Multishot Capacity of Adversarial Networks

dc.contributor.authorShapiro, Julia Marieen
dc.contributor.committeechairMatthews, Gretchen L.en
dc.contributor.committeechairLopez Valdez, Hiram Habiden
dc.contributor.committeememberShimozono, Mark M.en
dc.contributor.departmentMathematicsen
dc.date.accessioned2024-05-09T08:00:14Zen
dc.date.available2024-05-09T08:00:14Zen
dc.date.issued2024-05-08en
dc.description.abstractAdversarial network coding studies the transmission of data over networks affected by adversarial noise. In this realm, the noise is modeled by an omniscient adversary who is restricted to corrupting a proper subset of the network edges. In 2018, Ravagnani and Kschischang established a combinatorial framework for adversarial networks. The study was recently furthered by Beemer, Kilic and Ravagnani, with particular focus on the one-shot capacity: a measure of the maximum number of symbols that can be transmitted in a single use of the network without errors. In this thesis, both bounds and capacity-achieving schemes are provided for families of adversarial networks in multiple transmission rounds. We also demonstrate scenarios where we transmit more information using a network multiple times for communication versus using the network once. Some results in this thesis are joint work with Giuseppe Cotardo (Virginia Tech), Gretchen Matthews (Virginia Tech) and Alberto Ravagnani (Eindhoven University of Technology).en
dc.description.abstractgeneralWe study how to best transfer data across a communication network even if there is adversarial interference using network coding. Network coding is used in video streaming, autonomous vehicles, 5G and NextG communications, satellite networks, and Internet of Things (IoT) devices among other applications. It is the process that encodes data before sending it and decodes it upon receipt. It brings advantages such as increased network efficiency, improved reliability, reduced redundancy, enhanced resilience, and energy savings. We seek to enhance this valuable technique by determining optimal ways in which to utilize network coding schemes. We explore scenarios in which an adversary has partial access to a network. To examine the maximum data that can be communicated over one use of a network, we require the intermediate parts of the network process the information before forwarding it in a process called network decoding. In this thesis, we focus on characterizing when using a network multiple times for communication increases the amount of information that is received regardless of the worst-case adversarial attack, building on prior work that shows how underlying structure influences capacity. We design efficient methods for specific networks, to communicate at capacity.en
dc.description.degreeMaster of Scienceen
dc.format.mediumETDen
dc.identifier.othervt_gsexam:40007en
dc.identifier.urihttps://hdl.handle.net/10919/118924en
dc.language.isoenen
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectnetwork decodingen
dc.subjectadversarial networken
dc.subjectmultishot capacityen
dc.titleMultishot Capacity of Adversarial Networksen
dc.typeThesisen
thesis.degree.disciplineMathematicsen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 3 of 3
Name:
Shapiro_JM_T_2024.pdf
Size:
342.64 KB
Format:
Adobe Portable Document Format
Name:
Shapiro_JM_T_2024_support_3.pdf
Size:
88.39 KB
Format:
Adobe Portable Document Format
Description:
Supporting documents
Name:
Shapiro_JM_T_2024_support_1.pdf
Size:
20.7 KB
Format:
Adobe Portable Document Format
Description:
Supporting documents

Collections