2017 IEEE International Symposium on Information Theory (ISIT) 2017
DOI: 10.1109/isit.2017.8006675
|View full text |Cite
|
Sign up to set email alerts
|

Distributed hypothesis testing over noisy channels

Abstract: A distributed binary hypothesis testing problem, in which multiple observers transmit their observations to a detector over noisy channels, is studied. Given its own side information, the goal of the detector is to decide between two hypotheses for the joint distribution of the data. Single-letter upper and lower bounds on the optimal type 2 error exponent (T2-EE), when the type 1 error probability vanishes with the block-length are obtained. These bounds coincide and characterize the optimal T2-EE when only a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
22
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 22 publications
(25 citation statements)
references
References 13 publications
(26 reference statements)
1
22
2
Order By: Relevance
“…The detector performs a binary hypothesis test on the joint distribution of the data (U k , V k ) to decide between them, based on This work is supported in part by the European Research Council (ERC) through Starting Grant BEACON (agreement #677854). A part of this work was presented at the International Symposium on Information theory (ISIT), Aachen, 2017 [15]. the channel outputs Y n as well as its own observations V k .…”
Section: Introductionmentioning
confidence: 99%
“…The detector performs a binary hypothesis test on the joint distribution of the data (U k , V k ) to decide between them, based on This work is supported in part by the European Research Council (ERC) through Starting Grant BEACON (agreement #677854). A part of this work was presented at the International Symposium on Information theory (ISIT), Aachen, 2017 [15]. the channel outputs Y n as well as its own observations V k .…”
Section: Introductionmentioning
confidence: 99%
“…The second term in (C.41) corresponds to A ′ rc defined in (53). The third term corresponds to A ′′ rc defined in (54), when using ρ s = ρ − ρ c , and noting that when…”
Section: Appendix C Proof Of Theorems 8 Andmentioning
confidence: 99%
“…Proof: The first two conditions follow directly from the converse of the TACI problem considered in [6], when the noisy channel between the source U n and the detector is replaced by a noiseless channel of rate R. Eqn. (34) follows by noting that the distortion at the adversary cannot be more than that can be obtained by a symbol-by-symbol reconstruction U i = φ(E i ) using only the side-information E n (ignoring the message from the observer).…”
Section: Analysis Of Probability Of Errormentioning
confidence: 99%
“…Various multi-terminal scenarios have been studied in [4] and [5]. Recently, the optimal T2EE for TACI over a noisy channel is established in [6]. The information theoretic framework for analyzing secrecy is first introduced in the seminal paper of Shannon [7].…”
Section: Introductionmentioning
confidence: 99%