List of Accepted Papers

Following is the list of accepted ISIT 2024 papers, sorted by paper title. You can use the search feature of your web browser to find your paper number. Notifications to all authors have also been sent by email. If you have not received your notification of the results by email, please contact us at isit2024@cmsworkshops.com.

Paper Number Paper Title
2019$L_q$ Lower Bounds on Distributed Estimation via Fisher Information
1997A (Weakly) Polynomial Algorithm for AIVF Coding
1086A Binary Linear Functional-repair Regenerating Code on 72 Coding Spaces Related to PG(2,8)
1369A Capacity Result on Weakly-Private Information Retrieval
1387A Causal Model for Quantifying Multipartite Classical and Quantum Correlations
1181A Combinatorial Perspective on Random Access Efficiency for DNA Storage
1412A Convergence Analysis of Approximate Message Passing with Non-Separable Functions and Applications to Multi-Class Classification
1731A Converse Bound on the Mismatched Distortion-Rate Function
1788A Convolutional Variant of the Niederreiter Cryptosystem with GRS Codes
1339A Cross Entropy Interpretation of Rényi Entropy for $α$-leakage
2136A Distributionally Robust Approach to Shannon Limits using the Wasserstein Distance
1198A Double Maximization Approach for Optimizing the LM Rate of Mismatched Decoding
1701A Family of Access-Friendly MDS Array Codes
1548A family of permutationally invariant quantum codes
1230A Formula for the I/O Cost of Linear Repair Schemes and Application to Reed-Solomon Codes
1066A Joint Code and Belief Propagation Decoder Design for Quantum LDPC Codes
1609A Key-recovery Attack on the LCMQ Authentication Protocol
1078A Linear Feedback Coding Scheme for Computation Over Gaussian Multiple-Access Channels
1682A Mathematical Framework for Computability Aspects of Algorithmic Transparency
1982A Monotone Circuit Construction for Individually-Secure Multi-Secret Sharing
1621A multi-sequence Prophet Inequality under observation constraints
1595A Multi-Server Publicly Verifiable Computation Scheme with Context-Hiding Property
1728A New Approach to Harnessing Side Information in Multi-Server Private Information Retrieval
1665A New Characterization Of Augustin Information And Mean
1532A New Construction of Enhanced Cross Z-Complementary Sets With Maximum Zero Correlation Zone
1493A New Construction of Optimal Symmetrical ZCCS
1732A new family of binary sequences based on the generalized ERC construction
1649A New Multi-receiver Authentication Scheme For General Access Structure
1384A note on generalization bounds for losses with finite moments
1710A Novel Cross Domain Iterative Detection based on the Interplay between SPA and LMMSE
1547A Path Metric Based Construction of Polarization-Adjusted Convolutional Codes
1683A Perfect Ideal Hierarchical Secret Sharing Scheme Based on The CRT for Polynomial Rings
2139A Poisson Decomposition for Information and the Information-Event Diagram
1396A probabilistic analysis on general probabilistic scheduling problems
1324A Quantitative Version of More Capable Channel Comparison
1935A Random CSP with Connections to Discrepancy Theory and Randomized Trials
1101A Relay Algorithm of BCH Codes for a Quick Start of the Berlekamp-Massey Algorithm
1145A Simple Self-Decoding Model for Neural Coding
1260A Study of APN Functions in Dimension 7 using Antiderivatives
1157A Third Information-Theoretic Approach to Finite de Finetti Theorems
1538A Unified Study on Sequentiality in Universal Classification with Empirically Observed Statistics
2075A Unified View of Group Fairness Tradeoffs Using Partial Information Decomposition
1893Abelian Group Codes for Classical and CQ Channel Coding: One-shot and Asymptotic Rate Bounds
1561Accelerating Quadratic Transform and WMMSE
1405Achievable Rate for RIS-Assisted Sparse Channel with State Training
1753Achieving Capacity of PIR with Private Side Information with Low Sub-packetization and without MDS Codes
1501Achieving DNA Labeling Capacity with Minimum Labels through Extremal de Bruijn Subgraphs
1035Achieving Gaussian Vector Broadcast Channel Capacity with Scalar Lattices
1233Achieving the Exactly Optimal Privacy-Utility Trade-Off with Low Communication Cost via Shared Randomness
1775Adversarial Quantum Machine Learning: An Information-Theoretic Generalization Analysis
1698Age Aware Scheduling for Differentially-Private Federated Learning
1159Age of Gossip in Random and Bipartite Networks
1356AIFV Codes Allowing 2-bit Decoding Delays for Unequal Bit Cost
1791Algebraic Geometry Codes for Cross-Subspace Alignment in Private Information Retrieval
1752Algorithms for Computing the Free Distance of Convolutional Codes
1926Amplitude Transformation of Quantum State Based on QSVT
2096An Achievable and Analytic Solution to Information Bottleneck for Gaussian Mixtures
1715An Achievable Error Exponent for the Information Bottleneck Channel
1166An Achievable Scheme for Channels with an Amplitude Constraint Using Walsh Functions
1063An Answer to an Open Problem on Balanced Boolean Functions with the Maximum Possible Walsh Supports
1358An Asymmetric Encoding-Decoding Scheme for Lossless Data Compression
1228An Earlier Termination Algorithm to Find Error Locator Polynomial in Error Correction of RS Codes
1586An Efficient Inversion Encoding Scheme with $k$ INV Signals on Bus Transmission
1592An Efficient, High-Rate Scheme for Private Information Retrieval over the Gaussian MAC
2127An Encoder-Decoder Approach for Packing Circles
2216An entropic inequality in finite Abelian groups analogous to the unified Brascamp-Lieb and Entropy Power Inequality
1293An entropic inequality in finite Abelian groups analogous to the unified Brascamp-Lieb and Entropy Power Inequality
2165An Expectation-Maximization Relaxed Method for Privacy Funnel
2154An Explicit Construction of $q$-ary MDS Array Codes and Their Efficient Decoding
2080An extension of Mcdiarmid's inequality
1232An Improved Lower Bound on Oblivious Transfer Capacity via Interactive Erasure Emulation
1413An Improved Upper Bound for Distributed Hypothesis Testing
1733An Improved Viterbi Algorithm for a Class of Optimal Binary Convolutional Codes
1343An Information-Theoretic Approach to Anonymous Access Control
1992An Information-Theoretic Framework for Out-of-Distribution Generalization
1506An information-theoretic proof of the Shannon-Hagelbarger theorem
2047An Optimal Sequence Reconstruction Algorithm for Reed-Solomon Codes
1349An Unconditionally Secure Encryption Protocol for Cloud Storage
1519Analysis of Coded Shaped QAM Signaling at Short and Moderate Lengths
1528Anomaly Search of a Hidden Markov Model
1570AoII-Optimum Sampling of CTMC Information Sources Under Sampling Rate Constraints
1762AoI-optimal Scheduling for Arbitrary K-channel Update-Through-Queue Systems
1555Approaching Maximum Likelihood Decoding Performance via Reshuffling ORBGRAND
1837Approximate Locally Decodable Codes with Constant Query Complexity and Nearly Optimal Rate
1742Asymptotic Capacity of Non-Coherent One-Bit MIMO Channels with Block Fading
1671Asymptotic construction of locally repairable codes with multiple recovering sets
1767Asymptotic Estimates for Spectral Estimators of Rotationally Invariant Matrices
1960Asymptotically Optimal Codes Correcting One Substring Edit
2056Asymptotically optimal multistage tests for multihypothesis testing
1818Asymptotics of Language Model Alignment
1867BAI in Exponential Family: Efficiency and Optimality
1727Batch Universal Prediction
2044Bayesian Persuasion: From Persuasion toward Counter-suasion
1886Beamforming Design for Integrated Sensing and Communications Using Uplink-Downlink Duality
1422Belief Propagation Decoding of Quantum LDPC Codes with Guided Decimation
1938Benefits of Stochastic Mirror Descent in High-Dimensional Binary Classification
1750Best Arm Identification with Arm Erasures
1976Better Algorithms for Constructing Minimum Cost Markov Chains and AIFV Codes
1681Binary Maximal Leakage
1325Binomial Channel: On the Capacity-Achieving Distribution and Bounds on the Capacity
1841Bipartite entanglement of noisy stabilizer states through the lens of stabilizer codes
1608Bistatic Integrated Sensing and Communication over Memoryless Relay Channels
2205Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes
1368Blahut-Arimoto Algorithm for Computing Capacity Region of Gaussian Vector Broadcast Channels
1969Boundary Multiple Measurement Vectors for Multi-Coset Sampler
1651Bounding Weakly Correlated Products from Below: Supermodularity is All You Need
1604Bounds on the Statistical Leakage-Resilience of Shamir's Secret Sharing
1486Break-Resilient Codes for Forensic 3D Fingerprinting
1588Broadcast Channel Synthesis from Shared Randomness
1426Byzantine-Resilient Federated Principal Subspace Estimation
1865Camouflage Adversarial Attacks on Multiple Agent Systems
1268Capacity of Frequency-based Channels: Encoding Information in Molecular Concentrations
1202Capacity of Runlength-Limited and GC-Content Constrained Codes for DNA Data Storage
2155Capacity-Maximizing Input Symbol Selection for Discrete Memoryless Channels
2114Causal Impact Analysis for Asynchronous Decision Making
1217Causality Testing, Directed Information and Spike Trains
1965Channel Coding with Mean and Variance Cost Constraints
1051Characterization of the Distortion-Perception Tradeoff for Finite Channels with Arbitrary Metrics
1160Characterizing positive-rate secure multicast network coding with eavesdropping nodes
1359Code Design for Duplex Read Sequencing
1653Code Rate Optimization via Neural Polar Decoders
1636Code-Based Single-Server Private Information Retrieval: Circumventing the Sub-Query Attack
1038Coded Caching for Hierarchical Two-Layer Networks with Coded Placement
1669Coded Caching with File and Demand Privacy
1967Coded Computing Meets Quantum Circuit Simulation: Coded Parallel Tensor Network Contraction Algorithm
1573Coded Kalman Filtering over MIMO Gaussian Channels with Feedback
1418Coded Many-User Multiple Access via Approximate Message Passing
1479Coded Multi-User Information Retrieval with a Multi-Antenna Helper Node
1832Coding for Composite DNA to Correct Substitutions, Strand Losses, and Deletions
2204Coding Scheme for Noisy Nanopore Sequencing with Backtracking and Skipping Errors
1242Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information
1515Coherent Distributed Source Simulation as Multipartite Quantum State Splitting
1273Common Function Reconstruction with Information Swapping Terminals
1323Common Randomness Generation from Finite Compound Sources
1527Competitive Analysis of Arbitrary Varying Channels
2052Complementary Exclusion of Full Polynomials to Enable Dual List Decoding of Convolutional Codes
1499Computation in Server-Assisted Noisy Networks
1334Computation of the Multivariate Gaussian Rate-Distortion-Perception Function
1995Computation Selection: Scheduling Users to Enable Over-the-Air Federated Learning
1706Computationally Efficient Codes for Strongly Dobrushin-Stambler Nonsymmetrizable Oblivious AVCs
1133Compute-Forward Multiple Access for Gaussian Fast Fading Channels
1226Computing Augustin Information via Hybrid Geodesically Convex Optimization
1428Computing Capacity of Binary Arithmetic Sum over Asymmetric Diamond Network
1541Conditional Mutual Information Constrained Deep Learning: Framework and Preliminary Results
1713Constructing $(h,k+1)$ cooperative MSR codes with sub-packetization $(h+1)2^{\lceil n/2 \rceil}$
1437Construction of 4-phase Golay Complementary Sequence Sets with Small Number of Constituent Sequences and Arbitrary Length
2122Construction of Binary Odd Shift Complementary Pairs of All Lengths
1365Construction of Locally Repairable Array Codes with Optimal Repair Bandwidth under the Rack-Aware Storage Model
1497Construction πA lattices extended to Hurwitz quaternion integers
1263Constructions of Binary MDS Array Codes with Optimal Cooperative Repair Bandwidth
1672Controlled privacy leakage propagation throughout differential private overlapping grouped learning
1624Coordination Coding with Causal Encoder for Vector-valued Witsenhausen Counterexample
2116Copula-based Estimation of Continuous Sources for a Class of Constrained Rate-Distortion Functions
1176Correcting a Single Deletion in Reads from a Nanopore Sequencer
2057Coset Error Patterns in Recursive Projection-Aggregation Decoding
1721Covering All Bases: The Next Inning in DNA Sequencing Efficiency
2162Covert Distributed Detection over Discrete Memoryless Channels
1142Cross-Validation Conformal Risk Control
1058CRYSTALS-Kyber With Lattice Quantizer
1664Data Transmission over a Bosonic Channel under Classical Noise
2090Data-Dependent Generalization Bounds via Variable-size Compressibility
1408Data-Driven Estimation of the False Positive Rate of the Bayes Binary Classifier via Soft Labels
1858Decentralized Expectation Propagation for Semi-Blind Channel Estimation in Cell-Free Networks
2198Decentralized Uncoded Storage Elastic Computing with Heterogeneous Computation Speeds
1803Decoding Analog Subspace Codes: Algorithms for Character-Polynomial Codes
1135Decoding Sparse Reed-Solomon Codes with Known Support
1440Decoding Strategies for Generalized Quantum Data-Syndrome Coding Problems
1697Deep Holes of Twisted Reed-Solomon Codes
2166Dense KO Codes: Faster Convergence and Reduced Complexity through Dense Connectivity
1139Design and analysis of a family of complexity-constrained LDPC codes
1294Detection of Correlated Random Vectors
2148Detection of False Data Injection Attacks in Cyber-Physical Systems
2045Detection of Signals in Colored Noise: Leading Eigenvalue Test for Non-central F-matrices
1883Deterministic identification over channels with finite output: a dimensional perspective on superlinear rates
1804Deterministic Identification: From Theoretical Analysis to Practical Identification Codes
2033Differentially Private Fair Binary Classifications
2072Differentially Private Synthetic Data with Private Density Estimation
2186Differential-Privacy Capacity
1402Dimensional discrete entropy power inequalities for log-concave random vectors
1091Directed Redundancy in Time Series
1581DIST-CURE: A Robust Distributed Learning Algorithm with Cubic Regularized Newton
1072Distributed Learning for Dynamic Congestion Games
1552Distributed Local Sketching for $\ell_2$ Embeddings
1629Distributed matrix multiplication with straggler tolerance using algebraic function fields
2105Distributed Sampling for the Detection of Poisson Sources under Observation Erasures
1234Distributed Source Coding Using Constrained-Random-Number Generators
1833Distributed Structured Matrix Multiplication
2164Distributionally Robust Degree Optimization for BATS Codes
1951Distribution-Preserving Integrated Sensing and Communication with Secure Reconstruction
1489DoF Analysis for (M, N)-Channels through a Number-Filling Puzzle
1835Dual-Source Symmetric PIR without Data Replication or Shared Randomness
2099E_gamma-Mixing Time
1633Effect of Weight Quantization on Learning Models by Typical Case Analysis
1909Efficient and Timely Memory Access
2082Efficient Binary Batched Network Coding employing Partial Recovery
1282Efficient Constructions of Non-binary Codes over Absorption Channels
1585Efficient Decoding of a Class of Reed-Solomon Codes over Fermat Fields
1113Efficient designs for threshold group testing without gap
1352Efficient DNA Synthesis Codes with Error Correction and Runlength Limited Constraint
2200Efficient Nonconvex Optimization for Two-way Sparse Reduced-Rank Regression
2025Efficient Root-Finding for Interpolation-Based Decoding of Elliptic and Hyperelliptic Codes
1514Efficient Unbiased Sparsification
1080Electromagnetic Information Theory Motivated Near-Field Channel Model
1540Empirical Risk Minimization and Uniform Convergence for Probabilistically Observed and Quantum Measurement Hypothesis Classes
1240Endomorphisms of Linear Block Codes
1989Enhanced ODMA with Channel Code Design and Pattern Collision Resolution for Unsourced Multiple Access
1729Enhancing the Maximum Tolerable Number of Active Users for Unsourced Random Access
1425Entanglement cost of discriminating quantum states under locality constraints
1981Entanglement sharing across a damping-dephasing channel
1435Entanglement-Assisted Quantum Codes from a Class of Unitary Matrices
1583Entropy-Achieving Compression with Private Local Decodability
1463Equal Requests are Asymptotically Hardest for Data Recovery
1808Equivalence of Empirical Risk Minimization to Regularization on the Family of f-Divergences
1830Erasure Coded Neural Network Inference via Fisher Averaging
1184Error Correction Capabilities of Non-Linear Cryptographic Hash Functions
1939Error correction from partial information via norm-trace codes
1411Error Exponent in Agnostic PAC Learning
1464Error Exponents of Discrete Memoryless Channels Under Small Mismatch
1391Error-Correcting Codes for Combinatorial Composite DNA
1885Error-Resilient Weakly Constrained Coding via Row-by-Row Coding
1366Estimating the Weight Enumerators of Reed-Muller Codes via Sampling
1794Estimation of Rate-Distortion Function for Computing with Decoder Side Information
1081Exact Error Exponents for a Concatenated Coding Based Class of DNA Storage Codes
1163Exact Graph Matching in Correlated Gaussian-Attributed Erdos-Renyi Model
1057Existential Unforgeability in Quantum Authentication From Quantum Physical Unclonable Functions Based on Random von Neumann Measurement
1726Explicit Formula for Partial Information Decomposition
1984Explicit Good Codes Approaching Distance 1 in Ulam Metric
1648Explicit Subcodes of Reed–Solomon Codes that Efficiently Achieve List Decoding Capacity
1533Exploiting signature leakages: breaking Enhanced pqsigRM
1765Explore-then-Commit Algorithms for Decentralized Two-sided Matching Markets
1420Fast FixMatch: Faster Semi-Supervised Learning with Curriculum Batch Size
1297Fast Readable Multi-Cell Coding for Flash Memory
1827Federated Learning for Heterogeneous Bandits with Unobserved Contexts
1015Federated Learning via Lattice Joint Source-Channel Coding
1990Fed-IT: Addressing Class Imbalance in Federated Learning through an Information-Theoretic Lens
2092Feedback Capacity of Nonlinear Decision Models with General Noise: Gaussian Applications with Filtering and Control Riccati Equations
1959Few-Shot Channel-Agnostic Analog Coding: A Near-Optimal Scheme
1768Feynman Meets Turing: The Uncomputability of Quantum Gate-Circuit Emulation and Concatenation
1641Finite-Length Analysis of Polar Secrecy Codes for Wiretap Channels
1864Fixed-Memory Capacity Bounds for the Gilbert-Elliott Channel
1401Flexible Field Sizes in Secure Distributed Matrix Multiplication via Efficient Interference Cancellation
1513Frame Codes for the Block-Erasure Channel
1877Frequency Domain Diffusion Model with Scale-Dependent Noise Schedule
1340Fully quantum arbitrarily varying channel coding for entanglement-assisted communication
1680Fundamental Limits of Communication-Assisted Sensing in ISAC Systems
1337Fusion over the Grassmannian for High-Rank Matrix Completion
1999Game of Coding: Beyond Trusted Majorities
2150Gaussian Channel Simulation with Rotated Dithered Quantization
1182Gaussian mixtures: convexity properties and CLT rates for the entropy and Fisher information
1141Generalization and Informativeness of Conformal Prediction
2171Generalization of LiNGAM that allows confounding
1724Generalized concatenated polarization kernels
1275Generalized Gradient Flow Decoding and Its Tensor-Computability
2111Generalized Quasi-Cyclic LDPC Codes: Design and Efficient Encoding
2178Generalized Reed-Muller codes: A new construction of information sets
1438Generalized Step-Chirp Sequences With Flexible Bandwidth
2144Goal-Oriented Communications for Remote Inference under Two-Way Delay with Memory
1613GRAND-Assisted Random Linear Network Coding in Wireless Broadcasts
1642Graph Neural Network-based Joint Equalization and Decoding
1491Graph Neural Networks for Enhanced Decoding of Quantum LDPC Codes
1947Graph Reconstruction from Noisy Random Subgraphs
1880GRLinQ: A Distributed Link Scheduling Mechanism with Graph Reinforcement Learning
1461Group Codes with Low-Density Orthogonal Idempotent
1910Group Complete-{s} Pliable Index Coding
1844Group Fairness with Uncertain Sensitive Attributes
1930Group Testing with General Correlation Using Hypergraphs
1769Group-Sparse Subspace Clustering with Elastic Stars
1568Guaranteed Robust Large Precision Matrix Estimation Under t-distribution
1118HetDAPAC: Distributed Attribute-Based Private Access Control with Heterogeneous Attributes
2201Hierarchical Federated Learning: The Interplay of User Mobility and Data Heterogeneity
1968Hierarchical Generalization Bounds for Deep Neural Networks
1868High Probability Latency Quickest Change Detection over a Finite Horizon
1498Implicit and Explicit Formulas of the Joint RDF for a Tuple of Multivariate Gaussian Sources with Individual Square-Error Distortions
1800Improved Bound for Robust Causal Bandits with Linear Models
1445Improved bounds on the interactive capacity via error pattern analysis
1075Improved Bounds on the Number of Support Points of the Capacity-Achieving Input for Amplitude Constrained Poisson Channels
1264Improved Coded Caching from Two New Classes of PDAs from t-Designs
1364Improved Construction of Robust Gray Codes
1039Improved Hotplug Caching Scheme Using PDAs
1488Improved Logical Error Rate via List Decoding of Quantum Polar Codes
1018Improved Non-Asymptotic Lower Bound on the Size of Optimal Insertion/Deletion Correcting Code
1747Improved Upper Bound for the Size of a Trifferent Code
2048Improving the Singleton-type Upper Bounds for Non-Linear Deletion Correcting Codes
2183Infodemic Source Detection: Enhanced Formulations with Information Flow
1834InfoMat: A Tool for the Analysis and Visualization Sequential Information Transfer
1443Information Exchange is Harder with Noise at Source
1082Information Rates Over DMCs With Many Independent Views
1888Information Theoretic Analysis of a Quantum PUF
1206Information Velocity of Cascaded AWGN Channels with Feedback
1512Information-Energy Capacity Region for SLIPT Systems over Lognormal-Fading Channels
2194Integrated Sensing and Communication Exploiting Prior Information: How Many Sensing Beams are Needed?
1510Integrated Sensing and Communication in the Finite Blocklength Regime
1898Interactive Byzantine-Resilient Gradient Coding for General Data Assignments
1261Inter-Modal Coding in Broadcast Packet Erasure Channels with Varying Statistics
1725Interpreting Deepcode, a learned feedback code
1564Intrinsic Fairness-Accuracy Tradeoffs under Equalized Odds
1554Isolate and then Identify: Rethinking Adaptive Group Testing
2172Joint Sequential Detection and Isolation of Anomalies under Composite Hypotheses
1284Large Deviations for Statistical Sequence Matching
1688Less than 1-Bit Control of an Unstable AR Process with 1--Bit Quantizers
1124Limit Distribution for Quantum Relative Entropy
1905Linear Operator Approximate Message Passing: Power Method with Partial and Stochastic Updates
2220Linear Operator Approximate Message Passing: Power Method with Partial and Stochastic Updates
1977Linearity-Enhanced Serial List Decoding of Linearly Expurgated Tail-Biting Convolutional Codes
2193List-Decoding Separable Matrices for Non-Adaptive Combinatorial Group Testing
1542Local Decoding in Distributed Approximate Computing
1760Locally-Measured Rényi Divergences
2000Log-Concave Coupling for Sampling Neural Net Posteriors
1154Low Complexity Approximate Bayesian Logistic Regression for Sparse Online Learning
1720Low-Complexity Constrained Coding Schemes for Two-Dimensional Magnetic Recording
2176Low-Complexity Pearson-Based Detection for AWGN Channels with Offset
1296Lower Bounds on Mutual Information for Linear Codes Transmitted over Binary Input Channels, and for Information Combining
1929Low-rank Matrix Sensing With Dithered One-Bit Quantization
1942Low-Rate, Low-Distortion Compression with Wasserstein Distortion
1465Many-user multiple access with random user activity
1773Maximal Guesswork Leakage
1257Maximal α-Leakage for Quantum Privacy Mechanisms and Operational Meaning of Measured Rényi Capacity
1019McKean’s Conjecture Under the Log-Concavity Assumption
1185Message-Cognizant Assistance and Feedback for the Gaussian Channel
1900Message-Relevant Dimension Reduction of Neural Populations
1196Min-Entropic Quantities Induced by Cones: Properties & Operational Interpretations
2160Minimal Communication-Cost Statistical Learning
1085Minimax Regret with Unbounded Weights
2195Minimizing Distortion in Data Embedding Using LDGM Codes and the Cavity Method
1560Mining Invariance from Nonlinear Multi-Environment Data: Binary Classification
2073Missing Mass under Random Duplications
1442Mixed-Weight Conflict-Avoiding Codes
1138Modulo Sampling with 1-bit Side Information: Performance Guarantees in the Presence of Quantization
1041Monitoring High-dimensional Streaming Data via Fusing Nonparametric Shiryaev-Roberts Statistics
1819More results for regenerating codes on graphs
1017MSR Codes with Linear Field Size and Smallest Sub-packetization for Any Number of Helper Nodes
2215MSR Codes with Linear Field Size and Smallest Sub-packetization for Any Number of Helper Nodes
1419Multi-access Distributed Computing Models using Map-Reduce Arrays
1505Multi-armed Bandits with Probing
1617Multiplicity assignments for Koetter-Vardy decoding. The case of traceability codes.
1813Multi-Task Private Semantic Communication
1089Multi-terminal Strong Coordination over Noisy Channels with Secrecy Constraints
1973Multi-User SR-LDPC Codes via Coded Demixing with Applications to Cell-Free Systems
1495Multivariate Priors and the Linearity of Optimal Bayesian Estimators under Gaussian Noise
2202Mutual Information of a class of Poisson-type Channels using Markov Renewal Theory
1758Near optimal constructions of frameproof codes
1612Nearest Neighbor Decoding for a Class of Compound Channels
2020Nearest Neighbor Representations of Neural Circuits
1214Near-optimal constructions of constant weight codes and constant composition codes asymptotically attaining the Johnson bound
2022Near-Optimal Generalized Decoding of Polar-like Codes
1678Nested Construction of $\mathbb{Z}_{2^L}$-Linear Codes
2046Nested Construction of Polar Codes via Transformers
1306Network Analysis of Baker's Map Implemented in a Fixed-point Arithmetic Domain
1312Network Coding-Based Post-Quantum Cryptography for Multi-Users with Different Security Permissions
1825Networked Control with Hybrid Automatic Repeat Request Protocols
1776Neural Estimation of Entropic Optimal Transport
1676Neural Estimation of Multi-User Capacity Regions over Discrete Channels
1504Neural Network Equalizers and Successive Interference Cancellation for Bandlimited Channels with a Nonlinearity
2217Neural Network Equalizers and Successive Interference Cancellation for Bandlimited Channels with a Nonlinearity
1283New Algorithms for Computing Sibson Capacity and Arimoto Capacity
1220New Bounds on Quantum Sample Complexity of Measurement Classes
1062New Construction of $q$-ary Codes Correcting a Burst of at most $t$ Deletions
1310New Constructions for Linear Maximum Sum-Rank Distance Codes
1481New EVENODD+ Codes with More Flexible Parameters and Lower Complexity
1000New Partial Orders of Polar Codes for BMSC
1562New Results on Coded Caching in Partially Cooperative D2D Networks
1192New Results on the Imbalance of FCSR Sequences and LFSR Subsequences
1887New Security Proof of a Restricted High-Dimensional QKD Protocol
2011Neyman-Pearson Causal Inference
1409Nobody Expects a Differential Equation: Minimum Energy-Per-Bit for the Gaussian Relay Channel with Rank-1 Linear Relaying
1225Noise-Tolerant Codebooks for Semi-Quantitative Group Testing: Application to Spatial Genomics
1840Non-Binary Covering Codes for Low-Access Computations
2078Non-Convex Robust Hypothesis Testing using Sinkhorn Uncertainty Sets
1342Non-Linear Analog Processing Gains in Task-Based Quantization
1174Nonlinear Codes with Low Redundancy
1707Novel Bounds for Semi-Blind Multiple-Access in Massive MIMO
1635Numerical Stability of DFT Computation for Signals with Structured Support
1722On $2 \times 2$ MIMO Gaussian Channels with a Small Discrete-Time Peak-Power Constraint
1632On Achievable Rates for the Shotgun Sequencing Channel with Erasures
1782On Channel Simulation with Causal Rejection Samplers
2098On Convergence of Discrete Schemes for Computing the Rate-Distortion Function of Continuous Source
1622On Counting Subsequences and Higher-Order Fibonacci Numbers
1278On de Bruijn Covering Sequences and Arrays
1708On Decentralized Linearly Separable Computation With the Minimum Computation Cost
1920On Demand-Private Hotplug Caching Systems
1572On Doeblin Curves and Their Properties
1892On Existence of Latency Optimal Uncoded Storage Schemes in Geo-Distributed Data Storage Systems
1630On Fixed Length Systematic All Limited Magnitude Zero Deletion/Insertion Error Control Codes
1889On guessing random additive noise decoding
1766On k-Mer-Based and Maximum Likelihood Estimation Algorithms for Trace Reconstruction
1923On Low Field Size Constructions of Access-Optimal Convertible Codes
2009On ML Decoding of Binary Cyclic-gap Constant Weight Codes
1755On Multi-Message Private Computation
1129On Noisy Duplication Channels with Markov Sources
1247On one-orbit cyclic subspace codes of $\mathcal{G}_q(n,3)$
1427On Permutation Capacity Regions of Multiple-Access Channels
1675On Securing Analog Lagrange Coded Computing from Colluding Adversaries
1738On Semi-supervised Estimation of Discrete Distributions under f-divergences
1639On Streaming Codes for Burst and Random Errors
1778On Streaming Codes for Simultaneously Correcting Burst and Random Erasures
1902On the affine permutation group of certain decreasing Cartesian codes
1320On the Asymptotic Nonnegative Rank of Matrices and its Applications in Information Theory
1634On the Capacity of Channels with Markov Insertions, Deletions and Substitutions
1783On the Capacity of Gaussian “Beam-Pointing” Channels with Block Memory and Feedback
2054On the capacity region of some classes of interference channels
1656On the Classification of $\mathbb{Z}_2\mathbb{Z}_4\mathbb{Z}_8$-Linear Hadamard Codes
2142On the Coverage Required for Diploid Genome Assembly
1400On the equivalence between probabilistic shaping and geometric shaping: a polar lattice perspective
2036On the Existence of Cyclic Lattice Codes
2197On the existence of some completely regular codes in Hamming graphs
2106On the Extreme Points of the (0, δ)-Differential Privacy Polytope
1277On the Fundamental Tradeoff of Joint Communication and Quickest Change Detection
1971On the Generalized Sampling Expansion (GSE) for Graph Signals
1096On the Long-Term Behavior of $k$-tuples Frequencies in Mutation Systems
1395On the Lossy Compression of Spatial Networks
1522On the Non-Computability of Convex Optimization Problems
2065On the Optimal Tradeoffs among Error Exponents in Active Sequential Multiple Hypothesis Testing
1300On the Optimality of Dictator functions and Isoperimetric Inequalities on Boolean Hypercubes
1654On the Optimality of Secure Aggregation with Uncoded Groupwise Keys Against User Dropouts and User Collusion
1739On the Parameters of Codes for Data Access
1879On the Privacy Guarantees of Differentially Private Stochastic Gradient Descent
1248On the Rate-Distortion Function for Sampled Cyclostationary Gaussian Processes with Memory
2038On the Relation Between the Common Information Dimension and Wyner Common Information
1994On the Secrecy Capacity of 1-2-1 Atomic Networks
1988On the Separability of Beamforming for Reconfigurable Intelligent Surfaces under Statistical CSI
1545On the Success Probability of the $L_0$-regularized Box-constrained Babai Point
2192On Two-stage Quantum Estimation and Asymptotics of Quantum-enhanced Transmittance Sensing
1772On Universal Decoding over Memoryless Channels with the Krichevsky–Trofimov Estimator
1071On-access error correction in certain types of content-addressable memories
1785One Code Fits All: Strong Stuck-at Codes for Versatile Memory Encoding
2010One Shot Joint Source Channel Coding
2191One-Shot Coding over General Noisy Networks
2177One-shot multiple access channel simulation
2076One-Shot Wyner–Ziv Compression of a Uniform Source
1394Optimal Almost-Balanced Sequences
1862Optimal Denial-of-Service Attacks Against Status Updating
1931Optimal Distributed Quantizer Design for Binary Classification of Conditionally Independent Vector Sources
1723Optimal full-length cyclic orbit flag codes
1770Optimal Information Theoretic Secure Aggregation with Uncoded Groupwise Keys
1496Optimal Lower Bound of the Average Indeterminate Length Lossless Quantum Block Encoding
2002Optimal Memory-Rate Tradeoff in Secure Coded Caching for Small Buffer or Small Rate
1235Optimal Private Discrete Distribution Estimation with One-bit Communication
1786Optimal Redundancy in Exact Channel Synthesis
2219Optimal Redundancy in Exact Channel Synthesis
2004Optimal Stopping Rules for Best Arm Identification in Stochastic Bandits under Uniform Sampling
1936Optimal Update Policy for the Monitoring of Distributed Sources
1326Optimality of meta-converse for channel simulation
1854Optimized Parameter Design for Channel State Information-Free Location Spoofing
1386Optimizing Information Freshness in Mobile Networks with Age-Threshold ALOHA
1817Optimizing the Decoding Probability and Coverage Ratio of Composite DNA
1620Optimum Fingerprinting Function for Winternitz One-Time Signature
2133Outer Code Designs for Augmented and Local-Global Polar Code Architectures
2017Overflow-Avoiding Memory AMP
1399PAC Code Rate-Profile Design Using Search-Constrained Optimization Algorithms
1204PAC Learnability for Reliable Communication over Discrete Memoryless Channels
1478Pair-Covering Codes
1044Parameter Estimation Based on Noisy Chaotic Signals in the Weak-Noise Regime
1060Parity-check matrix for Z/p^s-additive codes: efficient computation
1745Peak Age of Information under Tandem of Queues
1787Perfect Multi-User Distributed Computing
1507Perfect Subset Privacy in Polynomial Computation
1668Performance Analysis of Generalized Product Codes with Irregular Degree Distribution
1662Performance Limits in 3D Localization via Molecular Diffusion
1663Permutation Codes in Levenshtein, Ulam and Generalized Kendall-tau Metrics
1544Personalized heterogeneous Gaussian mean estimation under communication constraints
1333Placement Delivery Arrays for Coded Caching with Shared and Private Caches
1069Points-Polynomials Incidence Theorem with an Application to Reed-Solomon Codes
1446Potential Functions and Percolation Thresholds of Coded Poisson Receivers
1550PoW Security-Latency and Transaction Rate
1073Power-limited Modulation-Estimation with a Helper
1809Practical Short-Length Coding Schemes for Binary Distributed Hypothesis Testing
1916Precoded Polar Product Codes
1335Preconditioned Gradient Descent for Sketched Mixture Learning
2159Pre-Decoder Processing Functions for a DMC with Mismatched Decoding
1566Predicting Uncertainty of Generative LLMs with MARS: Meaning-Aware Response Scoring
1332Prediction with noisy expert advice
1958Private Approximate Nearest Neighbor Search for Vector Database Querying
1304Private Multiple Linear Computation: A Flexible Communication-Computation Tradeoff
1640Private Repair of a Single Erasure in Reed-Solomon Codes
1831Private Sum Computation: Trade-Off between Shared Randomness and Privacy
1736Probabilistic Design of Multi-Dimensional Spatially-Coupled Codes
1551Progressive Reconstruction of Large QC-LDPC Codes over a Noisy Channel
1797Projective Systematic Authentication via Reed-Muller Codes
2113Properties of the Strong Data Processing Constant for Rényi Divergence
1403Protocol Sequences for Age of Information under Multiple-Packet Reception
1577Proving Information Inequalities by Gaussian Elimination
1123Pseduo-Random and de Bruijn Array Codes
2153Pseudoredundancy for the Bit-Flipping Algorithm
2094QML-IB: Quantized Collaborative Intelligence between Multiple Devices and the Mobile Network
1393Quality Adaptation for Cache-aided Degraded Broadcast Channels
1315Quantifying Privacy via Information Density
2042Quantitative Group Testing with Tunable Adaptation
1673Quantum Channel Simulation in Fidelity is no more difficult than State Splitting
1331Quantum Codes Derived from One-Generator Quasi-Twisted Codes
2138Quantum Doeblin coefficients: A simple upper bound on contraction coefficients
2024Quantum Illumination Advantage for Classification Among an Arbitrary Library of Targets
1103Quantum Intersection and Union
1416Quantum Private Membership Aggregation
1950Quantum Soft Covering and Decoupling with Relative Entropy Criterion
2051Quantum State Compression with Polar Codes
1918Quantum Wiretap Channel Coding Assisted by Noisy Correlation
1286Quasi-OSD of Binary Image of RS Codes with Applications to JSCC
1177Quickest Detection in High-Dimensional Linear Regression Models via Implicit Regularization
1686Random Staircase Generator Matrix Codes
1895Rate of convergence of an over-parametrized convolutional neural network image classifier learned by gradient descent
1330Rate-Distortion-Perception Tradeoff for Lossy Compression Using Conditional Perception Measure
2040Rate-Limited Optimal Transport for Quantum Gaussian Observables
1798Rate-limited Shuffling for Distributed Computing
2041Receiver algorithms to approach the quantum limit of demodulating pulse position modulation
1974Reconstruction of multiple strings of constant weight from prefix-suffix compositions
1607Recursive Subproduct Codes with Reed-Muller-like Structure
1238Reed-Solomon Codes over Cyclic Polynomial Ring with Lower Encoding/Decoding Complexity
1953Regularized Linear Regression for Binary Classification
1764Reinforcement Learning for Near-Optimal Design of Zero-Delay Codes for Markov Sources
2161Rejection-Sampled Universal Quantization for Smaller Quantization Errors
1378Repairing a Single Erasure in Reed-Solomon Codes with Side Information
1173Repairing Reed-Solomon Codes with Less Bandwidth
1032Repairing Schemes for Tamo-Barg Codes
1432Repairing with Zero Skip Cost
1143Representing Information on DNA using Patterns Induced by Enzymatic Labeling
1106Repurposing Physical Layer Secret Keys: A Novel Paradigm for Common Randomness Generation
1576Resource-Efficient Entanglement-Assisted Covert Communications over Bosonic Channels
2218Resource-Efficient Entanglement-Assisted Covert Communications over Bosonic Channels
2173Reverse PAC Codes: Look-ahead List Decoding
1871Risk Bound on MDL Estimator for Simple ReLU Networks
1598Robust Distributed Gradient Descent to Corruption over Noisy Channels
1125Robust Multi-Hypothesis Testing with Moment-Constrained Uncertainty Sets
1658Robust Semi-supervised Learning via f-Divergence and ɑ-Rényi Divergence
1087Robust Syndrome Extraction via BCH Encoding
2196Robust VAEs via Generating Process of Noise Augmented Data
2032Sample Complexity of Locally Differentially Private Quantum Hypothesis Testing
1380Second-Order Characterization of Minimax Parameter Estimation in Restricted Parameter Space
1036Second-Order Identification Capacity of AWGN Channels
1467Section-wise Revolving NBP-like Decoders for QC-LDPC Codes
1221Secure Communication with Unreliable Entanglement Assistance
1810Secure Distributed Matrix Multiplication with Precomputation
1836Secure Inference for Vertically Partitioned Data Using Multiparty Homomorphic Encryption
1354Secure Network Function Computation: Function-Security
2137Secure Storage using Maximally Recoverable Locally Repairable Codes
1190Secure Submodel Aggregation for Resource-Aware Federated Learning
1852Self Improvement of the McEliece-Yu Inequality
2185Sequence Reconstruction over 3-Deletion Channels
1655Sequential Adversarial Hypothesis Testing
1557Set Transformation: Trade-off Between Repair Bandwidth and Sub-packetization
1626Several Interpretations of Max-Sliced Mutual Information
1932Shared Information under Simple Markov Independencies
1949Sharp analysis of out-of-distribution error for "importance-weighted" estimators in the overparameterized regime
1849Sharp information-theoretic thresholds for shuffled linear regression
1355Sharper rates of convergence for the tensor graphical Lasso estimator
1578Short Regular Girth-8 QC-LDPC Codes From Exponent Matrices with Vertical Symmetry
1882Short Systematic Codes for Correcting Random Edit Errors in DNA Storage
2167SignSGD-FV: Communication-Efficient Distributed Learning through Heterogeneous Edges
2101Simulation of Separable Quantum Measurements on Bipartite States via Likelihood POVMs
1946Simultaneous Computation and Communication over MAC
1292Sliding Secure Symmetric Multilevel Diversity Coding
1034Soft Guessing Under Log-Loss Distortion Allowing Errors
1193Sparse Gaussian Gradient Code
2190Sparsely Pre-transformed Polar Codes for Low-Complexity SCL Decoding
1346Sparsity-Based Secure Gradient Aggregation for Resource-Constrained Federated Learning
1875Sparsity-Constrained Community-Based Group Testing
2066Spectral Convergence of Simplicial Complex Signals
2079Statistic Maximal Leakage
1774Streaming Codes for Three-Node Relay Networks With Burst Erasures
1322Strong Polarization for Shortened and Punctured Polar Codes
1631Subgraph Matching via Partial Optimal Transport
1901Subset Adaptive Relaying for Streaming Erasure Codes
1689Subspace Coding for Spatial Sensing
1556Successive Cancellation Sampling Decoder: An Attempt to Analyze List Decoding Theoretically
1975Supervised Contrastive Representation Learning: Landscape Analysis with Unconstrained Features
2124Symmetric Entropy Regions of Degrees Six and Seven
1319Syndrome-based Fusion Rules in Heterogeneous Distributed Quickest Change Detection
1161Systematic Transmission With Fountain Parity Checks for Erasure Channels With Stop Feedback
1996Task-Based Quantizer Design for Sensing With Random Signals
1414Testing Dependency of Weighted Random Graphs
1908TexShape: Information Theoretic Sentence Embedding for Language Models
2034The Benefit of More Bad Choices in Observational Learning
1494The Bethe Partition Function and the SPA for Factor Graphs based on Homogeneous Real Stable Polynomials
1178The Capacity of Symmetric Private Information Retrieval with Private Noisy Side Information
1207The Capacity of the Weighted Read Channel
1956The Entrapment Problem in Random Walk Decentralized Learning
1298The Langberg-Medard Multiple Unicast Conjecture for Networks with Collapsed Backbone
1114The Lattice-Input Discrete-Time Poisson Channel
1743The Likelihood Gain of a Language Model as a Metric for Text Summarization
1370The Method of Types for the AWGN Channel: Error Exponent
1244The optimal finite-sample error probability in asymmetric binary hypothesis testing
1796The Persuasion Bottleneck
1685The Rate-Distortion-Perception Trade-off: The Role of Private Randomness
1203The State-Dependent Channel with a Rate-Limited Cribbing Helper
1164The Unique Form of the Uncorrelated Optimal ZCZ Sequence Families
2007Theoretical Guarantees of Data Augmented Last Layer Retraining Methods
1287Thermal-Aware Channel with Multiple Wires
1881Threshold Saturation for Quantitative Group Testing with Low-Density Parity-Check Codes
2117Throughput and Latency of Network Coding in Line Networks with Outages
1679Tight Differentiable Relaxation of Sum Ergodic Capacity Maximization for Clustered Cell-Free Networking
1236Tight Lower Bound on Cross-Rack Update Bandwidth and Explicit Constructions
1028Timely Gossip with Age-Dependent Networks
1485Time-Shifted Alternating Gelfand-Pinsker Coding for Broadcast Channels
1821Towards General Function Approximation in Nonstationary Reinforcement Learning
1943Towards Optimal Inverse Temperature in the Gibbs Algorithm
2199Towards Optimal Non-interactive Secure Multiparty Computation for Abelian Programs
2023Training Generative Models from Privatized Data via Entropic Optimal Transport
1847Transmitter Actions for Secure Integrated Sensing and Communication
1187Tree Trace Reconstruction - Reductions to String Trace Reconstruction
1158Trellis-Based Construction of Polar Codes for SCL Decoding
1224Two-Dimensional Multi-Access Coded Caching with Multiple Transmit Antennas
1316Two-weight rank-metric codes
1694Unbiased Estimating Equation on Inverse Divergence and Its Conditions
1789Unconditional Security using (Random) Anonymous Bulletin Board
1702Unequal Message Protection: One-Shot analysis via Poisson Matching Lemma
1376Uniform Distribution on $(n-1)$-Sphere: Rate-Distortion under Squared Error Distortion
2109Universal Batch Learning Under The Misspecification Setting
1385Universal Framework for Parametric Constrained Coding
1444Universal Source Encryption under Side-Channel Attacks
1329Universal Transmission and Combining for Ultra-Reliable MIMO Relaying
1963Unsourced Random Access in MIMO Quasi-Static Rayleigh Fading Channels with Finite Blocklength
1571Upper Bound on Coding Rate over Resistive Random-Access Memory Channel under Arbitrary Input Distribution
1341Upper bounds on the rate of linear q-ary k-hash codes
1309Upper bounds on the size of entanglement-assisted codeword stabilized codes using semidefinite programming
1966Utilitarian Privacy and Private Sampling
2021VALID: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence
1447Variable-Length Secret Key Agreement via Random Stopping Time
2077Variational Characterizations of Sibson’s α-Mutual Information
1717Violation of Leggett-Garg Inequalities Implies Information Erasure
1878Voronoi Constellations of Generalized Construction D' Lattices from q-ary Codes
1152Weakly Private Information Retrieval from Heterogeneously Trusted Servers
2031Weight Structure of Low/High-Rate Polar Codes and Its Applications
2135Weighted-Hamming Metric for Parallel Channels
1890What can Information Guess ? Guessing Advantage vs. Rényi Entropy for Small Leakages
1757When does a bent concatenation not belong to the completed Maiorana-McFarland class?
1952When to Preempt in a Status Update System?
2014Window Weight Limited Gray Codes And Robust Positioning Sequences
1509Wiretapped Commitment over Binary Channels
1321Worst-Case Per-User Error Bound for Asynchronous Unsourced Multiple Access
2089Write Voltage Optimization to Increase Flash Lifetime in a Two-Variance Gaussian Channel
1814Ziv–Merhav estimation for hidden-Markov processes