Holger Boche’s research while affiliated with Technical University of Munich and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (946)


Continuously Ordered Hierarchies of Algorithmic Information in Digital Twinning and Signal Processing
  • Preprint

May 2025

Yannik N. Böck

·

Holger Boche

·

We consider a fractional-calculus example of a continuous hierarchy of algorithmic information in the context of its potential applications in digital twinning. Digital twinning refers to different emerging methodologies in control engineering that involve the creation of a digital replica of some physical entity. From the perspective of computability theory, the problem of ensuring the digital twin's integrity -- i.e., keeping it in a state where it matches its physical counterpart -- entails a notion of algorithmic information that determines which of the physical system's properties we can reliably deduce by algorithmically analyzing its digital twin. The present work investigates the fractional calculus of periodic functions -- particularly, we consider the Wiener algebra -- as an exemplary application of the algorithmic-information concept. We establish a continuously ordered hierarchy of algorithmic information among spaces of periodic functions -- depending on their fractional degree of smoothness -- in which the ordering relation determines whether a certain representation of some function contains ``more'' or ``less'' information than another. Additionally, we establish an analogous hierarchy among lp-spaces, which form a cornerstone of (traditional) digital signal processing. Notably, both hierarchies are (mathematically) ``dual'' to each other. From a practical perspective, our approach ultimately falls into the category of formal verification and (general) formal methods.


Identification over Poisson ISI Channels: Feedback and Molecular Applications

April 2025

·

1 Read

Molecular communication (MC) enables information transfer via molecules, making it ideal for biomedical applications where traditional methods fall short. In many such scenarios, identifying specific events is more critical than decoding full messages, motivating the use of deterministic identification (DI). This paper investigates DI over discrete-time Poisson channels (DTPCs) with inter-symbol interference (ISI), a realistic setting due to channel memory effects. We improve the known upper bound on DI capacity under power constraints from 32+κ\frac{3}{2} + \kappa to 1+κ2\frac{1 + \kappa}{2}. Additionally, we present the first results on deterministic identification with feedback (DIF) in this context, providing a constructive lower bound. These findings enhance the theoretical understanding of MC and support more efficient, feedback-driven biomedical systems.


Quantum Hypothesis Testing Lemma for Deterministic Identification over Quantum Channels
  • Preprint
  • File available

April 2025

·

2 Reads

In our previous work, we presented the Hypothesis Testing Lemma, a key tool that establishes sufficient conditions for the existence of good deterministic identification (DI) codes for memoryless channels with finite output, but arbitrary input alphabets. In this work, we provide a full quantum analogue of this lemma, which shows that the existence of a DI code in the quantum setting follows from a suitable packing in a modified space of output quantum states. Specifically, we demonstrate that such a code can be constructed using product states derived from this packing. This result enables us to tighten the capacity lower bound for DI over quantum channels beyond the simultaneous decoding approach. In particular, we can now express these bounds solely in terms of the Minkowski dimension of a certain state space, giving us new insights to better understand the nature of the protocol, and the separation between simultaneous and non-simultaneous codes. We extend the discussion with a particular channel example for which we can construct an optimum code.

Download

Computation of Capacity-Distortion-Cost Functions for Continuous Memoryless Channels

April 2025

·

2 Reads

·

Ziyou Tang

·

·

[...]

·

Holger Boche

This paper aims at computing the capacity-distortion-cost (CDC) function for continuous memoryless channels, which is defined as the supremum of the mutual information between channel input and output, constrained by an input cost and an expected distortion of estimating channel state. Solving the optimization problem is challenging because the input distribution does not lie in a finite-dimensional Euclidean space and the optimal estimation function has no closed form in general. We propose to adopt the Wasserstein proximal point method and parametric models such as neural networks (NNs) to update the input distribution and estimation function alternately. To implement it in practice, the importance sampling (IS) technique is used to calculate integrals numerically, and the Wasserstein gradient descent is approximated by pushing forward particles. The algorithm is then applied to an integrated sensing and communications (ISAC) system, validating theoretical results at minimum and maximum distortion as well as the random-deterministic trade-off.


Exploiting Beamforming for Enforcing Semantic Secrecy in 5G NR mmWave Communications

April 2025

·

3 Reads

We experimentally investigate the performance of semantically-secure physical layer security (PLS) in 5G new radio (NR) mmWave communications during the initial cell search procedure in the NR band n257 at 27 GHz. A gNB transmits PLS-encoded messages in the presence of an eavesdropper, who intercepts the communication by non-intrusively collecting channel readings in the form of IQ samples. For the message transmission, we use the physical broadcast channel (PBCH) within the synchronization signal block. We analyze different signal-to-noise ratio (SNR) conditions by progressively reducing the transmit power of the subcarriers carrying the PBCH channel, while ensuring optimal conditions for over-the-air frequency and timing synchronization. We measure the secrecy performance of the communication in terms of upper and lower bounds for the distinguishing error rate (DER) metric for different SNR levels and beam angles when performing beamsteering in indoor scenarios, such as office environments and laboratory settings.


The Optimal Causal Linear Predictor is Not Turing Computable

March 2025

This article shows that the minimum mean square error (MMSE) for predicting a stationary stochastic time series from its past observations is not generally Turing computable, even if the spectral density of the stochastic process is differentiable with a computable first derivative. Thus there are spectral densities with the property that for any approximation sequence that converges to the MMSE there does not exist an algorithmic stopping criterion that guarantees that the computed approximation is sufficiently close to the true value of the MMSE. Furthermore, it is shown that under the same conditions on the spectral density, the coefficients of the optimal prediction filter are not generally Turing computable. In such cases and for any sequence of computable finite-impulse response approximations of the optimal prediction filter there exists no algorithmic stopping criterion that is able to guarantee a desired approximation error.


Optimal Signal Processing for Common Randomness Generation over MIMO Gaussian Channels with Applications in Identification

March 2025

·

2 Reads

Common randomness (CR), as a resource, is not commonly exploited in existing practical communication systems. In the CR generation framework, both the sender and receiver aim to generate a common random variable observable to both, ideally with low error probability. The availability of this CR allows us to implement correlated random protocols that can lead to faster and more efficient algorithms. Previous work focused on CR generation over perfect channels with limited capacity. In our work, we consider the problem of CR generation from independent and identically distributed (i.i.d.) samples of a correlated finite source with one-way communication over a Gaussian channel. We first derive the CR capacity for single-input single-output (SISO) Gaussian channels. This result is then used for the derivation of the CR capacity in the multiple-input multiple-output (MIMO) case. CR plays a key role in the identification scheme since it may allow a significant increase in the identification capacity of channels. In the identification framework, the decoder is interested in knowing whether a specific message of special interest to him has been sent or not, rather than knowing what the received message is. In many new applications, such as several machine-to-machine and human-to-machine systems and the tactile internet, this post-Shannon scheme is more efficient than classical transmission. In our work, we also consider a CR-assisted secure identification scheme and develop a lower bound on the corresponding secure identification capacity.


Workshop on Information Theory and Related Fields – In Memory of Ning Cai

March 2025

·

2 Reads

Sadly, our esteemed colleague and friend Ning Cai passed away on 25th May, 2023. In his memory, Ingo Althöfer, Holger Boche, Christian Deppe, Jens Stoye, Ulrich Tamm, Andreas Winter, and Raymond Yeung organized the “Workshop on Information Theory and Related Fields” at the Bielefeld ZiF (Center for Interdisciplinary Research). This special event was held from 24th November to 26th November, 2023. The workshop celebrated Ning Cai’s remarkable contributions to the field of information theory and provided a platform for discussing current research in related areas. Ning Cai’s work has had a significant impact on many domains, and this gathering brought together colleagues, collaborators, and young researchers who were influenced by his pioneering efforts.


On Effective Convergence in Fekete’s Lemma and Related Combinatorial Problems in Information Theory

March 2025

·

1 Read

Fekete’s lemma is a well known result from combinatorial mathematics that shows the existence of a limit value related to super- and subadditive sequences of real numbers. In this paper, we analyze Fekete’s lemma in view of the arithmetical hierarchy of real numbers by Xizhong Zheng and Klaus Weihrauch and fit the results into an information-theoretic context. We introduce special sets associated to super- and subadditive sequences and prove their effective equivalence to Σ1\varSigma _1 and Π1\varPi _1. Using methods from the theory established by Xizhong Zheng and Klaus Weihrauch, we then show that the limit value emerging from Fekete’s lemma is, in general, not a computable number. Given a sequence that additionally satisfies non-negativity, we characterize under which conditions the associated limit value can be computed effectively and investigate the corresponding modulus of convergence. Subsidiarily, we prove a theorem concerning the structural differences between computable sequences of computable numbers and computable sequences of rational numbers. We close the paper by a discussion on how our findings affect common problems from information theory.


Secure Identification for Multi-antenna Gaussian Channels

March 2025

·

1 Citation

New applications in modern communications are demanding robust and ultra-reliable low-latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach of Ahlswede and Dueck is much more efficient than the classical message transmission scheme proposed by Shannon. Previous studies concentrate mainly on identification over discrete channels. For discrete channels, it was proved that identification is robust under channel uncertainty. Furthermore, optimal identification schemes that are secure and robust against jamming attacks have been considered. However, no results for continuous channels have yet been established. That is why we focus on the continuous case: the Gaussian channel for its known practical relevance. We deal with secure identification over Gaussian channels. Provable secure communication is of high interest for future communication systems. A key technique for implementing secure communication is the physical layer security based on information-theoretic security. We model this with the wiretap channel. In particular, we provide a suitable coding scheme for the Gaussian wiretap channel (GWC) and determine the corresponding secure identification capacity. We also consider Multiple-Input Multiple-Output (MIMO) Gaussian channels and provide an efficient signal-processing scheme. This scheme allows a separation of signal processing and Gaussian coding as in the classical case.


Citations (41)


... Firstly, it enables dynamic modification of relationships between concepts, offering a clear visualization of how changing one element affects the others. This is crucial in fields like legal reasoning (Cui et al., 2023;Boche et al., 2024), scientific research (Ding et al., 2023;, and policy analysis , where the inter-dependencies between various factors can be intricate and subtle. Secondly, GoT enables an assessment of the significance of each node within the graph, providing insights into which pieces of information are most critical to the task. ...

Reference:

Usable XAI: 10 Strategies Towards Exploiting Explainability in the LLM Era
Mathematical algorithm design for deep learning under societal and judicial constraints: The algorithmic transparency requirement
  • Citing Article
  • March 2025

Applied and Computational Harmonic Analysis

... Wafa also introduced feedback as another valuable resource for message identification [11]. She discussed how incorporating feedback mechanisms can further enhance the identification process, offering examples and theoretical backing for her points [12,13]. Expanding the scope of the discussion, Wafa explored the intersection of molecular communication and message identification. ...

An Achievable Rate-Distortion Region of Joint Identification and Sensing for Multiple Access Channels
  • Citing Conference Paper
  • December 2024

... The main contribution of this paper is, thus, an analysis of adversarial attacks on MTMF over wireless channels and the development of a resilient MTLLM fusion framework (R-MTLLMF), which leverages the unique architecture and finetuning characteristics of LLMs within MTMF to safeguard task vector aggregation against adversarial noise. To this end, we investigate worst-case channel conditions in which adversarial noise, induced by a malicious attacker with optimal attack strategy, considerably decreases the communication rate below a certain threshold, such that reactive network defenses and other upper-layer resilience mechanisms are insufficient [11], thus requiring a resilient physical layer solution [12]. We take this special case as an example to study the worstcase impact of adversarial noise to MTMF, and to understand in how far AI-based resilience mechanisms alone can be effective without the help of additional physical layer protection schemes. ...

Resilient, Federated Large Language Models over Wireless Networks: Why the PHY Matters
  • Citing Conference Paper
  • December 2024

... Previous research has demonstrated that for discrete memoryless channels (DMCs) [15], the number of identifiable messages grows doubly exponentially when randomized encoding is permitted, i.e., ∼ 2 2 nR , where R is the coding rate. Similarly, deterministic ID (DI) over memoryless channels with finite output spaces and arbitrary input alphabets has been studied in [16], [17], demonstrating that the number of identifiable messages exhibits super-exponential growth ∼ 2 n log(n)R . Specifically for channels relevant for MC, DI has been studied for binomial channels in [18], for DTPCs in [19], and for fading channels in [20]. ...

Deterministic Identification Over Channels With Finite Output: A Dimensional Perspective on Superlinear Rates

IEEE Transactions on Information Theory

... Willem's strategy [13], which enables partial collaboration between encoders through the feedback links, is combined with the proposed coding scheme to establish an achievable RD region. It benefits from the simultaneous decoding not only between messages and state descriptions but also between shared and private messages and thus is shown to be larger than the RD region derived in our previous work [14], which is based on the coding scheme in [15] and the sequential decoding approach. Notably, our coding scheme coincides with the one in [16] in the absence of feedback and thus reduces to the same result. ...

An Achievable Rate-Distortion Region for Joint State and Message Communication over Multiple Access Channels
  • Citing Conference Paper
  • November 2024

... For this system, the ID capacity-distortion function is fully characterized. Motivated by the transformative impact of feedback on ID capacity, [74] investigates joint ID and sensing for state-dependent multiple access channel (SD-MACs) with noiseless strictly causal feedback. Here, multiple senders transmit ID messages to a receiver while simultaneously sensing the channel states. ...

Identification via Gaussian Multiple Access Channels in the Presence of Feedback
  • Citing Conference Paper
  • November 2024

... These vulnerabilities have motivated the study of this concept in the quantum world, where in [18] it has been shown unlike the classical setting, provably secure Quantum Physical Unclonable Function (QPUF) can exist. Several protocols have also been designed based on QPUF or a combination of CPUF together with quantum communication [19,20,[33][34][35][36][37][38]. In particular, [20] introduced an authentication protocol that leverages quantum communication to achieve a provable exponential security advantage, even when using an underlying weak classical PUF. ...

Existential unforgeability in quantum authentication from quantum physical unclonable functions based on random von Neumann measurement

Physical Review Research

... Beyond the point to point setting, for discrete memoryless communication networks, it is known [11][12][13][14] that NS assistance can increase the Shannon 1 capacity. A key idea for showing such improvements is to map the winning strategy of a multiplayer pseudo-telepathy game, such as the magic square [15] game, into a coding strategy in a communication network. ...

The Multiple-Access Channel With Entangled Transmitters

IEEE Transactions on Information Theory

... An analogous type of computability supremacy occurs in the context of inverse problems, which form the mathematical basis for a broad range of applications in, among others, signal processing and machine learning [64], [65]. Finally, [66] highlighted that the conclusions on AgT drawn in [26] might analogously apply to near-future quantum hardware. The present work provides a generalized framework that allows for a coherent analysis of all application scenarios discussed above. ...

Feynman Meets Turing: The Uncomputability of Quantum Gate-Circuit Emulation and Concatenation

IEEE Transactions on Computers

... 5: Create populations and their delay for b t and y. 6: Send the objects in Steps 3 and 5 to SpiNNaker2's PEs. 7: end for 8: At inference, encode inputs into spikes with FS Id and run programs on SpiNNaker2's PEs. ...

Remote State Estimation and Blum–Shub–Smale Machines—A Computability Analysis With Applications to Virtual Twinning

IEEE Transactions on Automatic Control