default search action
ISIT 2025: Ann Arbor, MI, USA
- IEEE International Symposium on Information Theory, ISIT 2025, Ann Arbor, MI, USA, June 22-27, 2025. IEEE 2025, ISBN 979-8-3315-4399-0
- Lei Liu, Yuhao Chi, Shunqi Huang:
Random Modulation: Achieving Asymptotic Replica Optimality Over Arbitrary Norm-Bounded and Spectrally Convergent Channel Matrices. 1-6 - Chandra Nair, Jinpei Zhao:
Proof of a Conjecture on the Gaussian Signaling Region for the Gaussian Z-Interference Channel. 1-6 - Ludovico Lami:
A Solution of the Generalised Quantum Stein's Lemma. 1-6 - Haolun Michael Ni, Lev Tauz, Ryan Gabrys, Lara Dolecek:
Improved Interactive Protocol for Synchronizing from Deletions. 1-6 - Milad Sefidgaran, Abdellatif Zaidi:
Multi-View Representation Learning Regularizer with Gaussian-Product Mixture Prior. 1-6 - Siyao Li, Shuangyang Li, Giuseppe Caire:
On the Sensing Capacity of Gaussian "Beam-Pointing" Channels with Block Memory and Feedback. 1-6 - Kenta Takahashi, Wanaru Nakamura:
(Quasi-)Linear-Time Algorithms for the Closest Vector Problem in (Semi-)Equiangular Lattices. 1-6 - Dongxiao Xu, Xinyang Li, Vlad-Costin Andrei, Moritz Wiese, Ullrich J. Mönich, Holger Boche:
$S E(3)$-Based Trajectory Optimization and Target Tracking in UAV-Enabled ISAC Systems. 1-6 - Ruoyu Meng, Aditya Ramamoorthy:
Quantum Advantage in Zero-Error Function Computation with Side Information. 1-6 - Vinayak Ramkumar, M. Nikhil Krishnan, Myna Vajha:
Streaming Codes for Multi-Hop Relay Networks with Burst Erasures. 1-6 - Yun-Han Li, Jin Sima, Ilan Shomorony, Olgica Milenkovic:
Fragmentation in Data Deduplication Systems II: The Jump Metric. 1-6 - Byung-Jae Kwak, Jinkyeong Kim, Jungho Myung, Young-Jo Ko:
Optimized Non-Matched Correlator Design for Enhanced Primary Synchronization Signal Detection in Fifth Generation New Radio. 1-6 - Roni Con:
Anonymous Shamir's Secret Sharing via Reed-Solomon Codes Against Permutations, Insertions, and Deletions. 1-6 - Yanxiao Liu, Sepehr Heidari Advary, Cheuk Ting Li:
Nonasymptotic Oblivious Relaying and Variable-Length Noisy Lossy Source Coding. 1-6 - Serge Kas Hanna:
On the Reliability of Information Retrieval from MDS Coded Data in DNA Storage. 1-6 - Xing Gao, Lev Reyzin:
Non-Center-Based Clustering Under Bilu-Linial Stability. 1-5 - Nir Luria, Nir Weinberger:
Optimal Overlap Detection of Shotgun Reads. 1-6 - Haodong Yang, Qiwen Zhu, Venkata Gandikota
:
Sublinear-time Support Recovery in One-bit Compressed Sensing. 1-6 - Majid Daliri, Christopher Musco, Ananda Theertha Suresh:
Coupling Without Communication and Drafter-Invariant Speculative Decoding. 1-6 - Roni Con, João Ribeiro:
Channels with Input-Correlated Synchronization Errors. 1-6 - Emrecan Kutay, Aylin Yener:
Perception - Aware Clustering. 1-6 - Chen Peng, Urbashi Mitra:
Causal Graph Identification Under Soft Intervention. 1-6 - Amin Gohari, Yi Liu, Chandra Nair:
A Conjecture Regarding the Optimizers of Marton's Inner Bound for the Two-Receiver Broadcast Channel. 1-6 - Jun Muramatsu:
Unification of Distributed Source Coding, Multiple Description Coding, and Source Coding with Side Information at Decoders. 1-6 - Anton Tchaplianka, Meir Feder:
Twice-Universal Prediction in Over-Parameterized Linear Regression. 1-6 - Namhyun Kim, Jeonghun Park:
Robust Precoding and Rate-Splitting Multiple Access for FDD Massive MIMO Without CSI Feedback. 1-6 - Yinbin Ma, Daniela Tuninetti:
An Achievable Scheme for the K-User Linear Computation Broadcast Channel. 1-6 - Connor Ding, Abhiram Rao Gorle, Sagnik Bhattacharya, Divija Hasteer, Naomi Sagan, Tsachy Weissman:
LzMidi: Compression-Based Symbolic Music Generation. 1-6 - Mingchen Jiang, Peng Xu, Xichen Ye, Yun Yang, Yifan Chen
:
Embedding Empirical Distributions for Computing Optimal Transport Maps. 1-6 - Alfredo De la Fuente, Saurabh Singh, Jona Ballé:
Discretized Approximate Ancestral Sampling. 1-6 - Haodong Yang, Venkata Gandikota
, Nikita Polyanskii:
Combinatorial Group Testing With Adversarial Deletions. 1-6 - Tamoghno Nath, Krishna Gopal Banerjee, Adrish Banerjee:
Improved Performance with $\alpha, \beta$-Constrained Transmission: A Family of High-Rate Codes $\mathcal{C}_{\alpha, \beta}^{(n)}$ for Molecular Communication via Diffusion. 1-6 - Zhengyi Jiang, Hao Shi, Zhongyi Huang, Bo Bai, Gong Zhang, Hanxu Hou:
Constructions of Analog Error-Correcting Codes for Single-Error Detection and Correction with Efficient Decoding Algorithm. 1-6 - G. Krishnakumar, Abhishek Sinha:
Minimizing Queue Length Regret for Arbitrarily Varying Channels. 1-6 - Soham Ravikant Joshi, Shikha Patel, Om Prakash:
Construction of New Codes Over $\mathbb{F}_{16}$ From Cyclic Codes Over $\mathcal{M}_{4}(\mathbb{F}_{2}+u\mathbb{F}_{2}+u^{2}\mathbb{F}_{2})$. 1-5 - Zhiwei Shan, Xinping Yi, Chung-Shou Liao, Shi Jin, Giuseppe Caire:
Unfolding FPLinQ with Graph Reinforcement Learning for D2D Spectrum Sharing. 1-6 - Rodrigo Cruz, Mario Díaz, Flávio P. Calmon:
Tensorization of $f$-Divergences. 1-6 - Mo Li, Yanyan Dong, Ximing Fu
:
Synchronous BFT Under an Information Theoretic Setting with Private Observations. 1-6 - Daria Tieplova, Jean Barbier, Samriddha Lahiry:
Information-Theoretic Limits and Approximate Message-Passing for High-Dimensional Time Series. 1-6 - Xinyang Li, Ziyou Tang, Vlad-Costin Andrei, Ullrich J. Mönich, Fan Liu, Holger Boche:
Computation of Capacity-Distortion-Cost Functions for Continuous Memoryless Channels. 1-6 - Mohammad Ali Maddah-Ali, Soheil Mohajer:
The Mystery of an Infinite-Size Constellation: Applications in Few-Shot Communication. 1-6 - Xi Zhong
, Samuel Lu, Jörg Kliewer, Mingyue Ji:
Uncoded Download in Lagrange-Coded Elastic Computing with Straggler Tolerance. 1-6 - Malhar Managoli, K. R. Sahasranand, Vinod M. Prabhakaran:
Error Exponents for Robust Hypothesis Testing with Abstention. 1-6 - Oguzhan Kubilay Ülger, Elza Erkip:
On Source Coding for Stationary Sources Under Logarithmic Loss. 1-6 - Ruslan Morozov, Tolga M. Duman:
Simple Converse Bounds on the Deletion Channel Capacity with Finite Block Lengths. 1-6 - Lina Liu, Dongning Guo:
Hybrid Beamforming Aided by Full-Dimension One-Bit Chains. 1-6 - Charalambos D. Charalambous:
Dynamic Programming and Information States for Decentralized Stochastic Control with Delayed Sharing Patterns. 1-6 - Yifei Shen, Zongyao Li
, Emmanuel Boutillon, Wenqing Song, Yuqing Ren, Chuan Zhang, Xiaohu You, Andreas Burg:
Belief Propagation Decoding for Short Codes on Structured Sparse Parity-Check Matrices. 1-6 - Srivathsa Acharya, P. Vijay Kumar, Viveck R. Cadambe:
Chromatic Codes for Latency Optimal Geo-Distributed Storage. 1-6 - Shlomi Vituri, Meir Feder:
Constrained Universal Learning Under Misspecification. 1-6 - Jiwei Liang, Li Chen:
Algebraic Soft Decoding of Hermitian Codes with Re-Encoding Transform. 1-6 - Sifat Munim, Aditya Ramamoorthy:
Communication-Efficient Approximate Gradient Coding Using Structured Matrices. 1-6 - Ling Liu, Ruimin Yuan, Shanxiang Lyu, Cong Ling, Baoming Bai:
Construction of Simultaneously Good Polar Codes and Polar Lattices. 1-6 - Hamidreza Abin, Amin Gohari:
On the Source Model Key Agreement Problem. 1-6 - Carol Xuan Long, Dor Tsur, Claudio Mayrink Verdun, Hsiang Hsu, Haim H. Permuter, Flávio P. Calmon:
Optimized Couplings for Watermarking Large Language Models. 1-6 - Zhuoqi Tu, Yi Chen, Shenghao Yang:
A Network Coding-Based Approach to Floating-Point Sum Reduction. 1-6 - Mahshad Shariatnasab, Stefano Rini, Farhad Shirani, S. Sitharama Iyengar
:
The Query/Hit Model for Sequential Hypothesis Testing. 1-6 - Akira Kamatsuka, Koki Kazama, Takahiro Yoshida:
Alternating Optimization Approach for Computing $\alpha - \text{Mutual}$ Information and $\alpha$-Capacity. 1-6 - Jonathan Mandelbaum, Holger Jäkel, Laurent Schmalen:
Subcode Ensemble Decoding of Linear Block Codes. 1-6 - Rashid Ummer N. T.
, B. Sundar Rajan:
D2D Coded Caching Schemes for Multiaccess Networks with Combinatorial Access Topology. 1-6 - Kumar Subodh, Priyanshu Gautam, Amitalok J. Budkuley:
Probing-Based Sequential Decision Making Under Cognitive Limitations. 1-6 - Anthony Gómez-Fonseca:
Construction of QC-LDPC Codes with Girth $g$ from the Hermite Normal Form of a Matrix. 1-6 - Aditya Prakash
, Tzu-Chieh Kao, Sudhan Majhi
, Prashant Kumar Srivastava, Chao-Yu Chen:
Function-Based Construction of Two-Dimensional Binary Golay-ZCZ Array Pair of Length Non-Power-of-Two. 1-6 - Manabu Hagiwara:
Quantum Multi Deletion Codes Derived from Quantum Reed-Solomon Codes. 1-6 - Zikun Tan, Ron Dabora, H. Vincent Poor:
The Rate-Distortion Function for Sampled Cyclostationary Gaussian Processes with Memory and with Bounded Processing Delay. 1-6 - Avijit Mandal, Henry D. Pfister:
Reed-Muller Codes on CQ Channels via a New Correlation Bound for Quantum Observables. 1-6 - Gabriel Sac Himelfarb, Moshe Schwartz:
Improved Constructions of Skew-Tolerant Gray Codes. 1-6 - Mauro M. M. Costantino, Massimo Battaglioni, David G. M. Mitchell:
A Strategy to Detect Error Propagation in Sliding Window Decoding of SC-LDPC Codes. 1-6 - Taha Ameen, Bruce E. Hajek
:
Exact Random Graph Matching with Multiple Graphs. 1-6 - Johan Vester Dinesen, Eimear Byrne, Ragnar Freij-Hollanti, Camilla Hollanti:
Secret Sharing in the Rank Metric. 1-6 - Idan Dekel, Yaron Shany, Ariel Doubchak, Amit Berman
:
Efficient Polar Systematic Encoding Without the Domination Contiguity Property. 1-6 - Yunpeng Li, Hans-Andrea Loeliger:
Dual Nup Representations and Min-Maximization in Factor Graphs. 1-6 - Peter Beelen
, Roni Con, Anina Gruica
, Maria Montanucci
, Eitan Yaakobi:
Reed-Solomon Codes Against Insertions and Deletions: Full-Length and Rate-1/2 Codes. 1-6 - Daniel T. Chen, Andrew W. Eckford, Peter J. Thomas:
Capacity of a Class of Fully Observed Multistate Poisson-Type Signal Transduction Channels. 1-6 - Gangsan Kim, Hong-Yeop Song:
Uncorrelated ZCZ Sequence Families Over PSK/PSK+ Alphabet of Small Size Using Cyclic Relative Difference Sets. 1-6 - Xi Zhong
, Samuel Lu, Jörg Kliewer, Mingyue Ji:
Dual-Lagrange Encoding for Storage and Download in Elastic Computing for Resilience. 1-6 - Zhuqing Li, Soheil Mohajer, Behrouz Touri:
On the Lower Bound of Minimax Error for Crowdsourcing. 1-6 - Karim Ezzeddine, Jihad Fahs, Ibrahim C. Abou-Faycal:
On the Lossy Compression of Stable Sources. 1-6 - Bartosz Regula, Ludovico Lami, Nilanjana Datta:
Tight Relations and Equivalences Between Smooth Relative Entropies. 1-6 - Arghavan Zibaie, Spencer Hutchinson, Ramtin Pedarsani, Mahnoosh Alizadeh:
The Safety-Privacy Tradeoff in Linear Bandits. 1-6 - Jeremiah Blocki, Justin Zhang:
Amortized Locally Decodable Codes. 1-6 - Jonas Stapmanns, Catarina Dias, Luke Eilers
, Jean-Pascal Pfister:
Capacity-Achieving Input Distribution of the Additive Uniform Noise Channel with Peak Amplitude and Cost Constraint. 1-6 - Xihang Yuan, Hua Sun:
Vector Linear Secure Aggregation. 1-6 - Mohammad Javad Sojdeh, Mohammad Javad Salehi, Antti Tölli:
Sic-Free Multicast Scheduling for Multi-Antenna Coded Caching. 1-6 - Adrian Vidal, Emanuele Viterbo:
Spectral Analysis of Nanopore DNA Signatures Under Geometric Duplication. 1-6 - Chun Hei Michael Shiu, Hei Victor Cheng, Lele Wang:
On the Information-Theoretic Limit of Subgraph Alignment. 1-6 - Bruno Costa Alves Freire, Nicolas Delfosse, Anthony Leverrier:
Optimizing Hypergraph Product Codes with Random Walks, Simulated Annealing and Reinforcement Learning. 1-6 - Besart Dollma, Ohad Elishco, Eitan Yaakobi:
Coding for Ordered Composite DNA Sequences. 1-6 - Zhaienhe Zhou, Zeyu Guo:
Improved Decoding of Tanner Codes. 1-6 - Vincent Y. F. Tan, Hamdi Joudeh:
Ensemble-Tight Second-Order Asymptotics for Guessing-Based Decoding with Abandonment. 1-6 - Alain Couvreur, Rakhi Pratihar:
Recursive Decoding of Binary Rank Reed-Muller Codes and Plotkin Construction for Matrix Codes. 1-6 - Yuhao Liu, Teng Fu, Jie Fan, Panpan Niu, Chaowen Deng, Zhongyi Huang:
Capacity-Achieving Sparse Superposition Codes with Spatially Coupled VAMP Decoder. 1-6 - Luyao Fan, Jiayang Zou, Jiayang Gao, Jia Wang:
Differential Properties of Information in Jump-Diffusion Channels. 1-6 - Millen Kanabar, Michael Gastpar:
Model Non-Collapse: Minimax Bounds for Recursive Discrete Distribution Estimation. 1-6 - Zhaohong Lu, Qingyu Liu, Haibo Zeng:
Broadcasting With Port Constraints. 1-6 - Zhengyi Jiang, Hao Shi, Zhongyi Huang, Bo Bai, Gong Zhang, Hanxu Hou:
New Piggybacking Codes for Efficient Repair of Single-Node and Double-Node Erasures. 1-6 - Hanzaleh Akbarinodehi, Parsa Moradi, Mohammad Ali Maddah-Ali:
Game of Coding with Unknown Adversary. 1-6 - Amirhosein Morteza, Rémi A. Chou:
Constrained Optimization of Access Functions in Uniform Secret Sharing. 1-6 - Luca G. Tallini, Bella Bose:
On the Theory of $\mathbb{Z}_{m}$ Linear Codes: the $\mathbb{Z}_{m}$ Linear Preparata and Goethals Codes for $m>2$. 1-6 - Jonathan Mosheiff, Nicolas Resch
, Kuo Shang, Chen Yuan:
Randomness-Efficient Constructions of Capacity-Achieving List-Decodable Codes. 1-6 - Jennifer Tang:
Bounding the Capacity of the Multinomial Channel Using KL Divergence Covering and Packing. 1-6 - En-Hui Yang, Shayan Mohajer Hamidi:
Coded Deep Learning: Framework and Preliminary Results. 1-6 - Kayvon Mazooji, Ilan Shomorony:
Guaranteed Recovery of Unambiguous Clusters. 1-6 - Anisha Banerjee, Roni Con, Antonia Wachter-Zeh, Eitan Yaakobi:
Decoding Insertions/Deletions via List Recovery. 1-6 - Hoang Ly, Emina Soljanin, V. Lalitha:
On the Service Rate Region of Reed-Muller Codes. 1-6 - Graeme Smith, Peixue Wu:
Additivity of Quantum Capacities in Simple Non-Degradable Quantum Channels. 1-6 - Zhenduo Wen, Amin Gohari:
A New Upper Bound for Distributed Hypothesis Testing Using the Auxiliary Receiver Approach. 1-6 - Anuran Makur, Japneet Singh:
Bounds on Maximal Leakage Over Bayesian Networks. 1-6 - Amaury Gouverneur, Tobias J. Oechtering, Mikael Skoglund:
Refined PAC-Bayes Bounds for Offline Bandits. 1-6 - Yang Bai, Xuan Guang, Raymond W. Yeung:
Linear Function-Computing Secure Network Coding. 1-6 - Tao Zhang, Bradley A. Malin, Netanel Raviv, Yevgeniy Vorobeychik:
Differential Confounding Privacy and Inverse Composition. 1-6 - Bethany Austhof, Lev Reyzin, Erasmo Tani
:
Non-Adaptive Learning of Random Hypergraphs with Queries. 1-6 - Yi Song, Hao Xu, Kai Wan, Kai-Kit Wong, Giuseppe Caire, Shlomo Shamai Shitz:
Achievable Rates for a Primitive Gaussian Diamond Channel with Rayleigh Fading. 1-6 - Eduardo Camps-Moreno, Jun Bo Lau, Hiram H. López, Welington Santos:
The Permutation Group of Reed-Solomon Codes Over Arbitrary Points. 1-6 - Vlad-Florin Dragoi
, Mohammad Rowshan:
On Partial Weight Distribution of Polar Codes. 1-6 - Nikolaos Papagiannis, Wojciech Szpankowski, Changlong Wu:
Online Learning with Nasty Experts. 1-6 - Xi Zhang, Qixuan Zhu, H. Vincent Poor:
ISAC-Enabled Statistical-QoS Provisioning for mURLLC over Massive MIMO Mobile Networks Using FBC. 1-6 - Madhura Pathegama, Alexander Barg:
Regular LDPC Codes on BMS Wiretap Channels. 1-6 - Adeel Mahmood, Aaron B. Wagner:
Channel Coding for Gaussian Channels with Mean and Variance Constraints. 1-6 - Zijie Chen, Amin Gohari, Chandra Nair:
A Differential Equation Approach to the Most-Informative Boolean Function Conjecture. 1-6 - Mohammad NaseriTehrani, Mohammad Javad Salehi, Antti Tölli:
Achievable Dof Bounds for Cache-Aided Asymmetric Mimo Communications. 1-6 - Stepan Gorelenkov, Mojtaba Vaezi:
Deep Autoencoder-Based Constellation Design in Multiple Access Channels. 1-6 - Ken-ichi Iwata, Kengo Hashimoto, Hirosuke Yamamoto:
Extensions of Asymmetric Binary Systems and Rayleigh's Theorem. 1-6 - Junren Chen, Lexiao Lai, Arian Maleki:
Phase Transitions in Phase-Only Compressed Sensing. 1-6 - Deekshith Pathayappilly Krishnan, Kaan Okumus, Khac-Hoang Ngo, Giuseppe Durisi:
An Achievability Bound for Type-Based Unsourced Multiple Access. 1-6 - Han Xu, Jiayu Pan, Yinfei Xu, Shuo Shao, Tiecheng Song:
Timely Gossip on Lines: Hybrid Ageing. 1-6 - Sujata Bansal, Pramod Kumar Kewat
:
An Infinite Family of Additive Codes Over the Ring $\frac{\mathbb{F}_2[u]}{\left\langle u^4\right\rangle}$ with Lee Distance 8. 1-6 - Buu Phan, Ashish Khisti
:
On List Decoding With Importance Sampling. 1-6 - Zeyan Zhuang, Xin Zhang, Dongfang Xu, Shenghui Song:
Asymptotics of Spiked Covariance Model with Random Projection. 1-6 - Daniella Bar-Lev
, Michael Shlizerman:
A Single-Bit Redundancy Framework for Multi-Dimensional Parametric Constraints. 1-6 - Maria Abu Sini, Reinhard Heckel:
Near Optimal Code Construction for the Adversarial Torn Paper Channel with Edit Errors. 1-6 - Jiayang Zou, Luyao Fan, Jiayang Gao, Jia Wang:
Convexity of Mutual Information Along the Fokker-Planck Flow. 1-6 - Ruiying Cao, Xin Chen:
Optimizing Sequencing Coverage Depth in DNA Storage: Insights from DNA Storage Data. 1-6 - Chao Chen, Sian-Jheng Lin, Yunghsiang S. Han, Baoming Bai:
A Fast Chinese Remaindering Transform Over Finite Fields. 1-6 - Shreya Meel, Xiangliang Kong, Thomas Jacob Maranzatto, Itzhak Tamo, Sennur Ulukus:
Private Information Retrieval on Multigraph-Based Replicated Storage. 1-6 - Yanlin Geng:
A Simple Auxiliary Receiver Outer Bound for Broadcast Channels. 1-6 - Narayana Santhanam, Yixin Zhang:
On Logistic Regression and Maximum Entropy Approaches. 1-5 - Nolan J. Coble
, Alexander Barg:
Coxeter Codes: Extending the Reed-Muller Family. 1-6 - Samin Riasat, Hessam Mahdavifar:
Efficient Covering Using Reed-Solomon Codes. 1-6 - Qinghua Ding, Venkat Anantharam:
The Density Formula Approach for Non-Reversible Isomorphism Theorems, with Applications. 1-6 - Zhongjun Yang
, Li Chen, Kangjian Qin, Xianbin Wang, Huazi Zhang:
Perturbation-Based Decoding Schemes for Long Polar Codes. 1-6 - Adir Kobovich, Eitan Yaakobi, Nir Weinberger:
DeepDIVE: Optimizing Input-Constrained Distributions for Composite DNA Storage via Multinomial Channel. 1-6 - Zhenhao Huang, Minquan Cheng, Qifu Tyler Sun, Youlong Wu:
On the Optimality of All-to-All Broadcast Over Cache-Aided Ring Networks. 1-6 - Zhen-Ming Huang, Hsiang-Yu Hsieh, Cheng-Yu Pai
, Chao-Yu Chen:
A Novel Construction of Gaussian Integer Periodic Z-Complementary Sets. 1-6 - Cécile Bouette, Laura Luzzi, Matthieu R. Bloch:
Covert Capacity of Awgn Channels Under Average Error Probability. 1-6 - Sirui Liu, Zongpeng Li:
Space Information Flow: Multiple Unicast in $l_{p}^{n}$. 1-6 - Recep Can Yavas, Yuqi Huang, Vincent Y. F. Tan, Jonathan Scarlett:
A General Framework for Clustering and Distribution Matching with Bandit Feedback. 1-6 - Yeow Meng Chee, Long Nguyen Tien, Van Khu Vu:
Weight Constrained Run Length Limited Gray Codes. 1-6 - Ankit Pratap Singh, Namrata Vaswani:
Secure Algorithms for Vertically Federated Multi-Task Representation Learning. 1-6 - Gilli Horowitz Hadayo, Yuval Cassuto, Alejandro Cohen:
Noise Recycling Based Multi-Level Flash Memory. 1-6 - Unnikrishnan Kunnath Ganesan, Giuseppe Durisi, Matteo Zecchin, Petar Popovski
, Osvaldo Simeone:
Online Conformal Compression for Zero-Delay Communication with Distortion Guarantees. 1-6 - Or Ordentlich, Yury Polyanskiy:
Optimal Quantization for Matrix Multiplication. 1-6 - Jinyu Wang, Minquan Cheng, Kai Wan, Giuseppe Caire:
A Framework of Constructing PDA via Union of Cache Configurations from Cartesian Product. 1-6 - Wentu Song, Kui Cai, Tony Q. S. Quek:
Sequence Reconstruction for the Single-Deletion Single-Substitution Channel. 1-6 - Sebastian Bitzer, Andrea Di Giusto, Alberto Ravagnani, Eitan Yaakobi:
Bounds and Codes for General Phased Burst Errors. 1-6 - Christoph Hirche, Oxana Shaya
:
Partial Orders and Contraction for BISO Channels. 1-6 - Egemen Erbayat
, Ali Maatouk, Peng Zou, Suresh Subramaniam:
Age of Information Optimization with Preemption Strategies for Correlated Systems. 1-6 - Wenjie Ma, Zhifang Zhang:
Binary Rate-Optimal Streaming Codes with Minimal Code Length. 1-6 - Touheed Anwar Atif, Reuben Blake Tate, Stephan J. Eidenbenz:
Enhancing Quantum Expectation Values Via Exponential Error Suppression and CVaR Optimization. 1-6 - Evan J. D. Anderson, Michael S. Bullock, Filip Rozpedek
, Boulat A. Bash:
Achievability of Covert Quantum Communication. 1-6 - Xiang Zhang, Zhou Li, Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire:
Communication-Efficient Hierarchical Secure Aggregation with Cyclic User Association. 1-6 - Robert P. Malinas, Dogyoon Song, Benjamin D. Robinson, Alfred O. Hero III:
High-Dimensional Sequential Change Detection. 1-6 - Nir Weinberger, Ran Tamir:
Entropy Estimation from Queries and Auxiliary Distribution Samples. 1-6 - Mine Gokce Dogan, Jaimin Shah, Martina Cardone, Christina Fragouli:
On Optimal Two-Priority-Level Codes in Mmwave Networks. 1-6 - Abd El Latif Kadry, Yihan Zhang, Nir Weinberger:
Mean Estimation in High-Dimensional Binary Timeinhomogeneous Markov Gaussian Mixture Models. 1-6 - Matteo Zecchin, Fredrik Hellström, Sangwoo Park, Shlomo Shamai Shitz, Osvaldo Simeone:
Generalization and Informativeness of Weighted Conformal Risk Control Under Covariate Shift. 1-6 - Daofu Zhang, Mehrdad Pournaderi, Yu Xiang, Pramod K. Varshney:
Distributed Multiple Testing with False Discovery Rate Control in the Presence of Byzantines. 1-6 - Tianci Zhang
, Zhengchuan Chen, Zhong Tian, Min Wang, Jemin Lee, Tony Q. S. Quek:
Time-Dependent Statistical Characteristics of Age of Information Under Periodic Updating. 1-6 - Chao Tian, Jun Chen, Krishna Narayanan
:
Source-Channel Separation Theorems for Distortion Perception Coding. 1-6 - Qingyue Zhang
, Xinyi Tong, Tianren Peng, Shao-Lun Huang:
Information-Geometric Analysis of the Optimal Error Exponent in Fixed-Length Hypothesis Testing. 1-6 - Michael Schaller
, Beatrice Toesca
, Van Khu Vu:
A New Construction of Non-Binary Deletion Correcting Codes and Their Decoding. 1-6 - Dganit Hanania, Eitan Yaakobi:
Error-Correcting Codes for Labeled DNA Sequences. 1-6 - Alessio Baldelli, Marco Baldi, Franco Chiaraluce, Paolo Santini:
BF-Max: an Efficient Bit Flipping Decoder with Predictable Decoding Failure Rate. 1-6 - Chandan Anand, Jayesh Seshadri, Prasad Krishnan, Gowtham R. Kurri:
Sun-Jafar-Type Schemes for Weak Private Information Retrieval. 1-6 - Javad Maheri, Petros Elia:
Constructing Hamiltonian Decompositions of Complete $\$\mathrm{K}{\$}$-Uniform Hypergraphs. 1-6 - Praneeth Kumar Vippathalla, Mihai-Alin Badiu, Justin P. Coon:
Graph Compression with Side Information at the Decoder. 1-6 - Chenyi Sun, Ziting Zhang, Kai Wan, Qing Feng, Yan Feng, Giuseppe Caire:
Multi-Message Secure Aggregation with Demand Privacy. 1-6 - Praneeth Kumar Vippathalla, Mihai-Alin Badiu, Justin P. Coon:
Rate-Distortion-Perception Function of Bernoulli Vector Sources. 1-6 - Parsa Moradi, Mohammad Ali Maddah-Ali:
General Coded Computing in a Probabilistic Straggler Regime. 1-6 - Christoph Hofmeister, Rawad Bitar, Antonia Wachter-Zeh:
CAT and DOG: Improved Codes for Private Distributed Matrix Multiplication. 1-6 - Yuchang Sun, Yuexiang Xie, Bolin Ding, Yaliang Li, Jun Zhang:
Exploring Selective Layer Fine-Tuning in Federated Learning. 1-6 - Kumar Nilesh, Christian Deppe, Holger Boche:
Quantum PUF Based Secret Key Generation and Secure Storage with Side Information. 1-5 - Yajun Mei, Benjamin Yakir:
Precise False Alarm Rate of the SUM-CUSUM Scheme for High-Dimensional Streaming Data. 1-6 - Yang Zhou, Wenbo Huang, Kai Wan, Robert Caiming Qiu:
On the Optimal Source Key Size of Secure Gradient Coding. 1-6 - Hassan ZivariFard, Rémi A. Chou, Xiaodong Wang:
Covert Communication Over a Quantum MAC with a Helper. 1-6 - Raj Shekhar, Natasha Devroye, György Turán, Milos Zefran:
Interpreting KO Codes. 1-6 - Kaiyuan Ji, Hemant K. Mishra, Milán Mosonyi, Mark M. Wilde:
Converse Bounds for Quantum Hypothesis Exclusion: A Divergence-Radius Approach. 1-6 - Yotam Gershon, Yuval Cassuto:
In-Memory BER Estimation Using Syndromes of LDPC Codes. 1-6 - Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi
:
Threshold Selection for Iterative Decoding of $(v,\ w)$-Regular Binary Codes. 1-6 - Dian Jin, Yuqian Zhang, Qiaosheng Zhang:
Community Detection for Contextual-Lsbm: Theoretical Limitations of Misclassification Rate and Efficient Algorithms. 1-6 - Sheida Rabeti, Mohsen Moradi, Hessam Mahdavifar:
Bounds and New Constructions for Girth-Constrained Regular Bipartite Graphs. 1-6 - Chenyu Wang
, Amin Gohari:
On $\Phi$ - Entropic Dependence Measures and Non-Local Correlations. 1-5 - Gergely Flamich, Sharang M. Sriramu, Aaron B. Wagner:
The Redundancy of Non-Singular Channel Simulation. 1-6 - Elena Grigorescu, Shreya Nasa, Maoyuan Song:
Communication with Perfect Feedback for Bit Flips and Erasures. 1-5 - Eray Unsal Atay, Eitan Levin, Venkat Chandrasekaran, Victoria Kostina:
Capacity Bounds for Poset-Causal Channels Via Group Symmetry. 1-6 - Mengyuan Zhao, Tobias J. Oechtering, Maël Le Treust:
Zero Estimation Cost Strategy for Witsenhausen Counterexample with Causal Encoder. 1-6 - Julien Juaneda, Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan:
Rhqc: Post-Quantum Ratcheted Key Exchange From Coding Assumptions. 1-6 - Edoardo David Santi, Gongpu Chen, Deniz Gündüz, Asaf Cohen:
Covert Adversarial Actuators in Finite MDPS. 1-6 - R. Jayaharish, K. Bharati, Krishna P. Jagannathan:
Identifying Highly Distillable Entanglement in Pure States Using Multi-Armed Bandits. 1-6 - Yu-Shin Huang, Chao Tian, Krishna Narayanan
, Lizhong Zheng:
Relatively-Secure LLM-Based Steganography via Constrained Markov Decision Processes. 1-6 - Ali Gholami
, Tayyebeh Jahani-Nezhad, Kai Wan, Giuseppe Caire:
Optimal Communication-Computation Trade-Off in Hierarchical Gradient Coding. 1-6 - Julia Gaudio, Phawin Prongpaophan:
Semidefinite Programming for the Asymmetric Stochastic Block Model. 1-6 - Yang Liu
, Bolin Wu, Yuxin Han, Kai Niu:
A Parity-Consistent Decomposition Algorithm to Determine the Weight Distribution of Polar Codes. 1-6 - Jing Zhou, Shuqin Pang, Wenyi Zhang:
A High-Resolution Analysis of Receiver Quantization in Communication. 1-6 - Mohammad Aamir Sohail, Touheed Anwar Atif, S. Sandeep Pradhan:
When Wyner and Ziv Met Bayes in Quantum-Classical Realm. 1-6 - Frederik Walter, Yonatan Yehezkeally
:
Coding for Strand Breaks in Composite DNA. 1-6 - Henry D. Pfister, Oscar Sprumont, Gilles Zémor:
From Bit to Block: Decoding on Erasure Channels. 1-6 - Yun-Han Li, Jin Sima, Ilan Shomorony, Olgica Milenkovic:
Fragmentation in Data Deduplication Systems I: The Stretch Metric. 1-6 - Tuan Thanh Nguyen, Chen Wang, Kui Cai, Yiwei Zhang, Zohar Yakhini:
Constrained Coding for Composite DNA: Channel Capacity and Efficient Constructions. 1-6 - M. Surya Vamsi, Satyajit Thakor
:
On the Capacity of Undirected Multiple Unicast Layered Networks with Asymmetric Demands. 1-6 - Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Nir Weinberger, Deniz Gündüz:
Multi-Terminal Remote Generation and Estimation Over a Broadcast Channel with Correlated Priors. 1-6 - Yuan-Pon Chen, Jin Sima, Olgica Milenkovic:
Generalized Orthogonal De Bruijn Sequences. 1-6 - Yu-Han Huang, Venugopal V. Veeravalli:
Sequential Change Detection for Learning in Piecewise Stationary Bandit Environments. 1-5 - Nir Chisnevski, Ido Tal, Shlomo Shamai Shitz:
An Analytical Study of the Min-Sum Approximation for Polar Codes. 1-6 - Dimitris Chytas, Nithin Raveendran, Bane Vasic:
Enhanced Min-Sum Decoding of Quantum Codes with Iteration Dynamics Memory. 1-6 - Uzi Pereg:
Quantum Relay Channels. 1-6 - Leyang Xia, Shenghao Yang, Ximing Fu
:
Shift-XOR Convertible Locally Repairable Codes. 1-6 - Maxime Bombar, Nicolas Resch
, Emiel Wiedijk:
On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography. 1-6 - Shuai Feng, Liang Feng Zhang:
On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing. 1-6 - Ian George, Alice Zheng
, Akshay Bansal
:
The Rate of Information Destruction and $f$-Divergence Pinsker Inequalities. 1-6 - Vignesh Tirukkonda, Anirudh Rayas, Gautam Dasarathy:
Structure Learning in Gaussian Graphical Models from Glauber Dynamics. 1-6 - Aadil Oufkir, Michael X. Cao, Hao-Chung Cheng, Mario Berta:
Exponents for Shared Randomness-Assisted Channel Simulation. 1-6 - Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau:
On the Minimum Distance and Erasure Correction of Codes with Block Circulant Topology. 1-6 - Yuhang Yao, Syed Ali Jafar:
Can Non-Signaling Assistance Increase the Degrees of Freedom of a Wireless Network? 1-6 - Busra Tegin, Tolga M. Duman:
On the Capacity of Insertion Channels for Small Insertion Probabilities. 1-6 - Smarajit Das:
Lower Bounds on the Size of Orthogonal Arrays. 1-6 - Roni Con, Ryan Gabrys, Eitan Yaakobi:
QBEL: Quantum Burst Error Locating Codes. 1-6 - Roberto Bruno, Roberto De Prisco, Ugo Vaccaro:
Optimal Binary Variable-Length Codes with a Bounded Number of 1's Per Codeword: Design, Analysis, and Applications. 1-6 - Huy Pham, Hoang Ta, Hoa T. Vu:
Constructing Decision Trees from Data Streams. 1-6 - Delphine Boucher, Kayodé Epiphane Nouetowa:
A Decoding Algorithm for Skew Cyclic Generalized Skew Reed-Solomon Codes. 1-6 - Leighton Pate Barnes, Alex Dytso, H. Vincent Poor:
Linearity-Inducing Priors for Poisson Parameter Estimation Under L1 Loss. 1-6 - Andrew Swain, Willie K. Harrison:
Best Linear Wiretap Coset Codes Must Maximize Minimum Distance. 1-6 - Guanghui Song, Junqi Wang, Meiru Gao, Ying Li, Kui Cai:
Probability Distribution of Sneak Path Rate in Resistive Random-Access Memory Arrays. 1-6 - Julian Streit, Franziska Weindel, Reinhard Heckel:
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors. 1-6 - Tsukasa Yoshida, Kazuho Watanabe:
Empirical Bayes Estimation for Lasso-Type Regularizers: Analysis of Automatic Relevance Determination. 1-5 - Han Wu
, Hamdi Joudeh:
Strong Converse Exponent for Remote Lossy Source Coding. 1-6 - V Arvind Rameshwar, V. Lalitha:
An Upper Bound on the Error Probability of Rpa Decoding of Reed-Muller Codes Over the Bsc. 1-6 - Xiao Ma, Yinchu Wang, Qianli Ma, Zhaohao Mo, Xiangping Zheng:
Binary BMST Coding for Near-Lossless Compression of Q-Ary Source. 1-6 - Mohammad Moltafet, Hamid R. Sadjadpour, Zouheir Rezki, Marian Codreanu, Roy D. Yates:
AoI in M/G/1/1 Queues with Probabilistic Preemption. 1-5 - Chenyu Wang, Ayesha Irfan, Yihan Zhang, Michael Langberg, Sidharth Jaggi:
Zero-Error Superposition Codes. 1-6 - Priyanshu Gautam, Kumar Subodh, Amitalok J. Budkuley:
On Interactive Bayesian Persuasion Under Sequential Decision Making. 1-6 - Holger Boche, Volker Pohl, H. Vincent Poor:
Fundamental Limits for Iterated Function Optimization on Turing Machines. 1-6 - Jeremy Johnston, Xiaodong Wang:
State and Measurement Design for Quantum Detection Over Quantum Channels. 1-6 - Boaz Shuval, Ido Tal:
Constant Weight Polar Codes Through Periodic Markov Processes. 1-6 - Paula Belzig, Li Gao, Graeme Smith, Peixue Wu:
Reverse-Type Data Processing Inequality. 1-6 - Peixue Wu
, Yunkai Wang:
Quantum Capacity Amplification via Privacy. 1-6 - Mahdi Cheraghchi, Nikhil Shagrithaya, Alexandra Veliche:
Reductions Between Code Equivalence Problems. 1-6 - Shanuja Sasi, Onur Günlü:
Private Coded Distributed Computing Framework. 1-6 - Adina Waxman, Shai Ginzach, Aviel Glam, Alejandro Cohen:
Blank Space: Adaptive Causal Coding for Streaming Communications Over Multi-Hop Networks. 1-6 - Claudio Mayrink Verdun, Alex Oesterling, Himabindu Lakkaraju, Flávio P. Calmon:
Soft Best-of-$n$ Sampling for Model Alignment. 1-6 - Anand Jerry George, Rodrigo Veiga, Nicolas Macris:
Analysis of Diffusion Models for Manifold Data. 1-6 - Cemre Cadir
, Yanina Y. Shkel:
On the Extremal Mechanisms for Local Differential Privacy & Binary Maximal Leakage. 1-6 - Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff
, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:
Asymptotic Improvements to Provable Algorithms for the Code Equivalence Problem. 1-6 - Yang Liu, Anna Baumeister
, Antonia Wachter-Zeh:
List-Decodability of Random (Linear) Sum-Rank Metric Codes. 1-6 - Viswanathan Ramachandran
, Tobias J. Oechtering, Mikael Skoglund:
Multi-Terminal Strong Coordination Over Noisy Channels with Encoder Cooperation. 1-6 - Sandesh Rao Mattu, Imran Ali Khan, Venkatesh Khammammetti, Beyza Dabak, Saif Khan Mohammed, Krishna Narayanan
, A. Robert Calderbank:
Multiple Preamble Detection with ZC Sequences in the Presence of Mobility and Delay Spread. 1-6 - Enes Arda, Aylin Yener:
A Rate-Distortion Framework for Summarization. 1-6 - Xinzheng He, Li Chen, Yingquan Wu:
Performance Analysis and Enhanced Chase Decoding of BCH Based GII Codes. 1-6 - Yiqi Chen, Holger Boche:
Robust Joint Message and State Transmission Under Arbitrarily Varying Jamming. 1-6 - Kenta Kasai:
Efficient Mitigation of Error Floors in Quantum Error Correction Using Non-Binary Low-Density Parity-Check Codes. 1-6 - Shreya Meel, Pasan Dissanayake, Mohamed W. Nomeir, Sanghamitra Dutta, Sennur Ulukus:
Private Counterfactual Retrieval with Immutable Features. 1-6 - Tian Qiu, Arjun Nichani, Rasta Tadayontahmasebi, Haewon Jeong:
Gone with the Bits: Revealing Racial Bias in Low-Rate Neural Compression for Facial Images. 1-6 - Malhar A. Managoli, Vinod M. Prabhakaran, Suhas N. Diggavi:
Robust Federated Personalised Mean Estimation for the Gaussian Mixture Model. 1-6 - Gunank Jakhar, Gowtham R. Kurri, Suryajith Chillara, Vinod M. Prabhakaran:
Fractional Subadditivity of Submodular Functions: Equality Conditions and Their Applications. 1-6 - Trung Dang
, Zhiyi Huang
:
Robust Max Selection. 1-6 - Anuj Kumar Yadav, Yanina Y. Shkel:
Approximation Guarantees for Minimum Rényi Entropy Functional Representations. 1-6 - Sreejith Sreekumar, Mario Berta, Christoph Hirche, Hao-Chung Cheng:
Distributed Quantum Hypothesis Testing Against Product States Under Zero-Rate Communication Constraints. 1-6 - Nir Weinberger, Ram Zamir:
Exploration-Exploitation Tradeoff in Universal Lossy Compression. 1-6 - Yingyao Zhou, Natasha Devroye, György Turán, Milos Zefran:
On Non-Linearities of Simple Learned AWGN Feedback Codes. 1-6 - Ryosuke Sugiura, Masaaki Nishino, Norihito Yasuda:
Parse Forests with Huffman-Tree-Based Modes for One-Symbol-Delay Encodable VF Codes. 1-6 - Andreas Theocharous, Ioannis Kontoyiannis:
Lossless Data Compression at Pragmatic Rates. 1-6 - Hugo Delavenne, Élina Roussel, Tanguy Medevielle:
Interactive Oracle Proofs of Proximity to Codes on Graphs. 1-6 - Xingyi He, S. Sandeep Pradhan, Andreas J. Winter:
On the Strong Converse Exponent of the Classical Soft Covering. 1-6 - Andrew S. Perley
, Todd P. Coleman:
Broadcasting Bits Through Discrete-Time Queues. 1-6 - Saad Kriouile, Mohamad Assaad, Touraj Soleymani:
Semantics of Anomalies in Networked Control. 1-6 - Xinan Chen, Stefano Chessa, Ian George, Felix Leditzky, Eric Chitambar:
Capacities of Entanglement Distribution from a Central Source. 1-6 - Hari Krishnan P. Anilkumar, Neha Sangwan, Varun Narayanan, Vinod M. Prabhakaran:
Byzantine Distributed Function Computation. 1-6 - Mohsen Moradi, Hessam Mahdavifar:
On Fast SC-Based Polar Decoders: Metric Polarization and a Pruning Technique. 1-6 - Shao-Lun Huang
, Tobias Rippchen, Mario Berta:
Quantum Entropy Prover. 1-6 - Zhichao Liu, Zhiming Ma, Guiying Yan:
A Method to Reduce the Complexity of Computing the Weight Distribution of Polar Codes. 1-6 - Frederik Ritter, Jonathan Mandelbaum, Alexander Fengler, Holger Jäkel, Laurent Schmalen:
Removal of Small Weight Stopping Sets for Asynchronous Unsourced Multiple Access. 1-6 - Dan Song, Ayfer Özgür, Tsachy Weissman:
A Markov Property of Empirical Distributions and the Performance of Compression-Based Denoisers. 1-6 - Yuan Gao, Weijun Fang:
Griesmer-Optimal Locally Repairable Codes via Lengthening Reed-Muller Codes. 1-6 - Yiming Xing
, Georgios Fellouris:
Adaptive 3-Stage Procedures for Multi-Hypothesis Testing. 1-6 - Yun-Feng Lo, Matthieu R. Bloch:
Active Hypothesis Testing for Quantum Detection of Phase-Shift Keying Coherent States. 1-6 - Chengkai Zhu, Renfeng Peng, Bin Gao, Xin Wang:
Riemannian Optimization for Holevo Capacity. 1-6 - Kaan Okumus, Khac-Hoang Ngo, Giuseppe Durisi, Erik G. Ström:
Type-Based Unsourced Multiple Access Over Fading Channels with Cell-Free Massive MIMO. 1-6 - Xihao Li, Li Chen:
List Viterbi Algorithm Aided Low-Latency OSD. 1-6 - Yassine Hamdi, Aaron B. Wagner, Deniz Gündüz:
The Rate-Distortion-Perception Trade-Off with Algorithmic Realism. 1-6 - HanQin Cai, Longxiu Huang:
Property Inheritance for Subtensors in Tensor Train Decompositions. 1-6 - Lucien François
, Eimear Byrne, Alain Couvreur:
Decoding Algorithms for Tensor Codes. 1-6 - Kagan Akcay, Eleftherios Lampiris, Mohammad Javad Salehi, Giuseppe Caire:
Collaborative Coded Caching for Partially Connected Networks. 1-6 - Didrik Bergström, Onur Günlü:
Deep Randomized Distributed Function Computation (DeepRDFC): Neural Distributed Channel Simulation. 1-6 - Michael Langberg, Moshe Schwartz, Itzhak Tamo:
Bounds on Box Codes. 1-6 - A P. Vaideeswaran, Madireddi Sai Harish, Lakshmi Prasad Natarajan:
Subcodes of Second-Order Reed-Muller Codes via Recursive Subproducts. 1-6 - Xiaxin Li
, Arya Mazumdar:
Noisy Nonadaptive Group Testing with Binary Splitting: New Test Design and Improvement on Price-Scarlett-Tan's Scheme. 1-6 - Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Yihan Zhang:
Sliding Window Adversarial Channels. 1-6 - Alex Dytso, Martina Cardone
:
Lossy Source Coding with Focal Loss. 1-6 - Wenbin Wang, Ziping Zhao:
Achieving Oracle Rate for Large Covariance Matrix Estimation from Quadratic Measurements. 1-6 - Zhichao Liu, Liuquan Yao, Yuan Li, Huazi Zhang, Jun Wang, Guiying Yan, Zhiming Ma:
Partial Orders of Rate-Compatible Polar Codes. 1-6 - Pau Colomer, Holger Boche, Andreas J. Winter:
Quantum Hypothesis Testing Lemma for Deterministic Identification over Quantum Channels. 1-5 - Parsa Moradi, Hanzaleh Akbarinodehi, Mohammad Ali Maddah-Ali:
General Coded Computing: Adversarial Settings. 1-6 - Yajuan Liu, Tolga M. Duman:
Constrained Error-Correcting Codes for Efficient DNA Synthesis. 1-6 - Haoyang Hu, Viveck R. Cadambe:
Differentially Private Secure Multiplication with Erasures and Adversaries. 1-6 - Chih-Hsuan Li, Yu-Chih Huang, Wen-Hsuan Li:
Quickest Mean-Change Detection via Confidence Sequence and Backward Sample Averages. 1-6 - Vishal Singh, Theshani Nuradha, Mark M. Wilde:
Extendible Quantum Measurements and Limitations on Classical Communication. 1-6 - Wei Liu, Tom Richardson, Changlong Xu, Hao Xu:
Efficient Parallel PAS by Sequence Snipping and Arithmetic Coding Based Sphere Shaping. 1-6 - Mohannad Shehadeh, Frank R. Kschischang:
Higher-Order Staircase Codes: A Unified Generalization of High-Throughput Coding Techniques. 1-6 - Min Qiu, Ming-Chun Lee, Yu-Chih Huang, Jinhong Yuan:
On the Scaling Law Tradeoff of Integrated Sensing and Communication Networks. 1-6 - Kenneth W. Shum, Zhihang Deng, Yongyi Li, Ruizhe Wang:
Design of Storage Codes Based on Integer Arithmetic Modulo a Power of Two. 1-6 - Riccardo Rossetti, Galen Reeves:
Fundamental Limits for High-Dimensional Factor Regression Models. 1-6 - Matteo Bertuzzo, Alberto Ravagnani, Eitan Yaakobi:
The Coverage Depth Problem in Dna Storage Over Small Alphabets. 1-6 - Renpu Liu, Liwen Zhong, Wooram Lee, Jing Yang:
In-Context Learning Based Efficient Spectrum Sensing. 1-6 - G. Dhinesh Chandran, Kota Srinivas Reddy, Srikrishna Bhashyam:
Online Clustering With Bandit Information. 1-6 - Qinghua Devon Ding, Venkat Anantharam:
On Statistical Estimation of Edge-Reinforced Random Walks. 1-6 - Mohammad Reza Deylam Salehi, Vijith Kumar Kizhakke Purakkal, Derya Malak:
Non-Linear Function Computation Broadcast. 1-6 - Zilong Wang, Tao Zhang, Qi Feng, Fan Wang, Gennian Ge:
On the Construction of Mutually Unbiased Sets of Orthogonal Vectors. 1-4 - Holger Boche, Christian Deppe, Safieh Mahmoodi, Gholam Reza Omidi:
Galaxy Codes: Advancing Achievability for Deterministic Identification via Gaussian Channels. 1-6 - Juyun Oh, Taewoo Park, Jiwoong Im, Yuval Cassuto, Yongjune Kim:
Quantizing for Noisy Flash Memory Channels. 1-6 - Jefrin Sharmitha Prabhu, Abhinav Vaishya, Shobhit Bhatnagar, Aryaman Manish Kolhe, V. Lalitha, P. Vijay Kumar:
On the Efficacy of the Peeling Decoder for the Quantum Expander Code. 1-6 - M. Yusuf Sener, Gerhard Kramer, Shlomo Shamai Shitz, Wen Xu:
Scalar Lattices and Probabilistic Shaping for Dithered Wyner-Ziv Quantization. 1-6 - Geyang Wang, Alexander Barg, Navin Kashyap:
Recoverable Systems as Interaction Models: A Study by Example. 1-6 - Minquan Cheng, Huimei Wei, Kai Wan, Giuseppe Caire:
A New Construction Structure on Coded Caching with Linear Subpacketization: Non-Half-Sum Disjoint Packing. 1-6 - Thanushon Sivakaran, En-Hui Yang:
Leveraging Conditional Mutual Information to Improve Large Language Model Fine-Tuning for Classification. 1-6 - Hojat Allah Salehi, Farhad Shirani, S. Sandeep Pradhan:
Quantum Advantage in Non-Interactive Source Simulation. 1-6 - Kanumuri Nithin Varma, Babak Hassibi:
Ensemble Mirror Descent: a Generalization of Mirror Descent to Multiple Convex Potentials. 1-6 - Kaan Buyukkalayci, Merve Karakas, Xinlin Li, Christina Fragouli:
Enhancing Binary Search via Overlapping Partitions. 1-6 - Cheuk Ting Li:
Discrete Layered Entropy, Conditional Compression and a Tighter Strong Functional Representation Lemma. 1-6 - Julia Gaudio, Charlie K. Guan:
Sharp Exact Recovery Threshold for Two-Community Euclidean Random Graphs. 1-6 - Gustaf Ahlgren, Onur Günlü:
Secure Rate-Distortion-Perception Trade-off Over Channels: A Randomized Distributed Function Computation (RDFC) Application. 1-6 - Zhou Li, Siyan Qin, Xiang Zhang, Jihao Fan, Haiqiang Chen, Giuseppe Caire:
Noise Capacity of Conditional Disclosure of Secrets: A Graph-Theoretic Perspective. 1-6 - Mingming Zhang, Youlong Wu, Dianhua Wu, Minquan Cheng:
Order Optimal Cascaded Coded Distributed Computing with Low Complexity and Improved Flexibility. 1-6 - Yumeng Yang, Han Cai, Xiaohu Tang:
A Multi-Node Repair Scheme of Reed-Solomon Codes. 1-6 - Sajani Vithana, Viveck R. Cadambe, Flávio P. Calmon, Haewon Jeong:
Differentially Private Distributed Mean Estimation with Constrained User Correlations. 1-6 - Ruida Zhou, Antonious M. Girgis, Suhas N. Diggavi:
Personalized Heterogeneous Mean Estimation Under User-Level LDP. 1-6 - Greg Fields, Tara Javidi:
Active Sampling for Markov Hypothesis Testing. 1-6 - Satyajit Dhadumia, M. Ashok Kumar:
A Generalized CraméR-Rao Bound Using Information Geometry. 1-6 - Zahra Honjani, Mohsen Heidari:
Improved Classical Shadow Tomography Using Quantum Computation. 1-6 - Anisha Banerjee, Yonatan Yehezkeally
, Antonia Wachter-Zeh, Eitan Yaakobi:
Correcting Multiple Substitutions in Nanopore-Sequencing Reads. 1-6 - Mohamed Seif, Antti Koskela, Andrea J. Goldsmith:
Private Spectral Clustering Over Binary Stochastic Block Models. 1-6 - Seung-Hyun Nam, Hyun-Young Park, Joonwoo Bae, Si-Hyeon Lee:
Quantum Advantage in Private Multiple Hypothesis Testing. 1-6 - Giles Bischoff, Chih-Chun Wang:
Low-Latency Preamble-Free Transmission of Short Messages via Quickest Change Detection. 1-6 - Vamoua Yachongka, Rémi A. Chou:
Privacy-Constrained Lossy Function Computation in Distributed Databases. 1-6 - Abolfazl Hashemi, Dongmin Lee
, Anuran Makur:
Strong Antithetic Variance Reduction Inequalities. 1-6 - Tianren Peng, Qi Li, Shao-Lun Huang:
On the Optimal Second-Order Convergence Rate of Minimax Estimation Under Weighted Mse. 1-6 - Zitan Chen:
Coded String Reconstruction from Erroneous Prefix-Suffix Compositions. 1-6 - Lukas Rapp, Jiewei Feng
, Muriel Médard, Ken R. Duffy:
A Balanced Tree Transformation to Reduce GRAND Queries. 1-6 - Xiaoyun Gong, Sloan Nietert, Ziv Goldfeld:
Robust Alignment via Partial Gromov-Wasserstein Distances. 1-6 - Andrea Munari:
On the Uncertainty of a Simple Estimator for Remote Source Monitoring over ALOHA Channels. 1-6 - Nadim Ghaddar, Lele Wang, Wei Yu
:
On-Grid Angle-of-Arrival Estimation in Large-Scale MIMO Systems Using Channel Codes. 1-6 - Ryan Song, Wei Yu
:
Downlink Massive Random Access with Lossy Source Coding. 1-6 - Akira Kamatsuka, Takahiro Yoshida:
Several Representations of $\alpha$-Mutual Information and Interpretations as Privacy Leakage Measures. 1-6 - Yonghui Li, Chentao Yue, Branka Vucetic:
Optimal Linear Map Decoding of Convolutional Codes. 1-6 - Jessica Bariffi, Antonia Wachter-Zeh, Eitan Yaakobi:
Sequence Reconstruction Over Coloring Channels for Protein Identification. 1-6 - Arunabh Srivastava, Thomas Jacob Maranzatto, Sennur Ulukus:
Age of Gossip with Time-Varying Topologies. 1-6 - Idan Tzachy, Ron Dabora, Shlomo Shamai:
An Upper Bound on the Capacity of Bandlimited LTI AWGN Channels subject to Peak-Amplitude Constraint. 1-6 - Lan Ma, Qifu Tyler Sun, Zongpeng Li:
Two-Dimensional Vector Linear Network Coding. 1-6 - Yifan Feng, Zhengchuan Chen, Mehul Motani, Howard H. Yang, Min Wang, Tony Q. S. Quek:
Remote Online Estimation of the Wiener Process: A Preprocessing Method to Ensure Distortion Convergence. 1-6 - Iris Kaplan, Or Ordentlich:
High-Rate Nested-Lattice Quantized Matrix Multiplication with Small Lookup Tables. 1-6 - Tai-Chun Yeh, Yu-Pin Hsu:
Optimizing the Trade-Off Between Throughput and Paoi Outage Exponents. 1-6 - Krishna Gopal Benerjee, Adrish Banerjee:
Single Edit Error-Correcting DNA Codes with Multiple Biological and Combinatorial Constraints: An Algebraic Approach. 1-6 - Galen Reeves, Henry D. Pfister:
Information-Theoretic Proofs for Diffusion Sampling. 1-6 - Ran Tamir, Nir Weinberger:
Achievable Rates of Frequency-based Channels of Unlimited Input Resolution. 1-6 - Yulin Chen, Raymond W. Yeung:
On Minimum Distances of Network Error Control Codes. 1-6 - Truman Welling, Rémi A. Chou, Aylin Yener:
Secret Sharing Over a Two Receiver Classical-Quantum Broadcast Channel. 1-6 - Holger Boche, Andrea Grigorescu, Rafael F. Schaefer
, H. Vincent Poor:
Arithmetic Complexity of the Secrecy Capacity of Fast-Fading Gaussian Channels. 1-6 - Karan Vikyath Veeranna Rupashree, Siddharth Baskar, Daniel L. Pimentel-Alarcón:
Latent Union Completion. 1-6 - Saar Tarnopolsky, Zirui Deng, Vinayak Ramkumar, Netanel Raviv, Alejandro Cohen:
Individual Confidential Computing of Polynomials Over Non-Uniform Information. 1-6 - Kerong Wang, Zheng Zhang, Qian Yu:
Lagrange Coding for Tensor Network Contraction: Achieving Polynomial Recovery Thresholds. 1-6 - Tadashi Wadayama, Koji Igarashi, Takumi Takahashi:
Physics-Aware Decoding for Communication Channels Governed by Partial Differential Equations. 1-6 - So Suda, Shun Watanabe:
An Improved Lower Bound on Oblivious Transfer Capacity Using Polarization and Interaction. 1-6 - Xin Zhang, Zeyan Zhuang, Shenghui Song, Chau Yuen, Mérouane Debbah:
Capacity of Holographic MIMO Systems with Mutual Coupling. 1-6 - Ali Zafari, Xi Chen, Shirin Jalali:
DeCompress: Denoising via Neural Compression. 1-6 - Zihao Gong, Saikat Guha:
Entanglement-Enhanced Change Detection. 1-6 - Salman Beigi, Hami Mehrabi:
Monotonicity of the von Neumann Entropy Under Quantum Convolution. 1-6 - Mert Gökduman, Hanwen Yao, Henry D. Pfister:
The Performance of Long Quantum LDPC Codes Based on the Hypergraph Product. 1-6 - Xiangliang Kong, Xin Wang, Ron M. Roth, Itzhak Tamo:
New Bounds and Constructions for Variable Packet-Error Coding. 1-6 - Yuhao Liu, Yizhou Xu, TianQi Hou:
The Error Probability of Spatially Coupled Sparse Regression Codes Over Memoryless Channels. 1-6 - Shuo Wu, Pawan Poojary, Randall Berry:
Observational Learning with a Budget. 1-6 - Willie K. Harrison, Aylin Yener:
Authorship Identification: from Fundamental Limits to Practice. 1-6 - George Vershinin
, Asaf Cohen, Omer Gurewitz:
Multi-Stage Active Sequential Hypothesis Testing with Clustered Hypotheses. 1-6 - Xinyuanmeng Yao, Xiao Ma:
Low-Complexity PSCL Decoding of Polar Codes. 1-6 - Yuanxin Guo, Stark C. Draper, Wei Yu
:
Modulo Quantization Coding for Gaussian Primitive Relay Channel With Perfectly Correlated Noises. 1-6 - Yang Lu, Margreta Kuijper, Jingge Zhu:
Towards Unified and Sharpened CMI Bounds for Generalization Errors. 1-6 - Sahan Liyanaarachchi, Sennur Ulukus:
Optimum Monitoring and Job Assignment with Multiple Markov Machines. 1-6 - Chen Wang, Yiwei Zhang, Kui Cai, Tuan Thanh Nguyen:
Capacities of DNA Constrained Channel: Efficient Synthesis and Biological Constraints. 1-6 - Dengsheng Lin:
A Design of Convolutional Gaussain Random Codes. 1-6 - Kengo Hashimoto, Ken-ichi Iwata:
A Lower Bound of Worst-Case Redundancy of $k$-Symbol Delay Decodable Codes. 1-6 - Abhishek Sarkar, Bikash Kumar Dey:
Message Identification Over Binary Noisy Permutation Channels. 1-6 - Ismail Cosandal, Sennur Ulukus, Nail Akar:
Which Sensor to Observe? Timely Tracking of a Joint Markov Source with Model Predictive Control. 1-6 - Harsh Vardhan, Avishek Ghosh, Arya Mazumdar:
Learning and Generalization with Mixture Data. 1-6 - Amir Ziaeddini, Yauhen Yakimenka, Jörg Kliewer:
Differentially-Private Decentralized Learning in Heterogeneous Multicast Networks. 1-6 - Jiayi Yang, Qianfan Wang, Shuangyang Li, Peng Kang, Xiao Ma, Baoming Bai, Giuseppe Caire:
Analysis and Design of Improved 5G LDPC Codes for Faster-Than-Nyquist Signaling. 1-6 - Jyun-Sian Wu, Pin-Hsun Lin, Marcel A. Mross
, Eduard A. Jorswieck:
Wrap-Decoding in Asynchronous Unsourced Multiple Access With and Without Delay Information. 1-6 - Jiannan Li, Yiyang Yang, Yao Wang, Shaojie Tang:
A Unified Regularization Approach to High-Dimensional Generalized Tensor Bandits. 1-6 - Jonas Hawellek, Athin Mohan
, Hadi Aghaee, Christian Deppe:
The Interference Channel with Entangled Transmitters. 1-6 - Rajlaxmi Pandey, Charul Rajput
, B. Sundar Rajan:
Hierarchical Coded Caching in High Memory Regime with Coded Placement. 1-6 - Salman Habib, Taejoon Kim, Rémi A. Chou:
Sequential Interval Passing for Compressed Sensing. 1-6 - Giuseppe Serra, Photios A. Stavrou, Marios Kountouris:
On the Rate-Distortion-Perception Function for Gaussian Processes. 1-6 - Sagnik Bhattacharya:
Improved Upper Bound on Multiterminal Entanglement Distillation. 1-6 - Dina Abdelhadi, Colin Sandon, Emmanuel Abbe, Rüdiger L. Urbanke:
Reed-Muller Codes for Quantum Pauli and Multiple Access Channels. 1-6 - Gakuto Obi, Ayato Saito, Yuto Sasaki, Tsuyoshi Kato:
Linearly Convergent Mixup Learning. 1-6 - Lugaoze Feng
, Xunan Li, Guocheng Lv, Ye Jin:
New Channel Coding Lower Bounds for Noisy Permutation Channels. 1-6 - Lev Yohananov, Isaac Barouch Essayag:
Optimal Functional $2^{s-1}$-Batch Codes: Exploring New Sufficient Conditions. 1-6 - Aaron Putterman, Vadim Zaripov:
Bivariate Linear Operator Codes. 1-6 - Johannes Rosenberger, Holger Boche, Juan A. Cabrera, Christian Deppe, Frank H. P. Fitzek
:
Stochastic Consensus-Testing in Relay Networks. 1-6 - Vincent Wüst, Erdem Eray Cil, Laurent Schmalen:
Protograph-Based LDPC Codes with Local Irregularity. 1-6 - Ziv Aharoni, Henry D. Pfister:
Neural Polar Decoders for Deletion Channels. 1-6 - Tamara Abou El Hessen, Daniela Tuninetti, Adam Belkhadir, Aritra Banerjee:
Channel Capacity Analysis with Nonlinear Effects of RF Power Amplifiers. 1-6 - Homa Nikbakht, Yonina C. Eldar, H. Vincent Poor:
A MIMO ISAC System for Ultra-Reliable and Low-Latency Communications. 1-6 - Naomi Sagan, Tsachy Weissman:
A Family of Lz78-Based Universal Sequential Probability Assignments. 1-6 - Colton P. Lindstrom, Matthieu R. Bloch:
Rate Distortion Approach to Joint Communication and Sensing with Markov States: Open Loop Case. 1-6 - Daniel J. Costello Jr., Min Zhu, David G. M. Mitchell, Michael Lentmaier:
High-Rate Spatially Coupled LDPC Codes Based on Massey's Convolutional Self-Orthogonal Codes. 1-6 - Malcolm Egan:
Risk-Aware Estimation from Compressed Data Beyond the Bayes Risk. 1-6 - Daiki Suruga:
A Unified Approach and Solutions for $n$-Task Problems. 1-6 - Ibrahim C. Abou-Faycal, Jihad Fahs, Ibrahim Issa:
The Generalized Chernoff-Stein Lemma, Applications and Examples. 1-6 - Hadi Aghaee, Christian Deppe:
On Oblivious Transfer Capacity of Noisy Multiple Access Channel. 1-6 - Xianyin Zhang, Jinchi Chen, Ke Wei:
Phase Retrieval of Spectrally Sparse Signals. 1-6 - Yossef Steinberg:
Degradedness Under Cooperation. 1-6 - Justin Zhang, K. V. Rashmi:
Secure Convertible Codes for Passive Eavesdroppers. 1-6 - Sijie Li, Takashi Tanaka, Hyeji Kim:
Lower Bound of Networked Linear Quadratic Gaussian Plant with Two Linear Sensors and One Controller. 1-6 - Pumiao Yan, Jiwon Jeong, Naomi Sagan, Tsachy Weissman:
Universal Discrete Filtering with Lookahead and Delay. 1-6 - M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, G. Yeswanth Sai, Xiangliang Kong:
On Linear Field Size Access-Optimal MDS Convertible Codes. 1-6 - Maryam Sadeghi, Hassan Khodaiemehr, Chen Feng:
Design and Decoding of Full-Diversity Construction-D Lattices on Block-Fading Channels. 1-6 - Mohsen Moradi, Hessam Mahdavifar:
PAC Codes with Bounded-Complexity Sequential Decoding: Pareto Distribution and Code Design. 1-6 - Xinlin Li, Osama A. Hanna, Christina Fragouli, Suhas N. Diggavi:
D2C-CID: Discrete-to-Continuous Common Information Dimension. 1-6 - Arghya Chakraborty, Georgios Fellouris:
High-dimensional Quickest Change Detection in Multiple Data Streams with Adaptive Window-Based Subset Estimation. 1-6 - Sabrina Liu, Todd P. Coleman:
Inferring Dynamic Delays Using a Sample Path Causal Measure. 1-6 - Anoosheh Heidarzadeh, Ningze Wang, Alex Sprintson:
A Linear Programming Approach to Private Information Retrieval. 1-6 - Burak Çakmak, Giuseppe Caire:
Multi-Source Approximate Message Passing With Random Semi-Unitary Dictionaries. 1-6 - Julia Gaudio, Heming Liu:
Spectral Recovery in the Labeled SBM. 1-6 - Florian Seitz, Janis Nötzel:
Capacity Formulas for the Lossy Bosonic Compound Wiretap Channel. 1-6 - Mohamed W. Nomeir, Alptug Aytekin, Sennur Ulukus:
The Asymptotic Capacity of Byzantine Symmetric Private Information Retrieval and its Consequences. 1-6 - Or Elimelech, Asaf Cohen:
PIR Over Wireless Channels: Achieving Privacy with Public Responses. 1-6 - Kristiyan Savov, Constantin Runge
:
Quantized Enumerative Sphere Shaping. 1-6 - Swapnil Saha, Emina Soljanin, Philip Whiting:
On Optimal Batch Size in Coded Computing. 1-6 - Merve Karakas, Osama A. Hanna, Lin F. Yang, Christina Fragouli:
Does Feedback Help in Bandits with Arm Erasures? 1-6 - Theshani Nuradha, Vishal Singh, Mark M. Wilde:
Measured Hockey-Stick Divergence and Its Applications to Quantum Pufferfish Privacy. 1-6 - Thomas Jacob Maranzatto, Arunabh Srivastava, Sennur Ulukus:
Information Degradation and Misinformation in Gossip Networks. 1-6 - Cüneyd Öztürk, Dongning Guo, Randall A. Berry, Michael L. Honig:
Downlink Spectral Efficiency of Leo Satellite Constellations. 1-6 - Ruizhi Zhang:
Optimal Bounded-Influence Procedure for Robust Sequential Change-Point Detection. 1-6 - Maximilian Egger, Rüdiger L. Urbanke, Rawad Bitar:
Federated One-Shot Learning with Data Privacy and Objective-Hiding. 1-6 - Igor L. Aureliano, Alejandro Cohen, Rafael G. L. D'Oliveira:
Optimal Computational Secret Sharing. 1-6 - Shayan Mohajer Hamidi, En-Hui Yang:
Score-Based Manifold Projection for Diffusion-Based Inverse Problems. 1-6 - Kunal Dey
, Reihaneh Safavi-Naini:
Secure Composition of Quantum Key Distribution and Symmetric Key Encryption. 1-6 - Mohammad Rowshan, Vlad-Florin Dragoi
:
Towards Weight Distribution-Aware Polar Codes. 1-6 - Amirmohammad Farzaneh, Osvaldo Simeone:
Statistically Valid Information Bottleneck via Multiple Hypothesis Testing. 1-5 - Jan Christian Riedel, Chee-Wei Tan, Giuseppe Caire:
Deep Unfolding of Fixed-Point Based Algorithm for Weighted Sum Rate Maximization. 1-6 - Abhishek Roy
, Smarajit Das, Sudhan Majhi
:
Construction of MOGCS with Flexible Parameters via Extended Boolean Functions. 1-6 - Wesley A. Suttle:
An Analysis of Plug-in and Bias-corrected Fixed-k Nearest Neighbor Density Functional Estimators. 1-6 - Rui Sun, Yiwei Zhang:
MDS-TPIR Schemes: Disguise and Squeeze. 1-6 - Monica Welfert, Nathan Stromberg, Mario Díaz, James Melbourne, Lalitha Sankar:
Auditing Privacy of Additive Noise Mechanisms Using Linear Predictive Models. 1-6 - Boqing Zhang, Hanwen Yao, Henry D. Pfister:
Belief Propagation Decoding on a Sparsified Graph Ensemble of the Surface Code. 1-6 - Adway Girish, Emre Telatar, Shlomo Shamai Shitz:
On Entropy-Constrained Gaussian Channel Capacity via the Moment Problem. 1-6 - Shayan Mohajer Hamidi, En-Hui Yang:
Conditional Mutual Information Based Diffusion Posterior Sampling for Solving Inverse Problems. 1-6 - Wafa Labidi, Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:
Common Randomness Generation from Sources with Infinite Polish Alphabets. 1-6 - Sahasrajit Sarmasarkar, Harish Pillai:
Optimal Moments on Redundancies in Job Cloning. 1-6 - Huanran Li, Daniel L. Pimentel-Alarcón:
Deep Fusion: Capturing Dependencies in Contrastive Learning via Transformer Projection Heads. 1-6 - Nithish Suresh Babu, Adi Krishnamoorthy, Ron M. Roth, Paul H. Siegel:
On Differential Varshamov - Tenengolts Codes. 1-6 - Johannes Rosenberger, Holger Boche, Christian Deppe, Uzi Pereg:
The Quantum Identification Capacity with Entanglement Assistance. 1-6 - Xuzhe Xia, Nicholas Kwan, Lele Wang:
On the Worst-Case Complexity of Gibbs Decoding for Reed-Muller Codes. 1-6 - Yuan Li, Zicheng Ye, Huazi Zhang, Jun Wang, Guiying Yan, Zhiming Ma:
On the Average Weight Spectrum of Pre-Transformed Rate-Compatible Polar Codes. 1-5 - Vikrant Malik, Taylan Kargin, Victoria Kostina, Babak Hassibi:
Distributionally Robust Scalar Quantization Using the Wasserstein Distance. 1-6 - Hassan ZivariFard, Rémi A. Chou, Xiaodong Wang:
Joint Covert Communication and Covert Secret Key Generation via Causal CSI. 1-6 - Ching-Fang Li, Mary Wootters:
Improved Bounds on Access-Redundancy Tradeoffs in Quantized Linear Computations. 1-6 - Boaz Moav, Eitan Yaakobi, Ryan Gabrys:
Complex DNA Synthesis Sequences. 1-6 - Chentao Yue, Branka Vucetic, Yonghui Li:
Guesswork Complexity of Ordered Statistics Decoding and its Saturation Threshold. 1-6 - Avital Boruchovsky, Tuvi Etzion, Ron M. Roth:
On Nearly Perfect Covering Codes. 1-6 - Joonhyuk Yang, Hye Won Chung:
Improved Community Recovery via Exact Matching in Correlated Contextual Stochastic Block Models. 1-6 - Kayodé Epiphane Nouetowa, Pierre Loidreau:
An Analysis of a Generalization of Loidreau's Encryption Scheme. 1-6 - Oliver Kosut, Michael Langberg, Michelle Effros:
Switched Feedback for the Multiple-Access Channel. 1-6 - Junsheng Liu, Netanel Raviv:
Single Fragment Forensic Coding from Van Der Corput Sets. 1-6 - Antoine Dailly, Tuomo Lehtilä
:
Reconstructing Graphs from Subgraph Compositions. 1-6 - V Arvind Rameshwar, Anshoo Tandon, Abhay Sharma:
Improving the Privacy Loss Under User-Level DP Composition for Fixed Estimation Error. 1-6 - Mehdi Molkaraie:
On the Equivalence of Gaussian Graphical Models Defined on Complete Bipartite Graphs. 1-6 - Yirong Shen, Lu Gan, Cong Ling:
Generalized Score Matching: Bridging $f$-Divergence and Statistical Estimation Under Correlated Noise. 1-6 - Taha Ameen, Bruce E. Hajek
:
Detecting Correlation Between Multiple Unlabeled Gaussian Networks. 1-6 - Hanyang Jiang, Yao Xie, Feng Qiu:
Spatio-Temporal Conformal Prediction for Power Outage Data. 1-6 - Jordan Hong
, Stefan M. Moser:
MISO Wireless Optical Communication Under a First-Moment and a Peak-Power Constraint: Theoretical and Practical Aspects. 1-6 - Chin Wa Ken Lau, Xiang Shi, Ziyan Zheng, Haiwen Cao, Nian Guo:
Interplay Between Belief Propagation and Transformer: Differential-Attention Message Passing Transformer. 1-6 - Yeganeh Alimohammadi, Luana Ruiz, Amin Saberi:
A Local Graph Limits Perspective on Sampling-Based GNNs. 1-6 - Roee Gross, Roni Con, Eitan Yaakobi:
Improved Constructions of Linear Codes for Insertions and Deletions. 1-6 - Sidharth Jaggi, Shashank Vatedka, Venkat Chandar, Aslan Tchamkerten:
A Simple Low Complexity Locally Private Compression Scheme. 1-5 - Ming Li, Minghui Yang, Xianhui Lu:
Channel Capacity Under Exponentially Decreasing Error Probability. 1-6 - Wenyuan Zhao, Yu-Shin Huang, Chao Tian, Alex Sprintson:
Optimizing Leaky Private Information Retrieval Codes to Achieve $O(\log K)$ Leakage Ratio Exponent. 1-6 - Zicheng Ye, Yuan Li, Zhichao Liu, Huazi Zhang, Jun Wang, Guiying Yan, Zhiming Ma:
On the Weight Spectrum of Rate-Compatible Polar Codes. 1-6 - Sifat Munim, Aditya Ramamoorthy:
Approximate Gradient Coding Using Convex Optimization. 1-6 - Matthieu Fradelizi, Lampros Gavalakis, Martin Rapaport:
A Dimensional Improvement of the Entropy Power Inequality Under Marginal Assumptions. 1-6 - Tiju Cherian John, Hemant K. Mishra, Saikat Guha:
A Complete Characterization of Passive Unitary Normalizable (PUN) Gaussian States. 1-6 - Duncan Soiffer, Andrew Salls, Chase Miller, Daniel Reichman, Gábor N. Sárközy, George T. Heineman:
Improved Lower Bounds on the Expected Length of Longest Common Subsequences. 1-6 - Hanzaleh Akbarinodehi, Viveck R. Cadambe
, Mohammad Ali Maddah-Ali:
Game of Coding: Enabling Sybil Resistant Decentralized Machine Learning. 1-6 - Yeow Meng Chee, Tuvi Etzion, Huimin Lao:
Hierarchy of Pseudo-Random Array Codes. 1-6 - Giorgio Taricco:
Outage Probability of Correlated RIS-Aided Communication Links. 1-5 - Alankrita Bhatt, Or Ordentlich, Oron Sabag:
Optimal Online Bookmaking for Binary Games. 1-6 - Shiv Pratap Singh Rathore, Navin Kashyap:
Trace Reconstruction of First-Order Reed-Muller Codewords Using Run Statistics. 1-6 - Tal Philosof, Ariel Doubchak, Amit Berman
, Uri Erez:
Extension of the Poltyrev Bound to Binary Memoryless Symmetric Channels. 1-6 - Lewen Wang, Zihao Zhang, Sihuang Hu:
Lower Bounds on the Sub-Packetization of Optimal-Access Msr Codes for Multiple-Node Repair. 1-6 - Koki Takahashi, Shun Watanabe:
Channel Resolvability Using Multiplicative Weight Update Algorithm. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.