


default search action
ITW 2021: Kanazawa, Japan
- IEEE Information Theory Workshop, ITW 2021, Kanazawa, Japan, October 17-21, 2021. IEEE 2021, ISBN 978-1-6654-0312-2

- Anoosheh Heidarzadeh, Alex Sprintson:

Single-Server Individually-Private Information Retrieval: A Combinatorial Approach. 1-6 - Uzi Pereg, Roberto Ferrara

, Matthieu R. Bloch
:
Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels. 1-6 - Omri Lev, Anatoly Khina

:
Energy-limited Joint Source-Channel Coding via Analog Pulse Position Modulation. 1-6 - Maki Yoshida:

Hybrid Multiplicative Secret Sharing. 1-5 - Roy Shafir, Omer Sabary, Leon Anavy, Eitan Yaakobi, Zohar Yakhini:

Sequence Reconstruction Under Stutter Noise in Enzymatic DNA Synthesis. 1-6 - Holger Boche, Christian Deppe:

Computability of the Zero-Error Capacity of Noisy Channels. 1-6 - Junge Wang, Zhuqing Jia, Syed Ali Jafar:

Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis. 1-6 - Recep Can Yavas, Victoria Kostina

, Michelle Effros:
Nested Sparse Feedback Codes for Point-to-Point, Multiple Access, and Random Access Channels. 1-6 - Shih-Chun Lin

, Yi-Chun Lai, Yu-Chih Huang
, Chih-Chun Wang, I-Hsiang Wang:
Optimal finite-length linear codes and the corresponding channel dispersion for broadcast packet erasure channels with feedback. 1-6 - Eeshan Modak, Himanshu Asnani, Vinod M. Prabhakaran:

Rényi Divergence Based Bounds on Generalization Error. 1-6 - Bing Zhu, Shigeng Zhang, Weiping Wang:

Expandable Fractional Repetition Codes for Distributed Storage Systems. 1-5 - Amichai Painsky:

Refined Convergence Rates of the Good-Turing Estimator. 1-5 - Irina E. Bocharova, Boris D. Kudryashov, Evgenii P. Ovsyannikov, Vitaly Skachek:

A Random Coding Bound on the ML Decoding Error Probability for NB LDPC Coded QAM Signals. 1-6 - Meng-Che Chang, Matthieu R. Bloch:

Covert Sequential Hypothesis Testing. 1-6 - Shuqin Pang, Wenyi Zhang:

Generalized Nearest Neighbor Decoding for MIMO Channels with Imperfect Channel State Information. 1-6 - Jixiang Zhang, Yinfei Xu:

On Age of Information for Discrete Time Status Updating System With Ber/G/1/1 Queues. 1-6 - Pooja Nayak Muralidhar, Digvijay Katyal, B. Sundar Rajan:

Maddah-Ali-Niesen Scheme for Multi-access Coded Caching. 1-6 - Yonglong Li, Vincent Y. F. Tan, Marco Tomamichel:

Optimal Adaptive Strategies for Sequential Quantum Hypothesis Testing. 1-6 - Matías Bilkis, Matteo Rosati

, John Calsamiglia:
Reinforcement-learning calibration of coherent-state receivers on variable-loss optical channels. 1-6 - Zhaoqiang Liu, Subhroshekhar Ghosh, Jonathan Scarlett:

Robust 1-bit Compressive Sensing with Partial Gaussian Circulant Matrices and Generative Priors. 1-6 - Alex Dytso, Luca Barletta, Shlomo Shamai Shitz:

Amplitude Constrained Poisson Noise Channel: Properties of the Capacity-Achieving Input Distribution. 1-6 - Zhengrui Li, Yunghsiang S. Han, Ting-Yi Wu, Hanxu Hou, Bo Bai, Gong Zhang:

On the Repair Bandwidth and Repair Access of Two Storage Systems: Large-Scale and Uniform Rack-Aware Storage Systems. 1-6 - Anindya Bijoy Das, Aditya Ramamoorthy:

A Unified Treatment of Partial Stragglers and Sparse Matrices in Coded Matrix Computation. 1-6 - Vidhi Rana, Rémi A. Chou

:
Design of Short Blocklength Wiretap Channel Codes: Deep Learning and Cryptography Working Hand in Hand. 1-6 - Homa Nikbakht, Michèle A. Wigger, Shlomo Shamai Shitz, Jean-Marie Gorce:

Cooperative Encoding and Decoding of Mixed Delay Traffic under Random-User Activity. 1-6 - Yuanyuan Tang

, Farzad Farnoud:
Correcting deletion errors in DNA data storage with enzymatic synthesis. 1-6 - Haochuan Song, Xiaohu You

, Chuan Zhang
, Christoph Studer
:
Soft-Output Joint Channel Estimation and Data Detection using Deep Unfolding. 1-5 - Hui-An Shen

, Stefan M. Moser, Jean-Pascal Pfister
:
Rate-Distortion Problems of the Poisson Process: a Group-Theoretic Approach. 1-6 - Khac-Hoang Ngo

, Fan Zhang, Sheng Yang, Aria Nosratinia
:
Two-User MIMO Broadcast Channel with Transmit Correlation Diversity: Achievable Rate Regions. 1-6 - Abbas El Gamal, Amin Gohari, Chandra Nair:

Achievable Rates for the Relay Channel with Orthogonal Receiver Components. 1-6 - Naruki Joki, Shigeaki Kuzuoka:

A Study on the Joint Source-Channel Coding for Computing Functions: An Approach from a Dichotomy of Functions. 1-6 - Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:

On Conditional Alpha-Information and its Application to Side-Channel Analysis. 1-6 - Arti D. Yardi, Tejas Bodas:

Covert queueing problem with a Markovian statistic. 1-6 - Mark M. Wilde:

Second Law of Entanglement Dynamics for the Non-Asymptotic Regime. 1-6 - Zheng Wang, Yili Xia, Shanxiang Lyu

, Cong Ling:
Reinforcement Learning-Aided Markov Chain Monte Carlo For Lattice Gaussian Sampling. 1-5 - Xiangxiang Xu, Shao-Lun Huang:

On Distributed Hypothesis Testing with Constant-Bit Communication Constraints. 1-6 - Yasutada Oohama, Bagus Santoso:

Strong Converse for Distributed Source Coding with Encryption Using Correlated Keys. 1-6 - Hang Zhang, Afshin Abdi, Faramarz Fekri

:
A General Framework for the Design of Compressive Sensing using Density Evolution. 1-6 - Aria Nouri

, Reza Asvadi, Jun Chen, Pascal O. Vontobel
:
Finite-Input Intersymbol Interference Wiretap Channels. 1-6 - Linghui Zhou, Tobias J. Oechtering, Mikael Skoglund:

Polar Codes for Biometric Identification and Authentication. 1-6 - Yuta Nakahara

, Toshiyasu Matsushima:
Hyperparameter Learning of Stochastic Image Generative Models with Bayesian Hierarchical Modeling and Its Effect on Lossless Image Coding. 1-6 - Alireza Poostindouz

, Reihaneh Safavi-Naini:
Secret Key Capacity of Wiretapped Polytree-PIN. 1-6 - Ezgi Tekgul, Thomas David Novlan, Salam Akoum, Jeffrey G. Andrews:

Sample-Efficient Learning of Cellular Antenna Parameter Settings. 1-6 - Chak Fung Choi, Cheuk Ting Li

:
Multiple-Output Channel Simulation and Lossy Compression of Probability Distributions. 1-6 - Ruowan Ji, Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan:

Squeezed Random Khatri-Rao Product Codes. 1-6 - Gerhard Kramer:

Feedback Gains for Gaussian Massive Multiple-Access Channels. 1-3 - Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:

Optimal Maximal Leakage-Distortion Tradeoff. 1-6 - Yucheng Liu, Lawrence Ong

, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar:
On Converse Results for Secure Index Coding. 1-6 - Lan V. Truong, Giuseppe Cocco, Josep Font-Segura

, Albert Guillén i Fàbregas:
Concentration of Random-Coding Error Exponents. 1-5 - Hoover H. F. Yin

, Xiaoli Xu, Ka Hei Ng, Yong Liang Guan, Raymond W. Yeung:
Analysis of Innovative Rank of Batched Network Codes for Wireless Relay Networks. 1-6 - Stelios Louka, Christos K. Kourtellaris, Charalambos D. Charalambous:

Qualitative Analysis of Feedback Capacity of AGN Channels Driven by Unstable Versus Stable Autoregressive Moving Average Noise. 1-6 - Borja Rodríguez Gálvez, Ragnar Thobaben, Mikael Skoglund:

A Variational Approach to Privacy and Fairness. 1-6 - Koshi Shimada, Shota Saito

, Toshiyasu Matsushima:
An Efficient Bayes Coding Algorithm for the Non-Stationary Source in Which Context Tree Model Varies from Interval to Interval. 1-6 - Elsa Dupraz, Lav R. Varshney, François Leduc-Primeau:

Power-Efficient Deep Neural Networks with Noisy Memristor Implementation. 1-5 - Hao Jiang, Yu Lu, Xueru Li, Bichai Wang, Yongxing Zhou, Linglong Dai:

Attention-Based Hybrid Precoding for mmWave MIMO Systems. 1-6 - Mehrangiz Ensan, Hamdi Joudeh, Alex Alvarado

, Ulf Gustavsson, Frans M. J. Willems:
On Cloud Radio Access Networks With Cascade Oblivious Relaying. 1-6 - Hiroyoshi Morita, Masaya Fujisawa, Shojiro Sakata:

Two-dimensional Lee-Error-Correcting Codes on Hexagonal Signal Constellations. 1-6 - Wei Yan, Sian-Jheng Lin:

Generalized Universal Coding of Integers. 1-6 - Pooja Nayak Muralidhar, Digvijay Katyal, B. Sundar Rajan:

Improved Multi-access Coded Caching Schemes From Cross Resolvable Designs. 1-6 - Jin Sima, Feng Zhao, Shao-Lun Huang:

Exact Recovery in the Balanced Stochastic Block Model with Side Information. 1-6 - Adnan Siraj Rakin, Ye Wang, Shuchin Aeron, Toshiaki Koike-Akino

, Pierre Moulin, Kieran Parsons:
Towards Universal Adversarial Examples and Defenses. 1-6 - Arda Atalik, Alper Köse, Michael Gastpar:

Differential Entropy of the Conditional Expectation under Gaussian Noise. 1-6 - Sadaf Salehkalaibar, Vincent Y. F. Tan:

Distributed Sequential Hypothesis Testing With Zero-Rate Compression. 1-5 - Shobhit Bhatnagar, Biswadip Chakraborti, P. Vijay Kumar:

Streaming Codes for Handling a Combination of Burst and Random Erasures. 1-6 - Morteza Shoushtari, Willie K. Harrison:

New Dual Relationships for Error-Correcting Wiretap Codes. 1-6 - Anina Gruica, Alberto Ravagnani:

The Typical Non-Linear Code over Large Alphabets. 1-6 - Peihong Yuan, Mustafa Cemil Coskun:

Complexity-Adaptive Maximum-Likelihood Decoding of Modified GN-Coset Codes. 1-6 - Liudmila Karakchieva, Peter Trifonov:

A recursive SISO decoding algorithm. 1-6 - Kirill Andreev, Pavel S. Rybin, Alexey A. Frolov:

Unsourced Random Access Based on List Recoverable Codes Correcting t Errors. 1-6 - Myna Vajha, Vinayak Ramkumar, Mayank Jhamtani, P. Vijay Kumar:

On the Performance Analysis of Streaming Codes over the Gilbert-Elliott Channel. 1-6 - Gerhard Wunder, Benedikt Groß, Rick Fritschek

, Rafael F. Schaefer
:
A Reverse Jensen Inequality Result with Application to Mutual Information Estimation. 1-6 - Taro Shibayama

, Yingkai Ouyang
:
The equivalence between correctability of deletions and insertions of separable states in quantum codes. 1-6 - Hiroki Koga:

Coding Theorems on Digital Fingerprinting Coding under Informed and Uninformed Setups. 1-6 - Ilya Dumer

, Navid Gharavi:
Combined polar-LDPC design for channels with high noise. 1-6 - Mehdi Molkaraie:

Duality for Continuous Graphical Models. 1-6 - Mgeni Makambi Mashauri, Alexandre Graell i Amat, Michael Lentmaier:

On the Universality of Spatially Coupled LDPC Codes Over Intersymbol Interference Channels. 1-6 - Yunus Inan, Reka Inovan, Emre Telatar:

Optimal Policies for Age and Distortion in a Discrete-Time Model. 1-6 - Eli Chien, Pan Li, Olgica Milenkovic:

Landing Probabilities of Random Walks for Seed-Set Expansion in Hypergraphs. 1-6 - Wencong Li, Lei Liu

, Brian M. Kurkoski:
Irregularly Clipped Sparse Regression Codes. 1-6 - Navneeth Ramakrishnan, Marco Tomamichel, Mario Berta:

Moderate Deviation Analysis for Quantum State Transfer. 1-6 - Sayantan Chakraborty, Aditya Nema, Pranab Sen:

One-shot inner bounds for sending private classical information over a quantum MAC. 1-6 - Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:

(ϵ, n) Fixed-Length Strong Coordination Capacity. 1-6 - Lin Zhou, Alfred O. Hero III, Yun Wei:

Second-Order Asymptotically Optimal Outlying Sequence Detection with Reject Option. 1-6 - Shuchan Wang, Photios A. Stavrou, Mikael Skoglund:

Generalized Talagrand Inequality for Sinkhorn Distance using Entropy Power Inequality. 1-6 - Warangrat Wiriya, Brian M. Kurkoski:

Reliability-Based Decoding of Complex Low-Density Lattice Codes. 1-6 - Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:

Outage Common Randomness Capacity Characterization of Multiple-Antenna Slow Fading Channels. 1-6 - Mladen Kovacevic

, Dejan Vukobratovic:
Asymptotics of Constant-Weight Constrained Sequences with Applications. 1-6 - Michail Mylonakis, Photios A. Stavrou, Mikael Skoglund:

Adaptive Interference Coordination over Channels with Unknown State at the Encoder and the Decoder. 1-6 - Luca Barletta, Alex Dytso:

Scalar Gaussian Wiretap Channel: Bounds on the Support Size of the Secrecy-Capacity-Achieving Distribution. 1-6 - Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss

:
Optimal Exponents in Cascaded Hypothesis Testing under Expected Rate Constraints. 1-6 - Reihaneh Safavi-Naini, Setareh Sharifian:

Hybrid Encryption in Correlated Randomness Model. 1-5 - Ayse Ünsal, Melek Önen:

A Statistical Threshold for Adversarial Classification in Laplace Mechanisms. 1-6 - Debarnab Mitra, Lev Tauz, Lara Dolecek:

Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains. 1-6 - Elad Domanovitz, Gustavo Kasper Facenda, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:

Guaranteed Rate of Streaming Erasure Codes over Multi-Link Multi-hop Network. 1-6 - Ting-Yi Wu, Yunghsiang S. Han, Zhengrui Li, Bo Bai, Gong Zhang, Xiaoyang Zhang, Xiang Wu:

Achievable Lower Bound on the Optimal Access Bandwidth of (K + 2, K, 2)-MDS Array Code with Degraded Read Friendly. 1-5 - Akinori Kawachi:

Recent Progress in Private Simultaneous Messages Protocols. 1-5 - Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:

Linear Programming Bounds on the Kissing Number of q-ary Codes. 1-5 - Mahdi Shakiba-Herfeh, Laura Luzzi, Arsenia Chorti:

Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels. 1-6 - Daisuke Takeuchi

, Shun Watanabe:
The Achievable Rate Region of Wyner-Ahlswede-Körner Coding Problem for Mixed Sources. 1-6 - Feng Zhao, Jin Sima, Shao-Lun Huang:

On the Optimal Error Rate of Stochastic Block Model with Symmetric Side Information. 1-6 - Rony Bou Rouphael, Maël Le Treust:

Strategic Successive Refinement Coding for Bayesian Persuasion with Two Decoders. 1-6 - M. Bora Dogan, Michael Gastpar:

Lower Bounds on the Expected Excess Risk Using Mutual Information. 1-6 - Akira Kamatsuka

, Takahiro Yoshida, Toshiyasu Matsushima:
Privacy-Utility Trade-off with the Stratonovich's Value of Information. 1-6 - Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally

, Anuj Kumar Yadav
:
On the Commitment Capacity of Reverse Elastic Channels. 1-6 - Yonatan Yehezkeally

, Sagi Marcovich, Eitan Yaakobi:
Multi-strand Reconstruction from Substrings. 1-6 - Abdalla Ibrahim, Roberto Ferrara

, Christian Deppe:
Identification under Effective Secrecy. 1-6 - Cheuk Ting Li

:
The Undecidability of Conditional Affine Information Inequalities and Conditional Independence Implication with a Binary Constraint. 1-6 - M. Nikhil Krishnan, Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:

High Rate Streaming Codes Over the Three-Node Relay Network. 1-6 - Wei Yan, Sian-Jheng Lin:

Local Correctabilities and Dual Codes of Symmetric Reed-Muller Codes. 1-5 - Renaud-Alexandre Pitaval, Yi Qin:

Chirp Reconstruction Algorithm for Generalized Second-Order Reed-Muller Frames. 1-6 - Amogh Johri

, Arti D. Yardi, Tejas Bodas:
Approximate Gradient Coding for Heterogeneous Nodes. 1-6 - Sadaf ul Zuhra, Samir M. Perlaza

, Eitan Altman:
Simultaneous Information and Energy Transmission with Finite Constellations. 1-6 - Charalambos D. Charalambous, Christos K. Kourtellaris, Stelios Louka:

Sequential Characterizations of Cover and Pombra Gaussian Feedback Capacity: Generalizations to MIMO Channels via Sufficient Statistic. 1-6 - Minwoo Bae, Walter O. Krawec:

Semi-Source Independent Quantum Walk Random Number Generation. 1-6 - Pruthvi Trinadh, Monolina Dutta, Anoop Thomas, B. Sundar Rajan:

Decentralized Multi-access Coded Caching with Uncoded Prefetching. 1-6 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu:

Moment Generating Function of the AoI in Multi-Source Systems with Computation-Intensive Status Updates. 1-6 - Gowtham R. Kurri, Tyler Sypherd, Lalitha Sankar:

Realizing GANs via a Tunable Loss Function. 1-6 - Nizar Khalfet, Ioannis Krikidis:

The Capacity of SWIPT Systems over Rayleigh-Fading Channels with HPA. 1-6 - Alexander Koch

:
The Landscape of Security from Physical Assumptions1. 1-6 - Hoover H. F. Yin

, Ka Hei Ng, Yu Ting Shing, Russell W. F. Lai
, Xishi Wang:
Polynomial-Time Construction of Two-Channel Prefix-Free Codes with Given Codeword Lengths. 1-6 - Alex Dytso, Martina Cardone:

A General Derivative Identity for the Conditional Expectation with Focus on the Exponential Family. 1-6 - Charles Pillet, Valerio Bioglio

, Ingmar Land:
Polar Codes for Automorphism Ensemble Decoding. 1-6 - Manuj Mukherjee

, Ran Gelles:
Multiparty Interactive Communication with Broadcast Links. 1-6 - K. K. Krishnan Namboodiri

, B. Sundar Rajan:
Multi-Access Coded Caching with Secure Delivery. 1-6 - Pouria Saidi, George K. Atia:

Sparse Recovery Guarantees of Periodic Signals with Nested Periodic Dictionaries. 1-6 - Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund:

Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and Decoder. 1-6 - Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar:

Locally Recoverable Streaming Codes for Packet-Erasure Recovery. 1-6 - Talha Cihad Gulcu:

A Multi-Armed Bandit Problem with the Optimal Arm Depending on a Hidden Markov Model. 1-6 - Vidyalaxmi Dani, Venkatesh Ramaiyan, Devendra Jalihal

:
Covert Communication over Asynchronous Channels with Timing Advantage. 1-6 - Hanxu Hou, Patrick P. C. Lee:

STAR+ Codes: Triple-Fault-Tolerant Codes with Asymptotically Optimal Updates and Efficient Encoding/Decoding. 1-6 - Hao-Chung Cheng, Baris Nakiboglu

:
On the Existence of the Augustin Mean. 1-6 - Yucheng Liu, Lawrence Ong

, Phee Lep Yeoh, Parastoo Sadeghi, Jörg Kliewer, Sarah Johnson:
Information Leakage in Index Coding. 1-6 - Daniella Bar-Lev, Omer Sabary, Yotam Gershon, Eitan Yaakobi:

The Intersection of Insertion and Deletion Balls. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














