


default search action
IEEE Journal on Selected Areas in Information Theory, Volume 2
Volume 2, Number 1, March 2021
- H. Vincent Poor, Matthieu R. Bloch, Onur Günlü

, Frédérique E. Oggier, Lalitha Sankar, Rafael F. Schaefer
, Aylin Yener:
Editorial. 3-4 - Matthieu R. Bloch

, Onur Günlü
, Aylin Yener
, Frédérique E. Oggier, H. Vincent Poor
, Lalitha Sankar
, Rafael F. Schaefer
:
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. 5-22 - Ligong Wang

:
Covert Communication Over the Poisson Channel. 23-31 - Hamid Ghourchian

, Photios A. Stavrou
, Tobias J. Oechtering
, Mikael Skoglund
:
Secure Block Source Coding With Sequential Encoding. 32-48 - Alejandro Cohen

, Rafael G. L. D'Oliveira
, Salman Salamatian, Muriel Médard
:
Network Coding-Based Post-Quantum Cryptography. 49-64 - Mohamed S. Nafea

, Aylin Yener
:
Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II. 65-81 - Onur Günlü

, Rafael F. Schaefer
:
Controllable Key Agreement With Correlated Noise. 82-94 - Nasser Aldaghri

, Hessam Mahdavifar
:
Threshold-Secure Coding With Shared Key. 95-105 - Lawrence Ong

, Badri N. Vellambi
, Jörg Kliewer
, Phee Lep Yeoh
:
A Code and Rate Equivalence Between Secure Network and Index Coding. 106-120 - Zohaib Hassan Awan

, Aydin Sezgin
:
Secure MISO Broadcast Channel: An Interplay Between CSIT and Network Topology. 121-138 - Masahito Hayashi

, Tadashi Wadayama
, Ángeles Vázquez-Castro
:
Secure Computation-and-Forward With Linear Codes. 139-148 - Ahmed S. Bendary

, Amr Abdelaziz
, Can Emre Koksal
:
Achieving Positive Covert Capacity Over MIMO AWGN Channels. 149-162 - Yanina Y. Shkel

, H. Vincent Poor
:
A Compression Perspective on Secrecy Measures. 163-176 - Borzoo Rassouli

, Deniz Gündüz
:
On Perfect Privacy. 177-191 - Qifa Yan

, Daniela Tuninetti
:
Fundamental Limits of Caching for Demand Privacy Against Colluding Users. 192-207 - Shahab Asoodeh

, Jiachun Liao
, Flávio P. Calmon
, Oliver Kosut
, Lalitha Sankar
:
Three Variants of Differential Privacy: Lossless Conversion and Applications. 208-222 - Linghui Zhou

, Minh Thanh Vu
, Tobias J. Oechtering
, Mikael Skoglund
:
Two-Stage Biometric Identification Systems Without Privacy Leakage. 223-239 - Rafael G. L. D'Oliveira

, Salman Salamatian, Muriel Médard
, Parastoo Sadeghi
:
Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2). 240-252 - Jayadev Acharya

, Clément L. Canonne
, Cody Freitag, Ziteng Sun, Himanshu Tyagi
:
Inference Under Information Constraints III: Local Privacy Constraints. 253-267 - Abdullah Basar Akbay

, Weina Wang, Junshan Zhang
:
Impact of Social Learning on Privacy-Preserving Data Collection. 268-282 - Mahdi Soleymani

, Hessam Mahdavifar
, Amir Salman Avestimehr:
Analog Lagrange Coded Computing. 283-295 - Masahito Hayashi

, Ning Cai
:
Secure Non-Linear Network Code Over a One-Hop Relay Network. 296-305 - Zhen Chen

, Zhuqing Jia
, Zhiying Wang
, Syed Ali Jafar
:
GCSA Codes With Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication. 306-316 - Saeid Sahraei

, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Interactive Verifiable Polynomial Evaluation. 317-325 - Chien-Sheng Yang

, Amir Salman Avestimehr:
Coded Computing for Secure Boolean Computations. 326-337 - Farhad Shirani

, Siddharth Garg
, Elza Erkip
:
A Concentration of Measure Approach to Correlated Graph Matching. 338-351 - Mehrdad Tahmasbi

, Matthieu R. Bloch
:
On Covert Quantum Sensing and the Benefits of Entanglement. 352-365 - Zhusheng Wang

, Karim Banawan
, Sennur Ulukus
:
Multi-Party Private Set Intersection: An Information-Theoretic Approach. 366-379 - Seunghoan Song

, Masahito Hayashi
:
Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers. 380-390 - Swanand Kadhe

, Anoosheh Heidarzadeh
, Alex Sprintson
, Onur Ozan Koyluoglu:
Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes. 391-402 - Tao Guo

, Ruida Zhou
, Chao Tian
:
New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems. 403-414 - Hsuan-Yin Lin

, Siddhartha Kumar
, Eirik Rosnes
, Alexandre Graell i Amat
, Eitan Yaakobi
:
The Capacity of Single-Server Weakly-Private Information Retrieval. 415-427 - Yuxiang Lu

, Zhuqing Jia
, Syed Ali Jafar
:
Double Blind T-Private Information Retrieval. 428-440 - Jinhyun So

, Basak Güler
, Amir Salman Avestimehr:
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning. 441-451 - Ghadir Ayache

, Salim El Rouayheb:
Private Weighted Random Walk Stochastic Gradient Descent. 452-463 - Antonious M. Girgis

, Deepesh Data
, Suhas N. Diggavi, Peter Kairouz, Ananda Theertha Suresh:
Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs. 464-478 - Jinhyun So

, Basak Güler
, Amir Salman Avestimehr:
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning. 479-489
Volume 2, Number 2, June 2021
- Vincent Y. F. Tan

, Yao Xie
:
Editorial. 492-493 - Liyan Xie

, Shaofeng Zou
, Yao Xie
, Venugopal V. Veeravalli
:
Sequential (Quickest) Change Detection: Classical Results and New Directions. 494-514 - Chengshuai Shi

, Cong Shen
:
On No-Sensing Adversarial Multi-Player Multi-Armed Bandits With Collision Communications. 515-533 - Konstantinos E. Nikolakakis

, Dionysios S. Kalogerias
, Or Sheffet
, Anand D. Sarwate
:
Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme. 534-548 - Samarth Gupta

, Gauri Joshi
, Osman Yagan
:
Best-Arm Identification in Correlated Multi-Armed Bandits. 549-563 - Anusha Lalitha

, Andrea Goldsmith
:
Bayesian Algorithms for Decentralized Stochastic Bandits. 564-583 - Ilai Bistritz

, Tavor Z. Baharav
, Amir Leshem
, Nicholas Bambos
:
One for All and All for One: Distributed Learning of Fair Allocations With Multi-Player Bandits. 584-598 - Vivek Kumar Bagaria, Tavor Z. Baharav

, Govinda M. Kamath, David N. C. Tse:
Bandit-Based Monte Carlo Optimization for Nearest Neighbors. 599-610 - Junyu Zhang, Amrit Singh Bedi

, Mengdi Wang
, Alec Koppel
:
Cautious Reinforcement Learning via Distributional Risk in the Dual Domain. 611-626 - Salman Habib

, Allison Beemer
, Jörg Kliewer
:
Belief Propagation Decoding of Short Graph-Based Channel Codes via Reinforcement Learning. 627-640 - Daniel Vial

, Vijay G. Subramanian
:
Empirical Policy Evaluation With Supergraphs. 641-651 - Shuang Qiu

, Zhuoran Yang
, Jieping Ye, Zhaoran Wang:
On Finite-Time Convergence of Actor-Critic Algorithm. 652-664 - Michael K. Cohen

, Elliot Catt, Marcus Hutter
:
Curiosity Killed or Incapacitated the Cat and the Asymptotically Optimal Agent. 665-677 - Michael K. Cohen

, Badri N. Vellambi
, Marcus Hutter
:
Intelligence and Unambitiousness Using Algorithmic Information Theory. 678-690 - Jaehyeok Shin

, Aaditya Ramdas, Alessandro Rinaldo:
Nonparametric Iterated-Logarithm Extensions of the Sequential Generalized Likelihood Ratio Test. 691-704 - Shubhanshu Shekhar

, Mohammad Ghavamzadeh
, Tara Javidi
:
Active Learning for Classification With Abstention. 705-719 - Shachar Shayovitz

, Meir Feder:
Universal Active Learning via Conditional Mutual Information Minimization. 720-734 - Meng-Che Chang

, Matthieu R. Bloch
:
Evasive Active Hypothesis Testing. 735-746 - Liyan Xie

, Yao Xie
:
Sequential Change Detection by Optimal Weighted ℓ₂ Divergence. 747-761 - Georgios Rovatsos

, George V. Moustakides
, Venugopal V. Veeravalli
:
Quickest Detection of Moving Anomalies in Sensor Networks. 762-773 - Deniz Sargun

, Can Emre Koksal
:
Robust Change Detection via Information Projection. 774-783 - Haider Al-Lawati

, Tharindu Adikari
, Stark C. Draper
:
Asynchronous Delayed Optimization With Time-Varying Minibatches. 784-801 - Guanghui Lan, Yi Zhou

:
Asynchronous Decentralized Accelerated Stochastic Gradient Descent. 802-811
Volume 2, Number 3, September 2021
- Pulkit Grover

, Viveck R. Cadambe
, Sennur Ulukus, Stark C. Draper, Salman Avestimehr, Osvaldo Simeone:
Guest Editorial for Special Issue on Coded Computing. 813 - Burak Hasircioglu

, Jesús Gómez-Vilardebó
, Deniz Gündüz
:
Bivariate Polynomial Coding for Efficient Distributed Matrix Multiplication. 814-829 - M. Nikhil Krishnan

, Erfan Hosseini, Ashish Khisti
:
Coded Sequential Matrix Multiplication for Straggler Mitigation. 830-844 - Haewon Jeong

, Ateet Devulapalli, Viveck R. Cadambe
, Flávio P. Calmon
:
ϵ-Approximate Coded Matrix Multiplication Is Nearly Twice as Efficient as Exact Multiplication. 845-854 - Margalit Glasgow

, Mary Wootters
:
Approximate Gradient Coding With Optimal Decoding. 855-866 - Mahdi Soleymani

, Ramy E. Ali
, Hessam Mahdavifar
, Amir Salman Avestimehr:
List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier. 867-878 - Mahdi Soleymani

, Mohammad Vahid Jamali
, Hessam Mahdavifar
:
Coded Computing via Binary Linear Codes: Designs and Performance Limits. 879-892 - Asit Kumar Pradhan

, Anoosheh Heidarzadeh
, Krishna R. Narayanan
:
Factored LT and Factored Raptor Codes for Large-Scale Distributed Matrix Multiplication. 893-906 - Rafael G. L. D'Oliveira

, Salim El Rouayheb, Daniel Heinlein
, David A. Karpuk:
Degree Tables for Secure Distributed Matrix Multiplication. 907-918 - M. Nikhil Krishnan

, Erfan Hosseini, Ashish Khisti
:
Sequential Gradient Coding for Packet-Loss Networks. 919-930 - Ali Rahimi

, Mohammad Ali Maddah-Ali
:
Multi-Party Proof Generation in QAP-Based zk-SNARKs. 931-941 - Avishek Ghosh, Raj Kumar Maity

, Swanand Kadhe
, Arya Mazumdar
, Kannan Ramchandran:
Communication-Efficient and Byzantine-Robust Distributed Learning With Error Feedback. 942-953 - Navjot Singh

, Deepesh Data
, Jemin George
, Suhas N. Diggavi
:
SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization. 954-969 - Tharindu B. Adikari

, Stark C. Draper
:
Compressing Gradients by Exploiting Temporal Correlation in Momentum-SGD. 970-986 - Osama A. Hanna

, Yahya H. Ezzeldin
, Christina Fragouli
, Suhas N. Diggavi:
Quantization of Distributed Data for Learning. 987-1001 - Tayyebeh Jahani-Nezhad

, Mohammad Ali Maddah-Ali
:
Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding. 1002-1011 - Sanghamitra Dutta

, Jianyu Wang
, Gauri Joshi
:
Slow and Stale Gradients Can Win the Race. 1012-1024 - Alejandro Cohen

, Guillaume Thiran
, Homa Esfahanizadeh, Muriel Médard
:
Stream Distributed Coded Computing. 1025-1040 - Derya Malak

, Muriel Médard
:
Function Load Balancing Over Networks. 1041-1056 - Ali Khalesi

, Mahtab Mirmohseni
, Mohammad Ali Maddah-Ali:
The Capacity Region of Distributed Multi-User Secret Sharing. 1057-1071 - Fredrik Hellström

, Giuseppe Durisi
:
Corrections to "Generalization Bounds via Information Density and Conditional Information Density". 1072-1073
Volume 2, Number 4, December 2021
- Elza Erkip

, Deniz Gündüz
, Stratis Ioannidis
, Jörg Kliewer, Derya Malak
, Muriel Médard
, R. Srikant
:
JSAIT Editorial for the Special Issue on "Beyond Errors and Erasures: Coding for Data Management and Delivery in Networks". 1075-1077 - Manuj Mukherjee

, Ran Gelles
:
Multiparty Interactive Coding Over Networks of Intersecting Broadcast Links. 1078-1092 - Nitish Mital

, Katina Kralevska
, Cong Ling
, Deniz Gündüz
:
Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems. 1093-1107 - Sijie Li

, Rawad Bitar
, Sidharth Jaggi
, Yihan Zhang
:
Network Coding With Myopic Adversaries. 1108-1119 - Yanyan Dong

, Sheng Jin, Yanzuo Chen, Shenghao Yang
, Hoover H. F. Yin
:
Utility Maximization for Multihop Wireless Networks Employing BATS Codes. 1120-1134 - Hoover H. F. Yin

, Ka Hei Ng, Allen Z. Zhong
, Raymond W. Yeung
, Shenghao Yang
, Ian Y. Y. Chan:
Intrablock Interleaving for Batched Network Coding With Blockwise Adaptive Recoding. 1135-1149 - Hoover H. F. Yin

, Bin Tang
, Ka Hei Ng, Shenghao Yang
, Xishi Wang, Qiaoqiao Zhou
:
A Unified Adaptive Recoding Framework for Batched Network Coding. 1150-1164 - Mahdi Haghifam

, M. Nikhil Krishnan
, Ashish Khisti
, Xiaoqing Zhu
, Wai-Tian Tan, John G. Apostolopoulos:
On Streaming Codes With Unequal Error Protection. 1165-1179 - Alireza Vahid

:
Topological Content Delivery With Feedback and Random Receiver Cache. 1180-1190 - Alireza Vahid

, Shih-Chun Lin
, I-Hsiang Wang
, Yi-Chun Lai:
Content Delivery Over Broadcast Erasure Channels With Distributed Random Cache. 1191-1205 - Yasser Fadlallah

, Othmane Oubejja
, Sarah Kamel, Philippe Ciblat
, Michèle A. Wigger
, Jean-Marie Gorce:
Cache-Aided Polar Coding: From Theory to Implementation. 1206-1223 - Hui Wang

, Qingchun Chen
, Qin Huang, Xiaohu Tang
:
Reliable Coded Caching Design Over Wireless Networks. 1224-1239 - Abdelrahman M. Ibrahim

, Ahmed A. Zewail
, Aylin Yener
:
Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches. 1240-1252 - Suman Ghosh

, Prasad Krishnan
, Lakshmi Prasad Natarajan
:
Blind Updates in Coded Caching. 1253-1265 - Kota Srinivas Reddy

, Nikhil Karamchandani
:
Structured Index Coding Problem and Multi-Access Coded Caching. 1266-1281 - Arman Sharififar

, Neda Aboutorab
, Parastoo Sadeghi
:
An Update-Based Maximum Column Distance Coding Scheme for Index Coding. 1282-1299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














