default search action
IEEE Journal on Selected Areas in Information Theory, Volume 2
Volume 2, Number 1, March 2021
- H. Vincent Poor, Matthieu R. Bloch, Onur Günlü, Frédérique E. Oggier, Lalitha Sankar, Rafael F. Schaefer, Aylin Yener:
Editorial. 3-4 - Matthieu R. Bloch, Onur Günlü, Aylin Yener, Frédérique E. Oggier, H. Vincent Poor, Lalitha Sankar, Rafael F. Schaefer:
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. 5-22 - Ligong Wang:
Covert Communication Over the Poisson Channel. 23-31 - Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund:
Secure Block Source Coding With Sequential Encoding. 32-48 - Alejandro Cohen, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard:
Network Coding-Based Post-Quantum Cryptography. 49-64 - Mohamed S. Nafea, Aylin Yener:
Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II. 65-81 - Onur Günlü, Rafael F. Schaefer:
Controllable Key Agreement With Correlated Noise. 82-94 - Nasser Aldaghri, Hessam Mahdavifar:
Threshold-Secure Coding With Shared Key. 95-105 - Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Phee Lep Yeoh:
A Code and Rate Equivalence Between Secure Network and Index Coding. 106-120 - Zohaib Hassan Awan, Aydin Sezgin:
Secure MISO Broadcast Channel: An Interplay Between CSIT and Network Topology. 121-138 - Masahito Hayashi, Tadashi Wadayama, Ángeles Vázquez-Castro:
Secure Computation-and-Forward With Linear Codes. 139-148 - Ahmed S. Bendary, Amr Abdelaziz, Can Emre Koksal:
Achieving Positive Covert Capacity Over MIMO AWGN Channels. 149-162 - Yanina Y. Shkel, H. Vincent Poor:
A Compression Perspective on Secrecy Measures. 163-176 - Borzoo Rassouli, Deniz Gündüz:
On Perfect Privacy. 177-191 - Qifa Yan, Daniela Tuninetti:
Fundamental Limits of Caching for Demand Privacy Against Colluding Users. 192-207 - Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
Three Variants of Differential Privacy: Lossless Conversion and Applications. 208-222 - Linghui Zhou, Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund:
Two-Stage Biometric Identification Systems Without Privacy Leakage. 223-239 - Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi:
Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2). 240-252 - Jayadev Acharya, Clément L. Canonne, Cody Freitag, Ziteng Sun, Himanshu Tyagi:
Inference Under Information Constraints III: Local Privacy Constraints. 253-267 - Abdullah Basar Akbay, Weina Wang, Junshan Zhang:
Impact of Social Learning on Privacy-Preserving Data Collection. 268-282 - Mahdi Soleymani, Hessam Mahdavifar, Amir Salman Avestimehr:
Analog Lagrange Coded Computing. 283-295 - Masahito Hayashi, Ning Cai:
Secure Non-Linear Network Code Over a One-Hop Relay Network. 296-305 - Zhen Chen, Zhuqing Jia, Zhiying Wang, Syed Ali Jafar:
GCSA Codes With Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication. 306-316 - Saeid Sahraei, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Interactive Verifiable Polynomial Evaluation. 317-325 - Chien-Sheng Yang, Amir Salman Avestimehr:
Coded Computing for Secure Boolean Computations. 326-337 - Farhad Shirani, Siddharth Garg, Elza Erkip:
A Concentration of Measure Approach to Correlated Graph Matching. 338-351 - Mehrdad Tahmasbi, Matthieu R. Bloch:
On Covert Quantum Sensing and the Benefits of Entanglement. 352-365 - Zhusheng Wang, Karim Banawan, Sennur Ulukus:
Multi-Party Private Set Intersection: An Information-Theoretic Approach. 366-379 - Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers. 380-390 - Swanand Kadhe, Anoosheh Heidarzadeh, Alex Sprintson, Onur Ozan Koyluoglu:
Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes. 391-402 - Tao Guo, Ruida Zhou, Chao Tian:
New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems. 403-414 - Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat, Eitan Yaakobi:
The Capacity of Single-Server Weakly-Private Information Retrieval. 415-427 - Yuxiang Lu, Zhuqing Jia, Syed Ali Jafar:
Double Blind T-Private Information Retrieval. 428-440 - Jinhyun So, Basak Güler, Amir Salman Avestimehr:
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning. 441-451 - Ghadir Ayache, Salim El Rouayheb:
Private Weighted Random Walk Stochastic Gradient Descent. 452-463 - Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Peter Kairouz, Ananda Theertha Suresh:
Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs. 464-478 - Jinhyun So, Basak Güler, Amir Salman Avestimehr:
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning. 479-489
Volume 2, Number 2, June 2021
- Vincent Y. F. Tan, Yao Xie:
Editorial. 492-493 - Liyan Xie, Shaofeng Zou, Yao Xie, Venugopal V. Veeravalli:
Sequential (Quickest) Change Detection: Classical Results and New Directions. 494-514 - Chengshuai Shi, Cong Shen:
On No-Sensing Adversarial Multi-Player Multi-Armed Bandits With Collision Communications. 515-533 - Konstantinos E. Nikolakakis, Dionysios S. Kalogerias, Or Sheffet, Anand D. Sarwate:
Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme. 534-548 - Samarth Gupta, Gauri Joshi, Osman Yagan:
Best-Arm Identification in Correlated Multi-Armed Bandits. 549-563 - Anusha Lalitha, Andrea Goldsmith:
Bayesian Algorithms for Decentralized Stochastic Bandits. 564-583 - Ilai Bistritz, Tavor Z. Baharav, Amir Leshem, Nicholas Bambos:
One for All and All for One: Distributed Learning of Fair Allocations With Multi-Player Bandits. 584-598 - Vivek Kumar Bagaria, Tavor Z. Baharav, Govinda M. Kamath, David N. C. Tse:
Bandit-Based Monte Carlo Optimization for Nearest Neighbors. 599-610 - Junyu Zhang, Amrit Singh Bedi, Mengdi Wang, Alec Koppel:
Cautious Reinforcement Learning via Distributional Risk in the Dual Domain. 611-626 - Salman Habib, Allison Beemer, Jörg Kliewer:
Belief Propagation Decoding of Short Graph-Based Channel Codes via Reinforcement Learning. 627-640 - Daniel Vial, Vijay G. Subramanian:
Empirical Policy Evaluation With Supergraphs. 641-651 - Shuang Qiu, Zhuoran Yang, Jieping Ye, Zhaoran Wang:
On Finite-Time Convergence of Actor-Critic Algorithm. 652-664 - Michael K. Cohen, Elliot Catt, Marcus Hutter:
Curiosity Killed or Incapacitated the Cat and the Asymptotically Optimal Agent. 665-677 - Michael K. Cohen, Badri N. Vellambi, Marcus Hutter:
Intelligence and Unambitiousness Using Algorithmic Information Theory. 678-690 - Jaehyeok Shin, Aaditya Ramdas, Alessandro Rinaldo:
Nonparametric Iterated-Logarithm Extensions of the Sequential Generalized Likelihood Ratio Test. 691-704 - Shubhanshu Shekhar, Mohammad Ghavamzadeh, Tara Javidi:
Active Learning for Classification With Abstention. 705-719 - Shachar Shayovitz, Meir Feder:
Universal Active Learning via Conditional Mutual Information Minimization. 720-734 - Meng-Che Chang, Matthieu R. Bloch:
Evasive Active Hypothesis Testing. 735-746 - Liyan Xie, Yao Xie:
Sequential Change Detection by Optimal Weighted ℓ₂ Divergence. 747-761 - Georgios Rovatsos, George V. Moustakides, Venugopal V. Veeravalli:
Quickest Detection of Moving Anomalies in Sensor Networks. 762-773 - Deniz Sargun, Can Emre Koksal:
Robust Change Detection via Information Projection. 774-783 - Haider Al-Lawati, Tharindu Adikari, Stark C. Draper:
Asynchronous Delayed Optimization With Time-Varying Minibatches. 784-801 - Guanghui Lan, Yi Zhou:
Asynchronous Decentralized Accelerated Stochastic Gradient Descent. 802-811
Volume 2, Number 3, September 2021
- Pulkit Grover, Viveck R. Cadambe, Sennur Ulukus, Stark C. Draper, Salman Avestimehr, Osvaldo Simeone:
Guest Editorial for Special Issue on Coded Computing. 813 - Burak Hasircioglu, Jesús Gómez-Vilardebó, Deniz Gündüz:
Bivariate Polynomial Coding for Efficient Distributed Matrix Multiplication. 814-829 - M. Nikhil Krishnan, Erfan Hosseini, Ashish Khisti:
Coded Sequential Matrix Multiplication for Straggler Mitigation. 830-844 - Haewon Jeong, Ateet Devulapalli, Viveck R. Cadambe, Flávio P. Calmon:
ϵ-Approximate Coded Matrix Multiplication Is Nearly Twice as Efficient as Exact Multiplication. 845-854 - Margalit Glasgow, Mary Wootters:
Approximate Gradient Coding With Optimal Decoding. 855-866 - Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, Amir Salman Avestimehr:
List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier. 867-878 - Mahdi Soleymani, Mohammad Vahid Jamali, Hessam Mahdavifar:
Coded Computing via Binary Linear Codes: Designs and Performance Limits. 879-892 - Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan:
Factored LT and Factored Raptor Codes for Large-Scale Distributed Matrix Multiplication. 893-906 - Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David A. Karpuk:
Degree Tables for Secure Distributed Matrix Multiplication. 907-918 - M. Nikhil Krishnan, Erfan Hosseini, Ashish Khisti:
Sequential Gradient Coding for Packet-Loss Networks. 919-930 - Ali Rahimi, Mohammad Ali Maddah-Ali:
Multi-Party Proof Generation in QAP-Based zk-SNARKs. 931-941 - Avishek Ghosh, Raj Kumar Maity, Swanand Kadhe, Arya Mazumdar, Kannan Ramchandran:
Communication-Efficient and Byzantine-Robust Distributed Learning With Error Feedback. 942-953 - Navjot Singh, Deepesh Data, Jemin George, Suhas N. Diggavi:
SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization. 954-969 - Tharindu B. Adikari, Stark C. Draper:
Compressing Gradients by Exploiting Temporal Correlation in Momentum-SGD. 970-986 - Osama A. Hanna, Yahya H. Ezzeldin, Christina Fragouli, Suhas N. Diggavi:
Quantization of Distributed Data for Learning. 987-1001 - Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding. 1002-1011 - Sanghamitra Dutta, Jianyu Wang, Gauri Joshi:
Slow and Stale Gradients Can Win the Race. 1012-1024 - Alejandro Cohen, Guillaume Thiran, Homa Esfahanizadeh, Muriel Médard:
Stream Distributed Coded Computing. 1025-1040 - Derya Malak, Muriel Médard:
Function Load Balancing Over Networks. 1041-1056 - Ali Khalesi, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:
The Capacity Region of Distributed Multi-User Secret Sharing. 1057-1071 - Fredrik Hellström, Giuseppe Durisi:
Corrections to "Generalization Bounds via Information Density and Conditional Information Density". 1072-1073
Volume 2, Number 4, December 2021
- Elza Erkip, Deniz Gündüz, Stratis Ioannidis, Jörg Kliewer, Derya Malak, Muriel Médard, R. Srikant:
JSAIT Editorial for the Special Issue on "Beyond Errors and Erasures: Coding for Data Management and Delivery in Networks". 1075-1077 - Manuj Mukherjee, Ran Gelles:
Multiparty Interactive Coding Over Networks of Intersecting Broadcast Links. 1078-1092 - Nitish Mital, Katina Kralevska, Cong Ling, Deniz Gündüz:
Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems. 1093-1107 - Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang:
Network Coding With Myopic Adversaries. 1108-1119 - Yanyan Dong, Sheng Jin, Yanzuo Chen, Shenghao Yang, Hoover H. F. Yin:
Utility Maximization for Multihop Wireless Networks Employing BATS Codes. 1120-1134 - Hoover H. F. Yin, Ka Hei Ng, Allen Z. Zhong, Raymond W. Yeung, Shenghao Yang, Ian Y. Y. Chan:
Intrablock Interleaving for Batched Network Coding With Blockwise Adaptive Recoding. 1135-1149 - Hoover H. F. Yin, Bin Tang, Ka Hei Ng, Shenghao Yang, Xishi Wang, Qiaoqiao Zhou:
A Unified Adaptive Recoding Framework for Batched Network Coding. 1150-1164 - Mahdi Haghifam, M. Nikhil Krishnan, Ashish Khisti, Xiaoqing Zhu, Wai-Tian Tan, John G. Apostolopoulos:
On Streaming Codes With Unequal Error Protection. 1165-1179 - Alireza Vahid:
Topological Content Delivery With Feedback and Random Receiver Cache. 1180-1190 - Alireza Vahid, Shih-Chun Lin, I-Hsiang Wang, Yi-Chun Lai:
Content Delivery Over Broadcast Erasure Channels With Distributed Random Cache. 1191-1205 - Yasser Fadlallah, Othmane Oubejja, Sarah Kamel, Philippe Ciblat, Michèle A. Wigger, Jean-Marie Gorce:
Cache-Aided Polar Coding: From Theory to Implementation. 1206-1223 - Hui Wang, Qingchun Chen, Qin Huang, Xiaohu Tang:
Reliable Coded Caching Design Over Wireless Networks. 1224-1239 - Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches. 1240-1252 - Suman Ghosh, Prasad Krishnan, Lakshmi Prasad Natarajan:
Blind Updates in Coded Caching. 1253-1265 - Kota Srinivas Reddy, Nikhil Karamchandani:
Structured Index Coding Problem and Multi-Access Coded Caching. 1266-1281 - Arman Sharififar, Neda Aboutorab, Parastoo Sadeghi:
An Update-Based Maximum Column Distance Coding Scheme for Index Coding. 1282-1299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.