2
this sparseness of active UEs, the framework of compressed
sensing (CS) [5], [6] has received extensive studies. Under
this CS framework, each UE is allocated with a unique pilot
sequence, which will be transmitted with its data packet if
this UE is activated. In this way, MIMO-enabled and OFDM-
enabled grant-free random access share similar formulation
of the detection problem, and the entire detection procedure
is typically divided into two steps. Firstly, the joint UAD
and CE problem is formulated as a sparse-signal recovery
problem. Different CS algorithms have been proposed for this
problem, such as the modified Bayesian CS algorithm [7], the
block orthogonal matching pursuit (BOMP) algorithm [8], the
approximate message passing (AMP) algorithm [9]–[11], the
deep neural network-aided sparse Bayesian learning algorithm
[12]. In the second step, the MUD problem can be readily
addressed according to the UAD and CE results.
B. Grant-Free Random Access Enabled by Spreading
The spreading technique serves as another enabling tech-
nique for mMTC with intriguing implementation feasibility.
In spreading-enabled grant-free access mechanisms [13]–[17],
each data symbol is spread with a UE-specific spreading
sequence, while all the spread symbols of each UE experience
the same scalar channel gain during transmission. In this way,
the CE problem is significantly simplified, and spreading-
enabled grant-free random access enjoys a much simpler prob-
lem formulation for receiver design. Then, different solutions
have been proposed for the joint UAD and MUD problem.
For example, an iterative order recursive least square (IORLS)
algorithm [13] was proposed to exploit the joint sparsity of
the data matrix to improve the detection accuracy. A joint
expectation maximization and AMP (EM-AMP) algorithm was
proposed in [14], where the data matrix is detected from the
received signal by the AMP algorithm [18], while the activity
detection is addressed by the EM algorithm [19]. In addition,
a structured iterative support detection (SISD) algorithm is
proposed in [15]. In [16], a block sparsity adaptive subspace
pursuit (BSASP) algorithm is proposed for the joint UAD
and MUD problem, while the CE problem is addressed with
a reference symbol. Recently, a joint UAD, CE, and signal
detection (JUICESD) algorithm was proposed in [17], where
the AMP algorithm is employed for signal detection and the
detected signals are also used to refine the CE result.
These above-mentioned solutions [13]–[17] involve some
infeasible assumptions or deficiencies. For example, the spar-
sity level, i.e. the exact number of active UEs is assumed
known to the BS in [13], while the schemes in [14], [15]
require perfect knowledge on CSI at receiver (CSIR) even for
inactive UEs. Such information is commonly unavailable in
mMTC scenarios due to the massiveness and random activity
of UEs. In addition, the subspace pursuit principle in [16] fails
to address the inherent modulation constraint of data symbols,
which undermines the data-detection accuracy. The UAD in
[17] relies on a non-deterministic detection threshold, while
fine-tuning this threshold may incur tedious work under com-
plicated mMTC scenarios. Recently, some advances on MUD
techniques have inspired new ideas to tackle these deficiencies,
and the details are explained in the next subsection.
C. Clustering and Variational Bayesian Inference for MUD
It is noted that modulated data symbols are discrete, while
the received signals corrupted by fading and noise approxi-
mately follow the Gaussian distribution. Inspired by this fact,
an unsupervised clustering approach is proposed in [20] for
the joint CE and MUD problem. Specifically, the Gaussian-
mixture model (GMM) is used to model the noise-corrupted
received signals, where each cluster in the GMM is associated
with one data symbol. Then, the EM algorithm is adopted for
this clustering problem. However, the successive interference
cancellation (SIC) principle is adopted for MUD in [20], which
requires sufficiently large power difference among different
users. For mMTC scenarios with densely deployed UEs, the
received power of different UEs can be strongly correlated,
which undermines the detection accuracy of SIC-based MUD.
In addition, the variational Bayesian inference (VBI) method
was employed for CE and MUD in one-bit quantized MIMO
system [21]. With its powerful inference capability for in-
tractable distributions, the VBI could effectively infer the
distributions of the CSI and the data symbols from the received
signals, which are heavily distorted after one-bit quantization.
D. Motivations and Contributions
Intrigued by the implementation feasibility, we consider
the spreading technique to enable grant-free random access
for mMTC in this paper. In order to address the deficiencies
of existing solutions and improve the detection accuracy, an
AMP-combined variational Bayesian inference-based cluster-
ing (AMP-VBIC) algorithm is proposed for joint user activity
and data detection. Specifically, the decoupling operations
in the AMP framework are adopted to mitigate multi-user
interference (MUI) and decouple the signals of different UEs.
Given the decoupled signals, we first extend the data symbol
alphabet to incorporate the null symbols from inactive UEs,
and then formulate the joint user activity and data detection
as a novel clustering problem under the GMM. Then, we
develop a variational Bayesian inference based clustering
(VBIC) algorithm for this clustering problem, where the CE
result is also refined during the clustering procedure. The
major contributions of this paper are summarized as follows.
(i) With the extended symbol alphabet, the joint user activity
and data detection is formulated as a clustering problem under
GMM. Then, we derive the VBIC algorithm for this clustering
problem, which iteratively works in conjunction with the AMP
decoupling module to refine the detection accuracy.
(ii) In the VBIC algorithm, the CE result is iteratively
updated with the clustering result of all the data symbols,
which in return improves the UAD and MUD accuracy.
(iii) Analyses are provided to demonstrate the favorable
linear complexity of the proposed AMP-VBIC algorithm,
while simulation results show its superior detection accuracy
over the state-of-art solutions.
The remainder of this paper is organized as follows. Section
II describes the system model, and the AMP-VBIC algorithm
is proposed in Section III for the joint user activity and data
detection problem. Simulation results are provided in Section
IV, and Section V concludes this paper.