Journal: IEEE J. Sel. Areas Inf. Theory

Volume 2, Issue 4

1075 -- 1077Elza Erkip, Deniz Gündüz, Stratis Ioannidis, Jörg Kliewer, Derya Malak, Muriel Médard, R. Srikant 0001. JSAIT Editorial for the Special Issue on "Beyond Errors and Erasures: Coding for Data Management and Delivery in Networks"
1078 -- 1092Manuj Mukherjee, Ran Gelles. Multiparty Interactive Coding Over Networks of Intersecting Broadcast Links
1093 -- 1107Nitish Mital, Katina Kralevska, Cong Ling 0001, Deniz Gündüz. Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems
1108 -- 1119Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang. Network Coding With Myopic Adversaries
1120 -- 1134Yanyan Dong, Sheng Jin 0006, Yanzuo Chen, Shenghao Yang, Hoover H. F. Yin. Utility Maximization for Multihop Wireless Networks Employing BATS Codes
1135 -- 1149Hoover H. F. Yin, Ka Hei Ng, Allen Z. Zhong, Raymond W. Yeung, Shenghao Yang, Ian Y. Y. Chan. Intrablock Interleaving for Batched Network Coding With Blockwise Adaptive Recoding
1150 -- 1164Hoover H. F. Yin, Bin Tang, Ka Hei Ng, Shenghao Yang, Xishi Wang, Qiaoqiao Zhou. A Unified Adaptive Recoding Framework for Batched Network Coding
1165 -- 1179Mahdi Haghifam, M. Nikhil Krishnan, Ashish Khisti, Xiaoqing Zhu, Wai-tian Tan, John G. Apostolopoulos. On Streaming Codes With Unequal Error Protection
1180 -- 1190Alireza Vahid. Topological Content Delivery With Feedback and Random Receiver Cache
1191 -- 1205Alireza Vahid, Shih-Chun Lin, I-Hsiang Wang, Yi-Chun Lai. Content Delivery Over Broadcast Erasure Channels With Distributed Random Cache
1206 -- 1223Yasser Fadlallah, Othmane Oubejja, Sarah Kamel, Philippe Ciblat, Michèle A. Wigger, Jean-Marie Gorce. Cache-Aided Polar Coding: From Theory to Implementation
1224 -- 1239Hui Wang 0029, Qingchun Chen, Qin Huang, Xiaohu Tang. Reliable Coded Caching Design Over Wireless Networks
1240 -- 1252Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener. Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches
1253 -- 1265Suman Ghosh 0003, Prasad Krishnan, Lakshmi Prasad Natarajan. Blind Updates in Coded Caching
1266 -- 1281Kota Srinivas Reddy, Nikhil Karamchandani. Structured Index Coding Problem and Multi-Access Coded Caching
1282 -- 1299Arman Sharififar, Neda Aboutorab, Parastoo Sadeghi. An Update-Based Maximum Column Distance Coding Scheme for Index Coding

Volume 2, Issue 3

813 -- 0Pulkit Grover, Viveck R. Cadambe, Sennur Ulukus, Stark C. Draper, Salman Avestimehr, Osvaldo Simeone. Guest Editorial for Special Issue on Coded Computing
814 -- 829Burak Hasircioglu, Jesús Gómez-Vilardebó, Deniz Gündüz. Bivariate Polynomial Coding for Efficient Distributed Matrix Multiplication
830 -- 844M. Nikhil Krishnan, Erfan Hosseini, Ashish Khisti. Coded Sequential Matrix Multiplication for Straggler Mitigation
845 -- 854Haewon Jeong, Ateet Devulapalli, Viveck R. Cadambe, Flávio du Pin Calmon. ϵ-Approximate Coded Matrix Multiplication Is Nearly Twice as Efficient as Exact Multiplication
855 -- 866Margalit Glasgow, Mary Wootters. Approximate Gradient Coding With Optimal Decoding
867 -- 878Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, Amir Salman Avestimehr. List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier
879 -- 892Mahdi Soleymani, Mohammad Vahid Jamali, Hessam Mahdavifar. Coded Computing via Binary Linear Codes: Designs and Performance Limits
893 -- 906Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan. Factored LT and Factored Raptor Codes for Large-Scale Distributed Matrix Multiplication
907 -- 918Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David A. Karpuk. Degree Tables for Secure Distributed Matrix Multiplication
919 -- 930M. Nikhil Krishnan, Erfan Hosseini, Ashish Khisti. Sequential Gradient Coding for Packet-Loss Networks
931 -- 941Ali Rahimi, Mohammad Ali Maddah-Ali. Multi-Party Proof Generation in QAP-Based zk-SNARKs
942 -- 953Avishek Ghosh, Raj Kumar Maity, Swanand Kadhe, Arya Mazumdar, Kannan Ramchandran. Communication-Efficient and Byzantine-Robust Distributed Learning With Error Feedback
954 -- 969Navjot Singh, Deepesh Data, Jemin George, Suhas N. Diggavi. SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization
970 -- 986Tharindu B. Adikari, Stark C. Draper. Compressing Gradients by Exploiting Temporal Correlation in Momentum-SGD
987 -- 1001Osama A. Hanna, Yahya H. Ezzeldin, Christina Fragouli, Suhas N. Diggavi. Quantization of Distributed Data for Learning
1002 -- 1011Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali. Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding
1012 -- 1024Sanghamitra Dutta, Jianyu Wang, Gauri Joshi. Slow and Stale Gradients Can Win the Race
1025 -- 1040Alejandro Cohen, Guillaume Thiran, Homa Esfahanizadeh, Muriel Médard. Stream Distributed Coded Computing
1041 -- 1056Derya Malak, Muriel Médard. Function Load Balancing Over Networks
1057 -- 1071Ali Khalesi, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali. The Capacity Region of Distributed Multi-User Secret Sharing
1072 -- 1073Fredrik Hellström, Giuseppe Durisi. Corrections to "Generalization Bounds via Information Density and Conditional Information Density"

Volume 2, Issue 2

492 -- 493Vincent Y. F. Tan, Yao Xie 0002. Editorial
494 -- 514Liyan Xie, Shaofeng Zou, Yao Xie 0002, Venugopal V. Veeravalli. Sequential (Quickest) Change Detection: Classical Results and New Directions
515 -- 533Chengshuai Shi, Cong Shen. On No-Sensing Adversarial Multi-Player Multi-Armed Bandits With Collision Communications
534 -- 548Konstantinos E. Nikolakakis, Dionysios S. Kalogerias, Or Sheffet, Anand D. Sarwate. Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme
549 -- 563Samarth Gupta, Gauri Joshi, Osman Yagan. Best-Arm Identification in Correlated Multi-Armed Bandits
564 -- 583Anusha Lalitha, Andrea Goldsmith. Bayesian Algorithms for Decentralized Stochastic Bandits
584 -- 598Ilai Bistritz, Tavor Z. Baharav, Amir Leshem, Nicholas Bambos. One for All and All for One: Distributed Learning of Fair Allocations With Multi-Player Bandits
599 -- 610Vivek Kumar Bagaria, Tavor Z. Baharav, Govinda M. Kamath, David N. C. Tse. Bandit-Based Monte Carlo Optimization for Nearest Neighbors
611 -- 626Junyu Zhang, Amrit Singh Bedi, Mengdi Wang, Alec Koppel. Cautious Reinforcement Learning via Distributional Risk in the Dual Domain
627 -- 640Salman Habib, Allison Beemer, Jörg Kliewer. Belief Propagation Decoding of Short Graph-Based Channel Codes via Reinforcement Learning
641 -- 651Daniel Vial, Vijay G. Subramanian. Empirical Policy Evaluation With Supergraphs
652 -- 664Shuang Qiu, Zhuoran Yang, Jieping Ye, Zhaoran Wang. On Finite-Time Convergence of Actor-Critic Algorithm
665 -- 677Michael K. Cohen, Elliot Catt, Marcus Hutter. Curiosity Killed or Incapacitated the Cat and the Asymptotically Optimal Agent
678 -- 690Michael K. Cohen, Badri N. Vellambi, Marcus Hutter. Intelligence and Unambitiousness Using Algorithmic Information Theory
691 -- 704Jaehyeok Shin, Aaditya Ramdas, Alessandro Rinaldo. Nonparametric Iterated-Logarithm Extensions of the Sequential Generalized Likelihood Ratio Test
705 -- 719Shubhanshu Shekhar, Mohammad Ghavamzadeh, Tara Javidi. Active Learning for Classification With Abstention
720 -- 734Shachar Shayovitz, Meir Feder. Universal Active Learning via Conditional Mutual Information Minimization
735 -- 746Meng-Che Chang, Matthieu R. Bloch. Evasive Active Hypothesis Testing
747 -- 761Liyan Xie, Yao Xie 0002. Sequential Change Detection by Optimal Weighted ℓ₂ Divergence
762 -- 773Georgios Rovatsos, George V. Moustakides, Venugopal V. Veeravalli. Quickest Detection of Moving Anomalies in Sensor Networks
774 -- 783Deniz Sargun, Can Emre Koksal. Robust Change Detection via Information Projection
784 -- 801Haider Al-Lawati, Tharindu Adikari, Stark C. Draper. Asynchronous Delayed Optimization With Time-Varying Minibatches
802 -- 811Guanghui Lan, Yi Zhou. Asynchronous Decentralized Accelerated Stochastic Gradient Descent

Volume 2, Issue 1

3 -- 4H. Vincent Poor, Matthieu R. Bloch, Onur Günlü, Frédérique Oggier, Lalitha Sankar, Rafael F. Schaefer, Aylin Yener. Editorial
5 -- 22Matthieu R. Bloch, Onur Günlü, Aylin Yener, Frédérique E. Oggier, H. Vincent Poor, Lalitha Sankar, Rafael F. Schaefer. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
23 -- 31Ligong Wang. Covert Communication Over the Poisson Channel
32 -- 48Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund. Secure Block Source Coding With Sequential Encoding
49 -- 64Alejandro Cohen, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard. Network Coding-Based Post-Quantum Cryptography
65 -- 81Mohamed S. Nafea, Aylin Yener. Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II
82 -- 94Onur Günlü, Rafael F. Schaefer. Controllable Key Agreement With Correlated Noise
95 -- 105Nasser Aldaghri, Hessam Mahdavifar. Threshold-Secure Coding With Shared Key
106 -- 120Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Phee Lep Yeoh. A Code and Rate Equivalence Between Secure Network and Index Coding
121 -- 138Zohaib Hassan Awan, Aydin Sezgin. Secure MISO Broadcast Channel: An Interplay Between CSIT and Network Topology
139 -- 148Masahito Hayashi, Tadashi Wadayama, Ángeles Vázquez-Castro. Secure Computation-and-Forward With Linear Codes
149 -- 162Ahmed S. Bendary, Amr Abdelaziz, Can Emre Koksal. Achieving Positive Covert Capacity Over MIMO AWGN Channels
163 -- 176Yanina Y. Shkel, H. Vincent Poor. A Compression Perspective on Secrecy Measures
177 -- 191Borzoo Rassouli, Deniz Gündüz. On Perfect Privacy
192 -- 207Qifa Yan, Daniela Tuninetti. Fundamental Limits of Caching for Demand Privacy Against Colluding Users
208 -- 222Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar. Three Variants of Differential Privacy: Lossless Conversion and Applications
223 -- 239Linghui Zhou, Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund. Two-Stage Biometric Identification Systems Without Privacy Leakage
240 -- 252Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi. Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2)
253 -- 267Jayadev Acharya, Clément L. Canonne, Cody Freitag, Ziteng Sun, Himanshu Tyagi. Inference Under Information Constraints III: Local Privacy Constraints
268 -- 282Abdullah Basar Akbay, Weina Wang, Junshan Zhang. Impact of Social Learning on Privacy-Preserving Data Collection
283 -- 295Mahdi Soleymani, Hessam Mahdavifar, Amir Salman Avestimehr. Analog Lagrange Coded Computing
296 -- 305Masahito Hayashi, Ning Cai 0001. Secure Non-Linear Network Code Over a One-Hop Relay Network
306 -- 316Zhen Chen 0014, Zhuqing Jia, Zhiying Wang 0001, Syed Ali Jafar. GCSA Codes With Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
317 -- 325Saeid Sahraei, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. Interactive Verifiable Polynomial Evaluation
326 -- 337Chien-Sheng Yang, Amir Salman Avestimehr. Coded Computing for Secure Boolean Computations
338 -- 351Farhad Shirani 0001, Siddharth Garg, Elza Erkip. A Concentration of Measure Approach to Correlated Graph Matching
352 -- 365Mehrdad Tahmasbi, Matthieu R. Bloch. On Covert Quantum Sensing and the Benefits of Entanglement
366 -- 379Zhusheng Wang, Karim Banawan, Sennur Ulukus. Multi-Party Private Set Intersection: An Information-Theoretic Approach
380 -- 390Seunghoan Song, Masahito Hayashi. Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers
391 -- 402Swanand Kadhe, Anoosheh Heidarzadeh, Alex Sprintson, Onur Ozan Koyluoglu. Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes
403 -- 414Tao Guo, Ruida Zhou, Chao Tian 0002. New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems
415 -- 427Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat, Eitan Yaakobi. The Capacity of Single-Server Weakly-Private Information Retrieval
428 -- 440Yuxiang Lu, Zhuqing Jia, Syed Ali Jafar. Double Blind T-Private Information Retrieval
441 -- 451Jinhyun So, Basak Güler, Amir Salman Avestimehr. CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
452 -- 463Ghadir Ayache, Salim El Rouayheb. Private Weighted Random Walk Stochastic Gradient Descent
464 -- 478Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Peter Kairouz, Ananda Theertha Suresh. Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs
479 -- 489Jinhyun So, Basak Güler, Amir Salman Avestimehr. Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning