Abstract is missing.
- Soft-Output Joint Channel Estimation and Data Detection using Deep UnfoldingHaochuan Song, Xiaohu You, Chuan Zhang 0001, Christoph Studer. 1-5 [doi]
- Adaptive Interference Coordination over Channels with Unknown State at the Encoder and the DecoderMichail Mylonakis, Photios A. Stavrou, Mikael Skoglund. 1-6 [doi]
- Design of Short Blocklength Wiretap Channel Codes: Deep Learning and Cryptography Working Hand in HandVidhi Rana, Rémi A. Chou. 1-6 [doi]
- Second Law of Entanglement Dynamics for the Non-Asymptotic RegimeMark M. Wilde. 1-6 [doi]
- Irregularly Clipped Sparse Regression CodesWencong Li, Lei Liu, Brian M. Kurkoski. 1-6 [doi]
- Optimal Maximal Leakage-Distortion TradeoffSara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund. 1-6 [doi]
- On the Performance Analysis of Streaming Codes over the Gilbert-Elliott ChannelMyna Vajha, Vinayak Ramkumar, Mayank Jhamtani, P. Vijay Kumar. 1-6 [doi]
- Second-Order Asymptotically Optimal Outlying Sequence Detection with Reject OptionLin Zhou 0002, Alfred O. Hero III, Yun Wei. 1-6 [doi]
- The Intersection of Insertion and Deletion BallsDaniella Bar-Lev, Omer Sabary, Yotam Gershon, Eitan Yaakobi. 1-6 [doi]
- Power-Efficient Deep Neural Networks with Noisy Memristor ImplementationElsa Dupraz, Lav R. Varshney, François Leduc-Primeau. 1-5 [doi]
- Streaming Codes for Handling a Combination of Burst and Random ErasuresShobhit Bhatnagar, Biswadip Chakraborti, P. Vijay Kumar. 1-6 [doi]
- Rényi Divergence Based Bounds on Generalization ErrorEeshan Modak, Himanshu Asnani, Vinod M. Prabhakaran. 1-6 [doi]
- A General Derivative Identity for the Conditional Expectation with Focus on the Exponential FamilyAlex Dytso, Martina Cardone. 1-6 [doi]
- On Distributed Hypothesis Testing with Constant-Bit Communication ConstraintsXiangxiang Xu 0001, Shao-Lun Huang. 1-6 [doi]
- Single-Server Individually-Private Information Retrieval: A Combinatorial ApproachAnoosheh Heidarzadeh, Alex Sprintson. 1-6 [doi]
- Scalar Gaussian Wiretap Channel: Bounds on the Support Size of the Secrecy-Capacity-Achieving DistributionLuca Barletta, Alex Dytso. 1-6 [doi]
- Computability of the Zero-Error Capacity of Noisy ChannelsHolger Boche, Christian Deppe. 1-6 [doi]
- A Reverse Jensen Inequality Result with Application to Mutual Information EstimationGerhard Wunder, Benedikt Groß, Rick Fritschek, Rafael F. Schaefer. 1-6 [doi]
- Feedback Gains for Gaussian Massive Multiple-Access ChannelsGerhard Kramer. 1-3 [doi]
- Covert Communication over Asynchronous Channels with Timing AdvantageVidyalaxmi Dani, Venkatesh Ramaiyan, Devendra Jalihal. 1-6 [doi]
- Strong Converse for Distributed Source Coding with Encryption Using Correlated KeysYasutada Oohama, Bagus Santoso. 1-6 [doi]
- Chirp Reconstruction Algorithm for Generalized Second-Order Reed-Muller FramesRenaud-Alexandre Pitaval, Yi Qin. 1-6 [doi]
- Realizing GANs via a Tunable Loss FunctionGowtham R. Kurri, Tyler Sypherd, Lalitha Sankar. 1-6 [doi]
- Recent Progress in Private Simultaneous Messages ProtocolsAkinori Kawachi. 1-5 [doi]
- Identification under Effective SecrecyAbdalla Ibrahim, Roberto Ferrara, Christian Deppe. 1-6 [doi]
- Optimal Policies for Age and Distortion in a Discrete-Time ModelYunus Inan, Reka Inovan, Emre Telatar. 1-6 [doi]
- On Converse Results for Secure Index CodingYucheng Liu, Lawrence Ong, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar. 1-6 [doi]
- On Age of Information for Discrete Time Status Updating System With Ber/G/1/1 QueuesJixiang Zhang 0002, Yinfei Xu. 1-6 [doi]
- One-shot inner bounds for sending private classical information over a quantum MACSayantan Chakraborty 0002, Aditya Nema, Pranab Sen. 1-6 [doi]
- Unsourced Random Access Based on List Recoverable Codes Correcting t ErrorsKirill V. Andreev, Pavel S. Rybin, Alexey A. Frolov. 1-6 [doi]
- Approximate Gradient Coding for Heterogeneous NodesAmogh Johri, Arti Yardi, Tejas Bodas. 1-6 [doi]
- On Conditional Alpha-Information and its Application to Side-Channel AnalysisYi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul. 1-6 [doi]
- Local Correctabilities and Dual Codes of Symmetric Reed-Muller CodesWei Yan, Sian-Jheng Lin. 1-5 [doi]
- Hyperparameter Learning of Stochastic Image Generative Models with Bayesian Hierarchical Modeling and Its Effect on Lossless Image CodingYuta Nakahara, Toshiyasu Matsushima. 1-6 [doi]
- Hybrid Multiplicative Secret SharingMaki Yoshida. 1-5 [doi]
- Reinforcement-learning calibration of coherent-state receivers on variable-loss optical channelsM. Bilkis, Matteo Rosati, John Calsamiglia. 1-6 [doi]
- Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional AnalysisJunge Wang, Zhuqing Jia, Syed Ali Jafar. 1-6 [doi]
- Correcting deletion errors in DNA data storage with enzymatic synthesisYuanyuan Tang, Farzad Farnoud. 1-6 [doi]
- Differential Entropy of the Conditional Expectation under Gaussian NoiseArda Atalik, Alper Köse, Michael Gastpar. 1-6 [doi]
- Polar Codes for Biometric Identification and AuthenticationLinghui Zhou, Tobias J. Oechtering, Mikael Skoglund. 1-6 [doi]
- Maddah-Ali-Niesen Scheme for Multi-access Coded CachingPooja Nayak Muralidhar, Digvijay Katyal, B. Sundar Rajan. 1-6 [doi]
- Information Leakage in Index CodingYucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Jörg Kliewer, Sarah Johnson 0001. 1-6 [doi]
- Reliability-Based Decoding of Complex Low-Density Lattice CodesWarangrat Wiriya, Brian M. Kurkoski. 1-6 [doi]
- A Statistical Threshold for Adversarial Classification in Laplace MechanismsAyse Ünsal, Melek Önen. 1-6 [doi]
- Generalized Nearest Neighbor Decoding for MIMO Channels with Imperfect Channel State InformationShuqin Pang, Wenyi Zhang. 1-6 [doi]
- Squeezed Random Khatri-Rao Product CodesRuowan Ji, Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan. 1-6 [doi]
- On the Commitment Capacity of Reverse Elastic ChannelsAmitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav. 1-6 [doi]
- On the Universality of Spatially Coupled LDPC Codes Over Intersymbol Interference ChannelsMgeni Makambi Mashauri, Alexandre Graell i Amat, Michael Lentmaier. 1-6 [doi]
- Covert Sequential Hypothesis TestingMeng-Che Chang, Matthieu R. Bloch. 1-6 [doi]
- Multi-Access Coded Caching with Secure DeliveryK. K. Krishnan Namboodiri, B. Sundar Rajan. 1-6 [doi]
- Improved Multi-access Coded Caching Schemes From Cross Resolvable DesignsPooja Nayak Muralidhar, Digvijay Katyal, B. Sundar Rajan. 1-6 [doi]
- Attention-Based Hybrid Precoding for mmWave MIMO SystemsHao Jiang, Yu Lu, Xueru Li, Bichai Wang, Yongxing Zhou, Linglong Dai. 1-6 [doi]
- Amplitude Constrained Poisson Noise Channel: Properties of the Capacity-Achieving Input DistributionAlex Dytso, Luca Barletta, Shlomo Shamai Shitz. 1-6 [doi]
- Decentralized Multi-access Coded Caching with Uncoded PrefetchingPruthvi Trinadh, Monolina Dutta, Anoop Thomas, B. Sundar Rajan. 1-6 [doi]
- The Undecidability of Conditional Affine Information Inequalities and Conditional Independence Implication with a Binary ConstraintCheuk Ting Li. 1-6 [doi]
- Generalized Universal Coding of IntegersWei Yan, Sian-Jheng Lin. 1-6 [doi]
- Covert queueing problem with a Markovian statisticArti Yardi, Tejas Bodas. 1-6 [doi]
- A General Framework for the Design of Compressive Sensing using Density EvolutionHang Zhang, Afshin Abdi, Faramarz Fekri. 1-6 [doi]
- Optimal finite-length linear codes and the corresponding channel dispersion for broadcast packet erasure channels with feedbackShih-Chun Lin, Yi-Chun Lai, Yu-Chih Huang, Chih-Chun Wang, I-Hsiang Wang. 1-6 [doi]
- Moderate Deviation Analysis for Quantum State TransferNavneeth Ramakrishnan, Marco Tomamichel, Mario Berta. 1-6 [doi]
- Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap ChannelsMahdi Shakiba-Herfeh, Laura Luzzi, Arsenia Chorti. 1-6 [doi]
- Achievable Rates for the Relay Channel with Orthogonal Receiver ComponentsAbbas El Gamal, Amin Gohari, Chandra Nair. 1-6 [doi]
- An Efficient Bayes Coding Algorithm for the Non-Stationary Source in Which Context Tree Model Varies from Interval to IntervalKoshi Shimada, Shota Saito, Toshiyasu Matsushima. 1-6 [doi]
- Locally Recoverable Streaming Codes for Packet-Erasure RecoveryVinayak Ramkumar, Myna Vajha, P. Vijay Kumar. 1-6 [doi]
- Sequence Reconstruction Under Stutter Noise in Enzymatic DNA SynthesisRoy Shafir, Omer Sabary, Leon Anavy, Eitan Yaakobi, Zohar Yakhini. 1-6 [doi]
- A Study on the Joint Source-Channel Coding for Computing Functions: An Approach from a Dichotomy of FunctionsNaruki Joki, Shigeaki Kuzuoka. 1-6 [doi]
- Sparse Recovery Guarantees of Periodic Signals with Nested Periodic DictionariesPouria Saidi, George K. Atia. 1-6 [doi]
- (ϵ, n) Fixed-Length Strong Coordination CapacityGiulia Cervia, Tobias J. Oechtering, Mikael Skoglund. 1-6 [doi]
- Nested Sparse Feedback Codes for Point-to-Point, Multiple Access, and Random Access ChannelsRecep Can Yavas, Victoria Kostina, Michelle Effros. 1-6 [doi]
- Secret Key Capacity of Wiretapped Polytree-PINAlireza Poostindouz, Reihaneh Safavi-Naini. 1-6 [doi]
- High Rate Streaming Codes Over the Three-Node Relay NetworkM. Nikhil Krishnan, Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-tian Tan, John G. Apostolopoulos. 1-6 [doi]
- Reinforcement Learning-Aided Markov Chain Monte Carlo For Lattice Gaussian SamplingZheng Wang 0013, Yili Xia, Shanxiang Lyu, Cong Ling 0001. 1-5 [doi]
- Lower Bounds on the Expected Excess Risk Using Mutual InformationM. Bora Dogan, Michael Gastpar. 1-6 [doi]
- Polar Codes for Automorphism Ensemble DecodingCharles Pillet, Valerio Bioglio, Ingmar Land. 1-6 [doi]
- Concentration of Random-Coding Error ExponentsLan V. Truong, Giuseppe Cocco, Josep Font-Segura, Albert Guillén i Fàbregas. 1-5 [doi]
- Guaranteed Rate of Streaming Erasure Codes over Multi-Link Multi-hop NetworkElad Domanovitz, Gustavo Kasper Facenda, Ashish Khisti, Wai-tian Tan, John G. Apostolopoulos. 1-6 [doi]
- 1Alexander Koch 0001. 1-6 [doi]
- Hybrid Encryption in Correlated Randomness ModelReihaneh Safavi-Naini, Setareh Sharifian. 1-5 [doi]
- Strategic Successive Refinement Coding for Bayesian Persuasion with Two DecodersRony Bou Rouphael, Maël Le Treust. 1-6 [doi]
- STAR+ Codes: Triple-Fault-Tolerant Codes with Asymptotically Optimal Updates and Efficient Encoding/DecodingHanxu Hou, Patrick P. C. Lee. 1-6 [doi]
- Duality for Continuous Graphical ModelsMehdi Molkaraie. 1-6 [doi]
- A Variational Approach to Privacy and FairnessBorja Rodríguez Gálvez, Ragnar Thobaben, Mikael Skoglund. 1-6 [doi]
- Communication-Efficient LDPC Code Design for Data Availability Oracle in Side BlockchainsDebarnab Mitra, Lev Tauz, Lara Dolecek. 1-6 [doi]
- Exact Recovery in the Balanced Stochastic Block Model with Side InformationJin Sima, Feng Zhao, Shao-Lun Huang. 1-6 [doi]
- On Cloud Radio Access Networks With Cascade Oblivious RelayingMehrangiz Ensan, Hamdi Joudeh, Alex Alvarado, Ulf Gustavsson, Frans M. J. Willems. 1-6 [doi]
- Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and DecoderHamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund. 1-6 [doi]
- Energy-limited Joint Source-Channel Coding via Analog Pulse Position ModulationOmri Lev, Anatoly Khina. 1-6 [doi]
- Refined Convergence Rates of the Good-Turing EstimatorAmichai Painsky. 1-5 [doi]
- Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast ChannelsUzi Pereg, Roberto Ferrara, Matthieu R. Bloch. 1-6 [doi]
- Distributed Sequential Hypothesis Testing With Zero-Rate CompressionSadaf Salehkalaibar, Vincent Y. F. Tan. 1-5 [doi]
- Generalized Talagrand Inequality for Sinkhorn Distance using Entropy Power InequalityShuchan Wang, Photios A. Stavrou, Mikael Skoglund. 1-6 [doi]
- Semi-Source Independent Quantum Walk Random Number GenerationMinwoo Bae, Walter O. Krawec. 1-6 [doi]
- Privacy-Utility Trade-off with the Stratonovich's Value of InformationAkira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima. 1-6 [doi]
- Robust 1-bit Compressive Sensing with Partial Gaussian Circulant Matrices and Generative PriorsZhaoqiang Liu, Subhroshekhar Ghosh, Jonathan Scarlett. 1-6 [doi]
- A Multi-Armed Bandit Problem with the Optimal Arm Depending on a Hidden Markov ModelTalha Cihad Gulcu. 1-6 [doi]
- Multiple-Output Channel Simulation and Lossy Compression of Probability DistributionsChak Fung Choi, Cheuk Ting Li. 1-6 [doi]
- Rate-Distortion Problems of the Poisson Process: a Group-Theoretic ApproachHui-An Shen, Stefan M. Moser, Jean-Pascal Pfister. 1-6 [doi]
- Expandable Fractional Repetition Codes for Distributed Storage SystemsBing Zhu, Shigeng Zhang, Weiping Wang 0003. 1-5 [doi]
- Finite-Input Intersymbol Interference Wiretap ChannelsAria Nouri, Reza Asvadi, Jun Chen 0005, Pascal O. Vontobel. 1-6 [doi]
- Two-dimensional Lee-Error-Correcting Codes on Hexagonal Signal ConstellationsHiroyoshi Morita, Masaya Fujisawa, Shojiro Sakata. 1-6 [doi]
- Qualitative Analysis of Feedback Capacity of AGN Channels Driven by Unstable Versus Stable Autoregressive Moving Average NoiseStelios Louka, Christos K. Kourtellaris, Charalambos D. Charalambous. 1-6 [doi]
- Analysis of Innovative Rank of Batched Network Codes for Wireless Relay NetworksHoover H. F. Yin, Xiaoli Xu 0001, Ka Hei Ng, Yong Liang Guan 0001, Raymond W. Yeung. 1-6 [doi]
- Cooperative Encoding and Decoding of Mixed Delay Traffic under Random-User ActivityHoma Nikbakht, Michèle A. Wigger, Shlomo Shamai Shitz, Jean-Marie Gorce. 1-6 [doi]
- Linear Programming Bounds on the Kissing Number of q-ary CodesPatrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul. 1-5 [doi]
- On the Optimal Error Rate of Stochastic Block Model with Symmetric Side InformationFeng Zhao, Jin Sima, Shao-Lun Huang. 1-6 [doi]
- On the Existence of the Augustin MeanHao-Chung Cheng, Baris Nakiboglu. 1-6 [doi]
- A Random Coding Bound on the ML Decoding Error Probability for NB LDPC Coded QAM SignalsIrina E. Bocharova, Boris D. Kudryashov, Evgenii P. Ovsyannikov, Vitaly Skachek. 1-6 [doi]
- Sequential Characterizations of Cover and Pombra Gaussian Feedback Capacity: Generalizations to MIMO Channels via Sufficient StatisticCharalambos D. Charalambous, Christos K. Kourtellaris, Stelios Louka. 1-6 [doi]
- A Unified Treatment of Partial Stragglers and Sparse Matrices in Coded Matrix ComputationAnindya Bijoy Das, Aditya Ramamoorthy. 1-6 [doi]
- Multiparty Interactive Communication with Broadcast LinksManuj Mukherjee, Ran Gelles. 1-6 [doi]
- Landing Probabilities of Random Walks for Seed-Set Expansion in HypergraphsEli Chien, Pan Li 0005, Olgica Milenkovic. 1-6 [doi]
- Two-User MIMO Broadcast Channel with Transmit Correlation Diversity: Achievable Rate RegionsKhac-Hoang Ngo, Fan Zhang, Sheng Yang, Aria Nosratinia. 1-6 [doi]
- Asymptotics of Constant-Weight Constrained Sequences with ApplicationsMladen Kovacevic 0001, Dejan Vukobratovic. 1-6 [doi]
- Achievable Lower Bound on the Optimal Access Bandwidth of (K + 2, K, 2)-MDS Array Code with Degraded Read FriendlyTing-Yi Wu, Yunghsiang S. Han, Zhengrui Li, Bo Bai 0001, Gong Zhang, Xiaoyang Zhang, Xiang Wu. 1-5 [doi]
- Towards Universal Adversarial Examples and DefensesAdnan Siraj Rakin, Ye Wang 0001, Shuchin Aeron, Toshiaki Koike-Akino, Pierre Moulin, Kieran Parsons. 1-6 [doi]
- Moment Generating Function of the AoI in Multi-Source Systems with Computation-Intensive Status UpdatesMohammad Moltafet, Markus Leinonen, Marian Codreanu. 1-6 [doi]
- The equivalence between correctability of deletions and insertions of separable states in quantum codesTaro Shibayama, Yingkai Ouyang. 1-6 [doi]
- Combined polar-LDPC design for channels with high noiseIlya Dumer, Navid Gharavi. 1-6 [doi]
- Optimal Adaptive Strategies for Sequential Quantum Hypothesis TestingYonglong Li, Vincent Y. F. Tan, Marco Tomamichel. 1-6 [doi]
- Coding Theorems on Digital Fingerprinting Coding under Informed and Uninformed SetupsHiroki Koga. 1-6 [doi]
- The Achievable Rate Region of Wyner-Ahlswede-Körner Coding Problem for Mixed SourcesDaisuke Takeuchi, Shun Watanabe. 1-6 [doi]
- On the Repair Bandwidth and Repair Access of Two Storage Systems: Large-Scale and Uniform Rack-Aware Storage SystemsZhengrui Li, Yunghsiang S. Han, Ting-Yi Wu, Hanxu Hou, Bo Bai 0001, Gong Zhang. 1-6 [doi]
- A recursive SISO decoding algorithmLiudmila Karakchieva, Peter Trifonov. 1-6 [doi]
- The Typical Non-Linear Code over Large AlphabetsAnina Gruica, Alberto Ravagnani. 1-6 [doi]
- Polynomial-Time Construction of Two-Channel Prefix-Free Codes with Given Codeword LengthsHoover H. F. Yin, Ka Hei Ng, Yu Ting Shing, Russell W. F. Lai, Xishi Wang. 1-6 [doi]
- Simultaneous Information and Energy Transmission with Finite ConstellationsSadaf ul Zuhra, Samir M. Perlaza, Eitan Altman. 1-6 [doi]
- Multi-strand Reconstruction from SubstringsYonatan Yehezkeally, Sagi Marcovich, Eitan Yaakobi. 1-6 [doi]
- Optimal Exponents in Cascaded Hypothesis Testing under Expected Rate ConstraintsMustapha Hamad, Michèle A. Wigger, Mireille Sarkiss. 1-6 [doi]
- The Capacity of SWIPT Systems over Rayleigh-Fading Channels with HPANizar Khalfet, Ioannis Krikidis. 1-6 [doi]
- Complexity-Adaptive Maximum-Likelihood Decoding of Modified GN-Coset CodesPeihong Yuan, Mustafa Cemil Coskun. 1-6 [doi]
- New Dual Relationships for Error-Correcting Wiretap CodesMorteza Shoushtari, Willie K. Harrison. 1-6 [doi]
- Outage Common Randomness Capacity Characterization of Multiple-Antenna Slow Fading ChannelsRami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche. 1-6 [doi]
- Sample-Efficient Learning of Cellular Antenna Parameter SettingsEzgi Tekgul, Thomas David Novlan, Salam Akoum, Jeffrey G. Andrews. 1-6 [doi]