Algorithms and Fundamental Limits for Unlabeled Detection Using Types

We deal with the classical problem of testing two simple statistical hypotheses but, as a new element, it is assumed that the data vector is observed after an unknown permutation of its entries. What is the fundamental limit for the detection performance in this case? How much information for detection is contained in the entry values and how much in their positions? In the first part of this paper, we answer these questions. In the second part, we focus on practical algorithms. A low-complexity detector solves the detection problem without attempting to estimate the permutation. A modified version of the auction algorithm is then considered, and two greedy algorithms with affordable worst case complexity are presented. The detection operational characteristics of these detectors are investigated by computer experiments. The problem we address is referred to as unlabeled detection and is motivated by large sensor network applications, but applications are also foreseen in different fields, including image processing, social sensing, genome research, and molecular communication.

[1]  John N. Tsitsiklis,et al.  Parallel and distributed computation , 1989 .

[2]  James Y. Zou,et al.  Linear Regression with Shuffled Labels , 2017, 1705.01342.

[3]  Martin Vetterli,et al.  Unlabeled sensing: Solving a linear system with unordered measurements , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Ronald P. S. Mahler,et al.  Statistical Multisource-Multitarget Information Fusion , 2007 .

[5]  Charu C. Aggarwal,et al.  On Credibility Estimation Tradeoffs in Assured Social Sensing , 2013, IEEE Journal on Selected Areas in Communications.

[6]  R.P.S. Mahler,et al.  "Statistics 101" for multisensor, multitarget data fusion , 2004, IEEE Aerospace and Electronic Systems Magazine.

[7]  Suhas N. Diggavi,et al.  Identity Aware Sensor Networks , 2009, IEEE INFOCOM 2009.

[8]  O. F. Cook The Method of Types , 1898 .

[9]  Martin J. Wainwright,et al.  Denoising linear models with permuted data , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[10]  Tarek F. Abdelzaher,et al.  Maximum likelihood analysis of conflicting observations in social sensing , 2014, TOSN.

[11]  D. Bertsekas,et al.  The auction algorithm for the transportation problem , 1989 .

[12]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[13]  J. Munkres ALGORITHMS FOR THE ASSIGNMENT AND TRANSIORTATION tROBLEMS* , 1957 .

[14]  X. Huang,et al.  CAP3: A DNA sequence assembly program. , 1999, Genome research.

[15]  Aubrey B. Poore,et al.  Some assignment problems arising from multiple target tracking , 2006, Math. Comput. Model..

[16]  Richard E. Blahut,et al.  Hypothesis testing and information theory , 1974, IEEE Trans. Inf. Theory.

[17]  Peter Willett,et al.  Making Decisions with Shuffled Bits , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[18]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[19]  Peter Willett,et al.  The Importance of Being Earnest: Social Sensing With Unknown Agent Quality , 2016, IEEE Transactions on Signal and Information Processing over Networks.

[20]  Paolo Braca,et al.  Adaptive filtering of imprecisely time-stamped measurements with application to AIS networks , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[21]  Cyrill Stachniss,et al.  Simultaneous Localization and Mapping , 2016, Springer Handbook of Robotics, 2nd Ed..

[22]  Lijun Qian,et al.  GPS spoofing attack on time synchronization in wireless networks and detection scheme design , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[23]  Jayakrishnan Unnikrishnan,et al.  Asymptotically Optimal Matching of Multiple Sequences to Source Distributions and Training Sequences , 2014, IEEE Transactions on Information Theory.

[24]  Luca Schenato,et al.  Optimal Estimation in Networked Control Systems Subject to Random Delay and Packet Drop , 2008, IEEE Transactions on Automatic Control.

[25]  R. Jonker,et al.  Improving the Hungarian assignment algorithm , 1986 .

[26]  Harold W. Kuhn,et al.  The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.

[27]  Husheng Li,et al.  Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.

[28]  Philip David,et al.  SoftPOSIT: Simultaneous Pose and Correspondence Determination , 2002, International Journal of Computer Vision.

[29]  Jiang Zhu,et al.  Signal Detection From Unlabeled Ordered Samples , 2018, IEEE Communications Letters.

[30]  João Paulo Costeira,et al.  Subspace matching: Unique solution to point matching with geometric constraints , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[31]  Rick S. Blum,et al.  Hypothesis testing in the presence of maxwell's daemon: signal detection by unlabeled observations , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[32]  Zhiwei Xu,et al.  Parameter Estimation via Unlabeled Sensing Using Distributed Sensors , 2017, IEEE Communications Letters.

[33]  Martin Vetterli,et al.  Unlabeled Sensing With Random Linear Measurements , 2015, IEEE Transactions on Information Theory.

[34]  Neeraj Varshney,et al.  On the Impact of Transposition Errors in Diffusion-Based Channels , 2019, IEEE Transactions on Communications.

[35]  Rémi Gribonval,et al.  Compressed sensing with unknown sensor permutation , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[36]  Dimitri P. Bertsekas,et al.  Network optimization : continuous and discrete models , 1998 .

[37]  Giuseppe Caire,et al.  Signal Recovery From Unlabeled Samples , 2017, IEEE Transactions on Signal Processing.

[38]  David Zuckerman,et al.  Asymptotically good codes correcting insertions, deletions, and transpositions , 1997, SODA '97.

[39]  W. S. Robinson A Method for Chronologically Ordering Archaeological Deposits , 1951, American Antiquity.

[40]  Anna Freud,et al.  Design And Analysis Of Modern Tracking Systems , 2016 .

[41]  Minh N. Do,et al.  A Theory for Sampling Signals from a Union of Subspaces , 2022 .

[42]  Rick S. Blum,et al.  Signal Amplitude Estimation and Detection From Unlabeled Binary Quantized Samples , 2018, IEEE Transactions on Signal Processing.

[43]  Robin J. Evans,et al.  A Bayesian solution and its approximations to out-of-sequence measurement problems , 2003, Inf. Fusion.

[44]  Martin J. Wainwright,et al.  Linear regression with an unknown permutation: Statistical and computational limits , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[45]  Peter Willett,et al.  Sometimes They Come Back: Testing Two Simple Hypotheses (In The Realm Of Unlabeled Data) , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[46]  Rick S. Blum,et al.  GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).