Next Article in Journal
Using Deep Learning to Recognize Therapeutic Effects of Music Based on Emotions
Next Article in Special Issue
UWB Sensing for UAV and Human Comparative Movement Characterization
Previous Article in Journal
Wearable Sensing System for NonInvasive Monitoring of Intracranial BioFluid Shifts in Aerospace Applications
Previous Article in Special Issue
LRF-WiVi: A WiFi and Visual Indoor Localization Method Based on Low-Rank Fusion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Codeword-Independent Localization Technique for Reconfigurable Intelligent Surface Enhanced Environments Using Adversarial Learning

Department of Mathematics and Computer Science, Eindhoven University of Technology, 5600 MB Eindhoven, The Netherlands
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(2), 984; https://doi.org/10.3390/s23020984
Submission received: 7 December 2022 / Revised: 1 January 2023 / Accepted: 11 January 2023 / Published: 14 January 2023
(This article belongs to the Special Issue Artificial Intelligence (AI) and Machine-Learning-Based Localization)

Abstract

:
Reconfigurable Intelligent Surfaces (RISs) not only enable software-defined radio in modern wireless communication networks but also have the potential to be utilized for localization. Most previous works used channel matrices to calculate locations, requiring extensive field measurements, which leads to rapidly growing complexity. Although a few studies have designed fingerprint-based systems, they are only feasible under an unrealistic assumption that the RIS will be deployed only for localization purposes. Additionally, all these methods utilize RIS codewords for location inference, inducing considerable communication burdens. In this paper, we propose a new localization technique for RIS-enhanced environments that does not require RIS codewords for online location inference. Our proposed approach extracts codeword-independent representations of fingerprints using a domain adversarial neural network. We evaluated our solution using the DeepMIMO dataset. Due to the lack of results from other studies, for fair comparisons, we define oracle and baseline cases, which are the theoretical upper and lower bounds of our system, respectively. In all experiments, our proposed solution performed much more similarly to the oracle cases than the baseline cases, demonstrating the effectiveness and robustness of our method.

1. Introduction

Modern wireless communication systems are expected to offer not only better quality of service (QoS) but also software-defined radio for diverse ubiquitous applications [1]. To realize these expectations, (beyond) fifth-generation (5G) mobile telecommunication systems consider the reconfigurable intelligent surface (RIS) as a crucial component for their capability to customize radio frequency (RF) propagation properties, enabling configurable wireless networks [2,3,4]. Specifically, the RIS contains a two-dimensional array of discrete elements, whose electromagnetic impedance are individually tunable [5,6]. This theoretically supports artificial manipulation of signal reflection, diffraction, refraction, polarization, and absorption [7,8,9].
Leveraging higher-frequency RF for faster data rates is generally accepted for modern communication networks [10,11], whereas it results in more severe signal attenuation when there is no line-of-sight (LoS) link between the base station (BS) and the device of interest (DOI) due to weaker diffraction abilities [12,13]. Therefore, among the mentioned RIS functionalities, controlling the signal reflection properties is the most influential one, since it prevents excessive received signal strength indicator (RSSI) drop by constructing an RIS-assisted link to reflect the incoming signal to the direction towards the DOI in non-line-of-sight (NLoS) areas [14,15]. RISs achieve this by assigning suitable complex-valued (CV) RIS codewords to specify the beamforming configurations of all RIS elements [16,17].
Such enhancement particularly promotes research on the localization problems in RIS-enhanced environments. Conventional localization techniques in wireless communication networks utilize time of flight (ToF) [18] and RSSI [19], among other things, to obtain high-accuracy location estimation in different scenarios [20]. However, these methods cannot be directly adopted in RIS-enhanced environments, since the RIS changes original signal propagation properties, inducing wrong inferences of distances or locations.
Some related studies proposed sophisticated communication models and utilized 3D geometric information to either directly calculate DOI positions or analyze estimation error bounds [16,21,22]. However, all these works require detailed CV channel gains/matrices among BSs and DOIs based on accurate field measurements (e.g., ray tracing and wave optics [8]), which are hardly available in practice. Meanwhile, since multiple-input, multiple-output (MIMO) [23] orthogonal frequency-division multiplexing (OFDM) [24] is an accepted paradigm for modern wireless networks [25], as the numbers of BSs and DOIs increase, these models have to consider more and more data links on all sub-carriers between devices. Hence, the fast-growing complexity of these methods leads to long inference time [26], which severely limits their usability in real-world deployments. Considering these drawbacks, other solutions measure the RSSI from known BSs for data-driven fingerprint-based localization [27,28,29,30] in RIS-enhanced environments [31,32,33], as the fingerprints are much easier to collect than field measurements [34] and are far simpler than CV channel matrices [33,35]. However, these methods usually involve cooperation with optimized RIS codewords to provide high-accuracy localization, which unrealistically assumes that the RIS is solely deployed for localization rather than more pressing demands in modern high-frequency wireless networks, such as enlarging the signal coverage and increasing the overall network throughput [8,32]. These approaches also share a common disadvantage in that the CV RIS codewords are indispensable during location inference, which means there are huge additional communication burdens when transmitting large CV vectors to DOIs.
In RIS-enhanced environments, the fingerprints are affected by not only locations but also codewords. The RIS codewords may change at any time, and as such, the dataset containing RSSI measurements used for offline training is unlikely to contain fingerprints corresponding to all possible codewords. Then, during online inference, the localization system will possibly make inferences using fingerprints of unknown codewords, leading to large estimation errors, because the location estimator only fits the codeword distribution of the training dataset. In the field of statistical learning, such performance degradation caused by differently distributed training and test data is known as a domain generalization (DG) problem [36], where the domain here contains all possible RIS codewords.
Fortunately, as codewords directly control signal propagation in RIS-enhanced environments, the impact of codewords on fingerprints is not irregular. This observation inspired us to learn from this correlation and try to decouple the dependency of fingerprints on codewords to obtain codeword-independent representations of fingerprints for localization in RIS-enhanced environments. Such a system will only be able to generate fingerprint representations highly related to locations. By doing so, we can (i) solve the RIS codeword domain generalization problem and avoid large estimation errors for fingerprints of unknown codewords, and (ii) predict the locations without the corresponding codewords during online inference.
We realized this idea using adversarial learning applied on the codeword domain using a domain-adversarial neural network (DANN) [37] framework consisting of three parts, i.e., a fingerprint feature extractor, a location estimator, and a codeword discriminator. Specifically, during the offline training stage, the feature extractor and the location estimator together behave like conventional fingerprint-based localization systems, i.e., minimizing the location-estimation error. Simultaneously, the codeword discriminator performs adversarial learning on codewords by reversal gradients during backpropagation to guide the feature extractor to generate codeword-independent representations. Our main contributions are as follows:
  • We analyze the localization problem in RIS-enhanced networks in depth and propose a novel paradigm without additional assumptions on the RIS codewords, which also supports online inference without codewords.
  • We propose a localization solution based on codeword-independent representation learning using the domain-adversarial neural network framework to solve the DG problem.
  • Our proposed solution is extensively evaluated using the DeepMIMO dataset [38]. We designed oracle and baseline cases for comparison, which convincingly demonstrate that our solution achieves accurate localization even for unknown RIS codewords. Additional experiments on the system parameters further demonstrate the rationality and robustness of the proposed solution.

2. Related Work

2.1. Localization in RIS-Enhanced Environments

Most research on localization in RIS-enhanced environments is model-driven. Model-driven localization methods usually have specific optimization goals to directly or indirectly facilitate localization. Wymeersch et al. [39] utilized Fisher information analysis [40,41] to select the best RIS codewords for localization. Elzanaty et al. [21] designed an RIS codeword optimization scheme to maximize the signal-to-noise ratio at the DOI to facilitate localization, and provided analysis on the Cramér–Rao lower bound [42] of the localization error. These works, however, are only feasible when the channel gains/matrices among BSs, DOIs, and the RIS are known, which requires accurate field measurements (e.g., ray tracing [8]), thereby greatly restricting their applicability. Meanwhile, modern communication networks usually adopt MIMO antennas using OFDM. Consequently, as the numbers of BSs and DOIs increase, the complexity of these methods increases fast. Hence, many studies explicitly restrict the number of devices in the environment. For instance, in the analysis of Wymeersch et al. [39], the number of BSs was set to one for simplicity. The fast-growing complexity of location calculation induces unacceptable time delay during location inference when there is a vast number of requests for localization services.
Only a few works noticed the mentioned drawbacks, utilized fingerprints, and proposed data-driven methods. Zhang et al. [35] designed a codeword selection method that aims to enlarge the differences in fingerprints in adjacent positions for high-accuracy localization. They further refined this work and proposed an integrated localization system in [31], realizing centimeter-level accuracy. Huang et al. [33] also picked the best available RIS codeword, but simply for signal strength improvement, which indirectly enhances localization performance. However, the prerequisite for these methods is the RIS is deployed solely for localization, rather than more important tasks such as enlarging the signal coverage and increasing the network throughput [32]. Such assumptions are very unlikely to be met in real-world deployments. Even if realized, these methods all require RIS codewords for location inference, which results in inescapable additional communication burdens on the networks to continuously transmit large CV vectors, as requested by the DOIs. As the number of DOIs grows, the whole localization system would eventually collapse and affect the normal operations of RIS-enhanced communication systems.

2.2. Domain Generalization

Domain generalization (DG) problems [36] usually occur in deployments of statistical learning techniques due to distinct distributions of offline training data and online data. This phenomenon is very common because collecting a training dataset perfectly representing real-world scenarios tends to be impossible. Although statistical learning methods, especially for DNNs, have recognized generalization capabilities, this is only true for online data with the same distribution as the training data [43].
There are many research topics addressing the DG problem. Multi-task [44] learning reuses the data representations for training on different related tasks to help the model to perform better for the original task. However, multi-task learning models only work for the domains they have already seen, which hardly fully solves the DG problem. Transfer learning [45,46] pre-trains the models using data from classes with numerous samples, then fine-tunes the model’s parameters with data from other classes. This canonical pipeline can be used for solving the DG problem by fine-tuning the models using data from different domains. However, transfer learning methods require data from other domains for training, which is not always available [47]. Meta-learning techniques [48,49] recently became popular as promising solutions to DG problems. Meta-learning tries to learn a universal rule from various datasets and various tasks, i.e., learning to learn [50], which is close to human learning habits. Although meta-learning methods are attractive for DG problems, their computational time is always extremely long [51]. Meanwhile, their DG performances are sometimes unsatisfactory due to incidental overfitting on training datasets [51]. Data augmentation [52] aims to generate more samples for training for greater data diversity according to the existing training dataset to fulfill DG. However, in our problem, we cannot create meaningful fingerprints without channel matrices.
Representation learning [53] aims to unify either the data representations or the inference results, or both training and inference for different domains [36,54]. When extracted data representations are invariant for different domains and only relevant to the concerned task, domain generalization is achieved. In this context, DANN [37,55] is a straightforward solution involving adversarial learning on domain labels to generate data representations that are irrelevant to the concerned domain [56,57]. DANN implements this by reversing the gradient of the domain discriminator during backpropagation [58].

3. Preliminaries

In this section, we first provide fundamental information about RISs, including their working principles and their respective methods for calculating path loss in RIS-enhanced environments. Next, we review our prior work describing the way to transform fingerprints into graphs. Finally, the training process of DANN frameworks is elaborated.

3.1. Reconfigurable Intelligent Surfaces

In communication systems equipped with MIMO antennas, the directions of beamforming depend on the constructive interference of all RF signals from radiators [59]. Figure 1 illustrates that the signal directions of two scenarios are different due to different time delays of two radiators. Such time delays are manifested as phase shifts in the frequency domain. Hence, the two radiators together in Figure 1a,b can be considered as a phase shifter.
RISs are capable of reflecting the incident signals in the desired directions, as an RIS contains a 2D array of such phase shifters whose phases are individually reconfigurable and controlled by assigned impedance [5]. Codewords are CV vectors characterizing phase shifts of all RIS elements. Given an RIS with M elements, its codeword ψ C M × 1 , where for the element m with a phase shift ϕ , ψ m = e j ϕ [60]. Codewords determine the RIS behaviors, which generally include two categories: anomalous reflection and focusing [61,62], as shown in Figure 2. Concretely, anomalous reflection means that the RIS reflects the impinging signals towards arbitrary directions in parallel, thereby also including the common specular reflection (the angle of incidence equals the angle of reflection). Focusing would converge the reflected signals to one point, which is very effective for a single DOI, but at the same time means low versatility. Hence, in this paper, we only consider the RIS as a pure anomalous reflector, whose function is merely the manipulation of phase shifts.
In this context, assigning different codewords to the RIS can help obtain different reflection angles for different devices/functions, as shown in Figure 3. Hence, when the codewords change, shifts in RSSI values occur even for the same locations, which consequently downgrade the estimation accuracy of conventional RSSI fingerprint-based localization solutions in RIS-enhanced wireless communication systems.
Limited by material and production costs, the number of codewords supported by the RIS is usually restricted [63]. The number of available RIS codewords C depends on the RIS’s resolution [64]. For instance, if an RIS supports a phase shift range of 180° with a 30° resolution, then C = ( 180 / 30 ) 2 = 36 , because the RIS can manipulate reflection angles in two planes, as shown in Figure 4. An alternative way to denote the resolution is the number of bits; i.e., a resolution of b bits means C = 2 b [65]. Most current RIS prototypes support only 1 bit ( C = 2 ) or 2 bits ( C = 4 ) [66,67], and a few achieve up to 6 bits ( C = 64 ) [68].

3.1.1. RSSI Calculation in RIS-Enhanced Environments

The DeepMIMO dataset [38] for evaluation in this paper does not provide RSSI values, thereby we cannot directly build fingerprints for experiments. Hence, this section elaborates on the RSSI calculation method in RIS-enhanced environments using channel matrices among BSs, DOI, and the RIS given by the DeepMIMO.
To calculate the RSSI measured by DOI, a common practice is to apply a link budget model, which describes all power gains and losses during the whole signal transmission process [69]. In general, the power gains (dB) G p come from transmitter output power and transmitter/receiver antenna gain, whereas the power losses mainly include transmitter/receiver losses (dB) L p and path loss (dB) PL [70]. Then, applying a similar link budget model in [71], we have
RSSI ( dB ) = G p L p PL .
The values of G p and L p are usually given in the device documentation. To calculate PL, we first assume that the RIS only affects the phase shifts, which means there is no loss in the amplitude of the incident signals. Next, our path loss model works in a MIMO-OFDM system with K sub-carriers, containing a BS with P antennas, a DOI with Q antennas, and an RIS with M elements. For the sub-carrier k, the channel matrices of the direct link H D L , k C Q × P (from the BS to the DOI) and the RIS-assisted link, including H B R , k C M × P (from the BS to the RIS) and H R D , k C Q × M (from the RIS to the DOI), are provided by the DeepMIMO dataset. Figure 5 depicts the scenario we consider for path loss calculation. According to [72], for all K sub-carriers, the channel matrix of the direct link H D L C Q × P is just the sum of all sub-carrier components; i.e.,
H D L = k = 1 K H D L , k .
As defined in [73], given the codeword ψ C M × 1 , the channel matrix of the RIS-assisted link H R L C Q × P over all K sub-carriers is calculated as:
H R L = k = 1 K H R D , k d i a g ( ψ ) H B R , k ,
where d i a g ( ψ ) is the diagonal matrix with the entries of ψ on its diagonal. Note that the codeword ψ is the same for all K sub-carriers. Finally, using the method described in [31,35], the path loss PL in decibels from the BS to the DOI in this model is
PL ( dB ) = 10 log 10 | H D L + H R L | 2 = 20 log 10 | H D L + H R L | ,
where | · | means the complex magnitude. Finally, combining these formulas, we can calculate the RSSI of BSs for a DOI using the DeepMIMO dataset.
Note that we do not need this RSSI calculation step in real-world deployments, since we can directly access the RSSI values using users’ devices, such as mobile phones. We emphasize that our fingerprint-based method has no dependencies on accurate field measurements. The experiments in this paper rely on simulation using the DeepMIMO because RIS hardware is currently rare. There are only a few prototypes throughout the world [66,67,68]. Hence, collecting real-world data through experiments is hardly possible at present.

3.2. Fingerprint-Graph Transformation

Many data-driven fingerprint-based methods utilize conventional machine learning techniques or deep learning models, which only work for Euclidean data and are ineffective for non-Euclidean data (e.g., fingerprints) [74]. In comparison, GNNs are particularly designed for non-Euclidean data and have proven to be efficient for various downstream tasks [75]. Hence, the fingerprints should be first transformed into graphs to adapt GNN-based models. In our prior work [74], we proposed a two-stage preprocessing method to achieve this.
We consider an environment with | T | RF technologies, where T = { t 1 , t 2 , } denotes the set of all RF types. Then, as illustrated in Figure 6, the transformation method is as follows.
  • Step 1. Abstraction: First, we gather information of all transmitters, including their types and locations. In the example shown in Figure 6, the transmitters are access points (APs), and T = { t 1 , t 2 } , which means there are two types of RF signals. We consider transmitters as vertices in a graph. The green vertex is the DOI, whose location is unknown. Then, we assign the vertex features for transmitters by the combination of their locations and RSSI. Note that vertices of different types should be considered per type, which results in heterogeneous graphs.
Different RF technologies usually have different propagation laws, which means that encoding with the same set of model parameters is insufficient. Next, for connectivity, we first make two assumptions to decide on the adjacency between vertices.
  • Assumption I: Edges between vertices denote all possible signal propagations and interferences.
  • Assumption II: A transmitter will only affect other transmitters of the same type.
  • Step 2. Connection: Considering Assumption I, since the DOI measures RSSI from all transmitters, there must be edges between the DOI and all transmitters. Note that these edges are unidirectional because the DOI is only a measuring device. Assumption II implies that the RSSI from a transmitter measured by the DOI is a combined result of all transmitters of the same type. Hence, transmitters of the same type will be fully connected. Since transmitters of the same type will affect each other, the edges within each sub-graph are bidirectional.
We can also assign edge features by theoretical signal attenuation models. In [74], the log-normal shadowing model (LNSM) was adopted [76]. In this way, given an arbitrary fingerprint, this transformation method could generate a corresponding graph for GNN models. In Section 4.3, we modify this preprocessing method to generate graphs for fingerprints gathered in RIS-enhanced environments.

3.3. Domain Adversarial Neural Network

In Section 2.2, we discussed the DG problem and mentioned that the DANN framework fits the problem of this paper. In this section, we briefly elaborate on the theory of DANN. Figure 7 illustrates the DANN framework, containing three main parts: a feature extractor, a domain discriminator (classifier), and a label predictor, which collaborate during offline training to achieve domain generalization [37] by extracting features that are irreverent to the concerned domain. Specifically, except for minimizing the errors on the label estimation, the DANN also reverses the gradient with the help of a gradient-reversal layer (GRL) [55]. Concretely, the GRL only works during backpropagation (BP). It first obtains the gradient from the first layer of the domain discriminator, reverses the gradients from the domain discriminator by multiplying a negative number λ ( λ > 0 ) , and finally passes the reversed gradient to the subsequent layer. Consequently, the feature extractor simultaneously considers gradients from both the label predictor to minimize the estimation errors and the domain discriminator to minimize the divergence of feature distributions for different domain labels.
A well-trained feature extractor can ensure the distributions of the extracted features over different domains are as similar as possible. This way, no matter what the domain labels are, the generated data features are ideally of the same distribution.

4. Codeword-Independent Localization

In this section, we provide the details of our proposed localization solution, including the overall design, the offline training, the online inference pipelines, the building blocks, and their corresponding motivations.

4.1. Codebook Calculation

In Section 3.3, we discussed that for the DANN model’s training, except for fingerprints and corresponding locations, domain labels, i.e., the codewords ψ * , are also required in the training dataset. Hence, we need to generate all possible RIS codewords (codebook) for experiments given C = C l 2 (resolution counted in degrees) and the phase shift range R for RSSI calculation and domain adversarial learning. We applied the method in [73]. Suppose the RIS contains M = M H × M V elements. Then, for the m H -th ( m H [ 1 , M H ] ) column of the discrete Fourier transform (DFT)-based codebook [77], C H C M H × C l for the horizontal dimension is
1 M H [ 1 , e j m H M H R · 1 , e j m H M H R · 2 , , e j m H M H R · ( M H 1 ) ] T .
Then, we can use it a similar way to calculate the DFT-based codebook C V C M V × C l for the vertical dimension. Finally, the codebook C = M H M V C H C V , where C C M × C and ⨂ denotes the Kronecker product [78]. Each column in C is a legitimate codeword.
Codewords have a great impact on fingerprints. As shown in Figure 8, the RSSI values are different at the same locations when using different RIS codewords, which means as long as the fingerprint dataset for offline training does not contain RSSI measurements corresponding to all possible codewords, the fingerprints for online inference will have a different distribution from the training dataset. We provide our solution to this induced DG problem in this section.

4.2. Offline Training and Online Inference Pipelines

Before model training, our system first transforms the fingerprints into graphs, since recent studies argued that for non-Euclidean data such as fingerprint data, graph neural networks could extract more effective encodings for various downstream tasks than other models designed for Euclidean data [74,79]. The specific fingerprint-graph transformation method will be elaborated later, in Section 4.3. After we obtain the fingerprint graphs, the training process is ready.
Figure 9 illustrates the whole training pipeline. During the forward propagation, the feature extractor first encodes the fingerprint graphs and obtains their representation vectors, which will be fed to both the location estimator and the codeword discriminator for location estimation L ^ and codeword estimation ψ ^ , respectively. To measure the errors between the estimated results and the true labels, we utilize two loss functions separately for locations and codewords. The mean squared error (MSE) [80] measures the localization error L L between estimated locations L ^ and true locations L * , i.e., L L = MSE ( L ^ , L * ) . Measuring the codeword errors is relatively more complex, since the codewords are complex-valued vectors, whereas conventional loss functions only support real numbers. Hence, here we adopt the complex-valued version MSE (CV-MSE) for codewords [81,82], i.e., given c 1 = a 1 + b 1 i and c 2 = a 2 + b 2 i , where c 1 , c 2 C N × 1 ,
CV - MSE ( c 1 , c 2 ) = 1 N i = 1 N ( | a 1 [ i ] a 2 [ i ] | 2 + | b 1 [ i ] b 2 [ i ] | 2 ) .
In this way, we can obtain a real-number loss to describe the estimation error for complex values. Then, for estimated codewords ψ ^ and true codewords ψ * , the codeword estimation error is as follows: L C = CV MSE ( ψ ^ , ψ * ) . The whole forward propagation process is denoted by green arrows in Figure 9. The backpropagation (BP) process was already discussed in Section 3.3 and is denoted by yellow arrows in Figure 9.
There are some additional concerns about the negative constant λ ( λ > 0 ) we mentioned in Section 3.3. During the initial phase of training, the feature extractor is not well-trained, so at this stage, the reversed gradient from the GRL should be suppressed, i.e., λ closing in on zero. Then, as the training proceeds, the feature extractor could gradually extract meaningful representation vectors; thus, the importance of adversarial learning on the domain is growing. Therefore, λ should gradually grow from zero. Supposing p [ 0 , 1 ] denotes the training progress, then instead of a fixed λ , we can define a more flexible version λ p [55]:
λ p = 2 1 + e x p ( γ p ) 1 ,
where we set γ = 10 by default in the following experiments. λ p would gradually grow from 0 to 1 as the training proceeds.
The feature extractor is theoretically capable of obtaining codeword-independent representations after a proper training process. Hence, thanks to the adversarial learning on the RIS codeword domain by the DANN framework, during online inference, the codewords are unnecessary for location estimation, which meets our requirement theoretically. Figure 10 depicts the online inference pipeline of the proposed system. Compared with the training pipeline, the codeword discriminator branch is non-essential, so it was removed.

4.3. Fingerprint-Graph Transformer

We extend the fingerprint-graph transformer of our prior work [74] described in Section 3.2 [74] by considering the RIS as vertices in graphs. We first define the localization scenario. Suppose a communication system operates in frequencies F = { f 1 , f 2 , } . For each f F , there are several BSs B f = { b f 1 , b f 2 , } whose locations L ( · ) are known. The DOI can measure the RSSI for all BSs operating in all frequencies. Finally, there is an RIS in this system whose function is unknown, whereas we know its location. Now we can start to build graphs.
We consider the BSs, the RISs, and the DOIs as vertices in a graph. Then, we can construct a sub-graph for every f F , as shown in the left part of Figure 11, including B f , the RIS, and the DOI. Note that the DOI and the RIS are shared among sub-graphs. The BSs in different f should be categorized as different kinds of vertices, inducing heterogeneous graphs when | F | > 1 . Actually, the RF signals of type T in Section 3.2 and the operating frequency F here play the same role—i.e., as a means of discrimination between different sub-graphs. This is because, for different f, the signal propagation laws are still different, which also require different sets of model parameters to encode. The vertex features for every BS b are [ R S S I b , L ( b ) ] , where R S S I b is the RSSI value of b measured by the DOI. We can also assign vertex features of the RIS by L ( RIS ) .
Next, we consider the connectivity between vertices. The right part of Figure 11 illustrates the edges among all vertices. Following the assumptions of Section 3.2, we fully connect B f within each sub-graph by bidirectional edges. For the direct links, the edges are unidirectional from BSs to the DOI, as the DOI is a measuring device here. Similarly, the RIS is also a (nearly) passive device [83], so the RIS-assisted links are also unidirectional from the BSs to the RIS and from the RIS to the DOI. In doing so, these edges represent all possible signal propagations and interferences in this communication system. Additionally, for the edges among BSs and edges from BSs to the RIS, we also assign edge features by log-normal shadowing model (LNSM) (see Section 3.2), indicating the theoretical relative strength of signal attenuation in between.
This way, given arbitrary fingerprints, we can apply the transformation method to generate a corresponding heterogeneous graph containing | F | sub-graphs, which is ready to be fed into the GNN-based feature extractor. Some may argue that this preprocessing method involves locations of BSs and DOI, which results in additional communication burdens compared with transmitting RIS codewords. However, we can easily represent the locations by 3-axis coordinates, which are much simpler than large CV vectors of codewords. Meanwhile, the locations of BSs and RIS are unlikely to change very often; thus, infrequent updates are sufficient.

4.4. Feature Extractor

The fingerprint graphs generated by the transformer are heterogeneous, and thereby we need a heterogeneous GNN-based model to encode them. Specifically, as shown in Figure 12, for each sub-graph, we first respectively assign a GraphSAGE [84] model using pooling aggregators by default to obtain the corresponding sub-graph-wise readout by the mean of latent features of all vertices. The reason for choosing the GraphSAGE to encode each sub-graph is we can manually set the aggregation depth for neural message passing [85] and randomly select several paths among all possible ones to reduce the complexity due to potential numerous vertices (BSs) and edges (communication links) in our fingerprint graphs [84]. Then, all sub-graph-wise readouts are concatenated to a vector, which will be fed into a dense layer for the fingerprint representations. We utilize leaky ReLU [86] as the activation functions for the feature extractors, for which the negative slope coefficient was −0.02 for all the following experiments.

4.5. Location Estimator

The fingerprint-graph transformer and the feature extractor cooperate to generate fingerprint representations. To further obtain the location estimation, we need to apply the location estimator to read out the fingerprint representations. In our system, we simply adopt a three-layer perceptron as the location estimator activated by the leaky ReLU [86].

4.6. Codeword Discriminator

As the codewords ψ * are CV vectors, the codeword discriminator should support CV outputs. Hence, we implement dense layers that accept both real-value (RV) and CV inputs and output CV vectors with the help of the cplxmodule library [87]. This way, we can build a multi-layer perceptron (MLP) of CVs for the codeword discriminator. Additionally, the activation function should also support these CV-adapted layers. Therefore, we utilize modReLU [88], i.e., a variant of ReLU designed for pointwise nonlinearity that only manipulates the magnitudes of the CV inputs, to activate the codeword discriminator in our system. For c C ,
m o d R e L U ( c ) = R e L U ( | c | + b ) × c | c | ,
where b R is a bias parameter of the nonlinearity. In other words, b is a threshold to decide whether to make the activated c equal to zero. We set b = 0.5 by default.
As mentioned before, the codewords describe the phase shifts of all RIS elements. As such, instead of using complex numbers to represent the codewords, we can use the RV phase shifts of all RIS elements by radians. Then, additional modifications for CV supports are unnecessary for the codeword discriminator. However, complex numbers are widely used in signal processing and electrical engineering, as they provide convenient representations for the phases and amplitudes of periodic signals [89,90]. Real numbers are not straightforward to use to represent this information. Hence, using real numbers to represent codewords would make it difficult for the codeword discriminator to learn from the data and provide reliable adversarial gradients for the DANN framework [91,92]. Our experiments in Section 5 demonstrate that the CV version of our proposed solution performs better than the RV version.

5. Evaluation

In this section, we first introduce the settings of the DeepMIMO for our evaluation. Next, the performances of our proposed system are given, including the experiments on the impacts of crucial system’s parameters to demonstrate the robustness of our method.

5.1. Experimental Setup

For our experiments, we used the dataset generated by the DeepMIMO [38]. The dataset is a generative dataset based on ray-tracing measurements, which is semi-customizable by user specifications of the system’s parameters [38]. Our experiments were fully conducted considering the O1 (Outdoor 1) scenario of the DeepMIMO, as shown in Figure 13. Concretely, we are interested in a modern wireless communication network containing both 4G and 5G. Hence, among all available operating frequency choices in the DeepMIMO, we considered 3.4 GHz, 3.5 GHz (4G LTE Band 42 [93]), and 28 GHz (5G NR FR2 Band n257 [94]). We activated six BSs in the DeepMIMO simulation tool, where the BS5 plays the role of RIS using the same method discussed in [73]. We specified the BSs, RIS, and DOI, all equipped with MIMO antennas. Detailed settings are listed in Table 1.
Considering the positions of BSs and obstacles, we specified the test areas of DOI containing both LoS and NLoS regions for BS18, as shown in Figure 14. Taking the testing point (ROW 1268, COL 91) as the center, we could equidistantly expand the boundaries to obtain test areas, where half is LoS and the other half is NLoS for BS18. We tested the localization performances in the testing area.

5.2. Experimental Parameters

We considered the number of codewords C and the size of test areas A and tested the robustness of our localization system by manually adding extra additive white Gaussian noise (AWGN) N N ( 0 , σ 2 ) to the calculated RSSI, where N means Gaussian distribution and σ is the variance [95]. As such, we can use a parameter set { C , A , σ } to describe the experiments. The AWGN here refers to some miscellaneous noises, including device noise [96], fading [97], and polarization mismatch [98], which are not discussed in Section 3.1.1 and are able to be modeled by Gaussian processes [99,100].
In Section 3.1, we mentioned that most RIS prototypes only support C = 2 / 4 [66,67], whereas others may realize C = 64 [68]. For forward-looking results in this paper, we set an initial resolution of 15°, and R = 180°. Then, we had C = 144 . We set A = 51.84 and σ = 0 by default. We first applied the default experimental parameter set { C = 144 , A = 51.84 , σ = 0 } for evaluation to check the feasibility of our solution. Then, we changed one parameter and kept the other two unchanged to separately investigate the impacts of these three experimental parameters on the proposed solution.

5.3. Dataset Generation and Model Implementation

Given the experimental parameters { C , A , σ } , we first applied the formulas in Section 4.1 to generate the codebook C using C. Next, we input the settings in Table 1 and A to the DeepMIMO dataset generator by modifying the parameters.m file, which is one of the supporting scripts provided by the DeepMIMO [38]. Then, after running another script DeepMIMO_Dataset_Generator.m, we obtained the channel matrices among BSs, DOI, and the RISs, along with the corresponding DOI locations, which are the labels in our problem. Finally, by applying the RSSI calculation pipeline presented in Section 3.1.1 using C and σ , we calculated the RSSI values, thereby constructing fingerprint datasets for evaluation. Here, we can simply assume that for all BSs we activated, G p = 40 dB and L p = 20 dB. We implemented these operations using MATLAB R2022a.
For the training/test split, we first randomly sampled 80% of available codewords, then randomly sampled 80% locations in the testing area. Then, a data point, whose location and codeword were sampled, belonged to the training dataset. Conversely, if neither its location nor codeword was sampled, it was assigned to the test datasets. In other words, we tested the estimation model using fingerprints of unknown locations and unknown codewords. This way, the test data for online inference challenged the generalization capabilities for both locations and codewords.
We implemented the proposed system using PyTorch [101] with the help of the DGL library [102] to build graph models for the feature extractor. All neural network layers contained 64-dimensional latent features, resulting in a training model with around 370,000 trainable parameters (float32). The whole system was trained using an Adam optimizer [103] with an initial learning rate of 0.01. We trained models and obtained simulation results on a laptop built by Dell Inc., Round Rock, TX, USA with an Intel(R) Core(TM) i7-10750H CPU and an NVIDIA GeForce GTX 1650 Ti graphic card. Using this hardware set, we easily achieved approx. 820 online inference per second without dedicated optimization.

5.4. Oracle and Baseline Cases for Evaluation

The goal of this paper is to solve the codeword domain generalization problem. The best possible model completely eliminates the negative effects of the DG issue. Hence, we simulated this case by manually setting C = 1 , which means there was only one possible RIS codeword. Then, there were no fingerprint shifts because the codeword domains for both training and testing were always identical. We call this case the oracle case, as this is the theoretical upper bound of our localization system.
On the other hand, the worst possible model completely fails to decouple the correlation between fingerprints and corresponding codewords, which is equivalent to applying no adversarial learning. In this case, for the same location, there will be multiple different fingerprints corresponding to it due to different RIS codewords. The localization system will have difficulty learning effective fingerprint representations from such data. We call this case the baseline case, since this is the theoretical lower bound of the proposed system. If the performance of our solution better resembles the oracle case rather than the baseline case, then we can conclude that our model has successfully learned codeword-independent representations of fingerprints.
We implemented these two cases in our solution simply by removing the codeword discriminator component because neither of them requires adversarial learning on the codewords. In the following experiments, all parameters { C , A , σ } in the baseline case remained the same as in the test scenario. For the oracle case, C always equals 1, so we kept only A and σ the same.

5.5. Performance Evaluation

We applied the default experimental parameter set { C = 144 , A = 51.84 , σ = 0 } for evaluation to check the feasibility of our solutions. Figure 15 illustrates fingerprint shifts in the testing area. RSSI values at the same location can differ by up to 52.1 dB, which indicates that the fingerprints are sensitive to codeword change, thereby demonstrating the feasibility of using the DeepMIMO for our evaluation.
To visualize the location-estimation errors, we used bar charts: each bar’s middle line is the mean squared error (MSE), and its height equals two times the standard deviation (Var) over the mean squared error of all concerned testing points. Most errors are within this interval, which indicates the prediction stability of each method. The numerical results are also provided in tables.
For the experimental parameter set { C = 144 , A = 51.84 , σ = 0 } , the results of the oracle/baseline cases and our solution are shown in Figure 16. One may notice that the location-estimation errors of our solution are much closer to that of the oracle case rather than the baseline case, which illustrates the representations extracted by our method accommodate different codewords. Therefore, we can conclude that the feature extractor in our system can obtain codeword-independent representations of fingerprints. Then, compared with the RV version, the desired CV version of our method obtained smaller errors, which supports our analysis in Section 4.6. The detailed numerical results presented in Table 2 show that we achieved centimeter-level accuracy.

5.6. Impacts of Experimental Parameters

In this section, we investigate the impact of experiment parameters on the model’s performance by changing one parameter and keeping another two fixed. To visualize the location-estimation errors, we use bar charts: each bar’s middle line is the mean squared loss (MSE) [80], and its height equals two times the standard deviation over the squared loss of all concerned testing points. Most of the errors are within this interval, which could be used to observe the prediction stability of each method. Corresponding numerical results (both MSE and variance) are provided in tables.

5.6.1. Impact of Number of Codewords

The resolution of the RIS in previous experiments was set to 15 , inducing C = 144 , which is already far more than what current RIS prototypes can provide. Here, we further enlarged C for more harsh scenarios by assuming smaller resolutions, i.e., 10 and 5 , obtaining C = 324 and C = 1296 , respectively. Note that for the oracle case, C always equals one for the purpose of benchmarking. Other parameters remained unchanged in this section—i.e., A = 51.84 and σ = 0 . Figure 17 illustrates the location-estimation errors of the oracle/baseline cases and our solution. As C increases, both the MSE and the standard deviations become larger, as the feature extractor has to adapt to more codewords at the same time. Nonetheless, the performance of our solution is still nearer to that of the oracle case than the baseline case. When C = 1296 , our solution even performs better than the baseline case when C = 144 . These performances demonstrate that our solution maintains its capability of being codeword-independent when C becomes much larger than current prototypes. This proves the robustness to the number of available codewords. Table 3 presents the corresponding numerical results.

5.6.2. Impact of Testing Area Size

The testing area size A in previous experiments was always 51.84 m 2 . Instead, we set it to A = 51.84 / 92.16 / 144.00 and investigated its impact on the system’s performance. We kept C = 144 and σ = 0 .
Figure 18 depicts the performances of the oracle/baseline cases and our solution. The performances of the oracle and baseline cases almost remained the same as A increased, whereas the location-estimation error of our solution grew faster than the reference cases. However, this phenomenon is reasonable because our solution needs to perform adversarial learning on more testing points. This means that it becomes harder for the feature extractor to obtain codeword-independent representations as the number of fingerprints grows. Both the oracle and baseline cases perform no adversarial learning; hence, their performance remained nearly unchanged. Nevertheless, our solution still achieved significantly better results than the baseline case and is closer to the oracle case. Therefore, we conclude that our solution is robust against changes in the testing area size. All corresponding numerical results are presented in Table 4.

5.6.3. Impact of Additive White Gaussian Noise (AWGN)

We manually added extra AWGN to the calculated RSSI to validate the stability of our solution. The value of the AWGN N (dB) was controlled by the standard deviation σ for N N ( 0 , σ 2 ) . One may note that the extra AWGN here was not caused by obstacles in the environments, which were already recorded by the channel matrices in the DeepMIMO dataset and implicitly represented by the calculated RSSI. We investigated AWGN here for simulation of device noise to further refine our results. Numerical results are presented in Table 5.
We investigated the performances when σ = 0 / 5 / 10 . We kept C = 144 and A = 51.84 . Figure 19 shows the location-estimation errors of the oracle/baseline cases and our solution for different AWGN values. It can be seen that our solution performs much better than the baseline cases and is more similar to the oracle cases.

6. Conclusions and Future Work

In this paper, we first investigated the localization problem in modern RIS-enhanced wireless communication networks. Model-driven methods usually rely on sophisticated communication models and set specific optimization goals to realize accurate localization. However, the complexity of these models grows fast as the numbers of BSs and DOI increase. This restricts their application scope. Although several data-driven methods have addressed this problem, they unrealistically assumed that the RIS is solely deployed for localization. Both model- and data-driven methods share the same drawbacks in that they require the RIS codewords for location inference, which induces a huge additional communication burden.
These observations inspired us to design a localization solution for RIS-enhanced environments which can decouple the correlation between fingerprints and codewords and be code-word independent. We designed a pre-processing step to transform the fingerprints into graphs for the heterogeneous GNN-based feature extractor to make full use of the non-Euclidean features of the fingerprints, especially when they are collected in environments with multiple operating frequencies. Our offline training pipeline enabled the feature extractor to generate the representations of the fingerprint graphs and feed them into both the MLP-based location estimator and the CV-MLP codeword discriminator for location and codeword estimation, respectively. Then, the gradients from the codeword discriminator were reversed by a gradient reversal layer to perform adversarial learning on the codeword domain during backpropagation to ensure the distributions of the representations for different codewords are as similar as possible. By doing so, the feature extractor could extract codeword-independent features for location inference, thereby eliminating the need to have the codewords for the online inference stage.
We evaluated our system using the O1 scenario in the DeepMIMO dataset. We defined oracle and baseline cases for a fair comparison with our solution and elaborated the method to calculate the RSSI using the channel matrices given in the DeepMIMO simulation tool. Our evaluation results showed that our localization is (i) codeword-independent and (ii) robust against changes in the number of codewords, testing area size, and additive white Gaussian noise. The experiments also showed that complex-value codeword discriminators performed better than real-value codeword discriminators.
Although we used a far larger number of the codewords compared to the current RIS prototypes [66,67,68] and achieved performances close to those of the oracle cases, there is still a chance that our model fails to deal with more codewords when the resolution is extremely low. If it happens, then we may have to require the codewords for location inference. Nevertheless, considering the fact that most currently available prototypes only support C = 2 / 4 [66,67], we are confident that our solution has strong practicality in modern wireless communication systems.
For our evaluation, we fully relied on simulations using the DeepMIMO dataset, as the RIS hardware is currently still under development, even though some prototypes exist. Hence, in our future works, if RIS hardware becomes available, we will design experiments, collect real-world data, and perform the evaluation.

Author Contributions

X.L. defined the problem, proposed the solution, and designed experiments for evaluation; N.M. supervised X.L. in this research project. Both authors contributed to the paper’s writing. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially done in the context of the DAIS project, which received funding from Key Digital Technologies Joint Undertaking (KDT JU) under grant agreement No. 101007273.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data were generated using the open-source DeepMIMO [38].

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Welkie, A.; Shangguan, L.; Gummeson, J.; Hu, W.; Jamieson, K. Programmable radio environments for smart spaces. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 30 November–1 December 2017; pp. 36–42. [Google Scholar]
  2. Liang, Y.C.; Chen, J.; Long, R.; He, Z.Q.; Lin, X.; Huang, C.; Liu, S.; Shen, X.S.; Di Renzo, M. Reconfigurable intelligent surfaces for smart wireless environments: Channel estimation, system design and applications in 6G networks. Sci. China Inf. Sci. 2021, 64, 200301. [Google Scholar] [CrossRef]
  3. Basar, E. Reconfigurable intelligent surface-based index modulation: A new beyond MIMO paradigm for 6G. IEEE Trans. Commun. 2020, 68, 3187–3196. [Google Scholar] [CrossRef] [Green Version]
  4. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS aided hybrid satellite-terrestrial relay networks: Joint beamforming design and optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  5. Zhu, B.O.; Zhao, J.; Feng, Y. Active impedance metasurface with full 360 reflection phase tuning. Sci. Rep. 2013, 3, 3059. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Björnson, E.; Wymeersch, H.; Matthiesen, B.; Popovski, P.; Sanguinetti, L.; de Carvalho, E. Reconfigurable intelligent surfaces: A signal processing perspective with wireless applications. IEEE Signal Process. Mag. 2022, 39, 135–158. [Google Scholar] [CrossRef]
  7. Huang, C.; Hu, S.; Alexandropoulos, G.C.; Zappone, A.; Yuen, C.; Zhang, R.; Di Renzo, M.; Debbah, M. Holographic MIMO surfaces for 6G wireless networks: Opportunities, challenges, and trends. IEEE Wirel. Commun. 2020, 27, 118–125. [Google Scholar] [CrossRef]
  8. Liu, Y.; Liu, X.; Mu, X.; Hou, T.; Xu, J.; Di Renzo, M.; Al-Dhahir, N. Reconfigurable intelligent surfaces: Principles and opportunities. IEEE Commun. Surv. Tutor. 2021, 23, 1546–1577. [Google Scholar] [CrossRef]
  9. Renzo, M.D.; Debbah, M.; Phan-Huy, D.T.; Zappone, A.; Alouini, M.S.; Yuen, C.; Sciancalepore, V.; Alexandropoulos, G.C.; Hoydis, J.; Gacanin, H.; et al. Smart radio environments empowered by reconfigurable AI meta-surfaces: An idea whose time has come. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 129. [Google Scholar] [CrossRef] [Green Version]
  10. Elayan, H.; Amin, O.; Shubair, R.M.; Alouini, M.S. Terahertz communication: The opportunities of wireless technology beyond 5G. In Proceedings of the 2018 International Conference on Advanced Communication Technologies and Networking (CommNet), Marrakech, Morocco, 2–4 April 2018; pp. 1–5. [Google Scholar]
  11. Chowdhury, M.Z.; Shahjalal, M.; Ahmed, S.; Jang, Y.M. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open J. Commun. Soc. 2020, 1, 957–975. [Google Scholar] [CrossRef]
  12. Hillger, P.; van Delden, M.; Thanthrige, U.S.M.; Ahmed, A.M.; Wittemeier, J.; Arzi, K.; Andree, M.; Sievert, B.; Prost, W.; Rennings, A.; et al. Toward mobile integrated electronic systems at THz frequencies. J. Infrared Millim. Terahertz Waves 2020, 41, 846–869. [Google Scholar] [CrossRef]
  13. Uwaechia, A.N.; Mahyuddin, N.M. A comprehensive survey on millimeter wave communications for fifth-generation wireless networks: Feasibility and challenges. IEEE Access 2020, 8, 62367–62414. [Google Scholar] [CrossRef]
  14. Alkhateeb, A.; El Ayach, O.; Leus, G.; Heath, R.W. Channel estimation and hybrid precoding for millimeter wave cellular systems. IEEE J. Sel. Top. Signal Process. 2014, 8, 831–846. [Google Scholar] [CrossRef] [Green Version]
  15. Taha, A.; Alrabeiah, M.; Alkhateeb, A. Deep learning for large intelligent surfaces in millimeter wave and massive MIMO systems. In Proceedings of the 2019 IEEE Global communications conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  16. He, J.; Wymeersch, H.; Sanguanpuak, T.; Silvén, O.; Juntti, M. Adaptive beamforming design for mmWave RIS-aided joint localization and communication. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Seoul, Republic of Korea, 6–9 April 2020; pp. 1–6. [Google Scholar]
  17. Karasik, R.; Simeone, O.; Di Renzo, M.; Shitz, S.S. Beyond max-SNR: Joint encoding for reconfigurable intelligent surfaces. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 2965–2970. [Google Scholar]
  18. Dargie, W.; Poellabauer, C. Fundamentals of Wireless Sensor Networks: Theory and Practice; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
  19. Yang, Z.; Zhou, Z.; Liu, Y. From RSSI to CSI: Indoor localization via channel response. ACM Comput. Surv. (CSUR) 2013, 46, 1–32. [Google Scholar] [CrossRef]
  20. Zafari, F.; Gkelias, A.; Leung, K.K. A survey of indoor localization systems and technologies. IEEE Commun. Surv. Tutor. 2019, 21, 2568–2599. [Google Scholar] [CrossRef] [Green Version]
  21. Elzanaty, A.; Guerra, A.; Guidi, F.; Alouini, M.S. Reconfigurable intelligent surfaces for localization: Position and orientation error bounds. IEEE Trans. Signal Process. 2021, 69, 5386–5402. [Google Scholar] [CrossRef]
  22. Dardari, D.; Decarli, N.; Guerra, A.; Guidi, F. LOS/NLOS near-field localization with a large reconfigurable intelligent surface. IEEE Trans. Wirel. Commun. 2021, 21, 4282–4294. [Google Scholar] [CrossRef]
  23. Raleigh, G.G.; Cioffi, J.M. Spatio-temporal coding for wireless communication. IEEE Trans. Commun. 1998, 46, 357–366. [Google Scholar] [CrossRef]
  24. Paulraj, A.J.; Gore, D.A.; Nabar, R.U.; Bolcskei, H. An overview of MIMO communications-a key to gigabit wireless. Proc. IEEE 2004, 92, 198–218. [Google Scholar] [CrossRef] [Green Version]
  25. Stuber, G.L.; Barry, J.R.; Mclaughlin, S.W.; Li, Y.; Ingram, M.A.; Pratt, T.G. Broadband MIMO-OFDM wireless communications. Proc. IEEE 2004, 92, 271–294. [Google Scholar] [CrossRef] [Green Version]
  26. Ng, D.W.K.; Lo, E.S.; Schober, R. Energy-efficient resource allocation in OFDMA systems with large numbers of base station antennas. IEEE Trans. Wirel. Commun. 2012, 11, 3292–3304. [Google Scholar] [CrossRef]
  27. Wu, C.; Yang, Z.; Liu, Y.; Xi, W. WILL: Wireless indoor localization without site survey. IEEE Trans. Parallel Distrib. Syst. 2012, 24, 839–848. [Google Scholar]
  28. Ibrahim, M.; Torki, M.; ElNainay, M. CNN based indoor localization using RSS time-series. In Proceedings of the 2018 IEEE symposium on computers and communications (ISCC), Natal, Brazil, 25–28 June 2018; pp. 1044–1049. [Google Scholar]
  29. Abbas, M.; Elhamshary, M.; Rizk, H.; Torki, M.; Youssef, M. WiDeep: WiFi-based accurate and robust indoor localization system using deep learning. In Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kyoto, Japan, 11–15 March 2019; pp. 1–10. [Google Scholar]
  30. Chen, Z.; Zou, H.; Yang, J.; Jiang, H.; Xie, L. WiFi fingerprinting indoor localization using local feature-based deep LSTM. IEEE Syst. J. 2019, 14, 3001–3010. [Google Scholar] [CrossRef]
  31. Zhang, H.; Hu, J.; Zhang, H.; Di, B.; Bian, K.; Han, Z.; Song, L. Metaradar: Indoor localization by reconfigurable metamaterials. IEEE Trans. Mob. Comput. 2020, 21, 2895–2908. [Google Scholar] [CrossRef]
  32. Pan, C.; Ren, H.; Wang, K.; Kolb, J.F.; Elkashlan, M.; Chen, M.; Di Renzo, M.; Hao, Y.; Wang, J.; Swindlehurst, A.L.; et al. Reconfigurable intelligent surfaces for 6G systems: Principles, applications, and research directions. IEEE Commun. Mag. 2021, 59, 14–20. [Google Scholar] [CrossRef]
  33. Huang, S.; Wang, B.; Zhao, Y.; Luan, M. Near-Field RSS-Based Localization Algorithms Using Reconfigurable Intelligent Surface. IEEE Sens. J. 2022, 22, 3493–3505. [Google Scholar] [CrossRef]
  34. Sauter, M. From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
  35. Zhang, H.; Zhang, H.; Di, B.; Bian, K.; Han, Z.; Song, L. Towards ubiquitous positioning by leveraging reconfigurable intelligent surface. IEEE Commun. Lett. 2020, 25, 284–288. [Google Scholar] [CrossRef]
  36. Zhou, K.; Liu, Z.; Qiao, Y.; Xiang, T.; Loy, C.C. Domain generalization: A survey. IEEE Trans. Pattern Anal. Mach. Intell. 2022; ahead of print. [Google Scholar] [CrossRef]
  37. Ganin, Y.; Ustinova, E.; Ajakan, H.; Germain, P.; Larochelle, H.; Laviolette, F.; Marchand, M.; Lempitsky, V. Domain-adversarial training of neural networks. J. Mach. Learn. Res. 2016, 17, 2030–2096. [Google Scholar]
  38. Alkhateeb, A. DeepMIMO: A Generic Deep Learning Dataset for Millimeter Wave and Massive MIMO Applications. In Proceedings of the Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 10–15 February 2019; pp. 1–8. [Google Scholar]
  39. Wymeersch, H.; Denis, B. Beyond 5G wireless localization with reconfigurable intelligent surfaces. In Proceedings of the ICC 2020-2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  40. Rissanen, J.J. Fisher information and stochastic complexity. IEEE Trans. Inf. Theory 1996, 42, 40–47. [Google Scholar] [CrossRef]
  41. He, J.; Wymeersch, H.; Kong, L.; Silvén, O.; Juntti, M. Large intelligent surface for positioning in millimeter wave MIMO systems. In Proceedings of the 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 25–28 May 2020; pp. 1–5. [Google Scholar]
  42. Smith, S. Covariance, subspace, and intrinsic Crame/spl acute/r-Rao bounds. IEEE Trans. Signal Process. 2005, 53, 1610–1630. [Google Scholar] [CrossRef] [Green Version]
  43. Yang, Z.; Dai, Z.; Yang, Y.; Carbonell, J.; Salakhutdinov, R.R.; Le, Q.V. Xlnet: Generalized autoregressive pretraining for language understanding. In Proceedings of the 33rd International Conference on Neural Information Processing Systems, Vancouver, BC, Canada, 8–14 December 2019; Volume 32. [Google Scholar]
  44. Caruana, R. Multitask learning. Mach. Learn. 1997, 28, 41–75. [Google Scholar] [CrossRef]
  45. Pan, S.J.; Yang, Q. A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 2009, 22, 1345–1359. [Google Scholar] [CrossRef]
  46. Weiss, K.; Khoshgoftaar, T.M.; Wang, D. A survey of transfer learning. J. Big Data 2016, 3, 9. [Google Scholar] [CrossRef] [Green Version]
  47. Wang, J.; Lan, C.; Liu, C.; Ouyang, Y.; Qin, T.; Lu, W.; Chen, Y.; Zeng, W.; Yu, P. Generalizing to unseen domains: A survey on domain generalization. IEEE Trans. Knowl. Data Eng. 2022; ahead of print. [Google Scholar] [CrossRef]
  48. Vilalta, R.; Drissi, Y. A perspective view and survey of meta-learning. Artif. Intell. Rev. 2002, 18, 77–95. [Google Scholar] [CrossRef]
  49. Hospedales, T.; Antoniou, A.; Micaelli, P.; Storkey, A. Meta-learning in neural networks: A survey. IEEE Trans. Pattern Anal. Mach. Intell. 2021, 44, 5149–5169. [Google Scholar] [CrossRef]
  50. Finn, C.B. Learning to Learn with Gradients. Ph.D. Thesis, University of California, Berkeley, CA, USA, 2018. [Google Scholar]
  51. Huisman, M.; Van Rijn, J.N.; Plaat, A. A survey of deep meta-learning. Artif. Intell. Rev. 2021, 54, 4483–4541. [Google Scholar] [CrossRef]
  52. Shorten, C.; Khoshgoftaar, T.M. A survey on image data augmentation for deep learning. J. Big Data 2019, 6, 60. [Google Scholar] [CrossRef]
  53. Bengio, Y.; Courville, A.; Vincent, P. Representation learning: A review and new perspectives. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 35, 1798–1828. [Google Scholar] [CrossRef] [Green Version]
  54. Muandet, K.; Balduzzi, D.; Schölkopf, B. Domain generalization via invariant feature representation. In Proceedings of the 30th International Conference on International Conference on Machine Learning, Atlanta, GA, USA, 16–21 June 2013; pp. 10–18. [Google Scholar]
  55. Ganin, Y.; Lempitsky, V. Unsupervised domain adaptation by backpropagation. In Proceedings of the 32nd International Conference on International Conference on Machine Learning, Lille, France, 6–11 July 2015; pp. 1180–1189. [Google Scholar]
  56. Li, Y.; Tian, X.; Gong, M.; Liu, Y.; Liu, T.; Zhang, K.; Tao, D. Deep domain generalization via conditional invariant adversarial networks. In Computer Vision—ECCV 2018, Proceedings of the 15th European Conference, Munich, Germany, 8–14 September 2018; Springer: Cham, Switzerland, 2018; pp. 624–639. [Google Scholar]
  57. Shao, R.; Lan, X.; Li, J.; Yuen, P.C. Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15–20 June 2019; pp. 10023–10031. [Google Scholar]
  58. Jia, Y.; Zhang, J.; Shan, S.; Chen, X. Single-side domain generalization for face anti-spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020; pp. 8484–8493. [Google Scholar]
  59. Björnson, E.; Sanguinetti, L.; Wymeersch, H.; Hoydis, J.; Marzetta, T.L. Massive MIMO is a reality—What is next?: Five promising research directions for antenna arrays. Digit. Signal Process. 2019, 94, 3–20. [Google Scholar] [CrossRef]
  60. Alrabeiah, M.; Zhang, Y.; Alkhateeb, A. Neural Networks Based Beam Codebooks: Learning mmWave Massive MIMO Beams That Adapt to Deployment and Hardware. IEEE Trans. Commun. 2022, 70, 3818–3833. [Google Scholar] [CrossRef]
  61. Di Renzo, M.; Zappone, A.; Debbah, M.; Alouini, M.S.; Yuen, C.; De Rosny, J.; Tretyakov, S. Smart radio environments empowered by reconfigurable intelligent surfaces: How it works, state of research, and the road ahead. IEEE J. Sel. Areas Commun. 2020, 38, 2450–2525. [Google Scholar] [CrossRef]
  62. Di Renzo, M.; Danufane, F.H.; Xi, X.; De Rosny, J.; Tretyakov, S. Analytical modeling of the path-loss for reconfigurable intelligent surfaces—Anomalous mirror or scatterer? In Proceedings of the 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Atlanta, GA, USA, 26–29 May 2020; pp. 1–5. [Google Scholar]
  63. Kammoun, A.; Chaaban, A.; Debbah, M.; Alouini, M.S. Asymptotic max-min SINR analysis of reconfigurable intelligent surface assisted MISO systems. IEEE Trans. Wirel. Commun. 2020, 19, 7748–7764. [Google Scholar]
  64. Huang, C.; Zappone, A.; Alexandropoulos, G.C.; Debbah, M.; Yuen, C. Reconfigurable intelligent surfaces for energy efficiency in wireless communication. IEEE Trans. Wirel. Commun. 2019, 18, 4157–4170. [Google Scholar] [CrossRef] [Green Version]
  65. Huang, C.; Alexandropoulos, G.C.; Zappone, A.; Debbah, M.; Yuen, C. Energy efficient multi-user MISO communication using low resolution large intelligent surfaces. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  66. Pei, X.; Yin, H.; Tan, L.; Cao, L.; Li, Z.; Wang, K.; Zhang, K.; Björnson, E. RIS-aided wireless communications: Prototyping, adaptive beamforming, and indoor/outdoor field trials. IEEE Trans. Commun. 2021, 69, 8627–8640. [Google Scholar] [CrossRef]
  67. Dai, L.; Wang, B.; Wang, M.; Yang, X.; Tan, J.; Bi, S.; Xu, S.; Yang, F.; Chen, Z.; Di Renzo, M.; et al. Reconfigurable intelligent surface-based wireless communications: Antenna design, prototyping, and experimental results. IEEE Access 2020, 8, 45913–45923. [Google Scholar] [CrossRef]
  68. Méndez-Rial, R.; Rusu, C.; González-Prelcic, N.; Alkhateeb, A.; Heath, R.W. Hybrid MIMO architectures for millimeter wave communications: Phase shifters or switches? IEEE Access 2016, 4, 247–267. [Google Scholar] [CrossRef]
  69. Hemadeh, I.A.; Satyanarayana, K.; El-Hajjar, M.; Hanzo, L. Millimeter-wave communications: Physical channel models, design considerations, antenna constructions, and link-budget. IEEE Commun. Surv. Tutor. 2017, 20, 870–913. [Google Scholar] [CrossRef] [Green Version]
  70. Schneider, T.; Wiatrek, A.; Preußler, S.; Grigat, M.; Braun, R.P. Link budget analysis for terahertz fixed wireless links. IEEE Trans. Terahertz Sci. Technol. 2012, 2, 250–256. [Google Scholar] [CrossRef]
  71. Zyren, J.; Petrick, A. Tutorial on Basic Link Budget Analysis; Application Note AN9804; Harris Semiconductor: Melbourne, FL, USA, 1998; Volume 31. [Google Scholar]
  72. Zelst, van, A. MIMO OFDM for Wireless LANs. Ph.D. Thesis, Agere Systems, Allentown, PA, USA, 2004.
  73. Taha, A.; Alrabeiah, M.; Alkhateeb, A. Enabling large intelligent surfaces with compressive sensing and deep learning. IEEE Access 2021, 9, 44304–44321. [Google Scholar] [CrossRef]
  74. Luo, X.; Meratnia, N. A Geometric Deep Learning Framework for Accurate Indoor Localization. In Proceedings of the 2022 IEEE 12th International Conference on Indoor Positioning and Indoor Navigation (IPIN), Beijing, China, 5–8 September 2022; pp. 1–8. [Google Scholar]
  75. Wu, Z.; Pan, S.; Chen, F.; Long, G.; Zhang, C.; Philip, S.Y. A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 2020, 32, 4–24. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  76. Seybold, J.S. Introduction to RF Propagation; John Wiley & Sons: Hoboken, NJ, USA, 2005. [Google Scholar]
  77. Suh, J.; Kim, C.; Sung, W.; So, J.; Heo, S.W. Construction of a generalized DFT codebook using channel-adaptive parameters. IEEE Commun. Lett. 2016, 21, 196–199. [Google Scholar] [CrossRef]
  78. Henderson, H.V.; Pukelsheim, F.; Searle, S.R. On the history of the Kronecker product. Linear Multilinear Algebra 1983, 14, 113–120. [Google Scholar] [CrossRef]
  79. Bronstein, M.M.; Bruna, J.; LeCun, Y.; Szlam, A.; Vandergheynst, P. Geometric deep learning: Going beyond euclidean data. IEEE Signal Process. Mag. 2017, 34, 18–42. [Google Scholar] [CrossRef] [Green Version]
  80. Shcherbakov, M.V.; Brebels, A.; Shcherbakova, N.L.; Tyukov, A.P.; Janovsky, T.A.; Kamaev, V.A. A survey of forecast error measures. World Appl. Sci. J. 2013, 24, 171–176. [Google Scholar]
  81. Zhang, Z.; Wang, H.; Xu, F.; Jin, Y.Q. Complex-valued convolutional neural network and its application in polarimetric SAR image classification. IEEE Trans. Geosci. Remote Sens. 2017, 55, 7177–7188. [Google Scholar] [CrossRef]
  82. Cao, Y.; Wu, Y.; Zhang, P.; Liang, W.; Li, M. Pixel-wise PolSAR image classification via a novel complex-valued deep fully convolutional network. Remote Sens. 2019, 11, 2653. [Google Scholar] [CrossRef] [Green Version]
  83. Alexandropoulos, G.C.; Vlachos, E. A hardware architecture for reconfigurable intelligent surfaces with minimal active elements for explicit channel estimation. In Proceedings of the ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 4–8 May 2020; pp. 9175–9179. [Google Scholar]
  84. Hamilton, W.; Ying, Z.; Leskovec, J. Inductive representation learning on large graphs. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, CA, USA, 4–9 December 2017; Volume 30. [Google Scholar]
  85. Gilmer, J.; Schoenholz, S.S.; Riley, P.F.; Vinyals, O.; Dahl, G.E. Neural message passing for quantum chemistry. In Proceedings of the 34th International Conference on Machine Learning, Sydney, Australia, 6–11 August 2017; pp. 1263–1272. [Google Scholar]
  86. Maas, A.L.; Hannun, A.Y.; Ng, A.Y. Rectifier nonlinearities improve neural network acoustic models. Proc. Icml 2013, 30, 3. [Google Scholar]
  87. Nazarov, I.; Burnaev, E. Bayesian Sparsification of Deep C-valued Networks. In Proceedings of the 37th International Conference on Machine Learning, Virtual, 12–18 July 2020; Volume 119, pp. 7230–7242. [Google Scholar]
  88. Arjovsky, M.; Shah, A.; Bengio, Y. Unitary evolution recurrent neural networks. In Proceedings of the 33rd International Conference on International Conference on Machine Learning, New York, NY, USA, 19–24 June 2016; pp. 1120–1128. [Google Scholar]
  89. Venkateswaran, V.; van der Veen, A.J. Analog beamforming in MIMO communications with phase shift networks and online channel estimation. IEEE Trans. Signal Process. 2010, 58, 4131–4143. [Google Scholar] [CrossRef]
  90. Grant, I.S.; Phillips, W.R. Electromagnetism; John Wiley & Sons: Hoboken, NJ, USA, 2013. [Google Scholar]
  91. Hirose, A. Complex-Valued Neural Networks: Theories and Applications; World Scientific: Singapore, 2003; Volume 5. [Google Scholar]
  92. Barrachina, J.A.; Ren, C.; Morisseau, C.; Vieillard, G.; Ovarlez, J.P. Complex-valued vs. real-valued neural networks for classification perspectives: An example on non-circular data. In Proceedings of the ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada, 6–11 June 2021; pp. 2990–2994. [Google Scholar]
  93. Li, Y.; Luo, Y.; Yang, G. 12-port 5G massive MIMO antenna array in sub-6GHz mobile handset for LTE bands 42/43/46 applications. IEEE Access 2017, 6, 344–354. [Google Scholar] [CrossRef]
  94. Pang, J.; Li, Z.; Kubozoe, R.; Luo, X.; Wu, R.; Wang, Y.; You, D.; Fadila, A.A.; Saengchan, R.; Nakamura, T.; et al. 21.1 a 28GHz CMOS phased-array beamformer utilizing neutralized bi-directional technique supporting dual-polarized MIMO for 5G NR. In Proceedings of the 2019 IEEE International Solid-State Circuits Conference-(ISSCC), San Francisco, CA, USA, 17–21 February 2019; pp. 344–346. [Google Scholar]
  95. Pauluzzi, D.R.; Beaulieu, N.C. A comparison of SNR estimation techniques for the AWGN channel. IEEE Trans. Commun. 2000, 48, 1681–1691. [Google Scholar] [CrossRef]
  96. Bonani, F.; Guerrieri, S.D.; Ghione, G. Physics-based simulation techniques for small-and large-signal device noise analysis in RF applications. IEEE Trans. Electron Devices 2003, 50, 633–644. [Google Scholar] [CrossRef]
  97. Jiang, Y.; Li, K.; Gao, J.; Harada, H. Antenna space diversity and polarization mismatch in wideband 60 GHz-Millimeter-wave wireless system. In Proceedings of the 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, Tokyo, Japan, 13–16 September 2009; pp. 1781–1785. [Google Scholar]
  98. Dietrich, C.B.; Dietze, K.; Nealy, J.R.; Stutzman, W.L. Spatial, polarization, and pattern diversity for wireless handheld terminals. IEEE Trans. Antennas Propag. 2001, 49, 1271–1281. [Google Scholar] [CrossRef] [Green Version]
  99. Kwon, S.C.; Stüber, G.L. Polarization division multiple access on NLoS wide-band wireless fading channels. IEEE Trans. Wirel. Commun. 2014, 13, 3726–3737. [Google Scholar] [CrossRef]
  100. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  101. Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Killeen, T.; Lin, Z.; Gimelshein, N.; Antiga, L.; et al. Pytorch: An imperative style, high-performance deep learning library. In Proceedings of the 33rd International Conference on Neural Information Processing Systems, Vancouver, BC, Canada, 8–14 December 2019; Volume 32. [Google Scholar]
  102. Wang, M.; Zheng, D.; Ye, Z.; Gan, Q.; Li, M.; Song, X.; Zhou, J.; Ma, C.; Yu, L.; Gai, Y.; et al. Deep Graph Library: A Graph-Centric, Highly-Performant Package for Graph Neural Networks. arXiv 2019, arXiv:1909.01315. [Google Scholar]
  103. Kingma, D.P.; Ba, J. Adam: A Method for Stochastic Optimization. In Proceedings of the 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, 7–9 May 2015. [Google Scholar]
Figure 1. Different beamforming directions for two radiators with different time delays. In (a), two radiators emit the same signal at the same time. In (b), two radiators also emit the same signal, but the left one starts from t 3 , inducing a different constructive interference compared with (a), thereby a left direction signal.
Figure 1. Different beamforming directions for two radiators with different time delays. In (a), two radiators emit the same signal at the same time. In (b), two radiators also emit the same signal, but the left one starts from t 3 , inducing a different constructive interference compared with (a), thereby a left direction signal.
Sensors 23 00984 g001
Figure 2. RIS behaviors: anomalous reflection (including specular reflection) and focusing.
Figure 2. RIS behaviors: anomalous reflection (including specular reflection) and focusing.
Sensors 23 00984 g002
Figure 3. Different beamforming directions given different codewords.
Figure 3. Different beamforming directions given different codewords.
Sensors 23 00984 g003
Figure 4. A sketch map illustrating an RIS manipulating reflection angles in two dimensions.
Figure 4. A sketch map illustrating an RIS manipulating reflection angles in two dimensions.
Sensors 23 00984 g004
Figure 5. Path loss model in RIS-enhanced environments where the channel matrices H among the BS, the DOI, and the RIS are known.
Figure 5. Path loss model in RIS-enhanced environments where the channel matrices H among the BS, the DOI, and the RIS are known.
Sensors 23 00984 g005
Figure 6. The fingerprint-graph transformation method proposed in our prior work [74], instantiated for | T | = 2 as an example.
Figure 6. The fingerprint-graph transformation method proposed in our prior work [74], instantiated for | T | = 2 as an example.
Sensors 23 00984 g006
Figure 7. Architecture of the DANN first proposed in [37].
Figure 7. Architecture of the DANN first proposed in [37].
Sensors 23 00984 g007
Figure 8. Shifted RSSI measurements (dB) using four different codewords for the same area. Each pixel denotes an RSSI value.
Figure 8. Shifted RSSI measurements (dB) using four different codewords for the same area. Each pixel denotes an RSSI value.
Sensors 23 00984 g008
Figure 9. Our proposed localization system framework (for offline training).
Figure 9. Our proposed localization system framework (for offline training).
Sensors 23 00984 g009
Figure 10. The online inference pipeline of our proposed system.
Figure 10. The online inference pipeline of our proposed system.
Sensors 23 00984 g010
Figure 11. A fingerprint-graph transformation example for F = { f 1 , f 2 } .
Figure 11. A fingerprint-graph transformation example for F = { f 1 , f 2 } .
Sensors 23 00984 g011
Figure 12. The feature extractor for the fingerprint graphs from Figure 11.
Figure 12. The feature extractor for the fingerprint graphs from Figure 11.
Sensors 23 00984 g012
Figure 13. The O1 scenario in the DeepMIMO [38].
Figure 13. The O1 scenario in the DeepMIMO [38].
Sensors 23 00984 g013
Figure 14. A top-view sketch map of the experimental area using the O1 scenario in the DeepMIMO.
Figure 14. A top-view sketch map of the experimental area using the O1 scenario in the DeepMIMO.
Sensors 23 00984 g014
Figure 15. Fingerprint shifts (dB) in the testing area for three frequencies. The height means the maximum RSSI shift at that position when { C = 144 , A = 51.84 , σ = 0 } .
Figure 15. Fingerprint shifts (dB) in the testing area for three frequencies. The height means the maximum RSSI shift at that position when { C = 144 , A = 51.84 , σ = 0 } .
Sensors 23 00984 g015
Figure 16. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases, and the CV/RV versions of our solution when { C = 144 , A = 51.84 , σ = 0 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE - std ( e ) to MSE + std ( e ) .
Figure 16. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases, and the CV/RV versions of our solution when { C = 144 , A = 51.84 , σ = 0 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE - std ( e ) to MSE + std ( e ) .
Sensors 23 00984 g016
Figure 17. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases and our solution when { C = 144 / 324 / 1296 , A = 51.84 , σ = 0 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE − std ( e ) to MSE + std ( e ) . Note that for the oracle case, C always equals 1 for reference.
Figure 17. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases and our solution when { C = 144 / 324 / 1296 , A = 51.84 , σ = 0 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE − std ( e ) to MSE + std ( e ) . Note that for the oracle case, C always equals 1 for reference.
Sensors 23 00984 g017
Figure 18. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 / 92.16 / 144.00 , σ = 0 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE − std ( e ) to MSE + std ( e ) .
Figure 18. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 / 92.16 / 144.00 , σ = 0 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE − std ( e ) to MSE + std ( e ) .
Sensors 23 00984 g018
Figure 19. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 , σ = 0 / 5 / 10 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE − std ( e ) to MSE + std ( e ) .
Figure 19. The location-estimation errors of both LoS and NLoS areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 , σ = 0 / 5 / 10 } . Given the squared error set e, for each bar, the middle line is mean ( e ) , i.e., MSE, and its height ranges from MSE − std ( e ) to MSE + std ( e ) .
Sensors 23 00984 g019
Table 1. DeepMIMO settings for our experiments.
Table 1. DeepMIMO settings for our experiments.
Operating frequency3.4 GHz, 3.5 GHz, 28 GHz
Activated BSs1, 2, 3, 4, 5 (RIS), 18
Antennas of BSs and RIS4 × 4
Antennas of DOI2 × 2
Bandwidth200 MHz
The number of OFDM sub-carriers512
Table 2. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases, and the CV/RV versions of our solution when { C = 144 , A = 51.84 , σ = 0 } .
Table 2. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases, and the CV/RV versions of our solution when { C = 144 , A = 51.84 , σ = 0 } .
LoSNLoS
MSEVarMSEVar
Oracle case0.0450.0020.0470.003
Our solution (CV ver.)0.0500.0070.0900.018
Our solution (RV ver.)0.1250.0100.1990.013
Baseline case2.0530.9582.9561.033
Table 3. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases and our solution when { C = 144 / 324 / 1296 , A = 51.84 , σ = 0 } . Note that for the oracle case, C always equals to 1 for reference.
Table 3. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases and our solution when { C = 144 / 324 / 1296 , A = 51.84 , σ = 0 } . Note that for the oracle case, C always equals to 1 for reference.
Oracle Case ( C = 1 ) Our SolutionBaseline Case
LoSNLoS C LoSNLoSLoSNLoS
MSEVarMSEVar MSEVarMSEVarMSEVarMSEVar
0.0450.0020.0470.0031440.0500.0070.0900.0182.0530.9582.9561.033
3240.3680.5540.3940.3123.2021.6923.7371.296
12960.8432.2311.0390.8453.8820.9584.3422.333
Table 4. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 / 92.16 / 144.00 , σ = 0 } .
Table 4. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 / 92.16 / 144.00 , σ = 0 } .
Oracle CaseOur SolutionBaseline Case
A [m2]LoSNLoSLoSNLoSLoSNLoS
MSEVarMSEVarMSEVarMSEVarMSEVarMSEVar
51.840.0450.0020.0470.0030.0500.0070.0900.0182.0530.9582.9561.033
92.160.0450.0020.0470.0020.1130.0480.1190.0562.2681.0863.0020.991
144.000.0460.0020.0500.0030.2050.0810.2360.1702.4100.8793.0131.211
Table 5. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 , σ = 0 / 5 / 10 } .
Table 5. The localization errors (m) of LoS (orange) and NLoS (blue) areas for the oracle/baseline cases and our solution when { C = 144 , A = 51.84 , σ = 0 / 5 / 10 } .
Oracle CaseOur SolutionBaseline Case
σ [dB]LoSNLoSLoSNLoSLoSNLoS
MSEVarMSEVarMSEVarMSEVarMSEVarMSEVar
00.0450.0020.0470.0030.0500.0070.0900.0182.0530.9582.9561.033
50.3530.3150.4300.2980.5520.5560.8581.2803.5222.1184.1042.022
100.5170.4020.8020.9101.2793.5691.4352.9944.2002.4304.8813.291
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Luo, X.; Meratnia, N. A Codeword-Independent Localization Technique for Reconfigurable Intelligent Surface Enhanced Environments Using Adversarial Learning. Sensors 2023, 23, 984. https://doi.org/10.3390/s23020984

AMA Style

Luo X, Meratnia N. A Codeword-Independent Localization Technique for Reconfigurable Intelligent Surface Enhanced Environments Using Adversarial Learning. Sensors. 2023; 23(2):984. https://doi.org/10.3390/s23020984

Chicago/Turabian Style

Luo, Xuanshu, and Nirvana Meratnia. 2023. "A Codeword-Independent Localization Technique for Reconfigurable Intelligent Surface Enhanced Environments Using Adversarial Learning" Sensors 23, no. 2: 984. https://doi.org/10.3390/s23020984

APA Style

Luo, X., & Meratnia, N. (2023). A Codeword-Independent Localization Technique for Reconfigurable Intelligent Surface Enhanced Environments Using Adversarial Learning. Sensors, 23(2), 984. https://doi.org/10.3390/s23020984

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop