


default search action
IEEE Journal on Selected Areas in Information Theory, Volume 2
Volume 2, Number 1, March 2021
- H. Vincent Poor, Matthieu R. Bloch, Onur Günlü, Frédérique E. Oggier, Lalitha Sankar, Rafael F. Schaefer
, Aylin Yener:
Editorial. 3-4 - Matthieu R. Bloch
, Onur Günlü
, Aylin Yener
, Frédérique E. Oggier, H. Vincent Poor
, Lalitha Sankar
, Rafael F. Schaefer
:
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. 5-22 - Ligong Wang
:
Covert Communication Over the Poisson Channel. 23-31 - Hamid Ghourchian
, Photios A. Stavrou
, Tobias J. Oechtering
, Mikael Skoglund
:
Secure Block Source Coding With Sequential Encoding. 32-48 - Alejandro Cohen
, Rafael G. L. D'Oliveira
, Salman Salamatian, Muriel Médard
:
Network Coding-Based Post-Quantum Cryptography. 49-64 - Mohamed S. Nafea
, Aylin Yener
:
Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II. 65-81 - Onur Günlü
, Rafael F. Schaefer
:
Controllable Key Agreement With Correlated Noise. 82-94 - Nasser Aldaghri
, Hessam Mahdavifar
:
Threshold-Secure Coding With Shared Key. 95-105 - Lawrence Ong
, Badri N. Vellambi
, Jörg Kliewer
, Phee Lep Yeoh
:
A Code and Rate Equivalence Between Secure Network and Index Coding. 106-120 - Zohaib Hassan Awan
, Aydin Sezgin
:
Secure MISO Broadcast Channel: An Interplay Between CSIT and Network Topology. 121-138 - Masahito Hayashi
, Tadashi Wadayama
, Ángeles Vázquez-Castro
:
Secure Computation-and-Forward With Linear Codes. 139-148 - Ahmed S. Bendary
, Amr Abdelaziz
, Can Emre Koksal
:
Achieving Positive Covert Capacity Over MIMO AWGN Channels. 149-162 - Yanina Y. Shkel
, H. Vincent Poor
:
A Compression Perspective on Secrecy Measures. 163-176 - Borzoo Rassouli
, Deniz Gündüz
:
On Perfect Privacy. 177-191 - Qifa Yan
, Daniela Tuninetti
:
Fundamental Limits of Caching for Demand Privacy Against Colluding Users. 192-207 - Shahab Asoodeh
, Jiachun Liao
, Flávio P. Calmon
, Oliver Kosut
, Lalitha Sankar
:
Three Variants of Differential Privacy: Lossless Conversion and Applications. 208-222 - Linghui Zhou
, Minh Thanh Vu
, Tobias J. Oechtering
, Mikael Skoglund
:
Two-Stage Biometric Identification Systems Without Privacy Leakage. 223-239 - Rafael G. L. D'Oliveira
, Salman Salamatian, Muriel Médard
, Parastoo Sadeghi
:
Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2). 240-252 - Jayadev Acharya
, Clément L. Canonne
, Cody Freitag, Ziteng Sun, Himanshu Tyagi
:
Inference Under Information Constraints III: Local Privacy Constraints. 253-267 - Abdullah Basar Akbay
, Weina Wang, Junshan Zhang
:
Impact of Social Learning on Privacy-Preserving Data Collection. 268-282 - Mahdi Soleymani
, Hessam Mahdavifar
, Amir Salman Avestimehr:
Analog Lagrange Coded Computing. 283-295 - Masahito Hayashi
, Ning Cai
:
Secure Non-Linear Network Code Over a One-Hop Relay Network. 296-305 - Zhen Chen
, Zhuqing Jia
, Zhiying Wang
, Syed Ali Jafar
:
GCSA Codes With Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication. 306-316 - Saeid Sahraei
, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Interactive Verifiable Polynomial Evaluation. 317-325 - Chien-Sheng Yang
, Amir Salman Avestimehr:
Coded Computing for Secure Boolean Computations. 326-337 - Farhad Shirani
, Siddharth Garg, Elza Erkip
:
A Concentration of Measure Approach to Correlated Graph Matching. 338-351 - Mehrdad Tahmasbi
, Matthieu R. Bloch
:
On Covert Quantum Sensing and the Benefits of Entanglement. 352-365 - Zhusheng Wang
, Karim Banawan
, Sennur Ulukus
:
Multi-Party Private Set Intersection: An Information-Theoretic Approach. 366-379 - Seunghoan Song
, Masahito Hayashi
:
Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers. 380-390 - Swanand Kadhe
, Anoosheh Heidarzadeh
, Alex Sprintson
, Onur Ozan Koyluoglu:
Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes. 391-402 - Tao Guo
, Ruida Zhou
, Chao Tian
:
New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems. 403-414 - Hsuan-Yin Lin
, Siddhartha Kumar
, Eirik Rosnes
, Alexandre Graell i Amat
, Eitan Yaakobi
:
The Capacity of Single-Server Weakly-Private Information Retrieval. 415-427 - Yuxiang Lu
, Zhuqing Jia
, Syed Ali Jafar
:
Double Blind T-Private Information Retrieval. 428-440 - Jinhyun So
, Basak Güler
, Amir Salman Avestimehr:
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning. 441-451 - Ghadir Ayache
, Salim El Rouayheb:
Private Weighted Random Walk Stochastic Gradient Descent. 452-463 - Antonious M. Girgis
, Deepesh Data
, Suhas N. Diggavi, Peter Kairouz, Ananda Theertha Suresh:
Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs. 464-478 - Jinhyun So
, Basak Güler
, Amir Salman Avestimehr:
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning. 479-489
Volume 2, Number 2, June 2021
- Vincent Y. F. Tan
, Yao Xie
:
Editorial. 492-493 - Liyan Xie
, Shaofeng Zou
, Yao Xie
, Venugopal V. Veeravalli
:
Sequential (Quickest) Change Detection: Classical Results and New Directions. 494-514 - Chengshuai Shi
, Cong Shen
:
On No-Sensing Adversarial Multi-Player Multi-Armed Bandits With Collision Communications. 515-533 - Konstantinos E. Nikolakakis
, Dionysios S. Kalogerias
, Or Sheffet
, Anand D. Sarwate
:
Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme. 534-548 - Samarth Gupta
, Gauri Joshi
, Osman Yagan
:
Best-Arm Identification in Correlated Multi-Armed Bandits. 549-563 - Anusha Lalitha
, Andrea Goldsmith
:
Bayesian Algorithms for Decentralized Stochastic Bandits. 564-583 - Ilai Bistritz
, Tavor Z. Baharav
, Amir Leshem
, Nicholas Bambos
:
One for All and All for One: Distributed Learning of Fair Allocations With Multi-Player Bandits. 584-598 - Vivek Kumar Bagaria, Tavor Z. Baharav
, Govinda M. Kamath, David N. C. Tse:
Bandit-Based Monte Carlo Optimization for Nearest Neighbors. 599-610 - Junyu Zhang, Amrit Singh Bedi
, Mengdi Wang
, Alec Koppel
:
Cautious Reinforcement Learning via Distributional Risk in the Dual Domain. 611-626 - Salman Habib
, Allison Beemer
, Jörg Kliewer
:
Belief Propagation Decoding of Short Graph-Based Channel Codes via Reinforcement Learning. 627-640 - Daniel Vial
, Vijay G. Subramanian
:
Empirical Policy Evaluation With Supergraphs. 641-651 - Shuang Qiu
, Zhuoran Yang
, Jieping Ye, Zhaoran Wang:
On Finite-Time Convergence of Actor-Critic Algorithm. 652-664 - Michael K. Cohen
, Elliot Catt, Marcus Hutter
:
Curiosity Killed or Incapacitated the Cat and the Asymptotically Optimal Agent. 665-677 - Michael K. Cohen
, Badri N. Vellambi
, Marcus Hutter
:
Intelligence and Unambitiousness Using Algorithmic Information Theory. 678-690 - Jaehyeok Shin
, Aaditya Ramdas, Alessandro Rinaldo:
Nonparametric Iterated-Logarithm Extensions of the Sequential Generalized Likelihood Ratio Test. 691-704 - Shubhanshu Shekhar
, Mohammad Ghavamzadeh
, Tara Javidi
:
Active Learning for Classification With Abstention. 705-719 - Shachar Shayovitz
, Meir Feder:
Universal Active Learning via Conditional Mutual Information Minimization. 720-734 - Meng-Che Chang
, Matthieu R. Bloch
:
Evasive Active Hypothesis Testing. 735-746 - Liyan Xie
, Yao Xie
:
Sequential Change Detection by Optimal Weighted ℓ₂ Divergence. 747-761 - Georgios Rovatsos
, George V. Moustakides
, Venugopal V. Veeravalli
:
Quickest Detection of Moving Anomalies in Sensor Networks. 762-773 - Deniz Sargun
, Can Emre Koksal
:
Robust Change Detection via Information Projection. 774-783 - Haider Al-Lawati
, Tharindu Adikari
, Stark C. Draper
:
Asynchronous Delayed Optimization With Time-Varying Minibatches. 784-801 - Guanghui Lan, Yi Zhou
:
Asynchronous Decentralized Accelerated Stochastic Gradient Descent. 802-811
Volume 2, Number 3, September 2021
- Pulkit Grover
, Viveck R. Cadambe
, Sennur Ulukus, Stark C. Draper, Salman Avestimehr, Osvaldo Simeone:
Guest Editorial for Special Issue on Coded Computing. 813 - Burak Hasircioglu
, Jesús Gómez-Vilardebó
, Deniz Gündüz
:
Bivariate Polynomial Coding for Efficient Distributed Matrix Multiplication. 814-829 - M. Nikhil Krishnan
, Erfan Hosseini, Ashish Khisti
:
Coded Sequential Matrix Multiplication for Straggler Mitigation. 830-844 - Haewon Jeong
, Ateet Devulapalli, Viveck R. Cadambe
, Flávio P. Calmon
:
ϵ-Approximate Coded Matrix Multiplication Is Nearly Twice as Efficient as Exact Multiplication. 845-854 - Margalit Glasgow
, Mary Wootters
:
Approximate Gradient Coding With Optimal Decoding. 855-866 - Mahdi Soleymani
, Ramy E. Ali, Hessam Mahdavifar
, Amir Salman Avestimehr:
List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier. 867-878 - Mahdi Soleymani
, Mohammad Vahid Jamali
, Hessam Mahdavifar
:
Coded Computing via Binary Linear Codes: Designs and Performance Limits. 879-892 - Asit Kumar Pradhan
, Anoosheh Heidarzadeh
, Krishna R. Narayanan
:
Factored LT and Factored Raptor Codes for Large-Scale Distributed Matrix Multiplication. 893-906 - Rafael G. L. D'Oliveira
, Salim El Rouayheb, Daniel Heinlein
, David A. Karpuk:
Degree Tables for Secure Distributed Matrix Multiplication. 907-918 - M. Nikhil Krishnan
, Erfan Hosseini, Ashish Khisti
:
Sequential Gradient Coding for Packet-Loss Networks. 919-930 - Ali Rahimi
, Mohammad Ali Maddah-Ali
:
Multi-Party Proof Generation in QAP-Based zk-SNARKs. 931-941 - Avishek Ghosh, Raj Kumar Maity
, Swanand Kadhe
, Arya Mazumdar
, Kannan Ramchandran:
Communication-Efficient and Byzantine-Robust Distributed Learning With Error Feedback. 942-953 - Navjot Singh
, Deepesh Data
, Jemin George
, Suhas N. Diggavi
:
SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization. 954-969 - Tharindu B. Adikari
, Stark C. Draper
:
Compressing Gradients by Exploiting Temporal Correlation in Momentum-SGD. 970-986 - Osama A. Hanna
, Yahya H. Ezzeldin
, Christina Fragouli
, Suhas N. Diggavi:
Quantization of Distributed Data for Learning. 987-1001 - Tayyebeh Jahani-Nezhad
, Mohammad Ali Maddah-Ali
:
Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding. 1002-1011 - Sanghamitra Dutta
, Jianyu Wang
, Gauri Joshi
:
Slow and Stale Gradients Can Win the Race. 1012-1024 - Alejandro Cohen
, Guillaume Thiran
, Homa Esfahanizadeh, Muriel Médard
:
Stream Distributed Coded Computing. 1025-1040 - Derya Malak
, Muriel Médard
:
Function Load Balancing Over Networks. 1041-1056 - Ali Khalesi
, Mahtab Mirmohseni
, Mohammad Ali Maddah-Ali:
The Capacity Region of Distributed Multi-User Secret Sharing. 1057-1071 - Fredrik Hellström
, Giuseppe Durisi
:
Corrections to "Generalization Bounds via Information Density and Conditional Information Density". 1072-1073
Volume 2, Number 4, December 2021
- Elza Erkip
, Deniz Gündüz
, Stratis Ioannidis
, Jörg Kliewer, Derya Malak
, Muriel Médard
, R. Srikant
:
JSAIT Editorial for the Special Issue on "Beyond Errors and Erasures: Coding for Data Management and Delivery in Networks". 1075-1077 - Manuj Mukherjee
, Ran Gelles
:
Multiparty Interactive Coding Over Networks of Intersecting Broadcast Links. 1078-1092 - Nitish Mital
, Katina Kralevska
, Cong Ling
, Deniz Gündüz
:
Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems. 1093-1107 - Sijie Li
, Rawad Bitar
, Sidharth Jaggi, Yihan Zhang
:
Network Coding With Myopic Adversaries. 1108-1119 - Yanyan Dong
, Sheng Jin, Yanzuo Chen, Shenghao Yang
, Hoover H. F. Yin
:
Utility Maximization for Multihop Wireless Networks Employing BATS Codes. 1120-1134 - Hoover H. F. Yin
, Ka Hei Ng, Allen Z. Zhong
, Raymond W. Yeung
, Shenghao Yang
, Ian Y. Y. Chan:
Intrablock Interleaving for Batched Network Coding With Blockwise Adaptive Recoding. 1135-1149 - Hoover H. F. Yin
, Bin Tang
, Ka Hei Ng, Shenghao Yang
, Xishi Wang, Qiaoqiao Zhou
:
A Unified Adaptive Recoding Framework for Batched Network Coding. 1150-1164 - Mahdi Haghifam
, M. Nikhil Krishnan
, Ashish Khisti
, Xiaoqing Zhu
, Wai-Tian Tan, John G. Apostolopoulos:
On Streaming Codes With Unequal Error Protection. 1165-1179 - Alireza Vahid
:
Topological Content Delivery With Feedback and Random Receiver Cache. 1180-1190 - Alireza Vahid
, Shih-Chun Lin
, I-Hsiang Wang
, Yi-Chun Lai:
Content Delivery Over Broadcast Erasure Channels With Distributed Random Cache. 1191-1205 - Yasser Fadlallah
, Othmane Oubejja
, Sarah Kamel, Philippe Ciblat
, Michèle A. Wigger
, Jean-Marie Gorce:
Cache-Aided Polar Coding: From Theory to Implementation. 1206-1223 - Hui Wang
, Qingchun Chen
, Qin Huang, Xiaohu Tang
:
Reliable Coded Caching Design Over Wireless Networks. 1224-1239 - Abdelrahman M. Ibrahim
, Ahmed A. Zewail
, Aylin Yener
:
Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches. 1240-1252 - Suman Ghosh
, Prasad Krishnan
, Lakshmi Prasad Natarajan
:
Blind Updates in Coded Caching. 1253-1265 - Kota Srinivas Reddy
, Nikhil Karamchandani
:
Structured Index Coding Problem and Multi-Access Coded Caching. 1266-1281 - Arman Sharififar
, Neda Aboutorab
, Parastoo Sadeghi
:
An Update-Based Maximum Column Distance Coding Scheme for Index Coding. 1282-1299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.