


default search action
ITW 2022: Mumbai, India
- IEEE Information Theory Workshop, ITW 2022, Mumbai, India, November 1-9, 2022. IEEE 2022, ISBN 978-1-6654-8341-4

- Jian Lu, Yinfei Xu, Shuo Shao:

Functional Privacy for Distributed Function Computation. 1-6 - Mohammad Amin Zarrabian

, Ni Ding, Parastoo Sadeghi:
Asymmetric Local Information Privacy and the Watchdog Mechanism. 7-12 - Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund:

Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage. 13-18 - Zitan Chen:

Rack-aware MSR codes with optimal access. 19-24 - Hoover H. F. Yin

, Mehrdad Tahernia:
Multi-Phase Recoding for Batched Network Coding. 25-30 - Jiajun Chen

, Chi Wan Sung:
Weakly Secure Coded Distributed Computing with Group-based Function Assignment. 31-36 - Teng-Hui Huang

, Aly El Gamal, Hesham El Gamal:
On The Multi-View Information Bottleneck Representation. 37-42 - Xuetong Wu, Jonathan H. Manton, Uwe Aickelin

, Jingge Zhu:
Fast Rate Generalization Error Bounds: Variations on a Theme. 43-48 - Xinyi Tong, Jian Xu

, Shao-Lun Huang:
An Information-theoretic Method for Collaborative Distributed Learning with Limited Communication. 49-54 - Sadaf ul Zuhra, Samir M. Perlaza

, H. Vincent Poor, Mikael Skoglund:
Information-Energy Trade-offs with EH Non-linearities in the Finite Block-Length Regime with Finite Constellations. 55-60 - Nguyen Minh Tran, Muhammad Miftahul Amri

, Je Hyeon Park, Ghafar Ramadhan Faqih, Dong In Kim
, Kae Won Choi:
Beam Splitting Technique for Reconfigurable Intelligent Surface-Aided Simultaneous Wireless Information and Power Transfer Applications. 61-65 - Nizar Khalfet, Ghassan M. Kraidy, Constantinos Psomas, Ioannis Krikidis:

Information-Energy Capacity Region for IRS-aided SWIPT Systems. 66-70 - Lampros Gavalakis, Ioannis Kontoyiannis:

Information-theoretic de Finetti-style theorems. 71-76 - Lan V. Truong, Josep Font-Segura, Giuseppe Cocco, Albert Guillén i Fàbregas:

Convergence in Distribution of the Error Exponent of Random Codes at Zero Rate. 77-82 - Anelia Somekh-Baruch:

New Upper Bounds on the Mismatch Capacity and the Mismatched Reliability Function. 83-88 - Yi-Sheng Su:

Robust Private Information Retrieval with Optimal Server Computation. 89-94 - Zhusheng Wang, Sennur Ulukus:

Digital Blind Box: Random Symmetric Private Information Retrieval. 95-100 - Alejandro Gomez-Leos, Anoosheh Heidarzadeh:

Single-Server Private Information Retrieval With Side Information Under Arbitrary Popularity Profiles. 101-106 - Yiwen Wang

, Jifan Liang, Xiao Ma:
Local Constraint-Based Ordered Statistics Decoding for Short Block Codes. 107-112 - Adrián Torres-Martín, Mercè Villanueva

:
Partial permutation decoding for ℤ8-linear Hadamard codes. 113-118 - Amirreza Asadzadeh, Masoud Barakatain, Jeebak Mitra, Frank R. Kschischang, Stark C. Draper:

Randomized Scheduling of ADMM-LP Decoding Based on Geometric Priors. 119-124 - Valentinian Lungu, Ioannis Papageorgiou, Ioannis Kontoyiannis:

Bayesian Change-Point Detection via Context-Tree Weighting. 125-130 - Parham Boroumand, Albert Guillén i Fàbregas:

Composite Neyman-Pearson Hypothesis Testing with a Known Hypothesis. 131-136 - Sujay Bhatt, Guanhua Fang, Ping Li, Gennady Samorodnitsky:

Regret Analysis for RL using Renewal Bandit Feedback. 137-142 - Okko Makkonen

, Camilla Hollanti
:
General Framework for Linear Secure Distributed Matrix Multiplication with Byzantine Servers. 143-148 - Hiram H. López

, Gretchen L. Matthews, Daniel Valvo:
Secure MatDot codes: a secure, distributed matrix multiplication scheme. 149-154 - Roberto Assis Machado, Felice Manganiello

:
Root of Unity for Secure Distributed Matrix Multiplication: Grid Partition Case. 155-159 - Ankur Mallick, Gauri Joshi:

Rateless Sum-Recovery Codes For Distributed Non-Linear Computations. 160-165 - Federico Brunero, Petros Elia:

On the Optimality of Coded Caching With Heterogeneous User Profiles. 166-171 - Apurve K. Pandey, Monolina Dutta, Anoop Thomas:

Decentralized Coded Caching for Shared Caches using Erasure Coding. 172-177 - Antonino Favano, Marco Ferrari

, Maurizio Magarini, Luca Barletta:
The Capacity of Fading Vector Gaussian Channels Under Amplitude Constraints on Antenna Subsets. 178-183 - Charalambos D. Charalambous, Stelios Louka, Sergey Loyka:

A Riccati-Lyapunov Approach to Nonfeedback Capacity of MIMO Gaussian Channels Driven by Stable and Uns table Noise. 184-189 - Mehdi Karbalayghareh, Aria Nosratinia

:
Interaction of Pilot Reuse and Channel State Feedback under Coherence Disparity. 190-195 - Simeng Zheng, Paul H. Siegel:

Code-Aware Storage Channel Modeling via Machine Learning. 196-201 - Ron M. Roth:

Fault-Tolerant Neuromorphic Computing on Nanoscale Crossbar Architectures. 202-207 - Xiangwu Zuo, Anxiao Andrew Jiang, Netanel Raviv, Paul H. Siegel:

Symbolic Regression for Data Storage with Side Information. 208-213 - Marvin Xhemrishi, Maximilian Egger, Rawad Bitar:

Efficient Private Storage of Sparse Machine Learning Data. 214-219 - Sagi Marcovich, Eitan Yaakobi:

The Zero Cubes Free and Cubes Unique Multidimensional Constraints. 220-225 - Onur Günlü

, Rafael F. Schaefer
, Holger Boche, H. Vincent Poor:
Secure and Private Source Coding with Private Key and Decoder Side Information. 226-231 - Vamoua Yachongka

, Hideki Yagi, Hideki Ochiai:
Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels. 232-237 - Boris Ryabko:

Using data compression and randomisation to build an unconditionally secure short key cipher. 238-242 - Marvin Geiselhart, Ahmed Elkelesh, Jannis Clausius, Stephan ten Brink:

A Polar Subcode Approach to Belief Propagation List Decoding. 243-248 - Mohammad Rowshan

, Son Hoang Dau, Emanuele Viterbo:
Improving the Error Coefficient of Polar Codes. 249-254 - Mohammad Rowshan

, Jinhong Yuan:
Fast Enumeration of Minimum Weight Codewords of PAC Codes. 255-260 - Haiwen Cao

, Pascal O. Vontobel
:
Sparse Regression Codes for MIMO Detection. 261-266 - Yuhao Liu, Teng Fu, Jean Barbier, Tianqi Hou:

Sparse superposition codes with rotational invariant coding matrices for memoryless channels. 267-272 - Guojun Chen

, Yinfei Xu, Tiecheng Song, Jing Hu:
An Extremal Inequality With Application to Gray-Wyner System. 273-278 - Yong Xiao, Xu Zhang, Yingyu Li, Guangming Shi, Tamer Basar:

Rate-Distortion Theory for Strategic Semantic Communication. 279-284 - Rony Bou Rouphael, Maël Le Treust:

Strategic Communication with Cost-Dependent Decoders via the Gray-Wyner Network. 285-290 - Qi Cao, Qiaoqiao Zhou:

On the Zero-Error Capacity of the Chemical Residual Channel. 291-296 - Haider Al Kim, Kai-Jie Chan:

Codes for Preventing Zeros at Partially Defective Memory Positions. 297-302 - Vladimir Edemskiy

, Sergey Garbar
:
The linear complexity of sequences with low autocorrelation from interleaved technique and period pq. 303-308 - Shao-Lun Huang:

Communicating Type Classes Through Channels: An Information Geometric View. 309-314 - Yizhu Wang, Tao Guo, Bo Bai, Wei Han:

The Estimation-Compression Separation in Semantic Communication Systems. 315-320 - Barak Amihood, Asaf Cohen:

Covertly Controlling a Linear System. 321-326 - Jinzhe Pan, Wai Ho Mow:

Angular Domain-Based Importance Sampling Estimator for Linear Block Codes over the AWGN Channel with M-PSK Modulation. 327-331 - Yuan Li, Xianbin Wang, Huazi Zhang, Jun Wang, Wen Tong, Guiying Yan, Zhiming Ma:

Deterministic Identification over Channels without CSI. 332-337 - Wenyi Shi, Shuqin Pang, Wenyi Zhang:

Linear Shrinkage Receiver for Slow Fading Channels under Imperfect Channel State Information. 338-343 - Deheng Yuan, Tao Guo, Bo Bai, Wei Han:

Lossy Computing with Side Information via Multi-Hypergraphs. 344-349 - Mahmoud Hegazy, Cheuk Ting Li

:
Randomized Quantization with Exact Error Distribution. 350-355 - Neil Ashim Mehta, Pulkit Grover

:
Efficient interventions in a neural circuit from observations: an information-theoretic study. 356-361 - Ämin Baumeler

, Carla Rieger, Stefan Wolf:
Thermodynamics as Combinatorics: A Toy Theory. 362-367 - Hangmei Rao, Ligong Wang:

An Extensible Covert Communication Scheme Over the AWGN Channel With Feedback. 368-373 - Seyed Reza Hoseini Najarkolaei, Narges Kazempour, Mohammad Reza Aref, Deniz Gündüz:

Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority. 374-379 - Yashas Malur Saidutta

, Faramarz Fekri
, Afshin Abdi:
A Machine Learning Framework for Privacy-Aware Distributed Functional Compression over AWGN Channels. 380-385 - Serhat Bakirtas

, Elza Erkip:
Seeded Database Matching Under Noisy Column Repetitions. 386-391 - Jixiang Zhang, Yinfei Xu:

On Age of Information for Discrete Time Status Updating System With Infinite Size. 392-397 - Priyanka Kaswan, Sennur Ulukus:

Susceptibility of Age of Gossip to Timestomping. 398-403 - Lijia Yang, Li Chen:

Low-Latency Ordered Statistics Decoding of BCH Codes. 404-409 - Sajani Vithana, Sennur Ulukus:

Private Federated Submodel Learning with Sparsification. 410-415 - Ruowan Ji, Anoosheh Heidarzadeh, Krishna R. Narayanan:

Sparse Random Khatri-Rao Product Codes for Distributed Matrix Multiplication. 416-421 - Michael Langberg, Michelle Effros:

Network Coding Multicast Key-Capacity. 422-427 - Ali Khalesi, Petros Elia:

Multi-User Linearly Separable Computation: A Coding Theoretic Approach. 428-433 - Chenglin Fan, Ping Li:

Metric Nearness with Minimum Distortion: Optimal and Approximation. 434-439 - Hrayr Harutyunyan, Greg Ver Steeg, Aram Galstyan:

Formal limitations of sample-wise information-theoretic generalization bounds. 440-445 - Xue Zheng, Parinaz Naghizadeh

, Aylin Yener:
DiPLe: Learning Directed Collaboration Graphs for Peer-to-Peer Personalized Learning. 446-451 - Xavier Coiteux-Roy

, Stefan Wolf:
Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography. 452-457 - Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:

An Alphabet of Leakage Measures. 458-463 - Hassan ZivariFard, Rémi A. Chou

:
Secure Data Storage Resilient Against Compromised Users via an Access Structure. 464-469 - Bernhard Haeupler

, Amirbehshad Shahrasbi:
Rate-Distance Trade-offs for List-Decodable Insertion-Deletion Codes. 470-475 - Gökberk Erdogan, Georg Maringer, Nikita Polyanskii:

Signature Codes for a Noisy Adder Multiple Access Channel. 476-481 - Vlad-Florin Dragoi

, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. 482-487 - Julien du Crest, Mehdi Mhalla, Valentin Savin

:
Stabilizer Inactivation for Message-Passing Decoding of Quantum LDPC Codes. 488-493 - Sarah Brandsen, Avijit Mandal, Henry D. Pfister

:
Belief Propagation with Quantum Messages for Symmetric Classical-Quantum Channels. 494-499 - Michael R. Grace, Saikat Guha:

Perturbation Theory for Quantum Information. 500-505 - Shi-Yuan Wang, Tuna Erdogan, Uzi Pereg, Matthieu R. Bloch

:
Joint Quantum Communication and Sensing. 506-511 - Charul Rajput

, Maheshanand Bhaintwal:
A subclass of LRC codes with intersecting recovering sets. 512-516 - Irina E. Bocharova, Boris D. Kudryashov, Sander Mikelsaar:

Irregular Generalized LDPC codes in Practical Communication Scenarios. 517-522 - Dipak Kumar Bhunia

, Cristina Fernández-Córdoba, Mercè Villanueva
:
On the Classification of ZpZp2 Generalized Hadamard Codes. 523-528 - U. S. S. Sasanka, V. Lalitha:

Tamo-Barg Codes with Efficient Local Repair. 529-534 - Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss

:
Strong Converses using Change of Measure and Asymptotic Markov Chains. 535-540 - Satyajit Thakor

, Dauood Saleem:
A Quasi-Uniform Approach to Characterizing the Boundary of the Almost Entropic Region. 541-545 - Michael Dikshtein, Nir Weinberger, Shlomo Shamai Shitz:

On Information Bottleneck for Gaussian Processes. 546-551 - Jaswanthi Mandalapu

, Krishna P. Jagannathan:
The Classical Capacity of Quantum Jackson Networks with Waiting Time-Dependent Erasures. 552-557 - Shuche Wang, Van Khu Vu, Vincent Y. F. Tan:

Codes for the Asymmetric Damerau-Levenshtein Distance. 558-563 - Shubhransh Singhvi, Omer Sabary, Daniella Bar-Lev, Eitan Yaakobi:

The Input and Output Entropies of the k-Deletion/Insertion Channel with Small Radii. 564-569 - Luca G. Tallini, Nawaf Alqwaifly

, Bella Bose:
Efficient Systematic Deletions/Insertions of 0's Error Control Codes *. 570-575 - Stefano Della Fiore, Marco Dalai

, Ugo Vaccaro:
Achievable Rates and Algorithms for Group Testing with Runlength Constraints. 576-581 - Sourbh Bhadane, Aaron B. Wagner, Johannes Ballé:

Do Neural Networks Compress Manifolds Optimally? 582-587 - Mohammad Hossein Amani, Simone Bombari, Marco Mondelli, Rattana Pukdee, Stefano Rini:

Sharp asymptotics on the compression of two-layer neural networks. 588-593 - Fengzhuo Zhang, Anshoo Tandon

, Vincent Y. F. Tan:
Active-LATHE: An Active Learning Algorithm for Boosting the Error Exponent for Learning Homogeneous Ising Trees. 594-599 - Navneet Agrawal, Yuqin Qiu, Matthias Frey

, Igor Bjelakovic, Setareh Maghsudi, Slawomir Stanczak, Jingge Zhu
:
A Learning-Based Approach to Approximate Coded Computation. 600-605 - Ralf R. Müller:

Linear Computation Coding Inspired by the Lempel-Ziv Algorithm. 606-611 - Shobhit Bhatnagar, Vinayak Ramkumar, P. Vijay Kumar:

Rate-Optimal Streaming Codes with Smaller Field Size Under Less-Stringent Decoding-Delay Requirements. 612-617 - Athreya Chandramouli, Abhinav Vaishya, Prasad Krishnan:

Coded Data Rebalancing for Distributed Data Storage Systems with Cyclic Storage. 618-623 - V Arvind Rameshwar

, Navin Kashyap:
Linear Runlength-Limited Subcodes of Reed-Muller Codes and Coding Schemes for Input-Constrained BMS Channels. 624-629 - Anisha Banerjee, Andreas Lenz, Antonia Wachter-Zeh:

Sequential Decoding of Convolutional Codes for Synchronization Errors. 630-635 - Mladen Kovacevic

, Dejan Vukobratovic:
Optimal Error-Detecting Codes for General Asymmetric Channels via Sperner Theory. 636-641 - Chia-Yu Hsu, Ching-Fang Li, I-Hsiang Wang:

On Universal Sequential Classification from Sequentially Observed Empirical Statistics. 642-647 - Karthik Periyapattana Narayana Prasad, Kota Srinivas Reddy

, Vincent Y. F. Tan:
Best Restless Markov Arm Identification. 648-653 - K. V. Harsha

, Jithin Ravi, Tobias Koch:
Second-Order Asymptotics of Hoeffding-Like Hypothesis Tests. 654-659 - Shibsankar Das

, Krishna Gopal Benerjee
, Adrish Banerjee:
On DNA Codes Over the Non-Chain Ring ℤ4 +uℤ4 +u2ℤ4 with u3 =1. 660-665 - Yuwen Huang, Pascal O. Vontobel

:
On the Relationship Between the Minimum of the Bethe Free Energy Function of a Factor Graph and Sum-Product Algorithm Fixed Points. 666-671 - Kit Shing Ng, Pascal O. Vontobel

:
Double-Cover-Based Analysis of the Bethe Permanent of Non-negative Matrices. 672-677 - Elizabath Peter, K. K. Krishnan Namboodiri

, B. Sundar Rajan:
Shared Cache Coded Caching Schemes with known User-to-Cache Association Profile using Placement Delivery Arrays. 678-683 - Ativ Joshi

, Abhishek Sinha:
Universal Caching. 684-689 - Mallikharjuna Chinnapadamala

, B. Sundar Rajan:
Security and Privacy in Cache-Aided Linear Function Retrieval for Multi-Access Coded Caching. 690-695 - Tulasi Sowjanya B.

, Visvesh Subramanian, Prasad Krishnan:
Bounding the Optimal Length of Pliable Index Coding via a Hypergraph-based Approach. 696-701 - Anjana Ambika Mahesh, B. Sundar Rajan:

Minrank of Embedded Index Coding Problems and its Relation to Connectedness of a Bipartite Graph. 702-707 - Yauhen Yakimenka, Chung-Wei Weng, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:

Straggler-Resilient Differentially-Private Decentralized Learning. 708-713 - Sarah A. Obead, Jörg Kliewer:

Multi-Message Pliable Private Information Retrieval. 714-719 - Matthias Frey

, Igor Bjelakovic, Janis Nötzel, Slawomir Stanczak:
Semantic Security with Infinite Dimensional Quantum Eavesdropping Channel. 720-725 - Praneeth Kumar Vippathalla

, Chung Chan
, Navin Kashyap, Qiaoqiao Zhou:
Positivity of Secret Key Capacity for Hypergraphical Sources with a Linear Wiretapper. 726-731 - Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

:
Commitment over Unreliable Noisy Channels: When Awareness Meets Control. 732-737 - Canran Wang, Netanel Raviv:

All-to-All Encode in Synchronous Systems. 738-743 - Canran Wang, Netanel Raviv:

Breaking Blockchain's Communication Barrier with Coded Computation. 744-749 - Derya Malak:

Fractional Graph Coloring for Functional Compression with Side Information. 750-755 - Alexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard:

A Bivariate Invariance Principle. 756-761 - Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche:

A General Formula for Uniform Common Randomness Capacity. 762-767 - Reka Inovan, Emre Telatar:

Safety in Numbers: Asymptotic Analysis of a Monitoring Problem. 768-773

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














