default search action
ISIT 2023: Taipei, Taiwan
- IEEE International Symposium on Information Theory, ISIT 2023, Taipei, Taiwan, June 25-30, 2023. IEEE 2023, ISBN 978-1-6654-7554-9
- Hassan ZivariFard, Xiaodong Wang:
Covert Communication When Action-Dependent States is Available Non-Causally at the Transmitter. 1-6 - K. R. Sahasranand, Aslan Tchamkerten:
Feedback Increases the Capacity of Queues with Finite Support Service Times. 7-12 - Amos Lapidoth, Baohua Ni:
The Identification Capacity of the Modulo-Additive Noise Channel with Help. 13-14 - Jan Hazla:
Optimal List Decoding from Noisy Entropy Inequality. 15-18 - Yunqi Wan, Jiongyue Xing, Yuliang Huang, Ting-Yi Wu, Bo Bai, Gong Zhang:
The Re-encoding Transform in Algebraic List Decoding of Algebraic Geometric Codes. 19-24 - Haojie Gu, Hong Lu, Jun Zhang:
Improved Singleton-type bounds for list-decoding and average-radius list-decoding. 25-29 - V Arvind Rameshwar, Navin Kashyap:
A Version of Delsarte's Linear Program for Constrained Systems. 30-35 - Anzo Teh, Yury Polyanskiy:
Comparing Poisson and Gaussian channels. 36-41 - Lampros Gavalakis:
Discrete Generalised Entropy Power Inequalities for Log-Concave Random Variables. 42-47 - Romain Chor, Milad Sefidgaran, Abdellatif Zaidi:
More Communication Does Not Result in Smaller Generalization Error in Federated Learning. 48-53 - Maximilian Egger, Christoph Hofmeister, Antonia Wachter-Zeh, Rawad Bitar:
Private Aggregation in Wireless Federated Learning with Heterogeneous Clusters. 54-59 - Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti:
Quadratic Functional Encryption for Secure Training in Vertical Federated Learning. 60-65 - Yanina Y. Shkel, Anuj Kumar Yadav:
Information Spectrum Converse for Minimum Entropy Couplings and Functional Representations. 66-71 - Anuran Makur, Japneet Singh:
On Properties of Doeblin Coefficients. 72-77 - Shaocheng Liu, Qi Chen:
Entropy Functions on Two-Dimensional Faces of Polymatroidal Region of Degree Four. 78-83 - Paula Belzig, Matthias Christandl, Alexander Müller-Hermes:
Fault-Tolerant Coding for Entanglement-Assisted Communication. 84-89 - Hao-Chung Cheng:
A Simple and Tighter Derivation of Achievability for Classical-Quantum Channel Coding. 90-95 - Ian George, Min-Hsiu Hsieh, Eric Chitambar:
One-Shot Bounds on State Generation using Correlated Resources and Local Encoders. 96-101 - Anirudh Sridhar, Tirza Routtenberg, H. Vincent Poor:
Quickest Inference of Susceptible-Infected Cascades in Sparse Networks. 102-107 - Jianjun Zhu, Fan Li, Jinyuan Chen:
Communication-Efficient and Error-Free Gradecast with Optimal Resilience. 108-113 - Gustavo Kasper Facenda, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming Erasure Codes over Multicast Relayed Networks. 114-119 - Jianlin Guo, Toshiaki Koike-Akino, Pu Wang, Kieran Parsons, Philip V. Orlik, Jothi Prasanna Shanmuga Sundaram, Takenori Sumi, Yukimasa Nagai:
Rateless Coding for Multi-Hop Broadcast Transmission in Wireless IoT Networks. 120-125 - Elizabath Peter, B. Sundar Rajan:
Multi-antenna Coded Caching with Combinatorial Multi-access Networks. 126-131 - Milad Abolpour, Mohammad Javad Salehi, Antti Tölli:
Cache-Aided Communications in MISO Networks with Dynamic User Behavior: A Universal Solution. 132-137 - Minquan Cheng, Jinwei Xu, Mingming Zhang, Youlong Wu:
Coded Caching Scheme for Two-Dimensional Caching-Aided Ultra-Dense Networks. 138-143 - Minquan Cheng, Kai Wan, Petros Elia, Giuseppe Caire:
Coded Caching Schemes for Multi-Access Topologies via Combinatorial Design Theory. 144-149 - Keenan J. A. Down, Pedro A. M. Mediano:
A Logarithmic Decomposition for Information. 150-155 - Yufan Li, Zhou Fan, Subhabrata Sen, Yihong Wu:
Random linear estimation with rotationally-invariant designs: Asymptotics at high temperature. 156-161 - Andreas Bluhm, Ángela Capel, Paul Gondolf, Antonio Pérez-Hernández:
General Continuity Bounds for Quantum Relative Entropies. 162-167 - Kaan Ozkara, Bruce Huang, Suhas N. Diggavi:
Personalized PCA for Federated Heterogeneous Data. 168-173 - Rajarshi Saha, Mohamed Seif, Michal Yemini, Andrea J. Goldsmith, H. Vincent Poor:
Collaborative Mean Estimation over Intermittently Connected Networks with Peer-To-Peer Privacy. 174-179 - Renpu Liu, Jing Yang, Cong Shen:
Exploiting Feature Heterogeneity for Improved Generalization in Federated Multi-task Learning. 180-185 - Hasin Us Sami, Basak Güler:
Secure Aggregation for Clustered Federated Learning. 186-191 - Hao-Chung Cheng, Li Gao:
Tight Analysis of Convex Splitting with Applications in Quantum Information Theory. 192-197 - Elyakim Zlotnick, Boulat A. Bash, Uzi Pereg:
Entanglement-Assisted Covert Communication via Qubit Depolarizing Channels. 198-203 - Christoph Hirche, Xinyue Guan, Marco Tomamichel:
Chain Rules for Rényi Information Combining. 204-209 - Saurabh Kumar Gupta, Abhishek K. Gupta:
Characterizing Acceptance in Post-Selection One-Shot Quantum Hypothesis Testing. 210-215 - Jingfan Meng, Ziheng Liu, Yiwei Wang, Jun (Jim) Xu:
RECIPE: Rateless Erasure Codes Induced by Protocol-Based Encoding. 216-221 - Dor Elimelech, Moshe Schwartz:
The Optimal Rate of Second-Order Generalized-Covering Codes. 222-227 - Sijie Li, Prasad Krishnan, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Computationally Efficient Codes for Adversarial Binary-Erasure Channels. 228-233 - Daniel Byrne, Lawrence Ong, Parastoo Sadeghi, Badri N. Vellambi:
Preferential Pliable Index Coding. 234-239 - Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:
A Lower and Upper Bound on the Epsilon-Uniform Common Randomness Capacity. 240-245 - Sebastian Bitzer, Alessio Pavoni, Violetta Weger, Paolo Santini, Marco Baldi, Antonia Wachter-Zeh:
Generic Decoding of Restricted Errors. 246-251 - Hari Krishnan P. Anilkumar, Aayush Rajesh, Varun Narayanan, Manoj M. Prabhakaran, Vinod M. Prabhakaran:
Randomness Requirements for Three-Secret Sharing. 252-257 - Maki Yoshida:
On the Communication Complexity of Private Function Sharing and Computation. 258-263 - Peng Wang, Yong Liang Guan, Lipo Wang, Peng Cheng:
Fast Blind Recovery of Linear Block Codes over Noisy Channels. 264-269 - Irina E. Bocharova, Boris D. Kudryashov, Sander Mikelsaar, Vitaly Skachek:
Bound on the ML Decoding Error Probability for Coded QAM Signals with Shaping. 270-275 - Dipak Kumar Bhunia, Cristina Fernández-Córdoba, Mercè Villanueva:
On ℤ2ℤ4ℤ8-Additive Hadamard Codes. 276-281 - Talha Arikan, Baran Düzgün, Kamil Otal, Ferruh Özbudak:
A New Construction of Asymptotically Optimal Almost Affinely Disjoint Spaces. 282-285 - Qin Huang, Bin Zhang:
Minimal Derivative Descendants of Cyclic Codes. 286-291 - Fabian Göttsch, Noboru Osawa, Takeo Ohseki, Yoshiaki Amano, Issei Kanno, Kosuke Yamazaki, Giuseppe Caire:
User-Centric Clustering Under Fairness Scheduling in Cell-Free Massive MIMO. 292-297 - Bharath Shamasundar, Aria Nosratinia:
Spatial Modulation vs. Single-Antenna Transmission: When is Indexing Helpful? 298-303 - Deokhwan Han, Jeonghun Park, Namyoon Lee:
Achieving Massive MIMO Gains in FDD Downlink Systems Without CSI Feedback. 304-309 - Chan Xu, Shuowen Zhang:
MIMO Radar Transmit Signal Optimization for Target Localization Exploiting Prior Information. 310-315 - Jiuyu Liu, Yi Ma, Rahim Tafazolli:
Achieving Maximum-likelihood Detection Performance with Square-order Complexity in Large Quasi-Symmetric MIMO Systems. 316-321 - Mason DiCicco, Daniel Reichman:
The Learning and Communication Complexity of Subsequence Containment. 322-327 - Samir M. Perlaza, Iñaki Esnaola, Gaetan Bisson, H. Vincent Poor:
On the Validation of Gibbs Algorithms: Training Datasets, Test Datasets and their Aggregation. 328-333 - David X. Wu, Anant Sahai:
Lower Bounds for Multiclass Classification with Overparameterized Linear Models. 334-339 - Francisco Daunas, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor:
Analysis of the Relative Entropy Asymmetry in the Regularization of Empirical Risk Minimization. 340-345 - K. Nithin Varma, Sahin Lale, Babak Hassibi:
The Asymptotic Distribution of the Stochastic Mirror Descent Iterates in Linear Models. 346-351 - Johan Chrisnata, Han Mao Kiah, Van Long Phuoc Pham:
Deletion Correcting Codes for Efficient DNA Synthesis. 352-357 - Adrian Vidal, Viduranga Bandara Wijekoon, Emanuele Viterbo:
Union Bound for Generalized Duplication Channels with DTW Decoding. 358-363 - Anisha Banerjee, Yonatan Yehezkeally, Antonia Wachter-Zeh, Eitan Yaakobi:
Error-Correcting Codes for Nanopore Sequencing. 364-369 - Daniella Bar-Lev, Omer Sabary, Ryan Gabrys, Eitan Yaakobi:
Cover Your Bases: How to Minimize the Sequencing Coverage in DNA Storage Systems. 370-375 - Brendon McBain, Emanuele Viterbo, James Saunderson:
Homophonic Coding for the Noisy Nanopore Channel with Constrained Markov Sources. 376-381 - Narayana Prasad Santhanam, Mayank Bakshi:
Universal Compression of High Dimensional Gaussian Vectors with James-Stein shrinkage. 382-387 - Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:
Pointwise Maximal Leakage on General Alphabets. 388-393 - Peter Harremoës, Tyron Lardy, Peter Grünwald:
Universal Reverse Information Projections and Optimal E-statistics. 394-399 - Amedeo Roberto Esposito, Marco Mondelli:
Concentration without Independence via Information Measures. 400-405 - Osama A. Hanna, Xinlin Li, Suhas N. Diggavi, Christina Fragouli:
Common Information Dimension. 406-411 - Aravind V. R, Pradeep Kiran Sarvepalli, Andrew Thangaraj:
Generalizations and Extensions to Lifting Constructions for Coded Caching. 412-417 - Kota Srinivas Reddy, Nikhil Karamchandani:
Multi-access Coded Caching with Linear Subpacketization. 418-423 - Yinbin Ma, Daniela Tuninetti:
Demand Privacy in Hotplug Caching Systems. 424-429 - Xianzhang Wu, Minquan Cheng, Li Chen, Congduan Li:
Coded Caching Design for Dynamic Networks with Reduced Subpacketizations. 430-435 - Zhengrui Li, Wai Ho Mow, Yunghsiang S. Han, Ting-Yi Wu:
Cache-Aided Distributed Storage Systems. 436-441 - Wafa Labidi, Christian Deppe, Holger Boche:
Joint Identification and Sensing for Discrete Memoryless Channels. 442-447 - Mohammad Javad Salariseddigh, Vahid Jamali, Holger Boche, Christian Deppe, Robert Schober:
Deterministic Identification for MC Binomial Channel. 448-453 - Gergely Flamich, Lucas Theis:
Adaptive Greedy Rejection Sampling. 454-459 - Ryo Nomura:
Optimum Self-Random Number Generation Rate and Its Application to RDP Function. 460-465 - Han Wu, Hamdi Joudeh:
Soft Guessing Under Logarithmic Loss. 466-471 - Go Kato, Mikio Fujiwara, Toyohiro Tsurumaru:
Information-theoretically secure equality-testing protocol with dispute resolution. 472-476 - Thomas Johansson, Willi Meier, Vu Nguyen:
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs. 477-482 - Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav:
On the (Im)possibility of Commitment over Gaussian Unfair Noisy Channels. 483-488 - Alessandro Budroni, Erik Mårtensson:
Improved Estimation of Key Enumeration with Applications to Solving LWE. 495-500 - Agostino Capponi, Mihailo Stojnic:
Causal Inference - closed form expressions for worst case typical phase transitions. 501-506 - Agostino Capponi, Mihailo Stojnic:
Phase Transitions: Explicit relations for sparse vector and low rank recovery. 507-512 - Yigit Efe Erginbas, Justin Singh Kang, Amirali Aghazadeh, Kannan Ramchandran:
Efficiently Computing Sparse Fourier Transforms of q-ary Functions. 513-518 - Lei Liu, Yuhao Chi, Ying Li, Zhaoyang Zhang:
Generalized Linear Systems with OAMP/VAMP Receiver: Achievable Rate and Coding Principle. 519-524 - Eric Lei, Hamed Hassani, Shirin Saeedi Bidokhti:
Federated Neural Compression Under Heterogeneous Data. 525-530 - Giuseppe Serra, Photios A. Stavrou, Marios Kountouris:
Computation of Rate-Distortion-Perception Function under f-Divergence Perception Constraints. 531-536 - Yuta Nakahara, Shota Saito, Koshi Shimada, Toshiyasu Matsushima:
Hyperparameter Learning of Bayesian Context Tree Models. 537-542 - Emrah Akyol, Anju Anand:
Strategic Quantization. 543-548 - Lucas Monteiro Paes, Rodrigo Cruz, Flávio P. Calmon, Mario Díaz:
On the Inevitability of the Rashomon Effect. 549-554 - Sattar Vakili, Michael Bromberg, Jezabel R. Garcia, Da-Shan Shiu, Alberto Bernacchia:
Information Gain and Uniform Generalization Bounds for Neural Kernel Models. 555-560 - Navjot Singh, Suhas N. Diggavi:
Representation Transfer Learning via Multiple Pre-trained models for Linear Regression. 561-566 - Dganit Hanania, Daniella Bar-Lev, Yevgeni Nogin, Yoav Shechtman, Eitan Yaakobi:
On the Capacity of DNA Labeling. 567-572 - Tuan Thanh Nguyen, Kui Cai, Han Mao Kiah, Duc Tu Dao, Kees A. Schouhamer Immink:
On the Design of Codes for DNA Computing: Secondary Structure Avoidance Codes. 573-578 - Avital Boruchovsky, Daniella Bar-Lev, Eitan Yaakobi:
DNA-Correcting Codes: End-to-end Correction in DNA Storage Systems. 579-584 - Maria Abu Sini, Andreas Lenz, Eitan Yaakobi:
DNA Synthesis Using Shortmers. 585-590 - Akram Saleh, M. Reza Soleymani:
A Novel Construction Technique for Some Classes of Quasi-Cyclic Codes. 591-595 - Sudarshan Adiga, Xin Xiao, Ravi Tandon, Bane Vasic, Tamal Bose:
Generalization Bounds for Neural Belief Propagation Decoders. 596-601 - Jean-François Biasse, Giacomo Micheli:
A Search-to-Decision Reduction for the Permutation Code Equivalence Problem. 602-607 - Yixin Wang, Xiao Ma:
On Reliably Decodable Information Bits of Linear Codes. 608-612 - Avijit Mandal, Sarah Brandsen, Henry D. Pfister:
Belief-Propagation with Quantum Messages for Polar Codes on Classical-Quantum Channels. 613-618 - Varsha Tiwari, Pramod Kumar Kewat:
CSS codes and QSCs from Whiteman's Generalized Cyclotomy of order four. 619-624 - Wouter Rozendaal, Gilles Zémor:
A Worst-Case Analysis of a Renormalisation Decoder for Kitaev's Toric Code. 625-629 - Eric Chitambar, Felix Leditzky:
On the Duality of Teleportation and Dense Coding. 630-635 - Zuo Ye, Ohad Elishco:
Codes Over Absorption Channels. 636-641 - Tamoghno Nath, Adrish Banerjee:
On Novel ISI-Reducing Channel Codes for Molecular Communication via Diffusion. 642-647 - Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. 648-653 - Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. 654-659 - Yifeng Chu, Maxim Raginsky:
Majorizing Measures, Codes, and Information. 660-665 - Jingbo Liu:
From Soft-Minoration to Information-Constrained Optimal Transport and Spiked Tensor Models. 666-671 - Cheng-Yu Pai, Zi Long Liu, Chunlei Li, Chao-Yu Chen:
Sparse Complementary Pairs with Additional Aperiodic ZCZ Property. 672-677 - Yu Tsunoda, Yuichiro Fujiwara:
The Asymptotics of Difference Systems of Sets for Synchronization and Phase Detection. 678-683 - Yeow Meng Chee, Tien Long Nguyen, Vinh Duc Tran, Van Khu Vu:
Maximal Length Constrained de Bruijn Sequences. 684-689 - Dan Zhang, Staal Amund Vinterbo:
A New Family of Perfect Polyphase Sequences with Low Cross-Correlation. 690-694 - Dor Tsur, Bashar Huleihel, Haim H. Permuter:
Rate Distortion via Constrained Estimated Mutual Information Minimization. 695-700 - Ezgi Özyilkan, Johannes Ballé, Elza Erkip:
Learned Wyner-Ziv Compressors Recover Binning. 701-706 - Teng-Hui Huang, Hesham El Gamal:
Efficient Alternating Minimization Solvers for Wyner Multi-View Unsupervised Learning. 707-712 - Hesam Nikpey, Saswati Sarkar, Shirin Saeedi Bidokhti:
Compression with Unlabeled Graph Side Information. 713-718 - Heng Zhu, Avishek Ghosh, Arya Mazumdar:
Optimal Compression of Unit Norm Vectors in the High Distortion Regime. 719-724 - Zhusheng Wang, Sennur Ulukus:
Private Set Union Based Approach to Enable Private Federated Submodel Learning. 725-730 - Francesco Pase, Szymon Kobus, Deniz Gündüz, Michele Zorzi:
Semantic Communication of Learnable Concepts. 731-736 - Yauhen Yakimenka, Chung-Wei Weng, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Differentially-Private Collaborative Online Personalized Mean Estimation. 737-742 - Mohammad Aamir Sohail, Touheed Anwar Atif, S. Sandeep Pradhan:
A New Formulation of Lossy Quantum-Classical and Classical Source Coding based on a Posterior Channel. 743-748 - Zahra Baghali Khanian, Kohdai Kuroiwa, Debbie Leung:
Rate-Distortion Theory for Mixed States. 749-754 - Kaiyuan Ji, Eric Chitambar:
Entropic and Operational Characterizations of Dynamic Quantum Resources. 755-760 - Sayantan Chakraborty, Upendra Kapshikar:
A novel chain rule for one-shot entropic quantities via operational methods. 761-766 - Takashi Takahashi:
Role of Bootstrap Averaging in Generalized Approximate Message Passing. 767-772 - Pablo Pascual Cobo, Kuan Hsieh, Ramji Venkataramanan:
Bayes-Optimal Estimation in Generalized Linear Models via Spatial Coupling. 773-778 - Dang Qua Nguyen, Taejoon Kim:
On The Stability of Approximate Message Passing with Independent Measurement Ensembles. 779-784 - Yizhou Xu, Yuhao Liu, Shansuo Liang, Ting-Yi Wu, Bo Bai, Jean Barbier, TianQi Hou:
Capacity-Achieving Sparse Regression Codes via Vector Approximate Message Passing. 785-790 - Kel Levick, Ilan Shomorony:
Fundamental Limits of Multiple Sequence Reconstruction from Substrings. 791-796 - Shubhransh Singhvi, Avital Boruchovsky, Han Mao Kiah, Eitan Yaakobi:
Data-Driven Bee Identification for DNA Strands. 797-802 - Kayvon Mazooji, Ilan Shomorony:
Substring Density Estimation from Traces. 803-808 - Krishna Gopal Benerjee, Adrish Banerjee:
Bounds on Size of Homopolymer Free Codes. 809-814 - Chao Chen, Yunghsiang S. Han, Nianqi Tang, Sian-Jheng Lin, Baoming Bai, Xiao Ma:
An Early-Termination Method for the Welch-Berlekamp Algorithm. 815-819 - Thomas Jerkovits, Hannes Bartz, Antonia Wachter-Zeh:
Randomized Decoding of Linearized Reed-Solomon Codes Beyond the Unique Decoding Radius. 820-825 - Zhongwei Li, Yunghsiang Sam Han, Sian-Jheng Lin, Chao Chen:
An Efficient Reed-Solomon Erasure Code over Cantor-constructed Binary Extension Finite Fields. 826-831 - Yizhou Zhao, Hua Sun:
The Optimal Rate of MDS Variable Generation. 832-837 - Zihui Yan, Guanjin Qu, Huaming Wu:
A Novel Soft-In Soft-Out Decoding Algorithm for VT Codes on Multiple Received DNA Strands. 838-843 - Ben Langton, Netanel Raviv:
A Generalized Covering Algorithm for Chained Codes. 844-849 - Lang He, Min Ye:
The size of Levenshtein ball with radius 2: Expectation and concentration bound. 850-855 - Chih Wei Ling, Cheuk Ting Li:
Vector Quantization with Error Uniformly Distributed over an Arbitrary Set. 856-861 - Naruki Shinohara, Hideki Yagi:
Utility-Privacy Trade-Offs with Limited Leakage for Encoder. 862-867 - Szymon Kobus, Tze-Yang Tung, Deniz Gündüz:
Goal-oriented Compression with a Constrained Decoder. 868-873 - Ruze Zhang, Xuan Guang:
Zero-Error Distributed Function Compression. 874-879 - Shibsankar Das, Adrish Banerjee, Udaya Parampalli:
Two-Dimensional Z-Complementary Array Quads with Low Column Sequence PMEPRs. 880-885 - Jin Sima, Yun-Han Li, Ilan Shomorony, Olgica Milenkovic:
On Constant-Weight Binary B2-Sequences. 886-891 - Xiaoxiang Jin, Sangwon Chae, Hyunwoo Cho, Hyojeong Choi, Gangsan Kim, Hong-Yeop Song:
Zero-Correlation-Zone Sonar Sequences. 892-896 - Gangsan Kim, Hyojeong Choi, Daekyeong Kim, Won Jun Kim, Xiaoxiang Jin, Hong-Yeop Song:
Optimal Uncorrelated Polyphase ZCZ Sequences over an Alphabet of Minimum size. 897-902 - Ruida Zhou, Chao Tian, Tie Liu:
Exactly Tight Information-Theoretic Generalization Error Bound for the Quadratic Gaussian Problem. 903-908 - Yu-Jui Huang, Shih-Chun Lin, Yu-Chih Huang, Kuan-Hui Lyu, Hsin-Hua Shen, Wan-Yi Sabrina Lin:
On characterizing optimal Wasserstein GAN solutions for non-Gaussian data. 909-914 - Monica Welfert, Kyle Otstot, Gowtham R. Kurri, Lalitha Sankar:
(αD, αG)-GANs: Addressing GAN Training Instabilities via Dual Objectives. 915-920 - Xingyu Lu, Basak Güler:
Breaking the Quadratic Communication Overhead of Secure Multi-Party Neural Network Training. 921-926 - Ittai Rubinstein, Roni Con:
Improved Upper and Lower Bounds on the Capacity of the Binary Deletion Channel. 927-932 - William Lu, Anuran Makur:
Permutation Sum-Capacity of Binary Adder Multiple-Access Channels. 933-938 - Michael Langberg, Oron Sabag:
Competitive Channel-Capacity. 939-944 - Jun Su, Guangyue Han, Shlomo Shamai Shitz:
Feedback Capacity of OU-Colored AWGN Channels. 945-950 - Siqi Fan, Yuxin Zhong, I-Hong Hou, Clement Kam:
Minimizing Moments of AoI for Both Active and Passive Users through Second-Order Analysis. 951-956 - Priyanka Kaswan, Sennur Ulukus:
Age of Information With Non-Poisson Updates in Cache-Updating Networks. 957-962 - Priyanka Kaswan, Sennur Ulukus:
Reliable and Unreliable Sources in Age-Based Gossiping. 963-968 - Zhiling Yue, Howard H. Yang, Meng Zhang, Nikolaos Pappas:
Age of Information Under Frame Slotted ALOHA in Random Access Networks. 969-974 - Sayantan Chakraborty, Aditya Nema, Francesco Buscemi:
Generalized resource theory of purity: one-shot purity distillation with local noisy operations and one way classical communication. 980-984 - Matthias Christandl, Mads Friis Frand-Madsen:
On the Relation between Quantum Data Hiding and Quantum Key Distribution. 985-990 - Yu-Chen Shen, Li Gao, Hao-Chung Cheng:
Optimal Second-Order Rates for Quantum Information Decoupling. 991-996 - Wrya K. Kadir, Hsuan-Yin Lin, Eirik Rosnes:
Efficient Interpolation-Based Decoding of Reed-Solomon Codes. 997-1002 - Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. 1003-1008 - Harshithanjani Athi, Rasagna Chigullapally, Prasad Krishnan, V. Lalitha:
On the Structure of Higher Order MDS Codes. 1009-1014 - Chao Chen, Sian-Jheng Lin, Zhongwei Li, Suihua Cai, Yunghsiang S. Han, Bo Bai:
Reduced-Complexity Erasure Decoding of Low-Rate Reed-Solomon Codes Based on LCH-FFT. 1015-1019 - Ying Jin:
Upper bounds on the Natarajan dimensions of some function classes. 1020-1025 - Akshayaa Magesh, Venugopal V. Veeravalli, Anirban Roy, Susmit Jha:
Principled OOD Detection via Multiple Testing. 1026-1031 - Xiangxiang Xu, Lizhong Zheng:
Kernel Subspace and Feature Extraction. 1032-1037 - Mehdi Molkaraie:
The Exact Determinant of a Specific Class of Sparse Positive Definite Matrices. 1038-1043 - Ahmed Elshafiy, Mahmoud Namazi, Kenneth Rose:
A Stochastic Rate-Distortion Approach to Supervised Learning Systems. 1044-1049 - Photios A. Stavrou, Yanina Shkel, Marios Kountouris:
Indirect Rate Distortion Functions with f-Separable Distortion Criterion. 1050-1055 - Yassine Hamdi, Deniz Gündüz:
The Rate-Distortion-Perception Trade-off with Side Information. 1056-1061 - Nir Weinberger, Ilan Shomorony:
Fundamental Limits of Reference-Based Sequence Reordering. 1062-1067 - Xueyan Niu, Deniz Gündüz, Bo Bai, Wei Han:
Conditional Rate-Distortion-Perception Trade-Off. 1068-1073 - Chunhui Chen, Xueyan Niu, Wenhao Ye, Shitong Wu, Bo Bai, Weichao Chen, Sian-Jheng Lin:
Computation of Rate-Distortion-Perception Functions With Wasserstein Barycenter. 1074-1079 - Wei An, Muriel Médard, Ken R. Duffy:
Soft decoding without soft demapping with ORBGRAND. 1080-1084 - Zeynep Ece Kizilates, Arslan Riaz, Giacomo F. Coraluppi, Muriel Médard, Ken R. Duffy, Rabia Tugce Yazicigil:
Leveraging Noise Recycling in Soft Detection Decoding Using ORBGRAND. 1085-1089 - Hadi Sarieddeen, Peihong Yuan, Muriel Médard, Ken R. Duffy:
Soft-input, soft-output joint data detection and GRAND: A performance and complexity analysis. 1090-1095 - Marwan Jalaleddine, Huayi Zhou, Jiajie Li, Warren J. Gross:
Partial Ordered Statistics Decoding with Enhanced Error Patterns. 1096-1100 - Michael Rudow, K. V. Rashmi:
Learning-augmented streaming codes for variable-size messages under partial burst losses. 1101-1106 - Takayuki Nozaki:
Rate-Optimal Streaming Codes over Small Finite Fields for Burst/Random Erasure Channels. 1107-1111 - M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, P. Vijay Kumar:
Explicit Information-Debt-Optimal Streaming Codes With Small Memory. 1112-1117 - Vinayak Ramkumar, Shobhit Bhatnagar, P. Vijay Kumar:
Near-Optimal Streaming Codes with Linear Field Size. 1118-1123 - Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, Chih-Chun Wang:
Detailed Asymptotics of the Delay-Reliability Tradeoff of Random Linear Streaming Codes. 1124-1129 - Tuan Thanh Nguyen, Panpan Li, Kui Cai, Kees A. Schouhamer Immink:
Locally Mitigating Sneak-Path Interference in Resistive Memory Arrays. 1130-1135 - Yuval Ben-Hur, Yuval Cassuto:
Construction and Decoding of Codes over the Dual-Parameter Barrier Error Model. 1136-1141 - Jiaojiao Wang, Zitan Chen:
Low-access repair of Reed-Solomon codes in rack-aware storage. 1142-1147 - Shuche Wang, Van Khu Vu, Vincent Y. F. Tan:
Codes for Correcting t Limited-Magnitude Sticky Deletions. 1148-1153 - Arian Eamaz, Farhang Yeganegi, Deanna Needell, Mojtaba Soltanalian:
One-Bit Quadratic Compressed Sensing: From Sample Abundance to Linear Feasibility. 1154-1159 - Sravan Kumar Ankireddy, S. Ashwin Hebbar, Yihan Jiang, Pramod Viswanath, Hyeji Kim:
Compressed Error HARQ: Feedback Communication on Noise-Asymmetric Channels. 1160-1165 - Mahdi Soleymani, Qiang Liu, Hessam Mahdavifar, Laura Balzano:
Matrix Completion over Finite Fields: Bounds and Belief Propagation Algorithms. 1166-1171 - Saikiran Bulusu, Venkata Gandikota, Pramod K. Varshney:
1-Bit Compressed Sensing with Local Sparsity Patterns. 1172-1177 - Teng Fu, Yuhao Liu, Jean Barbier, Marco Mondelli, Shansuo Liang, TianQi Hou:
Mismatched estimation of non-symmetric rank-one matrices corrupted by structured noise. 1178-1183 - Jian-Jia Weng, Fady Alajaji, Tamás Linder:
Capacity of Finite-State Two-Way Channels. 1184-1189 - Jonathan Ponniah, Liang-Liang Xie:
A Framework for Information-Theoretic Converses. 1190-1195 - Mohammad Kazemi, Tolga M. Duman:
Capacity Bounds for the Poisson-Repeat Channel. 1196-1201 - Johannes Rosenberger, Abdalla Ibrahim, Boulat A. Bash, Christian Deppe, Roberto Ferrara, Uzi Pereg:
Capacity Bounds for Identification With Effective Secrecy. 1202-1207 - Amos Lapidoth, Yiming Yan:
On the Zero-Error Capacity with Helper. 1208-1212 - Vanlalruata Ralte, Amitalok J. Budkuley, Stefano Rini:
Optimal Strategies for Distributed Sampling and Detection of Poisson Processes. 1213-1218 - Xiao-Wen Chang, Qincheng Lu, Yingzi Xu:
Success Probabilities of L2-norm Regularized Babai Detectors and Maximization. 1219-1224 - Eeshan Modak, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Hypothesis Testing for Adversarial Channels: Chernoff-Stein Exponents. 1225-1230 - Ran Tamir:
On Correlation Detection of Gaussian Databases via Local Decision Making. 1231-1236 - Asaf Rotenberg, Wasim Huleihel, Ofer Shayevitz:
Detecting a Planted Bipartite Graph. 1237-1242 - Joshua Brakensiek, Manik Dhar, Sivakanth Gopi:
Improved Field Size Bounds for Higher Order MDS Codes. 1243-1248 - Jingjie Lv, Weijun Fang, Bin Chen, Shu-Tao Xia, Xiangyu Chen:
Binary MDS Array Codes with Flexible Array Dimensions and Their Fast Encoding. 1249-1254 - Fuqiang Sun, Qin Huang, Jiayi Rui, Ting-Yi Wu, Yunghsiang Sam Han:
Side Encoding for MDS Array Codes. 1255-1260 - Abdullah Murad, Wai Ho Mow:
Some New Constructions of AFER-Optimal Binary Linear Block Codes. 1261-1265 - Ilya Vorobyev, Vladimir S. Lebedev, Alexey V. Lebedev:
Correcting One Error in Non-Binary Channels with Feedback. 1266-1270 - Zita Abreu, Julia Lieb, Joachim Rosenthal:
Binary convolutional codes with optimal column distances. 1271-1276 - Xiaomeng Chen, Aimin Li, Shaohua Wu:
Tight Upper Bounds on the Error Probability of Spinal Codes over Fading Channels. 1277-1282 - Praveen Kumar, Sudhan Majhi, Subhabrata Paul:
A Direct Construction of Optimal Symmetrical Z-Complementary Code Sets of Prime Power Lengths. 1283-1287 - Nishant Kumar, Sudhan Majhi, Subhabrata Paul:
A New and Direct Construction of Asymptotically Optimal Multiple Sets of Multiple Zero-Correlation Zone Sequence Sets. 1288-1293 - Michel Rigo, Manon Stipulanti, Markus A. Whiteland:
Gapped Binomial Complexities in Sequences. 1294-1299 - Ville Junnila, Tero Laihonen, Tuomo Lehtilä:
Levenshtein's Reconstruction Problem with Different Error Patterns. 1300-1305 - Amaury Gouverneur, Borja Rodríguez Gálvez, Tobias J. Oechtering, Mikael Skoglund:
Thompson Sampling Regret Bounds for Contextual Bandits with sub-Gaussian rewards. 1306-1311 - Osama A. Hanna, Merve Karakas, Lin F. Yang, Christina Fragouli:
Multi-Arm Bandits over Action Erasure Channels. 1312-1317 - Meng-Che Chang, Matthieu R. Bloch:
Distributed Stochastic Bandits with Corrupted and Defective Input Commands. 1318-1323 - Rémi A. Chou, Jörg Kliewer:
Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage. 1324-1329 - Roni Con, Noah Shutty, Itzhak Tamo, Mary Wootters:
Repairing Reed-Solomon Codes over Prime Fields via Exponential Sums. 1330-1335 - Maximilian Egger, Serge Kas Hanna, Rawad Bitar:
Fast and Straggler-Tolerant Distributed SGD with Reduced Computation Load. 1336-1341 - Chen Wang, Yiwei Zhang:
PIR array codes: the optimality of Blackburn-Etzion construction. 1342-1347 - Srikar Kale, Keshav Agarwal, Prasad Krishnan:
t-PIR Schemes with Flexible Parameters via Star Products of Berman Codes. 1348-1353 - Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. 1354-1359 - Chih-Chun Wang, David J. Love:
Optimal Learning Rate of Sending One Bit Over Arbitrary Acyclic BISO-Channel Networks. 1360-1365 - Daisuke Takeuchi, Shun Watanabe:
Tight Exponential Strong Converse for Source Coding Problem with Encoded Side Information. 1366-1371 - Yutaka Jitsumatsu:
Computation of Marton's Error Exponent for Discrete Memoryless Sources. 1372-1377 - Greg Fields, Tara Javidi:
Sequential Hypothesis Testing for Markov Chains. 1378-1383 - Wen-Hsuan Li, Yu-Chih Huang:
Bandwidth-Constrained Distributed Quickest Change Detection in Heterogeneous Sensor Networks: Anonymous vs Non-Anonymous Settings. 1384-1389 - Anuran Makur, Japneet Singh:
Testing for the Bradley-Terry-Luce Model. 1390-1395 - Vipul Arora, Arnab Bhattacharyya, Clément L. Canonne, Joy Qiping Yang:
Near-Optimal Degree Testing for Bayes Nets. 1396-1401 - Jiaxin Wang, Yadi Wei, Zhe Sun, Fang-Wei Fu:
MacWilliams-Like Identities for Certain Vectorial Bent Functions. 1402-1407 - Ron M. Roth:
On the Implementation of Boolean Functions on Content-Addressable Memories. 1408-1413 - Fei Guo, Zilong Wang, Guang Gong:
Constructing Quadratic and Cubic Negabent Functions over Finite Fields. 1414-1418 - Zhi Gu, Avik Ranjan Adhikary, Zhengchun Zhou, Meng Yang:
A Computational Design of Unimodular Complementary and Z-complementary Sets. 1419-1424 - Daisaburo Yoshioka:
Periodic Properties of Commutative Polynomials Defined by Fourth Order Recurrence Relations with Two Variables Over Z2k. 1425-1429 - Michael X. Cao, Navneeth Ramakrishnan, Mario Berta, Marco Tomamichel:
Broadcast Channel Simulation. 1430-1435 - Baris Göktepe, Cornelius Hellge, Tatiana Rykova, Thomas Schierl, Slawomir Stanczak:
On the Limits of HARQ Prediction for Short Deterministic Codes with Error Detection in Memoryless Channels. 1436-1441 - Adeel Mahmood, Aaron B. Wagner:
Timid/Bold Coding for Channels with Cost Constraints. 1442-1447 - James Y. Chen, Recep Can Yavas, Victoria Kostina:
Variable-Length Codes with Bursty Feedback. 1448-1453 - Chengshuai Shi, Wei Xiong, Cong Shen, Jing Yang:
Reward Teaching for Federated Multi-armed Bandits. 1454-1459 - Chengshuai Shi, Cong Shen, Nicholas D. Sidiropoulos:
On High-dimensional and Low-rank Tensor Bandits. 1460-1465 - Kota Srinivas Reddy, P. N. Karthik, Nikhil Karamchandani, Jayakrishnan Nair:
Best Arm Identification in Bandits with Limited Precision Sampling. 1466-1471 - Ranga Shaarad Ayyagari, Ambedkar Dukkipati:
Risk-Averse Combinatorial Semi-Bandits. 1472-1477 - Etam Benger, Shahab Asoodeh, Jun Chen:
The Cardinality Bound on the Information Bottleneck Representations is Tight. 1478-1483 - Yi Song, Hao Xu, Kai-Kit Wong, Giuseppe Caire, Shlomo Shamai Shitz:
Distributed Information Bottleneck for a Primitive Gaussian Diamond MIMO Channel. 1484-1489 - Lingyi Chen, Shitong Wu, Wenhao Ye, Huihui Wu, Hao Wu, Wenyi Zhang, Bo Bai, Yining Sun:
Information Bottleneck Revisited: Posterior Probability Perspective with Optimal Transport. 1490-1495 - Jiangnan Cheng, Sandeep Chinchali, Ao Tang:
Task-aware Network Coding over Butterfly Network. 1496-1501 - Oliver Kosut, Michelle Effros, Michael Langberg:
Perfect vs. Independent Feedback in the Multiple-Access Channel. 1502-1507 - Yossef Steinberg:
Relay Channels with Unreliable Helpers. 1508-1513 - Reza Khosravi-Farsani, Wei Yu:
Gaussian Broadcast Channels with Bidirectional Conferencing Decoders and Correlated Noises. 1514-1519 - Sajani Vithana, Sennur Ulukus:
Private Read Update Write (PRUW) With Heterogeneous Databases. 1520-1525 - Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes:
Single-Server Pliable Private Information Retrieval With Side Information. 1526-1531 - Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. 1532-1537 - Hassan ZivariFard, Rémi A. Chou:
Private Information Retrieval When Private Noisy Side Information is Available. 1538-1543 - Hsin-Po Wang, Chi-Wei Chin:
Density Devolution for Ordering Synthetic Channels. 1544-1549 - Ting-Chun Lin, Hsin-Po Wang:
Optimal Self-Dual Inequalities to Order Polarized BECs. 1550-1555 - Hsin-Po Wang, Venkatesan Guruswami:
How Many Matrices Should I Prepare To Polarize Channels Optimally Fast? 1556-1561 - Hsin-Po Wang, Vlad-Florin Dragoi:
Fast Methods for Ranking Synthetic BECs. 1562-1567 - Jun Diao, Lin Zhou, Lin Bai:
Achievable Error Exponents for Almost Fixed-Length M-ary Classification. 1568-1573 - Jingbo Liu:
Stability Analysis of the Gaussian Han-Kobayashi Region for Z-Interference Channels. 1574-1579 - Chunsong Sun, Lin Zhou:
Achievable Resolution Limits of Noisy Adaptive 20 Questions Estimation for Multiple Targets. 1580-1585 - Haobo Jia, Zhuqing Jia:
X-Secure T-Private Linear Computation With Graph Based Replicated Storage. 1586-1591 - Tianyou Pei, Wei Kang, Nan Liu:
The Capacity of Oblivious Transfer with Replicated Databases and Binary Erasure Multiple Access Channel. 1592-1596 - Zirui Deng, Netanel Raviv:
Approximate Private Inference in Quantized Models. 1597-1602 - Yuhang Yao, Syed Ali Jafar:
The Capacity of 4-Star-Graph PIR. 1603-1608 - Hsin-Po Wang, Ryan Gabrys, Venkatesan Guruswami:
Quickly-Decodable Group Testing with Fewer Tests: Price-Scarlett's Nonadaptive Splitting with Explicit Scalars. 1609-1614 - Sarthak Jain, Martina Cardone, Soheil Mohajer:
Probabilistic Group Testing in Distributed Computing with Attacked Workers. 1615-1620 - Surin Ahn, Wei-Ning Chen, Ayfer Özgür:
Noisy Adaptive Group Testing for Community-Oriented Models. 1621-1626 - Nicholas Kwan, Lele Wang:
Constructions for Nonadaptive Tropical Group Testing. 1627-1632 - Foo Yee Yeo, Jason H. M. Ying:
Third-Party Private Set Intersection. 1633-1638 - Syomantak Chaudhuri, Thomas A. Courtade:
Mean Estimation Under Heterogeneous Privacy: Some Privacy Can Be Free. 1639-1644 - Hyun-Young Park, Seung-Hyun Nam, Si-Hyeon Lee:
Block Design-Based Local Differential Privacy Mechanisms. 1645-1650 - Mahshad Shariatnasab, Farhad Shirani, S. Sitharama Iyengar:
The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation. 1651-1656 - Daniella Bar-Lev, Avi Mizrahi, Tuvi Etzion, Ori Rottenstreich, Eitan Yaakobi:
Coding for IBLTs with Listing Guarantees. 1657-1662 - Kordag Mehmet Kilic, Jin Sima, Jehoshua Bruck:
On the Information Capacity of Nearest Neighbor Representations. 1663-1668 - Ran Tamir:
Reaching Consensus in Dense Erdős-Rényi Graphs. 1669-1674 - Holger Boche, Yannik N. Böck:
Arithmetic Complexity of Frequency-Domain Representations of Time-Computable Signals. 1675-1680 - Adriano Pastore, Sung Hoon Lim, Chen Feng, Bobak Nazer, Michael Gastpar:
Distributed Lossy Computation with Structured Codes: From Discrete to Continuous Sources. 1681-1686 - Michael Dikshtein, Nir Weinberger, Shlomo Shamai Shitz:
On Mismatched Oblivious Relaying. 1687-1692 - Sagnik Bhattacharya, Prakash Narayan:
Shared Information for the Cliqueylon Graph. 1693-1698 - Johannes Rosenberger, Abdalla Ibrahim, Christian Deppe, Roberto Ferrara:
Deterministic Identification Over Multiple-Access Channels. 1699-1704 - Cheng-Yu Kao, Chung-Hsuan Wang, Chi-Chao Chao:
Improved Belief Propagation Decoders for Polar Codes. 1705-1710 - Dar Arava, Ido Tal:
Stronger Polarization for the Deletion Channel. 1711-1716 - Anatolii Ashikhmin, Peter Trifonov:
Efficient Evaluation of Polarization Behavior for Large Kernels. 1717-1722 - Murad Abdullah, Wai Ho Mow:
New Search for the Polarization-Adjusted Convolutional Codes with Respect to the AFER-Optimality Criterion. 1723-1728 - Roberto Assis Machado, Gretchen L. Matthews, Welington Santos:
HerA Scheme: Secure Distributed Matrix Multiplication via Hermitian Codes. 1729-1734 - Ilan Tennenhouse, Netanel Raviv:
Transaction Confirmation in Coded Blockchain. 1735-1740 - Liyuan Song, Li Tang, Yi Wu:
An Optimal Coded Matrix Multiplication Scheme for Leveraging Partial Stragglers. 1741-1746 - Dong Wang, Weijun Fang, Sihuang Hu:
Optimal (2, δ) Locally Repairable Codes via Punctured Simplex Codes. 1747-1752 - Manik Dhar, Sivakanth Gopi:
A construction of Maximally Recoverable LRCs for small number of local groups. 1753-1757 - Hengfeng Jin, Yao Tian, Fang-Wei Fu:
Some Constructions of Perfect and k-optimal (r,δ)-LRCs. 1758-1763 - Smarajit Das:
Codes on Matrices and Some Applications. 1764-1769 - Riddhi Ghosal, Amit Sahai:
Building Hard Problems by Combining Easy Ones. 1770-1775 - Shelvia Wongso, Rohan Ghosh, Mehul Motani:
Pointwise Sliced Mutual Information for Neural Network Explainability. 1776-1781 - Ziao Wang, Nadim Ghaddar, Banghua Zhu, Lele Wang:
Variable-Length Insertion-Based Noisy Sorting. 1782-1787 - Banghua Zhu, Ziao Wang, Nadim Ghaddar, Jiantao Jiao, Lele Wang:
On the Optimal Bounds for Noisy Computing. 1788-1793 - Behnoosh Zamanlooy, Shahab Asoodeh:
Strong Data Processing Inequalities for Locally Differentially Private Mechanisms. 1794-1799 - Venkat Chandar, Aslan Tchamkerten, Shashank Vatedka:
Data Compression with Private Local Decodability. 1800-1805 - Elena Ghazi, Ibrahim Issa:
Total Variation with Differential Privacy: Tighter Composition and Asymptotic Bounds. 1806-1811 - Carolina Naim, Fangwei Ye, Salim El Rouayheb:
On the Privacy of Social Networks with Personal Privacy Choices. 1812-1817 - Mehrasa Ahmadipour, Michèle A. Wigger, Shlomo Shamai:
Strong Converses for Memoryless Bi-Static ISAC. 1818-1823 - Max H. M. Costa, Amin Gohari, Chandra Nair, David Ng:
A Proof of the Noiseberg Conjecture for the Gaussian Z-Interference Channel. 1824-1829 - Lanwei Zhang, Jamie S. Evans, Jingge Zhu:
CFMA for Gaussian MIMO Multiple Access Channels. 1830-1835 - Yinfei Xu, Tao Guo, Daming Cao, Wei Xu:
Capacity-Distortion Tradeoff of Noisy Gaussian State Amplification. 1836-1841 - Chaorui Yao, Pavlos Nikolopoulos, Christina Fragouli:
A Diagonal Splitting Algorithm for Adaptive Group Testing. 1842-1847 - Yun-Han Li, Ryan Gabrys, Jin Sima, Ilan Shomorony, Olgica Milenkovic:
Finding a Burst of Positives via Nonadaptive Semiquantitative Group Testing. 1848-1853 - Mahdi Soleymani, Hessam Mahdavifar, Tara Javidi:
Non-adaptive Quantitative Group Testing via Plotkin-Type Constructions. 1854-1859 - Mgeni Makambi Mashauri, Alexandre Graell i Amat, Michael Lentmaier:
Low-Density Parity-Check Codes and Spatial Coupling for Quantitative Group Testing. 1860-1865 - H. S. Melihcan Erol, Erixhen Sula, Lizhong Zheng:
On Semi-Supervised Estimation of Distributions. 1866-1871 - Leighton Pate Barnes, Alex Dytso, H. Vincent Poor:
L1 Estimation in Gaussian Noise: On the Optimality of Linear Estimators. 1872-1877 - Xinyi Tong, Tianren Peng, Shao-Lun Huang:
An Information Theoretic Approach for Collaborative Distributed Parameter Estimation. 1878-1883 - Puning Zhao, Lifeng Lai:
Entropy Rate Estimation for Markov Chains with Continuous Distributions. 1884-1889 - Ziv Aharoni, Bashar Huleihel, Henry D. Pfister, Haim H. Permuter:
Data-Driven Polar Codes for Unknown Channels With and Without Memory. 1890-1895 - Tyler Kann, Shrinivas Kudekar, Matthieu R. Bloch:
Source Polarization-Adjusted Convolutional Codes. 1896-1901 - Jaswanthi Mandalapu, Avhishek Chatterjee, Krishna P. Jagannathan, Andrew Thangaraj:
Capacity Achieving Codes for an Erasure Queue-channel. 1902-1907 - Zuoxin Cai, Li Chen, Wenxin Liu, Huazi Zhang:
Modified PAC Codes. 1908-1913 - Youyi Huang, Lu Wei:
Exact variances of von Neumann entropy over fermionic Gaussian states. 1914-1918 - Aadil Oufkir:
Sample-Optimal Quantum Process Tomography with non-adaptive Incoherent Measurements. 1919-1924 - Hafez M. Garmaroudi, S. Sandeep Pradhan, Jun Chen:
Rate-limited Quantum-to-Classical Optimal Transport: A Lossy Source Coding Perspective. 1925-1930 - Guangkuo Liu, Peixue Wu, Haneul Kim, Marius Junge:
Quantum secret sharing and tripartite information. 1931-1936 - Yuchen Zeng, Hongxu Chen, Kangwook Lee:
Federated Learning with Local Fairness Constraints. 1937-1942 - Yilei Xue, Xi Lin, Jun Wu, Jianhua Li:
Wireless Coded Distributed Learning with Gaussian-based Local Differential Privacy. 1943-1948 - Mehrdad Pournaderi, Yu Xiang:
Sample-and-Forward: Communication-Efficient Control of the False Discovery Rate in Networks. 1949-1954 - Olusola Tolulope Odeyomi:
Differentially Private Online Federated Learning With Personalization and Fairness. 1955-1960 - Rumia Sultana, Vidhi Rana, Rémi A. Chou:
Secret Sharing Over a Gaussian Broadcast Channel: Optimal Coding Scheme Design and Deep Learning Approach at Short Blocklength. 1961-1966 - Vinayak Ramkumar, Netanel Raviv, Itzhak Tamo:
Access-Redundancy Tradeoffs in Quantized Linear Computations. 1967-1972 - Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. 1973-1978 - Anindya Bijoy Das, Aditya Ramamoorthy, David J. Love, Christopher G. Brinton:
Distributed Matrix Computations with Low-weight Encodings. 1979-1984 - Christoph Hofmeister, Luis Maßny, Eitan Yaakobi, Rawad Bitar:
Trading Communication for Computation in Byzantine-Resilient Gradient Coding. 1985-1990 - George Vershinin, Asaf Cohen, Omer Gurewitz:
Order-Optimal Joint Transmission and Identification in Massive Multi-User MIMO via Group Testing. 1991-1996 - Cheng-En Lee, Hsiao-Wen Yu, Cheng-Shang Chang, Duan-Shin Lee:
Upper Bounds for the Stability Regions of Coded Poisson Receivers. 1997-2002 - Li Qiao, Zhen Gao, Zhongxiang Li, Deniz Gündüz:
Unsourced Massive Access-Based Digital Over-the-Air Computation for Efficient Federated Edge Learning. 2003-2008 - Lina Liu, Dongning Guo:
An Asynchronous Massive Access Scheme with Dynamic Range Considerations. 2009-2014 - Ryan Song, Kareem M. Attiah, Wei Yu:
Coded Downlink Massive Random Access. 2015-2020 - Clifton Garrison, Giacomo Micheli, Logan Nott, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:
On a Class of Optimal Locally Recoverable Codes with Availability. 2021-2026 - Dinh Thi Xinh, Serdar Boztas, Son Hoang Dau, Emanuele Viterbo:
Designing Compact Repair Groups for Reed-Solomon Codes. 2027-2032 - Francisco Maturana, K. V. Rashmi:
Locally Repairable Convertible Codes: Erasure Codes for Efficient Repair and Conversion. 2033-2038 - Zhou Li, Hua Sun:
On Extremal Rates of Storage over Graphs. 2039-2044 - Lei Li, Chenhao Ying, Liang Chen, Yuanyuan Dong, Yuan Luo:
New Constructions of Binary MDS Array Codes with Optimal Repair Bandwidth. 2045-2050 - Jiun-Ting Huang, Young-Han Kim:
Parallel Monte Carlo Markov Chain Decoding of Linear Codes. 2051-2056 - Galen Reeves, Henry D. Pfister:
Achieving Capacity on Non-Binary Channels with Generalized Reed-Muller Codes. 2057-2062 - Luca G. Tallini, Bella Bose:
On Some Zm Linear Goppa/BCH like Error Control Codes and Elementary Symmetric Functions*. 2063-2068 - Suihua Cai, Chao Chen, Yunqi Wan, Xiao Ma:
Fast Encoding of Hermitian Codes Based on Lin-Chung-Han Fast Fourier Transform. 2069-2074 - Jianguo Zhao, Li Chen:
Systematic Encoding of Elliptic Codes with Dynamic Information Sets. 2075-2080 - Farzad Pourkamali, Nicolas Macris:
Rectangular Rotational Invariant Estimator for General Additive Noise Matrices. 2081-2086 - Min-Oh Jeong, Alex Dytso, Martina Cardone:
Functional Properties of the Ziv-Zakai bound with Arbitrary Inputs. 2087-2092 - Clément L. Canonne, Ziteng Sun, Ananda Theertha Suresh:
Concentration Bounds for Discrete Distribution Estimation in KL Divergence. 2093-2098 - Yuyang Shi, Aditya Deshmukh, Yajun Mei, Venugopal V. Veeravalli:
Robust High-Dimensional Linear Discriminant Analysis under Training Data Contamination. 2099-2104 - Noam Gavish, Or Ordentlich:
Minimax Risk Upper Bounds Based on Shell Analysis of a Quantized Maximum Likelihood Estimator. 2105-2110 - Hao-Chung Cheng, Baris Nakiboglu:
The Mutual Information In The Vicinity of Capacity-Achieving Input Distributions. 2111-2116 - Ioannis Papoutsidakis, Angela Doufexi, Robert J. Piechocki:
Efficient Evaluation of the Probability of Error of Random Coding Ensembles. 2117-2122 - Marcel Mross, Pin-Hsun Lin, Eduard A. Jorswieck:
Second-Order Performance of Early Decoding with Shell Codes in Gaussian Broadcast Channels. 2123-2128 - Neil Irwin Bernardo, Jingge Zhu, Jamie S. Evans:
Learning Channel Codes from Data: Performance Guarantees in the Finite Blocklength Regime. 2129-2134 - Yanyan Dong, Shenghao Yang:
Characterization of All Optimal Finite-length Codes of Size Four for Binary Symmetric Channels. 2135-2140 - Emna Ben Yacoub:
Weight and Trapping Set Distributions for Non-Binary Regular Low-Density Parity-Check Code Ensembles. 2141-2146 - Guodong Li, Min Ye, Sihuang Hu:
ABS+ Polar Codes: Exploiting More Linear Transforms on Adjacent Bits. 2147-2152 - Yuan Li, Zicheng Ye, Huazi Zhang, Jun Wang, Guiying Yan, Zhiming Ma:
On the Weight Spectrum Improvement of Pre-transformed Reed-Muller Codes and Polar Codes. 2153-2158 - Yanqing Liu, Yanan Dou, Yanlin Geng:
Blahut-Arimoto Algorithm for Marton's Inner Bound. 2159-2164 - Zhichao Shao, Xiaojun Yuan:
Delay-Calibrated User Activity Detection for Asynchronous Massive Random Access. 2165-2170 - Michael Rudow, Venkatesan Guruswami, K. V. Rashmi:
On expanding the toolkit of locality-based coded computation to the coordinates of inputs. 2171-2176 - Michael Rudow, Neophytos Charalambides, Alfred O. Hero III, K. V. Rashmi:
Compression-Informed Coded Computing. 2177-2182 - Kyungrak Son, Aditya Ramamoorthy:
Coded matrix computation with gradient coding. 2183-2188 - Hsuan-Po Liu, Mahdi Soleymani, Hessam Mahdavifar:
Differentially Private Coded Computing. 2189-2194 - Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Juan Felipe Gómez, Oliver Kosut, Lalitha Sankar:
Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime. 2195-2200 - Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Juan Felipe Gómez, Oliver Kosut, Lalitha Sankar:
Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity. 2201-2206 - Viveck R. Cadambe, Haewon Jeong, Flávio P. Calmon:
Differentially Private Secure Multiplication: Hiding Information in the Rubble of Noise. 2207-2212 - Amir-Reza Asadi, Po-Ling Loh:
On the Gibbs Exponential Mechanism and Private Synthetic Data Generation. 2213-2218 - Takeshi Kakizaki, Masanori Nakamura, Fukutaro Hamaoka, Yoshiaki Kisaka:
Theoretical analysis of achievable rates for channel-polarized multilevel coding under binary-input AWGN channels. 2219-2224 - Wei Liu, Tom Richardson, Hao Xu, Changlong Xu, Liangming Wu, Ori Shental:
Approximation Methods for Enumerating Sequences for Probabilistic Amplitude Shaping. 2225-2230 - Longguang Li, Ru-Han Chen, Jing Zhou:
On the Sum-Capacity of Two-User Optical Intensity Multiple Access Channels. 2231-2235 - Alankrita Bhatt:
Universal Prediction of m-ary Sequences. 2236-2241 - Moses Won, Gireeja Ranade:
Control of a Multiplicative Observation Noise System: MAP-based Achievable Strategy. 2242-2247 - Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz, Nir Weinberger:
Maximal-Capacity Discrete Memoryless Channel Identification. 2248-2253 - Ke Sun, Samir M. Perlaza, Alain Jean-Marie:
2×2 Zero-Sum Games with Commitments and Noisy Observations. 2254-2259 - Jimmy Ming-Tai Wu, Ke Wang, Huizhen Yan, Chao-Chun Chen, Pei-Wei Chen, Jerry Chun-Wei Lin:
Updating Top-k Dominate Individuals with Incomplete Data Addition. 2260-2265 - Chanho Park, Namyoon Lee:
S3GD-MV: Sparse-SignSGD with Majority Vote for Communication-Efficient Distributed Learning. 2266-2271 - Aditya Pradeep, Michael Gastpar:
Personalized Privacy-Preserving Distributed Learning on Heterogeneous Data. 2272-2277 - Jin Sima, Chao Pan, Olgica Milenkovic:
Perturbation-Resilient Sets for Dynamic Service Balancing. 2278-2283 - Adway Patra, Alexander Barg:
Node Repair for Adversarial Graphical Networks. 2284-2289 - Derya Malak:
Weighted Graph Coloring for Quantized Computing. 2290-2295 - Wenbo Huang, Kai Wan, Hua Sun, Mingyue Ji, Robert Caiming Qiu, Giuseppe Caire:
Fundamental Limits of Distributed Linearly Separable Computation under Cyclic Assignment. 2296-2301 - Zhuangfei Wu, Lin Bai, Lin Zhou:
Successive Refinement of Shannon Cipher System Under Maximal Leakage. 2302-2307 - Shixin Tian, Zhili Dong, Kunpeng Wang, Chang Lv:
Subfield Attack on NTRU by using symmetric function map. 2308-2313 - Somnath Panja, Shaoquan Jiang, Reihaneh Safavi-Naini:
A One-way Secret Key Agreement with Security Against Active Adversaries. 2314-2319 - Amin Gohari, Gerhard Kramer:
An Upper Bound on Secret Key Rates for General Multiterminal Wiretap Channels. 2320-2325 - Fan Liu, Yifeng Xiong, Kai Wan, Tony Xiao Han, Giuseppe Caire:
Deterministic-Random Tradeoff of Integrated Sensing and Communications in Gaussian Channels: A Rate-Distortion Perspective. 2326-2331 - Xi Zhang, Jingqing Wang, H. Vincent Poor:
Modeling Statistical Delay, Error-Rate, and Joint-Delay/Error-Rate QoS-Exponents Over M-MIMO Mobile Wireless Networks Using FBC. 2332-2337 - Jesús Gómez-Vilardebó, Xavier Mestre, Mònica Navarro, Jorge Quintanilla:
Capacity of Noncoherent FSK with Doppler Frequency Uncertainty. 2338-2343 - Wenjun Jiang, Xiaojun Yuan:
RIS-Aided MIMO Systems with Simultaneous Active and Passive Information Transfer: Iterative Decoding and Evolution Analysis. 2344-2349 - Jamison R. Ebert, Jean-François Chamberland, Krishna R. Narayanan:
On Sparse Regression LDPC Codes. 2350-2355 - Anthony Gómez-Fonseca, Roxana Smarandache, David G. M. Mitchell:
On the Tanner Cycle Distribution of QC-LDPC Codes from Polynomial Parity-Check Matrices. 2356-2361 - Hsiao-Wen Yu, Cheng-En Lee, Ruhui Zhang, Cheng-Shang Chang, Duan-Shin Lee:
Degree-degree Correlated Low-density Parity-check Codes Over a Binary Erasure Channel. 2362-2367 - Ermes Franch, Chunlei Li:
Two new algorithms for error support recovery of low rank parity check codes. 2368-2373 - Natasha Devroye, Abhijeet Mulgund, Raj Shekhar, György Turán, Milos Zefran, Yingyao Zhou:
Interpreting Training Aspects of Deep-Learned Error-Correcting Codes. 2374-2379 - Bashar Huleihel, Dor Tsur, Ziv Aharoni, Oron Sabag, Haim H. Permuter:
Neural Estimation of Multi-User Capacity Regions. 2380-2385 - Zhiwei Shan, Xinping Yi, Han Yu, Chung-Shou Liao, Shi Jin:
Learning to Code on Graphs for Topological Interference Management. 2386-2391 - Jiaxiang Tang, Jinbao Zhu, Songze Li, Lichao Sun:
Secure Embedding Aggregation for Federated Representation Learning. 2392-2397 - Zhou Li, Yizhou Zhao, Hua Sun:
Weakly Secure Summation with Colluding Users. 2398-2403 - Zhenhao Huang, Songze Li, Kai Liang, Youlong Wu:
Secure Gradient Aggregation for Wireless Multi-Server Federated Learning. 2404-2409 - Songting Ji, Zhaoyang Zhang, Zhaohui Yang, Richeng Jin, Qianqian Yang:
Coded Parallelism for Distributed Deep Learning. 2410-2415 - Christian Arendt, Janis Nötzel, Holger Boche:
Detectability of Denial-of-Service Attacks on Arbitrarily Varying Channels with State Constraints. 2416-2421 - Mayank Bakshi, Oliver Kosut:
On Authentication against a Myopic Adversary using Stochastic Codes. 2422-2427 - Mustafa Doger, Sennur Ulukus:
Security Bounds for Bitcoin Under Network Delay. 2428-2433 - Hongna Yang, Yujie Gu, Yiwei Zhang:
Bounds for Binary Multimedia Codes with the Identifiable Parent Property. 2434-2439 - Abhishek Roy, Sudhan Majhi:
Direct Constructions of Multiple Shift Complementary Sets of Flexible Lengths. 2440-2445 - Nicolas Charpenay, Maël Le Treust, Aline Roumy:
Complementary Graph Entropy, AND Product, and Disjoint Union of Graphs. 2446-2451 - Chin Wa Ken Lau, Chandra Nair:
Information Inequalities via Ideas from Additive Combinatorics. 2452-2457 - Keshav Goyal, Duc Tu Dao, Han Mao Kiah, Mladen Kovacevic:
Evaluation of the Gilbert-Varshamov Bound using Multivariate Analytic Combinatorics. 2458-2463 - Ioannis Papageorgiou, Ioannis Kontoyiannis:
Context-tree weighting for real-valued time series: Bayesian inference with hierarchical mixture models. 2464-2469 - Ioannis Kontoyiannis:
Time Series Analysis with Bayesian Context Trees: Classical Asymptotics and Finite-n Bounds. 2470-2475 - Qian Yu, Yury Polyanskiy:
Uniqueness of Distributional BP Fixed Point in Ising Model on Trees. 2476-2481 - Cheng Chen, Jiawei Zhang, Jie Ding, Yi Zhou:
Assisted Unsupervised Domain Adaptation. 2482-2487 - Yuheng Bu, Harsha Vardhan Tetali, Gholamali Aminian, Miguel R. D. Rodrigues, Gregory W. Wornell:
On the Generalization Error of Meta Learning for the Gibbs Algorithm. 2488-2493 - Andreas Lenz, Stephen Melczer, Cyrus Rashtchian, Paul H. Siegel:
Exact Asymptotics for Discrete Noiseless Channels. 2494-2498 - Miklós Z. Rácz, Anirudh Sridhar:
Matching Correlated Inhomogeneous Random Graphs using the k-core Estimator. 2499-2504 - Alexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard:
A Non-Asymptotic Analysis of Mismatched Guesswork. 2505-2510 - Manolis C. Tsakiris:
Matrix Recovery from Permutations: An Algebraic Geometry Approach. 2511-2516 - Jocelyn Bourduge, Charly Poulliat, Benjamin Gadat:
Non Binary LDPC Coded Orthogonal Modulation Schemes based on Non Binary Multilevel Coding. 2517-2522 - Alexander Fengler, Alejandro Lancho, Krishna Narayanan, Yury Polyanskiy:
On the Advantages of Asynchrony in the Unsourced MAC. 2523-2528 - Lev Tauz, Lara Dolecek:
Fully Private Grouped Matrix Multiplication with Colluding Workers. 2529-2534 - Maximilian Egger, Marvin Xhemrishi, Antonia Wachter-Zeh, Rawad Bitar:
Sparse and Private Distributed Matrix Multiplication with Straggler Tolerance. 2535-2540 - Haojun Li, Yi Chen, Kenneth W. Shum, Chi Wan Sung:
Data Allocation for Approximate Gradient Coding in Edge Networks. 2541-2546 - M. Nikhil Krishnan, Anoop Thomas, Birenjith Sasidharan:
Hierarchical Coded Gradient Aggregation Based on Layered MDS Codes. 2547-2552 - Samiru Gayan, Hazer Inaltekin, Rajitha Senanayake, Jamie S. Evans:
Differential MPSK with n-Bit Phase Quantization. 2553-2558 - Ya-Chun Liang, Chung-Shou Liao, Xinping Yi:
A Primal-Dual Algorithmic Aspect of Link Scheduling in Dynamic Wireless Networks. 2559-2564 - Yen-Cheng Chu, Alireza Vahid, Sheng-Kai Chung, Shih-Chun Lin:
Broadcast Packet Erasure Channels with Alternating Single-User Feedback. 2565-2570 - Siyao Li, Giuseppe Caire:
On the Capacity and State Estimation Error of Binary "Beam-Pointing" Channels with Block Memory and Feedback. 2571-2576 - Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Mixing a Covert and a Non-Covert User. 2577-2582 - Soumita Hazra, J. Harshan:
On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries. 2583-2588 - Moritz Wiese, Holger Boche:
ε-Almost Collision-Flat Universal Hash Functions Motivated by Information-Theoretic Security. 2589-2594 - Yun-Mei Liao, I-Hsiang Wang:
On the Benefit of Single-User Feedback for Secret Communication over Broadcast Erasure Channels. 2595-2600 - Sean O'Rourke, Van Vu, Ke Wang:
Optimal Subspace Perturbation Bounds under Gaussian Noise. 2601-2606 - Sreejith Sreekumar, Ziv Goldfeld, Kengo Kato:
Limit Distribution Theory for KL divergence and Applications to Auditing Differential Privacy. 2607-2612 - Kristjan H. Greenewald, Brian Kingsbury, Yuancheng Yu:
High-Dimensional Smoothed Entropy Estimation via Dimensionality Reduction. 2613-2618 - Yun Ma, Yihong Wu, Pengkun Yang:
On the best approximation by finite Gaussian mixtures. 2619-2624 - Xumei Xi, Christina Lee Yu, Yudong Chen:
Entry-Specific Bounds for Low-Rank Matrix Completion under Highly Non-Uniform Sampling. 2625-2630 - Praveen Venkatesh, Keerthana Gurushankar, Gabriel Schamberg:
Capturing and Interpreting Unique Information. 2631-2636 - Ruizhi Zhang, Shanshan Cao:
Differentially Private Detection of Sparse Gaussian Mixtures. 2637-2642 - Qi Zhang, Zhongchang Sun, Luis C. Herrera, Shaofeng Zou:
Data-Driven Quickest Change Detection in Hidden Markov Models. 2643-2648 - Ashwin Verma, Alireza Sharbafchi, Behrouz Touri, Soheil Mohajer:
Distributed Fact Checking. 2649-2654 - Amir Weiss, Alejandro Lancho, Yuheng Bu, Gregory W. Wornell:
A Bilateral Bound on the Mean-Square Error for Estimation in Model Mismatch. 2655-2660 - Yeow Meng Chee, Tuvi Etzion, Kees A. Schouhamer Immink, Tuan Thanh Nguyen, Van Khu Vu, Jos H. Weber, Eitan Yaakobi:
Thermal-Aware Channel Capacity. 2661-2666 - V Arvind Rameshwar, Navin Kashyap:
Counting Constrained Codewords in Binary Linear Codes via Fourier Expansions. 2667-2672 - Dor Elimelech, Tom Meyerovitch, Moshe Schwartz:
Quantized-Constraint Concatenation and the Covering Radius of Constrained Systems. 2673-2678 - Dor Elimelech, Tom Meyerovitch, Moshe Schwartz:
Bounds on the Essential Covering Radius of Constrained Systems. 2679-2684 - Dariusz R. Kowalski, Miguel A. Mosteiro:
The Min-entropy of Distributed Wireless Link Scheduling Algorithms under Arbitrary Interference. 2685-2690 - Funing Xia, Junyuan Wang:
Complexity-Constrained Clustered Cell-Free Networking for Sum Capacity Maximization. 2691-2696 - Yijun Fan, Yanxiao Liu, Yi Chen, Shenghao Yang, Raymond W. Yeung:
Reliable Throughput of Generalized Collision Channel without Synchronization. 2697-2702 - Yuting Li, Farzad Farnoud:
Linial's Algorithm and Systematic Deletion-Correcting Codes. 2703-2707 - Daniil Goshkoder, Nikita Polyanskii, Ilya Vorobyev:
Codes Correcting a Single Long Duplication Error. 2708-2713 - Alexander R. Block, Jeremiah Blocki:
Computationally Relaxed Locally Decodable Codes, Revisited. 2714-2719 - Yuanyuan Tang, Sarvin Motamen, Hao Lou, Kallie Whritenour, Shuche Wang, Ryan Gabrys, Farzad Farnoud:
Correcting a substring edit error of bounded length. 2720-2725 - Wentu Song, Kui Cai:
Non-binary Codes Correcting Two Deletions. 2726-2731 - Hamid Ghourchian, Tobias J. Oechtering, Mikael Skoglund:
Secure Block Joint Source-Channel Coding with Sequential Encoding. 2732-2737 - Mehrasa Ahmadipour, Michèle A. Wigger, Shlomo Shamai:
Integrated Communication and Receiver Sensing with Security Constraints on Message and State. 2738-2743 - Yiqi Chen, Tobias J. Oechtering, Mikael Skoglund, Yuan Luo:
On Strong Secrecy for Multiple Access Channel with States and causal CSI. 2744-2749 - Hao Xu, Kai-Kit Wong, Giuseppe Caire:
Achievable Region of the K-User MAC Wiretap Channel Under Strong Secrecy. 2750-2755 - Emma Pollard, Mokshay Madiman:
Submodular Function Inequalities Indexed by Chordal Graphs. 2756-2761 - Anda Skeja, Sofia C. Olhede:
Measuring the Complexity of an Exchangeable Graph. 2762-2767 - Eric Ruzomberka, Yongkyu Jang, David J. Love, H. Vincent Poor:
The Capacity of Channels with O(1)-Bit Feedback. 2768-2773 - Yuwen Huang, Pascal O. Vontobel:
Bounding the Permanent of a Non-negative Matrix via its Degree- M Bethe and Sinkhorn Permanents. 2774-2779
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.