What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems
- URL: http://arxiv.org/abs/2410.00150v1
- Date: Mon, 30 Sep 2024 18:47:26 GMT
- Title: What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems
- Authors: Qiushuo Hou, Sangwoo Park, Matteo Zecchin, Yunlong Cai, Guanding Yu, Osvaldo Simeone,
- Abstract summary: This paper addresses the "what-if" problem of estimating the values of key performance indicators (KPIs) that would have been obtained if a different app had been implemented by the radio access network (RAN)
We propose a conformal-prediction-based counterfactual analysis method for wireless systems that provides reliable "error bars" for the estimated, containing the true with a user-defined probability.
- Score: 52.499838151272016
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In modern wireless network architectures, such as Open Radio Access Network (O-RAN), the operation of the radio access network (RAN) is managed by applications, or apps for short, deployed at intelligent controllers. These apps are selected from a given catalog based on current contextual information. For instance, a scheduling app may be selected on the basis of current traffic and network conditions. Once an app is chosen and run, it is no longer possible to directly test the performance that would have been obtained with another app. This test, however, would be potentially valuable to monitor and optimize the network operation. With this goal in mind, this paper addresses the "what-if" problem of estimating the values of key performance indicators (KPIs) that would have been obtained if a different app had been implemented by the RAN. To this end, we propose a conformal-prediction-based counterfactual analysis method for wireless systems that provides reliable "error bars" for the estimated KPIs, containing the true KPIs with a user-defined probability, despite the inherent covariate shift between logged and test data. Experimental results for medium access control-layer apps and for physical-layer apps demonstrate the merits of the proposed method.
Related papers
- Remote Detection of Applications for Improved Beam Tracking in mmWave/sub-THz 5G/6G Systems [37.35086075012511]
Beam tracking is an essential functionality of millimeter wave (mmWave, 30-100 GHz) and sub-terahertz (sub-THz, 100-300 GHz) 5G/6G systems.
It operates by performing antenna sweeping at both base station (BS) and user equipment (UE) sides.
In absence of explicit signalling for the type of application at the air interface, in this paper, we propose a way to remotely detect it at the BS side based on the received signal strength pattern.
arXiv Detail & Related papers (2024-10-24T10:55:21Z) - Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol [2.199918533021483]
We show that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time.
We consider four different categories of applications: online shopping, voice/video conferencing, video streaming, and Over-The-Top (OTT) media platforms.
arXiv Detail & Related papers (2024-07-10T04:39:56Z) - ML-based handover prediction over a real O-RAN deployment using RAN Intelligent controller [4.464102544889847]
We develop a use-case for open and reconfigurable networks to investigate the possibility to predict handover events.
We propose a Long-Short Term Memory Machine Learning approach that takes standard Radio Access Network measurements to predict handover events.
Our results show that ML-based matching between the required and available resources can reduce operational cost by more than 80%.
arXiv Detail & Related papers (2024-04-14T17:48:05Z) - Physical-Layer Semantic-Aware Network for Zero-Shot Wireless Sensing [74.12670841657038]
Device-free wireless sensing has recently attracted significant interest due to its potential to support a wide range of immersive human-machine interactive applications.
Data heterogeneity in wireless signals and data privacy regulation of distributed sensing have been considered as the major challenges that hinder the wide applications of wireless sensing in large area networking systems.
We propose a novel zero-shot wireless sensing solution that allows models constructed in one or a limited number of locations to be directly transferred to other locations without any labeled data.
arXiv Detail & Related papers (2023-12-08T13:50:30Z) - Deep Learning for Encrypted Traffic Classification and Unknown Data
Detection [13.36152072056685]
A new Deep Neural Network based user activity detection framework is proposed to identify fine grained user activities performed on mobile applications.
The proposed framework uses a time window based approach to divide the traffic flow of an activity into segments, so that in-app activities can be identified just by observing only a fraction of the activity related traffic.
arXiv Detail & Related papers (2022-03-25T10:55:18Z) - CREPO: An Open Repository to Benchmark Credal Network Algorithms [78.79752265884109]
Credal networks are imprecise probabilistic graphical models based on, so-called credal, sets of probability mass functions.
A Java library called CREMA has been recently released to model, process and query credal networks.
We present CREPO, an open repository of synthetic credal networks, provided together with the exact results of inference tasks on these models.
arXiv Detail & Related papers (2021-05-10T07:31:59Z) - Enabling certification of verification-agnostic networks via
memory-efficient semidefinite programming [97.40955121478716]
We propose a first-order dual SDP algorithm that requires memory only linear in the total number of network activations.
We significantly improve L-inf verified robust accuracy from 1% to 88% and 6% to 40% respectively.
We also demonstrate tight verification of a quadratic stability specification for the decoder of a variational autoencoder.
arXiv Detail & Related papers (2020-10-22T12:32:29Z) - Concurrent Decentralized Channel Allocation and Access Point Selection
using Multi-Armed Bandits in multi BSS WLANs [2.0305676256390934]
Multi-Armed Bandits (MABs) are able to offer a feasible solution to the decentralized channel allocation and AP selection problems.
Our evaluation is performed over randomly generated scenarios, which enclose different network topologies and traffic loads.
arXiv Detail & Related papers (2020-06-05T10:20:40Z) - Network Adjustment: Channel Search Guided by FLOPs Utilization Ratio [101.84651388520584]
This paper presents a new framework named network adjustment, which considers network accuracy as a function of FLOPs.
Experiments on standard image classification datasets and a wide range of base networks demonstrate the effectiveness of our approach.
arXiv Detail & Related papers (2020-04-06T15:51:00Z) - Key Points Estimation and Point Instance Segmentation Approach for Lane
Detection [65.37887088194022]
We propose a traffic line detection method called Point Instance Network (PINet)
The PINet includes several stacked hourglass networks that are trained simultaneously.
The PINet achieves competitive accuracy and false positive on the TuSimple and Culane datasets.
arXiv Detail & Related papers (2020-02-16T15:51:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.