Search Results for author: Gunjan Verma

Found 17 papers, 11 papers with code

Distributed and Rate-Adaptive Feature Compression

no code implementations2 Apr 2024 Aditya Deshmukh, Venugopal V. Veeravalli, Gunjan Verma

Our goal is to design a feature compression {scheme} that can adapt to the varying communication constraints, while maximizing the inference performance at the fusion center.

Feature Compression regression

Learning Non-myopic Power Allocation in Constrained Scenarios

1 code implementation18 Jan 2024 Arindam Chowdhury, Santiago Paternain, Gunjan Verma, Ananthram Swami, Santiago Segarra

The problem of optimal power allocation -- for maximizing a given network utility metric -- under instantaneous constraints has recently gained significant popularity.

Decision Making

Learnable Digital Twin for Efficient Wireless Network Evaluation

no code implementations11 Jun 2023 Boning Li, Timofey Efimov, Abhishek Kumar, Jose Cortes, Gunjan Verma, Ananthram Swami, Santiago Segarra

Network digital twins (NDTs) facilitate the estimation of key performance indicators (KPIs) before physically implementing a network, thereby enabling efficient optimization of the network configuration.

Computational Efficiency

Deep Graph Unfolding for Beamforming in MU-MIMO Interference Networks

1 code implementation2 Apr 2023 Arindam Chowdhury, Gunjan Verma, Ananthram Swami, Santiago Segarra

We develop an efficient and near-optimal solution for beamforming in multi-user multiple-input-multiple-output single-hop wireless ad-hoc interference networks.

Delay-aware Backpressure Routing Using Graph Neural Networks

no code implementations19 Nov 2022 Zhongyuan Zhao, Bojan Radojicic, Gunjan Verma, Ananthram Swami, Santiago Segarra

In this work, we improve upon the widely-used metric of hop distance (and its variants) for the shortest path bias by introducing a bias based on the link duty cycle, which we predict using a graph convolutional neural network.

Graph-based Algorithm Unfolding for Energy-aware Power Allocation in Wireless Networks

no code implementations27 Jan 2022 Boning Li, Gunjan Verma, Santiago Segarra

We develop a novel graph-based trainable framework to maximize the weighted sum energy efficiency (WSEE) for power allocation in wireless communication networks.

Link Scheduling using Graph Neural Networks

1 code implementation12 Sep 2021 Zhongyuan Zhao, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

Test results on medium-sized wireless networks show that our centralized heuristic can reach a near-optimal solution quickly, and our distributed heuristic based on a shallow GCN can reduce by nearly half the suboptimality gap of the distributed greedy solver with minimal increase in complexity.

Scheduling

Distributed Scheduling using Graph Neural Networks

1 code implementation18 Nov 2020 Zhongyuan Zhao, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

In small- to middle-sized wireless networks with tens of links, even a shallow GCN-based MWIS scheduler can leverage the topological information of the graph to reduce in half the suboptimality gap of the distributed greedy solver with good generalizability across graphs and minimal increase in complexity.

Scheduling

Adversarial Examples in Constrained Domains

no code implementations2 Nov 2020 Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel

To assess how these algorithms perform, we evaluate them in constrained (e. g., network intrusion detection) and unconstrained (e. g., image recognition) domains.

Network Intrusion Detection

Unfolding WMMSE using Graph Neural Networks for Efficient Power Allocation

1 code implementation22 Sep 2020 Arindam Chowdhury, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

We study the problem of optimal power allocation in a single-hop ad hoc wireless network.

Error Correcting Output Codes Improve Probability Estimation and Adversarial Robustness of Deep Neural Networks

2 code implementations NeurIPS 2019 Gunjan Verma, Ananthram Swami

Modern machine learning systems are susceptible to adversarial examples; inputs which clearly preserve the characteristic semantics of a given class, but whose classification is (usually confidently) incorrect.

Adversarial Defense Adversarial Robustness +1

Cannot find the paper you are looking for? You can Submit a new open access paper.