{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:YRJOXXZWKFTMRUSTRVKHMSVDAY","short_pith_number":"pith:YRJOXXZW","schema_version":"1.0","canonical_sha256":"c452ebdf365166c8d2538d54764aa306097826db6727c4ac6318c3c432c0dc98","source":{"kind":"arxiv","id":"1907.09735","version":1},"attestation_state":"computed","paper":{"title":"Deep Learning Assisted User Identification in Massive Machine-Type Communications","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["eess.SP","math.IT"],"primary_cat":"cs.IT","authors_text":"Bryan Liu, Jinhong Yuan, Milutin Pajovic, Zhiqiang Wei","submitted_at":"2019-07-23T07:45:06Z","abstract_excerpt":"In this paper, we propose a deep learning aided list approximate message passing (AMP) algorithm to further improve the user identification performance in massive machine type communications. A neural network is employed to identify a suspicious device which is most likely to be falsely alarmed during the first round of the AMP algorithm. The neural network returns the false alarm likelihood and it is expected to learn the unknown features of the false alarm event and the implicit correlation structure in the quantized pilot matrix. Then, via employing the idea of list decoding in the field of"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1907.09735","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2019-07-23T07:45:06Z","cross_cats_sorted":["eess.SP","math.IT"],"title_canon_sha256":"9bb8d4da1a713022081c86635953d514be9bda883e28f62ed159a189f2bf2fe3","abstract_canon_sha256":"1826b878de7c8d6b0109bd7de048b2d04e7f2ed8f32da46cc82de546361f04ec"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:50.227522Z","signature_b64":"13a50Msp8X97mmHYJgKwO38M72JTyEoxoSsPz3wviBrOsYtllVhB56OC7DpiiFumBp8uC+jENGM+fE0VY6goDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c452ebdf365166c8d2538d54764aa306097826db6727c4ac6318c3c432c0dc98","last_reissued_at":"2026-05-17T23:39:50.226985Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:50.226985Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Deep Learning Assisted User Identification in Massive Machine-Type Communications","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["eess.SP","math.IT"],"primary_cat":"cs.IT","authors_text":"Bryan Liu, Jinhong Yuan, Milutin Pajovic, Zhiqiang Wei","submitted_at":"2019-07-23T07:45:06Z","abstract_excerpt":"In this paper, we propose a deep learning aided list approximate message passing (AMP) algorithm to further improve the user identification performance in massive machine type communications. A neural network is employed to identify a suspicious device which is most likely to be falsely alarmed during the first round of the AMP algorithm. The neural network returns the false alarm likelihood and it is expected to learn the unknown features of the false alarm event and the implicit correlation structure in the quantized pilot matrix. Then, via employing the idea of list decoding in the field of"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1907.09735","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1907.09735","created_at":"2026-05-17T23:39:50.227070+00:00"},{"alias_kind":"arxiv_version","alias_value":"1907.09735v1","created_at":"2026-05-17T23:39:50.227070+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1907.09735","created_at":"2026-05-17T23:39:50.227070+00:00"},{"alias_kind":"pith_short_12","alias_value":"YRJOXXZWKFTM","created_at":"2026-05-18T12:33:33.725879+00:00"},{"alias_kind":"pith_short_16","alias_value":"YRJOXXZWKFTMRUST","created_at":"2026-05-18T12:33:33.725879+00:00"},{"alias_kind":"pith_short_8","alias_value":"YRJOXXZW","created_at":"2026-05-18T12:33:33.725879+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY","json":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY.json","graph_json":"https://pith.science/api/pith-number/YRJOXXZWKFTMRUSTRVKHMSVDAY/graph.json","events_json":"https://pith.science/api/pith-number/YRJOXXZWKFTMRUSTRVKHMSVDAY/events.json","paper":"https://pith.science/paper/YRJOXXZW"},"agent_actions":{"view_html":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY","download_json":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY.json","view_paper":"https://pith.science/paper/YRJOXXZW","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1907.09735&json=true","fetch_graph":"https://pith.science/api/pith-number/YRJOXXZWKFTMRUSTRVKHMSVDAY/graph.json","fetch_events":"https://pith.science/api/pith-number/YRJOXXZWKFTMRUSTRVKHMSVDAY/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY/action/timestamp_anchor","attest_storage":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY/action/storage_attestation","attest_author":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY/action/author_attestation","sign_citation":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY/action/citation_signature","submit_replication":"https://pith.science/pith/YRJOXXZWKFTMRUSTRVKHMSVDAY/action/replication_record"}},"created_at":"2026-05-17T23:39:50.227070+00:00","updated_at":"2026-05-17T23:39:50.227070+00:00"}