Journal: IEEE Transactions on Information Theory

Volume 66, Issue 9

5317 -- 5321Hao Chen 0029, Xianmang He, Jian Weng 0001, Liqing Xu. New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks
5322 -- 5334Derong Xie, Jinquan Luo. Asymmetric Single Magnitude Four Error Correcting Codes
5335 -- 5343Tomohiro Hayashi, Kenji Yasunaga. On the List Decodability of Insertions and Deletions
5344 -- 5357Yeow Meng Chee, Han Mao Kiah, Hengjia Wei. Efficient and Explicit Balanced Primer Codes
5358 -- 5378Shu Lin, Khaled A. S. Abdel-Ghaffar, Juane Li, Keke Liu. A Scheme for Collective Encoding and Iterative Soft-Decision Decoding of Cyclic Codes of Prime Lengths: Applications to Reed-Solomon, BCH, and Quadratic Residue Codes
5379 -- 5386Rocco Trombetti, Ferdinando Zullo. On the List Decodability of Rank Metric Codes
5387 -- 5394Ziling Heng, Cunsheng Ding, Weiqiong Wang. Optimal Binary Linear Codes From Maximal Arcs
5395 -- 5403Liming Ma, Chaoping Xing. Constructive Asymptotic Bounds of Locally Repairable Codes via Function Fields
5404 -- 5413Sihem Mesnager, Yanfeng Qi, Hongming Ru, Chunming Tang. Minimal Linear Codes From Characteristic Functions
5414 -- 5418Tim L. Alderson. On the Weights of General MDS Codes
5419 -- 5428Cunsheng Ding, Chunming Tang. Infinite Families of Near MDS Codes Holding t-Designs
5429 -- 5447Noha Helal, Matthieu R. Bloch, Aria Nosratinia. Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel
5448 -- 5455Jingbo Liu, Ayfer Özgür. Capacity Upper Bounds for the Relay Channel via Reverse Hypercontractivity
5456 -- 5491Praveen Venkatesh, Sanghamitra Dutta, Pulkit Grover. Information Flow in Computational Systems
5492 -- 5521Deepesh Data, Gowtham R. Kurri, Jithin Ravi, Vinod M. Prabhakaran. Interactive Secure Function Computation
5522 -- 5536Siu-Wai Ho, Lin Ling, Chee-Wei Tan 0001, Raymond W. Yeung. Proving and Disproving Information Inequalities: Theory and Scalable Algorithms
5537 -- 5547Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria. Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity
5548 -- 5566Anurag Anshu, Masahito Hayashi, Naqueeb Ahmad Warsi. Secure Communication Over Fully Quantum Gel'fand-Pinsker Wiretap Channel
5567 -- 5584Rahul Jain 0001, Carl A. Miller, Yaoyun Shi. Parallel Device-Independent Quantum Key Distribution
5585 -- 5600Cupjin Huang, Michael Newman, Mario Szegedy. Explicit Lower Bounds on Strong Quantum Simulation
5601 -- 5619Michael X. Cao, Pascal O. Vontobel. Bounding and Estimating the Classical Information Rate of Quantum Channels With Memory
5620 -- 5633Zahra Baghali Khanian, Andreas J. Winter 0002. Distributed Compression of Correlated Classical-Quantum Sources or: The Price of Ignorance
5634 -- 5641Alexander S. Holevo. Gaussian Maximizers for Quantum Gaussian Observables and Ensembles
5642 -- 5659Antonio Bazco Nogueras, Paul de Kerret, David Gesbert, Nicolas Gresset. On the Degrees-of-Freedom of the K-User Distributed Broadcast Channel
5660 -- 5682Longguang Li, Stefan M. Moser, Ligong Wang, Michèle A. Wigger. On the Capacity of MIMO Optical Wireless Channels
5683 -- 5702Riccardo Cavallari, Stavros Toumpis, Roberto Verdone, Ioannis Kontoyiannis. Packet Speed and Cost in Mobile Wireless Delay-Tolerant Networks
5703 -- 5711Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli. Wireless Network Simplification: The Performance of Routing
5712 -- 5728Roy D. Yates. The Age of Information in Networks: Moments, Distributions, and Sampling
5729 -- 5741Benjamin Doerr, Marvin Künnemann. Improved Protocols and Hardness Results for the Two-Player Cryptogenography Problem
5742 -- 5753Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay S. Kaleyski. On the Distance Between APN Functions
5754 -- 5773Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang. Provably Secure Group Signature Schemes From Code-Based Assumptions
5774 -- 5780Jingwei Zhang, Shuhong Gao, Chang-An Zhao. 2-Periodic Sequences From Euler Quotients
5781 -- 5789Pål Ellingsen, Patrick Felke, Constanza Riera, Pantelimon Stanica, Anton Tkachenko. C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity
5790 -- 5805Shashank Vatedka, Aslan Tchamkerten. Local Decode and Update for Big Data Compression
5806 -- 5841Ji Chen, Dekai Liu, Xiaodong Li. ∞ Regularization
5842 -- 5865Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik. Privacy of Dependent Users Against Statistical Matching
5866 -- 5874Juan Miguel Medina 0002, Fernando Ruben Dobarro, Bruno Cernuschi-Frías. Convergence of p-Stable Random Fractional Wavelet Series and Some of Its Properties
5875 -- 5903Seyedehsara Nayer, Praneeth Narayanamurthy, Namrata Vaswani. Provable Low Rank Phase Retrieval
5904 -- 5926Brett Bernstein, Sheng Liu, Chrysa Papadaniil, Carlos Fernandez-Granda. Sparse Recovery Beyond Compressed Sensing: Separable Nonlinear Inverse Problems
5927 -- 5964Botao Hao, Anru Zhang, Guang Cheng. Sparse and Low-Rank Tensor Estimation via Cubic Sketchings

Volume 66, Issue 8

4653 -- 4680Yucheng Liu, Parastoo Sadeghi, Fatemeh Arbabjolfaei, Young-Han Kim 0001. Capacity Theorems for Distributed Index Coding
4681 -- 4708Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch. Strong Coordination of Signals and Actions Over Noisy Channels With Two-Sided State Information
4709 -- 4721Zhen Chen, Zhiying Wang, Syed Ali Jafar. The Asymptotic Capacity of Private Search
4722 -- 4741Yuval Kochman, Or Ordentlich, Yury Polyanskiy. A Lower Bound on the Expected Distortion of Joint Source-Channel Coding
4742 -- 4760Yuta Sakai, Vincent Y. F. Tan, Mladen Kovacevic 0001. Second- and Third-Order Asymptotics of the Continuous-Time Poisson Channel
4761 -- 4773Zhen Chen, Zhiying Wang, Syed Ali Jafar. The Capacity of T-Private Information Retrieval With Private Side Information
4774 -- 4795Tetsunao Matsuta, Tomohiko Uyematsu. Coding Theorems for Asynchronous Slepian-Wolf Coding Systems
4796 -- 4803Neri Merhav. Noisy Guesses
4804 -- 4818Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei. Low-Power Cooling Codes With Efficient Encoding and Decoding
4819 -- 4833Florian Gensheimer, Tobias Dietz, Kira Kraft, Stefan Ruzika, Norbert Wehn. A Reduced-Complexity Projection Algorithm for ADMM-Based LP Decoding
4834 -- 4852Ahmed H. Hareedy, Ruiyi Wu, Lara Dolecek. A Channel-Aware Combinatorial Approach to Design High Performance Spatially-Coupled Codes
4853 -- 4868Han Cai, Ying Miao, Moshe Schwartz 0001, Xiaohu Tang. On Optimal Locally Repairable Codes With Super-Linear Length
4869 -- 4891M. Nikhil Krishnan, Deeptanshu Shukla, P. Vijay Kumar. Rate-Optimal Streaming Codes for Channels With Burst and Random Erasures
4892 -- 4903Yeow Meng Chee, Johan Chrisnata, Han Mao Kiah, Tuan Thanh Nguyen. Efficient Encoding/Decoding of GC-Balanced Codes Correcting Tandem Duplications
4904 -- 4916Ruida Zhou, Chao Tian, Hua Sun 0001, Tie Liu. Capacity-Achieving Private Information Retrieval Codes From MDS-Coded Databases With Minimum Message Size
4917 -- 4934YiWei Zhang, Tuvi Etzion, Eitan Yaakobi. Bounds on the Length of Functional PIR and Batch Codes
4935 -- 4947Umberto Martínez-Peñas, Diego Napp. Locally Repairable Convolutional Codes With Sliding Window Repair
4948 -- 4965Min Ye 0005, Emmanuel Abbe. Recursive Projection-Aggregation Decoding of Reed-Muller Codes
4966 -- 4991Marina Riabiz, Tohid Ardeshiri, Ioannis Kontoyiannis, Simon J. Godsill. Nonasymptotic Gaussian Approximation for Inference With Stable Noise
4992 -- 5002Oliver Johnson. Maximal Correlation and the Rate of Fisher Information Convergence in the Central Limit Theorem
5003 -- 5021Eugenia-Maria Kontopoulou, Gregory-Paul Dexter, Wojciech Szpankowski, Ananth Grama, Petros Drineas. Randomized Linear Algebra Approaches to Estimate the von Neumann Entropy of Density Matrices
5022 -- 5036Anurag Anshu, Mario Berta, Rahul Jain 0001, Marco Tomamichel. Partially Smoothed Information Measures
5037 -- 5054Fernando G. S. L. Brandão, Aram Wettroth Harrow, James R. Lee, Yuval Peres. Adversarial Hypothesis Testing and a Quantum Stein's Lemma for Restricted Measurements
5055 -- 5060Mohammad A. Alhejji, Graeme Smith. Monotonicity Under Local Operations: Linear Entropic Formulas
5061 -- 5071Cencheng Shen, Li Chen, Yuexiao Dong, Carey E. Priebe. Sparse Representation Classification Beyond ℓ1 Minimization and the Subspace Assumption
5072 -- 5096Junhan Kim, Jian Wang 0016, Luong Trung Nguyen, Byonghyo Shim. Joint Sparse Recovery Using Signal Space Matching Pursuit
5097 -- 5109Lifeng Lai, Erhan Bayraktar. On the Adversarial Robustness of Robust Estimators
5110 -- 5129Yuting Wei, Martin J. Wainwright. The Local Geometry of Testing in Ellipses: Tight Control via Localized Kolmogorov Widths
5130 -- 5144Manolis C. Tsakiris, Liangzu Peng, Aldo Conca, Laurent Kneip, Yuanming Shi, Hayoung Choi. An Algebraic-Geometric Approach for Linear Regression Without Correspondences
5145 -- 5166Saurabh Sihag, Ali Tajer. Secure Estimation Under Causative Attacks
5167 -- 5181Bangteng Xu. Absolute Maximum Nonlinear Functions on Finite Nonabelian Groups
5182 -- 5203Rishabh Dudeja, Milad Bakhshizadeh, Junjie Ma 0001, Arian Maleki. Analysis of Spectral Methods for Phase Retrieval With Random Orthogonal Matrices
5204 -- 5227Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli. On Secure Network Coding for Multiple Unicast Traffic
5228 -- 5260Joyson Sebastian, Suhas N. Diggavi. Generalized Degrees of Freedom of Noncoherent Diamond Networks
5261 -- 5281Yi Liu 0052, Pengfei Huang 0001, Alexander W. Bergman, Paul H. Siegel. Rate-Constrained Shaping Codes for Structured Sources
5282 -- 5298Benjamin W. Fuller, Leonid Reyzin, Adam D. Smith. When Are Fuzzy Extractors Possible?
5299 -- 5309Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa. Constructing APN Functions Through Isotopic Shifts
5310 -- 5315Xianhua Niu, Chaoping Xing, Yang Liu 0165, Liang Zhou 0003. A Construction of Optimal Frequency Hopping Sequence Set via Combination of Multiplicative and Additive Groups of Finite Fields
5316 -- 0Weiyu Xu, Haider Ali Jasim Alshamary, Tareq Y. Al-Naffouri, Alam Zaib. Correction to "Optimal Joint Channel Estimation and Data Detection for Massive SIMO Wireless Systems: A Polynomial Complexity Solution"

Volume 66, Issue 7

3957 -- 3975Jian Li 0007, Tongtong Li, Jian Ren 0001. Beyond the MDS Bound in Distributed Cloud Storage
3976 -- 4006Yuta Sakai, Ken-ichi Iwata, Hiroshi Fujisaki. Modular Arithmetic Erasure Channels and Their Multilevel Channel Polarization
4007 -- 4018Silas L. Fong, Ashish Khisti, Baochun Li, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos. Optimal Multiplexed Erasure Codes for Streaming Messages With Different Decoding Delays
4019 -- 4025Giacomo Micheli, Alessandro Neri 0002. New Lower Bounds for Permutation Codes Using Linear Block Codes
4026 -- 4037Shlomo Engelberg, Osnat Keren. Constructive Bounds on the Capacity of Parallel Asynchronous Skew-Free Channels With Glitches
4038 -- 4050Rafael G. L. D'Oliveira, Salim El Rouayheb, David A. Karpuk. GASP Codes for Secure Distributed Matrix Multiplication
4051 -- 4060Michael Kiermaier, Sascha Kurz. On the Lengths of Divisible Codes
4061 -- 4074Welington Santos, Marcelo Muniz Silva Alves. Polynomial Invariant Theory and Shape Enumerator of Self-Dual Codes in the NRT-Metric
4075 -- 4088Ron M. Roth. Analog Error-Correcting Codes
4089 -- 4103Lev Yohananov, Yuval Efron, Eitan Yaakobi. Double and Triple Node-Erasure-Correcting Codes Over Complete Graphs
4104 -- 4128Arun Padakandla. Communicating Correlated Sources Over MAC and Interference Channels I: Separation-Based Schemes
4129 -- 4149Karim Banawan, Sennur Ulukus. Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security
4150 -- 4182Sadaf Salehkalaibar, Michele A. Wigger. Distributed Hypothesis Testing Based on Unequal-Error Protection Codes
4183 -- 4202Yigit Ugur, Iñaki Estella Aguerri, Abdellatif Zaidi. Vector Gaussian CEO Problem Under Logarithmic Loss and Applications
4203 -- 4225Mohsen Heidari, S. Sandeep Pradhan. Structured Mappings and Conferencing Common Information for Multiple-Access Channels
4226 -- 4244Qiaoqiao Zhou, Chung Chan. Secret Key Generation for Minimally Connected Hypergraphical Sources
4245 -- 4269Masanori Kawakita, Jun'ichi Takeuchi. Minimum Description Length Principle in Supervised Learning With Application to Lasso
4270 -- 4303Jean Barbier, Nicolas Macris, Mohamad Dia, Florent Krzakala. Mutual Information and Optimality of Approximate Message-Passing in Random Linear Estimation
4304 -- 4323Alex Dytso, H. Vincent Poor. Estimation in Poisson Noise: Properties of the Conditional Mean Estimator
4324 -- 4348P. N. Karthik, Rajesh Sundaresan. Learning to Detect an Odd Markov Arm
4349 -- 4367Haiyun He, Lin Zhou 0002, Vincent Y. F. Tan. Distributed Detection With Empirically Observed Statistics
4368 -- 4391Ziv Goldfeld, Kristjan H. Greenewald, Jonathan Niles-Weed, Yury Polyanskiy. Convergence of Smoothed Empirical Measures With Applications to Entropy Estimation
4392 -- 4418Jiantao Jiao, Yanjun Han. Bias Correction With Jackknife, Bootstrap, and Taylor Series
4419 -- 4430Mohammad Javad-Kalbasi, Mohammadali Khosravifard. Some Tight Lower Bounds on the Redundancy of Optimal Binary Prefix-Free and Fix-Free Codes
4431 -- 4448Joyson Sebastian, Suhas N. Diggavi. Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths
4449 -- 4467Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti. The Approximate Capacity of Half-Duplex Line Networks
4468 -- 4488Amal Hyadi, Zouheir Rezki, Mohamed-Slim Alouini. Securing Multi-User Broadcast Wiretap Channels With Finite CSI Feedback
4489 -- 4512Alexis Decurninge, Luis Garcia Ordóñez, Maxime Guillaud. Covariance-Aided CSI Acquisition With Non-Orthogonal Pilots in Massive MIMO: A Large-System Performance Analysis
4513 -- 4529Hamdi Joudeh, Bruno Clerckx. On the Separability of Parallel MISO Broadcast Channels Under Partial CSIT: A Degrees of Freedom Region Perspective
4530 -- 4546Apostolos Destounis, Asma Ghorbel, Georgios S. Paschos, Mari Kobayashi. Adaptive Coded Caching for Fair Delivery Over Fading Channels
4547 -- 4562Meng Wang, Wei Chen 0002, Anthony Ephremides. Real-Time Reconstruction of a Counting Process Through First-Come-First-Serve Queue Systems
4563 -- 4573Teng Zhang. Phase Retrieval by Alternating Minimization With Random Initialization
4574 -- 4592Holger Boche, Volker Pohl. On the Algorithmic Solvability of Spectral Factorization and Applications
4593 -- 4608Weilin Li, Wenjing Liao, Albert Fannjiang. Super-Resolution Limit of the ESPRIT Algorithm
4609 -- 4612Mate Gyarmati, Péter Ligeti. Smallest Graphs Achieving the Stinson Bound
4613 -- 4620Lulu Zhang, Jun Zhang, Minghui Yang, Keqin Feng. On the 2-Adic Complexity of the Ding-Helleseth-Martinsen Binary Sequences
4621 -- 4640Matthias Christandl, Roberto Ferrara, Cécilia Lancien. Random Private Quantum States
4641 -- 4651Dmitry Gavinsky. Entangled Simultaneity Versus Classical Interactivity in Communication Complexity

Volume 66, Issue 6

3293 -- 3316Lele Wang 0001, Young-Han Kim 0001, Chiao-Yi Chen, Hosung Park, Eren Sasoglu. Sliding-Window Superposition Coding: Two-User Interference Channels
3317 -- 3326Laure Aptel, Aslan Tchamkerten. Bits Through Queues With Feedback
3327 -- 3341Reza Khosravi-Farsani, Amir K. Khandani. Novel Outer Bounds and Capacity Results for the Interference Channel With Conferencing Receivers
3342 -- 3365Shraga I. Bross. Message and Causal Asymmetric State Transmission Over the State-Dependent Degraded Broadcast Channel
3366 -- 3406Lei Yu 0003, Vincent Y. F. Tan. On Exact and ∞-Rényi Common Informations
3407 -- 3416Karim Banawan, Batuhan Arasli, Yi-Peng Wei, Sennur Ulukus. The Capacity of Private Information Retrieval From Heterogeneous Uncoded Caching Databases
3417 -- 3434Hua Sun 0001, Syed Ali Jafar. On the Capacity of Computation Broadcast
3435 -- 3455Bin Dai 0003, Chong Li, Yingbin Liang, Zheng Ma 0001, Shlomo Shamai Shitz. Impact of Action-Dependent State and Channel Feedback on Gaussian Wiretap Channels
3456 -- 3464Neri Merhav. A Lagrange-Dual Lower Bound to the Error Exponent of the Typical Random Code
3465 -- 3484Toyohiro Tsurumaru. Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution
3485 -- 3499Hans-Andrea Loeliger, Pascal O. Vontobel. Quantum Measurement as Marginalization and Nested Quantum Systems
3500 -- 3519Da-Wei Ding 0002, Hrant Gharibyan, Patrick Hayden, Michael Walter. A Quantum Multiparty Packing Lemma and the Relay Channel
3520 -- 3526Joshua Levin, Graeme Smith. Optimized Measures of Bipartite Quantum Correlation
3527 -- 3537Weijun Fang, Fang-Wei Fu, Lanqiang Li, Shixin Zhu. Euclidean and Hermitian Hulls of MDS Codes and Their Applications to EAQECCs
3538 -- 3546Trygve Johnsen, Hugues Verdure. Higher Weight Spectra of Veronese Codes
3547 -- 3554Gábor Korchmáros, Gábor P. Nagy, Marco Timpanella. Codes and Gap Sequences of Hermitian Curves
3555 -- 3571Yuan Cao 0001, Yonglin Cao, Fang-Wei Fu, Jian Gao 0001. Self-Dual Binary $[8m, \, \, 4m]$ -Codes Constructed by Left Ideals of the Dihedral Group Algebra $\mathbb{F}_2[D_{8m}]$
3572 -- 3589Ahmed H. Hareedy, A. Robert Calderbank. LOCO Codes: Lexicographically-Ordered Constrained Codes
3590 -- 3602Netanel Raviv, Itzhak Tamo, Eitan Yaakobi. Private Information Retrieval in Graph-Based Replication Systems
3603 -- 3615Lin Sok. Explicit Constructions of MDS Self-Dual Codes
3616 -- 3637Kai Wan, Daniela Tuninetti, Mingyue Ji, Giuseppe Caire, Pablo Piantanida. Fundamental Limits of Decentralized Data Shuffling
3638 -- 3649Hikmet Yildiz, Babak Hassibi. Gabidulin Codes With Support Constrained Generator Matrices
3650 -- 3656Aixian Zhang, Keqin Feng. A Unified Approach to Construct MDS Self-Dual Codes via Reed-Solomon Codes
3657 -- 3663Yansheng Wu, Xiaomeng Zhu, Qin Yue. Optimal Few-Weight Codes From Simplicial Complexes
3664 -- 3674Roberto Assis Machado, Marcelo Firer. Weights Which Respect Support and NN-Decoding
3675 -- 3690Mario Blaum, Steven R. Hetzler. Array Codes With Local Properties
3691 -- 3703Chunming Tang, Cunsheng Ding, Maosheng Xiong. Codes, Differentially $\delta$ -Uniform Functions, and $t$ -Designs
3704 -- 3713Rebecca J. Stones. K-Plex 2-Erasure Codes and Blackburn Partial Latin Squares
3714 -- 3731Prathamesh Mayekar, Parimal Parag, Himanshu Tyagi. Optimal Source Codes for Timely Updates
3732 -- 3744Christian Sohn, Hauke Krüger, Peter Vary. Logarithmic Pyramid Vector Quantization - Design and Theoretical Analysis
3745 -- 3752Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento. On the Commitment Capacity of Unfair Noisy Channels
3753 -- 3765Ziran Tu, Nian Li, Xiangyong Zeng, Junchao Zhou. A Class of Quadrinomial Permutations With Boomerang Uniformity Four
3766 -- 3774Zuling Chang, Guang Gong, Qiang Wang 0012. Cycle Structures of a Class of Cascaded FSRs
3775 -- 3797Jonathan Scarlett, Oliver Johnson. Noisy Non-Adaptive Group Testing: A (Near-)Definite Defectives Approach
3798 -- 3826Puning Zhao, Lifeng Lai. Analysis of KNN Information Estimators for Smooth Distributions
3827 -- 3845Yao-Chia Chan, Junge Wang, Syed Ali Jafar. Toward an Extremal Network Theory - Robust GDoF Gain of Transmitter Cooperation Over TIN
3846 -- 3863Elie Najm, Rajai Nasser, Emre Telatar. Content Based Status Updates
3864 -- 3877Peng Zou, Omur Ozel, Suresh Subramaniam. Waiting Before Serving: A Companion to Packet Management in Status Update Systems
3878 -- 3892Culver McWhirter, Dustin G. Mixon, Soledad Villar. SqueezeFit: Label-Aware Dimensionality Reduction by Semidefinite Programming
3893 -- 3913Shuang Li 0003, Michael B. Wakin, Gongguo Tang. Atomic Norm Denoising for Complex Exponentials With Unknown Waveform Modulations
3914 -- 3928Huanmin Ge, Wengu Chen, Michael K. Ng. New RIP Bounds for Recovery of Sparse Signals With Partial Support Information via Weighted ${\ell_{p}}$ -Minimization
3929 -- 3953Yingjie Fei, Yudong Chen 0001. Achieving the Bayes Error Rate in Synchronization and Block Models by SDP, Robustly
3954 -- 0Ning Cai 0001, Masahito Hayashi. Corrections to "Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes"

Volume 66, Issue 5

2609 -- 2624Pengfei Huang 0001, Eitan Yaakobi, Paul H. Siegel. Multi-Erasure Locally Recoverable Codes Over Small Fields: A Tensor Product Approach
2625 -- 2641Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli. Privacy in Index Coding: $k$ -Limited-Access Schemes
2642 -- 2657Tang Liu 0002, Daniela Tuninetti. Tight Information Theoretic Converse Results for Some Pliable Index Coding Problems
2658 -- 2668Yonatan Yehezkeally, Moshe Schwartz 0001. Reconstruction Codes for DNA Sequences With Uniform Tandem-Duplication Errors
2669 -- 2682Yeow Meng Chee, Han Mao Kiah, Alexander Vardy, Eitan Yaakobi. Explicit and Efficient WOM Codes of Finite Length
2683 -- 2695Kyle Reing, Greg Ver Steeg, Aram Galstyan. Maximizing Multivariate Information With Error-Correcting Codes
2696 -- 2712Silas L. Fong, Ashish Khisti, Baochun Li, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos. Optimal Streaming Erasure Codes Over the Three-Node Relay Network
2713 -- 2716Thomas Honold, Michael Kiermaier, Sascha Kurz, Alfred Wassermann. The Lengths of Projective Triply-Even Binary Codes
2717 -- 2728Fengwei Li, Qin Yue, Yansheng Wu. LCD and Self-Orthogonal Group Codes in a Finite Abelian $p$ -Group Algebra
2729 -- 2742Huseyin A. Inan, Peter Kairouz, Ayfer Özgür. Sparse Combinatorial Group Testing
2743 -- 2750Jiyou Li, Daqing Wan. Distance Distribution in Reed-Solomon Codes
2751 -- 2759Makoto Araya, Masaaki Harada, Ken Saito. Quaternary Hermitian Linear Complementary Dual Codes
2760 -- 2764Fagang Li. Construction of Constant Dimension Subspace Codes by Modifying Linkage Construction
2765 -- 2776Zuo Ye, Tao Zhang 0030, Xiande Zhang, Gennian Ge. Some New Results on Splitter Sets
2777 -- 2798Gabriel Schamberg, Todd P. Coleman. Measuring Sample Path Causal Influences With Relative Entropy
2799 -- 2818Lei Yu 0003, Vincent Y. F. Tan. Exact Channel Synthesis
2819 -- 2841Jinyuan Chen. Secure Communication Over Interference Channel: To Jam or not to Jam?
2842 -- 2859Sharu Theresa Jose, Ankur A. Kulkarni. Shannon Meets von Neumann: A Minimax Theorem for Channel Coding in the Presence of a Jammer
2860 -- 2871Erixhen Sula, Michael Gastpar, Gerhard Kramer. Sum-Rate Capacity for Symmetric Gaussian Multiple Access Channels With Feedback
2872 -- 2890Nicolò De Ponti. Metric Properties of Homogeneous and Spatially Inhomogeneous $F$ -Divergences
2891 -- 2897Rui Facundo Vigelis, Luiza Helena Félix de Andrade, Charles C. Cavalcante. Properties of a Generalized Divergence Related to Tsallis Generalized Divergence
2898 -- 2903Benjamin Jaye, Galyna V. Livshyts, Grigoris Paouris, Peter Pivovarov. Remarks on the Rényi Entropy of a Sum of IID Random Variables
2904 -- 2911Tom Gur, Igor Shinkar. An Entropy Lower Bound for Non-Malleable Extractors
2912 -- 2920Neri Merhav. Guessing Individual Sequences: Generating Randomized Guesses Using Finite-State Machines
2921 -- 2933Yingkai Ouyang, Rui Chao. Permutation-Invariant Constant-Excitation Quantum Codes for Amplitude Damping
2934 -- 2950Stefan Huber, Robert König, Marco Tomamichel. Jointly Constrained Semidefinite Bilinear Programming With an Application to Dobrushin Curves
2951 -- 2963Alvin Gonzales, Eric Chitambar. Bounds on Instantaneous Nonlocal Quantum Computation
2964 -- 2987Peter J. Brown, Sammy Ragy, Roger Colbeck. A Framework for Quantum-Secure Device-Independent Randomness Expansion
2988 -- 2999Christoph Hellings, Wolfgang Utschick. Improper Signaling Versus Time-Sharing in the Two-User Gaussian Interference Channel With TIN
3000 -- 3025Chih-Hua Chang, Chih-Chun Wang. A New Capacity-Approaching Scheme for General 1-to-K Broadcast Packet Erasure Channels With ACK/NACK
3026 -- 3039Mirza Uzair Baig, Anders Høst-Madsen, Aria Nosratinia. Discrete Modulation for Interference Mitigation
3040 -- 3064Junyoung Nam, Giuseppe Caire, Mérouane Debbah, H. Vincent Poor. Capacity Scaling of Massive MIMO in Strong Spatial Correlation Regimes
3065 -- 3078Pan Li 0005, Gregory J. Puleo, Olgica Milenkovic. Motif and Hypergraph Correlation Clustering
3079 -- 3097Konstantinos Gourgoulias, Markos A. Katsoulakis, Luc Rey-Bellet, Jie Wang. How Biased Is Your Model? Concentration Inequalities, Information and Model Bias
3098 -- 3131Adel M. Elmahdy, Soheil Mohajer. On the Fundamental Limits of Coded Data Shuffling for Distributed Machine Learning
3132 -- 3170Clément L. Canonne, Ilias Diakonikolas, Daniel M. Kane, Alistair Stewart. Testing Bayesian Networks
3171 -- 3186Hao Lou, Moshe Schwartz 0001, Jehoshua Bruck, Farzad Farnoud. Evolution of $k$ -Mer Frequencies and Entropy in Duplication and Substitution Mutation Systems
3187 -- 3201Vikram Krishnamurthy. Convex Stochastic Dominance in Bayesian Localization, Filtering, and Controlled Sensing POMDPs
3202 -- 3231Anru Zhang, Mengdi Wang. Spectral State Compression of Markov Processes
3232 -- 3241Tamir Bendory, Dan Edidin, Yonina C. Eldar. Blind Phaseless Short-Time Fourier Transform Recovery
3242 -- 3260Zhenzhen Li, Jian-Feng Cai, Ke Wei. Toward the Optimal Construction of a Loss Function Without Spurious Local Minima for Solving Quadratic Equations
3261 -- 3267Sajad Daei, Farzan Haddadi, Arash Amini. Living Near the Edge: A Lower-Bound on the Phase Transition of Total Variation Minimization
3268 -- 3276Neri Merhav. Weak-Noise Modulation-Estimation of Vector Parameters
3277 -- 3291Sihong Su. Systematic Methods of Constructing Bent Functions and 2-Rotation Symmetric Bent Functions

Volume 66, Issue 4

1949 -- 1978Mario Diaz, Hao Wang 0063, Flávio du Pin Calmon, Lalitha Sankar. On the Robustness of Information-Theoretic Privacy Measures and Mechanisms
1979 -- 2005Mehrdad Tahmasbi, Anne Savard, Matthieu R. Bloch. Covert Capacity of Non-Coherent Rayleigh-Fading Channels
2006 -- 2022Alex Dytso, Semih Yagli, H. Vincent Poor, Shlomo Shamai Shitz. The Capacity Achieving Distribution for the Amplitude Constrained Additive Gaussian Channel: An Upper Bound on the Number of Mass Points
2023 -- 2031Yi-Peng Wei, Sennur Ulukus. The Capacity of Private Information Retrieval With Private Side Information Under Storage Constraints
2032 -- 2043Swanand Kadhe, Brenden Garcia, Anoosheh Heidarzadeh, Salim Y. El Rouayheb, Alex Sprintson. Private Information Retrieval With Side Information
2044 -- 2066Sreejith Sreekumar, Deniz Gündüz. Distributed Hypothesis Testing Over Discrete Memoryless Channels
2067 -- 2077Neri Merhav. Error Exponents of Typical Random Trellis Codes
2078 -- 2090Sergey Tridenski, Ram Zamir. Channel Input Adaptation via Natural Type Selection
2091 -- 2114Anurag Anshu, Penghui Yao. On the Compression of Messages in the Multi-Party Setting
2115 -- 2128Jun Chen 0005, Li Xie, Yameng Chang, Jia Wang 0004, Yizhong Wang. Generalized Gaussian Multiterminal Source Coding: The Symmetric Case
2129 -- 2140Kun Fang, Xin Wang 0022, Marco Tomamichel, Mario Berta. Quantum Channel Simulation and the Channel's Smooth Max-Information
2141 -- 2164Farzin Salek, Anurag Anshu, Min-Hsiu Hsieh, Rahul Jain 0001, Javier Rodríguez Fonollosa. One-Shot Capacity Bounds on the Simultaneous Transmission of Classical and Quantum Information
2165 -- 2183Ludovico Lami. Completing the Grand Tour of Asymptotic Quantum Coherence Manipulation
2184 -- 2197Milad Johnny, Mohammad Reza Aref. BIA for the K-User Interference Channel Using Reconfigurable Antenna at Receivers
2198 -- 2218Yimin Pang, Mahesh K. Varanasi. Constant-Gap-to-Capacity and Generalized Degrees of Freedom Regions of the MIMO MAC-IC-MAC
2219 -- 2251Parisa Hassanzadeh, Antonia Maria Tulino, Jaime Llorca, Elza Erkip. Rate-Memory Trade-Off for Caching and Delivery of Correlated Sources
2252 -- 2268Emanuele Parrinello, Ayse Ünsal, Petros Elia. Fundamental Limits of Coded Caching With Multiple Antennas, Shared Caches and Uncoded Prefetching
2269 -- 2279Yijin Zhang, Yi Chen 0013, Yuan-Hsun Lo, Wing Shing Wong. Achieving Zero-Packet-Loss Throughput 1 for a Collision Channel Without Feedback and With Arbitrary Time Offsets
2280 -- 2295Shaofeng Zou, Venugopal V. Veeravalli, Jian Li 0008, Don Towsley. Quickest Detection of Dynamic Events in Networks
2296 -- 2310Sihem Mesnager, Ahmet Sinak. Several Classes of Minimal Linear Codes With Few Weights From Weakly Regular Plateaued Functions
2311 -- 2330Pengfei Huang 0001, Yi Liu 0052, Xiaojie Zhang, Paul H. Siegel, Erich F. Haratsch. Syndrome-Coupled Rate-Compatible Error-Correcting Codes: Theory and Application
2331 -- 2351Andreas Lenz, Paul H. Siegel, Antonia Wachter-Zeh, Eitan Yaakobi. Coding Over Sets for DNA Storage
2352 -- 2374Venkatesan Guruswami, Ray Li. Coding Against Deletions in Oblivious and Online Models
2375 -- 2391Jin Sima, Netanel Raviv, Jehoshua Bruck. Two Deletion Correcting Codes From Indicator Vectors
2392 -- 2401Jun Zhang 0031, Daqing Wan, Krishna Kaipa. Deep Holes of Projective Reed-Solomon Codes
2402 -- 2416Han Cai, Ying Miao, Moshe Schwartz 0001, Xiaohu Tang. On Optimal Locally Repairable Codes With Multiple Disjoint Repair Sets
2417 -- 2429Lukas Holzbaur, Ragnar Freij-Hollanti, Antonia Wachter-Zeh, Camilla Hollanti. Private Streaming With Convolutional Codes
2430 -- 2442Mao-Ching Chiu. Interleaved Polar (I-Polar) Codes
2443 -- 2455Rafael G. L. D'Oliveira, Salim El Rouayheb. One-Shot PIR: Refinement and Lifting
2456 -- 2465Minjia Shi, Denis S. Krotov, Patrick Solé. A New Approach to the Kasami Codes of Type 2
2466 -- 2486Yauhen Yakimenka, Eirik Rosnes. Failure Analysis of the Interval-Passing Algorithm for Compressed Sensing
2487 -- 2500Christos Thrampoulidis, Ankit Singh Rawat. The Generalized Lasso for Sub-Gaussian Measurements With Dithered Quantization
2501 -- 2516Dennis Amelunxen, Martin Lotz, Jake Walvin. Effective Condition Number Bounds for Convex Regularization
2517 -- 2532Mohamed Ndaoud, Alexandre B. Tsybakov. Optimal Variable Selection and Adaptive Noisy Compressed Sensing
2533 -- 2548Michael Brand. MML Is Not Consistent for Neyman-Scott
2549 -- 2569Arun Padakandla, P. R. Kumar, Wojciech Szpankowski. The Trade-Off Between Privacy and Fidelity via Ehrhart Theory
2570 -- 2580Lakshmi Kanta Patra, Suchandan Kayal, Somesh Kumar. Measuring Uncertainty Under Prior Information
2581 -- 2587Sung-il Pae. Binarization Trees and Random Number Generation
2588 -- 2598Zhe Li, San Ling, Chaoping Xing, Sze-Ling Yeo. On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications
2599 -- 2608Lei Yu 0003, Vincent Y. F. Tan. Corrections to "Wyner's Common Information Under Rényi Divergence Measures"

Volume 66, Issue 3

1281 -- 1317Eirik Rosnes, Michael Helmling. Adaptive Linear Programming Decoding of Nonbinary Linear Codes Over Prime Fields
1318 -- 1332Kai Wan, Daniela Tuninetti, Pablo Piantanida. An Index Coding Approach to Caching With Uncoded Cache Placement
1333 -- 1353Linqi Song, Christina Fragouli, Tianchu Zhao. A Pliable Index Coding Approach to Data Shuffling
1354 -- 1384Qiaosheng Eric Zhang, Mayank Bakshi, Sidharth Jaggi. Covert Communication With Polynomial Computational Complexity
1385 -- 1395Ohad Elishco, Ryan Gabrys, Eitan Yaakobi. Bounds and Constructions of Codes Over Symbol-Pair Read Channels
1396 -- 1404Itzhak Tamo, Min Ye 0005, Alexander Barg. Error Correction Based on Partial Information
1405 -- 1422Hanxu Hou, Patrick P. C. Lee. Binary MDS Array Codes With Optimal Repair
1423 -- 1427Denis S. Krotov. The Existence of Perfect Codes in Doob Graphs
1428 -- 1448Ning Cai, Masahito Hayashi. Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes
1449 -- 1459Minjia Shi, Xiaoxiao Li, Alessandro Neri 0002, Patrick Solé. How Many Weights Can a Cyclic Code Have?
1460 -- 1473Lior Eldar, Maris Ozols, Kevin Thompson 0005. The Need for Structure in Quantum LDPC Codes
1474 -- 1481Hamed Narimani, Mohammadali Khosravifard. A New Code for Encoding All Monotone Sources With a Fixed Large Alphabet Size
1482 -- 1496Elad Domanovitz, Uri Erez. Achievability Performance Bounds for Integer-Forcing Source Coding
1497 -- 1519Ziv Goldfeld, Paul Cuff, Haim H. Permuter. Wiretap Channels With Random States Non-Causally Available at the Encoder
1520 -- 1529Fatemeh Arbabjolfaei, Young-Han Kim 0001. Generalized Lexicographic Products and the Index Coding Capacity
1530 -- 1548Jiangfan Zhang, Xiaodong Wang 0001. Asymptotically Optimal Stochastic Encryption for Quantized Sequential Detection in the Presence of Eavesdroppers
1549 -- 1571Pinar Sen, Young-Han Kim 0001. Homologous Codes for Multiple Access Channels
1572 -- 1584Antonio Campello, Cong Ling 0001, Jean-Claude Belfiore. Semantically Secure Lattice Codes for Compound MIMO Channels
1585 -- 1606Yutaka Jitsumatsu, Yasutada Oohama. A New Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels
1607 -- 1624Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener. Learning an Adversary's Actions for Secret Communication
1625 -- 1657Ibrahim Issa, Aaron B. Wagner, Sudeep Kamath. An Operational Approach to Information Leakage
1658 -- 1673Amichai Painsky, Gregory W. Wornell. Bregman Divergence Bounds and Universality Properties of the Logarithmic Loss
1674 -- 1690Shigeaki Kuzuoka. On the Conditional Smooth Rényi Entropy and its Applications in Guessing and Source Coding
1691 -- 1701Shun Watanabe, Te Sun Han. Interval Algorithm for Random Number Generation: Information Spectrum Approach
1702 -- 1713Daniil Ryabko. Time-Series Information and Unsupervised Learning of Representations
1714 -- 1737Xiao-Yang Liu, Shuchin Aeron, Vaneet Aggarwal, Xiaodong Wang 0001. Low-Tubal-Rank Tensor Completion Using Alternating Minimization
1738 -- 1759Dongmian Zou, Radu Balan, Maneesh Singh. On Lipschitz Bounds of General Convolutional Neural Networks
1760 -- 1784Yihua Li, Devavrat Shah, Dogyoon Song, Christina Lee Yu. Nearest Neighbors for Matrix Estimation Interpreted as Blind Regression for Latent Variable Model
1785 -- 1821Qing Qu, Yuqian Zhang, Yonina C. Eldar, John Wright 0001. Convolutional Phase Retrieval via Gradient Descent
1822 -- 1844Weiyu Xu, Haider Ali Jasim Alshamary, Tareq Y. Al-Naffouri, Alam Zaib. Optimal Joint Channel Estimation and Data Detection for Massive SIMO Wireless Systems: A Polynomial Complexity Solution
1845 -- 1860Qianrui Li, Paul de Kerret, David Gesbert, Nicolas Gresset. Robust Regularized ZF in Cooperative Broadcast Channel Under Distributed CSIT
1861 -- 1881Mirza Uzair Baig, Lei Yu 0003, Zixiang Xiong, Anders Høst-Madsen, Houqiang Li, Weiping Li. On the Energy-Delay Tradeoff in Streaming Data: Finite Blocklength Analysis
1882 -- 1892Qing He 0002, Di Yuan 0001, Anthony Ephremides. Optimal Scheduling for Emptying a Wireless Network: Solution Characterization, Applications, Including Deadline Constraints
1893 -- 1919Alexander Michael Daniel, Wei Yu 0001. Optimization of Heterogeneous Coded Caching
1920 -- 1933Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding
1934 -- 1943Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park 0001, Seokhie Hong. New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves
1944 -- 1947Hassan Aly, Arne Winterhof. A Note on Hall's Sextic Residue Sequence: Correlation Measure of Order $k$ and Related Measures of Pseudorandomness
1948 -- 0Anders Høst-Madsen. Corrections to "The Wideband Slope of Interference Channels: The Small Bandwidth Case"

Volume 66, Issue 2

689 -- 703Himanshu Tyagi, Shun Watanabe. Strong Converse Using Change of Measure Arguments
704 -- 721Jingbo Liu, Thomas A. Courtade, Paul Cuff, Sergio Verdú. Smoothing Brascamp-Lieb Inequalities and Strong Converses of Coding Theorems
722 -- 741Lan V. Truong, Hirosuke Yamamoto. On the Capacity of Symmetric M-User Gaussian Interference Channels With Feedback
742 -- 748Alex Samorodnitsky. An Upper Bound on $\ell_q$ Norms of Noisy Functions
749 -- 756Marco Dalai, Venkatesan Guruswami, Jaikumar Radhakrishnan. An Improved Bound on the Zero-Error List-Decoding Capacity of the 4/3 Channel
757 -- 779Uzi Pereg, Yossef Steinberg. The Arbitrarily Varying Broadcast Channel With Causal Side Information at the Encoder
780 -- 812Anuran Makur, Elchanan Mossel, Yury Polyanskiy. Broadcasting on Random Directed Acyclic Graphs
813 -- 834Seiyun Shin, Changho Suh. Two-Way Function Computation
835 -- 864Eric Graves, Tan F. Wong. Inducing Information Stability to Obtain Information Theoretic Necessary Requirements
865 -- 885Daming Cao, Vincent Y. F. Tan. Exact Error and Erasure Exponents for the Asymmetric Broadcast Channel
886 -- 899Zitan Chen, Alexander Barg. Explicit Constructions of MSR Codes for Clustered Distributed Storage: The Rack-Aware Storage Model
900 -- 913Michael Langberg, Michelle Effros. The Edge-Removal Problem's Connections to the Zero-Error and $\delta$ -Dependence Problems in Network Coding
914 -- 922Yanbin Zheng, Qiang Wang 0012, Wenhong Wei. On Inverses of Permutation Polynomials of Small Degree Over Finite Fields
923 -- 935Liqin Qian, Xiwang Cao. Bounds and Optimal $q$ -Ary Codes Derived From the $\mathbb{Z}_qR$ -Cyclic Codes
936 -- 956Mario Blaum. Extended Integrated Interleaved Codes Over Any Field With Applications to Locally Recoverable Codes
957 -- 969Yeow Meng Chee, San Ling, Tuan Thanh Nguyen, Van Khu Vu, Hengjia Wei, Xiande Zhang. Burst-Deletion-Correcting Codes for Permutations and Multipermutations
970 -- 982Cristina Fernández-Córdoba, Carlos Vela, Mercè Villanueva. On $\mathbb{Z}_{\text{8}}$ -Linear Hadamard Codes: Rank and Classification
983 -- 994Bing Zhu 0003, Kenneth W. Shum, Hui Li 0022. Fractional Repetition Codes With Optimal Reconstruction Degree
995 -- 1006Yaqian Zhang, Zhifang Zhang. Scalar MSCR Codes via the Product Matrix Construction
1007 -- 1022Eduardo Camps, Edgar Martínez-Moro, Eliseo Sarmiento Rosales. Vardøhus Codes: Polar Codes Based on Castle Curves Kernels
1023 -- 1052Balaji Srinivasan Babu, Ganesh R. Kini, P. Vijay Kumar. A Tight Rate Bound and Matching Construction for Locally Recoverable Codes With Sequential Recovery From Any Number of Multiple Erasures
1053 -- 1077Tao Guo, Raymond W. Yeung. The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding
1078 -- 1098Ali Ahmed 0004, Justin Romberg. Compressive Sampling of Ensembles of Correlated Signals
1099 -- 1117Chao Zhang 0017, Xianjie Gao, Min-Hsiu Hsieh, Hanyuan Hang, Dacheng Tao. Matrix Infinitely Divisible Series: Tail Inequalities and Their Applications
1118 -- 1135Yin Sun, Yury Polyanskiy, Elif Uysal. Sampling of the Wiener Process for Remote Estimation Over a Channel With Random Delay
1136 -- 1154Amichai Painsky, Saharon Rosset, Meir Feder. Innovation Representation of Stochastic Processes With Application to Causal Inference
1155 -- 1163Daniel E. Clark. Local Entropy Statistics for Point Processes
1164 -- 1170Atsushi Iwasaki. Deriving the Variance of the Discrete Fourier Transform Test Using Parseval's Theorem
1171 -- 1177Yodai Watanabe. Randomness Extraction via a Quantum Generalization of the Conditional Collision Entropy
1178 -- 1192Seunghoan Song, Masahito Hayashi. Secure Quantum Network Code Without Classical Communication
1193 -- 1212Tolunay Seyfi, Yasemin Karacora, Aly El Gamal. Fundamental Limits of Dynamic Interference Management With Flexible Message Assignments and Separate Deep Fading Block Coding
1213 -- 1218Xianhua Niu, Chaoping Xing, Chen Yuan 0003. Asymptotic Gilbert-Varshamov Bound on Frequency Hopping Sequences
1219 -- 1231Subhamoy Maitra, Bimal Mandal, Thor Martinsen, Dibyendu Roy 0001, Pantelimon Stanica. Analysis on Boolean Function in a Restricted (Biased) Domain
1232 -- 1247Morgane Austern, Arian Maleki. On the Gaussianity of Kolmogorov Complexity of Mixing Sequences
1248 -- 1260Huan Li 0002, Stacy Patterson, Yuhao Yi, Zhongzhi Zhang. Maximizing the Number of Spanning Trees in a Connected Graph
1261 -- 1280Ehsan Nekouei, Girish N. Nair, Tansu Alpcan, Robin J. Evans 0001. Sample Complexity of Solving Non-Cooperative Games

Volume 66, Issue 12

7311 -- 7332Emmanuel Abbe, Min Ye 0005. Reed-Muller Codes Polarize
7333 -- 7340Guanghui Zhang, Hongwei Liu. Constructions of Optimal Codes With Hierarchical Locality
7341 -- 7347Dmitrii Koshelev. Non-Split Toric BCH Codes on Singular del Pezzo Surfaces
7348 -- 7359Paulo J. Almeida, Julia Lieb. Complete j-MDP Convolutional Codes
7360 -- 7370Rina Polyanskaya, Nikita Polyanskii, Ilya Vorobyev. Binary Batch Codes With Improved Redundancy
7371 -- 7386Ximing Fu, Shenghao Yang, Zhiqing Xiao. Decoding and Repair Schemes for Shift-XOR Regenerating Codes
7387 -- 7407Lakshmi Prasad Natarajan, Prasad Krishnan, V. Lalitha 0001, Hoang Dau. Locally Decodable Index Codes
7408 -- 7426Niladri Das, Brijesh Kumar Rai. Characteristic Sets of Fixed-Dimension Vector Linear Codes for Non-Multicast Networks
7427 -- 7438Zhuqing Jia, Syed Ali Jafar. X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers
7439 -- 7456Zitan Chen, Min Ye 0005, Alexander Barg. Enabling Optimal Access and Error Correction for the Repair of Reed-Solomon Codes
7457 -- 7464Min Ye 0005. New Constructions of Cooperative MSR Codes: Reducing Node Size to exp(O(n))
7465 -- 7474Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen 0011, Fang-Wei Fu, Yixian Yang. Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach
7475 -- 7489Netanel Raviv, Itzhak Tamo, Rashish Tandon, Alexandros G. Dimakis. Gradient Coding From Cyclic MDS Codes and Expander Graphs
7490 -- 7527Mehran Elyasi, Soheil Mohajer. Cascade Codes for Distributed Storage Systems
7528 -- 7538Natan Ardimanov, Ofer Shayevitz, Itzhak Tamo. Minimum Guesswork With an Unreliable Oracle
7539 -- 7549Chao Tian 0002. On the Storage Cost of Private Information Retrieval
7550 -- 7564Pierre Escamilla, Michele A. Wigger, Abdellatif Zaidi. Distributed Hypothesis Testing: Cooperation and Concurrent Detection
7565 -- 7587Yuta Sakai, Vincent Y. F. Tan. Variable-Length Source Dispersions Differ Under Maximum and Average Error Criteria
7588 -- 7601Ryo Nomura. Source Resolvability and Intrinsic Randomness: Two Random Number Generation Problems With Respect to a Subclass of f-Divergences
7602 -- 7614Anshoo Tandon, Vincent Y. F. Tan, Lav R. Varshney. The Bee-Identification Error Exponent With Absentee Bees
7615 -- 7634Amine Mezghani, Josef A. Nossek, A. Lee Swindlehurst. Low SNR Asymptotic Rates of Vector Channels With One-Bit Outputs
7635 -- 7651Eleftherios Lampiris, Petros Elia. Full Coded Caching Gains for Cache-Less Users
7652 -- 7671Tung-Wei Kuo. Minimum Age of Information TDMA Scheduling: Approximation Algorithms and Hardness Results
7672 -- 7683Hua Sun 0001. Private Information Delivery
7684 -- 7701Kang-Hee Cho, Si-Hyeon Lee, Vincent Y. F. Tan. Throughput Scaling of Covert Communication Over Wireless Adhoc Networks
7702 -- 7716Claude Carlet. Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions
7717 -- 7723Yupeng Jiang. Weak Grain-Like Structures
7724 -- 7727Domingo Gómez-Pérez, Arne Winterhof. A Note on the Cross-Correlation of Costas Permutations
7728 -- 7738Daniel J. Katz, Sangman Lee, Stanislav A. Trunov. Rudin-Shapiro-Like Sequences With Maximum Asymptotic Merit Factor
7739 -- 7751Curtis Bright, Ilias S. Kotsireas, Vijay Ganesh. New Infinite Families of Perfect Quaternion Sequences and Williamson Sequences
7752 -- 7771Farzin Salek, Min-Hsiu Hsieh, Javier Rodríguez Fonollosa. Single-Serving Quantum Broadcast Channel With Common, Individualized, and Confidential Messages
7772 -- 7786Anurag Anshu, Min-Hsiu Hsieh, Rahul Jain 0001. Noisy Quantum State Redistribution With Promise and the Alpha-Bit
7787 -- 7811Puning Zhao, Lifeng Lai. Minimax Optimal Estimation of KL Divergence for Continuous Distributions
7812 -- 7827Abhik Ghosh, Subhabrata Majumdar. Ultrahigh-Dimensional Robust and Efficient Sparse Regression Using Non-Concave Penalized Density Power Divergence
7828 -- 7834Jun Liu 0004, Wuyang Zhou, Amir Zaimbashi, Hongbin Li. Persymmetric Adaptive Array Detection of Spread Spectrum Signals
7835 -- 7855Jayadev Acharya, Clément L. Canonne, Himanshu Tyagi. Inference Under Information Constraints I: Lower Bounds From Chi-Square Contraction
7856 -- 7877Jayadev Acharya, Clément L. Canonne, Himanshu Tyagi. Inference Under Information Constraints II: Communication Constraints and Shared Randomness
7878 -- 7886Or Ordentlich, Yury Polyanskiy, Ofer Shayevitz. A Note on the Probability of Rectangles for Correlated Binary Strings
7887 -- 7910Lan V. Truong, Jonathan Scarlett. Support Recovery in the Phase Retrieval Model: Information-Theoretic Fundamental Limit
7911 -- 7928Amin Coja-Oghlan, Oliver Gebhard, Max Hahn-Klimroth, Philipp Loick. Information-Theoretic and Algorithmic Thresholds for Group Testing
7929 -- 7938Cheuk Ting Li, Xiugang Wu, Ayfer Özgür, Abbas El Gamal. Minimax Learning for Distributed Inference
7939 -- 7966Hussein Saad, Aria Nosratinia. Recovering a Single Community With Side Information
7967 -- 7977Meng Huang, Zhiqiang Xu. The Estimation Performance of Nonlinear Least Squares for Phase Retrieval
7978 -- 8001Milad Bakhshizadeh, Arian Maleki, Shirin Jalali. Using Black-Box Compression Algorithms for Phase Retrieval
8002 -- 8045Rishabh Dudeja, Junjie Ma 0001, Arian Maleki. Information Theoretic Limits for Phase Retrieval With Subsampled Haar Sensing Matrices
8046 -- 8055Sourav Chatterjee. A Deterministic Theory of Low Rank Matrix Completion
8056 -- 0Haoyuan Wei, Xishuo Liu, Stark C. Draper. Corrections to "The ADMM Penalized Decoder for LDPC Codes"
8057 -- 0Zachary Chance, David J. Love. Corrections to "Concatenated Coding for the AWGN Channel With Noisy Feedback"

Volume 66, Issue 11

6607 -- 6616Amos Lapidoth, Gian Marti. Encoder-Assisted Communications Over Additive Noise Channels
6617 -- 6634Mohamed Adel Attia, Deepak Kumar, Ravi Tandon. The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases
6635 -- 6659Ran Tamir, Neri Merhav, Nir Weinberger, Albert Guillén i Fàbregas. Large Deviations Behavior of the Logarithmic Error Probability of Random Codes
6660 -- 6681Aaron B. Wagner, Nirmal V. Shende, Yücel Altug. A New Method for Employing Feedback to Improve Coding Performance
6682 -- 6687Amir Tasbihi, Frank R. Kschischang. On the Capacity of Waveform Channels Under Square-Law Detection of Time-Limited Signals
6688 -- 6722Shuqing Chen, Michelle Effros, Victoria Kostina. Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios
6723 -- 6748Anuran Makur. Coding Theorems for Noisy Permutation Channels
6749 -- 6761Venkatesan Guruswami, Satyanarayana V. Lokam, Sai Vikneshwar Mani Jayaraman. ϵ-MSR Codes: Contacting Fewer Code Blocks for Exact Repair
6762 -- 6773Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee. Infinite Families of Optimal Linear Codes Constructed From Simplicial Complexes
6774 -- 6785Zongrun Du, Chengju Li, Sihem Mesnager. Constructions of Self-Orthogonal Codes From Hulls of BCH Codes and Their Parameters
6786 -- 6798Han Cai, Johan Chrisnata, Tuvi Etzion, Moshe Schwartz 0001, Antonia Wachter-Zeh. Network-Coding Solutions for Minimal Combination Networks and Their Sub-Networks
6799 -- 6808Daniele Bartoli, Maria Montanucci, Luciane Quoos. Locally Recoverable Codes From Automorphism Group of Function Fields of Genus g ≥ 1
6809 -- 6822Hoang Dau, Wentu Song, Alex Sprintson, Chau Yuen. Secure Erasure Codes With Partial Reconstructibility
6823 -- 6834Luciano Panek, Jerry Anderson Pinheiro. General Approach to Poset and Additive Metrics
6835 -- 6854Tsung-Ching Lin, Chong-Dao Lee, Trieu-Kien Truong, Yaotsu Chang, Yan-Haw Chen. On Decoding Algebraic Codes Using Radical Locators
6855 -- 6862Minjia Shi, Alessandro Neri 0002, Patrick Solé. How Many Weights Can a Quasi-Cyclic Code Have?
6863 -- 6871Sara D. Cardell, Marcelo Firer, Diego Napp. Generalized Column Distances
6872 -- 6883Ziling Heng, Qiuyan Wang, Cunsheng Ding. Two Families of Optimal Linear Codes and Their Subfield Codes
6884 -- 6897Shuangqing Liu, Yanxun Chang, Tao Feng 0002. Parallel Multilevel Constructions for Constant Dimension Codes
6898 -- 6907Peter J. Dukes, Ferdinand Ihringer, Nathan Lindzey. On the Algebraic Combinatorics of Injections and its Applications to Injection Codes
6908 -- 6919Yuanyuan Tang, Yonatan Yehezkeally, Moshe Schwartz 0001, Farzad Farnoud. Single-Error Detection and Correction for Duplication and Substitution Channels
6920 -- 6938Hessam Mahdavifar. Polar Coding for Non-Stationary Channels
6939 -- 6961Hamdi Joudeh, Xinping Yi, Bruno Clerckx, Giuseppe Caire. On the Optimality of Treating Inter-Cell Interference as Noise: Downlink Cellular Networks and Uplink-Downlink Duality
6962 -- 6976Payam Delgosha, Venkat Anantharam. Universal Lossless Compression of Graphical Data
6977 -- 6998Yonatan Gutman, Adam Spiewak. Metric Mean Dimension and Analog Compression
6999 -- 7021Junge Wang, Bofeng Yuan, Lexiang Huang, Syed Ali Jafar. Sum-GDoF of 2-User Interference Channel With Limited Cooperation Under Finite Precision CSIT
7022 -- 7032Yajing Zhou, Yang Yang 0005, Zhengchun Zhou, Kushal Anand, Su Hu, Yong Liang Guan 0001. New Complementary Sets With Low PAPR Property Under Spectral Null Constraints
7033 -- 7055Tao Guo, Chao Tian 0002, Tie Liu 0002, Raymond W. Yeung. Weakly Secure Symmetric Multilevel Diversity Coding
7056 -- 7066Paul de Kerret, David Gesbert, Jingjing Zhang 0002, Petros Elia. Optimal DoF of the K-User Broadcast Channel With Delayed and Imperfect Current CSIT
7067 -- 7080Rashad Eletreby, Osman Yagan. Connectivity of Inhomogeneous Random K-Out Graphs
7081 -- 7087Lilya Budaghyan, Tor Helleseth, Nikolay S. Kaleyski. A New Family of APN Quadrinomials
7088 -- 7100Oriol Farràs, Tarik Kaced, Sebastià Martín Molleví, Carles Padró. Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
7101 -- 7112Shuxing Li, Wilfried Meidl, Alexandr Polujan, Alexander Pott, Constanza Riera, Pantelimon Stanica. Vanishing Flats: A Combinatorial Viewpoint on the Planarity of Functions and Their Application
7113 -- 7131Mehrdad Tahmasbi, Matthieu R. Bloch. Covert and Secret Key Expansion Over Quantum Channels Under Collective Attacks
7132 -- 7154Yuwen Gu, Hui Zou. Sparse Composite Quantile Regression in Ultrahigh Dimensions With Tuning Parameter Calibration
7155 -- 7179Banghua Zhu, Jiantao Jiao, David Tse. Deconstructing Generative Adversarial Networks
7180 -- 7195Rasika Rajapakshage, Marianna Pensky. Is Clustering Advantageous in Statistical Ill-Posed Linear Inverse Problems?
7196 -- 7221Nir Weinberger, Meir Feder. k-Vectors: An Alternating Minimization Algorithm for Learning Regression Functions
7222 -- 7230Yonglong Li, Vincent Y. F. Tan. Second-Order Asymptotics of Sequential Hypothesis Testing
7231 -- 7236Vasileios Nakos. Nearly Optimal Sparse Polynomial Multiplication
7237 -- 7252Maxime Ferreira Da Costa, Yuejie Chi. On the Stable Resolution Limit of Total Variation Regularization for Spike Deconvolution
7253 -- 7273Amirafshar Moshtaghpour, José M. Bioucas-Dias, Laurent Jacques. Close Encounters of the Binary Kind: Signal Reconstruction Guarantees for Compressive Hadamard Sampling With Haar Wavelet Basis
7274 -- 7301Lijun Ding, Yudong Chen 0001. Leave-One-Out Approach for Matrix Completion: Primal and Dual Analysis
7302 -- 7310Yi Li 0002, Vasileios Nakos. Sublinear-Time Algorithms for Compressive Phase Retrieval

Volume 66, Issue 10

5965 -- 5994Xuan Guang, Raymond W. Yeung, Fang-Wei Fu. Local-Encoding-Preserving Secure Network Coding
5995 -- 6000Yunde Duan, Yong Li 0023. An Improved Decoding Algorithm to Decode Quadratic Residue Codes Based on the Difference of Syndromes
6001 -- 6023Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R. Bloch. Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels
6024 -- 6036Ali Dehghan 0001, Amir H. Banihashemi. On Finding Bipartite Graphs With a Small Number of Short Cycles and Large Girth
6037 -- 6047Ali Dehghan 0001, Amir H. Banihashemi. On Computing the Number of Short Cycles in Bipartite Graphs Using the Spectrum of the Directed Edge Matrix
6048 -- 6065Wentu Song, Kui Cai, Kees A. Schouhamer Immink. Sequence-Subset Distance and Coding for Error Control in DNA-Based Data Storage
6066 -- 6083Sivakanth Gopi, Venkatesan Guruswami, Sergey Yekhanin. Maximally Recoverable LRCs: A Field Size Lower Bound and Constructions for Few Heavy Parities
6084 -- 6103Mahdi Cheraghchi, Ryan Gabrys, Olgica Milenkovic, João L. Ribeiro 0001. Coded Trace Reconstruction
6104 -- 6120Trung Can, Narayanan Rengaswamy, A. Robert Calderbank, Henry D. Pfister. Kerdock Codes Determine Unitary 2-Designs
6121 -- 6132Gabriella Akemi Miyamoto, Marcelo Firer. Obtaining Binary Perfect Codes Out of Tilings
6133 -- 6143Venkatesan Guruswami, Lingfei Jin, Chaoping Xing. Constructions of Maximally Recoverable Local Reconstruction Codes via Function Fields
6144 -- 6149Ishay Haviv. Task-Based Solutions to Embedded Index Coding
6150 -- 6168Giel J. Op 't Veld, Michael Gastpar. Caching (Bivariate) Gaussians
6169 -- 6183Shun Watanabe. A Classification of Functions in Multiterminal Distributed Computing
6184 -- 6199Holger Boche, Rafael F. Schaefer, H. Vincent Poor. Identification Capacity of Channels With Feedback: Discontinuity Behavior, Super-Activation, and Turing Computability
6200 -- 6221Pinar Sen, Sung-Hoon Lim, Young-Han Kim 0001. On the Optimal Achievable Rates for Linear Computation With Random Homologous Codes
6222 -- 6241Naveen Goela, Maxim Raginsky. Channel Polarization Through the Lens of Blackwell Measures
6242 -- 6255Sung-Hoon Lim, Chen Feng 0001, Adriano Pastore, Bobak Nazer, Michael Gastpar. Compute-Forward for DMCs: Simultaneous Decoding of Multiple Combinations
6256 -- 6279Arash Gholami Davoodi, Syed Ali Jafar. Degrees of Freedom Region of the (M, N₁, N₂) MIMO Broadcast Channel With Partial CSIT: An Application of Sum-Set Inequalities Based on Aligned Image Sets
6280 -- 6296Zhuqing Jia, Syed Ali Jafar. On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage
6297 -- 6302Rohit Agrawal 0002. Finite-Sample Concentration of the Multinomial in Relative Entropy
6303 -- 6323Amin Gohari, Onur Günlü, Gerhard Kramer. Coding for Positive Rate in the Source Model Key Agreement Problem
6324 -- 6339Claude Carlet. Handling Vectorial Functions by Means of Their Graph Indicators
6340 -- 6353Gabriele Spini, Gilles Zémor. Efficient Protocols for Perfectly Secure Message Transmission With Applications to Secure Network Coding
6354 -- 6368Evgeniy O. Kiktenko, Aleksei O. Malyshev, Maxim A. Gavreev, Anton A. Bozhedarov, Nikolay O. Pozhar, Maxim N. Anufriev, Aleksey K. Fedorov. Lightweight Authentication for Quantum Key Distribution
6369 -- 6377Nengkun Yu. Multipartite Entanglement Certification, With or Without Tomography
6378 -- 6388Amir Aboubacar, Mohamed El Machkouri. Recursive Kernel Density Estimation for Time Series
6389 -- 6402Konstantinos Fokianos, Anne Leucht, Michael H. Neumann. 1 Convergence Rate of an Isotonic Regression Estimator for Multivariate Observations
6403 -- 6412Andressa Cerqueira, Florencia G. Leonardi. Estimation of the Number of Communities in the Stochastic Block Model
6413 -- 6433Lahiru D. Chamain, Prathapasinghe Dharmawansa, Saman Atapattu, Chintha Tellambura. Eigenvalue-Based Detection of a Signal in Colored Noise: Finite and Asymptotic Analyses
6434 -- 6448Miroslaw Pawlak, Ulrich Stadtmüller. Nonparametric Specification Testing for Signal Models
6449 -- 6457Tom Northardt. A Cramér-Rao Lower Bound Derivation for Passive Sonar Track-Before-Detect Algorithms
6458 -- 6487Arash Gholami Davoodi, Syed Ali Jafar. Sum-Set Inequalities From Aligned Image Sets: Instruments for Robust GDoF Bounds
6488 -- 6508Morteza Varasteh, Borzoo Rassouli, Bruno Clerckx. On Capacity-Achieving Distributions for Complex AWGN Channels Under Nonlinear Power Constraints and Their Applications to SWIPT
6509 -- 6533Vamsi K. Amalladinne, Jean-François Chamberland, Krishna R. Narayanan. A Coded Compressed Sensing Scheme for Unsourced Multiple Access
6534 -- 6554Saurav Prakash, Amirhossein Reisizadeh, Ramtin Pedarsani, Amir Salman Avestimehr. Coded Computing for Distributed Graph Analytics
6555 -- 6565UyHour Tan, Fabien Arlery, Olivier Rabaste, Frederic Lehmann, Jean Philippe Ovarlez. A New Lower Bound on the Maximum Correlation of a Set With Mismatched Filters
6566 -- 6579Hua Sun 0001, Syed Ali Jafar. On the Capacity of Locally Decodable Codes
6580 -- 6596Yong Fang 0001, Vladimir Stankovic 0001. Codebook Cardinality Spectrum of Distributed Arithmetic Coding for Independent and Identically-Distributed Binary Sources
6597 -- 6604Jirong Yi, Weiyu Xu. Necessary and Sufficient Null Space Condition for Nuclear Norm Minimization in Low-Rank Matrix Recovery
6605 -- 0Hamdi Joudeh, Bruno Clerckx. Corrections to "On the Separability of Parallel MISO Broadcast Channels Under Partial CSIT: A Degrees of Freedom Region Perspective"

Volume 66, Issue 1

5 -- 37Madhu Sudan, Himanshu Tyagi, Shun Watanabe. Communication for Generating Correlation: A Unifying Survey
38 -- 64Meryem Benammar, Pablo Piantanida, Shlomo Shamai. On the Compound Broadcast Channel: Multiple Description Coding and Interference Decoding
65 -- 81Mohamed Salman, Mahesh K. Varanasi. Capacity Results for Classes of Partially Ordered K-User Broadcast Channels With Two Nested Multicast Messages
82 -- 113Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund. Hierarchical Identification With Pre-Processing
114 -- 129Neri Merhav, Asaf Cohen 0001. Universal Randomized Guessing With Application to Asynchronous Decentralized Brute-Force Attacks
130 -- 146Joschka Roffe, Stefan Zohren, Dominic Horsman, Nicholas Chancellor. Quantum Codes From Classical Graphical Models
147 -- 154Mizanur Rahaman. A New Bound on Quantum Wielandt Inequality
155 -- 166Asger Kjærulff Jensen, Péter Vrana. The Asymptotic Spectrum of LOCC Transformations
167 -- 175Giacomo Micheli. Constructions of Locally Recoverable Codes Which are Optimal
176 -- 201Fangwei Ye, Shiqiu Liu, Kenneth W. Shum, Raymond W. Yeung. On Secure Exact-Repair Regenerating Codes With a Single Pareto Optimal Point
202 -- 209Lingfei Jin, Haibin Kan, Yu Zhang 0072. Constructions of Locally Repairable Codes With Multiple Recovering Sets via Rational Function Fields
210 -- 221Lingfei Jin, Liming Ma, Chaoping Xing. Construction of Optimal Locally Repairable Codes via Automorphism Groups of Rational Function Fields
222 -- 232Ehsan Yavari, Morteza Esmaeili. Locally Repairable Codes: Joint Sequential-Parallel Repair for Multiple Node Failures
233 -- 239Jianfa Qian, Lina Zhang. New Optimal Cyclic Locally Recoverable Codes of Length n=2(q+1)
240 -- 262Hai Q. Dinh, Bac Trong Nguyen, Songsak Sriboonchitta. m
263 -- 272Ronald Cramer, Chaoping Xing, Chen Yuan. Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
273 -- 277Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco. Additive Quaternary Codes Related to Exceptional Linear Quaternary Codes
278 -- 301Sanghamitra Dutta, Mohammad Fahim, Farzin Haddadpour, Haewon Jeong, Viveck R. Cadambe, Pulkit Grover. On the Optimal Recovery Threshold of Coded Matrix Multiplication
302 -- 323Daniel Russo 0001, James Zou. How Much Does Your Data Exploration Overfit? Controlling Bias via Information Usage
324 -- 338Liangjun Su, Wuyi Wang, Yichong Zhang. Strong Consistency of Spectral Clustering for Stochastic Block Models
339 -- 349Aditya Kela, Kai Von Prillwitz, Johan Åberg, Rafael Chaves, David Gross 0003. Semidefinite Tests for Latent Causal Structures
350 -- 367Shang Li 0002, Xiaodong Wang 0001. Distributed Sequential Hypothesis Testing With Quantized Message-Exchange
368 -- 386Keigo Takeuchi. Rigorous Dynamics of Expectation-Propagation-Based Signal Recovery from Unitarily Invariant Measurements
387 -- 400Shirin Jalali. Toward Theoretically Founded Learning-Based Compressed Sensing
401 -- 418Paul Hand, Vladislav Voroninski. Global Guarantees for Enforcing Deep Generative Priors by Empirical Risk
419 -- 452Yuqian Zhang, Han-Wen Kuo, John Wright 0001. Structured Local Optima in Sparse Blind Deconvolution
453 -- 477Martin Genzel, Peter Jung 0001. Recovering Structured Data From Superimposed Non-Linear Measurements
478 -- 495Mansoor I. Yousefi, Xianhe Yangzhang. Linear and Nonlinear Frequency-Division Multiplexing
496 -- 519Alejandro Lancho, Tobias Koch, Giuseppe Durisi. On Single-Antenna Rayleigh Block-Fading Channels at Finite Blocklength
520 -- 533Xinping Yi, Hua Sun. Opportunistic Treating Interference as Noise
534 -- 556Ahmed Arafa, Jing Yang 0002, Sennur Ulukus, H. Vincent Poor. Age-Minimal Transmission for Energy Harvesting Sensors With Finite Batteries: Online Policies
557 -- 571Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson. PIR Schemes With Small Download Complexity and Low Storage Requirements
572 -- 586Rémi A. Chou, Aylin Yener. Strongly Secure Multiuser Communication and Authentication With Anonymity Constraints
587 -- 613Augusto Santos, Vincenzo Matta, Ali H. Sayed. Local Tomography of Large Networks Under the Low-Observability Regime
614 -- 632Omer Bilgen, Aaron B. Wagner. A New Stable Peer-to-Peer Protocol With Non-Persistent Peers: The Group Suppression Protocol
633 -- 648Seyed Ali Saberali, Lutz Lampe, Ian F. Blake. Full Characterization of Optimal Uncoded Placement for the Structured Clique Cover Delivery of Nonuniform Demands
649 -- 668Jorge F. Silva, Pablo Piantanida. Universal Weak Variable-Length Source Coding on Countably Infinite Alphabets
669 -- 678Avik Ranjan Adhikary, Sudhan Majhi, Zi Long Liu 0001, Yong Liang Guan. New Sets of Optimal Odd-Length Binary Z-Complementary Pairs
679 -- 687Daniel Gabric, Joe Sawada, Aaron Williams, Dennis Wong. A Successor Rule Framework for Constructing k-Ary de Bruijn Sequences and Universal Cycles