Alert button
Picture for Rohit Singh

Rohit Singh

Alert button

Indexed Multiple Access with Reconfigurable Intelligent Surfaces: The Reflection Tuning Potential

Feb 15, 2023
Rohit Singh, Aryan Kaushik, Wonjae Shin, George C. Alexandropoulos, Mesut Toka, Marco Di Renzo

Figure 1 for Indexed Multiple Access with Reconfigurable Intelligent Surfaces: The Reflection Tuning Potential
Figure 2 for Indexed Multiple Access with Reconfigurable Intelligent Surfaces: The Reflection Tuning Potential
Figure 3 for Indexed Multiple Access with Reconfigurable Intelligent Surfaces: The Reflection Tuning Potential
Figure 4 for Indexed Multiple Access with Reconfigurable Intelligent Surfaces: The Reflection Tuning Potential

Indexed modulation (IM) is an evolving technique that has become popular due to its ability of parallel data communication over distinct combinations of transmission entities. In this article, we first provide a comprehensive survey of IM-enabled multiple access (MA) techniques, emphasizing the shortcomings of existing non-indexed MA schemes. Theoretical comparisons are presented to show how the notion of indexing eliminates the limitations of non-indexed solutions. We also discuss the benefits that the utilization of a reconfigurable intelligent surface (RIS) can offer when deployed as an indexing entity. In particular, we propose an RIS-indexed multiple access (RIMA) transmission scheme that utilizes dynamic phase tuning to embed multi-user information over a single carrier. The performance of the proposed RIMA is assessed in light of simulation results that confirm its performance gains. The article further includes a list of relevant open technical issues and research directions.

* 7 pages, 5 figures, 1 table 
Viaarxiv icon

Granger causal inference on DAGs identifies genomic loci regulating transcription

Oct 18, 2022
Rohit Singh, Alexander P. Wu, Bonnie Berger

Figure 1 for Granger causal inference on DAGs identifies genomic loci regulating transcription
Figure 2 for Granger causal inference on DAGs identifies genomic loci regulating transcription
Figure 3 for Granger causal inference on DAGs identifies genomic loci regulating transcription
Figure 4 for Granger causal inference on DAGs identifies genomic loci regulating transcription

When a dynamical system can be modeled as a sequence of observations, Granger causality is a powerful approach for detecting predictive interactions between its variables. However, traditional Granger causal inference has limited utility in domains where the dynamics need to be represented as directed acyclic graphs (DAGs) rather than as a linear sequence, such as with cell differentiation trajectories. Here, we present GrID-Net, a framework based on graph neural networks with lagged message passing for Granger causal inference on DAG-structured systems. Our motivating application is the analysis of single-cell multimodal data to identify genomic loci that mediate the regulation of specific genes. To our knowledge, GrID-Net is the first single-cell analysis tool that accounts for the temporal lag between a genomic locus becoming accessible and its downstream effect on a target gene's expression. We applied GrID-Net on multimodal single-cell assays that profile chromatin accessibility (ATAC-seq) and gene expression (RNA-seq) in the same cell and show that it dramatically outperforms existing methods for inferring regulatory locus-gene links, achieving up to 71% greater agreement with independent population genetics-based estimates. By extending Granger causality to DAG-structured dynamical systems, our work unlocks new domains for causal analyses and, more specifically, opens a path towards elucidating gene regulatory interactions relevant to cellular differentiation and complex human diseases at unprecedented scale and resolution.

* Presented at the International Conference on Learning Representations 2022 
Viaarxiv icon

Ultra-dense Low Data Rate (UDLD) Communication in the THz

Sep 22, 2020
Rohit Singh, Doug Sicker

Figure 1 for Ultra-dense Low Data Rate (UDLD) Communication in the THz
Figure 2 for Ultra-dense Low Data Rate (UDLD) Communication in the THz
Figure 3 for Ultra-dense Low Data Rate (UDLD) Communication in the THz
Figure 4 for Ultra-dense Low Data Rate (UDLD) Communication in the THz

In the future, with the advent of Internet of Things (IoT), wireless sensors, and multiple 5G killer applications, an indoor room might be filled with $1000$s of devices demanding low data rates. Such high-level densification and mobility of these devices will overwhelm the system and result in higher interference, frequent outages, and lower coverage. The THz band has a massive amount of greenfield spectrum to cater to this dense-indoor deployment. However, a limited coverage range of the THz will require networks to have more infrastructure and depend on non-line-of-sight (NLOS) type communication. This form of communication might not be profitable for network operators and can even result in inefficient resource utilization for devices demanding low data rates. Using distributed device-to-device (D2D) communication in the THz, we can cater to these Ultra-dense Low Data Rate (UDLD) type applications. D2D in THz can be challenging, but with opportunistic allocation and smart learning algorithms, these challenges can be mitigated. We propose a 2-Layered distributed D2D model, where devices use coordinated multi-agent reinforcement learning (MARL) to maximize efficiency and user coverage for dense-indoor deployment. We show that densification and mobility in a network can be used to further the limited coverage range of THz devices, without the need for extra infrastructure or resources.

* 9 Figures; To be published at ACM NANOCOM 2020 
Viaarxiv icon

MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application

Nov 19, 2019
Rohit Singh, Douglas Sicker, Kazi Mohammed Saidul Huq

Figure 1 for MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application
Figure 2 for MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application
Figure 3 for MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application
Figure 4 for MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application

5G will enable the growing demand for Internet of Things (IoT), high-resolution video streaming, and low latency wireless services. Demand for such services is expected to growth rapid, which will require a search for Beyond 5G technological advancements in wireless communications. Part of these advancements is the need for additional spectrum, namely moving toward the terahertz (THz) range. To compensate for the high path loss in THz, narrow beamwidths are used to improve antenna gains. However, with narrow beamwidths, even minor fluctuations in device location (such as through body movement) can cause frequent link failures due to beam misalignment. In this paper, we provide a solution to these small-scale indoor movement that result in mobility-induced outages. Like a moth randomly flutters about, Mobility-induced Outages in THz (MOTH) can be ephemeral in nature and hard to avoid. To deal with MOTH we propose two methods to predict these outage scenarios: (i) Align-After-Failure (AAF), which predicts based on fixed time margins, and (ii) Align-Before-Failure (ABF), which learns the time margins through user mobility patterns. In this paper, two different online classifiers were used to train the ABF model to predicate if a mobility-induced outage is going to occur; thereby, significantly reducing the time spent in outage scenarios. Simulation results demonstrate a relationship between optimal beamwidth and human mobility patterns. Additionally, to cater to a future with dense deployment of Wireless Personal Area Network (WPAN), it is necessary that we have efficient deployment of resources (e.g., THz-APs). One solution is to maximize the user coverage for a single AP, which might be dependent on multiple parameters. We identify these parameters and observe their tradeoffs for improving user coverage through a single THz-AP.

* To appear in IEEE CCNC 2020. The document has 9 pages and 16 figures 
Viaarxiv icon

Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations

Mar 08, 2019
Shahrzad Gholami, Lily Xu, Sara Mc Carthy, Bistra Dilkina, Andrew Plumptre, Milind Tambe, Rohit Singh, Mustapha Nsubuga, Joshua Mabonga, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Tom Okello, Eric Enyel

Figure 1 for Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations
Figure 2 for Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations
Figure 3 for Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations
Figure 4 for Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations

Illegal wildlife poaching threatens ecosystems and drives endangered species toward extinction. However, efforts for wildlife monitoring and protection in conservation areas are constrained by the limited resources of law enforcement agencies. To aid in wildlife protection, PAWS is an ML pipeline that has been developed as an end-to-end, data-driven approach to combat illegal poaching. PAWS assists park managers by identifying areas at high risk of poaching throughout protected areas based on real-world data and generating optimal patrol routes for deployment in the field. In this paper, we address significant challenges including extreme class imbalance (up to 1:200), bias, and uncertainty in wildlife poaching data to enhance PAWS and apply its methodology to several national parks with diverse characteristics. (i) We use Gaussian processes to quantify predictive uncertainty, which we exploit to increase the robustness of our prescribed patrols. We evaluate our approach on real-world historic poaching data from Murchison Falls and Queen Elizabeth National Parks in Uganda and, for the first time, Srepok Wildlife Sanctuary in Cambodia. (ii) We present the results of large-scale field tests conducted in Murchison Falls and Srepok Wildlife Sanctuary which confirm that the predictive power of PAWS extends promisingly to multiple parks. This paper is part of an effort to expand PAWS to 600 parks around the world through integration with SMART conservation software.

* 9 pages, 10 figures 
Viaarxiv icon

Applying SVGD to Bayesian Neural Networks for Cyclical Time-Series Prediction and Inference

Jan 17, 2019
Xinyu Hu, Paul Szerlip, Theofanis Karaletsos, Rohit Singh

Figure 1 for Applying SVGD to Bayesian Neural Networks for Cyclical Time-Series Prediction and Inference
Figure 2 for Applying SVGD to Bayesian Neural Networks for Cyclical Time-Series Prediction and Inference
Figure 3 for Applying SVGD to Bayesian Neural Networks for Cyclical Time-Series Prediction and Inference
Figure 4 for Applying SVGD to Bayesian Neural Networks for Cyclical Time-Series Prediction and Inference

A regression-based BNN model is proposed to predict spatiotemporal quantities like hourly rider demand with calibrated uncertainties. The main contributions of this paper are (i) A feed-forward deterministic neural network (DetNN) architecture that predicts cyclical time series data with sensitivity to anomalous forecasting events; (ii) A Bayesian framework applying SVGD to train large neural networks for such tasks, capable of producing time series predictions as well as measures of uncertainty surrounding the predictions. Experiments show that the proposed BNN reduces average estimation error by 10% across 8 U.S. cities compared to a fine-tuned multilayer perceptron (MLP), and 4% better than the same network architecture trained without SVGD.

* Third workshop on Bayesian Deep Learning (NeurIPS 2018) 
Viaarxiv icon

Deep Reinforcement Learning for Green Security Games with Real-Time Information

Nov 06, 2018
Yufei Wang, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, Fei Fang

Figure 1 for Deep Reinforcement Learning for Green Security Games with Real-Time Information
Figure 2 for Deep Reinforcement Learning for Green Security Games with Real-Time Information
Figure 3 for Deep Reinforcement Learning for Green Security Games with Real-Time Information
Figure 4 for Deep Reinforcement Learning for Green Security Games with Real-Time Information

Green Security Games (GSGs) have been proposed and applied to optimize patrols conducted by law enforcement agencies in green security domains such as combating poaching, illegal logging and overfishing. However, real-time information such as footprints and agents' subsequent actions upon receiving the information, e.g., rangers following the footprints to chase the poacher, have been neglected in previous work. To fill the gap, we first propose a new game model GSG-I which augments GSGs with sequential movement and the vital element of real-time information. Second, we design a novel deep reinforcement learning-based algorithm, DeDOL, to compute a patrolling strategy that adapts to the real-time information against a best-responding attacker. DeDOL is built upon the double oracle framework and the policy-space response oracle, solving a restricted game and iteratively adding best response strategies to it through training deep Q-networks. Exploring the game structure, DeDOL uses domain-specific heuristic strategies as initial strategies and constructs several local modes for efficient and parallelized training. To our knowledge, this is the first attempt to use Deep Q-Learning for security games.

Viaarxiv icon

Pyro: Deep Universal Probabilistic Programming

Oct 18, 2018
Eli Bingham, Jonathan P. Chen, Martin Jankowiak, Fritz Obermeyer, Neeraj Pradhan, Theofanis Karaletsos, Rohit Singh, Paul Szerlip, Paul Horsfall, Noah D. Goodman

Figure 1 for Pyro: Deep Universal Probabilistic Programming
Figure 2 for Pyro: Deep Universal Probabilistic Programming
Figure 3 for Pyro: Deep Universal Probabilistic Programming

Pyro is a probabilistic programming language built on Python as a platform for developing advanced probabilistic models in AI research. To scale to large datasets and high-dimensional models, Pyro uses stochastic variational inference algorithms and probability distributions built on top of PyTorch, a modern GPU-accelerated deep learning framework. To accommodate complex or model-specific algorithmic behavior, Pyro leverages Poutine, a library of composable building blocks for modifying the behavior of probabilistic programs.

* Submitted to JMLR MLOSS track 
Viaarxiv icon

Designing the Game to Play: Optimizing Payoff Structure in Security Games

May 22, 2018
Zheyuan Ryan Shi, Ziye Tang, Long Tran-Thanh, Rohit Singh, Fei Fang

Figure 1 for Designing the Game to Play: Optimizing Payoff Structure in Security Games
Figure 2 for Designing the Game to Play: Optimizing Payoff Structure in Security Games

Effective game-theoretic modeling of defender-attacker behavior is becoming increasingly important. In many domains, the defender functions not only as a player but also the designer of the game's payoff structure. We study Stackelberg Security Games where the defender, in addition to allocating defensive resources to protect targets from the attacker, can strategically manipulate the attacker's payoff under budget constraints in weighted L^p-norm form regarding the amount of change. Focusing on problems with weighted L^1-norm form constraint, we present (i) a mixed integer linear program-based algorithm with approximation guarantee; (ii) a branch-and-bound based algorithm with improved efficiency achieved by effective pruning; (iii) a polynomial time approximation scheme for a special but practical class of problems. In addition, we show that problems under budget constraints in L^0-norm form and weighted L^\infty-norm form can be solved in polynomial time. We provide an extensive experimental evaluation of our proposed algorithms.

Viaarxiv icon