Abstract is missing.
- Functional Privacy for Distributed Function ComputationJian Lu, Yinfei Xu, Shuo Shao. 1-6 [doi]
- Asymmetric Local Information Privacy and the Watchdog MechanismMohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi. 7-12 [doi]
- Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero LeakageAmirreza Zamani, Tobias J. Oechtering, Mikael Skoglund. 13-18 [doi]
- Rack-aware MSR codes with optimal accessZitan Chen. 19-24 [doi]
- Multi-Phase Recoding for Batched Network CodingHoover H. F. Yin, Mehrdad Tahernia. 25-30 [doi]
- Weakly Secure Coded Distributed Computing with Group-based Function AssignmentJiajun Chen, Chi Wan Sung. 31-36 [doi]
- On The Multi-View Information Bottleneck RepresentationTeng-Hui Huang, Aly El Gamal, Hesham El Gamal. 37-42 [doi]
- Fast Rate Generalization Error Bounds: Variations on a ThemeXuetong Wu, Jonathan H. Manton, Uwe Aickelin, Jingge Zhu. 43-48 [doi]
- An Information-theoretic Method for Collaborative Distributed Learning with Limited CommunicationXinyi Tong, Jian Xu, Shao-Lun Huang. 49-54 [doi]
- Information-Energy Trade-offs with EH Non-linearities in the Finite Block-Length Regime with Finite ConstellationsSadaf ul Zuhra, Samir M. Perlaza, H. Vincent Poor, Mikael Skoglund. 55-60 [doi]
- Beam Splitting Technique for Reconfigurable Intelligent Surface-Aided Simultaneous Wireless Information and Power Transfer ApplicationsNguyen Minh Tran, Muhammad Miftahul Amri, Je Hyeon Park, Ghafar Ramadhan Faqih, Dong In Kim, Kae Won Choi. 61-65 [doi]
- Information-Energy Capacity Region for IRS-aided SWIPT SystemsNizar Khalfet, Ghassan M. Kraidy, Constantinos Psomas, Ioannis Krikidis. 66-70 [doi]
- Information-theoretic de Finetti-style theoremsLampros Gavalakis, Ioannis Kontoyiannis. 71-76 [doi]
- Convergence in Distribution of the Error Exponent of Random Codes at Zero RateLan V. Truong, Josep Font-Segura, Giuseppe Cocco, Albert Guillén i Fàbregas. 77-82 [doi]
- New Upper Bounds on the Mismatch Capacity and the Mismatched Reliability FunctionAnelia Somekh-Baruch. 83-88 [doi]
- Robust Private Information Retrieval with Optimal Server ComputationYi-Sheng Su. 89-94 [doi]
- Digital Blind Box: Random Symmetric Private Information RetrievalZhusheng Wang, Sennur Ulukus. 95-100 [doi]
- Single-Server Private Information Retrieval With Side Information Under Arbitrary Popularity ProfilesAlejandro Gomez-Leos, Anoosheh Heidarzadeh. 101-106 [doi]
- Local Constraint-Based Ordered Statistics Decoding for Short Block CodesYiwen Wang, Jifan Liang, Xiao Ma. 107-112 [doi]
- Partial permutation decoding for ℤ8-linear Hadamard codesAdrián Torres-Martín, Mercè Villanueva. 113-118 [doi]
- Randomized Scheduling of ADMM-LP Decoding Based on Geometric PriorsAmirreza Asadzadeh, Masoud Barakatain, Jeebak Mitra, Frank R. Kschischang, Stark C. Draper. 119-124 [doi]
- Bayesian Change-Point Detection via Context-Tree WeightingValentinian Lungu, Ioannis Papageorgiou, Ioannis Kontoyiannis. 125-130 [doi]
- Composite Neyman-Pearson Hypothesis Testing with a Known HypothesisParham Boroumand, Albert Guillén i Fàbregas. 131-136 [doi]
- Regret Analysis for RL using Renewal Bandit FeedbackSujay Bhatt, Guanhua Fang, Ping Li 0001, Gennady Samorodnitsky. 137-142 [doi]
- General Framework for Linear Secure Distributed Matrix Multiplication with Byzantine ServersOkko Makkonen, Camilla Hollanti. 143-148 [doi]
- Secure MatDot codes: a secure, distributed matrix multiplication schemeHiram H. López, Gretchen L. Matthews, Daniel Valvo. 149-154 [doi]
- Root of Unity for Secure Distributed Matrix Multiplication: Grid Partition CaseRoberto Assis Machado, Felice Manganiello. 155-159 [doi]
- Rateless Sum-Recovery Codes For Distributed Non-Linear ComputationsAnkur Mallick, Gauri Joshi. 160-165 [doi]
- On the Optimality of Coded Caching With Heterogeneous User ProfilesFederico Brunero, Petros Elia. 166-171 [doi]
- Decentralized Coded Caching for Shared Caches using Erasure CodingApurve K. Pandey, Monolina Dutta, Anoop Thomas. 172-177 [doi]
- The Capacity of Fading Vector Gaussian Channels Under Amplitude Constraints on Antenna SubsetsAntonino Favano, Marco Ferrari 0001, Maurizio Magarini, Luca Barletta. 178-183 [doi]
- A Riccati-Lyapunov Approach to Nonfeedback Capacity of MIMO Gaussian Channels Driven by Stable and Uns table NoiseCharalambos D. Charalambous, Stelios Louka, Sergey Loyka. 184-189 [doi]
- Interaction of Pilot Reuse and Channel State Feedback under Coherence DisparityMehdi Karbalayghareh, Aria Nosratinia. 190-195 [doi]
- Code-Aware Storage Channel Modeling via Machine LearningSimeng Zheng, Paul H. Siegel. 196-201 [doi]
- Fault-Tolerant Neuromorphic Computing on Nanoscale Crossbar ArchitecturesRon M. Roth. 202-207 [doi]
- Symbolic Regression for Data Storage with Side InformationXiangwu Zuo, Anxiao Andrew Jiang, Netanel Raviv, Paul H. Siegel. 208-213 [doi]
- Efficient Private Storage of Sparse Machine Learning DataMarvin Xhemrishi, Maximilian Egger, Rawad Bitar. 214-219 [doi]
- The Zero Cubes Free and Cubes Unique Multidimensional ConstraintsSagi Marcovich, Eitan Yaakobi. 220-225 [doi]
- Secure and Private Source Coding with Private Key and Decoder Side InformationOnur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor. 226-231 [doi]
- Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication ChannelsVamoua Yachongka, Hideki Yagi, Hideki Ochiai. 232-237 [doi]
- Using data compression and randomisation to build an unconditionally secure short key cipherBoris Ryabko. 238-242 [doi]
- A Polar Subcode Approach to Belief Propagation List DecodingMarvin Geiselhart, Ahmed Elkelesh, Jannis Clausius, Stephan ten Brink. 243-248 [doi]
- Improving the Error Coefficient of Polar CodesMohammad Rowshan, Son Hoang Dau, Emanuele Viterbo. 249-254 [doi]
- Fast Enumeration of Minimum Weight Codewords of PAC CodesMohammad Rowshan, Jinhong Yuan. 255-260 [doi]
- Sparse Regression Codes for MIMO DetectionHaiwen Cao, Pascal O. Vontobel. 261-266 [doi]
- Sparse superposition codes with rotational invariant coding matrices for memoryless channelsYuhao Liu, Teng Fu, Jean Barbier, Tianqi Hou. 267-272 [doi]
- An Extremal Inequality With Application to Gray-Wyner SystemGuojun Chen, Yinfei Xu, Tiecheng Song, Jing Hu 0002. 273-278 [doi]
- Rate-Distortion Theory for Strategic Semantic CommunicationYong Xiao, Xu Zhang, Yingyu Li, Guangming Shi, Tamer Basar. 279-284 [doi]
- Strategic Communication with Cost-Dependent Decoders via the Gray-Wyner NetworkRony Bou Rouphael, Maël Le Treust. 285-290 [doi]
- On the Zero-Error Capacity of the Chemical Residual ChannelQi Cao, Qiaoqiao Zhou. 291-296 [doi]
- Codes for Preventing Zeros at Partially Defective Memory PositionsHaider Al Kim, Kai-Jie Chan. 297-302 [doi]
- The linear complexity of sequences with low autocorrelation from interleaved technique and period pqVladimir Edemskiy, Sergey Garbar. 303-308 [doi]
- Communicating Type Classes Through Channels: An Information Geometric ViewShao-Lun Huang. 309-314 [doi]
- The Estimation-Compression Separation in Semantic Communication SystemsYizhu Wang, Tao Guo, Bo Bai 0001, Wei Han 0004. 315-320 [doi]
- Covertly Controlling a Linear SystemBarak Amihood, Asaf Cohen 0001. 321-326 [doi]
- Angular Domain-Based Importance Sampling Estimator for Linear Block Codes over the AWGN Channel with M-PSK ModulationJinzhe Pan, Wai Ho Mow. 327-331 [doi]
- Deterministic Identification over Channels without CSIYuan Li, Xianbin Wang 0003, Huazi Zhang, Jun Wang 0062, Wen Tong, Guiying Yan, Zhiming Ma. 332-337 [doi]
- Linear Shrinkage Receiver for Slow Fading Channels under Imperfect Channel State InformationWenyi Shi, Shuqin Pang, Wenyi Zhang. 338-343 [doi]
- Lossy Computing with Side Information via Multi-HypergraphsDeheng Yuan, Tao Guo, Bo Bai 0001, Wei Han 0004. 344-349 [doi]
- Randomized Quantization with Exact Error DistributionMahmoud Hegazy, Cheuk Ting Li. 350-355 [doi]
- Efficient interventions in a neural circuit from observations: an information-theoretic studyNeil Ashim Mehta, Pulkit Grover. 356-361 [doi]
- Thermodynamics as Combinatorics: A Toy TheoryÄmin Baumeler, Carla Rieger, Stefan Wolf 0001. 362-367 [doi]
- An Extensible Covert Communication Scheme Over the AWGN Channel With FeedbackHangmei Rao, Ligong Wang. 368-373 [doi]
- Information Theoretically Private and Secure Distributed Voting Without a Trusted AuthoritySeyed Reza Hoseini Najarkolaei, Narges Kazempour, Mohammad Reza Aref, Deniz Gündüz. 374-379 [doi]
- A Machine Learning Framework for Privacy-Aware Distributed Functional Compression over AWGN ChannelsYashas Malur Saidutta, Faramarz Fekri, Afshin Abdi. 380-385 [doi]
- Seeded Database Matching Under Noisy Column RepetitionsSerhat Bakirtas, Elza Erkip. 386-391 [doi]
- On Age of Information for Discrete Time Status Updating System With Infinite SizeJixiang Zhang 0002, Yinfei Xu. 392-397 [doi]
- Susceptibility of Age of Gossip to TimestompingPriyanka Kaswan, Sennur Ulukus. 398-403 [doi]
- Low-Latency Ordered Statistics Decoding of BCH CodesLijia Yang, Li Chen. 404-409 [doi]
- Private Federated Submodel Learning with SparsificationSajani Vithana, Sennur Ulukus. 410-415 [doi]
- Sparse Random Khatri-Rao Product Codes for Distributed Matrix MultiplicationRuowan Ji, Anoosheh Heidarzadeh, Krishna R. Narayanan. 416-421 [doi]
- Network Coding Multicast Key-CapacityMichael Langberg, Michelle Effros. 422-427 [doi]
- Multi-User Linearly Separable Computation: A Coding Theoretic ApproachAli Khalesi, Petros Elia. 428-433 [doi]
- Metric Nearness with Minimum Distortion: Optimal and ApproximationChenglin Fan, Ping Li. 434-439 [doi]
- Formal limitations of sample-wise information-theoretic generalization boundsHrayr Harutyunyan, Greg Ver Steeg, Aram Galstyan. 440-445 [doi]
- DiPLe: Learning Directed Collaboration Graphs for Peer-to-Peer Personalized LearningXue Zheng, Parinaz Naghizadeh, Aylin Yener. 446-451 [doi]
- Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic CryptographyXavier Coiteux-Roy, Stefan Wolf 0001. 452-457 [doi]
- An Alphabet of Leakage MeasuresAtefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar. 458-463 [doi]
- Secure Data Storage Resilient Against Compromised Users via an Access StructureHassan ZivariFard, Rémi A. Chou. 464-469 [doi]
- Rate-Distance Trade-offs for List-Decodable Insertion-Deletion CodesBernhard Haeupler, Amirbehshad Shahrasbi. 470-475 [doi]
- Signature Codes for a Noisy Adder Multiple Access ChannelGökberk Erdogan, Georg Maringer, Nikita Polyanskii. 476-481 [doi]
- Integer Syndrome Decoding in the Presence of NoiseVlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso. 482-487 [doi]
- Stabilizer Inactivation for Message-Passing Decoding of Quantum LDPC CodesJulien du Crest, Mehdi Mhalla, Valentin Savin. 488-493 [doi]
- Belief Propagation with Quantum Messages for Symmetric Classical-Quantum ChannelsSarah Brandsen, Avijit Mandal, Henry D. Pfister. 494-499 [doi]
- Perturbation Theory for Quantum InformationMichael R. Grace, Saikat Guha. 500-505 [doi]
- Joint Quantum Communication and SensingShi-Yuan Wang, Tuna Erdogan, Uzi Pereg, Matthieu R. Bloch. 506-511 [doi]
- A subclass of LRC codes with intersecting recovering setsCharul Rajput, Maheshanand Bhaintwal. 512-516 [doi]
- Irregular Generalized LDPC codes in Practical Communication ScenariosIrina E. Bocharova, Boris D. Kudryashov, Sander Mikelsaar. 517-522 [doi]
- On the Classification of ZpZp2 Generalized Hadamard CodesDipak Kumar Bhunia, Cristina Fernández-Córdoba, Mercè Villanueva. 523-528 [doi]
- Tamo-Barg Codes with Efficient Local RepairU. S. S. Sasanka, V. Lalitha 0001. 529-534 [doi]
- Strong Converses using Change of Measure and Asymptotic Markov ChainsMustapha Hamad, Michèle A. Wigger, Mireille Sarkiss. 535-540 [doi]
- A Quasi-Uniform Approach to Characterizing the Boundary of the Almost Entropic RegionSatyajit Thakor, Dauood Saleem. 541-545 [doi]
- On Information Bottleneck for Gaussian ProcessesMichael Dikshtein, Nir Weinberger, Shlomo Shamai Shitz. 546-551 [doi]
- The Classical Capacity of Quantum Jackson Networks with Waiting Time-Dependent ErasuresJaswanthi Mandalapu, Krishna P. Jagannathan. 552-557 [doi]
- Codes for the Asymmetric Damerau-Levenshtein DistanceShuche Wang, Van Khu Vu, Vincent Y. F. Tan. 558-563 [doi]
- The Input and Output Entropies of the k-Deletion/Insertion Channel with Small RadiiShubhransh Singhvi, Omer Sabary, Daniella Bar-Lev, Eitan Yaakobi. 564-569 [doi]
- *Luca G. Tallini, Nawaf Alqwaifly, Bella Bose. 570-575 [doi]
- Achievable Rates and Algorithms for Group Testing with Runlength ConstraintsStefano Della Fiore, Marco Dalai, Ugo Vaccaro. 576-581 [doi]
- Do Neural Networks Compress Manifolds Optimally?Sourbh Bhadane, Aaron B. Wagner, Johannes Ballé. 582-587 [doi]
- Sharp asymptotics on the compression of two-layer neural networksMohammad Hossein Amani, Simone Bombari, Marco Mondelli, Rattana Pukdee, Stefano Rini. 588-593 [doi]
- Active-LATHE: An Active Learning Algorithm for Boosting the Error Exponent for Learning Homogeneous Ising TreesFengzhuo Zhang, Anshoo Tandon, Vincent Y. F. Tan. 594-599 [doi]
- A Learning-Based Approach to Approximate Coded ComputationNavneet Agrawal, Yuqin Qiu, Matthias Frey, Igor Bjelakovic, Setareh Maghsudi, Slawomir Stanczak, Jingge Zhu. 600-605 [doi]
- Linear Computation Coding Inspired by the Lempel-Ziv AlgorithmRalf Müller. 606-611 [doi]
- Rate-Optimal Streaming Codes with Smaller Field Size Under Less-Stringent Decoding-Delay RequirementsShobhit Bhatnagar, Vinayak Ramkumar, P. Vijay Kumar. 612-617 [doi]
- Coded Data Rebalancing for Distributed Data Storage Systems with Cyclic StorageAthreya Chandramouli, Abhinav Vaishya, Prasad Krishnan. 618-623 [doi]
- Linear Runlength-Limited Subcodes of Reed-Muller Codes and Coding Schemes for Input-Constrained BMS ChannelsV Arvind Rameshwar 0001, Navin Kashyap. 624-629 [doi]
- Sequential Decoding of Convolutional Codes for Synchronization ErrorsAnisha Banerjee, Andreas Lenz, Antonia Wachter-Zeh. 630-635 [doi]
- Optimal Error-Detecting Codes for General Asymmetric Channels via Sperner TheoryMladen Kovacevic 0001, Dejan Vukobratovic. 636-641 [doi]
- On Universal Sequential Classification from Sequentially Observed Empirical StatisticsChia-Yu Hsu, Ching-Fang Li, I-Hsiang Wang. 642-647 [doi]
- Best Restless Markov Arm IdentificationKarthik Periyapattana Narayana Prasad, Kota Srinivas Reddy, Vincent Y. F. Tan. 648-653 [doi]
- Second-Order Asymptotics of Hoeffding-Like Hypothesis TestsK. V. Harsha, Jithin Ravi, Tobias Koch 0001. 654-659 [doi]
- 3 =1Shibsankar Das, Krishna Gopal Benerjee, Adrish Banerjee. 660-665 [doi]
- On the Relationship Between the Minimum of the Bethe Free Energy Function of a Factor Graph and Sum-Product Algorithm Fixed PointsYuwen Huang, Pascal O. Vontobel. 666-671 [doi]
- Double-Cover-Based Analysis of the Bethe Permanent of Non-negative MatricesKit Shing Ng, Pascal O. Vontobel. 672-677 [doi]
- Shared Cache Coded Caching Schemes with known User-to-Cache Association Profile using Placement Delivery ArraysElizabath Peter, K. K. Krishnan Namboodiri, B. Sundar Rajan. 678-683 [doi]
- Universal CachingAtiv Joshi, Abhishek Sinha. 684-689 [doi]
- Security and Privacy in Cache-Aided Linear Function Retrieval for Multi-Access Coded CachingMallikharjuna Chinnapadamala, B. Sundar Rajan. 690-695 [doi]
- Bounding the Optimal Length of Pliable Index Coding via a Hypergraph-based ApproachTulasi Sowjanya B., Visvesh Subramanian, Prasad Krishnan. 696-701 [doi]
- Minrank of Embedded Index Coding Problems and its Relation to Connectedness of a Bipartite GraphAnjana Ambika Mahesh, B. Sundar Rajan. 702-707 [doi]
- Straggler-Resilient Differentially-Private Decentralized LearningYauhen Yakimenka, Chung-Wei Weng, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer. 708-713 [doi]
- Multi-Message Pliable Private Information RetrievalSarah A. Obead, Jörg Kliewer. 714-719 [doi]
- Semantic Security with Infinite Dimensional Quantum Eavesdropping ChannelMatthias Frey, Igor Bjelakovic, Janis Nötzel, Slawomir Stanczak. 720-725 [doi]
- Positivity of Secret Key Capacity for Hypergraphical Sources with a Linear WiretapperPraneeth Kumar Vippathalla, Chung Chan, Navin Kashyap, Qiaoqiao Zhou. 726-731 [doi]
- Commitment over Unreliable Noisy Channels: When Awareness Meets ControlAmitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav. 732-737 [doi]
- All-to-All Encode in Synchronous SystemsCanran Wang, Netanel Raviv. 738-743 [doi]
- Breaking Blockchain's Communication Barrier with Coded ComputationCanran Wang, Netanel Raviv. 744-749 [doi]
- Fractional Graph Coloring for Functional Compression with Side InformationDerya Malak. 750-755 [doi]
- A Bivariate Invariance PrincipleAlexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard. 756-761 [doi]
- A General Formula for Uniform Common Randomness CapacityRami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche. 762-767 [doi]
- Safety in Numbers: Asymptotic Analysis of a Monitoring ProblemReka Inovan, Emre Telatar. 768-773 [doi]