Distributed Machine Learning for Wireless Communication Networks: Techniques, Architectures, and Applications

被引:97
作者
Hu, Shuyan [1 ]
Chen, Xiaojing [2 ]
Ni, Wei [3 ]
Hossain, Ekram [4 ]
Wang, Xin [1 ]
机构
[1] Fudan Univ, Sch Informat Sci & Technol, State Key Lab ASIC & Syst, Shanghai 200433, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Shanghai 200444, Peoples R China
[3] Commonwealth Sci & Ind Res Org, Digital Prod & Serv Flagship, Sydney, NSW 2122, Australia
[4] Univ Manitoba, Dept Elect & Comp Engn, Winnipeg, MB R3T 5V6, Canada
基金
中国国家自然科学基金; 中国博士后科学基金; 加拿大自然科学与工程研究理事会;
关键词
Wireless communication; Wireless networks; Communication system security; Wireless sensor networks; Computer architecture; Servers; Security; Distributed machine learning; wireless communication networks; convergence; computation and communication cost; architecture and platform; data privacy and security; STOCHASTIC GRADIENT DESCENT; KULLBACK-LEIBLER DIVERGENCE; ONLINE CONVEX-OPTIMIZATION; COORDINATE DESCENT; POWER ALLOCATION; CROSS-ENTROPY; EDGE; FRAMEWORK; AI; INFORMATION;
D O I
10.1109/COMST.2021.3086014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed machine learning (DML) techniques, such as federated learning, partitioned learning, and distributed reinforcement learning, have been increasingly applied to wireless communications. This is due to improved capabilities of terminal devices, explosively growing data volume, congestion in the radio interfaces, and increasing concern of data privacy. The unique features of wireless systems, such as large scale, geographically dispersed deployment, user mobility, and the massive amount of data, give rise to new challenges in the design of DML techniques. There is a clear gap in the existing literature that the DML techniques are yet to be systematically reviewed for their applicability to wireless systems. This survey bridges the gap by providing a contemporary and comprehensive survey of DML techniques with a focus on wireless networks. Specifically, we review the latest applications of DML in power control, spectrum management, user association, and edge cloud computing. The optimality, accuracy, convergence rate, computation cost, and communication overhead of DML are analyzed. We also discuss the potential adversarial attacks faced by DML applications, and describe state-of-the-art countermeasures to preserve privacy and security. Last but not least, we point out a number of key issues yet to be addressed, and collate potentially interesting and challenging topics for future research.
引用
收藏
页码:1458 / 1493
页数:36
相关论文
共 252 条
[91]   Multi-Agent Reinforcement Learning for Efficient Content Caching in Mobile D2D Networks [J].
Jiang, Wei ;
Feng, Gang ;
Qin, Shuang ;
Yum, Tak Shing Peter ;
Cao, Guohong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (03) :1610-1622
[92]   Scalable Multi-Agent Learning for Situationally-Aware Multiple-Access and Grant-Free Transmissions [J].
Jiang, Zhiyuan ;
Marinescu, Andrei ;
DaSilva, Luiz A. ;
Zhou, Sheng ;
Niu, Zhisheng .
2019 IEEE 20TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC 2019), 2019,
[93]  
Kido H., 2005, 21 INT C DAT ENG WOR, P1248
[94]  
Kim H, 2017, INT SYM PERFORM ANAL, P55, DOI 10.1109/ISPASS.2017.7975270
[95]   Blockchained On-Device Federated Learning [J].
Kim, Hyesung ;
Park, Jihong ;
Bennis, Mehdi ;
Kim, Seong-Lyun .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (06) :1279-1283
[96]  
Konecny J., 2016, P 29 C NEUR INF PROC, P1
[97]  
Konecny J, 2016, FEDERATED OPTIMIZATI
[98]   Mini-Batch Semi-Stochastic Gradient Descent in the Proximal Setting [J].
Konecny, Jakub ;
Liu, Jie ;
Richtarik, Peter ;
Takac, Martin .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (02) :242-255
[99]  
Lang K., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P331
[100]   Speeding Up Distributed Machine Learning Using Codes [J].
Lee, Kangwook ;
Lam, Maximilian ;
Pedarsani, Ramtin ;
Papailiopoulos, Dimitris ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) :1514-1529