default search action
ITW 2021: Kanazawa, Japan
- IEEE Information Theory Workshop, ITW 2021, Kanazawa, Japan, October 17-21, 2021. IEEE 2021, ISBN 978-1-6654-0312-2
- Anoosheh Heidarzadeh, Alex Sprintson:
Single-Server Individually-Private Information Retrieval: A Combinatorial Approach. 1-6 - Uzi Pereg, Roberto Ferrara, Matthieu R. Bloch:
Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels. 1-6 - Omri Lev, Anatoly Khina:
Energy-limited Joint Source-Channel Coding via Analog Pulse Position Modulation. 1-6 - Maki Yoshida:
Hybrid Multiplicative Secret Sharing. 1-5 - Roy Shafir, Omer Sabary, Leon Anavy, Eitan Yaakobi, Zohar Yakhini:
Sequence Reconstruction Under Stutter Noise in Enzymatic DNA Synthesis. 1-6 - Holger Boche, Christian Deppe:
Computability of the Zero-Error Capacity of Noisy Channels. 1-6 - Junge Wang, Zhuqing Jia, Syed Ali Jafar:
Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis. 1-6 - Recep Can Yavas, Victoria Kostina, Michelle Effros:
Nested Sparse Feedback Codes for Point-to-Point, Multiple Access, and Random Access Channels. 1-6 - Shih-Chun Lin, Yi-Chun Lai, Yu-Chih Huang, Chih-Chun Wang, I-Hsiang Wang:
Optimal finite-length linear codes and the corresponding channel dispersion for broadcast packet erasure channels with feedback. 1-6 - Eeshan Modak, Himanshu Asnani, Vinod M. Prabhakaran:
Rényi Divergence Based Bounds on Generalization Error. 1-6 - Bing Zhu, Shigeng Zhang, Weiping Wang:
Expandable Fractional Repetition Codes for Distributed Storage Systems. 1-5 - Amichai Painsky:
Refined Convergence Rates of the Good-Turing Estimator. 1-5 - Irina E. Bocharova, Boris D. Kudryashov, Evgenii P. Ovsyannikov, Vitaly Skachek:
A Random Coding Bound on the ML Decoding Error Probability for NB LDPC Coded QAM Signals. 1-6 - Meng-Che Chang, Matthieu R. Bloch:
Covert Sequential Hypothesis Testing. 1-6 - Shuqin Pang, Wenyi Zhang:
Generalized Nearest Neighbor Decoding for MIMO Channels with Imperfect Channel State Information. 1-6 - Jixiang Zhang, Yinfei Xu:
On Age of Information for Discrete Time Status Updating System With Ber/G/1/1 Queues. 1-6 - Pooja Nayak Muralidhar, Digvijay Katyal, B. Sundar Rajan:
Maddah-Ali-Niesen Scheme for Multi-access Coded Caching. 1-6 - Yonglong Li, Vincent Y. F. Tan, Marco Tomamichel:
Optimal Adaptive Strategies for Sequential Quantum Hypothesis Testing. 1-6 - M. Bilkis, Matteo Rosati, John Calsamiglia:
Reinforcement-learning calibration of coherent-state receivers on variable-loss optical channels. 1-6 - Zhaoqiang Liu, Subhroshekhar Ghosh, Jonathan Scarlett:
Robust 1-bit Compressive Sensing with Partial Gaussian Circulant Matrices and Generative Priors. 1-6 - Alex Dytso, Luca Barletta, Shlomo Shamai Shitz:
Amplitude Constrained Poisson Noise Channel: Properties of the Capacity-Achieving Input Distribution. 1-6 - Zhengrui Li, Yunghsiang S. Han, Ting-Yi Wu, Hanxu Hou, Bo Bai, Gong Zhang:
On the Repair Bandwidth and Repair Access of Two Storage Systems: Large-Scale and Uniform Rack-Aware Storage Systems. 1-6 - Anindya Bijoy Das, Aditya Ramamoorthy:
A Unified Treatment of Partial Stragglers and Sparse Matrices in Coded Matrix Computation. 1-6 - Vidhi Rana, Rémi A. Chou:
Design of Short Blocklength Wiretap Channel Codes: Deep Learning and Cryptography Working Hand in Hand. 1-6 - Homa Nikbakht, Michèle A. Wigger, Shlomo Shamai Shitz, Jean-Marie Gorce:
Cooperative Encoding and Decoding of Mixed Delay Traffic under Random-User Activity. 1-6 - Yuanyuan Tang, Farzad Farnoud:
Correcting deletion errors in DNA data storage with enzymatic synthesis. 1-6 - Haochuan Song, Xiaohu You, Chuan Zhang, Christoph Studer:
Soft-Output Joint Channel Estimation and Data Detection using Deep Unfolding. 1-5 - Hui-An Shen, Stefan M. Moser, Jean-Pascal Pfister:
Rate-Distortion Problems of the Poisson Process: a Group-Theoretic Approach. 1-6 - Khac-Hoang Ngo, Fan Zhang, Sheng Yang, Aria Nosratinia:
Two-User MIMO Broadcast Channel with Transmit Correlation Diversity: Achievable Rate Regions. 1-6 - Abbas El Gamal, Amin Gohari, Chandra Nair:
Achievable Rates for the Relay Channel with Orthogonal Receiver Components. 1-6 - Naruki Joki, Shigeaki Kuzuoka:
A Study on the Joint Source-Channel Coding for Computing Functions: An Approach from a Dichotomy of Functions. 1-6 - Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional Alpha-Information and its Application to Side-Channel Analysis. 1-6 - Arti D. Yardi, Tejas Bodas:
Covert queueing problem with a Markovian statistic. 1-6 - Mark M. Wilde:
Second Law of Entanglement Dynamics for the Non-Asymptotic Regime. 1-6 - Zheng Wang, Yili Xia, Shanxiang Lyu, Cong Ling:
Reinforcement Learning-Aided Markov Chain Monte Carlo For Lattice Gaussian Sampling. 1-5 - Xiangxiang Xu, Shao-Lun Huang:
On Distributed Hypothesis Testing with Constant-Bit Communication Constraints. 1-6 - Yasutada Oohama, Bagus Santoso:
Strong Converse for Distributed Source Coding with Encryption Using Correlated Keys. 1-6 - Hang Zhang, Afshin Abdi, Faramarz Fekri:
A General Framework for the Design of Compressive Sensing using Density Evolution. 1-6 - Aria Nouri, Reza Asvadi, Jun Chen, Pascal O. Vontobel:
Finite-Input Intersymbol Interference Wiretap Channels. 1-6 - Linghui Zhou, Tobias J. Oechtering, Mikael Skoglund:
Polar Codes for Biometric Identification and Authentication. 1-6 - Yuta Nakahara, Toshiyasu Matsushima:
Hyperparameter Learning of Stochastic Image Generative Models with Bayesian Hierarchical Modeling and Its Effect on Lossless Image Coding. 1-6 - Alireza Poostindouz, Reihaneh Safavi-Naini:
Secret Key Capacity of Wiretapped Polytree-PIN. 1-6 - Ezgi Tekgul, Thomas David Novlan, Salam Akoum, Jeffrey G. Andrews:
Sample-Efficient Learning of Cellular Antenna Parameter Settings. 1-6 - Chak Fung Choi, Cheuk Ting Li:
Multiple-Output Channel Simulation and Lossy Compression of Probability Distributions. 1-6 - Ruowan Ji, Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan:
Squeezed Random Khatri-Rao Product Codes. 1-6 - Gerhard Kramer:
Feedback Gains for Gaussian Massive Multiple-Access Channels. 1-3 - Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:
Optimal Maximal Leakage-Distortion Tradeoff. 1-6 - Yucheng Liu, Lawrence Ong, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar:
On Converse Results for Secure Index Coding. 1-6 - Lan V. Truong, Giuseppe Cocco, Josep Font-Segura, Albert Guillén i Fàbregas:
Concentration of Random-Coding Error Exponents. 1-5 - Hoover H. F. Yin, Xiaoli Xu, Ka Hei Ng, Yong Liang Guan, Raymond W. Yeung:
Analysis of Innovative Rank of Batched Network Codes for Wireless Relay Networks. 1-6 - Stelios Louka, Christos K. Kourtellaris, Charalambos D. Charalambous:
Qualitative Analysis of Feedback Capacity of AGN Channels Driven by Unstable Versus Stable Autoregressive Moving Average Noise. 1-6 - Borja Rodríguez Gálvez, Ragnar Thobaben, Mikael Skoglund:
A Variational Approach to Privacy and Fairness. 1-6 - Koshi Shimada, Shota Saito, Toshiyasu Matsushima:
An Efficient Bayes Coding Algorithm for the Non-Stationary Source in Which Context Tree Model Varies from Interval to Interval. 1-6 - Elsa Dupraz, Lav R. Varshney, François Leduc-Primeau:
Power-Efficient Deep Neural Networks with Noisy Memristor Implementation. 1-5 - Hao Jiang, Yu Lu, Xueru Li, Bichai Wang, Yongxing Zhou, Linglong Dai:
Attention-Based Hybrid Precoding for mmWave MIMO Systems. 1-6 - Mehrangiz Ensan, Hamdi Joudeh, Alex Alvarado, Ulf Gustavsson, Frans M. J. Willems:
On Cloud Radio Access Networks With Cascade Oblivious Relaying. 1-6 - Hiroyoshi Morita, Masaya Fujisawa, Shojiro Sakata:
Two-dimensional Lee-Error-Correcting Codes on Hexagonal Signal Constellations. 1-6 - Wei Yan, Sian-Jheng Lin:
Generalized Universal Coding of Integers. 1-6 - Pooja Nayak Muralidhar, Digvijay Katyal, B. Sundar Rajan:
Improved Multi-access Coded Caching Schemes From Cross Resolvable Designs. 1-6 - Jin Sima, Feng Zhao, Shao-Lun Huang:
Exact Recovery in the Balanced Stochastic Block Model with Side Information. 1-6 - Adnan Siraj Rakin, Ye Wang, Shuchin Aeron, Toshiaki Koike-Akino, Pierre Moulin, Kieran Parsons:
Towards Universal Adversarial Examples and Defenses. 1-6 - Arda Atalik, Alper Köse, Michael Gastpar:
Differential Entropy of the Conditional Expectation under Gaussian Noise. 1-6 - Sadaf Salehkalaibar, Vincent Y. F. Tan:
Distributed Sequential Hypothesis Testing With Zero-Rate Compression. 1-5 - Shobhit Bhatnagar, Biswadip Chakraborti, P. Vijay Kumar:
Streaming Codes for Handling a Combination of Burst and Random Erasures. 1-6 - Morteza Shoushtari, Willie K. Harrison:
New Dual Relationships for Error-Correcting Wiretap Codes. 1-6 - Anina Gruica, Alberto Ravagnani:
The Typical Non-Linear Code over Large Alphabets. 1-6 - Peihong Yuan, Mustafa Cemil Coskun:
Complexity-Adaptive Maximum-Likelihood Decoding of Modified GN-Coset Codes. 1-6 - Liudmila Karakchieva, Peter Trifonov:
A recursive SISO decoding algorithm. 1-6 - Kirill V. Andreev, Pavel S. Rybin, Alexey A. Frolov:
Unsourced Random Access Based on List Recoverable Codes Correcting t Errors. 1-6 - Myna Vajha, Vinayak Ramkumar, Mayank Jhamtani, P. Vijay Kumar:
On the Performance Analysis of Streaming Codes over the Gilbert-Elliott Channel. 1-6 - Gerhard Wunder, Benedikt Groß, Rick Fritschek, Rafael F. Schaefer:
A Reverse Jensen Inequality Result with Application to Mutual Information Estimation. 1-6 - Taro Shibayama, Yingkai Ouyang:
The equivalence between correctability of deletions and insertions of separable states in quantum codes. 1-6 - Hiroki Koga:
Coding Theorems on Digital Fingerprinting Coding under Informed and Uninformed Setups. 1-6 - Ilya Dumer, Navid Gharavi:
Combined polar-LDPC design for channels with high noise. 1-6 - Mehdi Molkaraie:
Duality for Continuous Graphical Models. 1-6 - Mgeni Makambi Mashauri, Alexandre Graell i Amat, Michael Lentmaier:
On the Universality of Spatially Coupled LDPC Codes Over Intersymbol Interference Channels. 1-6 - Yunus Inan, Reka Inovan, Emre Telatar:
Optimal Policies for Age and Distortion in a Discrete-Time Model. 1-6 - Eli Chien, Pan Li, Olgica Milenkovic:
Landing Probabilities of Random Walks for Seed-Set Expansion in Hypergraphs. 1-6 - Wencong Li, Lei Liu, Brian M. Kurkoski:
Irregularly Clipped Sparse Regression Codes. 1-6 - Navneeth Ramakrishnan, Marco Tomamichel, Mario Berta:
Moderate Deviation Analysis for Quantum State Transfer. 1-6 - Sayantan Chakraborty, Aditya Nema, Pranab Sen:
One-shot inner bounds for sending private classical information over a quantum MAC. 1-6 - Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:
(ϵ, n) Fixed-Length Strong Coordination Capacity. 1-6 - Lin Zhou, Alfred O. Hero III, Yun Wei:
Second-Order Asymptotically Optimal Outlying Sequence Detection with Reject Option. 1-6 - Shuchan Wang, Photios A. Stavrou, Mikael Skoglund:
Generalized Talagrand Inequality for Sinkhorn Distance using Entropy Power Inequality. 1-6 - Warangrat Wiriya, Brian M. Kurkoski:
Reliability-Based Decoding of Complex Low-Density Lattice Codes. 1-6 - Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:
Outage Common Randomness Capacity Characterization of Multiple-Antenna Slow Fading Channels. 1-6 - Mladen Kovacevic, Dejan Vukobratovic:
Asymptotics of Constant-Weight Constrained Sequences with Applications. 1-6 - Michail Mylonakis, Photios A. Stavrou, Mikael Skoglund:
Adaptive Interference Coordination over Channels with Unknown State at the Encoder and the Decoder. 1-6 - Luca Barletta, Alex Dytso:
Scalar Gaussian Wiretap Channel: Bounds on the Support Size of the Secrecy-Capacity-Achieving Distribution. 1-6 - Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Optimal Exponents in Cascaded Hypothesis Testing under Expected Rate Constraints. 1-6 - Reihaneh Safavi-Naini, Setareh Sharifian:
Hybrid Encryption in Correlated Randomness Model. 1-5 - Ayse Ünsal, Melek Önen:
A Statistical Threshold for Adversarial Classification in Laplace Mechanisms. 1-6 - Debarnab Mitra, Lev Tauz, Lara Dolecek:
Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains. 1-6 - Elad Domanovitz, Gustavo Kasper Facenda, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Guaranteed Rate of Streaming Erasure Codes over Multi-Link Multi-hop Network. 1-6 - Ting-Yi Wu, Yunghsiang S. Han, Zhengrui Li, Bo Bai, Gong Zhang, Xiaoyang Zhang, Xiang Wu:
Achievable Lower Bound on the Optimal Access Bandwidth of (K + 2, K, 2)-MDS Array Code with Degraded Read Friendly. 1-5 - Akinori Kawachi:
Recent Progress in Private Simultaneous Messages Protocols. 1-5 - Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Linear Programming Bounds on the Kissing Number of q-ary Codes. 1-5 - Mahdi Shakiba-Herfeh, Laura Luzzi, Arsenia Chorti:
Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels. 1-6 - Daisuke Takeuchi, Shun Watanabe:
The Achievable Rate Region of Wyner-Ahlswede-Körner Coding Problem for Mixed Sources. 1-6 - Feng Zhao, Jin Sima, Shao-Lun Huang:
On the Optimal Error Rate of Stochastic Block Model with Symmetric Side Information. 1-6 - Rony Bou Rouphael, Maël Le Treust:
Strategic Successive Refinement Coding for Bayesian Persuasion with Two Decoders. 1-6 - M. Bora Dogan, Michael Gastpar:
Lower Bounds on the Expected Excess Risk Using Mutual Information. 1-6 - Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima:
Privacy-Utility Trade-off with the Stratonovich's Value of Information. 1-6 - Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav:
On the Commitment Capacity of Reverse Elastic Channels. 1-6 - Yonatan Yehezkeally, Sagi Marcovich, Eitan Yaakobi:
Multi-strand Reconstruction from Substrings. 1-6 - Abdalla Ibrahim, Roberto Ferrara, Christian Deppe:
Identification under Effective Secrecy. 1-6 - Cheuk Ting Li:
The Undecidability of Conditional Affine Information Inequalities and Conditional Independence Implication with a Binary Constraint. 1-6 - M. Nikhil Krishnan, Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
High Rate Streaming Codes Over the Three-Node Relay Network. 1-6 - Wei Yan, Sian-Jheng Lin:
Local Correctabilities and Dual Codes of Symmetric Reed-Muller Codes. 1-5 - Renaud-Alexandre Pitaval, Yi Qin:
Chirp Reconstruction Algorithm for Generalized Second-Order Reed-Muller Frames. 1-6 - Amogh Johri, Arti D. Yardi, Tejas Bodas:
Approximate Gradient Coding for Heterogeneous Nodes. 1-6 - Sadaf ul Zuhra, Samir M. Perlaza, Eitan Altman:
Simultaneous Information and Energy Transmission with Finite Constellations. 1-6 - Charalambos D. Charalambous, Christos K. Kourtellaris, Stelios Louka:
Sequential Characterizations of Cover and Pombra Gaussian Feedback Capacity: Generalizations to MIMO Channels via Sufficient Statistic. 1-6 - Minwoo Bae, Walter O. Krawec:
Semi-Source Independent Quantum Walk Random Number Generation. 1-6 - Pruthvi Trinadh, Monolina Dutta, Anoop Thomas, B. Sundar Rajan:
Decentralized Multi-access Coded Caching with Uncoded Prefetching. 1-6 - Mohammad Moltafet, Markus Leinonen, Marian Codreanu:
Moment Generating Function of the AoI in Multi-Source Systems with Computation-Intensive Status Updates. 1-6 - Gowtham R. Kurri, Tyler Sypherd, Lalitha Sankar:
Realizing GANs via a Tunable Loss Function. 1-6 - Nizar Khalfet, Ioannis Krikidis:
The Capacity of SWIPT Systems over Rayleigh-Fading Channels with HPA. 1-6 - Alexander Koch:
The Landscape of Security from Physical Assumptions1. 1-6 - Hoover H. F. Yin, Ka Hei Ng, Yu Ting Shing, Russell W. F. Lai, Xishi Wang:
Polynomial-Time Construction of Two-Channel Prefix-Free Codes with Given Codeword Lengths. 1-6 - Alex Dytso, Martina Cardone:
A General Derivative Identity for the Conditional Expectation with Focus on the Exponential Family. 1-6 - Charles Pillet, Valerio Bioglio, Ingmar Land:
Polar Codes for Automorphism Ensemble Decoding. 1-6 - Manuj Mukherjee, Ran Gelles:
Multiparty Interactive Communication with Broadcast Links. 1-6 - K. K. Krishnan Namboodiri, B. Sundar Rajan:
Multi-Access Coded Caching with Secure Delivery. 1-6 - Pouria Saidi, George K. Atia:
Sparse Recovery Guarantees of Periodic Signals with Nested Periodic Dictionaries. 1-6 - Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund:
Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and Decoder. 1-6 - Vinayak Ramkumar, Myna Vajha, P. Vijay Kumar:
Locally Recoverable Streaming Codes for Packet-Erasure Recovery. 1-6 - Talha Cihad Gulcu:
A Multi-Armed Bandit Problem with the Optimal Arm Depending on a Hidden Markov Model. 1-6 - Vidyalaxmi Dani, Venkatesh Ramaiyan, Devendra Jalihal:
Covert Communication over Asynchronous Channels with Timing Advantage. 1-6 - Hanxu Hou, Patrick P. C. Lee:
STAR+ Codes: Triple-Fault-Tolerant Codes with Asymptotically Optimal Updates and Efficient Encoding/Decoding. 1-6 - Hao-Chung Cheng, Baris Nakiboglu:
On the Existence of the Augustin Mean. 1-6 - Yucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Jörg Kliewer, Sarah Johnson:
Information Leakage in Index Coding. 1-6 - Daniella Bar-Lev, Omer Sabary, Yotam Gershon, Eitan Yaakobi:
The Intersection of Insertion and Deletion Balls. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.