Abstract is missing.
- Graph-Based Ascent Algorithms for Function MaximizationMuni Sreenivas Pydi, Varun Jog, Po-Ling Loh. 1-8 [doi]
- Rearrangements and information theoretic inequalitiesJames Melbourne. 9-15 [doi]
- A Geometric Characterization of Fisher Information from Quantized Samples with Applications to Distributed Statistical EstimationLeighton Pate Barnes, Yanjun Han, Ayfer Özgür. 16-23 [doi]
- Information Bottleneck Methods for Distributed LearningParinaz Farajiparvar, Ahmad Beirami, Matthew S. Nokleby. 24-31 [doi]
- Unique Informations and DeficienciesPradeep Kr. Banerjee, Eckehard Olbrich, Jürgen Jost, Johannes Rauh. 32-38 [doi]
- Uplink-Downlink Duality For Integer-Forcing in Cloud Radio Access NetworksIslam El Bakoury, Bobak Nazer. 39-47 [doi]
- Dynamic Economic Dispatch and Price Evolution under Ramping Constraints and Uncertain DemandAbhishek Gupta, Balsam Dakhil, Rahul Jain 0002. 48-55 [doi]
- †Shuvomoy Das Gupta. 56-63 [doi]
- A Proximal Zeroth-Order Algorithm for Nonconvex Nonsmooth ProblemsEhsan Kazemi 0003, Liqiang Wang. 64-71 [doi]
- On the Resilience of Bipartite NetworksShelby Heinecke, Will Perkins, Lev Reyzin. 72-77 [doi]
- Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic FrameworkAhmed H. Anwar, George K. Atia, Mina Guirguis. 78-83 [doi]
- Derandomized Distributed Multi-resource Allocation with Little Communication OverheadSyed Eqbal Alam, Robert Shorten, Fabian Wirth, Jia Yuan Yu. 84-91 [doi]
- On the Stability of Optimal Bayesian Persuasion Strategy under a Mistrust Dynamics in Routing GamesYixian Zhu, Ketan Savla. 92-99 [doi]
- Statistical Planning: Building Models of Entropy of Centralized Planning for Multi-Agent SystemsEric Jacopin. 100-109 [doi]
- Stability of Non-Linear Filters, Observability and Relative EntropyCurtis McDonald, Serdar Yüksel. 110-114 [doi]
- Verification of Uncertain POMDPs Using Barrier CertificatesMohamadreza Ahmadi, Murat Cubuktepe, Nils Jansen 0001, Ufuk Topcu. 115-122 [doi]
- On Model-free Reinforcement Learning for Switched Linear Systems: A Subspace Clustering ApproachHao Li, Hua Chen, Wei Zhang. 123-130 [doi]
- Distributed Stopping Criterion for Ratio ConsensusMangal Prakash, Saurav Talukdar, Sandeep Attree, Sourav Patel, Murti V. Salapaka. 131-135 [doi]
- Stability of Dynamic Feedback optimization with Applications to Power SystemsSandeep Menta, Adrian Hauswirth, Saverio Bolognani, Gabriela Hug, Florian Dörfler. 136-143 [doi]
- SOAP Bubbles: Robust Scheduling Under Adversarial NoiseZiv Scully, Mor Harchol-Balter. 144-154 [doi]
- Generic Asymptotically Optimal Algorithms for Multi-Armed BanditsRichard Combes, Stefan Magureanu, Alexandre Proutière. 152 [doi]
- On Learning the cμ Rule in Single and Parallel Server NetworksSubhashini Krishnasamy, Ari Arapostathis, Ramesh Johari, Sanjay Shakkottai. 153-154 [doi]
- Fast and convergent iterative image recovery using trained convolutional neural networksIl Yong Chun, Hongki Lim, Zhengyu Huang, Jeffrey A. Fessler. 155-159 [doi]
- Learning Multi-Layer Transform ModelsSaiprasad Ravishankar, Brendt Wohlberg. 160-165 [doi]
- Algorithmic Aspects of Inverse Problems Using Generative ModelsChinmay Hegde. 166-172 [doi]
- Single-server Multi-message Private Information Retrieval with Side InformationSu Li, Michael Gastpar. 173-179 [doi]
- On the Capacity of Single-Server Multi-Message Private Information Retrieval with Side InformationAnoosheh Heidarzadeh, Brenden Garcia, Swanand Kadhe, Salim Y. El Rouayheb, Alex Sprintson. 180-187 [doi]
- On the Optimality of the Kautz-Singleton Construction in Probabilistic Group TestingHuseyin A. Inan, Peter Kairouz, Mary Wootters, Ayfer Özgür. 188-195 [doi]
- Cross-Iteration Coded ComputingFarzin Haddadpour, Yaoqing Yang, Viveck R. Cadambe, Pulkit Grover. 196-203 [doi]
- Monte Carlo Methods for Randomized Likelihood DecodingAlankrita Bhatt, Jiun-Ting Huang, Young-Han Kim 0001, J. Jon Ryu, Pinar Sen. 204-211 [doi]
- Latency and Alphabet Size in the Context of Multicast Network CodingMira Gonen, Michael Langberg, Alex Sprintson. 212-218 [doi]
- Optimal Multi-Source Inference Privacy - A Generalized Lloyd-Max AlgorithmRuochi Zhang, Parv Venkitasubramaniam. 219-226 [doi]
- Detectability of Cooperative Zero-Dynamics AttackYanbing Mao, Emrah Akyol. 227-234 [doi]
- A Security Index for Actuators Based on Perfect Undetectability: Properties and ApproximationJezdimir Milosevic, Henrik Sandberg, Karl Henrik Johansson. 235-241 [doi]
- Model-Based Encryption: Privacy of States in Networked Control SystemsNirupam Gupta, Nikhil Chopra. 242-248 [doi]
- Property Testing For Differential PrivacyAnna C. Gilbert, Audra McMillan. 249-258 [doi]
- One-Shot Variable-Length Secret Key Agreement Approaching Mutual InformationCheuk Ting Li, Venkat Anantharam. 259-266 [doi]
- Coupon Targeting Competition in Privacy Sensitive MarketOmid Javidbakht, Parv Venkitasubramaniam, Alberto J. Lamadrid. 267-274 [doi]
- Stochastic Games with Sensing CostsMohamadreza Ahmadi, Suda Bharadwaj, Takashi Tanaka, Ufuk Topcu. 275-282 [doi]
- Linearly Solvable Mean-Field Road Traffic GamesTakashi Tanaka, Ehsan Nekouei, Karl Henrik Johansson. 283-289 [doi]
- Communication Link Elimination in Static LQG TeamsJiacheng Tang, Abhishek Gupta. 290-296 [doi]
- Graph-Based Controller Synthesis for Safety-Constrained, Resilient SystemsMatija Bucic, Melkior Ornik, Ufuk Topcu. 297-304 [doi]
- Scalable Sparse Subspace Clustering via Ordered Weighted l1 RegressionUrvashi Oswal, Robert D. Nowak. 305-312 [doi]
- Unsupervised Metric Learning in Presence of Missing DataAnna C. Gilbert, Rishi Sonthalia. 313-321 [doi]
- Analysis of KNN Information Estimators for Smooth DistributionsPuning Zhao, Lifeng Lai. 322-327 [doi]
- *Prashant Khanduri, Dominique Pastor, Vinod Sharma, Pramod K. Varshney. 328-334 [doi]
- Stabilizing Phase-balanced or Phase-synchronized Trajectories of Van der Pol Oscillators in Uniform Electrical NetworksMohit Sinha, Florian Dörfler, Brian B. Johnson, Sairaj V. Dhople. 335-340 [doi]
- Pricing Multi-period Dispatch Under UncertaintyYe Guo, Lang Tong. 341-345 [doi]
- Safely landing water networks during power outages with energy storageJosh A. Taylor, Richard Perryman, Aimy Bazylak, Bryan Karney. 346-350 [doi]
- Online Pricing Mechanisms for Electric Vehicle Management at Workplace Charging FacilitiesNathaniel Tucker, Mahnoosh Alizadeh. 351-358 [doi]
- Second-order Guarantees of Gradient Algorithms over NetworksAmir Daneshmand, Gesualdo Scutari, Vyacheslav Kungurtsev. 359-365 [doi]
- On Dual Relationships of Secrecy CodesWillie K. Harrison, Matthieu R. Bloch. 366-372 [doi]
- Information-Theoretic Optimization of Full-Duplex Communication between Digital Phased ArraysIan T. Cummings, Timothy J. Schulz, Jonathan P. Doane, Seyed A. Reza Zekavat, Timothy C. Havens. 373-377 [doi]
- Age of Information with Soft UpdatesMelih Bastopcu, Sennur Ulukus. 378-385 [doi]
- Location-Aware Coordinated Beam Alignment in mmWave CommunicationIgbafe Orikumhi, Jeongwan Kang, Chansik Park, Jinmo Yang, Sunwoo Kim. 386-390 [doi]
- Opportunistic Temporal Fair Scheduling for Non-Orthogonal Multiple AccessShahram Shahsavari, Farhad Shirani, Elza Erkip. 391-398 [doi]
- Structure of Utility Optimization in Regular and Irregular Wireless ScenariosMatthew Andrews, Lisa Zhang. 399-406 [doi]
- Coded Energy-Efficient Beam-Alignment for Millimeter-Wave NetworksMuddassar Hussain, Nicolò Michelusi. 407-412 [doi]
- Some new numeric results concerning the Witsenhausen CounterexampleVignesh Subramanian, Laura Brink, Nikunj Jain, Kailas Vodrahalli, Akhil Jalan, Nikhil Shinde, Anant Sahai. 413-420 [doi]
- Rate-cost tradeoffs in scalar LQG control and tracking with side informationVictoria Kostina, Babak Hassibi. 421-428 [doi]
- On topological entropy of switched linear systems with pairwise commuting matricesGuosong Yang, João Pedro Hespanha. 429-436 [doi]
- Embedding for Informative Missingness: Deep Learning With Incomplete DataAmirata Ghorbani, James Y. Zou. 437-445 [doi]
- Parameter Estimation in Gaussian Mixture Models with Malicious Noise, without Balanced Mixing CoefficientsJing Xu, Jakub Marecek. 446-453 [doi]
- Online Scoring with Delayed Information: A Convex Optimization ViewpointAvishek Ghosh, Kannan Ramchandran. 454-461 [doi]
- Data-Driven Sparse System IdentificationSalar Fattahi, Somayeh Sojoudi. 462-469 [doi]
- A Stochastic Expectation-Maximization Approach to Shuffled Linear RegressionAbubakar Abid, James Y. Zou. 470-477 [doi]
- The Effects of Memory Replay in Reinforcement LearningRuiShan Liu, James Zou. 478-485 [doi]
- Trajectory Modeling and Prediction with Waypoint Information Using a Conditionally Markov SequenceReza Rezaie, X. Rong Li. 486-493 [doi]
- Weighted Spectral Embedding of GraphsThomas Bonald, Alexandre Hollocou, Marc Lelarge. 494-501 [doi]
- Local Weak Convergence Based Analysis of a New Graph ModelM. Moharrami, V. Subramanian, M. Liu, R. Sundaresan. 502-503 [doi]
- Concentration bounds for two time scale stochastic approximationVivek S. Borkar, Sarath Pattathil. 504-511 [doi]
- Distributed Hypothesis Testing with Collaborative DetectionPierre Escamilla, Abdellatif Zaidi, Michele A. Wigger. 512-518 [doi]
- Strong Coordination over Noisy Channels with Strictly Causal EncodingGiulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch. 519-526 [doi]
- An Achievable Rate Region for the Two-Way Channel with Common OutputOron Sabag, Haim H. Permuter. 527-531 [doi]
- Optimal Control Designs for Vector-valued Witsenhausen Counterexample SetupsMaël Le Treust, Tobias J. Oechtering. 532-537 [doi]
- On The Binary Lossless Many-Help-One Problem with Independently Degraded HelpersAlbrecht Wolf, Diana Cristina González, Meik Dorpinghaus, José Cândido Silveira Santos Filho, Gerhard P. Fettweis. 538-542 [doi]
- ASY-SONATA: Achieving Linear Convergence in Distributed Asynchronous Multiagent OptimizationYe Tian, Ying Sun 0003, Gesualdo Scutari. 543-551 [doi]
- Anytime Stochastic Gradient Descent: A Time to Hear from all the WorkersNuwan S. Ferdinand, Stark C. Draper. 552-559 [doi]
- On the Effect of Task-to-Worker Assignment in Distributed Computing Systems with StragglersAmir Behrouzi-Far, Emina Soljanin. 560-566 [doi]
- On the Convergence of Distributed Subgradient Methods under QuantizationThinh T. Doan, Siva Theja Maguluri, Justin Romberg. 567-574 [doi]
- A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric InformationJuntao Chen, Quanyan Zhu. 575-582 [doi]
- Price and Capacity Competition for EV parking with Government MandatesBrendan Badia, Randall Berry, Ermin Wei. 583-589 [doi]
- Quantized Dominant Strategy Mechanisms with Constrained Marginal ValuationsHao Ge, Randall A. Berry. 590-595 [doi]
- The Geometry of Real Solutions to the Power Flow EquationsJulia Lindberg, Alisha Zachariah, Nigel Boston, Bernard C. Lesieutre. 596-603 [doi]
- The price of choice: models, paradoxes, and inference for 'mobility as a service'Damon Wischik. 604-610 [doi]
- Prediction Query LanguageDevavrat Shah, Sai Burle, Vishal Doshi, Ying-zong Huang, Balaji Rengarajan. 611-616 [doi]
- Localized random projections with applications to coherent array imagingRakshith Sharma Srinivasa, Mark A. Davenport, Justin Romberg. 617-623 [doi]
- The Generalized Lasso for Sub-gaussian Observations with Dithered QuantizationChristos Thrampoulidis, Ankit Singh Rawat. 624-631 [doi]
- Hierarchical restricted isometry property for Kronecker product measurementsIngo Roth, Axel Flinth, Richard Kueng, Jens Eisert, Gerhard Wunder. 632-638 [doi]
- Trade-offs Between Query Difficulty and Sample Complexity in Crowdsourced Data AcquisitionHye Won Chung, Ji Oon Lee, Doyeon Kim, Alfred O. Hero III. 639-646 [doi]
- A Novel Decision Fusion Scheme with Feedback in Neyman-Pearson Detection SystemsGuangyang Zeng, Junfeng Wu, Xiufang Shi, Zhiguo Shi. 647-653 [doi]
- Breaking the Limits of Subspace InferenceClaudia R. Solís-Lemus, Daniel L. Pimentel-Alarcón. 654-661 [doi]
- Fundamental Limits of Distributed Data ShufflingKai Wan, Daniela Tuninetti, Mingyue Ji, Pablo Piantanida. 662-669 [doi]
- Topological and Algebraic Properties of Chernoff Information between Gaussian GraphsBinglin Li, Shuangqing Wei, Yue Wang 0007, Jian Yuan. 670-675 [doi]
- Multi-class Bayes error estimation with a global minimal spanning treeSalimeh Yasaei Sekeh, Brandon Oselio, Alfred O. Hero III. 676-681 [doi]
- Array LDPC Code-based Compressive SensingMahsa Lotfi, Mathukumalli Vidyasagar. 682-685 [doi]
- On the Joint Recovery of Community Structure and Community FeaturesJisang Yoon, Kangwook Lee, Changho Suh. 686-694 [doi]
- Multi-Dimensional Spatially-Coupled Code Design Through Informed Relocation of CirculantsHoma Esfahanizadeh, Ahmed Hareedy, Lara Dolecek. 695-701 [doi]
- Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon CodesUmberto Martínez-Peñas, Frank R. Kschischang. 702-709 [doi]
- The repair problem under connectivity constraints: Explicit MSR codes for the rack-aware model of distributed storageZitan Chen, Alexander Barg. 710-714 [doi]
- Locally Recoverable Coded Matrix MultiplicationHaewon Jeong, Fangwei Ye, Pulkit Grover. 715-722 [doi]
- Coded Caching with Low Per-Request ComplexityBarak Farbman, Yuval Cassut, Alex Sprintson. 723-732 [doi]
- Streaming Codes For Variable-Size ArrivalsMichael Rudow, K. V. Rashmi. 733-740 [doi]
- Policy Design for Active Sequential Hypothesis Testing using Deep LearningDhruva Kartik, Ekraam Sabir, Urbashi Mitra, Prem Natarajan. 741-748 [doi]
- Feedback control of server instances for right sizing in the cloudDiego Goldsztajn, Andrés Ferragut, Fernando Paganini. 749-756 [doi]
- Faster Data-access in Large-scale Systems: Network-scale Latency Analysis under General Service-time DistributionsAvishek Ghosh, Kannan Ramchandran. 757-764 [doi]
- Balanced Allocation on Graphs with Random Walk Based SamplingDengwang Tang, Vijay G. Subramanian. 765-766 [doi]
- Resource Allocation under Sequential Resource Access: Theory and ApplicationAli Tajer, Maha Zohdy. 767-773 [doi]
- Accurate Rate-Aware Flow-level Traffic SplittingNing Wu, Shih-Hao Tseng, Ao Tang. 774-783 [doi]
- On Distributed Storage Allocations of Large Files for Maximum Service RatePei Peng, Emina Soljanin. 784-791 [doi]
- Universal and Dynamic Locally Repairable Codes with Maximal Recoverability via Sum-Rank CodesUmberto Martínez-Peñas, Frank R. Kschischang. 792-799 [doi]
- Explicit optimal-length locally repairable codes of distance 5Allison Beemer, Ryan Coatney, Venkatesan Guruswami, Hiram H. Lopez, Fernando Piñero. 800-804 [doi]
- Flexible Fractional Repetition Codes for Distributed Storage NetworksImad Ahmad, Chih-Chun Wang. 805-812 [doi]
- Capacity of Private Linear Computation for Coded DatabasesSarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer. 813-820 [doi]
- Deception in Optimal ControlMelkior Ornik, Ufuk Topcu. 821-828 [doi]
- Coflow Deadline Scheduling via Network-Aware OptimizationShih-Hao Tseng, Ao Tang. 829-833 [doi]
- Safe Intersection Management for Mixed Transportation Systems with Human-Driven and Autonomous VehiclesXi Liu, Ping-Chun Hsieh, P. R. Kumar. 834-841 [doi]
- On Differentially Private Gaussian Hypothesis TestingKwassi H. Degue, Jerome Le Ny. 842-847 [doi]
- Hierarchical Abstractions for Reachability Analysis of Probabilistic Hybrid SystemsRatan Lal, Pavithra Prabhakar. 848-855 [doi]
- Data Efficient Learning of Robust Control PoliciesSusmit Jha, Patrick Lincoln. 856-861 [doi]
- Game theoretic modeling of cyber deception in the Internet of Battlefield ThingsCharles A. Kamhoua. 862 [doi]
- Data Encoding for Byzantine-Resilient Distributed Gradient DescentDeepesh Data, Linqi Song, Suhas N. Diggavi. 863-870 [doi]
- Scheduling and Estimation Strategies in a Sequential Networked Estimation ProblemMukul Gagrani, Marcos M. Vasconcelos, Ashutosh Nayyar. 871-878 [doi]
- Network Archaeology via Epidemic Processes: The Case of Growing TreesAbram Magner, Arun Padakandla. 879-886 [doi]
- Masterless Coded Computing: A Fully-Distributed Coded FFT AlgorithmHaewon Jeong, Tze Meng Low, Pulkit Grover. 887-894 [doi]
- On Optimal Proactive Caching with Improving Predictions over TimeJohn Tadrous, Atilla Eryilmaz. 895-902 [doi]
- Simulated Annealing for Optimal Resource Allocation in Wireless Networks with Imperfect CommunicationsJaewook Kwak, Ness B. Shroff. 903-910 [doi]
- Entropy Maximization for Constrained Markov Decision ProcessesYagiz Savas, Melkior Ornik, Murat Cubuktepe, Ufuk Topcu. 911-918 [doi]
- Some Results on the Computation of Feedback Capacity of Gaussian Channels with MemoryAli Reza Pedram, Takashi Tanaka. 919-926 [doi]
- Accelerated Gossip via Stochastic Heavy Ball MethodNicolas Loizou, Peter Richtárik. 927-934 [doi]
- Learning Proximal Operators with Gaussian ProcessesTruong X. Nghiem, Giorgos Stathopoulos, Colin Neil Jones. 935-942 [doi]
- Decomposition Methods for Distributed Quadratic Programming with Application to Distributed Model Predictive ControlGiuliano Costantini, Ramin Rostami, Daniel Görges. 943-950 [doi]
- A Code-Based Distributed Gradient Descent MethodElie Atallah, Nazanin Rahnavard. 951-958 [doi]
- Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed AlgorithmsXueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu. 959-965 [doi]
- Online Timely Status Updates with Erasures for Energy Harvesting SensorsAhmed Arafa, Jing Yang 0002, Sennur Ulukus, H. Vincent Poor. 966-972 [doi]
- Analysis and Detection of Cyber-physical Attacks in Distributed Sensor NetworksAquib Mustafa, Hamidreza Modares. 973-980 [doi]
- 2D Linear Detector Based on Generalized Belief Propagation AlgorithmChaitanya Kumar Matcha, Shayan Srinivasa Garani. 981-988 [doi]
- The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II: Multiple Library FilesMohamed S. Nafea, Aylin Yener. 989-996 [doi]
- Tensor-based Spectral Analysis of Cascading Failures over Multilayer Complex SystemsSongyang Zhang, Han Zhang 0006, Hang Li 0003, Shuguang Cui. 997-1004 [doi]
- Statistically and Computationally Efficient Variance Estimator for Kernel Ridge RegressionMeimei Liu, Jean Honorio, Guang Cheng. 1005-1011 [doi]
- Active Distribution Learning from Indirect SamplesSamarth Gupta, Gauri Joshi, Osman Yagan. 1012-1019 [doi]
- Probabilistic Clustering using Maximal Matrix Norm CouplingsDavid Qiu, Anuran Makur, Lizhong Zheng. 1020-1027 [doi]
- Matching Graphs with Community Structure: A Concentration of Measure ApproachFarhad Shirani, Siddharth Garg, Elza Erkip. 1028-1035 [doi]
- How Many Sensors to Localize the Source? The Double Metric Dimension of Random NetworksBrunella Spinelli, L. Elisa Celis, Patrick Thiran. 1036-1043 [doi]
- Minimax Optimal Sequential Tests for Multiple HypothesesMichael Fauss, Abdelhak M. Zoubir, H. Vincent Poor. 1044-1046 [doi]
- Deep Reinforcement One-Shot Learning for Change Point DetectionAnton Puzanov, Kobi Cohen. 1047-1051 [doi]
- Rate Distortion Via Restricted Boltzmann MachinesQing Li, Yang Chen. 1052-1059 [doi]
- Analyzing the Robustness of Deep Learning Against Adversarial ExamplesJun Zhao. 1060-1064 [doi]
- Fundamental Limits of Covert Bit Insertion in PacketsRamin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr. 1065-1072 [doi]
- Improving Computational Efficiency of Communication for Omniscience and Successive OmniscienceNi Ding, Parastoo Sadeghi, Thierry Rakotoarivelo. 1073-1080 [doi]
- Finite-State Channel with Feedback and Causal State Information Available at the EncoderEli Shemuel, Oron Sabag, Haim H. Permuter. 1081-1088 [doi]
- Compression of Dynamic Graphs Generated by a Duplication ModelKrzysztof Turowski, Abram Magner, Wojciech Szpankowski. 1089-1096 [doi]
- The Arbitrarily Varying Gaussian Relay Channel with Sender Frequency DivisionUzi Pereg, Yossef Steinberg. 1097-1103 [doi]
- Sharp Analytical Capacity Upper Bounds for Sticky and Related ChannelsMahdi Cheraghchi, João Ribeiro. 1104-1111 [doi]
- Information Capacity of BSC and BEC Permutation ChannelsAnuran Makur. 1112-1119 [doi]
- Secure Communication over Interference Channel: To Jam or Not to Jam?Jinyuan Chen. 1120-1127 [doi]
- Computation of Feedback Capacity of Single User Multi-Antenna Stationary Gaussian ChannelAbhishek Rawat, Nicola Elia, Chong Li. 1128-1135 [doi]
- The Computational Wiretap ChannelRafael G. L. D'Oliveira, Salim El Rouayheb, Muriel Médard. 1136-1140 [doi]
- On the zero-error capacity of channels with rate limited noiseless feedbackMeysam Asadi, Natasha Devroye. 1141-1146 [doi]
- The Geometric Block Model and ApplicationsSainyam Galhotra, Soumyabrata Pal, Arya Mazumdar, Barna Saha. 1147-1150 [doi]