Distributed Intelligence in Wireless Networks

被引:15
作者
Liu, Xiaolan [1 ]
Yu, Jiadong [2 ]
Liu, Yuanwei [3 ]
Gao, Yue [4 ]
Mahmoodi, Toktam [5 ]
Lambotharan, Sangarapillai [1 ]
Tsang, Danny Hin-Kwok [2 ,6 ]
机构
[1] Loughborough Univ London, Inst Digital Technol, London E20 3BS, England
[2] Hong Kong Univ Sci & Technol Guangzhou, Internet Things Thrust, Guangzhou 511400, Guangdong, Peoples R China
[3] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London E1 4NS, England
[4] Fudan Univ, Sch Comp Sci, Shanghai 200438, Peoples R China
[5] Kings Coll London, Dept Engn, London WC2R 2LS, England
[6] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2023年 / 4卷
基金
英国工程与自然科学研究理事会;
关键词
Artificial intelligence; Wireless networks; Data models; Computational modeling; Servers; Training; Distance learning; Distributed intelligence; distributed machine learning; edge computing; end-to-end communications; federated learning; split learning; STOCHASTIC GRADIENT DESCENT; RESOURCE-ALLOCATION; MASSIVE MIMO; COMMUNICATION-EFFICIENT; JOINT OPTIMIZATION; CLIENT SELECTION; EDGE; FRAMEWORK; PRIVACY; SIGNAL;
D O I
10.1109/OJCOMS.2023.3265425
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The cloud-based solutions are becoming inefficient due to considerably large time delays, high power consumption, and security and privacy concerns caused by billions of connected wireless devices and typically zillions of bytes of data they produce at the network edge. A blend of edge computing and Artificial Intelligence (AI) techniques could optimally shift the resourceful computation servers closer to the network edge, which provides the support for advanced AI applications (e.g., video/audio surveillance and personal recommendation system) by enabling intelligent decision making on computing at the point of data generation as and when it is needed, and distributed Machine Learning (ML) with its potential to avoid the transmission of the large dataset and possible compromise of privacy that may exist in cloud-based centralized learning. Besides, the deployment of AI techniques to redesign end-to-end communication is attracting attention to improve communication performance. Therefore, the interaction of AI and wireless communications generates a new concept, named native AI wireless networks. In this paper, we conduct a comprehensive overview of recent advances in distributed intelligence in wireless networks under the umbrella of native AI wireless networks, with a focus on the design of distributed learning architectures for heterogeneous networks, on AI-enabled edge computing, on the communication-efficient technologies to support distributed learning, and on the AI-empowered end-to-end communications. We highlight the advantages of hybrid distributed learning architectures compared to state-of-the-art distributed learning techniques. We summarize the challenges of existing research contributions in distributed intelligence in wireless networks and identify potential future opportunities.
引用
收藏
页码:1001 / 1039
页数:39
相关论文
共 230 条
[31]   Eyeriss: An Energy-Efficient Reconfigurable Accelerator for Deep Convolutional Neural Networks [J].
Chen, Yu-Hsin ;
Krishna, Tushar ;
Emer, Joel S. ;
Sze, Vivienne .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2017, 52 (01) :127-138
[32]  
Chen Z ..., 2021, P IEEE CVF C COMP VI, P2668
[33]   Bandit-based Communication-Efficient Client Selection Strategies for Federated Learning [J].
Cho, Yae Jee ;
Gupta, Samarth ;
Joshi, Gauri ;
Yagan, Osman .
2020 54TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2020, :1066-1069
[34]  
Chu CM, 2007, LECT NOTES COMPUT SC, V4822, P1
[35]   Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures [J].
Cui, Lei ;
Qu, Youyang ;
Xie, Gang ;
Zeng, Deze ;
Li, Ruidong ;
Shen, Shigen ;
Yu, Shui .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) :3492-3500
[36]   Client Scheduling and Resource Management for Efficient Training in Heterogeneous IoT-Edge Federated Learning [J].
Cui, Yangguan ;
Cao, Kun ;
Cao, Guitao ;
Qiu, Meikang ;
Wei, Tongquan .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (08) :2407-2420
[37]   DEEP LEARNING FOR WIRELESS COMMUNICATIONS: AN EMERGING INTERDISCIPLINARY PARADIGM [J].
Dai, Linglong ;
Jiao, Ruicheng ;
Adachi, Fumiyuki ;
Poor, H. Vincent ;
Hanzo, Lajos .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) :133-139
[38]  
Dean J ..., 2012, NIPS, P1223
[39]   A Dummy-Based Approach for Preserving Source Rate Privacy [J].
Diyanat, Abolfazl ;
Khonsari, Ahmad ;
Shariatpanahi, Seyed Pooya .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1321-1332
[40]  
Dryden N, 2016, PROCEEDINGS OF 2016 2ND WORKSHOP ON MACHINE LEARNING IN HPC ENVIRONMENTS (MLHPC), P1, DOI [10.1109/MLHPC.2016.4, 10.1109/MLHPC.2016.004]