


default search action
ITW 2024: Shenzhen, China
- IEEE Information Theory Workshop, ITW 2024, Shenzhen, China, November 24-28, 2024. IEEE 2024, ISBN 979-8-3503-4893-4
- Xinwei Zhao, Xiao Mat:
A Low-Latency Decoding of CA-Polar-SPC Product Codes. 1-6 - Junping Wu, Lawrence Ong, Sarah Johnson, Jin Yeong Tan:
Pliable Index Coding with Restricted Decoding Sets. 7-12 - Lin Sok, Martianus Frederic Ezerman, San Ling:
On the Hermitian Hulls of Two-Point Algebraic Geometry Codes. 13-18 - Peikai Li, Jingjie Lv, Linqi Song, Li Zhang, Hanxu Hou:
New Cauchy MDS Array Codes with Flexible Sub-Packetization and Efficient Decoding. 19-24 - Amirreza Zamani, Borja Rodríguez Gálvez, Mikael Skoglund:
On Information Theoretic Fairness: Compressed Representations with Perfect Demographic Parity. 25-30 - Khac-Hoang Ngo, Johan Östman, Alexandre Graell i Amat:
On Local Mutual-Information Privacy. 31-36 - Denis Kozlov, Mahtab Mirmohseni, Rahim Tafazolli:
Secure Semantic Communication Over Wiretap Channel. 37-42 - Sufang Yang, Longguang Li, Jintao Wang:
Physical-Layer Security for MIMO Visible Light Communication Wiretap Channel. 43-48 - Lina Zhu, Lin Zhou:
Large Deviations for Outlier Hypothesis Testing of Continuous Sequences. 49-54 - Yuanxin Guo, Sadaf Salehkalaibar, Stark C. Draper, Wei Yu:
One-Shot Achievability Region for Hypothesis Testing with Communication Constraint. 55-60 - Xiaotian Zhang, Jun Diao, Lin Zhou:
Large Deviations for Outlier Hypothesis Testing with Distribution Uncertainty. 61-66 - Fatemeh Khaledian, Reza Asvadi, Elsa Dupraz, Tad Matsumoto:
Covering Codes as Near-Optimal Quantizers for Distributed Hypothesis Testing Against Independence. 67-72 - Qinyi Lu, Nan Liu, Wei Kang:
Demand Private Coded Caching: The Two-File Case. 73-78 - Han Fang, Qinyi Lu, Nan Liu, Wei Kang:
Optimal Memory-Rate Tradeoff for Secure Multi-Access Coded Caching: The Case of Largest Access Number. 79-84 - Anupam Nayak, Kota Srinivas Reddy, Nikhil Karamchandani:
On the Regret of Coded Caching with Adversarial Requests. 85-90 - Rajlaxmi Pandey, B. Sundar Rajan:
Coded Caching for Hierarchical Two-Layer Multi-Access Networks with Low Coding Delay. 91-96 - Rong Hu, Xiaofan He:
Revisiting Distributed Source Coding for Efficient Downlink Transmission in Coded Edge Computing. 97-102 - Viswanathan Ramachandran, Tobias J. Oechtering, Mikael Skoglund:
Multi-terminal Strong Coordination with Degraded Source Observations. 103-108 - Xinyang Li, Vlad-Costin Andrei, Ullrich J. Mönich, Holger Boche:
An Achievable Rate-Distortion Region for Joint State and Message Communication over Multiple Access Channels. 109-114 - Xiaomeng Chen, Aimin Li, Shaohua Wu:
Optimal Sampling for Uncertainty-of-Information Minimization in a Remote Monitoring System. 115-120 - Aimin Li, Shaohua Wu, Gary C. F. Lee, Xiaomeng Chen, Sumei Sun:
Sampling to Achieve the Goal: An Age-aware Remote Markov Decision Process. 121-126 - Shuyu Xiao, Xinghua Sun, Wen Zhan, Xijun Wang:
Information Freshness in Random Access Networks with Energy Harvesting. 127-132 - Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam Rutgers:
Timely Offloading in Mobile Edge Cloud Systems. 133-138 - Subhankar Banerjee, Sennur Ulukus:
Age of Information in Multi-Source Broadcast Channel. 139-144 - Yanlin Geng, Xueyan Niu, Bo Bai, Wei Han:
Capacity Bounds of Broadcast Channel with a Full-Duplex Base-User Pair. 145-150 - Qi Cao, Zihan Wu, Guanchong Niu, Yanlin Geng, Baoming Bai:
Zero-Error Capacity of Broadcast Channels with Two Binary Outputs. 151-156 - Recep Can Yavas, Vincent Y. F. Tan:
Variable-Length Feedback Codes Over Known and Unknown Channels with Non-Vanishing Error Probabilities. 157-162 - Elizabath Peter, K. K. Krishnan Namboodiri, B. Sundar Rajan:
Wireless MapReduce Arrays for Coded Distributed Computing. 163-168 - Yanxiao Liu, Cheuk Ting Li:
One-Shot Information Hiding. 169-174 - Yizhou Zhao, Hua Sun:
Secure Summation with User Selection and Collusion. 175-180 - Geoffroy Caillat-Grenier, Andrei E. Romashchenko, Rustam Zyavgarov:
Common Information in Well-Mixing Graphs and Applications to Information-Theoretic Cryptography. 181-186 - Georg Maringer, Antonia Wachter-Zeh:
Reducing Ciphertext and Key Sizes for MLWE-Based Cryptosystems. 187-192 - Haoran Xiong, Zicheng Ye, Huazi Zhang, Jun Wang, Ke Liu, Dawei Yin, Guanghui Wang, Guiying Yan, Zhiming Ma:
Theoretical Bounds for the Size of Elementary Trapping Sets by Graph Theory Methods. 193-198 - Lev Tauz, Debarnab Mitra, Jayanth Shreekumar, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek:
Block-MDS QC-LDPC Codes with Application to High-Dimensional Quantum Key Distribution. 199-204 - Pavan Kumar, Abhi Kumar Sharma, Shayan Srinivasa Garani:
Entanglement-Assisted Quasi-Cyclic LDPC Codes. 205-210 - Guohua Zhang, Yulin Hu, Defeng Ren, Yi Fang:
Explicit Constructions of Girth-Eight QC-LDPC Codes: A Unified Framework Motivated by TDGS. 211-216 - Jiahui Wei, Elsa Dupraz, Philippe Mary:
Practical Coding Schemes based on LDPC Codes for Distributed Parametric Regression. 217-222 - Yue Xia, Christoph Hofmeister, Maximilian Egger, Rawad Bitar:
Byzantine-Resilient Secure Aggregation for Federated Learning Without Privacy Compromises. 223-228 - Chengxi Li, Ming Xiao, Mikael Skoglund:
A Communication-Efficient Semi-Decentralized Approach for Federated Learning with Stragglers. 229-234 - Yu Jiang, Chee-Wei Tan, Kwok-Yan Lam:
FedUHB: Accelerating Federated Unlearning via Polyak Heavy Ball Method. 235-240 - Tianli Gao, Jiahong Lin, Congduan Li, Chee-Wei Tan, Jun Gao:
Federated Learning Meets Network Coding: Efficient Coded Hierarchical Federated Learning. 241-246 - Siyuan Wang, Jianping Wang, Linqi Song:
Addressing Fluctuating Stragglers in Distributed Matrix Multiplication via Fountain Codes. 247-252 - Wenhao Liu, Zhengyi Jiang, Zhongyi Huang, Linqi Song, Hanxu Hou:
On the I/O Cost of Linear Repair Schemes for Arbitrary $(n,k)$ Reed-Solomon Codes. 253-258 - Jiaojiao Wang, Xun Guan:
Rack-Aware Minimum-Storage Regenerating Codes with Optimal Access for Consecutive Node Failures. 259-264 - Yao Tian, Hengfeng Jin, Fang-Wei Fu:
Weight Distributions of Two Classes of Optimal $(r, \delta)$-Locally Repairable Codes. 265-270 - Hao Shi, Zhengyi Jiang, Zhongyi Huang, Bo Bai, Gong Zhang, Hanxu Hou:
Conjugate-Piggybacking Codes: MDS Array Codes with Lower Repair Bandwidth over Small Field Size. 271-276 - Tianren Peng, Xinyi Tong, Shao-Lun Huang:
On the Asymptotic HGR Maximal Correlation of Gaussian Markov Chain. 277-282 - Zijian Yang, Vahe Eminyan, Ralf Schlüter, Hermann Ney:
Refined Statistical Bounds for Classification Error Mismatches with Constrained Bayes Error. 283-288 - Ken Chen, Yanlin Geng:
Convexity Results on Derivative of Negative Fisher Information Along Heat Flow. 289-294 - Guangfeng Yan, Tan Li, Yuanzhang Xiao, Hanxu Hou, Congduan Li, Linqi Song:
Truncated Non-Uniform Quantization for Distributed SGD. 295-300 - Amirmohammad Farzaneh:
An Information-Theoretic Analysis of Temporal GNNs. 301-306 - Jun Zhang, Ziping Zhao:
Improved Stability Bounds for Graph Convolutional Neural Networks Under Graph Perturbations. 307-312 - Shuhao Zhang, Nan Liu, Wei Kang, Haim H. Permuter:
On Verifying Entropic Vectors with Distributions Generated by Neural Networks. 313-318 - Evan Scope Crafts, Xianyang Zhang, Bo Zhao:
Score Matching with Deep Neural Networks: A Non-Asymptotic Analysis. 319-323 - Hyun-Young Park, Seung-Hyun Nam, Si-Hyeon Lee:
No Advantage of Non-Local Cooperation in Distributed Compression of Classical Sources. 324-329 - Hosen Nator, Uzi Pereg:
Coordination Capacity for Classical-Quantum Correlations. 330-335 - Hosen Nator, Uzi Pereg:
Entanglement Coordination Rates in Multi-User Networks. 336-341 - Lin Sok, Martianus Frederic Ezerman, San Ling:
Good Entanglement-Assisted Qubit Codes from Matrix Product Codes. 342-347 - Ling Liu, Shanxiang Lyu, Cong Ling, Baoming Bai:
On the Quantization Goodness of Polar Lattices. 348-353 - Yijun Fan, Fangwei Ye, Raymond W. Yeung:
Lossy Compression for Sparse Aggregation. 354-359 - Tian Jiao, Zhiqiang Wei, Yanlin Geng, Kai Wan, Zai Yang, Giuseppe Caire:
Rate-Distortion Tradeoff of Bistatic Integrated Sensing and Communication. 360-365 - Yuhan Wang, Youlong Wu, Shuai Ma, Ying-Jun Angela Zhang:
Lossy Compression with Data, Perception, and Classification Constraints. 366-371 - Greg Fields, Neha Sangwan, Jack Postlewaite, Saikat Guha, Tara Javidi:
Sequential Hypothesis Testing of Quantum States. 372-377 - Jun Diao, Lin Zhou:
Sequential Outlier Hypothesis Testing under Universality Constraints. 378-383 - Yiming Xing, Shen Yan, Ziming Wang:
High-Dimensional Sequential Testing of Multiple Hypotheses. 384-389 - Waqar Mirza, Nikhil Karamchandani, Niranjan Balachandran:
Cascaded Group Testing. 390-395 - Chao Chen, Nianqi Tang, Yunghsiang S. Han, Baoming Bai, Jiefei Zhang, Wenhao Zhou:
A New Early-Termination Method for the Berlekamp-Massey Algorithm. 396-400 - Gefeng Deng, Zhengyi Jiang, Bo Bai, Gong Zhang, Xiuyin Zhang, Hanxu Hou:
New Reed-Solomon Codes with All XOR Operation for Better En/Decoding Performance. 401-406 - Rongchi Xu, Peiyao Chen, Ling Liu, Min Zhu, Baoming Bai:
Improved Construction for Multiplicative Repetition Based Non-Binary Polar Codes. 407-412 - Jianhan Zhao, Wei Zhang, Yanyan Liu:
Fast Successive-Cancellation Decoding of Polar Codes with Reed-Solomon Kernel. 413-417 - Li Peng
:
Ultra-Low Complexity Communication Algorithms Based on (n, n(n-l), n-l) PGCs. 418-423 - Ruoxi Chong, Shuangyang Li, Zhiqiang Wei, Michail Matthaiou, Derrick Wing Kwan Ng, Giuseppe Caire:
Analysis of Cross-Domain Message Passing for OTFS Transmissions. 424-429 - Abhishek Roy, Sudhan Majhi, Subhabrata Paul:
Systematic Construction of Golay Complementary Sets of Arbitrary Lengths and Alphabet Sizes. 430-435 - Jiuyu Liu, Yi Ma, Rahim Tafazolli:
Fast Iterative ELAA-MIMO Detection Exploiting Static Channel Components. 436-441 - Xiangping Zheng, Xiao Ma:
Locally Constrained Guessing Codeword Decoding of Short Block Codes. 442-447 - Xihao Li, Wenhao Chen, Li Chen, Yuan Li, Huazi Zhang:
Order Skipping Ordered Statistics Decoding and its Performance Analysis. 448-453 - Liudmila Karakchieva, Peter Trifonov:
Reduced Complexity SISO Decoding Algorithm for the First-Order Reed-Muller Codes. 454-459 - Xiao Ma:
Guessing what, Noise or Codeword? 460-465 - Zhongjun Yang, Zuoxin Cai, Li Chen, Huazi Zhang:
An Efficient Adaptive Belief Propagation Decoder for Polar Codes. 466-471 - Mallikharjuna Chinnapadamala, B. Sundar Rajan:
Security, Privacy and Linear Function Retrieval in Multi-Access Combinatorial Topology with Private Cache. 472-477 - Mallikharjuna Chinnapadamala, Charul Rajput, B. Sundar Rajan:
A New Hotplug Coded Caching Scheme Using PDAs. 478-483 - Abhay Kumar Maurya, Charul Rajput, B. Sundar Rajan:
Hierarchical Caching System with Hotplug Model Using HpPDA. 484-489 - Xiaofan Niu, Minquan Cheng, Kai Wan, Robert Caiming Qiu, Giuseppe Caire:
Reflecting Intelligent Surfaces-Assisted Multiple-Antenna Coded Caching. 490-495 - Huimei Wei, Minquan Cheng, Kahin Leung:
A Novel Construction of Coded Caching Schemes with Polynomial Subpacketizations via Projective Geometry. 496-501 - Shurong Zhang, Alban Goupil, Valeriu Vrabie, Eric Perrin, Marie-Laure Panon:
Multispectral Band Selection Using Correlation Explanation for Identification of Discriminative Bands Related to Grapevine Diseases. 502-507 - Kai Wang, Chee Wei Tan, Christopher G. Brinton:
Maximizing User Admittance for Cognitive Satellite-Terrestrial Networks Using ODE-Inspired Spectral Radius Estimation. 508-513 - Hongyuan Yang, Ziping Zhao, Ying Sun:
Geometric Analysis of Non-Convex Optimization Landscapes for Robust M-Estimation of Location. 514-519 - Xinyi Ni, Lifeng Lai:
Robust Risk-Sensitive Reinforcement Learning with Conditional Value-at-Risk. 520-525 - Tianren Peng, Xinyi Tong, Shao-Lun Huang:
The Second-Order Perspectives of Minimax Parameter Estimation in Restricted Space with Weighted Squared Error Loss. 526-531 - Lingyi Chen, Shitong Wu, Sicheng Xu, Wenyi Zhang, Huihui Wu:
Neural Estimation of the Information Bottleneck Based on a Mapping Approach. 532-536 - Youheng Zhu, Yuheng Bu:
Information-Theoretic Analysis of the Gibbs Algorithm: An Individual Sample Approach. 537-542 - Weida Wang, Tao Shi, Yaoyuan Liang, Xinyi Tong, Shao-Lun Huang:
A Non-asymptotic Framework for Characterizing Dependency Structures in Multimodal Learning. 543-548 - Shohei Satake:
On the Paley RIP and Paley Graph Extractor. 549-554 - Meiyun Huang, Longguang Li:
Capacity Bounds on Optical Wireless Relay Channels. 555-560 - Ian George, Alice Zheng, Akshay Bansal:
Divergence Inequalities from Multivariate Taylor's Theorem. 561-566 - Hao-Chung Cheng
, Baris Nakiboglu
:
Augustin Information in the Vicinity of Augustin Capacity-Achieving Input Distributions. 567-572 - Xiang Zhang, Kai Wan, Hua Sun, Shiqiang Wang, Mingyue Ji, Giuseppe Caire:
Optimal Rate Region for Key Efficient Hierarchical Secure Aggregation with User Collusion. 573-578 - Mustafa Doger, Sennur Ulukus, Nail Akar:
PoW Security-Latency Under Random Delays and the Effect of Transaction Fees. 579-584 - Ling Jiang, Yujie Gu, Jinping Fan, Ying Miao:
Existence and Algorithmic Construction of $q$-ary Secure Codes with List Decoding. 585-590 - Vamoua Yachongka, Rémi A. Chou:
Secret-Key Generation with PUFs and Biometric Identifiers for Compound Authentication Channels. 591-596 - Ran Li, Fang-Wei Fu:
On the New Rank Metric Codes Related to Gabidulin Codes. 597-602 - Rohit Premlal, B. Sundar Rajan:
On Function-Correcting Codes. 603-608 - Minhan Gao, Kenneth W. Shum:
Computer Formalization of Deletion-Correcting Permutation Codes. 609-614 - Shobhit Bhatnagar, P. Vijay Kumar:
A Tighter Distance Upper-Bound for Gottesman-Kitaev-Preskill Codes. 615-620 - Ziyang Lu, Han Mao Kiah, Yiwei Zhang, Robert N. Grass, Eitan Yaakobi:
Coding for Synthesis Defects. 621-626 - Chen Wang, Eitan Yaakobi, Yiwei Zhang:
How to Find Simple Conditions for Successful Sequence Reconstruction? 627-632 - Amit Zrihan, Eitan Yaakobi, Zohar Yakhini:
Studying the Cycle Complexity of DNA Synthesis. 633-638 - Vivian Papadopoulou, V Arvind Rameshwar, Antonia Wachter-Zeh:
On the Expected Number of Views Required for Fixed-Error Sequence Reconstruction. 639-644 - Emmanouil M. Athanasakos, Samir M. Perlaza:
Leveraging Noisy Observations in Zero-Sum Games. 645-650 - Masahito Hayashi:
Non-Iterative Algorithm for Channel Capacity. 651-656 - Liuquan Yao, Shuai Yuan, Yuan Li, Jun Wang, Guiying Yan, Zhiming Ma:
Achievability Bounds on Unequal Error Protection Codes. 657-662 - Masoud Kavian, Mohammad Mahdi Mojahedian, Mohammad Hossein Yassaee, Mahtab Mirmohseni, Mohammad Reza Aref:
Statistics of Random Binning Based on Tsallis Divergence. 663-668 - Dengfeng Xia, Han Deng, Peng Xu, Bin Dai:
Sum-Capacity for Symmetric Finite-State Gaussian Multiple Access Channel with Delayed Feedback. 669-674 - Han Deng, Dengfeng Xia, Peng Xu, Bin Dai:
Gaussian Relay Channel with Noiseless Feedback: Revisit. 675-680 - Yuhan Yang, Han Deng, Peng Xu, Bin Dai:
Efficient Coding for Computation Over Gaussian Multiple-Access Channel with Noiseless/Noisy Feedback. 681-686 - Mengyuan Zhao, Maël Le Treust, Tobias J. Oechtering:
Causal Vector-Valued Witsenhausen Counterexamples with Feedback. 687-692 - Meir Lederman, Uzi Pereg:
Semantic Security with Unreliable Entanglement Assistance: Interception and Loss. 693-698 - Guangfeng Yan, Shanxiang Lyu, Hanxu Hou, Zhiyong Zheng, Linqi Song:
Towards Quantum-Safe Distributed Learning via Homomorphic Encryption: Learning with Gradients. 699-704 - Mohamed Nomeir, Alptug Aytekin, Sennur Ulukus:
Quantum $X$-Secure $B$-Byzantine $T$-Colluding Private Information Retrieval. 705-710 - Hassan ZivariFard, Rémi A. Chou, Xiaodong Wang:
Covert Communication with Positive Rate Over State-Dependent Quantum Channels. 711-716 - Gretchen L. Matthews, Pedro Soto:
Algebraic Geometric Rook Codes for Coded Distributed Computing. 717-722 - Jesús Gómez-Vilardebó, Burak Hasircioglu, Deniz Gündüz:
Generalized Multivariate Polynomial Codes for Distributed Matrix-Matrix Multiplication. 723-728 - Zhengrui Li, Wai Ho Mow, Yunghsiang S. Han, Yunqi Wan:
Optimal Bandwidth for All-Linear-Reduce Operation. 729-734 - Qin Zhou, Fang-Wei Fu:
Network Function Computation for Vector Linear Functions. 735-740 - Qi-yue Yu, Shi-wen Lin, Shu Lin:
Finite Field Multiple Access for Sourced Massive Random Access with Finite Blocklength. 741-746 - Xinwei Li, Lingyi Chen, Shitong Wu, Huihui Wu, Hao Wu, Wenyi Zhang:
Alternating Maximization Algorithm for Mismatch Capacity with Oblivious Relaying. 747-752 - Hoover H. F. Yin, Jie Wang:
Sparse Degree Optimization for BATS Codes. 753-758 - Pedro Soto:
Random Alloy Codes and the Fundamental Limits of Coded Distributed Tensors. 759-764 - Abhishek Sarkar, Bikash Kumar Dey:
Identification via Binary Uniform Permutation Channel. 765-770 - Chao Zhao, Ali Al-Bashabsheh, Chung Chan:
Detecting Informationally-Dense Subsets. 771-776 - Sharareh Alipour, Amin Gohari, Mehrshad Taziki:
Relative Fractional Independence Number. 777-782 - Yaning Zhao, Wafa Labidi, Holger Boche, Eduard A. Jorswieck, Christian Deppe:
Identification via Gaussian Multiple Access Channels in the Presence of Feedback. 783-788

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.