


default search action
ISIT 2022: Espoo, Finland
- IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022. IEEE 2022, ISBN 978-1-6654-2159-1

- Hoover H. F. Yin

, Harry W. H. Wong
, Mehrdad Tahernia, Russell W. F. Lai
:
Multichannel Optimal Tree-Decodable Codes are Not Always Optimal Prefix Codes. 1-6 - Felicitas Hörmann

, Hannes Bartz, Sven Puchinger:
Error-Erasure Decoding of Linearized Reed-Solomon Codes in the Sum-Rank Metric. 7-12 - Tadashi Wadayama:

Fully Analog Noise-Resilient Dynamical Systems Storing Binary Sequence. 13-18 - Ran Tamir, Neri Merhav:

Universal Decoding for the Typical Random Code and for the Expurgated Code. 19-24 - Alejandro Cohen, Muriel Médard, Shlomo Shamai Shitz:

Broadcast Approach Meets Network Coding for Data Streaming. 25-30 - Cheuk Ting Li

:
The Undecidability of Network Coding with some Fixed-Size Messages and Edges. 31-36 - Jiaxin Qing

, Hoover H. F. Yin
, Raymond W. Yeung:
Enhancing the Decoding Rates of BATS Codes by Learning With Guided Information. 37-42 - Sagi Marcovich, Tuvi Etzion, Eitan Yaakobi:

Covering Sequences for ℓ-Tuples. 43-48 - Rebecca Golm, Mina Nahvi, Ryan Gabrys, Olgica Milenkovic:

The Gapped k-Deck Problem. 49-54 - Yunus Can Gültekin

, Frans M. J. Willems, Alex Alvarado
:
Log-CCDM: Distribution Matching via Multiplication-free Arithmetic Coding. 55-60 - Sayantan Chakraborty, Arun Padakandla, Pranab Sen:

Centralised multi link measurement compression with side information. 61-66 - Hao Lou, Farzad Farnoud:

Universal Compression of Large Alphabets with Constrained Compressors. 67-72 - Tingting Zhu, Jifan Liang, Xiao Ma:

Ternary Convolutional LDGM Codes with Applications to Gaussian Source Compression. 73-78 - Eric Chitambar

, Ian George
, Brian Doolittle, Marius Junge:
The Communication Value of a Quantum Channel. 79-84 - Manideep Mamindlapally

, Andreas J. Winter:
Singleton bounds for entanglement-assisted classical and quantum error correcting codes. 85-90 - Masahito Hayashi

:
Analytical calculation formulas for capacities of classical and classical-quantum channels. 91-96 - Mohamed Ridha Znaidi, Gaurav Gupta, Paul Bogdan:

Secure Distributed/Federated Learning: Prediction-Privacy Trade-Off for Multi-Agent System. 97-102 - Tayyebeh Jahani-Nezhad

, Mohammad Ali Maddah-Ali, Songze Li, Giuseppe Caire:
SwiftAgg: Communication-Efficient and Dropout-Resistant Secure Aggregation for Federated Learning with Worst-Case Security Guarantees. 103-108 - Chun-Ying Hou, I-Hsiang Wang:

Fundamental Limits of Personalized Federated Linear Regression with Data Heterogeneity. 109-114 - Yunus Inan, Mert Kayaalp, Emre Telatar, Ali H. Sayed:

Social Learning under Randomized Collaborations. 115-120 - Tina Behnia, Ke Wang, Christos Thrampoulidis:

On how to avoid exacerbating spurious correlations when models are overparameterized. 121-126 - Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis:

Asymptotic Behavior of Adversarial Training in Binary Linear Classification. 127-132 - Shelvia Wongso, Rohan Ghosh, Mehul Motani:

Understanding Deep Neural Networks Using Sliced Mutual Information. 133-138 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu:

AoI in Source-Aware Preemptive M/G/1/1 Queueing Systems: Moment Generating Function. 139-143 - Muhammed Emrullah Ildiz, Orhan Tahir Yavascan, Elif Uysal

, Özkan Tugberk Kartal:
Query Age of Information: Optimizing AoI at the Right Time. 144-149 - Ali Maatouk, Mohamad Assaad, Anthony Ephremides:

Analysis of an Age-Dependent Stochastic Hybrid System. 150-155 - Peng Zou, Jin Zhang, Suresh Subramaniam

:
Performance Modeling of Scheduling Algorithms in a Multi-Source Status Update System. 156-161 - Aviv Adler, Jennifer Tang, Yury Polyanskiy:

Efficient Representation of Large-Alphabet Probability Distributions via Arcsinh-Compander. 162-167 - Spencer Compton:

A Tighter Approximation Guarantee for Greedy Minimum Entropy Coupling. 168-173 - Yuta Nakahara

, Shota Saito
, Akira Kamatsuka
, Toshiyasu Matsushima:
Probability Distribution on Rooted Trees. 174-179 - Yunqi Wan, Li Chen, Fangguo Zhang

:
Algebraic Chase Decoding of Elliptic Codes Through Computing the Gröbner Basis. 180-185 - Kao-Yueh Kuo

, Ching-Yi Lai
:
Comparison of 2D topological codes and their decoding performances. 186-191 - Liudmila Karakchieva, Peter Trifonov:

Dual-domain recursive SISO decoding of linear block codes. 192-197 - Yajuan Liu

, Xuan He, Xiaohu Tang:
Capacity-Achieving Constrained Codes with GC-Content and Runlength Limits for DNA Storage. 198-203 - Krishna Gopal Benerjee

, Adrish Banerjee:
On Homopolymers and Secondary Structures Avoiding, Reversible, Reversible-Complement and GC-balanced DNA Codes. 204-209 - Aditya Narayan Ravi, Alireza Vahid, Ilan Shomorony:

Capacity of the Shotgun Sequencing Channel. 210-215 - Brendon McBain

, Emanuele Viterbo, James Saunderson:
Finite-State Semi-Markov Channels for Nanopore Sequencing. 216-221 - Siming Sun, Michelle Effros:

Source Coding with Unreliable Side Information in the Finite Blocklength Regime. 222-227 - Ryo Nomura

:
Relationship Between Intrinsic Randomness with f-Divergence and Fixed-Length Source Coding. 228-233 - Zhuangfei Wu, Lin Bai, Lin Zhou:

Excess-Distortion Exponents for Successive Refinement Using Gaussian Codebooks. 234-239 - Omri Lev, Anatoly Khina

:
Universal Joint Source-Channel Coding Under an Input Energy Constraint. 240-245 - Mordecai J. Golin, Albert John L. Patupat:

Speeding Up AIFV-m Dynamic Programs by m-1 Orders of Magnitude. 246-251 - Jun-Kai You, Hao-Chung Cheng, Yen-Huan Li:

Minimizing Quantum Rényi Divergences via Mirror Descent with Polyak Step Size. 252-257 - Uzi Pereg, Johannes Rosenberger

, Christian Deppe:
Identification Over Quantum Broadcast Channels. 258-263 - Yeow Meng Chee, Duc Tu Dao, Long Nguyen Tien, Duy Hoang Ta, Van Khu Vu:

Run Length Limited de Bruijn Sequences for Quantum Communications. 264-269 - Yonglong Li, Christoph Hirche, Marco Tomamichel:

Sequential Quantum Channel Discrimination. 270-275 - Gowtham R. Kurri, Monica Welfert, Tyler Sypherd, Lalitha Sankar:

α-GAN: Convergence and Estimation Guarantees. 276-281 - Seyed Mohammadreza Mousavi Kalan, Mahdi Soltanolkotabi

, Amir Salman Avestimehr:
Statistical Minimax Lower Bounds for Transfer Learning in Linear Binary Classification. 282-287 - Madison Lee, Shubhanshu Shekhar, Tara Javidi

:
Multi-Scale Zero-Order Optimization of Smooth Functions in an RKHS. 288-293 - Amedeo Roberto Esposito

, Michael Gastpar:
From Generalisation Error to Transportation-cost Inequalities and Back. 294-299 - Jae Oh Woo:

Analytic Mutual Information in Bayesian Neural Networks. 300-305 - Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia

:
Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer. 306-311 - Qiaosheng Eric Zhang, Vincent Y. F. Tan:

Covert Communication with Mismatched Decoders. 312-317 - Shi-Yuan Wang, Tuna Erdogan, Matthieu R. Bloch

:
Towards a Characterization of the Covert Capacity of Bosonic Channels under Trace Distance. 318-323 - Meng-Che Chang, Matthieu R. Bloch:

Covert Best Arm Identification of Stochastic Bandits. 324-329 - Ziv Aharoni, Dor Tsur, Haim H. Permuter:

Density Estimation of Processes with Memory via Donsker Vardhan. 330-335 - Qi Chen, Minquan Cheng, Baoming Bai:

Matroidal Entropy Functions: Constructions, Characterizations and Representations. 336-341 - Jiheon Woo, Chanhee Yoo, Young-Sik Kim, Yuval Cassuto, Yongjune Kim

:
Generalized Longest Repeated Substring Min-Entropy Estimator. 342-347 - Somya Singh, Fady Alajaji, Bahman Gharesifard:

Modeling Network Contagion Via Interacting Finite Memory Pólya Urns. 348-353 - Utkarsh Gupta

, Hessam Mahdavifar:
A New Algebraic Approach for String Reconstruction from Substring Compositions. 354-359 - Serge Kas Hanna:

Coding for Trace Reconstruction over Multiple Channels with Vanishing Deletion Probabilities. 360-365 - Yingyin Pan, Jianghua Zhong, Dongdai Lin:

Nonsingularity of Galois Nonlinear Feedback Shift Registers. 366-371 - Vladimir Edemskiy

, Chenhuang Wu:
4-adic complexity of quaternary cyclotomic sequences and Ding-Helleseth sequences with period pq. 372-377 - Sima Naseri, Ali Dehghan, Amir H. Banihashemi:

On Average Number of Cycles in Finite-Length Spatially Coupled LDPC Codes. 378-383 - Xiaomeng Guo, Yongchao Wang:

Efficient ADMM Decoder for Non-binary LDPC Codes based on Bit Embedding Technique. 384-389 - Emily McMillon

, Christine A. Kelley:
Cycle-Free Windows of SC-LDPC Codes. 390-395 - Asma Maalaoui, Charly Poulliat, Iryna Andriyanova:

Geometric versus Probabilistic Shaping for Circular-QAM with Nonbinary LDPC Codes. 396-401 - Zhusheng Wang, Sennur Ulukus:

Communication Cost of Two-Database Symmetric Private Information Retrieval: A Conditional Disclosure of Multiple Secrets Perspective. 402-407 - Pengzhen Ke, Liang Feng Zhang:

Two-Server Private Information Retrieval with Result Verification. 408-413 - Anoosheh Heidarzadeh, Alex Sprintson:

The Role of Reusable and Single-Use Side Information in Private Information Retrieval. 414-419 - Xiang Zhang, Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire:

Fundamental Limits of Cache-aided Multiuser PIR: The Two-message Two-user Case. 420-425 - Fatih Furkan Yilmaz, Reinhard Heckel:

Regularization-wise double descent: Why it occurs and how to eliminate it. 426-431 - Chin Wa Ken Lau

, Chandra Nair, Chaorui Yao:
Uniqueness of local maximizers for some non-convex log-determinant optimization problems using information theory. 432-437 - Changlong Wu

, Mohsen Heidari, Ananth Grama, Wojciech Szpankowski:
Sequential vs. Fixed Design Regrets in Online Learning. 438-443 - Philippe Jacquet, Gil I. Shamir, Wojciech Szpankowski:

Precise Minimax Regret for Logistic Regression. 444-449 - Anatoly Khina

, Arie Yeredor, Ram Zamir:
Monotonicity of the Trace-Inverse of Covariance Submatrices and Two-Sided Prediction. 450-455 - Shahar Stein Ioushua, Ofer Shayevitz:

On the Number of Graphs with a Given Histogram. 456-461 - Akiharu Omae, Kazuho Watanabe

:
Approximate Empirical Bayes Estimation of the Regularization Parameter in ℓ1 Trend Filtering. 462-467 - Marco Bondaschi, Michael Gastpar:

Alpha-NML Universal Predictors. 468-473 - Michael Rudow, K. V. Rashmi:

Learning-Augmented Streaming Codes are Approximately Optimal for Variable-Size Messages. 474-479 - Moon Jeong Park, Jungseul Ok, Yo-Seb Jeon, Dongwoo Kim:

MetaSSD: Meta-Learned Self-Supervised Detection. 480-485 - Austin Warner, Georgios Fellouris:

CuSum for sequential change diagnosis. 486-491 - Bashar Huleihel, Oron Sabag

, Haim H. Permuter:
Capacity of the Trapdoor Channel with Delayed Feedback. 492-497 - Andrea Grigorescu, Holger Boche, Rafael F. Schaefer

, H. Vincent Poor:
Capacity of Finite State Channels with Feedback: Algorithmic and Optimization Theoretic Properties. 498-503 - Pranav Joshi

, Amritakshya Purkayastha, Yihan Zhang
, Amitalok J. Budkuley, Sidharth Jaggi
:
On the Capacity of Additive AVCs with Feedback. 504-509 - Ville Junnila

, Tero Laihonen, Tuomo Lehtilä
:
On the List Size in the Levenshtein's Sequence Reconstruction Problem. 510-515 - Yeow Meng Chee

, Nhat Hoang Le, Van Khu Vu:
Robust Locally Positioning Sequences and Codes: Capacity, Constructions and Applications. 516-521 - Shibsankar Das

, Adrish Banerjee, Zi Long Liu:
New Family of Cross Z-Complementary Sequences With Large ZCZ Width. 522-527 - Minghui Yang, Shiyuan Qiang

, Xiaoyan Jing, Keqin Feng, Dongdai Lin:
The 4-Adic Complexity of Quaternary Sequences of Even Period With Ideal Autocorrelation. 528-531 - Zilong Wang, Qian Chen

, Guang Gong:
An Upper Bound of the Set Size of Perfect Sequences with Optimal Cross-correlation. 532-535 - Min Zhu, David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:

Systematic Doping of SC-LDPC Codes. 536-541 - Farzane Amirzade, Daniel Panario, Mohammad-Reza Sadeghi:

Trade-Based LDPC Codes. 542-547 - Roxana Smarandache, Anthony Gómez-Fonseca

, David G. M. Mitchell:
Using Minors to Construct Generator Matrices for Quasi-Cyclic LDPC Codes. 548-553 - Min Jang

, Kyeongyeon Kim, Seho Myung
, Hongsil Jeong, Kyung-Joong Kim, Sang-Hyo Kim:
A Design of Layered Decoding for QC-LDPC Codes Based on Reciprocal Channel Approximation. 554-559 - Sangwoo Hong

, Heecheol Yang, Jungwoo Lee:
Byzantine Attack Identification in Distributed Matrix Multiplication via locally testable codes. 560-565 - Yue Bi, Philippe Ciblat, Michèle A. Wigger, Yue Wu:

DoF of a Cooperative X-Channel with an Application to Distributed Computing. 566-571 - Hongru Cao, Wei Yan, Sian-Jheng Lin, Weiming Zhang:

A New Coding Scheme for Matrix-Vector Multiplication via Universal Decodable Matrices. 572-577 - Prathamesh Mayekar, Shubham K. Jha

, Himanshu Tyagi:
Wyner-Ziv compression is (almost) optimal for distributed optimization. 578-583 - Sourbh Bhadane, Aaron B. Wagner:

On One-Bit Quantization. 584-589 - Photios A. Stavrou, Marios Kountouris

:
A Rate Distortion Approach to Goal-Oriented Communication. 590-595 - Adeel Mahmood, Aaron B. Wagner:

Lossy Compression with Universal Distortion. 596-601 - Adeel Mahmood, Aaron B. Wagner:

Minimax Rate-Distortion. 602-607 - Eric Lei, Hamed Hassani, Shirin Saeedi Bidokhti:

Neural Estimation of the Rate-Distortion Function for Massive Datasets. 608-613 - Ziqi Zhou, Onur Günlü

, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer
:
Rainbow Differential Privacy. 614-619 - Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund:

Bounds for Privacy-Utility Trade-off with Non-zero Leakage. 620-625 - Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:

Pointwise Maximal Leakage. 626-631 - Ajaykrishnan Nageswaran:

Gaussian Data Privacy Under Linear Function Recoverability. 632-636 - Shu Hong, Lingjie Duan

:
Multi-user Privacy Cooperation Game by Leveraging Users' Service Flexibility. 637-642 - Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:

Constrained Obfuscation to Thwart Pattern Matching Attacks. 643-648 - Maki Yoshida:

Hybrid Multiplicative Non-perfect Secret Sharing. 649-653 - Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:

Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. 654-659 - Hiroki Koga:

Construction of the Visual Cryptography Scheme with the Maximum Relative Difference under a Strong General Access Structure. 660-665 - Irina E. Bocharova, Henk D. L. Hollmann, Karan Khathuria, Boris D. Kudryashov, Vitaly Skachek:

Coding with Cyclic PAM and Vector Quantization for the RLWE/MLWE Channel. 666-671 - Ziyi Chen, Shaocong Ma, Yi Zhou:

Accelerated Proximal Alternating Gradient-Descent-Ascent for Nonconvex Minimax Machine Learning. 672-677 - Yiling Luo, Xiaoming Huo, Yajun Mei:

The Directional Bias Helps Stochastic Gradient Descent to Generalize in Kernel Regression Models. 678-683 - Samir M. Perlaza, Gaetan Bisson

, Iñaki Esnaola, Alain Jean-Marie, Stefano Rini:
Empirical Risk Minimization with Relative Entropy Regularization: Optimality and Sensitivity Analysis. 684-689 - Ruida Zhou, Chao Tian, Tie Liu

:
Stochastic Chaining and Strengthened Information-Theoretic Generalization Bounds. 690-695 - Yiling Luo, Xiaoming Huo, Yajun Mei:

Implicit Regularization Properties of Variance Reduced Stochastic Mirror Descent. 696-701 - Ioannis Papageorgiou, Ioannis Kontoyiannis:

The Posterior Distribution of Bayesian Context-Tree Models: Theory and Applications. 702-707 - Lampros Gavalakis, Ioannis Kontoyiannis:

The Entropic Central Limit Theorem for Discrete Random Variables. 708-713 - Dimitris Achlioptas, Kostas Zampetakis:

A Simpler Proof of the Four Functions Theorem and Some New Variants. 714-717 - Martina Cardone, Alex Dytso, Cynthia Rush:

Entropic CLT for Order Statistics. 718-723 - Xu Wang

, Ali Al-Bashabsheh, Chao Zhao
, Chung Chan
:
Smoothed InfoNCE: Breaking the log N Curse without Overshooting. 724-729 - Yijun Fan, Yanxiao Liu, Shenghao Yang:

Continuity of Link Scheduling Rate Region for Wireless Networks with Propagation Delays. 730-735 - Ouyang Zhou, Junyuan Wang, Fuqiang Liu:

Average Downlink Rate Analysis for Clustered Cell-Free Networks with Access Point Selection. 742-747 - Xi Zhang, Qixuan Zhu, H. Vincent Poor:

Average Coverage Probability for Base-Station-to-UAV Communications Over 6G Multiple Access Wireless Networks. 748-753 - Daewon Seo, Yongjune Kim

:
Information and Energy Transmission with Wavelet-Reconstructed Harvesting Functions. 754-759 - Emirhan Gürpinar:

Symmetries in Linear Programming for Information Inequalities. 760-765 - Oisin Faust, Hamza Fawzi:

Strong Data Processing Inequalities via Sums of Squares. 766-771 - Laigang Guo, Raymond W. Yeung, Xiao-Shan Gao:

Proving Information Inequalities and Identities with Symbolic Computation. 772-777 - David Gamarnik, Eren C. Kizildag:

The Random Number Partitioning Problem: Overlap Gap Property and Algorithmic Barriers. 778-783 - Yu Tsunoda

, Yuichiro Fujiwara:
Weak Superimposed Codes of Improved Asymptotic Rate and Their Randomized Construction. 784-789 - Maxim Goukhshtein, Stark C. Draper, Jeebak Mitra:

Rate-Energy Optimal Probabilistic Shaping Using Linear Codes. 790-795 - Michael X. Cao, Navneeth Ramakrishnan, Mario Berta, Marco Tomamichel:

One-Shot Point-to-Point Channel Simulation. 796-801 - Anisha Banerjee, Antonia Wachter-Zeh, Eitan Yaakobi:

Insertion and Deletion Correction in Polymer-based Data Storage. 802-807 - Ziyang Lu, Yiwei Zhang

:
t-Deletion-1-Insertion-Burst Correcting Codes. 808-813 - Evagoras Stylianou

, Lorenz Welter, Rawad Bitar, Antonia Wachter-Zeh, Eitan Yaakobi:
Equivalence of Insertion/Deletion Correcting Codes for d-dimensional Arrays. 814-819 - Sarthak Jain, Martina Cardone, Soheil Mohajer:

Identifying Reliable Machines for Distributed Matrix-Vector Multiplication. 820-825 - Neophytos Charalambides, Hessam Mahdavifar, Mert Pilanci, Alfred O. Hero III:

Orthonormal Sketches for Secure Coded Regression. 826-831 - Jinbao Zhu

, Songze Li:
Generalized Lagrange Coded Computing: A Flexible Computation-Communication Tradeoff. 832-837 - Shahrzad Kiani, Stark C. Draper:

Successive Approximation for Coded Matrix Multiplication. 838-843 - Onur Günlü

, Matthieu R. Bloch, Rafael F. Schaefer
, Aylin Yener:
Secure Joint Communication and Sensing. 844-849 - Antonino Favano, Luca Barletta, Alex Dytso:

On the Capacity Achieving Input of Amplitude Constrained Vector Gaussian Wiretap Channel. 850-855 - Holger Boche, Minglai Cai, Moritz Wiese:

Mosaics of Combinatorial Designs for Semantic Security on Quantum Wiretap Channels. 856-861 - Yasutada Oohama, Bagus Santoso:

A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More. 862-867 - Benjamin Aram Berendsohn, László Kozma

:
Group Testing with Geometric Ranges. 868-873 - Mira Gonen, Michael Langberg, Alex Sprintson:

Group Testing on General Set-Systems. 874-879 - Hesam Nikpey, Jungyeol Kim

, Xingran Chen
, Saswati Sarkar, Shirin Saeedi Bidokhti:
Group Testing with Correlation via Edge-Faulty Graphs. 880-885 - Akhil Bhimaraju, Lav R. Varshney:

Scheduling Group Tests over Time. 886-891 - Christina Lee Yu:

Nonparametric Matrix Estimation with One-Sided Covariates. 892-897 - Bruce E. Hajek, Xiaohan Kang:

Maximum Likelihood Estimation of Optimal Receiver Operating Characteristic Curves From Likelihood Ratio Observations. 898-903 - Jingbo Liu:

Interaction Improves Two-party Nonparametric Pointwise Density Estimation. 904-909 - Prafulla Chandra

, Andrew Thangaraj, Nived Rajaraman:
Missing Mass Estimation from Sticky Channels. 910-915 - Omur Ozel, Aylin Yener, Sennur Ulukus:

State Amplification and Masking While Timely Updating. 916-921 - Mohammad Hatami, Markus Leinonen, Zheng Chen, Nikolaos Pappas, Marian Codreanu:

Asymptotically Optimal On-Demand AoI Minimization in Energy Harvesting IoT Networks. 922-927 - Priyanka Kaswan, Sennur Ulukus:

Timely Gossiping with File Slicing and Network Coding. 928-933 - Melih Bastopcu

, S. Rasoul Etesami, Tamer Basar:
The Dissemination of Time-Varying Information over Networked Agents with Gossiping. 934-939 - Neri Merhav:

Reversing Jensen's Inequality for Information-Theoretic Analyses. 940-945 - Yinfei Xu, Guojun Chen

, Shi Jin:
A New Proof of the Extremal Inequality. 946-950 - Chin Wa Ken Lau, Chandra Nair, David Ng

:
A mutual information inequality and some applications. 951-956 - Ian Zieder, Alex Dytso, Martina Cardone:

An MMSE Lower Bound via Poincaré Inequality. 957-962 - Hsin-Po Wang

, Ryan Gabrys, Alexander Vardy:
PCR, Tropical Arithmetic, and Group Testing. 963-968 - Johan Chrisnata, Han Mao Kiah, Alexander Vardy, Eitan Yaakobi:

Bee Identification Problem for DNA Strands. 969-974 - Sankeerth Rao Karingula, Alexander Vardy, Mary Wootters:

Lower bounds on the redundancy of linear codes with disjoint repair groups. 975-979 - Hanwen Yao, Jinfeng Du, Alexander Vardy:

Polar Coded Modulation via Hybrid Bit Labeling. 980-985 - Luca G. Tallini, Nawaf Alqwaifly

, Bella Bose:
Zero Deletion/Insertion Codes and Zero Error Capacity*. 986-991 - Van Long Phuoc Pham, Keshav Goyal

, Han Mao Kiah:
Sequence Reconstruction Problem for Deletion Channels: A Complete Asymptotic Solution. 992-997 - Yotam Gershon, Yuval Cassuto:

Genomic Compression with Decoder Alignment under Single Deletion and Multiple Substitutions. 998-1003 - Wentu Song, Kui Cai, Tuan Thanh Nguyen

:
List-decodable Codes for Single-deletion Single-substitution with List-size Two. 1004-1009 - Anindya Bijoy Das, Aditya Ramamoorthy:

An Integrated Method to Deal with Partial Stragglers and Sparse Matrices in Distributed Computations. 1010-1015 - Kai Yuan, Youlong Wu:

Coded Wireless Distributed Computing via Interference Alignment. 1016-1021 - Xuan Guang, Yang Bai, Raymond W. Yeung:

An Improved Capacity Bound for Secure Network Function Computation. 1022-1027 - Marvin Xhemrishi, Rawad Bitar, Antonia Wachter-Zeh:

Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees. 1028-1033 - Sijie Li, Cheuk Ting Li

:
Arithmetic Network Coding for Secret Sum Computation. 1034-1039 - Sergey Loyka, Neri Merhav:

The Secrecy Capacity of The Gaussian Wiretap Channel with Rate-Limited Help at the Decoder. 1040-1045 - Neri Merhav:

Encoding Individual Sequences for the Wiretap Channel. 1046-1051 - Aria Nouri

, Reza Asvadi:
Matched Information Rate Codes for Binary-Input Intersymbol Interference Wiretap Channels. 1052-1057 - Masahito Hayashi

, Naqueeb Ahmad Warsi:
Commitment capacity of classical-quantum channels. 1058-1063 - Tania Sidana, Navin Kashyap:

Entanglement-Assisted Quantum Error-Correcting Codes over Local Frobenius Rings. 1064-1069 - Shikha Patel, Om Prakash

:
Quantum codes construction from skew polycyclic codes. 1070-1075 - Uzi Pereg, Christian Deppe, Holger Boche:

The Quantum MAC with Cribbing Encoders. 1076-1081 - Thach V. Bui, Yeow Meng Chee

, Jonathan Scarlett, Van Khu Vu:
Group Testing with Blocks of Positives. 1082-1087 - Javad Zahedi Moghaddam, Mohammad Esmaeili, Aria Nosratinia

:
Exact Recovery Threshold in Dynamic Binary Censored Block Model. 1088-1093 - Xiao-Nan Lu

, Masakazu Jimbo:
Error-Correcting Locating Arrays for Interaction Fault Location in Combinatorial Testing. 1094-1099 - Banghua Zhu, Jiantao Jiao, Michael I. Jordan:

Robust Estimation for Non-parametric Families via Generative Adversarial Networks. 1100-1105 - Adrien Vandenbroucque, Amedeo Roberto Esposito

, Michael Gastpar:
Lower-bounds on the Bayesian Risk in Estimation Procedures via f-Divergences. 1106-1111 - Jesús Gutiérrez-Gutiérrez, Adam Podhorski

, Xabier Insausti, Marta Zárraga-Rodríguez:
The Pisarenko spectral estimation method: Extension to AR vector processes. 1112-1114 - Aditya Deshmukh, Jing Liu, Venugopal V. Veeravalli:

Robust Mean Estimation in High Dimensions: An Outlier Fraction Agnostic and Efficient Algorithm. 1115-1120 - Aniruddha Phatak, Mahesh K. Varanasi:

An improved coded caching scheme for partially cooperative D2D networks. 1121-1126 - Aniruddha Phatak, Mahesh K. Varanasi:

An improved lower bound for device-to-device coded caching. 1127-1132 - Yinbin Ma, Daniela Tuninetti:

On Coded Caching Systems with Offline Users. 1133-1138 - Federico Brunero, Petros Elia:

Coded Caching Does Not Generally Benefit From Selfish Caching. 1139-1144 - Yanqing Liu, Yanlin Geng:

Blahut-Arimoto Algorithms for Computing Capacity Bounds of Broadcast Channels. 1145-1150 - Yuhang Yao, Syed Ali Jafar:

Capacity of 3-user Linear Computation Broadcast over Fq with 1D Demand and Side-Information. 1151-1156 - Neha Sangwan, Varun Narayanan, Vinod M. Prabhakaran:

Byzantine Consensus Over Broadcast Channels. 1157-1162 - Ziao Wang, Ning Zhang, Weina Wang, Lele Wang:

On the Feasible Region of Efficient Algorithms for Attributed Graph Alignment. 1163-1168 - Iryna Andriyanova, Charly Poulliat:

Analysis of Non-Binary High-Rate Repetition-Parity-Parity Codes Over the BEC. 1169-1174 - Ting-Chun Lin, Min-Hsiu Hsieh

:
c3-Locally Testable Codes from Lossless Expanders. 1175-1180 - D. Shivakrishna, V. Lalitha:

Some Results on Maximally Recoverable Codes with Locality and Hierarchical Locality. 1181-1186 - Nikolajs Skuratovs, Mike E. Davies:

Warm-Starting in Message Passing algorithms. 1187-1192 - Emna Ben Yacoub, Balázs Matuz:

Analysis of Symbol Message Passing LDPC Decoder for the Poisson PPM Channel. 1193-1198 - Semih Akbayrak, Ismail Senöz, Bert de Vries:

Adaptive Importance Sampling Message Passing. 1199-1204 - Sisi Miao, Lukas Rapp

, Laurent Schmalen:
Error-and-erasure Decoding of Product and Staircase Codes with Simplified Extrinsic Message Passing. 1205-1210 - Okko Makkonen

, Camilla Hollanti
:
Analog Secure Distributed Matrix Multiplication over Complex Numbers. 1211-1216 - Elahe Vedadi, Yasaman Keshtkarjahromi, Hulya Seferoglu:

Adaptive Gap Entangled Polynomial Coding for Multi-Party Computation at the Edge. 1217-1222 - Rémi A. Chou

, Jörg Kliewer:
Function Computation Without Secure Links: Information and Leakage Rates. 1223-1228 - Jingzhen Hu

, Qingzhong Liang, A. Robert Calderbank:
Co-design of CSS Codes and Diagonal Gates. 1229-1234 - David Hunn, Willie K. Harrison:

Subspace Decomposition of Extreme-Rate Secrecy Codes. 1235-1240 - Ali Bereyhi, Bruno Loureiro, Florent Krzakala

, Ralf R. Müller, Hermann Schulz-Baldes:
Secure Coding via Gaussian Random Fields. 1241-1246 - Siddharth Sankar Acharjee, Arpan Chattopadhyay:

Controller Manipulation Attack on Reconfigurable Intelligent Surface Aided Wireless Communication. 1247-1252 - Joakim Algrøy, Angela I. Barbero, Øyvind Ytrehus:

Determining the equivocation in coded transmission over a noisy channel. 1253-1258 - Haibo Yang, Peiwen Qiu, Jia Liu, Aylin Yener:

Over-the-Air Federated Learning with Joint Adaptive Computation and Power Control. 1259-1264 - Selim F. Yilmaz, Burak Hasircioglu, Deniz Gündüz:

Over-the-Air Ensemble Inference with Model Privacy. 1265-1270 - Nitish Mital, Deniz Gündüz:

Bandwidth Expansion for Over-the-Air Computation with One-Sided CSI. 1271-1276 - Yujia Mu, Cong Shen, Yonina C. Eldar:

Optimizing Federated Averaging over Fading Channels. 1277-1281 - Arian Eamaz

, Farhang Yeganegi, Mojtaba Soltanalian
, Natasha Devroye
:
Generalized Probability Density Function Estimation via Convex Optimization. 1282-1287 - Farzad Pourkamali, Nicolas Macris:

Mismatched Estimation of Non-Symmetric Rank-One Matrices Under Gaussian Noise. 1288-1293 - George V. Moustakides:

Data-Driven Parameter Estimation. 1294-1299 - Jinyu Wang, Minquan Cheng, Kai Wan, Giuseppe Caire:

A Novel Framework for Coded Caching via Cartesian Product with Reduced Subpacketization. 1300-1305 - Xianzhang Wu

, Minquan Cheng, Congduan Li, Li Chen:
Design of Coded Caching Schemes through Proper Orthogonal Arrays. 1306-1311 - Xinyu Xie, Kai Huang, Jinbei Zhang, Shushi Gu, Qinyu Zhang

:
Coded Caching in Satellite Networks. 1312-1317 - Hao-Chung Cheng, Li Gao:

Error Exponent and Strong Converse for Quantum Soft Covering. 1318-1323 - Yihan Zhang

, Shashank Vatedka:
Lower Bounds on List Decoding Capacity using Error Exponents. 1324-1329 - Mohsen Heidari, Achilleas Anastasopoulos, S. Sandeep Pradhan:

Upper Bounds on the Feedback Error Exponent of Channels With States and With Memory. 1330-1335 - Lin Bai, Jun Diao, Lin Zhou:

Achievable Error Exponents for Almost Fixed-Length Binary Classification. 1336-1341 - Chen Wang, Ziyang Lu, Zhaojun Lan, Gennian Ge, Yiwei Zhang

:
Coding schemes for locally balanced constraints. 1342-1347 - Keshav Goyal

, Han Mao Kiah:
Evaluating the Gilbert-Varshamov Bound for Constrained Systems. 1348-1353 - Yi Liu, Yonglong Li, Pengfei Huang, Paul H. Siegel:

Rate-Constrained Shaping Codes for Finite-State Channels With Cost. 1354-1359 - Jonathan Keeler, Tamás Linder, Serdar Yüksel:

An Asymptotically Optimal Two-Part Coding Scheme for Networked Control under Fixed-Rate Constraints. 1360-1365 - Keigo Takeuchi:

On the Convergence of Orthogonal/Vector AMP: Long-Memory Message-Passing Strategy. 1366-1371 - Tianqi Hou, Yuhao Liu, Teng Fu, Jean Barbier:

Sparse superposition codes under VAMP decoding with generic rotational invariant coding matrices. 1372-1377 - Lei Liu

, Shunqi Huang, Brian M. Kurkoski:
Sufficient Statistic Memory Approximate Message Passing. 1378-1383 - Lei Liu

, Shansuo Liang
, Li Ping:
Capacity Optimality of OAMP in Coded Large Unitarily Invariant Systems. 1384-1389 - Kai Wan, Minquan Cheng, Dequan Liang, Giuseppe Caire:

Multiaccess Coded Caching with Private Demands. 1390-1395 - Ali Gholami

, Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire:
Coded Caching With Private Demands and Caches. 1396-1401 - Elizabath Peter, K. K. Krishnan Namboodiri

, B. Sundar Rajan:
A Secretive Coded Caching for Shared Cache Systems using Placement Delivery Arrays. 1402-1407 - Parthajit Mohapatra:

Secure Communication Over 2-User Gaussian Interference Channel with Caching. 1408-1413 - Erixhen Sula, Michael Gastpar:

Shannon Bounds on Lossy Gray-Wyner Networks. 1414-1419 - Tharindu Adikari, Stark C. Draper:

Two-terminal source coding with common sum reconstruction. 1420-1424 - Millen Kanabar

, Jonathan Scarlett:
Multi-User Random Coding Techniques for Mismatched Rate-Distortion Theory. 1425-1429 - Shashank Vatedka, Venkat Chandar, Aslan Tchamkerten:

Locally Decodable Slepian-Wolf Compression. 1430-1435 - Simeng Yuan, Wei Yu, Kunpeng Wang, Xiuxiu Li:

Partial Key Exposure Attacks on RSA with Moduli N=prqs. 1436-1440 - Paolo Santini, Marco Baldi, Franco Chiaraluce:

A Novel Attack to the Permuted Kernel Problem. 1441-1446 - Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:

On the Security Properties of Combinatorial All-or-nothing Transforms. 1447-1452 - Changhun Jo, Jy-yong Sohn, Kangwook Lee:

Breaking Fair Binary Classification with Optimal Flipping Attacks. 1453-1458 - Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni, Nicolas Sendrier:

Quasi-Cyclic Stern Proof of Knowledge. 1459-1464 - Leighton Pate Barnes, Alex Dytso, H. Vincent Poor:

Improved Information Theoretic Generalization Bounds for Distributed and Federated Learning. 1465-1470 - Michal Yemini

, Rajarshi Saha, Emre Ozfatura, Deniz Gündüz, Andrea J. Goldsmith:
Semi-Decentralized Federated Learning with Collaborative Relaying. 1471-1476 - Mehrdad Pournaderi, Yu Xiang:

Communication-Efficient Distributed Multiple Testing for Large-Scale Inference. 1477-1482 - Doyeon Kim, Jeonghwan Lee, Hye Won Chung:

A Generalized Worker-Task Specialization Model for Crowdsourcing: Optimal Limits and Algorithm. 1483-1488 - Tianren Peng, Weida Wang, Shao-Lun Huang:

A Mathematical Framework to Characterize the Dependency Structures in Multimodal Learning with Minimax Principle. 1489-1494 - Pawan Poojary, Randall Berry:

Observational Learning with Negative Externalities. 1495-1496 - Yaniv Fogel, Meir Feder:

Another Look at Universal Individual Learning. 1501-1505 - Endrit Dosti, Sergiy A. Vorobyov, Themistoklis Charalambous:

Generalizing Nesterov's Acceleration Framework by Embedding Momentum Into Estimating Sequences: New Algorithm and Bounds. 1506-1511 - Anjana Ambika Mahesh, B. Sundar Rajan:

Space Time Codes in Multi-Antenna Coded Caching Systems. 1512-1517 - K. K. Krishnan Namboodiri

, Elizabath Peter, B. Sundar Rajan:
Extended Placement Delivery Arrays for Multi-Antenna Coded Caching Scheme. 1518-1523 - Ting Yang, Kai Wan, Minquan Cheng, Giuseppe Caire:

Multiple-antenna Placement Delivery Array for Cache-aided MISO Systems. 1524-1529 - Holger Boche, Christian Deppe:

Computability of the Channel Reliability Function and Related Bounds1. 1530-1535 - Cheuk Ting Li

:
First-Order Theory of Probabilistic Independence and Single-Letter Characterizations of Capacity Regions. 1536-1541 - Lei Yu

, Venkat Anantharam:
Sequential Channel Synthesis. 1542-1547 - Wafa Labidi, Rami Ezzine, Christian Deppe, Holger Boche:

Common Randomness Generation from Gaussian Sources. 1548-1553 - Allison Beemer, Rutuja Kshirsagar, Gretchen L. Matthews

:
Graph-based codes for hierarchical recovery. 1554-1559 - Adway Patra

, Alexander Barg:
Interior-point regenerating codes on graphs. 1560-1565 - Hongna Yang, Yiwei Zhang

:
On an extremal problem of regular graphs related to fractional repetition codes. 1566-1571 - Luying Li, Wei Yu, Minzhong Luo:

Deterministic Encoding into Generalized Huff curves. 1572-1577 - Vinayak Ramkumar, M. Nikhil Krishnan, Myna Vajha, P. Vijay Kumar:

On Information-Debt-Optimal Streaming Codes With Small Memory. 1578-1583 - Hoover H. F. Yin

, Harry W. H. Wong
, Mehrdad Tahernia, Jiaxin Qing
:
Packet Size Optimization for Batched Network Coding. 1584-1589 - Yaniv Sadeh, Ori Rottenstreich, Haim Kaplan:

Coding Size of Traffic Partition in Switch Memories. 1590-1595 - Ray Li, Mary Wootters:

Improved batch code lower bounds. 1596-1599 - Holger Boche, Ullrich J. Mönich, Yannik N. Böck:

Computing Upper and Lower Bounds for the Bandwidth of Bandlimited Signals. 1600-1605 - Dorian Florescu, Ayush Bhandari:

Unlimited Sampling via Generalized Thresholding. 1606-1611 - Xiao Lv, Wei Cui, Yulong Liu:

Time-Data Tradeoffs in Structured Signals Recovery via the Proximal-Gradient Homotopy Method. 1612-1616 - Karan Srivastava, Daniel L. Pimentel-Alarcón:

A Perturbation Bound on the Subspace Estimator from Canonical Projections. 1617-1622 - Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Médard:

Heterogeneous Differential Privacy via Graphs. 1623-1628 - Jasper Goseling, Milan Lopuhaä-Zwakenberg

:
Robust Optimization for Local Differential Privacy. 1629-1634 - Wenxin Ding, Gautam Kamath

, Weina Wang, Nihar B. Shah:
Calibration with Privacy in Peer Review. 1635-1640 - Netanel Raviv, Rawad Bitar, Eitan Yaakobi:

Information Theoretic Private Inference in Quantized Models. 1641-1646 - Nir Weinberger, Michal Yemini

:
Upper Confidence Interval Strategies for Multi-Armed Bandits with Entropy Rewards. 1647-1652 - Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz:

Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits. 1653-1658 - Ahmadreza Moradipari, Mohammad Ghavamzadeh, Taha Rajabzadeh, Christos Thrampoulidis, Mahnoosh Alizadeh:

Multi-Environment Meta-Learning in Stochastic Linear Bandits. 1659-1664 - Francesco Pase, Deniz Gündüz, Michele Zorzi:

Remote Contextual Bandits. 1665-1670 - Abram Magner, Amith Kumar Singh:

Local Limit Theorems for Approximate Maximum Likelihood Estimation of Network Information Spreading Models. 1671-1676 - Christopher Rose:

Hide and Seek On A Budget. 1677-1682 - Sajjad Bahrami, Ertem Tuncel:

Challenging the Deployment of Fiducial Points in Minimum Error Entropy. 1683-1688 - Toshiaki Koike-Akino, Ye Wang:

AutoVAE: Mismatched Variational Autoencoder with Irregular Posterior-Prior Pairing. 1689-1694 - Nir Weinberger, Meir Feder:

On Information-Theoretic Determination of Misspecified Rates of Convergence. 1695-1700 - Federico Brunero, Petros Elia:

The Exact Load-Memory Tradeoff of Multi-Access Coded Caching With Combinatorial Topology. 1701-1706 - Mingming Zhang

, Kai Wan, Minquan Cheng, Giuseppe Caire:
Coded Caching for Two-Dimensional Multi-Access Networks. 1707-1712 - K. K. Krishnan Namboodiri

, B. Sundar Rajan:
An Improved Lower Bound for Multi-Access Coded Caching. 1713-1718 - Niladri Das

, B. Sundar Rajan:
Multi-Access Coded Caching Schemes from Maximal Cross Resolvable Designs. 1719-1724 - Zhen-Ming Huang, Cheng-Yu Pai

, Chao-Yu Chen:
A Novel Construction of Optimal Cross Z-Complementary Sets Based on Generalized Boolean Functions. 1725-1730 - Payam Delgosha, Hamed Hassani, Ramtin Pedarsani:

Binary Classification Under ℓ0 Attacks for General Noise Distribution. 1731-1736 - Maxime Ferreira Da Costa, Urbashi Mitra:

On the Stability of Super-Resolution and a Beurling-Selberg Type Extremal Problem. 1737-1742 - Jiaxin Wang, Fang-Wei Fu:

Three New Constructions of 5-valued Spectrum Functions with Totally Disjoint Spectra Duals. 1743-1748 - Dor Elimelech, Hengjia Wei, Moshe Schwartz:

On the Generalized Covering Radii of Reed-Muller Codes. 1749-1754 - V Arvind Rameshwar

, Navin Kashyap:
On the Performance of Reed-Muller Codes Over (d, ∞)-RLL Input-Constrained BMS Channels. 1755-1760 - Lakshmi Prasad Natarajan, Prasad Krishnan:

Berman Codes: A Generalization of Reed-Muller Codes that Achieve BEC Capacity. 1761-1766 - Mohammad Rowshan

, Jinhong Yuan:
Constrained Error Pattern Generation for GRAND. 1767-1772 - Ioannis Chatzigeorgiou

:
Transversal GRAND for Network Coded Data. 1773-1778 - Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy

, Muriel Médard:
Partial Encryption after Encoding for Security and Reliability in Data Systems. 1779-1784 - Praneeth Kumar Vippathalla

, Navin Kashyap:
The Secure Storage Capacity of a DNA Wiretap Channel Model. 1785-1790 - Tuan Thanh Nguyen

, Kui Cai, Wentu Song, Kees A. Schouhamer Immink:
Optimal Single Chromosome-Inversion Correcting Codes for Data Storage in Live DNA. 1791-1796 - Yuanyuan Tang, Shuche Wang, Ryan Gabrys, Farzad Farnoud:

Correcting multiple short duplication and substitution errors. 1797-1802 - Nir Weinberger, Neri Merhav:

The DNA Storage Channel: Capacity and Error Probability Bounds. 1803-1808 - Hengjia Wei, Moshe Schwartz:

Perfect Codes Correcting a Single Burst of Limited-Magnitude Errors. 1809-1814 - Baris Can Esmer

, Vasileios Nakos:
On (1 + ϵ)-Approximate Block Sparse Recovery. 1815-1820 - Kumar Vijay Mishra, Samuel Pinilla, Ali Pezeshki, A. Robert Calderbank:

Group-Theoretic Wideband Radar Waveform Design. 1821-1825 - Sihan Mao, Jinchi Chen:

Blind Super-Resolution via Projected Gradient Descent. 1826-1831 - Mohamad Rida Rammal, Suhas N. Diggavi, Ashutosh Sabharwal:

3D Orientation Estimation With Configurable Backscatter Arrays. 1832-1837 - Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon

, Oliver Kosut, Lalitha Sankar, Fei Wei:
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime. 1838-1843 - Berivan Isik, Tsachy Weissman:

Learning under Storage and Privacy Constraints. 1844-1849 - Netanel Raviv, Ziv Goldfeld:

Perfect Subset Privacy for Data Sharing and Learning. 1850-1855 - Di Wang, Jinhui Xu:

Differentially Private ℓ1-norm Linear Regression with Heavy-tailed Data. 1856-1861 - Ke Li, Yongsheng Yao, Masahito Hayashi

:
Exponents in smoothing the max-relative entropy and of randomness extraction against quantum side information. 1862-1867 - Mohammad Aamir Sohail, Touheed Anwar Atif, S. Sandeep Pradhan:

Unified approach for computing sum of sources over CQ-MAC. 1868-1873 - Omar Amer, Walter O. Krawec:

High-Dimensional Quantum Conference Key Agreement. 1874-1879 - Yu-Chen Shen, Li Gao, Hao-Chung Cheng:

Strong Converse for Privacy Amplification against Quantum Side Information. 1880-1885 - Yi Wei, Zixin Zhong, Vincent Y. F. Tan, Chan Wang:

Fast Beam Alignment via Pure Exploration in Multi-armed Bandits. 1886-1891 - Duo Cheng, Ruiquan Huang, Cong Shen, Jing Yang

:
Cascading Bandits with Two-Level Feedback. 1892-1896 - Arpan Mukherjee, Ali Tajer:

SPRT-based Best Arm Identification in Stochastic Bandits. 1897-1902 - Fei Sha, Ruizhi Zhang:

Quickest Detection of the Change of Community via Stochastic Block Models. 1903-1908 - Liyan Xie:

Minimax Robust Quickest Change Detection using Wasserstein Ambiguity Sets. 1909-1914 - Qunzhi Xu, Yajun Mei:

Active Quickest Detection When Monitoring Multi-streams with Two Affected Streams. 1915-1920 - Georgios Fellouris, Venugopal V. Veeravalli:

Quickest Change Detection with Controlled Sensing. 1921-1926 - Yu Chen

, Mohammadamin Baniasadi, Majid Safari:
Optimal Shaping Gains for Continuous Spectrum Nonlinear Frequency Signalling over Long Fibers. 1927-1932 - Mohammadamin Baniasadi, Yu Chen

, Majid Safari:
On the Capacity of b-Modulated Nonlinear Frequency Division Multiplexing. 1933-1938 - Sufang Yang, Longguang Li, Jintao Wang:

Diversity-Multiplexing Tradeoff Analysis on Block Fading Optical Wireless Channels. 1939-1944 - Oliver Kosut, Michelle Effros, Michael Langberg:

On the Benefit of Cooperation in Relay Networks. 1945-1950 - Gustavo Kasper Facenda, Elad Domanovitz, M. Nikhil Krishnan, Ashish Khisti, Silas L. Fong, Wai-Tian Tan, John G. Apostolopoulos:

On State-Dependent Streaming Erasure Codes over the Three-Node Relay Network. 1951-1956 - Shubhransh Singhvi, Gayathri R., P. Vijay Kumar:

Rate-Optimal Streaming Codes Over the Three-Node Decode-And-Forward Relay Network. 1957-1962 - James Chin-Jen Pang, Hessam Mahdavifar, S. Sandeep Pradhan:

New Bounds on the Size of Binary Codes with Large Minimum Distance. 1963-1968 - Yang Xu, Haibin Kan, Guangyue Han:

Minimal Length of Nontrivial Solutions of the Isometry Equation and MacWilliams Extension Property with Respect to Weighted Poset Metric. 1969-1974 - Yang Xu, Haibin Kan, Guangyue Han:

Fourier-Reflexive Partitions and Group of Linear Isometries with Respect to Weighted Poset Metric. 1975-1980 - Henk D. L. Hollmann:

Non-standard linear recurring sequence subgroups and automorphisms of irreducible cyclic codes. 1981-1986 - Jennifer Tang, Yury Polyanskiy:

Capacity of Noisy Permutation Channels. 1987-1992 - Min-Oh Jeong, Martina Cardone

, Alex Dytso:
On the Ranking Recovery from Noisy Observations up to a Distortion. 1993-1998 - Akira Kamatsuka

, Takahiro Yoshida, Toshiyasu Matsushima:
A Generalization of the Stratonovich's Value of Information and Application to Privacy-Utility Trade-off. 1999-2004 - Theshani Nuradha, Ziv Goldfeld:

An Information-Theoretic Characterization of Pufferfish Privacy. 2005-2010 - Kanishak Vaidya

, B. Sundar Rajan:
Private Information Delivery with Coded Storage. 2011-2015 - Ateet Devulapalli, Viveck R. Cadambe

, Flávio P. Calmon
, Haewon Jeong
:
Differentially Private Distributed Matrix Multiplication: Fundamental Accuracy-Privacy Trade-Off Limits. 2016-2021 - Mohamed S. Nafea, Eugine Shin, Aylin Yener:

Proportional Fair Clustered Federated Learning. 2022-2027 - Yuchang Sun, Jiawei Shao, Songze Li, Yuyi Mao, Jun Zhang:

Stochastic Coded Federated Learning with Convergence and Privacy Guarantees. 2028-2033 - Marvin Xhemrishi, Alexandre Graell i Amat, Eirik Rosnes, Antonia Wachter-Zeh:

Computational Code-Based Privacy in Coded Federated Learning. 2034-2039 - Natalie Lang

, Nir Shlezinger:
Joint Privacy Enhancement and Quantization in Federated Learning. 2040-2045 - Praneeth Narayanamurthy, Urbashi Mitra:

Uncertainty-Based Non-Parametric Active Peak Detection. 2046-2051 - Alon Kipnis

:
Rare and Weak Detection Models under Moderate Deviations Analysis and Log-Chisquared P-values. 2052-2057 - Konstantinos Konstantinidis

, Aditya Ramamoorthy:
Aspis: Robust Detection for Distributed Learning. 2058-2063 - Zeynep K, Bobak Nazer:

Detecting Correlated Gaussian Databases. 2064-2069 - Subhankar Banerjee, Sennur Ulukus:

Game Theoretic Analysis of an Adversarial Status Updating System. 2070-2075 - Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate

, Narayan B. Mandayam:
Privacy Leakage in Discrete-Time Updating Systems. 2076-2081 - Yunus Inan, Emre Telatar:

Age-Optimal Causal Labeling of Memoryless Processes. 2082-2087 - Qian Wang, He Henry Chen:

Age of Information in Reservation Multi-Access Networks with Stochastic Arrivals. 2088-2093 - Felipe Areces, Dan Song, Richard D. Wesel, Aaron B. Wagner:

Efficiently Computable Converses for Finite-Blocklength Communication. 2094-2099 - Homa Nikbakht, Malcolm Egan, Jean-Marie Gorce:

Dirty Paper Coding for Consecutive Messages with Heterogeneous Decoding Deadlines in the Finite Blocklength Regime. 2100-2105 - Sadaf ul Zuhra, Samir M. Perlaza

, H. Vincent Poor, Eitan Altman:
Achievable Information-Energy Region in the Finite Block-Length Regime with Finite Constellations. 2106-2111 - Xi Zhang, Jingqing Wang, H. Vincent Poor:

Statistical Delay and Error-Rate Bounded QoS Control for URLLC in the Non-Asymptotic Regime. 2112-2117 - Meraiah Martinez, Christine A. Kelley:

Minimum distance and other properties of quasi-dyadic parity check codes. 2118-2123 - Min Qiu

, Jinhong Yuan:
Sub-Block Rearranged Staircase Codes for Optical Transport Networks. 2124-2129 - Samet Gelincik, Philippe Mary, Anne Savard

, Jean-Yves Baudais:
Preserving the Minimum Distance of Polar-Like Codes while Increasing the Information Length. 2130-2135 - Saurav R. Pandey, Nuh Aydin, Matthew J. Harrington, Dev Akre:

A Generalization of the ASR Search Algorithm to 2-Generator Quasi-Twisted Codes. 2136-2141 - Guodong Li, Min Ye, Sihuang Hu

:
Adjacent-Bits-Swapped Polar codes: A new code construction to speed up polarization. 2142-2147 - Jun Muramatsu

:
Binary Polar Codes Based on Bit Error Probability. 2148-2153 - Dorsa Fathollahi, Marco Mondelli:

Polar Coded Computing: The Role of the Scaling Exponent. 2154-2159 - Peter Trifonov:

Design of Multilevel Polar Codes with Shaping. 2160-2165 - Ron M. Roth:

Higher-Order MDS Codes. 2166-2171 - Jie Li, Xiaohu Tang, Hanxu Hou, Yunghsiang S. Han, Bo Bai, Gong Zhang:

PMDS Array Codes With Small Sub-packetization Level and Small Repair Bandwidth. 2172-2177 - Odae Al Aboud, Daniel Panario, Brett Stevens:

Maximum-Length Low-Density MDS Codes and Near Resolvable Designs. 2178-2183 - Jingjie Lv, Weijun Fang, Bin Chen, Shu-Tao Xia, Xiangyu Chen:

New constructions of binary MDS array codes and locally repairable array codes. 2184-2189 - Chenglin Fan, Ping Li:

Distances Release with Differential Privacy in Tree and Grid Graph. 2190-2195 - Antonious M. Girgis

, Deepesh Data, Suhas N. Diggavi:
Distributed User-Level Private Mean Estimation. 2196-2201 - Jiangnan Cheng, Ao Tang:

Maximum Mutual Information under Local Differential Privacy Constraint. 2202-2206 - Birenjith Sasidharan

, Emanuele Viterbo:
Private Balance-Checking on Blockchain Accounts Using Private Integer Addition. 2207-2212 - Ching-Yi Lai

, Hao-Chung Cheng:
Learning quantum circuits of T -depth one. 2213-2218 - Christoph Hirche, Felix Leditzky:

Bounding quantum capacities via partial orders and complementarity. 2219-2224 - Christophe Piveteau, Joseph M. Renes

:
Quantum message-passing algorithm for optimal and efficient decoding. 2225-2230 - Uzi Pereg, Christian Deppe, Holger Boche:

Communication with Unreliable Entanglement Assistance. 2231-2236 - Sameera Bharadwaja H., Monika Bansal, Chandra R. Murthy:

Approximate Set Identification: PAC Analysis for Group Testing. 2237-2242 - Sundara Rajan Srinivasavaradhan, Pavlos Nikolopoulos, Christina Fragouli, Suhas N. Diggavi:

Improving Group Testing via Gradient Descent. 2243-2248 - Batuhan Arasli, Sennur Ulukus:

Group Testing with a Dynamic Infection Spread. 2249-2254 - Sundara Rajan Srinivasavaradhan, Pavlos Nikolopoulos, Christina Fragouli, Suhas N. Diggavi:

Dynamic group testing to control and monitor disease progression in a population. 2255-2260 - Vanlalruata Ralte, Praveen Sharma, Amitalok J. Budkuley, Stefano Rini:

On Distributed Sampling for Detection of Poisson Sources. 2261-2266 - Yunfeng Cai, Guanhua Fang, Ping Li:

Sensitivity of Under-Determined Linear System. 2267-2272 - Tadashi Wadayama, Satoshi Takabe

:
Asymptotic Mean Squared Error of Noisy Periodical Successive Over-Relaxation. 2273-2278 - Yuval Ben-Hur, Asaf Goren, Da El Klang, Yongjune Kim

, Yuval Cassuto:
Mitigating Noise in Ensemble Classification with Real-Valued Base Functions. 2279-2284 - Cheng-Yu Pai

, Zi Long Liu, You-Qi Zhao, Zhen-Ming Huang, Chao-Yu Chen:
Designing Two-Dimensional Complete Complementary Codes for Omnidirectional Transmission in Massive MIMO Systems. 2285-2290 - Yuhao Chi, Lei Liu

, Guanghui Song, Ying Li, Yong Liang Guan, Chau Yuen:
Capacity Optimal Coded Generalized MU-MIMO. 2291-2296 - Yue Qi, Mojtaba Vaezi:

Optimal Order of Encoding for Gaussian MIMO Multi-Receiver Wiretap Channel. 2297-2302 - Abbas Khalili, Elza Erkip, Sundeep Rangan:

Quantized MIMO: Channel Capacity and Spectrospatial Power Distribution. 2303-2308 - Recep Can Yavas, Victoria Kostina

, Michelle Effros:
Third-order Analysis of Channel Coding in the Moderate Deviations Regime. 2309-2314 - Henri Hentilä, Yanina Shkel, Visa Koivunen:

Second-Order Converse for Rate-Limited Common Randomness Generation. 2315-2320 - Pin-Wen Su, Yu-Chih Huang

, Shih-Chun Lin
, I-Hsiang Wang, Chih-Chun Wang:
Sequentially Mixing Randomly Arriving Packets Improves Channel Dispersion Over Block-Based Designs. 2321-2326 - Hengjie Yang, Recep Can Yavas, Victoria Kostina

, Richard D. Wesel:
Variable-Length Stop-Feedback Codes With Finite Optimal Decoding Times for BI-AWGN Channels. 2327-2332 - Marcus Greferath, Jens Zumbrägel:

List Decoding of Quaternary Codes in the Lee Metric. 2333-2337 - Chih-Chiang Huang, Hedongliang Liu, Lukas Holzbaur, Sven Puchinger, Antonia Wachter-Zeh:

List Decoding of 2-Interleaved Binary Alternant Codes. 2338-2343 - Xiangyu Chen, Min Ye:

Improving the List Decoding Version of the Cyclically Equivariant Neural Decoder. 2344-2349 - Yujie Gu, Ilya Vorobyev, Ying Miao:

Secure codes with list decoding. 2350-2355 - Bolin Wu, Jincheng Dai, Kai Niu:

Joint Source-Channel Polar-Coded Modulation. 2356-2361 - Yanfei Dong

, Kai Niu, Jincheng Dai:
Distributed Joint Source-Channel Polar Coding. 2362-2367 - Zicheng Ye, Yuan Li, Huazi Zhang, Rong Li, Jun Wang, Guiying Yan, Zhiming Ma:

The Complete SC-Invariant Affine Automorphisms of Polar Codes. 2368-2373 - Kirill Ivanov, Rüdiger L. Urbanke:

Polar Codes Do Not Have Many Affine Automorphisms. 2374-2378 - Zhengrui Li, Wai Ho Mow, Lei Deng

, Ting-Yi Wu:
Optimal-Repair-Cost MDS Array Codes for a Class of Heterogeneous Distributed Storage Systems. 2379-2384 - Chao Pan, Ryan Gabrys, Xujun Liu, Charles J. Colbourn, Olgica Milenkovic:

Balanced and Swap-Robust Trades for Dynamical Distributed Storage. 2385-2390 - Sajani Vithana, Sennur Ulukus:

Private Read Update Write (PRUW) with Storage Constrained Databases. 2391-2396 - Zhiquan Tan, Sian-Jheng Lin, Yunghsiang S. Han, Zhongyi Huang, Bo Bai, Gong Zhang:

Data Integrity Check in Distributed Storage Systems. 2397-2402 - Kayvon Mazooji, Sreeram Kannan, William Stafford Noble, Ilan Shomorony:

Fundamental Limits of Multi-Sample Flow Graph Decomposition. 2403-2408 - Adel M. Elmahdy, Junhyung Ahn, Soheil Mohajer, Changho Suh:

The Optimal Sample Complexity of Matrix Completion with Hierarchical Similarity Graphs. 2409-2414 - Ivo Kubjas, Vitaly Skachek:

Partial Extraction from Invertible Bloom Filters. 2415-2420 - Benjamin Wolff, Tomer Gafni, Guy Revach

, Nir Shlezinger, Kobi Cohen:
Composite Anomaly Detection via Hierarchical Dynamic Search. 2421-2426 - Mario Berta, Marco Tomamichel:

Chain rules for quantum channels. 2427-2432 - Felix Leditzky, Debbie W. Leung, Vikesh Siddhu, Graeme Smith, John A. Smolin:

The platypus of the quantum channel zoo. 2433-2438 - Jens Eisert

, Mark M. Wilde:
A smallest computable entanglement monotone. 2439-2444 - Arun Padakandla:

Communicating over a Classical-Quantum MAC with State Information Distributed at Senders. 2445-2450 - Mikolaj Jankowski, Deniz Gündüz, Krystian Mikolajczyk:

AirNet: Neural Network Transmission over the Air. 2451-2456 - Natasha Devroye

, Neshat Mohammadi, Abhijeet Mulgund
, Harish Naik
, Raj Shekhar, György Turán, Yeqi Wei, Milos Zefran
:
Interpreting Deep-Learned Error-Correcting Codes. 2457-2462 - Mehrdad Salmasi, Maneesh Sahani:

Learning neural codes for perceptual uncertainty. 2463-2468 - Amit Tsvieli, Nir Weinberger:

Learning Maximum Margin Channel Decoders for Non-linear Gaussian Channels. 2469-2474 - Michael Dikshtein, Nir Weinberger, Shlomo Shamai Shitz:

The Compound Information Bottleneck Program. 2475-2480 - Gholamali Aminian, Yuheng Bu

, Gregory W. Wornell
, Miguel R. D. Rodrigues:
Tighter Expected Generalization Error Bounds via Convexity of Information Measures. 2481-2486 - Mahdi Haghifam, Shay Moran, Daniel M. Roy, Gintare Karolina Dziugaite:

Understanding Generalization via Leave-One-Out Conditional Mutual Information. 2487-2492 - Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:

A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage. 2493-2498 - Bharath Shamasundar, Aria Nosratinia

:
Canonical Training is Bad for Reconfigurable Intelligent Surfaces. 2499-2504 - Mahdi Barzegar Khalilsarai, Yi Song, Tianyu Yang, Giuseppe Caire:

Channel State Acquisition in FDD Massive MIMO: Rate-Distortion Bound and Effectiveness of "Analog" Feedback. 2505-2510 - Farhad Shirani, Hamidreza Aghasi:

MIMO Systems with One-bit ADCs: Capacity Gains using Nonlinear Analog Operations. 2511-2516 - Andreas Nicolaides, Constantinos Psomas, Ghassan M. Kraidy, Ioannis Krikidis:

A Partition-based Scheme for IRS-aided MIMO Fading Channels: Outage and DMT Analysis. 2517-2522 - Yihan Zhang

, Sidharth Jaggi
, Michael Langberg, Anand D. Sarwate
:
The Capacity of Causal Adversarial Channels. 2523-2528 - Eric Ruzomberka, Chih-Chun Wang, David J. Love:

Channel Capacity for Adversaries with Computationally Bounded Observations. 2529-2534 - Anuj Kumar Yadav

, Mohammadreza Alimohammadi, Yihan Zhang
, Amitalok J. Budkuley, Sidharth Jaggi
:
New Results on AVCs with Omniscient and Myopic Adversaries. 2535-2540 - Ziao Wang, Nadim Ghaddar, Lele Wang:

Noisy Sorting Capacity. 2541-2546 - Oron Sabag

, Victoria Kostina
, Babak Hassibi:
Feedback Capacity of Gaussian Channels with Memory. 2547-2552 - Nikita Polyanskii, Yihan Zhang

:
List-Decodable Zero-Rate Codes for the Z-Channel. 2553-2558 - Yihan Zhang

, Shashank Vatedka:
List-Decodability of Poisson Point Processes. 2559-2564 - Eitan Goldberg, Chong Shangguan, Itzhak Tamo:

Singleton-type bounds for list-decoding and list-recovery, and related results. 2565-2570 - Yonatan Urman, Guy Mogilevsky, David Burshtein:

Improving Belief Propagation List Decoding of Polar Codes by Post-Processing. 2571-2576 - Sadra Seyedmasoumian

, Tolga M. Duman:
Approximate Weight Distribution of Polarization-Adjusted Convolutional (PAC) Codes. 2577-2582 - Debarnab Mitra, Lev Tauz, Lara Dolecek:

Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems. 2583-2588 - Wen-Yao Chen, Chung-Chin Lu:

On the Bit-Channels for Channel Polarization. 2589-2594 - Constantin Runge

, Thomas Wiegart, Diego Lentner, Tobias Prinz:
Multilevel Binary Polar-Coded Modulation Achieving the Capacity of Asymmetric Channels. 2595-2600 - Hao Shi, Hanxu Hou, Yunghsiang S. Han, Patrick P. C. Lee, Zhengyi Jiang, Zhongyi Huang, Bo Bai:

New Piggybacking Codes with Lower Repair Bandwidth for Any Single-Node Failure. 2601-2606 - Dinh Thi Xinh, Luu Y. Nhi Nguyen

, Lakshmi J. Mohan, Serdar Boztas, Tran Thi Luong, Son Hoang Dau:
Practical Considerations in Repairing Reed-Solomon Codes. 2607-2612 - Gianira N. Alfarano, Alberto Ravagnani, Emina Soljanin:

Dual-Code Bounds on Multiple Concurrent (Local) Data Recovery. 2613-2618 - Wenjing Chen, Chao Tian:

A New Approach to Compute Information Theoretic Outer Bounds and Its Application to Regenerating Codes. 2619-2624 - Han Cai, Moshe Schwartz:

A Bound on the Minimal Field Size of LRCs, and Cyclic MR Codes That Attain It. 2625-2630 - Hila Naaman, Satish Mulleti, Yonina C. Eldar:

Uniqueness and Robustness of Tem-Based FRI Sampling. 2631-2636 - Alexander Barg, Ohad Elishco, Ryan Gabrys, Eitan Yaakobi:

Recoverable systems on lines and grids. 2637-2642 - Zhi Gu

, Avik Ranjan Adhikary
, Zhengchun Zhou, Pingzhi Fan:
A Computational Design of Aperiodic Mismatched Filtering Sequences. 2643-2647 - Shuai Ma, Stefan M. Moser, Ligong Wang, Michèle A. Wigger:

Signaling for MISO Channels Under First- and Second-Moment Constraints. 2648-2653 - Farzin Salek, Andreas J. Winter

:
Distillation of Secret Key and GHZ States from Multipartite Mixed States. 2654-2659 - Tao Guo, Jie Han, Huihui Wu, Yizhu Wang, Bo Bai, Wei Han:

Protecting Semantic Information Using An Efficient Secret Key. 2660-2665 - Vamoua Yachongka

, Hideki Yagi, Yasutada Oohama:
Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources. 2666-2671 - Jari Lietzén, Olav Tirkkonen

, Roope Vehkalahti:
Secret Keys from Parity Bits in the Satellite Setting. 2672-2677 - Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Mingyuan Wang:

Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing. 2678-2683 - Yoel Bokobza, Ron Dabora, Kobi Cohen:

Simultaneous Sensing and Channel Access based on Partial Observations via Deep Reinforcement Learning. 2684-2689 - Alejandro Cohen, Amit Solomon, Nir Shlezinger:

DeepNP: Deep Learning-Based Noise Prediction for Ultra-Reliable Low-Latency Communications. 2690-2695 - Roy Karasik, Osvaldo Simeone, Shlomo Shamai Shitz:

Learning to Broadcast with Layered Division Multiplexing. 2696-2701 - Joni Shaska, Urbashi Mitra:

Information Structures for State-Dependent Decentralized Detection. 2702-2707 - Shun Watanabe:

On Sub-optimality of Random Binning for Distributed Hypothesis Testing. 2708-2713 - Mustapha Hamad, Mireille Sarkiss

, Michèle A. Wigger:
Benefits of Rate-Sharing for Distributed Hypothesis Testing. 2714-2719 - Osama A. Hanna, Xinlin Li, Christina Fragouli, Suhas N. Diggavi:

Can we break the dependency in distributed detection? 2720-2725 - Kalle Alaluusua

, Lasse Leskelä:
Consistent Bayesian community recovery in multilayer networks. 2726-2731 - Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:

A Rigorous Proof of the Capacity of MIMO Gauss-Markov Rayleigh Fading Channels. 2732-2737 - Kangning Ma, Yinfei Xu, Shuo Shao:

On Broadcast Approach to MIMO Fading Channels. 2738-2743 - Yinfei Xu, Tong Zhang, Yong Dong

, Jian Lu, Yili Xia:
MIMO Gaussain Cognitive Interference Channels With Confidential Messages. 2744-2749 - Omar Fawzi

, Paul Fermé:
Beating the Sum-Rate Capacity of the Binary Adder Channel with Non-Signaling Correlations. 2750-2755 - Akshay Seshadri, Felix Leditzky, Vikesh Siddhu, Graeme Smith:

On the separation of correlation-assisted sum capacities of multiple access channels. 2756-2761 - Qi Cao, Qi Chen:

On Zero-Error Capacity of "One-Edge" Binary Channels with Two Memories. 2762-2767 - Xiao Ma, Yixin Wang, Tingting Zhu:

A New Framework for Proving Coding Theorems for Linear Codes. 2768-2773 - Holger Boche, Rafael F. Schaefer

, H. Vincent Poor:
Capacity-Achieving Input Distributions: Algorithmic Computability and Approximability. 2774-2779 - Sebastian Bitzer, Martin Bossert:

On Multibasis Information Set Decoding. 2780-2784 - Johann-Philipp Thiers, Jürgen Freudenberger:

Decoding of Generalized Concatenated Codes Over the One-Lee Error Channel for the McEliece Cryptosystem. 2785-2790 - Ferucio Laurentiu Tiplea, Vlad-Florin Dragoi

:
Generalized Inverse Based Decoding. 2791-2796 - S. Ashwin Hebbar

, Rajesh K. Mishra, Sravan Kumar Ankireddy, Ashok Vardhan Makkuva, Hyeji Kim, Pramod Viswanath:
TinyTurbo: Efficient Turbo Decoders on Edge. 2797-2802 - Qiuzhuo Chen, Fangtao Yu, Tao Yang, Jingge Zhu, Rongke Liu:

A Linear Physical-Layer Network Coding Based Multiple Access Approach. 2803-2808 - Zhuolin Bian, Wangmei Guo, Minhan Tian:

Endurance Network Coding for Multi-Hop Wireless Communications. 2809-2814 - Suayb S. Arslan

, Massoud Pourmandi, Elif Haytaoglu:
Base Station-Assisted Cooperative Network Coding for Cellular Systems with Link Constraints. 2815-2820 - Arun Padakandla:

An Achievable Rate Region for 3-User Classical-Quantum Broadcast Channels. 2821-2826 - Chengyuan Qian, Ruida Zhou, Chao Tian, Tie Liu

:
Improved Weakly Private Information Retrieval Codes. 2827-2832 - Anoosheh Heidarzadeh, Alex Sprintson:

The Linear Capacity of Single-Server Individually-Private Information Retrieval With Side Information. 2833-2838 - Perttu Saarela, Matteo Allaix, Ragnar Freij-Hollanti, Camilla Hollanti

:
Private Information Retrieval from Colluding and Byzantine Servers with Binary Reed-Muller Codes. 2839-2844 - Hao Xu, Kai-Kit Wong, Giuseppe Caire, Shlomo Shamai Shitz:

Distributed Information Bottleneck for a Primitive Gaussian Diamond Channel with Rayleigh Fading. 2845-2850 - Ibrahim Issa

, Aaron B. Wagner:
An Adaptive Composition Theorem for Maximal Leakage for Binary Inputs. 2851-2855 - Amir Masoud Jafarpisheh, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:

Distributed Attribute-based Private Access Control. 2856-2861 - Mahshad Shariatnasab, Farhad Shirani, Zahid Anwar:

Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks. 2862-2867 - Ryan Song, Kareem M. Attiah, Wei Yu:

Coded Categorization in Massive Random Access. 2868-2873 - Suhas S. Kowshik

:
Improved Bounds for the Many-User MAC. 2874-2879 - Mohammad Javad Ahmadi

, Tolga M. Duman:
Unsourced Random Access with a Massive MIMO Receiver Using Multiple Stages of Orthogonal Pilots. 2880-2885 - Javad Haghighat, Tolga M. Duman:

Energy Efficiency Analysis of a Feedback-Aided IRSA Scheme. 2886-2891 - Praveen Venkatesh

, Gabriel Schamberg:
Partial Information Decomposition via Deficiency for Multivariate Gaussians. 2892-2897 - Dor Tsur, Ziv Aharoni, Ziv Goldfeld, Haim H. Permuter:

Optimizing Estimated Directed Information over Discrete Alphabets. 2898-2903 - Amedeo Roberto Esposito

, Adrien Vandenbroucque, Michael Gastpar:
On Sibson's α-Mutual Information. 2904-2909 - Jieao Zhu

, Zijian Zhang
, Zhongzhichao Wan, Linglong Dai:
On Finite-Time Mutual Information. 2910-2915 - Mingyang Zhu, Ming Jiang, Chunming Zhao:

Ternary Message Passing Decoding of RS-SPC Product Codes. 2916-2921 - Haruhiko Kaneko:

Look-Ahead Bit-Flipping Decoding of MDPC Code. 2922-2927 - Ali Farsiabi, Amir H. Banihashemi:

A Semi Linear State Space Model for Error Floor Estimation of LDPC codes over the AWGN Channel. 2928-2933 - Daniella Bar-Lev, Sagi Marcovich, Eitan Yaakobi, Yonatan Yehezkeally

:
Adversarial Torn-paper Codes. 2934-2939 - Roni Con, Amir Shpilka

, Itzhak Tamo:
Reed Solomon Codes Against Adversarial Insertions and Deletions. 2940-2945 - Jiachun Pan, Yonglong Li, Vincent Y. F. Tan:

Asymptotic Nash Equilibrium for the Sequential Adversarial Hypothesis Testing Game. 2946-2951 - Qihang Liang

, Chung Chan
:
Improved Adversarial Robustness by Hardened Prediction. 2952-2956 - Taro Shibayama

, Manabu Hagiwara:
Equivalence of Quantum Single Insertion and Single Deletion Error-Correctabilities, and Construction of Codes and Decoders. 2957-2962 - Yingkai Ouyang

, Marco Tomamichel:
Learning quantum graph states with product measurements. 2963-2968 - Vatsal Pramod Jha, Udaya Parampalli, Abhay Kumar Singh

:
Stabilizer codes and Symbol-Pair Metric are Related. 2969-2973 - Touheed Anwar Atif, S. Sandeep Pradhan:

Multi-Party Quantum Purity Distillation with Bounded Classical Communication. 2974-2979 - Yoshiki Hara, Kenta Kasai:

Sparse Group Quantitative PCR Testing by Belief Propagation. 2980-2984 - Yiming Xing, Georgios Fellouris:

Asymptotically optimal multistage tests for iid data. 2985-2990 - Amichai Painsky:

A Data-driven Missing Mass Estimation Framework. 2991-2995 - Feng Zhu

, Jingjing Zhang, Osvaldo Simeone, Xin Wang:
Adaptive Worker Grouping for Communication-Efficient and Straggler-Tolerant Distributed SGD. 2996-3000 - Masazumi Iida, Yoshinari Takeishi, Jun'ichi Takeuchi:

On Fisher Information Matrix for Simple Neural Networks with Softplus Activation. 3001-3006 - Kordag Mehmet Kilic, Jin Sima, Jehoshua Bruck:

On Algebraic Constructions of Neural Networks with Small Weights. 3007-3012 - Yaniv Fogel, Meir Feder:

On Multiple and Hierarchical Universality. 3013-3018 - Enrico Paolini, Lorenzo Valentini

, Velio Tralli, Marco Chiani:
Irregular Repetition Slotted ALOHA in an Information-Theoretic Setting. 3019-3024 - Mehrasa Ahmadipour, Michèle A. Wigger, Mari Kobayashi:

Coding for Sensing: An Improved Scheme for Integrated Sensing and Communication over MACs. 3025-3030 - Michael Dikshtein, Shirin Saeedi Bidokhti, Shlomo Shamai Shitz:

Bounds on the Capacity of the Multiple Access Diamond Channel with Cooperating Base-Stations. 3031-3036 - Tadashi Wadayama, Ayano Nakai-Kasai:

Continuous-Time Noisy Average Consensus System as Gaussian Multiple Access Channel. 3037-3042 - Chin Choy Chai, Xiao-Ping Zhang:

Iterative Water-Filling Power and Subcarrier Allocation for Multicarrier Non-Orthogonal Multiple Access Uplink. 3043-3048 - Sagnik Bhattacharya, Prakash Narayan:

Shared Information for a Markov Chain on a Tree. 3049-3054 - Aditya Pradeep, Ido Nachum, Michael Gastpar:

Finite Littlestone Dimension Implies Finite Information Complexity. 3055-3060 - Mücahit Furkan Yildiz

, Baris Nakiboglu
:
Augustin Information Measures on Fading Channels Under Certain Symmetry Hypothesis. 3061-3066 - Tong Zhang, Yufan Zhuang, Yinfei Xu:

The Generalized Degrees-of-Freedom of the Asymmetric Interference Channel with Delayed CSIT. 3067-3072 - Pin-Chieh Tseng

, Ching-Yi Lai
, Wei-Hsuan Yu:
Improved semidefinite programming bounds for binary codes by split distance enumerations. 3073-3078 - Gretchen L. Matthews

, Aidan W. Murphy:
Norm-trace-lifted codes over binary fields. 3079-3084 - Yihan Zhang

, Shashank Vatedka:
Lower bounds for Multiple Packing. 3085-3090 - Tuan Thanh Nguyen

, Kui Cai, Han Mao Kiah, Kees A. Schouhamer Immink, Yeow Meng Chee
:
Using One Redundant Bit to Construct Two-Dimensional Almost-Balanced Codes. 3091-3096 - Francisco Pernice, Ray Li, Mary Wootters:

Efficient Capacity-Achieving Codes for General Repeat Channels. 3097-3102 - Chih Wei Ling, Yanxiao Liu, Cheuk Ting Li

:
Weighted Parity-Check Codes for Channels with State and Asymmetric Channels. 3103-3108 - Ehsan Seifi, Amir K. Khandani:

Converting a 1×K Static Rayleigh Channel to K Parallel AWGN Using Media-based Modulation. 3109-3113 - Gou Hosoya:

Reduction of Delay for Delayed Bit-Interleaved Coded Modulation. 3114-3119 - Guodong Li, Ningning Wang, Sihuang Hu

, Min Ye:
Constructing MSR codes with subpacketization 2n/3 for k + 1 helper nodes. 3120-3125 - Jing Qiu, Weijun Fang, Fang-Wei Fu:

Optimal and Almost Optimal Cyclic (r, δ)-LRCs With Large Code Lengths. 3126-3131 - Hanxu Hou, Yunghsiang S. Han, Bo Bai, Gong Zhang:

Towards Efficient Repair and Coding of Binary MDS Array Codes with Small Sub-packetization. 3132-3137 - Xiaoqi Liu, Ramji Venkataramanan:

Sketching sparse low-rank matrices with near-optimal sample- and time-complexity. 3138-3143 - Surin Ahn, Wei-Ning Chen, Ayfer Özgür:

Estimating Sparse Distributions Under Joint Communication and Privacy Constraints. 3144-3149 - Mark Beliaev, Payam Delgosha, Hamed Hassani, Ramtin Pedarsani:

Efficient and Robust Classification for Sparse Attacks. 3150-3155 - Geewon Suh, Changho Suh:

Graph-assisted Matrix Completion in a Multi-clustered Graph Model. 3156-3161 - Shota Saito

:
On Meta-Bound for Lower Bounds of Bayes Risk. 3162-3167 - Charvi Rastogi, Ivan Stelmakh, Nihar B. Shah, Sivaraman Balakrishnan:

No Rose for MLE: Inadmissibility of MLE for Evaluation Aggregation Under Levels of Expertise. 3168-3173 - Hanbyul Lee, Kevin Bello, Jean Honorio

:
On the Fundamental Limits of Exact Inference in Structured Prediction. 3174-3179 - Heguang Lin, Mengze Li, Daniel L. Pimentel-Alarcón, Matthew L. Malloy:

Geometry of the Minimum Volume Confidence Sets. 3180-3185 - Junyi He, Di Zhang, Shumeng Liu, Yuezhi Zhou, Yaoxue Zhang:

Decentralized Updates Scheduling for Data Freshness in Mobile Edge Computing. 3186-3191 - Chih-Chun Wang:

How Useful Is Delayed Feedback in AoI Minimization - A Study on Systems With Queues in Both Forward and Backward Directions. 3192-3197 - Rajai Nasser, Ibrahim Issa

, Ibrahim C. Abou-Faycal:
Age Distribution in Arbitrary Preemptive Memoryless Networks. 3198-3203 - Nian Guo

, Victoria Kostina
:
Reliability function for streaming over a DMC with feedback. 3204-3209 - Giuseppe Cocco, Albert Guillén i Fàbregas, Josep Font-Segura

:
Typical Random Coding Exponent for Finite-State Channels. 3210-3214 - Yan Hao Ling, Jonathan Scarlett:

A Simple Coding Scheme Attaining Positive Information Velocity. 3215-3219 - Mine Gokce Dogan, Martina Cardone, Christina Fragouli:

Proactive Resilience in 1-2-1 Networks. 3220-3225 - Maiara F. Bollauf

, Hsuan-Yin Lin, Øyvind Ytrehus:
On the Secrecy Gain of Formally Unimodular Construction A4 Lattices. 3226-3231 - Jiajie Xue, Brian M. Kurkoski:

Lower Bound on the Error Rate of Genie-Aided Lattice Decoding. 3232-3237 - Farhad Shirani, S. Sandeep Pradhan:

Lattices from Linear Codes: Source and Channel Networks. 3238-3243 - Lawrence Ong

, Badri N. Vellambi
:
Very Pliable Index Coding. 3244-3249 - Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab:

On the Optimality of Linear Index Coding over the Fields with Characteristic Three. 3250-3255 - Yucheng Liu, Lawrence Ong

, Phee Lep Yeoh, Parastoo Sadeghi, Jörg Kliewer, Sarah Johnson:
Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages. 3256-3261 - Francisco Maturana, K. V. Rashmi:

Bandwidth Cost of Code Conversions in the Split Regime. 3262-3267 - Junming Ke, Ago-Erik Riet

:
Update and Repair Efficient Storage Codes with Availability via Finite Projective Planes. 3268-3273 - Rémi A. Chou

:
Quantifying the Cost of Privately Storing Data in Distributed Storage Systems. 3274-3279 - Sidhant Bansal

, Arnab Bhattacharyya, Anamay Chaturvedi
, Jonathan Scarlett:
Universal 1-Bit Compressive Sensing for Bounded Dynamic Range Signals. 3280-3284 - Seyedehsara Nayer, Namrata Vaswani

:
Fast Low Rank column-wise Compressive Sensing. 3285-3290 - Jialiang Xu, Xu Zhang:

Data-Time Tradeoffs for Optimal k-Thresholding Algorithms in Compressed Sensing. 3291-3296 - Ankit Pensia, Po-Ling Loh, Varun S. Jog:

Simple Binary Hypothesis Testing under Communication Constraints. 3297-3302 - Lin Zhou, Yun Wei, Alfred O. Hero III:

Asymptotics for Outlier Hypothesis Testing. 3303-3308 - Zhongchang Sun, Shaofeng Zou:

Robust Hypothesis Testing with Kernel Uncertainty Sets. 3309-3314 - Jie Wang

, Yao Xie:
A Data-Driven Approach to Robust Hypothesis Testing Using Sinkhorn Uncertainty Sets. 3315-3320 - Han Wu

, Hamdi Joudeh:
On Joint Communication and Channel Discrimination. 3321-3326 - Ken-ichi Iwata

, Hirosuke Yamamoto
:
Joint Coding for Discrete Sources and Finite-State Noiseless Channels. 3327-3332 - Xi Zhang, Jingqing Wang, H. Vincent Poor:

Statistical QoS-Driven Beamforming and Trajectory Optimizations in UAV/IRS-Based 6G Wireless Networks in the Non-Asymptotic Regime. 3333-3338 - M. Ashok Kumar, Albert Sunny, Ashish Thakre, Ashisha Kumar, G. Dinesh Manohar:

A Unified Framework for Problems on Guessing, Source Coding, and Tasks Partitioning. 3339-3344 - Asaf Cohen, Neri Merhav:

Universal Randomized Guessing Subject to Distortion. 3345-3350 - Suayb S. Arslan, Elif Haytaoglu:

Improved Bounds on the Moments of Guessing Cost. 3351-3356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














