


default search action
ISIT 2025: Ann Arbor, MI, USA
- IEEE International Symposium on Information Theory, ISIT 2025, Ann Arbor, MI, USA, June 22-27, 2025. IEEE 2025, ISBN 979-8-3315-4399-0

- Lei Liu, Yuhao Chi, Shunqi Huang:

Random Modulation: Achieving Asymptotic Replica Optimality Over Arbitrary Norm-Bounded and Spectrally Convergent Channel Matrices. 1-6 - Chandra Nair, Jinpei Zhao:

Proof of a Conjecture on the Gaussian Signaling Region for the Gaussian Z-Interference Channel. 1-6 - Ludovico Lami:

A Solution of the Generalised Quantum Stein's Lemma. 1-6 - Haolun Michael Ni, Lev Tauz, Ryan Gabrys, Lara Dolecek:

Improved Interactive Protocol for Synchronizing from Deletions. 1-6 - Milad Sefidgaran, Abdellatif Zaidi:

Multi-View Representation Learning Regularizer with Gaussian-Product Mixture Prior. 1-6 - Siyao Li, Shuangyang Li, Giuseppe Caire:

On the Sensing Capacity of Gaussian "Beam-Pointing" Channels with Block Memory and Feedback. 1-6 - Kenta Takahashi, Wanaru Nakamura:

(Quasi-)Linear-Time Algorithms for the Closest Vector Problem in (Semi-)Equiangular Lattices. 1-6 - Dongxiao Xu, Xinyang Li, Vlad-Costin Andrei, Moritz Wiese, Ullrich J. Mönich, Holger Boche:

$S E(3)$-Based Trajectory Optimization and Target Tracking in UAV-Enabled ISAC Systems. 1-6 - Ruoyu Meng, Aditya Ramamoorthy:

Quantum Advantage in Zero-Error Function Computation with Side Information. 1-6 - Vinayak Ramkumar, M. Nikhil Krishnan, Myna Vajha:

Streaming Codes for Multi-Hop Relay Networks with Burst Erasures. 1-6 - Yun-Han Li, Jin Sima, Ilan Shomorony, Olgica Milenkovic:

Fragmentation in Data Deduplication Systems II: The Jump Metric. 1-6 - Byung-Jae Kwak, Jinkyeong Kim, Jungho Myung, Young-Jo Ko:

Optimized Non-Matched Correlator Design for Enhanced Primary Synchronization Signal Detection in Fifth Generation New Radio. 1-6 - Roni Con:

Anonymous Shamir's Secret Sharing via Reed-Solomon Codes Against Permutations, Insertions, and Deletions. 1-6 - Yanxiao Liu, Sepehr Heidari Advary, Cheuk Ting Li:

Nonasymptotic Oblivious Relaying and Variable-Length Noisy Lossy Source Coding. 1-6 - Serge Kas Hanna:

On the Reliability of Information Retrieval from MDS Coded Data in DNA Storage. 1-6 - Xing Gao, Lev Reyzin:

Non-Center-Based Clustering Under Bilu-Linial Stability. 1-5 - Nir Luria, Nir Weinberger:

Optimal Overlap Detection of Shotgun Reads. 1-6 - Haodong Yang, Qiwen Zhu, Venkata Gandikota:

Sublinear-time Support Recovery in One-bit Compressed Sensing. 1-6 - Majid Daliri, Christopher Musco, Ananda Theertha Suresh:

Coupling Without Communication and Drafter-Invariant Speculative Decoding. 1-6 - Roni Con, João Ribeiro:

Channels with Input-Correlated Synchronization Errors. 1-6 - Emrecan Kutay, Aylin Yener:

Perception - Aware Clustering. 1-6 - Chen Peng, Urbashi Mitra:

Causal Graph Identification Under Soft Intervention. 1-6 - Amin Gohari, Yi Liu, Chandra Nair:

A Conjecture Regarding the Optimizers of Marton's Inner Bound for the Two-Receiver Broadcast Channel. 1-6 - Jun Muramatsu:

Unification of Distributed Source Coding, Multiple Description Coding, and Source Coding with Side Information at Decoders. 1-6 - Anton Tchaplianka, Meir Feder:

Twice-Universal Prediction in Over-Parameterized Linear Regression. 1-6 - Namhyun Kim, Jeonghun Park:

Robust Precoding and Rate-Splitting Multiple Access for FDD Massive MIMO Without CSI Feedback. 1-6 - Yinbin Ma, Daniela Tuninetti:

An Achievable Scheme for the K-User Linear Computation Broadcast Channel. 1-6 - Connor Ding, Abhiram Rao Gorle, Sagnik Bhattacharya, Divija Hasteer, Naomi Sagan, Tsachy Weissman:

LzMidi: Compression-Based Symbolic Music Generation. 1-6 - Mingchen Jiang, Peng Xu, Xichen Ye, Yun Yang, Yifan Chen:

Embedding Empirical Distributions for Computing Optimal Transport Maps. 1-6 - Alfredo De la Fuente, Saurabh Singh, Jona Ballé:

Discretized Approximate Ancestral Sampling. 1-6 - Haodong Yang, Venkata Gandikota, Nikita Polyanskii:

Combinatorial Group Testing With Adversarial Deletions. 1-6 - Tamoghno Nath, Krishna Gopal Banerjee, Adrish Banerjee:

Improved Performance with $\alpha, \beta$-Constrained Transmission: A Family of High-Rate Codes $\mathcal{C}_{\alpha, \beta}^{(n)}$ for Molecular Communication via Diffusion. 1-6 - Zhengyi Jiang, Hao Shi, Zhongyi Huang, Bo Bai, Gong Zhang, Hanxu Hou:

Constructions of Analog Error-Correcting Codes for Single-Error Detection and Correction with Efficient Decoding Algorithm. 1-6 - G. Krishnakumar, Abhishek Sinha:

Minimizing Queue Length Regret for Arbitrarily Varying Channels. 1-6 - Soham Ravikant Joshi, Shikha Patel, Om Prakash:

Construction of New Codes Over $\mathbb{F}_{16}$ From Cyclic Codes Over $\mathcal{M}_{4}(\mathbb{F}_{2}+u\mathbb{F}_{2}+u^{2}\mathbb{F}_{2})$. 1-5 - Zhiwei Shan, Xinping Yi, Chung-Shou Liao, Shi Jin, Giuseppe Caire:

Unfolding FPLinQ with Graph Reinforcement Learning for D2D Spectrum Sharing. 1-6 - Rodrigo Cruz, Mario Díaz, Flávio P. Calmon:

Tensorization of $f$-Divergences. 1-6 - Mo Li, Yanyan Dong, Ximing Fu:

Synchronous BFT Under an Information Theoretic Setting with Private Observations. 1-6 - Daria Tieplova, Jean Barbier, Samriddha Lahiry:

Information-Theoretic Limits and Approximate Message-Passing for High-Dimensional Time Series. 1-6 - Xinyang Li, Ziyou Tang, Vlad-Costin Andrei, Ullrich J. Mönich, Fan Liu, Holger Boche:

Computation of Capacity-Distortion-Cost Functions for Continuous Memoryless Channels. 1-6 - Mohammad Ali Maddah-Ali, Soheil Mohajer:

The Mystery of an Infinite-Size Constellation: Applications in Few-Shot Communication. 1-6 - Xi Zhong

, Samuel Lu, Jörg Kliewer, Mingyue Ji:
Uncoded Download in Lagrange-Coded Elastic Computing with Straggler Tolerance. 1-6 - Malhar Managoli, K. R. Sahasranand, Vinod M. Prabhakaran:

Error Exponents for Robust Hypothesis Testing with Abstention. 1-6 - Oguzhan Kubilay Ülger, Elza Erkip:

On Source Coding for Stationary Sources Under Logarithmic Loss. 1-6 - Ruslan Morozov, Tolga M. Duman:

Simple Converse Bounds on the Deletion Channel Capacity with Finite Block Lengths. 1-6 - Lina Liu, Dongning Guo:

Hybrid Beamforming Aided by Full-Dimension One-Bit Chains. 1-6 - Charalambos D. Charalambous:

Dynamic Programming and Information States for Decentralized Stochastic Control with Delayed Sharing Patterns. 1-6 - Yifei Shen, Zongyao Li

, Emmanuel Boutillon, Wenqing Song, Yuqing Ren, Chuan Zhang, Xiaohu You, Andreas Burg:
Belief Propagation Decoding for Short Codes on Structured Sparse Parity-Check Matrices. 1-6 - Srivathsa Acharya, P. Vijay Kumar, Viveck R. Cadambe:

Chromatic Codes for Latency Optimal Geo-Distributed Storage. 1-6 - Shlomi Vituri, Meir Feder:

Constrained Universal Learning Under Misspecification. 1-6 - Jiwei Liang, Li Chen:

Algebraic Soft Decoding of Hermitian Codes with Re-Encoding Transform. 1-6 - Sifat Munim, Aditya Ramamoorthy:

Communication-Efficient Approximate Gradient Coding Using Structured Matrices. 1-6 - Ling Liu, Ruimin Yuan, Shanxiang Lyu, Cong Ling, Baoming Bai:

Construction of Simultaneously Good Polar Codes and Polar Lattices. 1-6 - Hamidreza Abin, Amin Gohari:

On the Source Model Key Agreement Problem. 1-6 - Carol Xuan Long, Dor Tsur, Claudio Mayrink Verdun, Hsiang Hsu, Haim H. Permuter, Flávio P. Calmon:

Optimized Couplings for Watermarking Large Language Models. 1-6 - Zhuoqi Tu, Yi Chen, Shenghao Yang:

A Network Coding-Based Approach to Floating-Point Sum Reduction. 1-6 - Mahshad Shariatnasab, Stefano Rini, Farhad Shirani, S. Sitharama Iyengar:

The Query/Hit Model for Sequential Hypothesis Testing. 1-6 - Akira Kamatsuka, Koki Kazama, Takahiro Yoshida:

Alternating Optimization Approach for Computing $\alpha - \text{Mutual}$ Information and $\alpha$-Capacity. 1-6 - Jonathan Mandelbaum, Holger Jäkel, Laurent Schmalen:

Subcode Ensemble Decoding of Linear Block Codes. 1-6 - Rashid Ummer N. T., B. Sundar Rajan:

D2D Coded Caching Schemes for Multiaccess Networks with Combinatorial Access Topology. 1-6 - Kumar Subodh, Priyanshu Gautam, Amitalok J. Budkuley:

Probing-Based Sequential Decision Making Under Cognitive Limitations. 1-6 - Anthony Gómez-Fonseca:

Construction of QC-LDPC Codes with Girth $g$ from the Hermite Normal Form of a Matrix. 1-6 - Aditya Prakash, Tzu-Chieh Kao, Sudhan Majhi, Prashant Kumar Srivastava, Chao-Yu Chen:

Function-Based Construction of Two-Dimensional Binary Golay-ZCZ Array Pair of Length Non-Power-of-Two. 1-6 - Manabu Hagiwara:

Quantum Multi Deletion Codes Derived from Quantum Reed-Solomon Codes. 1-6 - Zikun Tan, Ron Dabora, H. Vincent Poor:

The Rate-Distortion Function for Sampled Cyclostationary Gaussian Processes with Memory and with Bounded Processing Delay. 1-6 - Avijit Mandal, Henry D. Pfister:

Reed-Muller Codes on CQ Channels via a New Correlation Bound for Quantum Observables. 1-6 - Gabriel Sac Himelfarb, Moshe Schwartz:

Improved Constructions of Skew-Tolerant Gray Codes. 1-6 - Mauro M. M. Costantino, Massimo Battaglioni, David G. M. Mitchell:

A Strategy to Detect Error Propagation in Sliding Window Decoding of SC-LDPC Codes. 1-6 - Taha Ameen, Bruce E. Hajek:

Exact Random Graph Matching with Multiple Graphs. 1-6 - Johan Vester Dinesen, Eimear Byrne, Ragnar Freij-Hollanti, Camilla Hollanti:

Secret Sharing in the Rank Metric. 1-6 - Idan Dekel, Yaron Shany, Ariel Doubchak, Amit Berman

:
Efficient Polar Systematic Encoding Without the Domination Contiguity Property. 1-6 - Yun-Peng Li, Hans-Andrea Loeliger:

Dual Nup Representations and Min-Maximization in Factor Graphs. 1-6 - Peter Beelen, Roni Con, Anina Gruica, Maria Montanucci, Eitan Yaakobi:

Reed-Solomon Codes Against Insertions and Deletions: Full-Length and Rate-1/2 Codes. 1-6 - Daniel T. Chen, Andrew W. Eckford, Peter J. Thomas:

Capacity of a Class of Fully Observed Multistate Poisson-Type Signal Transduction Channels. 1-6 - Gangsan Kim, Hong-Yeop Song:

Uncorrelated ZCZ Sequence Families Over PSK/PSK+ Alphabet of Small Size Using Cyclic Relative Difference Sets. 1-6 - Xi Zhong

, Samuel Lu, Jörg Kliewer, Mingyue Ji:
Dual-Lagrange Encoding for Storage and Download in Elastic Computing for Resilience. 1-6 - Zhuqing Li, Soheil Mohajer, Behrouz Touri:

On the Lower Bound of Minimax Error for Crowdsourcing. 1-6 - Karim Ezzeddine, Jihad Fahs, Ibrahim C. Abou-Faycal:

On the Lossy Compression of Stable Sources. 1-6 - Bartosz Regula, Ludovico Lami, Nilanjana Datta:

Tight Relations and Equivalences Between Smooth Relative Entropies. 1-6 - Arghavan Zibaie, Spencer Hutchinson, Ramtin Pedarsani, Mahnoosh Alizadeh:

The Safety-Privacy Tradeoff in Linear Bandits. 1-6 - Jeremiah Blocki, Justin Zhang:

Amortized Locally Decodable Codes. 1-6 - Jonas Stapmanns, Catarina Dias, Luke Eilers, Jean-Pascal Pfister:

Capacity-Achieving Input Distribution of the Additive Uniform Noise Channel with Peak Amplitude and Cost Constraint. 1-6 - Xihang Yuan, Hua Sun:

Vector Linear Secure Aggregation. 1-6 - Mohammad Javad Sojdeh, Mohammad Javad Salehi, Antti Tölli:

Sic-Free Multicast Scheduling for Multi-Antenna Coded Caching. 1-6 - Adrian Vidal, Emanuele Viterbo:

Spectral Analysis of Nanopore DNA Signatures Under Geometric Duplication. 1-6 - Chun Hei Michael Shiu, Hei Victor Cheng, Lele Wang:

On the Information-Theoretic Limit of Subgraph Alignment. 1-6 - Bruno Costa Alves Freire, Nicolas Delfosse, Anthony Leverrier:

Optimizing Hypergraph Product Codes with Random Walks, Simulated Annealing and Reinforcement Learning. 1-6 - Besart Dollma, Ohad Elishco, Eitan Yaakobi:

Coding for Ordered Composite DNA Sequences. 1-6 - Zhaienhe Zhou, Zeyu Guo:

Improved Decoding of Tanner Codes. 1-6 - Vincent Y. F. Tan, Hamdi Joudeh:

Ensemble-Tight Second-Order Asymptotics for Guessing-Based Decoding with Abandonment. 1-6 - Alain Couvreur, Rakhi Pratihar:

Recursive Decoding of Binary Rank Reed-Muller Codes and Plotkin Construction for Matrix Codes. 1-6 - Yuhao Liu, Teng Fu, Jie Fan, Panpan Niu, Chaowen Deng, Zhongyi Huang:

Capacity-Achieving Sparse Superposition Codes with Spatially Coupled VAMP Decoder. 1-6 - Luyao Fan, Jiayang Zou, Jiayang Gao, Jia Wang:

Differential Properties of Information in Jump-Diffusion Channels. 1-6 - Millen Kanabar, Michael Gastpar:

Model Non-Collapse: Minimax Bounds for Recursive Discrete Distribution Estimation. 1-6 - Zhaohong Lu, Qingyu Liu, Haibo Zeng:

Broadcasting With Port Constraints. 1-6 - Zhengyi Jiang, Hao Shi, Zhongyi Huang, Bo Bai, Gong Zhang, Hanxu Hou:

New Piggybacking Codes for Efficient Repair of Single-Node and Double-Node Erasures. 1-6 - Hanzaleh Akbarinodehi, Parsa Moradi, Mohammad Ali Maddah-Ali:

Game of Coding with Unknown Adversary. 1-6 - Amirhosein Morteza, Rémi A. Chou:

Constrained Optimization of Access Functions in Uniform Secret Sharing. 1-6 - Luca G. Tallini, Bella Bose:

On the Theory of $\mathbb{Z}_{m}$ Linear Codes: the $\mathbb{Z}_{m}$ Linear Preparata and Goethals Codes for $m>2$. 1-6 - Jonathan Mosheiff, Nicolas Resch, Kuo Shang, Chen Yuan:

Randomness-Efficient Constructions of Capacity-Achieving List-Decodable Codes. 1-6 - Jennifer Tang:

Bounding the Capacity of the Multinomial Channel Using KL Divergence Covering and Packing. 1-6 - En-Hui Yang, Shayan Mohajer Hamidi:

Coded Deep Learning: Framework and Preliminary Results. 1-6 - Kayvon Mazooji, Ilan Shomorony:

Guaranteed Recovery of Unambiguous Clusters. 1-6 - Anisha Banerjee, Roni Con, Antonia Wachter-Zeh, Eitan Yaakobi:

Decoding Insertions/Deletions via List Recovery. 1-6 - Hoang Ly, Emina Soljanin, V. Lalitha:

On the Service Rate Region of Reed-Muller Codes. 1-6 - Graeme Smith, Peixue Wu:

Additivity of Quantum Capacities in Simple Non-Degradable Quantum Channels. 1-6 - Zhenduo Wen, Amin Gohari:

A New Upper Bound for Distributed Hypothesis Testing Using the Auxiliary Receiver Approach. 1-6 - Anuran Makur, Japneet Singh:

Bounds on Maximal Leakage Over Bayesian Networks. 1-6 - Amaury Gouverneur, Tobias J. Oechtering, Mikael Skoglund:

Refined PAC-Bayes Bounds for Offline Bandits. 1-6 - Yang Bai, Xuan Guang, Raymond W. Yeung:

Linear Function-Computing Secure Network Coding. 1-6 - Tao Zhang, Bradley A. Malin, Netanel Raviv, Yevgeniy Vorobeychik:

Differential Confounding Privacy and Inverse Composition. 1-6 - Bethany Austhof, Lev Reyzin, Erasmo Tani:

Non-Adaptive Learning of Random Hypergraphs with Queries. 1-6 - Yi Song, Hao Xu, Kai Wan, Kai-Kit Wong, Giuseppe Caire, Shlomo Shamai Shitz:

Achievable Rates for a Primitive Gaussian Diamond Channel with Rayleigh Fading. 1-6 - Eduardo Camps-Moreno, Jun Bo Lau, Hiram H. López, Welington Santos:

The Permutation Group of Reed-Solomon Codes Over Arbitrary Points. 1-6 - Vlad-Florin Dragoi, Mohammad Rowshan:

On Partial Weight Distribution of Polar Codes. 1-6 - Nikolaos Papagiannis, Wojciech Szpankowski, Changlong Wu:

Online Learning with Nasty Experts. 1-6 - Xi Zhang, Qixuan Zhu, H. Vincent Poor:

ISAC-Enabled Statistical-QoS Provisioning for mURLLC over Massive MIMO Mobile Networks Using FBC. 1-6 - Madhura Pathegama, Alexander Barg:

Regular LDPC Codes on BMS Wiretap Channels. 1-6 - Adeel Mahmood, Aaron B. Wagner:

Channel Coding for Gaussian Channels with Mean and Variance Constraints. 1-6 - Zijie Chen, Amin Gohari, Chandra Nair:

A Differential Equation Approach to the Most-Informative Boolean Function Conjecture. 1-6 - Mohammad NaseriTehrani, Mohammad Javad Salehi, Antti Tölli:

Achievable Dof Bounds for Cache-Aided Asymmetric Mimo Communications. 1-6 - Stepan Gorelenkov, Mojtaba Vaezi:

Deep Autoencoder-Based Constellation Design in Multiple Access Channels. 1-6 - Ken-ichi Iwata, Kengo Hashimoto, Hirosuke Yamamoto:

Extensions of Asymmetric Binary Systems and Rayleigh's Theorem. 1-6 - Junren Chen, Lexiao Lai, Arian Maleki:

Phase Transitions in Phase-Only Compressed Sensing. 1-6 - Deekshith Pathayappilly Krishnan, Kaan Okumus, Khac-Hoang Ngo, Giuseppe Durisi:

An Achievability Bound for Type-Based Unsourced Multiple Access. 1-6 - Han Xu, Jiayu Pan, Yinfei Xu, Shuo Shao, Tiecheng Song:

Timely Gossip on Lines: Hybrid Ageing. 1-6 - Sujata Bansal, Pramod Kumar Kewat

:
An Infinite Family of Additive Codes Over the Ring $\frac{\mathbb{F}_2[u]}{\left\langle u^4\right\rangle}$ with Lee Distance 8. 1-6 - Buu Phan, Ashish Khisti:

On List Decoding With Importance Sampling. 1-6 - Zeyan Zhuang, Xin Zhang, Dongfang Xu, Shenghui Song:

Asymptotics of Spiked Covariance Model with Random Projection. 1-6 - Daniella Bar-Lev, Michael Shlizerman:

A Single-Bit Redundancy Framework for Multi-Dimensional Parametric Constraints. 1-6 - Maria Abu Sini, Reinhard Heckel:

Near Optimal Code Construction for the Adversarial Torn Paper Channel with Edit Errors. 1-6 - Jiayang Zou, Luyao Fan, Jiayang Gao, Jia Wang:

Convexity of Mutual Information Along the Fokker-Planck Flow. 1-6 - Ruiying Cao, Xin Chen:

Optimizing Sequencing Coverage Depth in DNA Storage: Insights from DNA Storage Data. 1-6 - Chao Chen, Sian-Jheng Lin, Yunghsiang S. Han, Baoming Bai:

A Fast Chinese Remaindering Transform Over Finite Fields. 1-6 - Shreya Meel, Xiangliang Kong, Thomas Jacob Maranzatto, Itzhak Tamo, Sennur Ulukus:

Private Information Retrieval on Multigraph-Based Replicated Storage. 1-6 - Yanlin Geng:

A Simple Auxiliary Receiver Outer Bound for Broadcast Channels. 1-6 - Narayana Santhanam, Yixin Zhang:

On Logistic Regression and Maximum Entropy Approaches. 1-5 - Nolan J. Coble, Alexander Barg:

Coxeter Codes: Extending the Reed-Muller Family. 1-6 - Samin Riasat, Hessam Mahdavifar:

Efficient Covering Using Reed-Solomon Codes. 1-6 - Qinghua Ding, Venkat Anantharam:

The Density Formula Approach for Non-Reversible Isomorphism Theorems, with Applications. 1-6 - Zhongjun Yang

, Li Chen, Kangjian Qin, Xianbin Wang, Huazi Zhang:
Perturbation-Based Decoding Schemes for Long Polar Codes. 1-6 - Adir Kobovich, Eitan Yaakobi, Nir Weinberger:

DeepDIVE: Optimizing Input-Constrained Distributions for Composite DNA Storage via Multinomial Channel. 1-6 - Zhenhao Huang, Minquan Cheng, Qifu Tyler Sun, Youlong Wu:

On the Optimality of All-to-All Broadcast Over Cache-Aided Ring Networks. 1-6 - Zhen-Ming Huang, Hsiang-Yu Hsieh, Cheng-Yu Pai, Chao-Yu Chen:

A Novel Construction of Gaussian Integer Periodic Z-Complementary Sets. 1-6 - Cécile Bouette, Laura Luzzi, Matthieu R. Bloch:

Covert Capacity of Awgn Channels Under Average Error Probability. 1-6 - Sirui Liu, Zongpeng Li:

Space Information Flow: Multiple Unicast in $l_{p}^{n}$. 1-6 - Recep Can Yavas, Yuqi Huang, Vincent Y. F. Tan, Jonathan Scarlett:

A General Framework for Clustering and Distribution Matching with Bandit Feedback. 1-6 - Yeow Meng Chee, Long Nguyen Tien, Van Khu Vu:

Weight Constrained Run Length Limited Gray Codes. 1-6 - Ankit Pratap Singh, Namrata Vaswani:

Secure Algorithms for Vertically Federated Multi-Task Representation Learning. 1-6 - Gilli Horowitz Hadayo, Yuval Cassuto, Alejandro Cohen:

Noise Recycling Based Multi-Level Flash Memory. 1-6 - Unnikrishnan Kunnath Ganesan, Giuseppe Durisi, Matteo Zecchin, Petar Popovski, Osvaldo Simeone:

Online Conformal Compression for Zero-Delay Communication with Distortion Guarantees. 1-6 - Or Ordentlich, Yury Polyanskiy:

Optimal Quantization for Matrix Multiplication. 1-6 - Jinyu Wang, Minquan Cheng, Kai Wan, Giuseppe Caire:

A Framework of Constructing PDA via Union of Cache Configurations from Cartesian Product. 1-6 - Wentu Song, Kui Cai, Tony Q. S. Quek:

Sequence Reconstruction for the Single-Deletion Single-Substitution Channel. 1-6 - Sebastian Bitzer, Andrea Di Giusto, Alberto Ravagnani, Eitan Yaakobi:

Bounds and Codes for General Phased Burst Errors. 1-6 - Christoph Hirche, Oxana Shaya:

Partial Orders and Contraction for BISO Channels. 1-6 - Egemen Erbayat, Ali Maatouk, Peng Zou, Suresh Subramaniam:

Age of Information Optimization with Preemption Strategies for Correlated Systems. 1-6 - Wenjie Ma, Zhifang Zhang:

Binary Rate-Optimal Streaming Codes with Minimal Code Length. 1-6 - Touheed Anwar Atif, Reuben Blake Tate, Stephan J. Eidenbenz:

Enhancing Quantum Expectation Values Via Exponential Error Suppression and CVaR Optimization. 1-6 - Evan J. D. Anderson, Michael S. Bullock, Filip Rozpedek, Boulat A. Bash:

Achievability of Covert Quantum Communication. 1-6 - Xiang Zhang, Zhou Li, Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire:

Communication-Efficient Hierarchical Secure Aggregation with Cyclic User Association. 1-6 - Robert P. Malinas, Dogyoon Song, Benjamin D. Robinson, Alfred O. Hero III:

High-Dimensional Sequential Change Detection. 1-6 - Nir Weinberger, Ran Tamir:

Entropy Estimation from Queries and Auxiliary Distribution Samples. 1-6 - Mine Gokce Dogan, Jaimin Shah, Martina Cardone, Christina Fragouli:

On Optimal Two-Priority-Level Codes in Mmwave Networks. 1-6 - Abd El Latif Kadry, Yihan Zhang, Nir Weinberger:

Mean Estimation in High-Dimensional Binary Timeinhomogeneous Markov Gaussian Mixture Models. 1-6 - Matteo Zecchin, Fredrik Hellström, Sangwoo Park, Shlomo Shamai Shitz, Osvaldo Simeone:

Generalization and Informativeness of Weighted Conformal Risk Control Under Covariate Shift. 1-6 - Daofu Zhang, Mehrdad Pournaderi, Yu Xiang, Pramod K. Varshney:

Distributed Multiple Testing with False Discovery Rate Control in the Presence of Byzantines. 1-6 - Tianci Zhang, Zhengchuan Chen, Zhong Tian, Min Wang, Jemin Lee, Tony Q. S. Quek:

Time-Dependent Statistical Characteristics of Age of Information Under Periodic Updating. 1-6 - Chao Tian, Jun Chen, Krishna Narayanan:

Source-Channel Separation Theorems for Distortion Perception Coding. 1-6 - Qingyue Zhang, Xinyi Tong, Tianren Peng, Shao-Lun Huang:

Information-Geometric Analysis of the Optimal Error Exponent in Fixed-Length Hypothesis Testing. 1-6 - Michael Schaller, Beatrice Toesca

, Van Khu Vu:
A New Construction of Non-Binary Deletion Correcting Codes and Their Decoding. 1-6 - Dganit Hanania, Eitan Yaakobi:

Error-Correcting Codes for Labeled DNA Sequences. 1-6 - Alessio Baldelli, Marco Baldi, Franco Chiaraluce, Paolo Santini:

BF-Max: an Efficient Bit Flipping Decoder with Predictable Decoding Failure Rate. 1-6 - Chandan Anand, Jayesh Seshadri, Prasad Krishnan, Gowtham R. Kurri:

Sun-Jafar-Type Schemes for Weak Private Information Retrieval. 1-6 - Javad Maheri, Petros Elia:

Constructing Hamiltonian Decompositions of Complete $\$\mathrm{K}{\$}$-Uniform Hypergraphs. 1-6 - Praneeth Kumar Vippathalla, Mihai-Alin Badiu, Justin P. Coon:

Graph Compression with Side Information at the Decoder. 1-6 - Chenyi Sun, Ziting Zhang, Kai Wan, Qing Feng, Yan Feng, Giuseppe Caire:

Multi-Message Secure Aggregation with Demand Privacy. 1-6 - Praneeth Kumar Vippathalla, Mihai-Alin Badiu, Justin P. Coon:

Rate-Distortion-Perception Function of Bernoulli Vector Sources. 1-6 - Parsa Moradi, Mohammad Ali Maddah-Ali:

General Coded Computing in a Probabilistic Straggler Regime. 1-6 - Christoph Hofmeister, Rawad Bitar, Antonia Wachter-Zeh:

CAT and DOG: Improved Codes for Private Distributed Matrix Multiplication. 1-6 - Yuchang Sun, Yuexiang Xie, Bolin Ding, Yaliang Li, Jun Zhang:

Exploring Selective Layer Fine-Tuning in Federated Learning. 1-6 - Kumar Nilesh, Christian Deppe, Holger Boche:

Quantum PUF Based Secret Key Generation and Secure Storage with Side Information. 1-5 - Yajun Mei, Benjamin Yakir:

Precise False Alarm Rate of the SUM-CUSUM Scheme for High-Dimensional Streaming Data. 1-6 - Yang Zhou, Wenbo Huang, Kai Wan, Robert Caiming Qiu:

On the Optimal Source Key Size of Secure Gradient Coding. 1-6 - Hassan ZivariFard, Rémi A. Chou, Xiaodong Wang:

Covert Communication Over a Quantum MAC with a Helper. 1-6 - Raj Shekhar, Natasha Devroye, György Turán, Milos Zefran:

Interpreting KO Codes. 1-6 - Kaiyuan Ji, Hemant K. Mishra, Milán Mosonyi, Mark M. Wilde:

Converse Bounds for Quantum Hypothesis Exclusion: A Divergence-Radius Approach. 1-6 - Yotam Gershon, Yuval Cassuto:

In-Memory BER Estimation Using Syndromes of LDPC Codes. 1-6 - Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi:

Threshold Selection for Iterative Decoding of $(v,\ w)$-Regular Binary Codes. 1-6 - Dian Jin, Yuqian Zhang, Qiaosheng Zhang:

Community Detection for Contextual-Lsbm: Theoretical Limitations of Misclassification Rate and Efficient Algorithms. 1-6 - Sheida Rabeti, Mohsen Moradi, Hessam Mahdavifar:

Bounds and New Constructions for Girth-Constrained Regular Bipartite Graphs. 1-6 - Chenyu Wang, Amin Gohari:

On $\Phi$ - Entropic Dependence Measures and Non-Local Correlations. 1-5 - Gergely Flamich, Sharang M. Sriramu, Aaron B. Wagner:

The Redundancy of Non-Singular Channel Simulation. 1-6 - Elena Grigorescu, Shreya Nasa, Maoyuan Song:

Communication with Perfect Feedback for Bit Flips and Erasures. 1-5 - Eray Unsal Atay, Eitan Levin, Venkat Chandrasekaran, Victoria Kostina:

Capacity Bounds for Poset-Causal Channels Via Group Symmetry. 1-6 - Mengyuan Zhao, Tobias J. Oechtering, Maël Le Treust:

Zero Estimation Cost Strategy for Witsenhausen Counterexample with Causal Encoder. 1-6 - Julien Juaneda, Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan:

Rhqc: Post-Quantum Ratcheted Key Exchange From Coding Assumptions. 1-6 - Edoardo David Santi, Gongpu Chen, Deniz Gündüz, Asaf Cohen:

Covert Adversarial Actuators in Finite MDPS. 1-6 - R. Jayaharish, K. Bharati, Krishna P. Jagannathan:

Identifying Highly Distillable Entanglement in Pure States Using Multi-Armed Bandits. 1-6 - Yu-Shin Huang, Chao Tian, Krishna Narayanan, Lizhong Zheng:

Relatively-Secure LLM-Based Steganography via Constrained Markov Decision Processes. 1-6 - Ali Gholami

, Tayyebeh Jahani-Nezhad, Kai Wan, Giuseppe Caire:
Optimal Communication-Computation Trade-Off in Hierarchical Gradient Coding. 1-6 - Julia Gaudio, Phawin Prongpaophan:

Semidefinite Programming for the Asymmetric Stochastic Block Model. 1-6 - Yang Liu, Bolin Wu, Yuxin Han, Kai Niu:

A Parity-Consistent Decomposition Algorithm to Determine the Weight Distribution of Polar Codes. 1-6 - Jing Zhou, Shuqin Pang, Wenyi Zhang:

A High-Resolution Analysis of Receiver Quantization in Communication. 1-6 - Mohammad Aamir Sohail, Touheed Anwar Atif, S. Sandeep Pradhan:

When Wyner and Ziv Met Bayes in Quantum-Classical Realm. 1-6 - Frederik Walter, Yonatan Yehezkeally

:
Coding for Strand Breaks in Composite DNA. 1-6 - Henry D. Pfister, Oscar Sprumont, Gilles Zémor:

From Bit to Block: Decoding on Erasure Channels. 1-6 - Yun-Han Li, Jin Sima, Ilan Shomorony, Olgica Milenkovic:

Fragmentation in Data Deduplication Systems I: The Stretch Metric. 1-6 - Tuan Thanh Nguyen, Chen Wang, Kui Cai, Yiwei Zhang, Zohar Yakhini:

Constrained Coding for Composite DNA: Channel Capacity and Efficient Constructions. 1-6 - M. Surya Vamsi, Satyajit Thakor:

On the Capacity of Undirected Multiple Unicast Layered Networks with Asymmetric Demands. 1-6 - Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Nir Weinberger, Deniz Gündüz:

Multi-Terminal Remote Generation and Estimation Over a Broadcast Channel with Correlated Priors. 1-6 - Yuan-Pon Chen, Jin Sima, Olgica Milenkovic:

Generalized Orthogonal De Bruijn Sequences. 1-6 - Yu-Han Huang, Venugopal V. Veeravalli:

Sequential Change Detection for Learning in Piecewise Stationary Bandit Environments. 1-5 - Nir Chisnevski, Ido Tal, Shlomo Shamai Shitz:

An Analytical Study of the Min-Sum Approximation for Polar Codes. 1-6 - Dimitris Chytas, Nithin Raveendran, Bane Vasic:

Enhanced Min-Sum Decoding of Quantum Codes with Iteration Dynamics Memory. 1-6 - Uzi Pereg:

Quantum Relay Channels. 1-6 - Leyang Xia, Shenghao Yang, Ximing Fu:

Shift-XOR Convertible Locally Repairable Codes. 1-6 - Maxime Bombar, Nicolas Resch, Emiel Wiedijk:

On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography. 1-6 - Shuai Feng, Liang Feng Zhang:

On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing. 1-6 - Ian George, Alice Zheng, Akshay Bansal:

The Rate of Information Destruction and $f$-Divergence Pinsker Inequalities. 1-6 - Vignesh Tirukkonda, Anirudh Rayas, Gautam Dasarathy:

Structure Learning in Gaussian Graphical Models from Glauber Dynamics. 1-6 - Aadil Oufkir, Michael X. Cao, Hao-Chung Cheng, Mario Berta:

Exponents for Shared Randomness-Assisted Channel Simulation. 1-6 - Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau:

On the Minimum Distance and Erasure Correction of Codes with Block Circulant Topology. 1-6 - Yuhang Yao, Syed Ali Jafar:

Can Non-Signaling Assistance Increase the Degrees of Freedom of a Wireless Network? 1-6 - Busra Tegin, Tolga M. Duman:

On the Capacity of Insertion Channels for Small Insertion Probabilities. 1-6 - Smarajit Das:

Lower Bounds on the Size of Orthogonal Arrays. 1-6 - Roni Con, Ryan Gabrys, Eitan Yaakobi:

QBEL: Quantum Burst Error Locating Codes. 1-6 - Roberto Bruno, Roberto De Prisco, Ugo Vaccaro:

Optimal Binary Variable-Length Codes with a Bounded Number of 1's Per Codeword: Design, Analysis, and Applications. 1-6 - Huy Pham, Hoang Ta, Hoa T. Vu:

Constructing Decision Trees from Data Streams. 1-6 - Delphine Boucher, Kayodé Epiphane Nouetowa:

A Decoding Algorithm for Skew Cyclic Generalized Skew Reed-Solomon Codes. 1-6 - Leighton Pate Barnes, Alex Dytso, H. Vincent Poor:

Linearity-Inducing Priors for Poisson Parameter Estimation Under L1 Loss. 1-6 - Andrew Swain, Willie K. Harrison:

Best Linear Wiretap Coset Codes Must Maximize Minimum Distance. 1-6 - Guanghui Song, Junqi Wang, Meiru Gao, Ying Li, Kui Cai:

Probability Distribution of Sneak Path Rate in Resistive Random-Access Memory Arrays. 1-6 - Julian Streit, Franziska Weindel, Reinhard Heckel:

Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors. 1-6 - Tsukasa Yoshida, Kazuho Watanabe:

Empirical Bayes Estimation for Lasso-Type Regularizers: Analysis of Automatic Relevance Determination. 1-5 - Han Wu

, Hamdi Joudeh:
Strong Converse Exponent for Remote Lossy Source Coding. 1-6 - V Arvind Rameshwar, V. Lalitha:

An Upper Bound on the Error Probability of Rpa Decoding of Reed-Muller Codes Over the Bsc. 1-6 - Xiao Ma, Yinchu Wang, Qianli Ma, Zhaohao Mo, Xiangping Zheng:

Binary BMST Coding for Near-Lossless Compression of Q-Ary Source. 1-6 - Mohammad Moltafet, Hamid R. Sadjadpour, Zouheir Rezki, Marian Codreanu, Roy D. Yates:

AoI in M/G/1/1 Queues with Probabilistic Preemption. 1-5 - Chenyu Wang, Ayesha Irfan, Yihan Zhang, Michael Langberg, Sidharth Jaggi:

Zero-Error Superposition Codes. 1-6 - Priyanshu Gautam, Kumar Subodh, Amitalok J. Budkuley:

On Interactive Bayesian Persuasion Under Sequential Decision Making. 1-6 - Holger Boche, Volker Pohl, H. Vincent Poor:

Fundamental Limits for Iterated Function Optimization on Turing Machines. 1-6 - Jeremy Johnston, Xiaodong Wang:

State and Measurement Design for Quantum Detection Over Quantum Channels. 1-6 - Boaz Shuval, Ido Tal:

Constant Weight Polar Codes Through Periodic Markov Processes. 1-6 - Paula Belzig, Li Gao, Graeme Smith, Peixue Wu:

Reverse-Type Data Processing Inequality. 1-6 - Peixue Wu, Yunkai Wang:

Quantum Capacity Amplification via Privacy. 1-6 - Mahdi Cheraghchi, Nikhil Shagrithaya, Alexandra Veliche:

Reductions Between Code Equivalence Problems. 1-6 - Shanuja Sasi, Onur Günlü:

Private Coded Distributed Computing Framework. 1-6 - Adina Waxman, Shai Ginzach, Aviel Glam, Alejandro Cohen:

Blank Space: Adaptive Causal Coding for Streaming Communications Over Multi-Hop Networks. 1-6 - Claudio Mayrink Verdun, Alex Oesterling, Himabindu Lakkaraju, Flávio P. Calmon:

Soft Best-of-$n$ Sampling for Model Alignment. 1-6 - Anand Jerry George, Rodrigo Veiga, Nicolas Macris:

Analysis of Diffusion Models for Manifold Data. 1-6 - Cemre Cadir, Yanina Y. Shkel:

On the Extremal Mechanisms for Local Differential Privacy & Binary Maximal Leakage. 1-6 - Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff

, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:
Asymptotic Improvements to Provable Algorithms for the Code Equivalence Problem. 1-6 - Yang Liu, Anna Baumeister, Antonia Wachter-Zeh:

List-Decodability of Random (Linear) Sum-Rank Metric Codes. 1-6 - Viswanathan Ramachandran

, Tobias J. Oechtering, Mikael Skoglund:
Multi-Terminal Strong Coordination Over Noisy Channels with Encoder Cooperation. 1-6 - Sandesh Rao Mattu, Imran Ali Khan, Venkatesh Khammammetti, Beyza Dabak, Saif Khan Mohammed, Krishna Narayanan, A. Robert Calderbank:

Multiple Preamble Detection with ZC Sequences in the Presence of Mobility and Delay Spread. 1-6 - Enes Arda, Aylin Yener:

A Rate-Distortion Framework for Summarization. 1-6 - Xinzheng He, Li Chen, Yingquan Wu:

Performance Analysis and Enhanced Chase Decoding of BCH Based GII Codes. 1-6 - Yiqi Chen, Holger Boche:

Robust Joint Message and State Transmission Under Arbitrarily Varying Jamming. 1-6 - Kenta Kasai:

Efficient Mitigation of Error Floors in Quantum Error Correction Using Non-Binary Low-Density Parity-Check Codes. 1-6 - Shreya Meel, Pasan Dissanayake, Mohamed W. Nomeir, Sanghamitra Dutta, Sennur Ulukus:

Private Counterfactual Retrieval with Immutable Features. 1-6 - Tian Qiu, Arjun Nichani, Rasta Tadayontahmasebi, Haewon Jeong:

Gone with the Bits: Revealing Racial Bias in Low-Rate Neural Compression for Facial Images. 1-6 - Malhar A. Managoli, Vinod M. Prabhakaran, Suhas N. Diggavi:

Robust Federated Personalised Mean Estimation for the Gaussian Mixture Model. 1-6 - Gunank Jakhar, Gowtham R. Kurri, Suryajith Chillara, Vinod M. Prabhakaran:

Fractional Subadditivity of Submodular Functions: Equality Conditions and Their Applications. 1-6 - Trung Dang, Zhiyi Huang:

Robust Max Selection. 1-6 - Anuj Kumar Yadav, Yanina Y. Shkel:

Approximation Guarantees for Minimum Rényi Entropy Functional Representations. 1-6 - Sreejith Sreekumar, Mario Berta, Christoph Hirche, Hao-Chung Cheng:

Distributed Quantum Hypothesis Testing Against Product States Under Zero-Rate Communication Constraints. 1-6 - Nir Weinberger, Ram Zamir:

Exploration-Exploitation Tradeoff in Universal Lossy Compression. 1-6 - Yingyao Zhou, Natasha Devroye, György Turán, Milos Zefran:

On Non-Linearities of Simple Learned AWGN Feedback Codes. 1-6 - Ryosuke Sugiura, Masaaki Nishino, Norihito Yasuda:

Parse Forests with Huffman-Tree-Based Modes for One-Symbol-Delay Encodable VF Codes. 1-6 - Andreas Theocharous, Ioannis Kontoyiannis:

Lossless Data Compression at Pragmatic Rates. 1-6 - Hugo Delavenne, Élina Roussel, Tanguy Medevielle:

Interactive Oracle Proofs of Proximity to Codes on Graphs. 1-6 - Xingyi He, S. Sandeep Pradhan, Andreas Winter:

On the Strong Converse Exponent of the Classical Soft Covering. 1-6 - Andrew S. Perley, Todd P. Coleman:

Broadcasting Bits Through Discrete-Time Queues. 1-6 - Saad Kriouile, Mohamad Assaad, Touraj Soleymani:

Semantics of Anomalies in Networked Control. 1-6 - Xinan Chen, Stefano Chessa, Ian George, Felix Leditzky, Eric Chitambar:

Capacities of Entanglement Distribution from a Central Source. 1-6 - Hari Krishnan P. Anilkumar, Neha Sangwan, Varun Narayanan, Vinod M. Prabhakaran:

Byzantine Distributed Function Computation. 1-6 - Mohsen Moradi, Hessam Mahdavifar:

On Fast SC-Based Polar Decoders: Metric Polarization and a Pruning Technique. 1-6 - Shao-Lun Huang, Tobias Rippchen, Mario Berta:

Quantum Entropy Prover. 1-6 - Zhichao Liu, Zhiming Ma, Guiying Yan:

A Method to Reduce the Complexity of Computing the Weight Distribution of Polar Codes. 1-6 - Frederik Ritter, Jonathan Mandelbaum, Alexander Fengler, Holger Jäkel, Laurent Schmalen:

Removal of Small Weight Stopping Sets for Asynchronous Unsourced Multiple Access. 1-6 - Dan Song, Ayfer Özgür, Tsachy Weissman:

A Markov Property of Empirical Distributions and the Performance of Compression-Based Denoisers. 1-6 - Yuan Gao, Weijun Fang:

Griesmer-Optimal Locally Repairable Codes via Lengthening Reed-Muller Codes. 1-6 - Yiming Xing, Georgios Fellouris:

Adaptive 3-Stage Procedures for Multi-Hypothesis Testing. 1-6 - Yun-Feng Lo, Matthieu R. Bloch:

Active Hypothesis Testing for Quantum Detection of Phase-Shift Keying Coherent States. 1-6 - Chengkai Zhu, Renfeng Peng, Bin Gao, Xin Wang:

Riemannian Optimization for Holevo Capacity. 1-6 - Kaan Okumus, Khac-Hoang Ngo, Giuseppe Durisi, Erik G. Ström:

Type-Based Unsourced Multiple Access Over Fading Channels with Cell-Free Massive MIMO. 1-6 - Xihao Li, Li Chen:

List Viterbi Algorithm Aided Low-Latency OSD. 1-6 - Yassine Hamdi, Aaron B. Wagner, Deniz Gündüz:

The Rate-Distortion-Perception Trade-Off with Algorithmic Realism. 1-6 - HanQin Cai, Longxiu Huang:

Property Inheritance for Subtensors in Tensor Train Decompositions. 1-6 - Lucien François, Eimear Byrne, Alain Couvreur:

Decoding Algorithms for Tensor Codes. 1-6 - Kagan Akcay, Eleftherios Lampiris, Mohammad Javad Salehi, Giuseppe Caire:

Collaborative Coded Caching for Partially Connected Networks. 1-6 - Didrik Bergström, Onur Günlü:

Deep Randomized Distributed Function Computation (DeepRDFC): Neural Distributed Channel Simulation. 1-6 - Michael Langberg, Moshe Schwartz, Itzhak Tamo:

Bounds on Box Codes. 1-6 - A P. Vaideeswaran, Madireddi Sai Harish, Lakshmi Prasad Natarajan:

Subcodes of Second-Order Reed-Muller Codes via Recursive Subproducts. 1-6 - Xiaxin Li, Arya Mazumdar:

Noisy Nonadaptive Group Testing with Binary Splitting: New Test Design and Improvement on Price-Scarlett-Tan's Scheme. 1-6 - Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Yihan Zhang:

Sliding Window Adversarial Channels. 1-6 - Alex Dytso, Martina Cardone:

Lossy Source Coding with Focal Loss. 1-6 - Wenbin Wang, Ziping Zhao:

Achieving Oracle Rate for Large Covariance Matrix Estimation from Quadratic Measurements. 1-6 - Zhichao Liu, Liuquan Yao, Yuan Li, Huazi Zhang, Jun Wang, Guiying Yan, Zhiming Ma:

Partial Orders of Rate-Compatible Polar Codes. 1-6 - Pau Colomer, Holger Boche, Andreas J. Winter:

Quantum Hypothesis Testing Lemma for Deterministic Identification over Quantum Channels. 1-5 - Parsa Moradi, Hanzaleh Akbarinodehi, Mohammad Ali Maddah-Ali:

General Coded Computing: Adversarial Settings. 1-6 - Yajuan Liu, Tolga M. Duman:

Constrained Error-Correcting Codes for Efficient DNA Synthesis. 1-6 - Haoyang Hu, Viveck R. Cadambe:

Differentially Private Secure Multiplication with Erasures and Adversaries. 1-6 - Chih-Hsuan Li, Yu-Chih Huang, Wen-Hsuan Li:

Quickest Mean-Change Detection via Confidence Sequence and Backward Sample Averages. 1-6 - Vishal Singh, Theshani Nuradha, Mark M. Wilde:

Extendible Quantum Measurements and Limitations on Classical Communication. 1-6 - Wei Liu, Tom Richardson, Changlong Xu, Hao Xu:

Efficient Parallel PAS by Sequence Snipping and Arithmetic Coding Based Sphere Shaping. 1-6 - Mohannad Shehadeh, Frank R. Kschischang:

Higher-Order Staircase Codes: A Unified Generalization of High-Throughput Coding Techniques. 1-6 - Min Qiu, Ming-Chun Lee, Yu-Chih Huang, Jinhong Yuan:

On the Scaling Law Tradeoff of Integrated Sensing and Communication Networks. 1-6 - Kenneth W. Shum, Zhihang Deng, Yongyi Li, Ruizhe Wang:

Design of Storage Codes Based on Integer Arithmetic Modulo a Power of Two. 1-6 - Riccardo Rossetti, Galen Reeves:

Fundamental Limits for High-Dimensional Factor Regression Models. 1-6 - Matteo Bertuzzo, Alberto Ravagnani, Eitan Yaakobi:

The Coverage Depth Problem in Dna Storage Over Small Alphabets. 1-6 - Renpu Liu, Liwen Zhong, Wooram Lee, Jing Yang:

In-Context Learning Based Efficient Spectrum Sensing. 1-6 - G. Dhinesh Chandran, Kota Srinivas Reddy, Srikrishna Bhashyam:

Online Clustering With Bandit Information. 1-6 - Qinghua Devon Ding, Venkat Anantharam:

On Statistical Estimation of Edge-Reinforced Random Walks. 1-6 - Mohammad Reza Deylam Salehi, Vijith Kumar Kizhakke Purakkal, Derya Malak:

Non-Linear Function Computation Broadcast. 1-6 - Zilong Wang, Tao Zhang, Qi Feng, Fan Wang, Gennian Ge:

On the Construction of Mutually Unbiased Sets of Orthogonal Vectors. 1-4 - Holger Boche, Christian Deppe, Safieh Mahmoodi, Gholam Reza Omidi:

Galaxy Codes: Advancing Achievability for Deterministic Identification via Gaussian Channels. 1-6 - Juyun Oh, Taewoo Park, Jiwoong Im, Yuval Cassuto, Yongjune Kim:

Quantizing for Noisy Flash Memory Channels. 1-6 - Jefrin Sharmitha Prabhu, Abhinav Vaishya, Shobhit Bhatnagar, Aryaman Manish Kolhe, V. Lalitha, P. Vijay Kumar:

On the Efficacy of the Peeling Decoder for the Quantum Expander Code. 1-6 - M. Yusuf Sener, Gerhard Kramer, Shlomo Shamai Shitz, Wen Xu:

Scalar Lattices and Probabilistic Shaping for Dithered Wyner-Ziv Quantization. 1-6 - Geyang Wang, Alexander Barg, Navin Kashyap:

Recoverable Systems as Interaction Models: A Study by Example. 1-6 - Minquan Cheng, Huimei Wei, Kai Wan, Giuseppe Caire:

A New Construction Structure on Coded Caching with Linear Subpacketization: Non-Half-Sum Disjoint Packing. 1-6 - Thanushon Sivakaran, En-Hui Yang:

Leveraging Conditional Mutual Information to Improve Large Language Model Fine-Tuning for Classification. 1-6 - Hojat Allah Salehi, Farhad Shirani, S. Sandeep Pradhan:

Quantum Advantage in Non-Interactive Source Simulation. 1-6 - Kanumuri Nithin Varma, Babak Hassibi:

Ensemble Mirror Descent: a Generalization of Mirror Descent to Multiple Convex Potentials. 1-6 - Kaan Buyukkalayci, Merve Karakas, Xinlin Li, Christina Fragouli:

Enhancing Binary Search via Overlapping Partitions. 1-6 - Cheuk Ting Li:

Discrete Layered Entropy, Conditional Compression and a Tighter Strong Functional Representation Lemma. 1-6 - Julia Gaudio, Charlie K. Guan:

Sharp Exact Recovery Threshold for Two-Community Euclidean Random Graphs. 1-6 - Gustaf Ahlgren, Onur Günlü:

Secure Rate-Distortion-Perception Trade-off Over Channels: A Randomized Distributed Function Computation (RDFC) Application. 1-6 - Zhou Li, Siyan Qin, Xiang Zhang, Jihao Fan, Haiqiang Chen, Giuseppe Caire:

Noise Capacity of Conditional Disclosure of Secrets: A Graph-Theoretic Perspective. 1-6 - Mingming Zhang, Youlong Wu, Dianhua Wu, Minquan Cheng:

Order Optimal Cascaded Coded Distributed Computing with Low Complexity and Improved Flexibility. 1-6 - Yumeng Yang, Han Cai, Xiaohu Tang:

A Multi-Node Repair Scheme of Reed-Solomon Codes. 1-6 - Sajani Vithana, Viveck R. Cadambe, Flávio P. Calmon, Haewon Jeong:

Differentially Private Distributed Mean Estimation with Constrained User Correlations. 1-6 - Ruida Zhou, Antonious M. Girgis, Suhas N. Diggavi:

Personalized Heterogeneous Mean Estimation Under User-Level LDP. 1-6 - Greg Fields, Tara Javidi:

Active Sampling for Markov Hypothesis Testing. 1-6 - Satyajit Dhadumia, M. Ashok Kumar:

A Generalized CraméR-Rao Bound Using Information Geometry. 1-6 - Zahra Honjani, Mohsen Heidari:

Improved Classical Shadow Tomography Using Quantum Computation. 1-6 - Anisha Banerjee, Yonatan Yehezkeally

, Antonia Wachter-Zeh, Eitan Yaakobi:
Correcting Multiple Substitutions in Nanopore-Sequencing Reads. 1-6 - Mohamed Seif, Antti Koskela, Andrea J. Goldsmith:

Private Spectral Clustering Over Binary Stochastic Block Models. 1-6 - Seung-Hyun Nam, Hyun-Young Park, Joonwoo Bae, Si-Hyeon Lee:

Quantum Advantage in Private Multiple Hypothesis Testing. 1-6 - Giles Bischoff, Chih-Chun Wang:

Low-Latency Preamble-Free Transmission of Short Messages via Quickest Change Detection. 1-6 - Vamoua Yachongka, Rémi A. Chou:

Privacy-Constrained Lossy Function Computation in Distributed Databases. 1-6 - Abolfazl Hashemi, Dongmin Lee

, Anuran Makur:
Strong Antithetic Variance Reduction Inequalities. 1-6 - Tianren Peng, Qi Li, Shao-Lun Huang:

On the Optimal Second-Order Convergence Rate of Minimax Estimation Under Weighted Mse. 1-6 - Zitan Chen:

Coded String Reconstruction from Erroneous Prefix-Suffix Compositions. 1-6 - Lukas Rapp, Jiewei Feng, Muriel Médard, Ken R. Duffy:

A Balanced Tree Transformation to Reduce GRAND Queries. 1-6 - Xiaoyun Gong, Sloan Nietert, Ziv Goldfeld:

Robust Alignment via Partial Gromov-Wasserstein Distances. 1-6 - Andrea Munari:

On the Uncertainty of a Simple Estimator for Remote Source Monitoring over ALOHA Channels. 1-6 - Nadim Ghaddar, Lele Wang, Wei Yu:

On-Grid Angle-of-Arrival Estimation in Large-Scale MIMO Systems Using Channel Codes. 1-6 - Ryan Song, Wei Yu:

Downlink Massive Random Access with Lossy Source Coding. 1-6 - Akira Kamatsuka, Takahiro Yoshida:

Several Representations of $\alpha$-Mutual Information and Interpretations as Privacy Leakage Measures. 1-6 - Yonghui Li, Chentao Yue, Branka Vucetic:

Optimal Linear Map Decoding of Convolutional Codes. 1-6 - Jessica Bariffi, Antonia Wachter-Zeh, Eitan Yaakobi:

Sequence Reconstruction Over Coloring Channels for Protein Identification. 1-6 - Arunabh Srivastava, Thomas Jacob Maranzatto, Sennur Ulukus:

Age of Gossip with Time-Varying Topologies. 1-6 - Idan Tzachy, Ron Dabora, Shlomo Shamai:

An Upper Bound on the Capacity of Bandlimited LTI AWGN Channels subject to Peak-Amplitude Constraint. 1-6 - Lan Ma, Qifu Tyler Sun, Zongpeng Li:

Two-Dimensional Vector Linear Network Coding. 1-6 - Yifan Feng, Zhengchuan Chen, Mehul Motani, Howard H. Yang, Min Wang, Tony Q. S. Quek:

Remote Online Estimation of the Wiener Process: A Preprocessing Method to Ensure Distortion Convergence. 1-6 - Iris Kaplan, Or Ordentlich:

High-Rate Nested-Lattice Quantized Matrix Multiplication with Small Lookup Tables. 1-6 - Tai-Chun Yeh, Yu-Pin Hsu:

Optimizing the Trade-Off Between Throughput and Paoi Outage Exponents. 1-6 - Krishna Gopal Benerjee, Adrish Banerjee:

Single Edit Error-Correcting DNA Codes with Multiple Biological and Combinatorial Constraints: An Algebraic Approach. 1-6 - Galen Reeves, Henry D. Pfister:

Information-Theoretic Proofs for Diffusion Sampling. 1-6 - Ran Tamir, Nir Weinberger:

Achievable Rates of Frequency-based Channels of Unlimited Input Resolution. 1-6 - Yulin Chen, Raymond W. Yeung:

On Minimum Distances of Network Error Control Codes. 1-6 - Truman Welling, Rémi A. Chou, Aylin Yener:

Secret Sharing Over a Two Receiver Classical-Quantum Broadcast Channel. 1-6 - Holger Boche, Andrea Grigorescu, Rafael F. Schaefer, H. Vincent Poor:

Arithmetic Complexity of the Secrecy Capacity of Fast-Fading Gaussian Channels. 1-6 - Karan Vikyath Veeranna Rupashree, Siddharth Baskar, Daniel L. Pimentel-Alarcón:

Latent Union Completion. 1-6 - Saar Tarnopolsky, Zirui Deng, Vinayak Ramkumar, Netanel Raviv, Alejandro Cohen:

Individual Confidential Computing of Polynomials Over Non-Uniform Information. 1-6 - Kerong Wang, Zheng Zhang, Qian Yu:

Lagrange Coding for Tensor Network Contraction: Achieving Polynomial Recovery Thresholds. 1-6 - Tadashi Wadayama, Koji Igarashi, Takumi Takahashi:

Physics-Aware Decoding for Communication Channels Governed by Partial Differential Equations. 1-6 - So Suda, Shun Watanabe:

An Improved Lower Bound on Oblivious Transfer Capacity Using Polarization and Interaction. 1-6 - Xin Zhang, Zeyan Zhuang, Shenghui Song, Chau Yuen, Mérouane Debbah:

Capacity of Holographic MIMO Systems with Mutual Coupling. 1-6 - Ali Zafari, Xi Chen, Shirin Jalali:

DeCompress: Denoising via Neural Compression. 1-6 - Zihao Gong, Saikat Guha:

Entanglement-Enhanced Change Detection. 1-6 - Salman Beigi, Hami Mehrabi:

Monotonicity of the von Neumann Entropy Under Quantum Convolution. 1-6 - Mert Gökduman, Hanwen Yao, Henry D. Pfister:

The Performance of Long Quantum LDPC Codes Based on the Hypergraph Product. 1-6 - Xiangliang Kong, Xin Wang, Ron M. Roth, Itzhak Tamo:

New Bounds and Constructions for Variable Packet-Error Coding. 1-6 - Yuhao Liu, Yizhou Xu, TianQi Hou:

The Error Probability of Spatially Coupled Sparse Regression Codes Over Memoryless Channels. 1-6 - Shuo Wu, Pawan Poojary, Randall Berry:

Observational Learning with a Budget. 1-6 - Willie K. Harrison, Aylin Yener:

Authorship Identification: from Fundamental Limits to Practice. 1-6 - George Vershinin

, Asaf Cohen, Omer Gurewitz:
Multi-Stage Active Sequential Hypothesis Testing with Clustered Hypotheses. 1-6 - Xinyuanmeng Yao, Xiao Ma:

Low-Complexity PSCL Decoding of Polar Codes. 1-6 - Yuanxin Guo, Stark C. Draper, Wei Yu:

Modulo Quantization Coding for Gaussian Primitive Relay Channel With Perfectly Correlated Noises. 1-6 - Yang Lu, Margreta Kuijper, Jingge Zhu:

Towards Unified and Sharpened CMI Bounds for Generalization Errors. 1-6 - Sahan Liyanaarachchi, Sennur Ulukus:

Optimum Monitoring and Job Assignment with Multiple Markov Machines. 1-6 - Chen Wang, Yiwei Zhang, Kui Cai, Tuan Thanh Nguyen:

Capacities of DNA Constrained Channel: Efficient Synthesis and Biological Constraints. 1-6 - Dengsheng Lin:

A Design of Convolutional Gaussain Random Codes. 1-6 - Kengo Hashimoto, Ken-ichi Iwata:

A Lower Bound of Worst-Case Redundancy of $k$-Symbol Delay Decodable Codes. 1-6 - Abhishek Sarkar, Bikash Kumar Dey:

Message Identification Over Binary Noisy Permutation Channels. 1-6 - Ismail Cosandal, Sennur Ulukus, Nail Akar:

Which Sensor to Observe? Timely Tracking of a Joint Markov Source with Model Predictive Control. 1-6 - Harsh Vardhan, Avishek Ghosh, Arya Mazumdar:

Learning and Generalization with Mixture Data. 1-6 - Amir Ziaeddini, Yauhen Yakimenka, Jörg Kliewer:

Differentially-Private Decentralized Learning in Heterogeneous Multicast Networks. 1-6 - Jiayi Yang, Qianfan Wang, Shuangyang Li, Peng Kang, Xiao Ma, Baoming Bai, Giuseppe Caire:

Analysis and Design of Improved 5G LDPC Codes for Faster-Than-Nyquist Signaling. 1-6 - Jyun-Sian Wu, Pin-Hsun Lin, Marcel A. Mross, Eduard A. Jorswieck:

Wrap-Decoding in Asynchronous Unsourced Multiple Access With and Without Delay Information. 1-6 - Jiannan Li, Yiyang Yang, Yao Wang, Shaojie Tang:

A Unified Regularization Approach to High-Dimensional Generalized Tensor Bandits. 1-6 - Jonas Hawellek, Athin Mohan, Hadi Aghaee, Christian Deppe:

The Interference Channel with Entangled Transmitters. 1-6 - Rajlaxmi Pandey, Charul Rajput, B. Sundar Rajan:

Hierarchical Coded Caching in High Memory Regime with Coded Placement. 1-6 - Salman Habib, Taejoon Kim, Rémi A. Chou:

Sequential Interval Passing for Compressed Sensing. 1-6 - Giuseppe Serra, Photios A. Stavrou, Marios Kountouris:

On the Rate-Distortion-Perception Function for Gaussian Processes. 1-6 - Sagnik Bhattacharya:

Improved Upper Bound on Multiterminal Entanglement Distillation. 1-6 - Dina Abdelhadi, Colin Sandon, Emmanuel Abbe, Rüdiger L. Urbanke:

Reed-Muller Codes for Quantum Pauli and Multiple Access Channels. 1-6 - Gakuto Obi, Ayato Saito, Yuto Sasaki, Tsuyoshi Kato:

Linearly Convergent Mixup Learning. 1-6 - Lugaoze Feng, Xunan Li, Guocheng Lv, Ye Jin:

New Channel Coding Lower Bounds for Noisy Permutation Channels. 1-6 - Lev Yohananov, Isaac Barouch Essayag:

Optimal Functional $2^{s-1}$-Batch Codes: Exploring New Sufficient Conditions. 1-6 - Aaron Putterman, Vadim Zaripov:

Bivariate Linear Operator Codes. 1-6 - Johannes Rosenberger, Holger Boche, Juan A. Cabrera, Christian Deppe, Frank H. P. Fitzek:

Stochastic Consensus-Testing in Relay Networks. 1-6 - Vincent Wüst, Erdem Eray Cil, Laurent Schmalen:

Protograph-Based LDPC Codes with Local Irregularity. 1-6 - Ziv Aharoni, Henry D. Pfister:

Neural Polar Decoders for Deletion Channels. 1-6 - Tamara Abou El Hessen, Daniela Tuninetti, Adam Belkhadir, Aritra Banerjee:

Channel Capacity Analysis with Nonlinear Effects of RF Power Amplifiers. 1-6 - Homa Nikbakht, Yonina C. Eldar, H. Vincent Poor:

A MIMO ISAC System for Ultra-Reliable and Low-Latency Communications. 1-6 - Naomi Sagan, Tsachy Weissman:

A Family of Lz78-Based Universal Sequential Probability Assignments. 1-6 - Colton P. Lindstrom, Matthieu R. Bloch:

Rate Distortion Approach to Joint Communication and Sensing with Markov States: Open Loop Case. 1-6 - Daniel J. Costello Jr., Min Zhu, David G. M. Mitchell, Michael Lentmaier:

High-Rate Spatially Coupled LDPC Codes Based on Massey's Convolutional Self-Orthogonal Codes. 1-6 - Malcolm Egan:

Risk-Aware Estimation from Compressed Data Beyond the Bayes Risk. 1-6 - Daiki Suruga:

A Unified Approach and Solutions for $n$-Task Problems. 1-6 - Ibrahim C. Abou-Faycal, Jihad Fahs, Ibrahim Issa:

The Generalized Chernoff-Stein Lemma, Applications and Examples. 1-6 - Hadi Aghaee, Christian Deppe:

On Oblivious Transfer Capacity of Noisy Multiple Access Channel. 1-6 - Xianyin Zhang, Jinchi Chen, Ke Wei:

Phase Retrieval of Spectrally Sparse Signals. 1-6 - Yossef Steinberg:

Degradedness Under Cooperation. 1-6 - Justin Zhang, K. V. Rashmi:

Secure Convertible Codes for Passive Eavesdroppers. 1-6 - Sijie Li, Takashi Tanaka, Hyeji Kim:

Lower Bound of Networked Linear Quadratic Gaussian Plant with Two Linear Sensors and One Controller. 1-6 - Pumiao Yan, Jiwon Jeong, Naomi Sagan, Tsachy Weissman:

Universal Discrete Filtering with Lookahead and Delay. 1-6 - M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, G. Yeswanth Sai, Xiangliang Kong:

On Linear Field Size Access-Optimal MDS Convertible Codes. 1-6 - Maryam Sadeghi, Hassan Khodaiemehr, Chen Feng:

Design and Decoding of Full-Diversity Construction-D Lattices on Block-Fading Channels. 1-6 - Mohsen Moradi, Hessam Mahdavifar:

PAC Codes with Bounded-Complexity Sequential Decoding: Pareto Distribution and Code Design. 1-6 - Xinlin Li, Osama A. Hanna, Christina Fragouli, Suhas N. Diggavi:

D2C-CID: Discrete-to-Continuous Common Information Dimension. 1-6 - Arghya Chakraborty, Georgios Fellouris:

High-dimensional Quickest Change Detection in Multiple Data Streams with Adaptive Window-Based Subset Estimation. 1-6 - Sabrina Liu, Todd P. Coleman:

Inferring Dynamic Delays Using a Sample Path Causal Measure. 1-6 - Anoosheh Heidarzadeh, Ningze Wang, Alex Sprintson:

A Linear Programming Approach to Private Information Retrieval. 1-6 - Burak Çakmak, Giuseppe Caire:

Multi-Source Approximate Message Passing With Random Semi-Unitary Dictionaries. 1-6 - Julia Gaudio, Heming Liu:

Spectral Recovery in the Labeled SBM. 1-6 - Florian Seitz, Janis Nötzel:

Capacity Formulas for the Lossy Bosonic Compound Wiretap Channel. 1-6 - Mohamed W. Nomeir, Alptug Aytekin, Sennur Ulukus:

The Asymptotic Capacity of Byzantine Symmetric Private Information Retrieval and its Consequences. 1-6 - Or Elimelech, Asaf Cohen:

PIR Over Wireless Channels: Achieving Privacy with Public Responses. 1-6 - Kristiyan Savov, Constantin Runge:

Quantized Enumerative Sphere Shaping. 1-6 - Swapnil Saha, Emina Soljanin, Philip Whiting:

On Optimal Batch Size in Coded Computing. 1-6 - Merve Karakas, Osama A. Hanna, Lin F. Yang, Christina Fragouli:

Does Feedback Help in Bandits with Arm Erasures? 1-6 - Theshani Nuradha, Vishal Singh, Mark M. Wilde:

Measured Hockey-Stick Divergence and Its Applications to Quantum Pufferfish Privacy. 1-6 - Thomas Jacob Maranzatto, Arunabh Srivastava, Sennur Ulukus:

Information Degradation and Misinformation in Gossip Networks. 1-6 - Cüneyd Öztürk, Dongning Guo, Randall A. Berry, Michael L. Honig:

Downlink Spectral Efficiency of Leo Satellite Constellations. 1-6 - Ruizhi Zhang:

Optimal Bounded-Influence Procedure for Robust Sequential Change-Point Detection. 1-6 - Maximilian Egger, Rüdiger L. Urbanke, Rawad Bitar:

Federated One-Shot Learning with Data Privacy and Objective-Hiding. 1-6 - Igor L. Aureliano, Alejandro Cohen, Rafael G. L. D'Oliveira:

Optimal Computational Secret Sharing. 1-6 - Shayan Mohajer Hamidi, En-Hui Yang:

Score-Based Manifold Projection for Diffusion-Based Inverse Problems. 1-6 - Kunal Dey

, Reihaneh Safavi-Naini:
Secure Composition of Quantum Key Distribution and Symmetric Key Encryption. 1-6 - Mohammad Rowshan, Vlad-Florin Dragoi:

Towards Weight Distribution-Aware Polar Codes. 1-6 - Amirmohammad Farzaneh, Osvaldo Simeone:

Statistically Valid Information Bottleneck via Multiple Hypothesis Testing. 1-5 - Jan Christian Riedel, Chee-Wei Tan, Giuseppe Caire:

Deep Unfolding of Fixed-Point Based Algorithm for Weighted Sum Rate Maximization. 1-6 - Abhishek Roy, Smarajit Das, Sudhan Majhi:

Construction of MOGCS with Flexible Parameters via Extended Boolean Functions. 1-6 - Wesley A. Suttle:

An Analysis of Plug-in and Bias-corrected Fixed-k Nearest Neighbor Density Functional Estimators. 1-6 - Rui Sun, Yiwei Zhang:

MDS-TPIR Schemes: Disguise and Squeeze. 1-6 - Monica Welfert, Nathan Stromberg, Mario Díaz, James Melbourne, Lalitha Sankar:

Auditing Privacy of Additive Noise Mechanisms Using Linear Predictive Models. 1-6 - Boqing Zhang, Hanwen Yao, Henry D. Pfister:

Belief Propagation Decoding on a Sparsified Graph Ensemble of the Surface Code. 1-6 - Adway Girish, Emre Telatar, Shlomo Shamai Shitz:

On Entropy-Constrained Gaussian Channel Capacity via the Moment Problem. 1-6 - Shayan Mohajer Hamidi, En-Hui Yang:

Conditional Mutual Information Based Diffusion Posterior Sampling for Solving Inverse Problems. 1-6 - Wafa Labidi, Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:

Common Randomness Generation from Sources with Infinite Polish Alphabets. 1-6 - Sahasrajit Sarmasarkar, Harish Pillai:

Optimal Moments on Redundancies in Job Cloning. 1-6 - Huanran Li, Daniel L. Pimentel-Alarcón:

Deep Fusion: Capturing Dependencies in Contrastive Learning via Transformer Projection Heads. 1-6 - Nithish Suresh Babu, Adi Krishnamoorthy, Ron M. Roth, Paul H. Siegel:

On Differential Varshamov - Tenengolts Codes. 1-6 - Johannes Rosenberger, Holger Boche, Christian Deppe, Uzi Pereg:

The Quantum Identification Capacity with Entanglement Assistance. 1-6 - Xuzhe Xia, Nicholas Kwan, Lele Wang:

On the Worst-Case Complexity of Gibbs Decoding for Reed-Muller Codes. 1-6 - Yuan Li, Zicheng Ye, Huazi Zhang, Jun Wang, Guiying Yan, Zhiming Ma:

On the Average Weight Spectrum of Pre-Transformed Rate-Compatible Polar Codes. 1-5 - Vikrant Malik, Taylan Kargin, Victoria Kostina, Babak Hassibi:

Distributionally Robust Scalar Quantization Using the Wasserstein Distance. 1-6 - Hassan ZivariFard, Rémi A. Chou, Xiaodong Wang:

Joint Covert Communication and Covert Secret Key Generation via Causal CSI. 1-6 - Ching-Fang Li, Mary Wootters:

Improved Bounds on Access-Redundancy Tradeoffs in Quantized Linear Computations. 1-6 - Boaz Moav, Eitan Yaakobi, Ryan Gabrys:

Complex DNA Synthesis Sequences. 1-6 - Chentao Yue, Branka Vucetic, Yonghui Li:

Guesswork Complexity of Ordered Statistics Decoding and its Saturation Threshold. 1-6 - Avital Boruchovsky, Tuvi Etzion, Ron M. Roth:

On Nearly Perfect Covering Codes. 1-6 - Joonhyuk Yang, Hye Won Chung:

Improved Community Recovery via Exact Matching in Correlated Contextual Stochastic Block Models. 1-6 - Kayodé Epiphane Nouetowa, Pierre Loidreau:

An Analysis of a Generalization of Loidreau's Encryption Scheme. 1-6 - Oliver Kosut, Michael Langberg, Michelle Effros:

Switched Feedback for the Multiple-Access Channel. 1-6 - Junsheng Liu, Netanel Raviv:

Single Fragment Forensic Coding from Van Der Corput Sets. 1-6 - Antoine Dailly, Tuomo Lehtilä

:
Reconstructing Graphs from Subgraph Compositions. 1-6 - V Arvind Rameshwar, Anshoo Tandon, Abhay Sharma:

Improving the Privacy Loss Under User-Level DP Composition for Fixed Estimation Error. 1-6 - Mehdi Molkaraie:

On the Equivalence of Gaussian Graphical Models Defined on Complete Bipartite Graphs. 1-6 - Yirong Shen, Lu Gan, Cong Ling:

Generalized Score Matching: Bridging $f$-Divergence and Statistical Estimation Under Correlated Noise. 1-6 - Taha Ameen, Bruce E. Hajek:

Detecting Correlation Between Multiple Unlabeled Gaussian Networks. 1-6 - Hanyang Jiang, Yao Xie, Feng Qiu:

Spatio-Temporal Conformal Prediction for Power Outage Data. 1-6 - Jordan Hong

, Stefan M. Moser:
MISO Wireless Optical Communication Under a First-Moment and a Peak-Power Constraint: Theoretical and Practical Aspects. 1-6 - Chin Wa Ken Lau, Xiang Shi, Ziyan Zheng, Haiwen Cao, Nian Guo:

Interplay Between Belief Propagation and Transformer: Differential-Attention Message Passing Transformer. 1-6 - Yeganeh Alimohammadi, Luana Ruiz, Amin Saberi:

A Local Graph Limits Perspective on Sampling-Based GNNs. 1-6 - Roee Gross, Roni Con, Eitan Yaakobi:

Improved Constructions of Linear Codes for Insertions and Deletions. 1-6 - Sidharth Jaggi, Shashank Vatedka, Venkat Chandar, Aslan Tchamkerten:

A Simple Low Complexity Locally Private Compression Scheme. 1-5 - Ming Li, Minghui Yang, Xianhui Lu:

Channel Capacity Under Exponentially Decreasing Error Probability. 1-6 - Wenyuan Zhao, Yu-Shin Huang, Chao Tian, Alex Sprintson:

Optimizing Leaky Private Information Retrieval Codes to Achieve $O(\log K)$ Leakage Ratio Exponent. 1-6 - Zicheng Ye, Yuan Li, Zhichao Liu, Huazi Zhang, Jun Wang, Guiying Yan, Zhiming Ma:

On the Weight Spectrum of Rate-Compatible Polar Codes. 1-6 - Sifat Munim, Aditya Ramamoorthy:

Approximate Gradient Coding Using Convex Optimization. 1-6 - Matthieu Fradelizi, Lampros Gavalakis, Martin Rapaport:

A Dimensional Improvement of the Entropy Power Inequality Under Marginal Assumptions. 1-6 - Tiju Cherian John, Hemant K. Mishra, Saikat Guha:

A Complete Characterization of Passive Unitary Normalizable (PUN) Gaussian States. 1-6 - Duncan Soiffer, Andrew Salls, Chase Miller, Daniel Reichman, Gábor N. Sárközy, George T. Heineman:

Improved Lower Bounds on the Expected Length of Longest Common Subsequences. 1-6 - Hanzaleh Akbarinodehi, Viveck R. Cadambe, Mohammad Ali Maddah-Ali:

Game of Coding: Enabling Sybil Resistant Decentralized Machine Learning. 1-6 - Yeow Meng Chee, Tuvi Etzion, Huimin Lao:

Hierarchy of Pseudo-Random Array Codes. 1-6 - Giorgio Taricco:

Outage Probability of Correlated RIS-Aided Communication Links. 1-5 - Alankrita Bhatt, Or Ordentlich, Oron Sabag:

Optimal Online Bookmaking for Binary Games. 1-6 - Shiv Pratap Singh Rathore, Navin Kashyap:

Trace Reconstruction of First-Order Reed-Muller Codewords Using Run Statistics. 1-6 - Tal Philosof, Ariel Doubchak, Amit Berman

, Uri Erez:
Extension of the Poltyrev Bound to Binary Memoryless Symmetric Channels. 1-6 - Lewen Wang, Zihao Zhang, Sihuang Hu:

Lower Bounds on the Sub-Packetization of Optimal-Access Msr Codes for Multiple-Node Repair. 1-6 - Koki Takahashi, Shun Watanabe:

Channel Resolvability Using Multiplicative Weight Update Algorithm. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














