intelligent surface (RIS) in conjunction with ISAC to...
In this paper, the problem of determining the capacity of a communication channel is formulated as a cooperative game, between a generator and a discriminator, that is solved via deep learning techniques. The task of the generator is to produce channel input samples for which the discriminator ideally distinguishes conditional from unconditional ch...
Joint source and channel coding (JSCC) for image transmission has attracted increasing attention due to its robustness and high efficiency. However, the existing deep JSCC research mainly focuses on minimizing the distortion between the transmitted and received information under a fixed number of available channels. Therefore, the transmitted rate...
It is widely believed that large IRS-aided MIMO settings maintain the fundamental features of massive MIMO systems. This work gives a rigorous proof that confirms this belief. We show that using a large passive IRS, the end-to-end MIMO channel between the transmitter and the receiver always hardens, even if the IRS elements are strongly correlated....