3 | -- | 4 | H. Vincent Poor, Matthieu R. Bloch, Onur Günlü, Frédérique Oggier, Lalitha Sankar, Rafael F. Schaefer, Aylin Yener. Editorial |
5 | -- | 22 | Matthieu R. Bloch, Onur Günlü, Aylin Yener, Frédérique E. Oggier, H. Vincent Poor, Lalitha Sankar, Rafael F. Schaefer. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications |
23 | -- | 31 | Ligong Wang. Covert Communication Over the Poisson Channel |
32 | -- | 48 | Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund. Secure Block Source Coding With Sequential Encoding |
49 | -- | 64 | Alejandro Cohen, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard. Network Coding-Based Post-Quantum Cryptography |
65 | -- | 81 | Mohamed S. Nafea, Aylin Yener. Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II |
82 | -- | 94 | Onur Günlü, Rafael F. Schaefer. Controllable Key Agreement With Correlated Noise |
95 | -- | 105 | Nasser Aldaghri, Hessam Mahdavifar. Threshold-Secure Coding With Shared Key |
106 | -- | 120 | Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Phee Lep Yeoh. A Code and Rate Equivalence Between Secure Network and Index Coding |
121 | -- | 138 | Zohaib Hassan Awan, Aydin Sezgin. Secure MISO Broadcast Channel: An Interplay Between CSIT and Network Topology |
139 | -- | 148 | Masahito Hayashi, Tadashi Wadayama, Ángeles Vázquez-Castro. Secure Computation-and-Forward With Linear Codes |
149 | -- | 162 | Ahmed S. Bendary, Amr Abdelaziz, Can Emre Koksal. Achieving Positive Covert Capacity Over MIMO AWGN Channels |
163 | -- | 176 | Yanina Y. Shkel, H. Vincent Poor. A Compression Perspective on Secrecy Measures |
177 | -- | 191 | Borzoo Rassouli, Deniz Gündüz. On Perfect Privacy |
192 | -- | 207 | Qifa Yan, Daniela Tuninetti. Fundamental Limits of Caching for Demand Privacy Against Colluding Users |
208 | -- | 222 | Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar. Three Variants of Differential Privacy: Lossless Conversion and Applications |
223 | -- | 239 | Linghui Zhou, Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund. Two-Stage Biometric Identification Systems Without Privacy Leakage |
240 | -- | 252 | Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi. Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2) |
253 | -- | 267 | Jayadev Acharya, Clément L. Canonne, Cody Freitag, Ziteng Sun, Himanshu Tyagi. Inference Under Information Constraints III: Local Privacy Constraints |
268 | -- | 282 | Abdullah Basar Akbay, Weina Wang, Junshan Zhang. Impact of Social Learning on Privacy-Preserving Data Collection |
283 | -- | 295 | Mahdi Soleymani, Hessam Mahdavifar, Amir Salman Avestimehr. Analog Lagrange Coded Computing |
296 | -- | 305 | Masahito Hayashi, Ning Cai 0001. Secure Non-Linear Network Code Over a One-Hop Relay Network |
306 | -- | 316 | Zhen Chen 0014, Zhuqing Jia, Zhiying Wang 0001, Syed Ali Jafar. GCSA Codes With Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication |
317 | -- | 325 | Saeid Sahraei, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. Interactive Verifiable Polynomial Evaluation |
326 | -- | 337 | Chien-Sheng Yang, Amir Salman Avestimehr. Coded Computing for Secure Boolean Computations |
338 | -- | 351 | Farhad Shirani 0001, Siddharth Garg, Elza Erkip. A Concentration of Measure Approach to Correlated Graph Matching |
352 | -- | 365 | Mehrdad Tahmasbi, Matthieu R. Bloch. On Covert Quantum Sensing and the Benefits of Entanglement |
366 | -- | 379 | Zhusheng Wang, Karim Banawan, Sennur Ulukus. Multi-Party Private Set Intersection: An Information-Theoretic Approach |
380 | -- | 390 | Seunghoan Song, Masahito Hayashi. Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers |
391 | -- | 402 | Swanand Kadhe, Anoosheh Heidarzadeh, Alex Sprintson, Onur Ozan Koyluoglu. Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes |
403 | -- | 414 | Tao Guo, Ruida Zhou, Chao Tian 0002. New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems |
415 | -- | 427 | Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat, Eitan Yaakobi. The Capacity of Single-Server Weakly-Private Information Retrieval |
428 | -- | 440 | Yuxiang Lu, Zhuqing Jia, Syed Ali Jafar. Double Blind T-Private Information Retrieval |
441 | -- | 451 | Jinhyun So, Basak Güler, Amir Salman Avestimehr. CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning |
452 | -- | 463 | Ghadir Ayache, Salim El Rouayheb. Private Weighted Random Walk Stochastic Gradient Descent |
464 | -- | 478 | Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Peter Kairouz, Ananda Theertha Suresh. Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs |
479 | -- | 489 | Jinhyun So, Basak Güler, Amir Salman Avestimehr. Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning |