


default search action
ISIT 2021: Melbourne, Australia
- IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021. IEEE 2021, ISBN 978-1-5386-8209-8
- Siyao Li
, Daniela Tuninetti, Natasha Devroye
:
A Control-Theoretic Linear Coding Scheme for the Fading Gaussian Broadcast Channel with Feedback. 1-6 - Oron Sabag
, Victoria Kostina
, Babak Hassibi:
Feedback Capacity of MIMO Gaussian Channels. 7-12 - Rajesh K. Mishra, Deepanshu Vasal, Hyeji Kim:
Linear Coding for AWGN Channels with Noisy Output Feedback via Dynamic Programming. 13-18 - Julian Renner, Sven Puchinger, Antonia Wachter-Zeh:
Decoding High-Order Interleaved Rank-Metric Codes. 19-24 - Sven Puchinger, Julian Renner, Antonia Wachter-Zeh, Jens Zumbrägel:
Efficient Decoding of Gabidulin Codes over Galois Rings. 25-30 - Wrya K. Kadir
, Chunlei Li, Ferdinando Zullo
:
On interpolation-based decoding of a class of maximum rank distance codes. 31-36 - Mohammad Mahdi Mahvari, Mari Kobayashi, Abdellatif Zaidi:
Scalable Vector Gaussian Information Bottleneck. 37-42 - Teng-Hui Huang
, Aly El Gamal:
A Provably Convergent Information Bottleneck Solution via ADMM. 43-48 - Yuheng Bu
, Tony Wang, Gregory W. Wornell:
SDP Methods for Sensitivity-Constrained Privacy Funnel and Information Bottleneck Problems. 49-54 - Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Philippe Gaborit:
Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes. 55-60 - Khaled Taleb, Meryem Benammar:
On the information leakage of finite block-length wiretap polar codes. 61-65 - Xuan Guang, Yang Bai, Raymond W. Yeung:
Secure Network Function Computation. 66-71 - Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang
:
Network Coding with Myopic Adversaries. 72-77 - Qifa Yan, Daniela Tuninetti:
Robust and Secure Cache-aided Private Linear Function Retrieval from Coded Servers. 78-83 - Emna Ben Yacoub:
List Message Passing Decoding of Non-binary Low-Density Parity-Check Codes. 84-89 - Mengnan Xu, Dan Zeng, Zhichao Sheng, Zhonghao Zhang, Chongbin Xu:
Some Results on Density Evolution of Nonbinary SC-LDPC Ensembles Over the BEC. 90-95 - Gada Rezgui, Iryna Andriyanova, Asma Maaloui, Charly Poulliat:
A Class of Non-Binary Doubly-Generalized LDPC codes for Moderate and High Code Rates. 96-100 - Taposh Banerjee, Ahmad F. Taha, Eugene John:
Robust Quickest Change Detection in Statistically Periodic Processes. 101-105 - Zhongchang Sun, Shaofeng Zou:
Quickest Dynamic Anomaly Detection in Anonymous Heterogeneous Sensor Networks. 106-111 - Qunzhi Xu, Yajun Mei:
Multi-Stream Quickest Detection with Unknown Post-Change Parameters Under Sampling Control. 112-117 - Andreas Bluhm, Ángela Capel
, Zentrum Mathematik, Antonio Pérez-Hernández
:
Weak Quasi-Factorization for the Belavkin-Staszewski Relative Entropy. 118-123 - Touheed Anwar Atif, S. Sandeep Pradhan:
Distributed Quantum Faithful Simulation and Function Computation Using Algebraic Structured Measurements. 124-129 - Anurag Anshu, Shima Bab Hadiashar, Rahul Jain, Ashwin Nayak, Dave Touchette:
One-Shot Quantum State Redistribution and Quantum Markov Chains. 130-135 - Ke Wu, Aaron B. Wagner:
A Practical Coding Scheme for the BSC with Feedback. 136-141 - Amaael Antonini, Rita Gimelshein, Richard D. Wesel:
Causal (Progressive) Encoding over Binary Symmetric Channels with Noiseless Feedback. 142-147 - Nian Guo
, Victoria Kostina
:
Instantaneous SED coding over a DMC. 148-153 - Sven Puchinger, Johan Rosenkilde:
Bounds on List Decoding of Linearized Reed-Solomon Codes. 154-159 - Hannes Bartz, Sven Puchinger:
Decoding of Interleaved Linearized Reed-Solomon Codes with Applications to Network Coding. 160-165 - Ba-Duc Pham, Pierre Loidreau:
On the decoding of the sum of Gabidulin codes. 166-171 - Jiachun Pan, Yonglong Li, Vincent Y. F. Tan:
Asymptotics of Sequential Composite Hypothesis Testing under Probabilistic Constraints. 172-177 - Sung-Wen Lan, I-Hsiang Wang:
Heterogeneous Sequential Hypothesis Testing with Active Source Selection under Budget Constraints. 178-183 - Parham Boroumand, Albert Guillén i Fàbregas:
Error Exponent Sensitivity of Sequential Probability Ratio Testing. 184-189 - Shi-Yuan Wang, Matthieu R. Bloch:
Explicit Design of Provably Covert Channel Codes. 190-195 - Meng-Che Chang, Matthieu R. Bloch:
Covert Authentication Against a Myopic Adversary. 196-201 - Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Covert Communication via Non-Causal Cribbing from a Cooperative Jammer. 202-207 - Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab:
Broadcast Rate Requires Nonlinear Coding in a Unicast Index Coding Instance of Size 36. 208-213 - Prasad Krishnan, Rogers Mathew, Subrahmanyam Kalyanasundaram
:
Pliable Index Coding via Conflict-Free Colorings of Hypergraphs. 214-219 - Kota Srinivas Reddy
, Nujoom Sageer Karat, Nikhil Karamchandani:
On the Optimal Transmission Rate for Symmetric Index Coding Problems. 220-225 - Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek:
Euclidean Distance Spectra of Irregular NB LDPC Coded QAM Signals with Optimized Mappings. 226-231 - Tadashi Wadayama, Satoshi Takabe:
Proximal Decoding for LDPC-coded Massive MIMO Channels. 232-237 - Ilya Dumer
, Navid Gharavi:
Codes approaching the Shannon limit with polynomial complexity per information bit. 238-243 - Eli Chien, Olgica Milenkovic, Angelia Nedich:
Support Estimation with Sampling Artifacts and Errors. 244-249 - Fumito Tagashira, Tomoyuki Obuchi, Toshiyuki Tanaka:
Sharp Asymptotics of Matrix Sketching for a Rank-One Spiked Model. 250-255 - Stefano Della Fiore, Simone Costa, Marco Dalai
:
New upper bounds for (b, k)-hashing. 256-261 - Rahul Jain:
Chain-Rules for Channel Capacity. 262-267 - Uzi Pereg:
Bosonic Dirty Paper Coding. 268-271 - Omar Fawzi
, Ala Shayeghi, Hoang Ta:
A hierarchy of efficient bounds on quantum capacities exploiting symmetry. 272-277 - Wafa Labidi, Holger Boche, Christian Deppe, Moritz Wiese:
Identification over the Gaussian Channel in the Presence of Feedback. 278-283 - Alireza Vahid:
Distortion-Based Outer-Bounds for Channels with Rate-Limited Feedback. 284-289 - V Arvind Rameshwar
, Navin Kashyap:
Bounds on the Feedback Capacity of the ($d, \infty$)-RLL Input-Constrained Binary Erasure Channel. 290-295 - Yang Xu, Haibin Kan, Guangyue Han:
Fourier-Reflexive Partitions Induced by Poset Metric. 296-301 - Dor Elimelech, Marcelo Firer, Moshe Schwartz:
The Generalized Covering Radii of Linear Codes. 302-307 - Takayuki Nozaki
:
Distance Enumerators for Number-Theoretic Codes. 308-313 - Xiangxiang Xu, Shao-Lun Huang:
An Information Theoretic Framework for Distributed Learning Algorithms. 314-319 - Basak Güler, Aylin Yener:
Energy-Harvesting Distributed Machine Learning. 320-325 - Jayadev Acharya, Clément L. Canonne, Yuhan Liu, Ziteng Sun, Himanshu Tyagi:
Interactive Inference under Information Constraints. 326-331 - Jeremiah Blocki
, Elena Grigorescu, Tamalika Mukherjee:
Differentially-Private Sublinear-Time Clustering. 332-337 - Antonious M. Girgis
, Deepesh Data, Suhas N. Diggavi:
Differentially Private Federated Learning with Shuffling and Client Self-Sampling. 338-343 - Shahab Asoodeh, Wei-Ning Chen
, Flávio P. Calmon
, Ayfer Özgür:
Differentially Private Federated Learning: An Information-Theoretic Perspective. 344-349 - Hui Zhao, Antonio Bazco Nogueras, Petros Elia:
Wireless Coded Caching With Shared Caches Can Overcome the Near-Far Bottleneck. 350-355 - Rina Su, Qifu Tyler Sun, Zhongshan Zhang:
On the Delay of Random Linear Network Coding in Full-Duplex Relay Networks. 356-361 - Juwendo Denis, Hulya Seferoglu:
Efficient network coding scheme for disjoint clusters of D2D networks and cellular communications. 362-367 - Farzane Amirzade, Mohammad-Reza Sadeghi, Daniel Panario
:
Quasi-Cyclic Protograph-Based Raptor-Like LDPC Codes With Girth 6 and Shortest Length. 368-373 - Huaan Li, Baoming Bai, Hengzhou Xu, Chao Chen:
Construction of Algebraic-Based Variable-Rate QC-LDPC Codes. 374-379 - Roxana Smarandache, David G. M. Mitchell:
Necessary and Sufficient Girth Conditions for Tanner Graphs of Quasi-Cyclic LDPC Codes. 380-385 - Liyan Xie, Yao Xie:
Optimality of Graph Scanning Statistic for Online Community Detection. 386-390 - Changlong Wu, Narayana Santhanam:
Estimating Properties of Dynamic Graphical Models. 391-395 - Lan V. Truong:
Linear Models with Hidden Markov Sources via Replica Method. 396-401 - Masahito Hayashi, Ning Cai
:
Universal classical-quantum multiple access channel coding. 402-407 - Haowei Shi, Min-Hsiu Hsieh
, Saikat Guha, Zheshen Zhang, Quntao Zhuang:
Entanglement-assisted multiple-access channels: capacity regions and protocol designs. 408-413 - Touheed Anwar Atif, Arun Padakandla, S. Sandeep Pradhan:
Computing Sum of Sources over a Classical-Quantum MAC. 414-419 - Wael Alghamdi, Flávio P. Calmon
:
Polynomial Approximations of Conditional Expectations in Scalar Gaussian Channels. 420-425 - Antonino Favano, Marco Ferrari
, Maurizio Magarini, Luca Barletta:
The Capacity of the Amplitude-Constrained Vector Gaussian Channel. 426-431 - Shuai Ma, Michèle A. Wigger:
First- and Second-Moment Constrained Gaussian Channels. 432-437 - Hiram H. López
, Gretchen L. Matthews
, Daniel Valvo:
Augmented Reed-Muller Codes of High Rate and Erasure Repair. 438-443 - Changjiang Ji, Yan Xu, Sihuang Hu
:
Extended Cyclic Codes Sandwiched Between Reed-Muller Codes. 444-449 - Maiara F. Bollauf
, Øyvind Ytrehus:
Tiling of Constellations. 450-454 - Yandong Shi, Yong Zhou, Yuanming Shi:
Over-the-Air Decentralized Federated Learning. 455-460 - Emre Ozfatura, Kerem Ozfatura, Deniz Gündüz:
Time-Correlated Sparsification for Communication-Efficient Federated Learning. 461-466 - Emre Ozfatura, Kerem Ozfatura, Deniz Gündüz:
FedADC: Accelerated Federated Learning with Drift Control. 467-472 - Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi:
Differential Privacy for Binary Functions via Randomized Graph Colorings. 473-478 - Jun Xu, Xiaodong Wang, Pengcheng Zhu, Xiaohu You:
Joint Differentially Private Channel Estimation in Cell-free Hybrid Massive MIMO. 479-484 - Sayak Ray Chowdhury
, Xingyu Zhou, Ness B. Shroff:
Adaptive Control of Differentially Private Linear Quadratic Systems. 485-490 - Jiun-Ting Huang, Young-Han Kim:
Two-Way Token Passing Channels. 491-496 - Vinayak Suresh, Eric Ruzomberka, David J. Love:
Stochastic-Adversarial Channels: Online Adversaries With Feedback Snooping. 497-502 - Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Compound Arbitrarily Varying Channels. 503-508 - Sven Puchinger, Johan Rosenkilde, Grigory Solomatov:
Improved Power Decoding of Algebraic Geometry Codes. 509-514 - Gretchen L. Matthews
, Aidan W. Murphy, Welington Santos:
Fractional decoding of codes from Hermitian curves. 515-520 - Yunqi Wan, Li Chen, Fangguo Zhang
:
Algebraic Soft Decoding of Elliptic Codes. 521-526 - Sanae Amani, Mahnoosh Alizadeh, Christos Thrampoulidis:
Regret Bounds for Safe Gaussian Process Bandit Optimization. 527-532 - Chengshuai Shi, Cong Shen:
An Attackability Perspective on No-Sensing Adversarial Multi-player Multi-armed Bandits. 533-538 - Cem Kalkanli, Ayfer Özgür:
Asymptotic Performance of Thompson Sampling in the Batched Multi-Armed Bandits. 539-544 - Shahab Asoodeh, Maryam Aliakbarpour
, Flávio P. Calmon
:
Local Differential Privacy Is Equivalent to Contraction of an $f$-Divergence. 545-550 - Ni Ding, Yucheng Liu, Farhad Farokhi
:
A Linear Reduction Method for Local Differential Privacy and Log-lift. 551-556 - Milan Lopuhaä-Zwakenberg
, Jasper Goseling:
Robust Local Differential Privacy. 557-562 - Lakshmi Prasad Natarajan, Smiju Kodamthuruthil Joy:
Permute & Add Network Codes via Group Algebras. 563-568 - Liwen Liu, Jinbei Zhang, Xinyu Xie:
Intension between Two Layers of Coded Caching Networks. 569-574 - Arman Sharififar, Neda Aboutorab, Parastoo Sadeghi:
Update-based Maximum Column Distance Coding Scheme for Index Coding Problem. 575-580 - Min Qiu
, Xiaowei Wu, Jinhong Yuan, Alexandre Graell i Amat:
Generalized Spatially Coupled Parallel Concatenated Convolutional Codes With Partial Repetition. 581-586 - Siyi Yang, Ahmed H. Hareedy
, Shyam Venkatasubramanian, A. Robert Calderbank, Lara Dolecek:
GRADE-AO: Towards Near-Optimal Spatially-Coupled Codes With High Memories. 587-592 - Toshiaki Koike-Akino, Ye Wang:
Protograph-Based Design for QC Polar Codes. 593-598 - Zhongchang Sun, Qunwei Li, Ruizhi Zhang, Shaofeng Zou:
A Computationally Efficient Algorithm for Quickest Change Detection in Anonymous Heterogeneous Sensor Networks. 599-604 - Anamitra Chaudhuri, Georgios Fellouris, Ali Tajer:
Sequential Change Detection of a Correlation Structure under a Sampling Constraint. 605-610 - Sundara Rajan Srinivasavaradhan, Pavlos Nikolopoulos, Christina Fragouli, Suhas N. Diggavi:
An entropy reduction approach to continual testing. 611-616 - Rémi A. Chou
:
Private Classical Communication over Quantum Multiple-Access Channels. 617-622 - Sayantan Chakraborty, Aditya Nema, Pranab Sen:
A multi-sender decoupling theorem and simultaneous decoding for the quantum MAC. 623-627 - Sayantan Chakraborty, Aditya Nema, Pranab Sen:
Novel one-shot inner bounds for unassisted fully quantum channels via rate splitting. 628-633 - Neil Irwin Bernardo, Jingge Zhu
, Jamie S. Evans:
Is Phase Shift Keying Optimal for Channels with Phase-Quantized Output? 634-639 - Andrea Cacioppo
, Janis Nötzel, Matteo Rosati
:
Compound Channel Capacities under Energy Constraints and Application. 640-645 - Thuan Nguyen, Thinh Nguyen:
Optimal Thresholding Quantizer Maximizing Mutual Information of Discrete Multiple-Input Continuous One-Bit Output Quantization. 646-651 - Jiasheng Yuan, Jiongyue Xing, Li Chen:
Plausibility Analysis of Shift-Sum Decoding for Cyclic Codes. 652-657 - Thomas Jerkovits, Vladimir Sidorenko, Antonia Wachter-Zeh:
Decoding of Space-Symmetric Rank Errors. 658-663 - Hedongliang Liu, Sabine Pircher, Alexander Zeh, Antonia Wachter-Zeh:
Decoding of (Interleaved) Generalized Goppa Codes. 664-669 - Ruida Zhou, Chao Tian, Tie Liu
:
Individually Conditional Individual Mutual Information Bound on Generalization Error. 670-675 - Pradeep Kr. Banerjee, Guido Montúfar:
Information Complexity and Generalization Bounds. 676-681 - Gholamali Aminian, Laura Toni, Miguel R. D. Rodrigues:
Information-Theoretic Bounds on the Moments of the Generalization Error of Learning Algorithms. 682-687 - Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication With Adversary Identification in Byzantine Multiple Access Channels. 688-693 - Hua Sun:
Compound Secure Groupcast: Key Assignment for Selected Broadcasting. 694-699 - Matthias Frey
, Igor Bjelakovic, Slawomir Stanczak:
Towards Secure Over-The-Air Computation. 700-705 - K. K. Krishnan Namboodiri, B. Sundar Rajan:
Optimal Demand Private Coded Caching for Users with Small Buffers. 706-711 - Hamidreza Bakhshzad Mahmoodi, Mohammad Javad Salehi, Antti Tölli:
Non-Symmetric Coded Caching for Location-Dependent Content Delivery. 712-717 - Eleftherios Lampiris, Hamdi Joudeh, Giuseppe Caire, Petros Elia:
Coded Caching under Asynchronous Demands. 718-723