This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\providecommand\keywords

[1]\textbf\textitIndex terms— #1

Integrated Sensing and Communication for Edge Inference with End-to-End Multi-View Fusion

Xibin Jin, Guoliang Li, Shuai Wang, Miaowen Wen,
Chengzhong Xu, Fellow, IEEE, and H. Vincent Poor, Life Fellow, IEEE
Xibin Jin and Miaowen Wen are with the School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China. Guoliang Li and Chengzhong Xu are with the Department of Computer and Information Science, University of Macau, Macau, China. Shuai Wang is with the Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China. H. Vincent Poor is with the Department of Electrical and Computer Engineering, Princeton University, Princeton, USA. Corresponding author: Shuai Wang (s.wang@siat.ac.cn) and Miaowen Wen (eemwwen@scut.edu.cn).
Abstract

Integrated sensing and communication (ISAC) is a promising solution to accelerate edge inference via the dual use of wireless signals. However, this paradigm needs to minimize the inference error and latency under ISAC co-functionality interference, for which the existing ISAC or edge resource allocation algorithms become inefficient, as they ignore the inter-dependency between low-level ISAC designs and high-level inference services. This letter proposes an inference-oriented ISAC (IO-ISAC) scheme, which minimizes upper bounds on end-to-end inference error and latency using multi-objective optimization. The key to our approach is to derive a multi-view inference model that accounts for both the number of observations and the angles of observations, by integrating a half-voting fusion rule and an angle-aware sensing model. Simulation results show that the proposed IO-ISAC outperforms other benchmarks in terms of both accuracy and latency.

Index Terms:
Edge inference, integrated sensing and communication, multi-view fusion.

I Introduction

Realizing perception intelligence at distributed wireless sensors is a challenge due to the conflict between computationally demanding deep neural networks (DNNs) and computationally limited sensors [1]. Edge inference eases this conflict by providing DNN inference services to sensors with a proximal server [2], [3]. Existing edge inference consists of sensing, communication, and computation [2]. In this letter, the sensing and communication stages are merged via the ISAC technique, leading to a two-stage edge inference solution, i.e., 𝖨𝖲𝖠𝖢+𝖢𝗈𝗆𝗉𝗎𝗍𝖺𝗍𝗂𝗈𝗇\mathsf{ISAC}+\mathsf{Computation}, thus a one-stage reduction compared to the existing solution.

In contrast to existing ISAC systems [4], ISAC edge inference systems aim to minimize the inference error instead of maximizing the sensing resolution or the communication data-rate. Therefore, the associated resource allocation becomes very different from traditional ISAC resource allocation that considers only the wireless channels. For instance, the celebrated CRB-rate scheme allocates more resources to deterministic (random) channels for CRB (rate) maximization [5], and the multi-point ISAC scheme allocates more resources to closer-to-target devices to maintain the quality of sensing measurements [6]. While these schemes have proven to be very efficient in traditional ISAC systems, they could lead to poor performance in edge inference systems (as illustrated in Fig. 1), because they do not account for the inference requirements, e.g., the sensing data diversity that depends on the angle of observation. Note that existing edge inference schemes consider off-the-shelf sensing datasets, which ignore low-level sensing signal designs (e.g., physical-layer beamforming and power allocation) [7] and their impact on high-level inference services.

This paper proposes an end-to-end approach that integrates sensing, communication, and computation objectives and constraints into a unified optimization framework. First, to optimize the inference performance, we need an expression for the multi-view inference error with respect to the number of observations and the angles of observations. Hence, this paper derives an end-to-end inference error model by integrating a half-voting fusion rule and an angle-aware sensing model, and this newly derived model serves as an upper bound on the actual inference error. Second, while ISAC inference eliminates one stage, it does not necessarily reduce the end-to-end inference latency, as ISAC also introduces interference between sensing and communication functionalities [8]. Therefore, this paper further derives the upper bound of the end-to-end sensing, communication, and computation latency with respect to the co-functionality interference. Third, to optimize the two conflicting objectives. i.e., inference error and inference latency, we minimize their upper bounds according to majorization minimization (MM), and propose a joint power allocation and device scheduling (JPADS) algorithm, leading to an inference-oriented ISAC (IO-ISAC) scheme. Finally, various simulation results demonstrate the effectiveness of our proposed scheme, and show that the proposed IO-ISAC outperforms other benchmark schemes in terms of the inference accuracy and latency. To the best of our knowledge, this represents the first inference oriented paradigm guiding the design of ISAC systems.

II System Model

Refer to caption
Refer to caption
Refer to caption
Figure 1: System model. (a) ISAC edge inference system with NN ISAC devices and 1 server; (b) Architecture of ISAC device; (c) Angle-aware sensing model. The target is at the center. The red and blue regions denote the effective sensing fields of devices ii and jj, respectively.

We consider an ISAC edge inference system shown in Fig. 1, which consists of NN ISAC devices each with NdN_{d} antennas and one edge server with NeN_{e} antennas. The task of our system is to detect the state of a target (i.e., normal or abnormal) using two consecutive stages. In the first ISAC stage, ISAC devices transmit radio signals to sense the target and upload the echo sensing data to the server simultaneously at the same frequency band. In the second computation stage, the server extracts features from the sensing data using DNNs and fuses the local inference results into a global decision. Below we present the model for the ISAC stage.

In particular, Fig. 1 demonstrates the architecture of an ISAC device, which consists of NtN_{t} transmit antennas and NrN_{r} receive antennas, where Nt+Nr=NdN_{t}+N_{r}=N_{d}. The transmit antennas are divided into two groups [9], with NsN_{s} antennas for sensing and the other NcN_{c} antennas for communication. Without loss of generality, it is assumed that Nr=Nc=1N_{r}=N_{c}=1. To mitigate the interference leakage and energy cost, an activity controller with binary output xi{0,1}x_{i}\in\{0,1\} is adopted to determine the working state of the ii-th ISAC device, where xi=1x_{i}=1 represents that the ii-th ISAC device is activated and xi=0x_{i}=0 otherwise. Let 𝐱=[x1,,xN]T{0,1}N\mathbf{x}=[x_{1},\ldots,x_{N}]^{T}\in\{0,1\}^{N} denote the states of all ISAC devices and 𝒮={i:xi=1}\mathcal{S}=\{i:x_{i}=1\} denote the set of activated ISAC devices with cardinality |𝒮||\mathcal{S}|.

II-1 Target Sensing Model

The ii-th ISAC device sends a sensing signal to probe the target and the echo signal received at the ii-th ISAC device is

ri\displaystyle\!\!\!r_{i} =xi𝐠iH𝐟isi+jixj[𝐪jiH𝐟jsj+pjccjidj]+ns,\displaystyle=x_{i}\mathbf{g}_{i}^{H}\mathbf{f}_{i}s_{i}+\sum\limits_{j\neq i}x_{j}\left[\mathbf{q}_{ji}^{H}\mathbf{f}_{j}s_{j}+\sqrt{p_{j}^{c}}c_{ji}d_{j}\right]+n_{s}, (1)

where i,j𝒮i,j\in\mathcal{S}, sis_{i}\in\mathbb{C} with 𝔼[|si|2]=1\mathbb{E}\left[|s_{i}|^{2}\right]=1 is the sensing signal, did_{i}\in\mathbb{C} with 𝔼[|di|2]=1\mathbb{E}\left[|d_{i}|^{2}\right]=1 is the communication signal, and ns𝒞𝒩(0,σs2)n_{s}\sim\mathcal{CN}(0,\sigma_{s}^{2}) is additive white Gaussian noise (AWGN) with power σs2\sigma_{s}^{2}. Vector 𝐠iNs\mathbf{g}_{i}\in\mathbb{C}^{N_{s}} denotes the sensing echo channel from the ii-th device to the target and then back to the ii-th device. The vectors 𝐪jiNs\mathbf{q}_{ji}\in\mathbb{C}^{N_{s}} and 𝐟jNs\mathbf{f}_{j}\in\mathbb{C}^{N_{s}} denote the sensing interference channel from the jj-th device to the ii-th device and the sensing beamformer of the jj-th device, respectively. The scalars pjcp_{j}^{c} and cjic_{ji}\in\mathbb{C} represent the communication transmit power of the jj-th device and the communication interference channel from the jj-th device to the ii-th device, respectively. We adopt zero-forcing beamforming 𝐟i=pis𝐟iZF\mathbf{f}_{i}=\sqrt{p_{i}^{s}}\,\mathbf{f}_{i}^{\mathrm{ZF}} to mitigate sensing interference among different devices [10], where pisp_{i}^{s} and 𝐟iZF\mathbf{f}_{i}^{\mathrm{ZF}} denote the transmit sensing power and the steering vector for interference cancelation of the ii-th device. The vector 𝐟iZF\mathbf{f}_{i}^{\mathrm{ZF}} is the normalized 11-st column of 𝐅iH(𝐅i𝐅iH)1\mathbf{F}_{i}^{H}\left(\mathbf{F}_{i}\mathbf{F}_{i}^{H}\right)^{-1}, where 𝐅i=[𝐠i𝐪i1𝐪ik]H\mathbf{F}_{i}=\left[\mathbf{g}_{i}~{}\mathbf{q}_{i1}\dots\mathbf{q}_{ik}\dots\right]^{H} for k𝒮k\in\mathcal{S} and iki\neq k. The sensing signal-to-interference-plus-noise ratio (SINR) of the ii-th ISAC device is

SINRis=xipis|𝐠iH𝐟iZF|2σs2+jixjpjc|cji|2.\displaystyle\text{SINR}_{i}^{\mathrm{s}}=\frac{x_{i}p_{i}^{s}|\mathbf{g}_{i}^{H}\mathbf{f}_{i}^{\mathrm{ZF}}|^{2}}{\sigma_{s}^{2}+\sum_{j\neq i}x_{j}p_{j}^{c}|c_{ji}|^{2}}. (2)

Remark 1: The echo signal rir_{i} will be fed to the processor module for generating micro-doppler spectrograms shown in Fig. 1. As such, the target sensing problem is transformed into an image classification problem that can be solved by DNNs [11]. Note that if the sensing SINR is below a certain threshold, the spectrogram quality and the DNN accuracy would be significantly degraded as shown in Fig. 5 of [12]. Such degradation also emerges if the sensing angle exceeds a certain threshold [11], as shown in Fig. 1.

II-2 Uplink Communication Model

The ii-th ISAC device also transmits the communication signal for uploading the echo sensing data to the edge server, and the associated received signal at the server is [13]

𝐲i\displaystyle\mathbf{y}_{i} =xipic𝐡idi+jxj𝐎j𝐟jsj+jixjpjc𝐡jdj+𝐧c,\displaystyle=x_{i}\sqrt{p_{i}^{c}}\mathbf{h}_{i}d_{i}+\sum_{j}x_{j}\mathbf{O}_{j}\mathbf{f}_{j}s_{j}+\sum_{j\neq i}x_{j}\sqrt{p_{j}^{c}}\mathbf{h}_{j}d_{j}+\mathbf{n}_{c}, (3)

where i,j𝒮i,j\in\mathcal{S}, the vector 𝐡jNe\mathbf{h}_{j}\in\mathbb{C}^{N_{e}} is the communication channel from the jj-th device to the server. The matrix 𝐎jNe×Ns\mathbf{O}_{j}\in\mathbb{C}^{N_{e}\times N_{s}} represents the sensing interference channel from the jj-th device to the edge server. The vector 𝐧c𝒞𝒩(𝟎,σc2𝐈Ne)\mathbf{n}_{c}\sim\mathcal{CN}(\mathbf{0},\sigma_{c}^{2}\mathbf{I}_{N_{e}}) is the AWGN. Since the transmitted sensing signal is deterministic, e.g., frequency modulated continuous wave (FMCW), and the channels {𝐟j,𝐎j}\{\mathbf{f}_{j},\mathbf{O}_{j}\} are known at the server, the sensing interference term can be eliminated [14]. The server exploits a receiving filter 𝐰iNe\mathbf{w}_{i}\in\mathbb{C}^{N_{e}} to recover the transmit signal of the ii-th device. The uplink signal of the ii-th device recovered at the server is yi=𝐰iH𝐲y_{i}\!=\!\mathbf{w}_{i}^{H}\mathbf{y}\!, i.e., yi=xipic𝐰iH𝐡idi+jixjpjc𝐰iH𝐡jdj+𝐰iH𝐧cy_{i}\!=x_{i}\!\sqrt{p_{i}^{c}}\mathbf{w}_{i}^{H}\mathbf{h}_{i}d_{i}\!+\!\sum_{j\neq i}\!x_{j}\!\sqrt{p_{j}^{c}}\mathbf{w}_{i}^{H}\mathbf{h}_{j}d_{j}\!+\!\mathbf{w}_{i}^{H}\mathbf{n}_{c}. Here we adopt zero-forcing receive filters [𝐰1H,𝐰2H,,𝐰kH]T=(𝐇H𝐇)1𝐇H[\mathbf{w}_{1}^{H},\mathbf{w}_{2}^{H},...,\mathbf{w}_{k}^{H}]^{T}=(\mathbf{H}^{H}\mathbf{H})^{-1}\mathbf{H}^{H} such that 𝐰iH𝐡j=0\mathbf{w}_{i}^{H}\mathbf{h}_{j}=0 for ij\forall i\neq j, where 𝐇=[𝐡1,,𝐡k,]\mathbf{H}=[\mathbf{h}_{1},\ldots,\mathbf{h}_{k},\ldots], k𝒮\forall k\in\mathcal{S}. The associated uplink communication SINR of the ii-th device is

SINRic=xipic|𝐰iH𝐡i|2𝐰iH22σc2.\displaystyle\text{SINR}_{i}^{\mathrm{c}}=\frac{x_{i}p_{i}^{c}|\mathbf{w}_{i}^{H}\mathbf{h}_{i}|^{2}}{\|\mathbf{w}_{i}^{H}\|_{2}^{2}\sigma_{c}^{2}}. (4)

III Inference Oriented ISAC

This section presents the end-to-end model and algorithms by integrating the 𝖨𝖲𝖠𝖢\mathsf{ISAC} and 𝖢𝗈𝗆𝗉𝗎𝗍\mathsf{Comput-} 𝖺𝗍𝗂𝗈𝗇\mathsf{ation} stages. First, each DNN at the server recognizes the micro-Doppler spectrograms generated by active devices as shown in Fig. 1. Then multiple DNN inference results are fused into a global inference output via voting. The inference error 1Φ1-\Phi (i.e., Φ\Phi denotes inference accuracy) and latency Ξ\Xi are functions of activation switch 𝐱\mathbf{x}, sensing signal powers {pis}\{p_{i}^{s}\}, and communication signal powers {pic}\{p_{i}^{c}\}. The inference oriented problem is formulated as a multi-objective optimization problem of minimizing the error and the latency of inference, under individual and total transmit power constraints:

(P0)min𝐱,{pis},{pic}\displaystyle\mathrm{(P0)}\mathop{\mathrm{min}}_{\begin{subarray}{c}\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}\end{subarray}}~{} (1Φ(𝐱,{pis},{pic}),Ξ(𝐱,{pis},{pic}))\displaystyle\left(1-\Phi\left(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}\right),\,\Xi\left(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}\right)\right)
s.t.\displaystyle\mathrm{s.t.}~{}~{}~{}~{}~{} xi{0,1},i,\displaystyle x_{i}\in\left\{0,1\right\},~{}\forall i, (5a)
pis+picPmax,i,\displaystyle p_{i}^{s}+p_{i}^{c}\leq P_{\max},~{}\forall i, (5b)
i(pis+pic)Psum,i𝒮,\displaystyle\sum_{i}(p_{i}^{s}+p_{i}^{c})\leq P_{\rm{sum}},~{}i\in\mathcal{S}, (5c)

where PsumP_{\rm{sum}} and PmaxP_{\max} represent the maximum transmit power of the system and of each ISAC device, respectively. The challenge to solve P0\mathrm{P0} is that the functions (Φ,Ξ)(\Phi,\Xi) have no explicit expressions. To address this issue, Sections III-A and III-B will derive bounds for (Φ,Ξ)(\Phi,\Xi), and Section III-C optimizes the bounding functions according to MM.

III-A End-to-End Inference Error Model

We first derive the inference accuracy when |𝒮|=1|\mathcal{S}|\!=\!1. Without loss of generality, consider the ii-th ISAC device and its inference accuracy Φi\Phi_{i} is modeled as

Φi\displaystyle\Phi_{i} =P(H0)(1P(Bi=1|H0))+P(H1)(1P(Bi=0|H1)),\displaystyle=P(H_{0})(1-P(B_{i}=1|H_{0}))+P(H_{1})(1-P(B_{i}=0|H_{1})), (6)

where P()P(\cdot) represents the probability function, H0H_{0} and H1H_{1} are hypotheses that represent “normal target” and “abnormal target”, P(H0)P(H_{0}) and P(H1)P(H_{1}) are the prior probabilities of the two hypotheses, and BiB_{i} represents the binary inference result of the ii-th device, with Bi=0B_{i}=0 standing for “normal target” and Bi=1B_{i}=1 standing for “abnormal target”. Now we consider two factors that affect Φi\Phi_{i} as mentioned in Remark 1. First, Φi\Phi_{i} depends on the SINRis\text{SINR}_{i}^{s}. If SINRisβ\text{SINR}_{i}^{s}\geq\beta, where β\beta denotes the sensing quality threshold, then a satisfactory Φi\Phi_{i} can be achieved; otherwise, Φi\Phi_{i} would be degraded by a certain factor. According to [12], we set β=27dB\beta=27\,\text{dB}. Second, Φi\Phi_{i} depends on the observation angle ξi\xi_{i}, which is defined as the aspect angle between the line-of-sight direction and the target motion direction. If |cos(ξi)|[α,1]|\mathrm{cos}(\xi_{i})|\in[\alpha,1], where α\alpha denotes the angle threshold, a satisfactory Φi\Phi_{i} can be achieved; otherwise, Φi\Phi_{i} would be degraded by a certain factor. According to [11], we set α=0.5\alpha=0.5. Based on the above, the false alarm probability is modeled as

P(Bi=1|H0)={Pf,ifSINRisβ,|cos(ξi)|αλPf,otherwise,\displaystyle P(B_{i}=1|H_{0})=\left\{\begin{array}[]{lr}P_{f},~{}~{}~{}\mathrm{if}~{}\text{SINR}_{i}^{s}\geq\beta,~{}|\mathrm{cos}(\xi_{i})|\geq\alpha\\ \lambda P_{f},~{}\mathrm{otherwise}\\ \end{array}\right., (9)

where PfP_{f} is a constant value and λ>1\lambda>1 is the degradation factor. Similarly, the missed detection probability is given by P(Bi=0|H1)=PmP(B_{i}\!=\!0|H_{1})\!=\!P_{m} if the SINR and observation angle requirements are satisfied; and P(Bi=0|H1)=λPmP(B_{i}\!=\!0|H_{1})\!=\!\lambda P_{m} otherwise, where PmP_{m} is also a constant. The values of (Pf,Pm,λ)(P_{f},P_{m},\lambda) can be estimated from the experimental data [12, 6].

With the single-device model, we can derive the multi-view inference accuracy model Φ\Phi. Let γ\gamma denote the voting threshold111The most widely adopted threshold is γ=|𝒮|2\gamma=\lfloor\frac{|\mathcal{S}|}{2}\rfloor, which corresponds to the half-voting rule for ensemble inference. such that our global inference after fusion is H^0:i𝒮Bi<γ\hat{H}_{0}:\sum_{i\in\mathcal{S}}B_{i}<\gamma and H^1:i𝒮Biγ\hat{H}_{1}:\sum_{i\in\mathcal{S}}B_{i}\geq\gamma. Following similar derivations in [6], the inference accuracy is given by Φ(𝐱,{pis},{pic})=Θ(𝐱,{pis},{pic};Z)\Phi(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\})=\Theta(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\};Z), where ZZ is the actual number of ISAC devices satisfying the SINR and angle requirements, and

Θ(𝐱,{pis},{pic};z)=P(H0)n=γ|S|k=k1k2(zk)(|𝒮|znk)P1+P(H1)n=|S|γ+1|S|k=k1k2(zk)(|𝒮|znk)P2,\displaystyle\begin{array}[]{*{35}{l}}{}&\Theta(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\};z)=P({{H}_{0}})\sum\limits_{n=\gamma}^{|S|}{}\sum\limits_{k={{k}_{1}}}^{{{k}_{2}}}{}\left(\begin{smallmatrix}z\\ k\end{smallmatrix}\right)\left(\begin{smallmatrix}|\mathcal{S}|-z\\ n-k\end{smallmatrix}\right){{P}_{1}}\\ {}&\quad\quad\quad\quad\quad\quad+P({{H}_{1}})\sum\limits_{n=|S|-\gamma+1}^{|S|}{\sum\limits_{k={{k}_{1}}}^{{{k}_{2}}}{}}\left(\begin{smallmatrix}z\\ k\end{smallmatrix}\right)\left(\begin{smallmatrix}|\mathcal{S}|-z\\ n-k\end{smallmatrix}\right){{P}_{2}},\\ \end{array} (12)

where k1=max{0,n|𝒮|+z}k_{1}=\max\{0,n-|\mathcal{S}|+z\}, k2=min{z,n}k_{2}=\min\{z,n\}, and222Due to the different locations and observation views, the sensing data at different ISAC devices is assumed to be independent.

{P1=(1Pf)k(1λPf)nkPmzk(λPm)|𝒮|zn+kP2=(1Pm)k(1λPm)nkPf|𝒮|zk(λPf)|𝒮|zn+k.\displaystyle\begin{split}\left\{\begin{array}[]{lr}P_{1}=(1-P_{f})^{k}(1-\lambda P_{f})^{n-k}P_{m}^{z-k}(\lambda P_{m})^{|\mathcal{S}|-z-n+k}\\ \\ P_{2}=(1-P_{m})^{k}(1-\lambda P_{m})^{n-k}P_{f}^{|\mathcal{S}|-z-k}(\lambda P_{f})^{|\mathcal{S}|-z-n+k}\end{array}\right..\end{split}

To compute Φ\Phi using (12), we still need to compute ZZ. However, ZZ is random since {ξi}\{\xi_{i}\} depends on the unknown target motion. Fortunately, Θ(𝐱,{pis},{pic};z)\Theta(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\};z) is a monotonically increasing function of zz due to the property of binomial functions. Therefore, we can bound ZZ from below to get a lower bound of Φ\Phi. Specifically, let 𝒬(𝐱,{pis},{pic})={i𝒮:SINRisβ}\mathcal{Q}(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\})=\{i\in\mathcal{S}:\text{SINR}_{i}^{s}\geq\beta\}, and denote the intersection angle between the ii-th and jj-th devices with i,j𝒬i,j\in\mathcal{Q} as θi,j\theta_{i,j} (0θi,jπ0\leq\theta_{i,j}\leq\pi). Then we construct matrix 𝐓(𝐱,{pis},{pic})\mathbf{T}(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}) , with the element (i,j)(i,j) being

Tij={1,ifπ3θij2π3andi<j1,ifπ3θij2π3andi>j0,otherwise,\displaystyle\begin{split}T_{ij}=\left\{\begin{array}[]{lr}1,&\mathrm{if}\quad\frac{\pi}{3}\leq\theta_{ij}\leq\frac{2\pi}{3}\ \mathrm{and}\ i<j\\ -1,&\mathrm{if}\quad\frac{\pi}{3}\leq\theta_{ij}\leq\frac{2\pi}{3}\ \mathrm{and}\ i>j\\ 0,&\mathrm{otherwise}\end{array}\right.,\end{split} (13)

and the following proposition is established.

Proposition 1.

The global inference accuracy Φ\Phi satisfies

Φ(𝐱,{pis},{pic})Θ(𝐱,{pis}{pic};12Rank(𝐓)):=Φ𝖫𝖡.\displaystyle\Phi(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\})\!\geq\!\underbrace{\Theta\left(\!\mathbf{x},\{p_{i}^{s}\}\{p_{i}^{c}\};\frac{1}{2}\mathrm{Rank}(\mathbf{T})\!\right)\!}_{:=\Phi_{\mathsf{LB}}}. (14)
Proof.

To prove the proposition, we only need to show that 12Rank(𝐓)L\frac{1}{2}\mathrm{Rank}(\mathbf{T})\leq L holds. We adopt the induction method to prove it, and first consider the two-devices case shown in Fig. 1.

  • If π3θij2π3\frac{\pi}{3}\leq\theta_{ij}\leq\frac{2\pi}{3}, then we have 𝐓=[0,1;1,0]\mathbf{T}=[0,1;-1,0] and 12rank(𝐓)=1\frac{1}{2}\mathrm{rank}(\mathbf{T})=1. In such a case, the device jj always falls within the union of areas A and B as shown in the left hand side of Fig. 1. Hence we must have l{i,j},|cos(ξl)|12\exists l\in\{i,j\},~{}|\mathrm{cos}(\xi_{l})|\geq\frac{1}{2}, and the target is guaranteed to be sensed by at least one ISAC device no matter in which direction the target moves. This implies that L1L\geq 1, and the 12Rank(𝐓)L\frac{1}{2}\mathrm{Rank}(\mathbf{T})\leq L holds.

  • If θij\theta_{ij} is not in the range of [π3,2π3][\frac{\pi}{3},\frac{2\pi}{3}], then we have 𝐓=[0,0;0,0]\mathbf{T}=[0,0;0,0] and 12rank(𝐓)=0\frac{1}{2}\mathrm{rank}(\mathbf{T})=0. In such a case, there always exist sensing blind regions as shown in the right hand side of Fig. 1, and 12Rank(𝐓)L\frac{1}{2}\mathrm{Rank}(\mathbf{T})\leq L also holds.

Next, we prove the NN-devices case via graph theory. We use 𝒢=<𝒱,>\mathcal{G}=<\mathcal{V},\mathcal{E}> to represent an undirected graph, where 𝒱\mathcal{V} is the set of nodes and \mathcal{E} is the set of edges between any two nodes in 𝒱\mathcal{V}. Let 𝒱=𝒮\mathcal{V}=\mathcal{S}, and connect nodes ii and jj to form edge E=(i,j)E=(i,j) if i,jSi,j\in S and π3θij2π3\frac{\pi}{3}\leq\theta_{ij}\leq\frac{2\pi}{3}; otherwise, nodes ii and jj are not directly connected. For graph 𝒢\mathcal{G}, we define \mathcal{E}^{\diamond} as a matching of 𝒢\mathcal{G} if \mathcal{E}^{\diamond}\in\mathcal{E} and any two distinct edges in \mathcal{E}^{\diamond} have no common endpoints. The size of \mathcal{E}^{\diamond}, denoted as S()S(\mathcal{E}^{\diamond}), is defined as the number of edges in \mathcal{E}^{\diamond}. Then the maximum matching of 𝒢\mathcal{G}, which is denoted by maxS()\max S(\mathcal{E}^{\diamond}), represents the minimum number of ISAC devices with error probabilities (Pf,Pm)(P_{f},P_{m}) no matter in which direction the target moves. This means that LmaxS()L\geq\max S(\mathcal{E}^{\diamond}) holds. On the other hand, according to the [15], we have maxS()=12Rank(𝐓)\max S(\mathcal{E}^{\diamond})=\frac{1}{2}\mathrm{Rank}(\mathbf{T}). Therefore L12Rank(𝐓)L\geq\frac{1}{2}\mathrm{Rank}(\mathbf{T}), and this completes the proof. ∎

III-B End-to-End Inference Latency Model

Mathematically, the end-to-end inference latency is equal to Ξ=T𝖨𝖲𝖠𝖢+T𝖢𝗈𝗆𝗉\Xi=T_{\mathsf{ISAC}}+T_{\mathsf{Comp}}. Since sensing and communication are executed simultaneously in the ISAC stage, we have T𝖨𝖲𝖠𝖢=max{Ts,Tc}T_{\mathsf{ISAC}}=\max\{T_{s},T_{c}\}, where TsT_{s} is the time for each ISAC device to sense the target and TcT_{c} is the time for uploading sensing data to the server. Now we consider two cases: (i) TsTcT_{s}\geq T_{c}, which happens if the target motion is slow and the communication speed is fast; (ii) TsTcT_{s}\leq T_{c}, which happens if the target motion is fast and the communication speed is slow. In the considered system, due to co-channel interference brought by multiple working devices, the communicaion time is typically larger than the sensing time, so we have T𝖨𝖲𝖠𝖢=TcT_{\mathsf{ISAC}}=T_{c}. Since the server needs to wait for the last data to be received for subsequent fusion, TcT_{c} is upper bounded by the device with the worst channel, which is given by TcmaxiSDBRi(𝐱,pic).T_{c}\leq\max\limits_{i\in S}\frac{D}{BR_{i}(\mathbf{x},p_{i}^{c})}. Where DD and BB represent the data volume per sample and the bandwidth for each device, and RiR_{i} is the uplink spectral efficiency of the ii-th device in bps/Hz, which is written as

Ri(𝐱,pic)=xilog2(1+pic|𝐰iH𝐡i|2𝐰iH22σc2).\displaystyle R_{i}(\mathbf{x},p_{i}^{c})=x_{i}\log_{2}\left(1+\frac{p_{i}^{c}|\mathbf{w}_{i}^{H}\mathbf{h}_{i}|^{2}}{\|\mathbf{w}_{i}^{H}\|_{2}^{2}\sigma_{c}^{2}}\right). (15)

Moreover, the model computation time T𝖢𝗈𝗆𝗉T_{\mathsf{Comp}} includes signal processing and DNN inference time, which is T𝖼𝗈𝗆𝗉=|S|N𝖿𝗅𝗈𝗉/fT_{\mathsf{comp}}=|S|N_{\mathsf{flop}}/f, where N𝖿𝗅𝗈𝗉N_{\mathsf{flop}} and ff represent the number of floating-point operations needed for processing each data sample and computing speed (FLOPs/s) at the server, respectively. The total latency for one inference round is bounded by

Ξ(𝐱,{pis},{pic})\displaystyle\Xi\left(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}\right) maxiSDBRi(𝐱,{pic})+|S|N𝖿𝗅𝗈𝗉f:=Ξ𝖴𝖡(𝐱,{pis},{pic}).\displaystyle\leq\underbrace{\max\limits_{i\in S}\frac{D}{BR_{i}(\mathbf{x},\{p_{i}^{c}\})}+\frac{|S|N_{\mathsf{flop}}}{f}}_{:=\Xi_{\mathsf{UB}}\left(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}\right)}. (16)

III-C MM Method and JPADS Algorithms

Based on the results in Sections III-A and III-B, we adopt the MM technique to replace functions (Φ,Ξ)(\Phi,\Xi) with (ΦLB,ΞUB)(\Phi_{\mathrm{LB}},\Xi_{\mathrm{UB}}). Such a procedure would guarantee the worst-case performance of the ISAC edge inference system. Then problem P0\mathrm{P0} is transformed into

(P1)min𝐱,{pis},{pic}\displaystyle(\mathrm{P}1)\mathop{\mathrm{min}}_{\begin{subarray}{c}\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}\end{subarray}}~{} (1Φ𝖫𝖡(𝐱,{pis},{pic}),Ξ𝖴𝖡(𝐱,{pis},{pic}))\displaystyle\!\Big{(}1\!-\!\Phi_{\mathsf{LB}}(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\}),\Xi_{\mathsf{UB}}(\mathbf{x},\{p_{i}^{s}\},\{p_{i}^{c}\})\!\Big{)}
s.t.\displaystyle\mathrm{s.t.}~{}~{}~{} SINRisβ,i𝒮,\displaystyle\text{SINR}_{i}^{\mathrm{s}}\geq\beta,~{}\forall i\in\mathcal{S}, (17a)
(6a)(6c).\displaystyle(6a)-(6c). (17b)

This is a multi-objective mixed integer nonlinear programming (MO-MINLP) problem, and finding its Pareto optimal solutions is NP-hard in general. However, P1\mathrm{P}1 enjoys a special property that enables us to achieve Pareto optimality if the number of ISAC devices is small. In particular, given arbitrary device activation {𝐱=𝐱}\{\mathbf{x}=\mathbf{x}^{\prime}\}, problem 𝖯1\mathsf{P}1 with respect to {pis,pic}\{p_{i}^{s},p_{i}^{c}\} is a convex problem

(𝖯2):max{pis},{pic}\displaystyle(\mathsf{P}2):\mathop{\mathrm{max}}_{\begin{subarray}{c}\{p_{i}^{s}\},\{p_{i}^{c}\}\end{subarray}}~{}~{} mini𝒮pic|𝐰iH𝐡i|2𝐰iH22σc2\displaystyle\min_{\forall i\in\mathcal{S}^{\prime}}~{}{\frac{p_{i}^{c}|\mathbf{w}_{i}^{H}\mathbf{h}_{i}|^{2}}{\|\mathbf{w}_{i}^{H}\|_{2}^{2}\sigma_{c}^{2}}}
s.t.\displaystyle\mathrm{s.t.}~{}~{}~{} (6b),(6c),SINRisβ,i𝒮,\displaystyle(6b),(6c),\text{SINR}_{i}^{\mathrm{s}}\geq\beta,~{}\forall i\in\mathcal{S}^{\prime}, (18)

which can be solved by CVX with a computational complexity of 𝒪(N3.5)\mathcal{O}(N^{3.5}). Note that to obtain 𝖯2\mathsf{P}2 from 𝖯1\mathsf{P}1, we have removed the terms not related to {pis,pic}\{p_{i}^{s},p_{i}^{c}\}, and leveraged the monotonicity of logarithm function. With the above property, the set of all Pareto optimal solutions can be found via a two-tier algorithm, with the outer layer explores all possible values of 𝐱\mathbf{x} using exhaustive tree search, and the inner layer solving 𝖯2\mathsf{P}2 with a fixed 𝐱\mathbf{x} controlled by the outer layer. This algorithm is named optimal-JPADS.

In practice, the number of ISAC devices may be large, and the optimal-JPADS algorithm would be time consuming. To this end, we further propose an iterative local search method, which is much faster and empirically achieves a solution set close to the Pareto optimality (as shown by experiments in Fig. 3b of Section IV).333The optimal solution to the weighted-sum problem of 𝖯1\mathsf{P}1 is not guaranteed to be a Pareto optimal solution [16]. First, we start from a feasible solution of 𝐱\mathbf{x}, denoted as 𝐱[0]\mathbf{x}^{[0]}, and defines the neighborhood of 𝐱[0]\mathbf{x}^{[0]} as:

𝒩(𝐱[0])={𝐱:𝐱𝐱[0]0L,xi{0,1},i},\displaystyle\mathcal{N}(\mathbf{x}^{[0]})=\{\mathbf{x}:||\mathbf{x}-\mathbf{x}^{[0]}||_{0}\leq L,~{}x_{i}\in\{0,1\},\forall i\}, (19)

which 1LN1\leq L\leq N is the variable size. Second, we randomly flip LL elements of 𝐱[0]\mathbf{x}^{[0]} to generate a new feasible solution 𝐱𝒩(𝐱[0])\mathbf{x}^{\prime}\in\mathcal{N}(\mathbf{x}^{[0]}). Third, with the choice of 𝐱\mathbf{x} fixed to 𝐱=𝐱\mathbf{x}=\mathbf{x}^{\prime}, we solves P2\mathrm{P2} and obtains the associated optimal solution {pis,pic}\{p_{i}^{s^{\prime}},p_{i}^{c^{\prime}}\}. Fourth, we compute the weighted-sum function Ψ(𝐱,{pis},{pic})=μ(1Φ𝖫𝖡)+(1μ)Ξ𝖴𝖡\Psi(\mathbf{x}^{\prime},\{p_{i}^{s^{\prime}}\},\{p_{i}^{c^{\prime}}\})=\mu(1-\Phi_{\mathsf{LB}})+(1-\mu)\Xi_{\mathsf{UB}}, where μ[0,1]\mu\in[0,1] denotes the weighting factor to balance the two objective functions, and consider the following two branches:444If the magnitudes of two conflicting objectives are close to each other, normalization is not needed [17].

  • If Ψ(𝐱,{pis},{pic})Ψ(𝐱[0],{pis[0]},{pic[0]})\Psi(\mathbf{x}^{\prime},\{p_{i}^{s^{\prime}}\},\{p_{i}^{c^{\prime}}\})\leq\Psi(\mathbf{x}^{[0]},\{p_{i}^{s[0]}\},\{p_{i}^{c[0]}\}), we update 𝐱[1]𝐱\mathbf{x}^{[1]}\leftarrow\mathbf{x}^{\prime}. Then we construct the neighborhood of 𝒩(𝐱[1])\mathcal{N}(\mathbf{x}^{[1]}) to execute the next iteration;

  • If Ψ(𝐱,{pis},{pic})>Ψ(𝐱[0],{pis[0]},{pic[0]})\Psi(\mathbf{x}^{\prime},\{p_{i}^{s^{\prime}}\},\{p_{i}^{c^{\prime}}\})\!>\!\Psi(\mathbf{x}^{[0]},\{p_{i}^{s[0]}\},\{p_{i}^{c[0]}\}), we execute the random flipping process repeatedly to generate another feasible solution within the 𝒩(𝐱[0])\mathcal{N}(\mathbf{x}^{[0]}) until Ψ(𝐱,{pis},{pic})Ψ(𝐱[0],{pis[0]},{pic[0]})\Psi(\mathbf{x}^{\prime},\{p_{i}^{s^{\prime}}\},\{p_{i}^{c^{\prime}}\})\leq\Psi(\mathbf{x}^{[0]},\{p_{i}^{s[0]}\},\{p_{i}^{c[0]}\}).

This process is executed iteratively until the maximum number of iterations I¯\overline{I} is reached, generating a sequence {𝐱[1],𝐱[2],}\{\mathbf{x}^{[1]},\mathbf{x}^{[2]},\cdots\}. The entire algorithm is named fast-JPADS, and its complexity is 𝒪(I¯N3.5)\mathcal{O}(\overline{I}\,N^{3.5}).

Refer to caption
Refer to caption
Refer to caption
Refer to caption
Figure 2: Simulation results. (a) Scenario and spectrograms. Devices 1 to 8 are located at (0,5)(0,5), (10,5)(10,5), (10,0)(10,0), (10,5)(-10,-5), (0,5)(0,-5), (10,5)(-10,-5), (10,0),(10,5)(-10,0),(-10,5), respectively. Server and target are located at (2.5,10)(-2.5,10) and (5,0)(5,0), respectively. Pf=Pm=0.1P_{f}=P_{m}=0.1 and λ=3\lambda=3 for all spectrograms; (b) The objective value of P1 versus the number of iterations for the fast-JPADS and the associated inference error-latency region; (c) Comparison of the inference accuracy between the IO-ISAC and benchmark schemes; (d) Comparison of the inference latency between the IO-ISAC and benchmark schemes.

IV Simulation Results

This section presents simulation results to verify the performance of the IO-ISAC scheme. We simulate the case of N=8N=8 in a conference hall with size 10m×20m10\,\rm{m}\times 20\,\rm{m}, and the associated sensing spectrograms are shown in Fig. 2. Unless otherwise specified, the maximum transmit power of each device is PT=30P_{T}=30\,mW and the total transmit power budget is Psum=90P_{\rm{sum}}=90\,mW. The noise powers are set to σs2=90\sigma_{s}^{2}=-90\,dBm and σc2=60\sigma_{c}^{2}=-60\,dBm. All channels are modeled as distance-dependent rician fading, with 3030\,dB pathloss at unit distance of 11\,m. The data volume per sample is 0.1250.125\,MB.

First, the sum of two objectives in P1\mathrm{P1} versus the number of iterations under the fast-JPADS algorithm is shown in Fig. 2. It can be seen that the fast-JPADS converges to a value close to the lower bound obtained by optimal-JPADS. The number of iterations required for the fast-JPADS to converge is around 1010. Consequently, we can early stop the iteration in practice, e.g., I¯=10\overline{I}=10. On the other hand, the inference error-latency region of the fast-JPADS is shown in Fig. 2. It can be seen that the fast-JPADS achieves a region close to the Pareto front obtained by optimal-JPADS. In addition, the magnitudes of inference latency and error are close to each other. This corroborates our analysis in Section III-C. Due to its satisfactory performance, in the subsequent experiments, we adopt fast-JPADS for IO-ISAC scheme.

Next, to evaluate the performance gain brought by multi-view fusion, we compare the IO-ISAC scheme with that of ISAC [18], which selects a single ISAC device (e.g., device 66 in Fig. 2). It can be seen from Fig. 2 that the inference accuracy of IO-ISAC is 10%10\% to 24%24\% higher than that of the ISAC scheme. This is because the fluctuation of spectrogram becomes weak as the target’s orientation is almost orthogonal to the sensing angle of device 66 as shown in Fig. 2, resulting in subtle features for edge inference. In contrast, with the proposed IO-ISAC, the fluctuation of spectrograms is guaranteed to be strong, since there always exists a certain device outside the blind spot according to Proposition 1. For instance, at Psum=10P_{\rm{sum}}=10\,mW, the IO-ISAC activates devices in S={1,2}S=\{1,2\}, and the two devices collaboratively eliminate the “sensing blind spots”. We define the accuracy gap between IO-ISAC and ISAC as multi-view fusion gain. This gain increases with the sum power, since a higher view diversity can be exploited under a looser power constraint. For instance, at Psum=30P_{\rm{sum}}=30\,mW and 9090\,mW, the number of activated devices becomes 44 (i.e., S={1,2,6,8}S=\{1,2,6,8\}) and 66 (i.e., S={1,2,4,5,6,8}S=\{1,2,4,5,6,8\}), respectively. We also provide a variation of IO-ISAC, denoted as IO-ISAC-2, which increases weight on the inference latency. Therefore, compared with IO-ISAC, IO-ISAC-2 has a smaller inference latency.

Then, to demonstrate the importance of device scheduling, we compare IO-ISAC with the all-devices scheme (i.e., 𝐱=[1,1,]T\mathbf{x}=[1,1,\ldots]^{T} with |𝒮|=8|\mathcal{S}|\!=\!8), which follows the design criteria in [8]. It can be seen from Fig. 2 that the all-devices scheme leads to a lower inference accuracy than that of IO-ISAC although more devices are activated. This is because the co-device interference deteriorates the sensing SINRs at all devices. Moreover, as seen from Fig. 2, the inference latency of the all-devices scheme exceeds 400400\,ms and is the highest among all the schemes. This is because different ISAC devices compete for the limited communication resources in the data uploading stage. In contrast, the proposed IO-ISAC selects a proper number of activated devices for collaborative inference, which results in a “win-win” situation that simultaneously reduces the error and latency. The gap between IO-ISAC and the all-devices scheme is device scheduling gain.

Finally, to evaluate the acceleration brought by ISAC, we compare the IO-ISAC scheme with the edge inference [7], which executes sensing and communication sequentially. It can be seen from Fig. 2 and Fig. 2 that the proposed IO-ISAC achieves an end-to-end latency significantly smaller than that of edge inference while guaranteeing similar inference accuracy. This demonstrates the benefits of one-stage reduction by merging the sensing and communication stages. We define this latency gap between IO-ISAC and edge inference as ISAC acceleration gain. Note that the ISAC co-functionality interference must be properly handled; otherwise, the gain may vanish.

V Conclusion

This paper has studied the end-to-end ISAC edge inference problem, and has derived two tractable models that bound the end-to-end edge inference error and the end-to-end edge inference latency from above. Leveraging these bounds, we have derived two JPADS algorithms and obtained the multi-view fusion gain, scheduling gain, and ISAC acceleration gain in an edge intelligence system. Simulation results have demonstrated the superiority of the IO-ISAC scheme.

References

  • [1] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge intelligence: Paving the last mile of artificial intelligence with edge computing,” Proc. IEEE, vol. 107, no. 8, pp. 1738–1762, 2019.
  • [2] D. Wen, P. Liu, G. Zhu, Y. Shi, J. Xu, Y. C. Eldar, and S. Cui, “Task-oriented sensing, computation, and communication integration for multi-device edge ai,” IEEE Trans. Wirel. Commun., vol. 23, no. 3, pp. 2486–2502, 2023.
  • [3] J. Du, Z. Kong, A. Sun, J. Kang, D. Niyato, X. Chu, and F. R. Yu, “Maddpg-based joint service placement and task offloading in mec empowered air-ground integrated networks,” IEEE Internet Things J., vol. 11, no. 6, pp. 10 600–10 615, 2023.
  • [4] T. Zhang, S. Wang, G. Li, F. Liu, G. Zhu, and R. Wang, “Accelerating edge intelligence via integrated sensing and communication,” in Proc. IEEE ICC, 2022, pp. 1586–1592.
  • [5] Y. Xiong, F. Liu, Y. Cui, W. Yuan, T. X. Han, and G. Caire, “On the fundamental tradeoff of integrated sensing and communications under Gaussian channels,” IEEE Trans. Inf. Theory, vol. 69, no. 9, pp. 5723–5751, 2023.
  • [6] G. Li, S. Wang, K. Ye, M. Wen, D. W. K. Ng, and M. Di Renzo, “Multi-point integrated sensing and communication: Fusion model and functionality selection,” IEEE Wirel. Commun. Lett., vol. 11, no. 12, pp. 2660–2664, 2022.
  • [7] L. Zeng, C. Yang, P. Huang, Z. Zhou, S. Yu, and X. Chen, “GNN at the edge: Cost-efficient graph neural network processing over distributed edge servers,” IEEE J. Sel. Areas Commun., vol. 41, no. 3, pp. 720–739, 2022.
  • [8] X. Li, F. Liu, Z. Zhou, G. Zhu, S. Wang, K. Huang, and Y. Gong, “Integrated sensing, communication, and computation over-the-air: MIMO beamforming design,” IEEE Trans. Wirel. Commun., vol. 22, no. 8, pp. 5383–5398, 2023.
  • [9] F. Liu, C. Masouros, A. Li, H. Sun, and L. Hanzo, “MU-MIMO communications with MIMO radar: From co-existence to joint transmission,” IEEE Trans. Wirel. Commun., vol. 17, no. 4, pp. 2755–2770, 2018.
  • [10] F. Liu, Y. Cui, C. Masouros, J. Xu, T. X. Han, Y. C. Eldar, and S. Buzzi, “Integrated sensing and communications: Toward dual-functional wireless networks for 6G and beyond,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1728–1767, 2022.
  • [11] X. Qiao, G. Li, T. Shan, and R. Tao, “Human activity classification based on moving orientation determining using multistatic micro-doppler radar signals,” IEEE Trans. Geosci. Remote Sensing, vol. 60, pp. 1–15, 2021.
  • [12] P. Liu, G. Zhu, S. Wang, W. Jiang, W. Luo, H. V. Poor, and S. Cui, “Toward ambient intelligence: Federated edge learning with task-oriented sensing, computation, and communication integration,” IEEE J. Sel. Top. Signal Process., vol. 17, no. 1, pp. 158–172, 2023.
  • [13] X. Ju, S. Gong, N. Zhao, C. Xing, A. Nallanathan, and D. Niyato, “A framework on complex matrix derivatives with special structure constraints for wireless systems,” IEEE Trans. Commun., 2024.
  • [14] B. Li and A. P. Petropulu, “Joint transmit designs for coexistence of MIMO wireless communications and sparse sensing radars in clutter,” IEEE Trans. Aerosp. Electron. Syst., vol. 53, no. 6, pp. 2846–2864, 2017.
  • [15] M. O. Rabin and V. V. Vazirani, “Maximum matchings in general graphs through randomization,” J. Algorithms, vol. 10, no. 4, pp. 557–567, 1989.
  • [16] E. Bedeer, O. A. Dobre, M. H. Ahmed, and K. E. Baddour, “A multiobjective optimization approach for optimal link adaptation of ofdm-based cognitive radio systems with imperfect spectrum sensing,” IEEE Trans. Wirel. Commun., vol. 13, no. 4, pp. 2339–2351, 2014.
  • [17] O. Amin, E. Bedeer, M. H. Ahmed, and O. A. Dobre, “Energy efficiency–spectral efficiency tradeoff: A multiobjective optimization approach,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 1975–1981, 2015.
  • [18] F. Liu, Y.-F. Liu, A. Li, C. Masouros, and Y. C. Eldar, “Cramér-Rao bound optimization for joint radar-communication beamforming,” IEEE Trans. Signal Process., vol. 70, no. 8, pp. 240–253, 2021.