


default search action
ITW 2024: Shenzhen, China
- IEEE Information Theory Workshop, ITW 2024, Shenzhen, China, November 24-28, 2024. IEEE 2024, ISBN 979-8-3503-4893-4

- Xinwei Zhao, Xiao Ma:

A Low-Latency Decoding of CA-Polar-SPC Product Codes. 1-6 - Junping Wu, Lawrence Ong, Sarah Johnson, Jin Yeong Tan

:
Pliable Index Coding with Restricted Decoding Sets. 7-12 - Lin Sok, Martianus Frederic Ezerman, San Ling

:
On the Hermitian Hulls of Two-Point Algebraic Geometry Codes. 13-18 - Peikai Li, Jingjie Lv, Linqi Song

, Li Zhang, Hanxu Hou:
New Cauchy MDS Array Codes with Flexible Sub-Packetization and Efficient Decoding. 19-24 - Amirreza Zamani, Borja Rodríguez Gálvez, Mikael Skoglund:

On Information Theoretic Fairness: Compressed Representations with Perfect Demographic Parity. 25-30 - Khac-Hoang Ngo

, Johan Östman, Alexandre Graell i Amat:
On Local Mutual-Information Privacy. 31-36 - Denis Kozlov

, Mahtab Mirmohseni, Rahim Tafazolli:
Secure Semantic Communication Over Wiretap Channel. 37-42 - Sufang Yang, Longguang Li, Jintao Wang:

Physical-Layer Security for MIMO Visible Light Communication Wiretap Channel. 43-48 - Lina Zhu, Lin Zhou:

Large Deviations for Outlier Hypothesis Testing of Continuous Sequences. 49-54 - Yuanxin Guo, Sadaf Salehkalaibar, Stark C. Draper, Wei Yu:

One-Shot Achievability Region for Hypothesis Testing with Communication Constraint. 55-60 - Xiaotian Zhang, Jun Diao, Lin Zhou:

Large Deviations for Outlier Hypothesis Testing with Distribution Uncertainty. 61-66 - Fatemeh Khaledian

, Reza Asvadi, Elsa Dupraz, Tad Matsumoto:
Covering Codes as Near-Optimal Quantizers for Distributed Hypothesis Testing Against Independence. 67-72 - Qinyi Lu, Nan Liu, Wei Kang:

Demand Private Coded Caching: The Two-File Case. 73-78 - Han Fang, Qinyi Lu, Nan Liu, Wei Kang:

Optimal Memory-Rate Tradeoff for Secure Multi-Access Coded Caching: The Case of Largest Access Number. 79-84 - Anupam Nayak, Kota Srinivas Reddy, Nikhil Karamchandani:

On the Regret of Coded Caching with Adversarial Requests. 85-90 - Rajlaxmi Pandey, B. Sundar Rajan:

Coded Caching for Hierarchical Two-Layer Multi-Access Networks with Low Coding Delay. 91-96 - Rong Hu, Xiaofan He:

Revisiting Distributed Source Coding for Efficient Downlink Transmission in Coded Edge Computing. 97-102 - Viswanathan Ramachandran

, Tobias J. Oechtering, Mikael Skoglund:
Multi-terminal Strong Coordination with Degraded Source Observations. 103-108 - Xinyang Li, Vlad-Costin Andrei, Ullrich J. Mönich, Holger Boche:

An Achievable Rate-Distortion Region for Joint State and Message Communication over Multiple Access Channels. 109-114 - Xiaomeng Chen, Aimin Li, Shaohua Wu:

Optimal Sampling for Uncertainty-of-Information Minimization in a Remote Monitoring System. 115-120 - Aimin Li, Shaohua Wu, Gary C. F. Lee, Xiaomeng Chen, Sumei Sun:

Sampling to Achieve the Goal: An Age-aware Remote Markov Decision Process. 121-126 - Shuyu Xiao, Xinghua Sun, Wen Zhan, Xijun Wang:

Information Freshness in Random Access Networks with Energy Harvesting. 127-132 - Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam Rutgers:

Timely Offloading in Mobile Edge Cloud Systems. 133-138 - Subhankar Banerjee, Sennur Ulukus:

Age of Information in Multi-Source Broadcast Channel. 139-144 - Yanlin Geng, Xueyan Niu, Bo Bai, Wei Han:

Capacity Bounds of Broadcast Channel with a Full-Duplex Base-User Pair. 145-150 - Qi Cao, Zihan Wu, Guanchong Niu, Yanlin Geng, Baoming Bai:

Zero-Error Capacity of Broadcast Channels with Two Binary Outputs. 151-156 - Recep Can Yavas, Vincent Y. F. Tan:

Variable-Length Feedback Codes Over Known and Unknown Channels with Non-Vanishing Error Probabilities. 157-162 - Elizabath Peter, K. K. Krishnan Namboodiri

, B. Sundar Rajan:
Wireless MapReduce Arrays for Coded Distributed Computing. 163-168 - Yanxiao Liu, Cheuk Ting Li

:
One-Shot Information Hiding. 169-174 - Yizhou Zhao, Hua Sun:

Secure Summation with User Selection and Collusion. 175-180 - Geoffroy Caillat-Grenier, Andrei E. Romashchenko

, Rustam Zyavgarov:
Common Information in Well-Mixing Graphs and Applications to Information-Theoretic Cryptography. 181-186 - Georg Maringer, Antonia Wachter-Zeh:

Reducing Ciphertext and Key Sizes for MLWE-Based Cryptosystems. 187-192 - Haoran Xiong

, Zicheng Ye, Huazi Zhang, Jun Wang, Ke Liu, Dawei Yin, Guanghui Wang, Guiying Yan, Zhiming Ma:
Theoretical Bounds for the Size of Elementary Trapping Sets by Graph Theory Methods. 193-198 - Lev Tauz, Debarnab Mitra, Jayanth Shreekumar

, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek:
Block-MDS QC-LDPC Codes with Application to High-Dimensional Quantum Key Distribution. 199-204 - Pavan Kumar

, Abhi Kumar Sharma, Shayan Srinivasa Garani:
Entanglement-Assisted Quasi-Cyclic LDPC Codes. 205-210 - Guohua Zhang, Yulin Hu, Defeng Ren, Yi Fang:

Explicit Constructions of Girth-Eight QC-LDPC Codes: A Unified Framework Motivated by TDGS. 211-216 - Jiahui Wei, Elsa Dupraz, Philippe Mary:

Practical Coding Schemes based on LDPC Codes for Distributed Parametric Regression. 217-222 - Yue Xia, Christoph Hofmeister, Maximilian Egger, Rawad Bitar:

Byzantine-Resilient Secure Aggregation for Federated Learning Without Privacy Compromises. 223-228 - Chengxi Li, Ming Xiao, Mikael Skoglund:

A Communication-Efficient Semi-Decentralized Approach for Federated Learning with Stragglers. 229-234 - Yu Jiang, Chee-Wei Tan, Kwok-Yan Lam:

FedUHB: Accelerating Federated Unlearning via Polyak Heavy Ball Method. 235-240 - Tianli Gao, Jiahong Lin, Congduan Li, Chee-Wei Tan, Jun Gao:

Federated Learning Meets Network Coding: Efficient Coded Hierarchical Federated Learning. 241-246 - Siyuan Wang

, Jianping Wang, Linqi Song
:
Addressing Fluctuating Stragglers in Distributed Matrix Multiplication via Fountain Codes. 247-252 - Wenhao Liu, Zhengyi Jiang, Zhongyi Huang, Linqi Song

, Hanxu Hou:
On the I/O Cost of Linear Repair Schemes for Arbitrary $(n,k)$ Reed-Solomon Codes. 253-258 - Jiaojiao Wang, Xun Guan:

Rack-Aware Minimum-Storage Regenerating Codes with Optimal Access for Consecutive Node Failures. 259-264 - Yao Tian, Hengfeng Jin, Fang-Wei Fu:

Weight Distributions of Two Classes of Optimal $(r, \delta)$-Locally Repairable Codes. 265-270 - Hao Shi, Zhengyi Jiang, Zhongyi Huang, Bo Bai, Gong Zhang, Hanxu Hou:

Conjugate-Piggybacking Codes: MDS Array Codes with Lower Repair Bandwidth over Small Field Size. 271-276 - Tianren Peng, Xinyi Tong, Shao-Lun Huang:

On the Asymptotic HGR Maximal Correlation of Gaussian Markov Chain. 277-282 - Zijian Yang, Vahe Eminyan, Ralf Schlüter, Hermann Ney:

Refined Statistical Bounds for Classification Error Mismatches with Constrained Bayes Error. 283-288 - Ken Chen, Yanlin Geng:

Convexity Results on Derivative of Negative Fisher Information Along Heat Flow. 289-294 - Guangfeng Yan

, Tan Li, Yuanzhang Xiao, Hanxu Hou, Congduan Li, Linqi Song
:
Truncated Non-Uniform Quantization for Distributed SGD. 295-300 - Amirmohammad Farzaneh:

An Information-Theoretic Analysis of Temporal GNNs. 301-306 - Jun Zhang, Ziping Zhao:

Improved Stability Bounds for Graph Convolutional Neural Networks Under Graph Perturbations. 307-312 - Shuhao Zhang, Nan Liu, Wei Kang, Haim H. Permuter:

On Verifying Entropic Vectors with Distributions Generated by Neural Networks. 313-318 - Evan Scope Crafts, Xianyang Zhang, Bo Zhao:

Score Matching with Deep Neural Networks: A Non-Asymptotic Analysis. 319-323 - Hyun-Young Park

, Seung-Hyun Nam, Si-Hyeon Lee:
No Advantage of Non-Local Cooperation in Distributed Compression of Classical Sources. 324-329 - Hosen Nator, Uzi Pereg:

Coordination Capacity for Classical-Quantum Correlations. 330-335 - Hosen Nator, Uzi Pereg:

Entanglement Coordination Rates in Multi-User Networks. 336-341 - Lin Sok, Martianus Frederic Ezerman, San Ling

:
Good Entanglement-Assisted Qubit Codes from Matrix Product Codes. 342-347 - Ling Liu, Shanxiang Lyu

, Cong Ling, Baoming Bai:
On the Quantization Goodness of Polar Lattices. 348-353 - Yijun Fan, Fangwei Ye, Raymond W. Yeung:

Lossy Compression for Sparse Aggregation. 354-359 - Tian Jiao, Zhiqiang Wei, Yanlin Geng, Kai Wan, Zai Yang, Giuseppe Caire:

Rate-Distortion Tradeoff of Bistatic Integrated Sensing and Communication. 360-365 - Yuhan Wang

, Youlong Wu, Shuai Ma, Ying-Jun Angela Zhang:
Lossy Compression with Data, Perception, and Classification Constraints. 366-371 - Greg Fields, Neha Sangwan, Jack Postlewaite, Saikat Guha, Tara Javidi:

Sequential Hypothesis Testing of Quantum States. 372-377 - Jun Diao, Lin Zhou:

Sequential Outlier Hypothesis Testing under Universality Constraints. 378-383 - Yiming Xing, Shen Yan, Ziming Wang:

High-Dimensional Sequential Testing of Multiple Hypotheses. 384-389 - Waqar Mirza, Nikhil Karamchandani, Niranjan Balachandran:

Cascaded Group Testing. 390-395 - Chao Chen, Nianqi Tang, Yunghsiang S. Han, Baoming Bai, Jiefei Zhang, Wenhao Zhou:

A New Early-Termination Method for the Berlekamp-Massey Algorithm. 396-400 - Gefeng Deng, Zhengyi Jiang, Bo Bai, Gong Zhang, Xiuyin Zhang, Hanxu Hou:

New Reed-Solomon Codes with All XOR Operation for Better En/Decoding Performance. 401-406 - Rongchi Xu, Peiyao Chen, Ling Liu, Min Zhu, Baoming Bai:

Improved Construction for Multiplicative Repetition Based Non-Binary Polar Codes. 407-412 - Jianhan Zhao, Wei Zhang, Yanyan Liu:

Fast Successive-Cancellation Decoding of Polar Codes with Reed-Solomon Kernel. 413-417 - Li Peng

:
Ultra-Low Complexity Communication Algorithms Based on (n, n(n-l), n-l) PGCs. 418-423 - Ruoxi Chong, Shuangyang Li, Zhiqiang Wei, Michail Matthaiou

, Derrick Wing Kwan Ng, Giuseppe Caire:
Analysis of Cross-Domain Message Passing for OTFS Transmissions. 424-429 - Abhishek Roy

, Sudhan Majhi, Subhabrata Paul:
Systematic Construction of Golay Complementary Sets of Arbitrary Lengths and Alphabet Sizes. 430-435 - Jiuyu Liu

, Yi Ma, Rahim Tafazolli:
Fast Iterative ELAA-MIMO Detection Exploiting Static Channel Components. 436-441 - Xiangping Zheng, Xiao Ma:

Locally Constrained Guessing Codeword Decoding of Short Block Codes. 442-447 - Xihao Li, Wenhao Chen, Li Chen, Yuan Li, Huazi Zhang:

Order Skipping Ordered Statistics Decoding and its Performance Analysis. 448-453 - Liudmila Karakchieva, Peter Trifonov:

Reduced Complexity SISO Decoding Algorithm for the First-Order Reed-Muller Codes. 454-459 - Xiao Ma:

Guessing what, Noise or Codeword? 460-465 - Zhongjun Yang, Zuoxin Cai, Li Chen, Huazi Zhang:

An Efficient Adaptive Belief Propagation Decoder for Polar Codes. 466-471 - Mallikharjuna Chinnapadamala

, B. Sundar Rajan:
Security, Privacy and Linear Function Retrieval in Multi-Access Combinatorial Topology with Private Cache. 472-477 - Mallikharjuna Chinnapadamala

, Charul Rajput
, B. Sundar Rajan:
A New Hotplug Coded Caching Scheme Using PDAs. 478-483 - Abhay Kumar Maurya, Charul Rajput

, B. Sundar Rajan:
Hierarchical Caching System with Hotplug Model Using HpPDA. 484-489 - Xiaofan Niu, Minquan Cheng, Kai Wan, Robert Caiming Qiu, Giuseppe Caire:

Reflecting Intelligent Surfaces-Assisted Multiple-Antenna Coded Caching. 490-495 - Huimei Wei, Minquan Cheng, Kahin Leung:

A Novel Construction of Coded Caching Schemes with Polynomial Subpacketizations via Projective Geometry. 496-501 - Shurong Zhang

, Alban Goupil, Valeriu Vrabie, Eric Perrin, Marie-Laure Panon:
Multispectral Band Selection Using Correlation Explanation for Identification of Discriminative Bands Related to Grapevine Diseases. 502-507 - Kai Wang

, Chee Wei Tan, Christopher G. Brinton:
Maximizing User Admittance for Cognitive Satellite-Terrestrial Networks Using ODE-Inspired Spectral Radius Estimation. 508-513 - Hongyuan Yang, Ziping Zhao, Ying Sun:

Geometric Analysis of Non-Convex Optimization Landscapes for Robust M-Estimation of Location. 514-519 - Xinyi Ni, Lifeng Lai:

Robust Risk-Sensitive Reinforcement Learning with Conditional Value-at-Risk. 520-525 - Tianren Peng, Xinyi Tong, Shao-Lun Huang:

The Second-Order Perspectives of Minimax Parameter Estimation in Restricted Space with Weighted Squared Error Loss. 526-531 - Lingyi Chen, Shitong Wu, Sicheng Xu, Wenyi Zhang, Huihui Wu:

Neural Estimation of the Information Bottleneck Based on a Mapping Approach. 532-536 - Youheng Zhu, Yuheng Bu:

Information-Theoretic Analysis of the Gibbs Algorithm: An Individual Sample Approach. 537-542 - Weida Wang, Tao Shi, Yaoyuan Liang, Xinyi Tong, Shao-Lun Huang:

A Non-asymptotic Framework for Characterizing Dependency Structures in Multimodal Learning. 543-548 - Shohei Satake:

On the Paley RIP and Paley Graph Extractor. 549-554 - Meiyun Huang, Longguang Li:

Capacity Bounds on Optical Wireless Relay Channels. 555-560 - Ian George

, Alice Zheng
, Akshay Bansal:
Divergence Inequalities from Multivariate Taylor's Theorem. 561-566 - Hao-Chung Cheng

, Baris Nakiboglu
:
Augustin Information in the Vicinity of Augustin Capacity-Achieving Input Distributions. 567-572 - Xiang Zhang, Kai Wan, Hua Sun, Shiqiang Wang, Mingyue Ji, Giuseppe Caire:

Optimal Rate Region for Key Efficient Hierarchical Secure Aggregation with User Collusion. 573-578 - Mustafa Doger, Sennur Ulukus, Nail Akar:

PoW Security-Latency Under Random Delays and the Effect of Transaction Fees. 579-584 - Ling Jiang, Yujie Gu, Jinping Fan, Ying Miao:

Existence and Algorithmic Construction of $q$-ary Secure Codes with List Decoding. 585-590 - Vamoua Yachongka, Rémi A. Chou:

Secret-Key Generation with PUFs and Biometric Identifiers for Compound Authentication Channels. 591-596 - Ran Li, Fang-Wei Fu:

On the New Rank Metric Codes Related to Gabidulin Codes. 597-602 - Rohit Premlal, B. Sundar Rajan:

On Function-Correcting Codes. 603-608 - Minhan Gao, Kenneth W. Shum:

Computer Formalization of Deletion-Correcting Permutation Codes. 609-614 - Shobhit Bhatnagar, P. Vijay Kumar:

A Tighter Distance Upper-Bound for Gottesman-Kitaev-Preskill Codes. 615-620 - Ziyang Lu, Han Mao Kiah, Yiwei Zhang, Robert N. Grass, Eitan Yaakobi:

Coding for Synthesis Defects. 621-626 - Chen Wang, Eitan Yaakobi, Yiwei Zhang:

How to Find Simple Conditions for Successful Sequence Reconstruction? 627-632 - Amit Zrihan, Eitan Yaakobi, Zohar Yakhini:

Studying the Cycle Complexity of DNA Synthesis. 633-638 - Vivian Papadopoulou, V Arvind Rameshwar, Antonia Wachter-Zeh:

On the Expected Number of Views Required for Fixed-Error Sequence Reconstruction. 639-644 - Emmanouil M. Athanasakos

, Samir M. Perlaza:
Leveraging Noisy Observations in Zero-Sum Games. 645-650 - Masahito Hayashi:

Non-Iterative Algorithm for Channel Capacity. 651-656 - Liuquan Yao, Shuai Yuan, Yuan Li, Jun Wang, Guiying Yan, Zhiming Ma:

Achievability Bounds on Unequal Error Protection Codes. 657-662 - Masoud Kavian, Mohammad Mahdi Mojahedian, Mohammad Hossein Yassaee, Mahtab Mirmohseni, Mohammad Reza Aref:

Statistics of Random Binning Based on Tsallis Divergence. 663-668 - Dengfeng Xia

, Han Deng, Peng Xu, Bin Dai:
Sum-Capacity for Symmetric Finite-State Gaussian Multiple Access Channel with Delayed Feedback. 669-674 - Han Deng, Dengfeng Xia

, Peng Xu, Bin Dai:
Gaussian Relay Channel with Noiseless Feedback: Revisit. 675-680 - Yuhan Yang, Han Deng, Peng Xu, Bin Dai:

Efficient Coding for Computation Over Gaussian Multiple-Access Channel with Noiseless/Noisy Feedback. 681-686 - Mengyuan Zhao, Maël Le Treust, Tobias J. Oechtering:

Causal Vector-Valued Witsenhausen Counterexamples with Feedback. 687-692 - Meir Lederman, Uzi Pereg:

Semantic Security with Unreliable Entanglement Assistance: Interception and Loss. 693-698 - Guangfeng Yan

, Shanxiang Lyu
, Hanxu Hou, Zhiyong Zheng, Linqi Song
:
Towards Quantum-Safe Distributed Learning via Homomorphic Encryption: Learning with Gradients. 699-704 - Mohamed W. Nomeir, Alptug Aytekin, Sennur Ulukus:

Quantum $X$-Secure $B$-Byzantine $T$-Colluding Private Information Retrieval. 705-710 - Hassan ZivariFard, Rémi A. Chou, Xiaodong Wang:

Covert Communication with Positive Rate Over State-Dependent Quantum Channels. 711-716 - Gretchen L. Matthews, Pedro Soto

:
Algebraic Geometric Rook Codes for Coded Distributed Computing. 717-722 - Jesús Gómez-Vilardebó, Burak Hasircioglu, Deniz Gündüz:

Generalized Multivariate Polynomial Codes for Distributed Matrix-Matrix Multiplication. 723-728 - Zhengrui Li, Wai Ho Mow, Yunghsiang S. Han, Yunqi Wan:

Optimal Bandwidth for All-Linear-Reduce Operation. 729-734 - Qin Zhou, Fang-Wei Fu:

Network Function Computation for Vector Linear Functions. 735-740 - Qi-yue Yu, Shi-wen Lin, Shu Lin:

Finite Field Multiple Access for Sourced Massive Random Access with Finite Blocklength. 741-746 - Xinwei Li, Lingyi Chen, Shitong Wu, Huihui Wu, Hao Wu, Wenyi Zhang:

Alternating Maximization Algorithm for Mismatch Capacity with Oblivious Relaying. 747-752 - Hoover H. F. Yin, Jie Wang:

Sparse Degree Optimization for BATS Codes. 753-758 - Pedro Soto

:
Random Alloy Codes and the Fundamental Limits of Coded Distributed Tensors. 759-764 - Abhishek Sarkar, Bikash Kumar Dey:

Identification via Binary Uniform Permutation Channel. 765-770 - Chao Zhao

, Ali Al-Bashabsheh, Chung Chan
:
Detecting Informationally-Dense Subsets. 771-776 - Sharareh Alipour, Amin Gohari, Mehrshad Taziki:

Relative Fractional Independence Number. 777-782 - Yaning Zhao, Wafa Labidi, Holger Boche, Eduard A. Jorswieck, Christian Deppe:

Identification via Gaussian Multiple Access Channels in the Presence of Feedback. 783-788

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














