Search dblp for Publications

export results for "toc:db/journals/jsait/jsait2.bht:"

 download as .bib file

@article{DBLP:journals/jsait/AcharyaCFST21,
  author       = {Jayadev Acharya and
                  Cl{\'{e}}ment L. Canonne and
                  Cody Freitag and
                  Ziteng Sun and
                  Himanshu Tyagi},
  title        = {Inference Under Information Constraints {III:} Local Privacy Constraints},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {253--267},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053569},
  doi          = {10.1109/JSAIT.2021.3053569},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/AcharyaCFST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/AdikariD21,
  author       = {Tharindu B. Adikari and
                  Stark C. Draper},
  title        = {Compressing Gradients by Exploiting Temporal Correlation in Momentum-SGD},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {970--986},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3103494},
  doi          = {10.1109/JSAIT.2021.3103494},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/AdikariD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/AkbayWZ21,
  author       = {Abdullah Basar Akbay and
                  Weina Wang and
                  Junshan Zhang},
  title        = {Impact of Social Learning on Privacy-Preserving Data Collection},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {268--282},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053545},
  doi          = {10.1109/JSAIT.2021.3053545},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/AkbayWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/Al-LawatiAD21,
  author       = {Haider Al{-}Lawati and
                  Tharindu Adikari and
                  Stark C. Draper},
  title        = {Asynchronous Delayed Optimization With Time-Varying Minibatches},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {784--801},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3079856},
  doi          = {10.1109/JSAIT.2021.3079856},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/Al-LawatiAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/AldaghriM21,
  author       = {Nasser Aldaghri and
                  Hessam Mahdavifar},
  title        = {Threshold-Secure Coding With Shared Key},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {95--105},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053020},
  doi          = {10.1109/JSAIT.2021.3053020},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/AldaghriM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/AsoodehLCKS21,
  author       = {Shahab Asoodeh and
                  Jiachun Liao and
                  Fl{\'{a}}vio P. Calmon and
                  Oliver Kosut and
                  Lalitha Sankar},
  title        = {Three Variants of Differential Privacy: Lossless Conversion and Applications},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {208--222},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054692},
  doi          = {10.1109/JSAIT.2021.3054692},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/AsoodehLCKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/AwanS21,
  author       = {Zohaib Hassan Awan and
                  Aydin Sezgin},
  title        = {Secure {MISO} Broadcast Channel: An Interplay Between {CSIT} and Network
                  Topology},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {121--138},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3052845},
  doi          = {10.1109/JSAIT.2021.3052845},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/AwanS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/AyacheR21,
  author       = {Ghadir Ayache and
                  Salim El Rouayheb},
  title        = {Private Weighted Random Walk Stochastic Gradient Descent},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {452--463},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3052975},
  doi          = {10.1109/JSAIT.2021.3052975},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/AyacheR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/BagariaBKT21,
  author       = {Vivek Kumar Bagaria and
                  Tavor Z. Baharav and
                  Govinda M. Kamath and
                  David N. C. Tse},
  title        = {Bandit-Based Monte Carlo Optimization for Nearest Neighbors},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {599--610},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3076447},
  doi          = {10.1109/JSAIT.2021.3076447},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/BagariaBKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/BendaryAK21,
  author       = {Ahmed S. Bendary and
                  Amr Abdelaziz and
                  Can Emre Koksal},
  title        = {Achieving Positive Covert Capacity Over {MIMO} {AWGN} Channels},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {149--162},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053862},
  doi          = {10.1109/JSAIT.2021.3053862},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/BendaryAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/BistritzBLB21,
  author       = {Ilai Bistritz and
                  Tavor Z. Baharav and
                  Amir Leshem and
                  Nicholas Bambos},
  title        = {One for All and All for One: Distributed Learning of Fair Allocations
                  With Multi-Player Bandits},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {584--598},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3073065},
  doi          = {10.1109/JSAIT.2021.3073065},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/BistritzBLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/BlochGYOPSS21,
  author       = {Matthieu R. Bloch and
                  Onur G{\"{u}}nl{\"{u}} and
                  Aylin Yener and
                  Fr{\'{e}}d{\'{e}}rique E. Oggier and
                  H. Vincent Poor and
                  Lalitha Sankar and
                  Rafael F. Schaefer},
  title        = {An Overview of Information-Theoretic Security and Privacy: Metrics,
                  Limits and Applications},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {5--22},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3062755},
  doi          = {10.1109/JSAIT.2021.3062755},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/BlochGYOPSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ChangB21,
  author       = {Meng{-}Che Chang and
                  Matthieu R. Bloch},
  title        = {Evasive Active Hypothesis Testing},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {735--746},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3074156},
  doi          = {10.1109/JSAIT.2021.3074156},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ChangB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ChenJWJ21,
  author       = {Zhen Chen and
                  Zhuqing Jia and
                  Zhiying Wang and
                  Syed Ali Jafar},
  title        = {{GCSA} Codes With Noise Alignment for Secure Coded Multi-Party Batch
                  Matrix Multiplication},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {306--316},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3052934},
  doi          = {10.1109/JSAIT.2021.3052934},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ChenJWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/CohenCH21,
  author       = {Michael K. Cohen and
                  Elliot Catt and
                  Marcus Hutter},
  title        = {Curiosity Killed or Incapacitated the Cat and the Asymptotically Optimal
                  Agent},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {665--677},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3079722},
  doi          = {10.1109/JSAIT.2021.3079722},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/CohenCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/CohenDSM21,
  author       = {Alejandro Cohen and
                  Rafael G. L. D'Oliveira and
                  Salman Salamatian and
                  Muriel M{\'{e}}dard},
  title        = {Network Coding-Based Post-Quantum Cryptography},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {49--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054598},
  doi          = {10.1109/JSAIT.2021.3054598},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/CohenDSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/CohenTEM21,
  author       = {Alejandro Cohen and
                  Guillaume Thiran and
                  Homa Esfahanizadeh and
                  Muriel M{\'{e}}dard},
  title        = {Stream Distributed Coded Computing},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {1025--1040},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3102279},
  doi          = {10.1109/JSAIT.2021.3102279},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/CohenTEM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/CohenVH21,
  author       = {Michael K. Cohen and
                  Badri N. Vellambi and
                  Marcus Hutter},
  title        = {Intelligence and Unambitiousness Using Algorithmic Information Theory},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {678--690},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3073844},
  doi          = {10.1109/JSAIT.2021.3073844},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/CohenVH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/DOliveiraRHK21,
  author       = {Rafael G. L. D'Oliveira and
                  Salim El Rouayheb and
                  Daniel Heinlein and
                  David A. Karpuk},
  title        = {Degree Tables for Secure Distributed Matrix Multiplication},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {907--918},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3102882},
  doi          = {10.1109/JSAIT.2021.3102882},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/DOliveiraRHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/DOliveiraSMS21,
  author       = {Rafael G. L. D'Oliveira and
                  Salman Salamatian and
                  Muriel M{\'{e}}dard and
                  Parastoo Sadeghi},
  title        = {Low Influence, Utility, and Independence in Differential Privacy:
                  {A} Curious Case of {(3} 2)},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {240--252},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3056359},
  doi          = {10.1109/JSAIT.2021.3056359},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/DOliveiraSMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/DongJCYY21,
  author       = {Yanyan Dong and
                  Sheng Jin and
                  Yanzuo Chen and
                  Shenghao Yang and
                  Hoover H. F. Yin},
  title        = {Utility Maximization for Multihop Wireless Networks Employing {BATS}
                  Codes},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1120--1134},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126426},
  doi          = {10.1109/JSAIT.2021.3126426},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/DongJCYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/DuttaWJ21,
  author       = {Sanghamitra Dutta and
                  Jianyu Wang and
                  Gauri Joshi},
  title        = {Slow and Stale Gradients Can Win the Race},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {1012--1024},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3103770},
  doi          = {10.1109/JSAIT.2021.3103770},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/DuttaWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ErkipGIKMMS21,
  author       = {Elza Erkip and
                  Deniz G{\"{u}}nd{\"{u}}z and
                  Stratis Ioannidis and
                  J{\"{o}}rg Kliewer and
                  Derya Malak and
                  Muriel M{\'{e}}dard and
                  R. Srikant},
  title        = {{JSAIT} Editorial for the Special Issue on "Beyond Errors and Erasures:
                  Coding for Data Management and Delivery in Networks"},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1075--1077},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3133120},
  doi          = {10.1109/JSAIT.2021.3133120},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/ErkipGIKMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/FadlallahOKCWG21,
  author       = {Yasser Fadlallah and
                  Othmane Oubejja and
                  Sarah Kamel and
                  Philippe Ciblat and
                  Mich{\`{e}}le A. Wigger and
                  Jean{-}Marie Gorce},
  title        = {Cache-Aided Polar Coding: From Theory to Implementation},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1206--1223},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3128232},
  doi          = {10.1109/JSAIT.2021.3128232},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/FadlallahOKCWG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GhoshKN21,
  author       = {Suman Ghosh and
                  Prasad Krishnan and
                  Lakshmi Prasad Natarajan},
  title        = {Blind Updates in Coded Caching},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1253--1265},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126603},
  doi          = {10.1109/JSAIT.2021.3126603},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/GhoshKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GhoshMKMR21,
  author       = {Avishek Ghosh and
                  Raj Kumar Maity and
                  Swanand Kadhe and
                  Arya Mazumdar and
                  Kannan Ramchandran},
  title        = {Communication-Efficient and Byzantine-Robust Distributed Learning
                  With Error Feedback},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {942--953},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3105076},
  doi          = {10.1109/JSAIT.2021.3105076},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GhoshMKMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GhourchianSOS21,
  author       = {Hamid Ghourchian and
                  Photios A. Stavrou and
                  Tobias J. Oechtering and
                  Mikael Skoglund},
  title        = {Secure Block Source Coding With Sequential Encoding},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {32--48},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053629},
  doi          = {10.1109/JSAIT.2021.3053629},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GhourchianSOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GirgisDDKS21,
  author       = {Antonious M. Girgis and
                  Deepesh Data and
                  Suhas N. Diggavi and
                  Peter Kairouz and
                  Ananda Theertha Suresh},
  title        = {Shuffled Model of Federated Learning: Privacy, Accuracy and Communication
                  Trade-Offs},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {464--478},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3056102},
  doi          = {10.1109/JSAIT.2021.3056102},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GirgisDDKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GlasgowW21,
  author       = {Margalit Glasgow and
                  Mary Wootters},
  title        = {Approximate Gradient Coding With Optimal Decoding},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {855--866},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3100110},
  doi          = {10.1109/JSAIT.2021.3100110},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GlasgowW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GroverCUDAS21,
  author       = {Pulkit Grover and
                  Viveck R. Cadambe and
                  Sennur Ulukus and
                  Stark C. Draper and
                  Salman Avestimehr and
                  Osvaldo Simeone},
  title        = {Guest Editorial for Special Issue on Coded Computing},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {813},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3108024},
  doi          = {10.1109/JSAIT.2021.3108024},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GroverCUDAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GunluS21,
  author       = {Onur G{\"{u}}nl{\"{u}} and
                  Rafael F. Schaefer},
  title        = {Controllable Key Agreement With Correlated Noise},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {82--94},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054035},
  doi          = {10.1109/JSAIT.2021.3054035},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GunluS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GuoZT21,
  author       = {Tao Guo and
                  Ruida Zhou and
                  Chao Tian},
  title        = {New Results on the Storage-Retrieval Tradeoff in Private Information
                  Retrieval Systems},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {403--414},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053217},
  doi          = {10.1109/JSAIT.2021.3053217},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GuoZT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/GuptaJY21,
  author       = {Samarth Gupta and
                  Gauri Joshi and
                  Osman Yagan},
  title        = {Best-Arm Identification in Correlated Multi-Armed Bandits},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {549--563},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3082028},
  doi          = {10.1109/JSAIT.2021.3082028},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/GuptaJY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/HabibBK21,
  author       = {Salman Habib and
                  Allison Beemer and
                  J{\"{o}}rg Kliewer},
  title        = {Belief Propagation Decoding of Short Graph-Based Channel Codes via
                  Reinforcement Learning},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {627--640},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3073834},
  doi          = {10.1109/JSAIT.2021.3073834},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/HabibBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/HaghifamKKZTA21,
  author       = {Mahdi Haghifam and
                  M. Nikhil Krishnan and
                  Ashish Khisti and
                  Xiaoqing Zhu and
                  Wai{-}Tian Tan and
                  John G. Apostolopoulos},
  title        = {On Streaming Codes With Unequal Error Protection},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1165--1179},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126687},
  doi          = {10.1109/JSAIT.2021.3126687},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/HaghifamKKZTA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/HannaEFD21,
  author       = {Osama A. Hanna and
                  Yahya H. Ezzeldin and
                  Christina Fragouli and
                  Suhas N. Diggavi},
  title        = {Quantization of Distributed Data for Learning},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {987--1001},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3105359},
  doi          = {10.1109/JSAIT.2021.3105359},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/HannaEFD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/HasirciogluGG21,
  author       = {Burak Hasircioglu and
                  Jes{\'{u}}s G{\'{o}}mez{-}Vilardeb{\'{o}} and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Bivariate Polynomial Coding for Efficient Distributed Matrix Multiplication},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {814--829},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3105365},
  doi          = {10.1109/JSAIT.2021.3105365},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/HasirciogluGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/HayashiC21,
  author       = {Masahito Hayashi and
                  Ning Cai},
  title        = {Secure Non-Linear Network Code Over a One-Hop Relay Network},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {296--305},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053697},
  doi          = {10.1109/JSAIT.2021.3053697},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/HayashiC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/HayashiWV21,
  author       = {Masahito Hayashi and
                  Tadashi Wadayama and
                  {\'{A}}ngeles V{\'{a}}zquez{-}Castro},
  title        = {Secure Computation-and-Forward With Linear Codes},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {139--148},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054581},
  doi          = {10.1109/JSAIT.2021.3054581},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/HayashiWV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/HellstromD21,
  author       = {Fredrik Hellstr{\"{o}}m and
                  Giuseppe Durisi},
  title        = {Corrections to "Generalization Bounds via Information Density and
                  Conditional Information Density"},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {1072--1073},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3088240},
  doi          = {10.1109/JSAIT.2021.3088240},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/HellstromD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/IbrahimZY21,
  author       = {Abdelrahman M. Ibrahim and
                  Ahmed A. Zewail and
                  Aylin Yener},
  title        = {Benefits of Edge Caching With Coded Placement for Asymmetric Networks
                  and Shared Caches},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1240--1252},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3127435},
  doi          = {10.1109/JSAIT.2021.3127435},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/IbrahimZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/Jahani-NezhadM21,
  author       = {Tayyebeh Jahani{-}Nezhad and
                  Mohammad Ali Maddah{-}Ali},
  title        = {Optimal Communication-Computation Trade-Off in Heterogeneous Gradient
                  Coding},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {1002--1011},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3085676},
  doi          = {10.1109/JSAIT.2021.3085676},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/Jahani-NezhadM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/JeongDCC21,
  author       = {Haewon Jeong and
                  Ateet Devulapalli and
                  Viveck R. Cadambe and
                  Fl{\'{a}}vio P. Calmon},
  title        = {{\unicode{1013}}-Approximate Coded Matrix Multiplication Is Nearly
                  Twice as Efficient as Exact Multiplication},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {845--854},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3099811},
  doi          = {10.1109/JSAIT.2021.3099811},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/JeongDCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/KadheHSK21,
  author       = {Swanand Kadhe and
                  Anoosheh Heidarzadeh and
                  Alex Sprintson and
                  Onur Ozan Koyluoglu},
  title        = {Single-Server Private Information Retrieval Schemes are Equivalent
                  to Locally Recoverable Coding Schemes},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {391--402},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053579},
  doi          = {10.1109/JSAIT.2021.3053579},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/KadheHSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/KhalesiMM21,
  author       = {Ali Khalesi and
                  Mahtab Mirmohseni and
                  Mohammad Ali Maddah{-}Ali},
  title        = {The Capacity Region of Distributed Multi-User Secret Sharing},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {1057--1071},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3102967},
  doi          = {10.1109/JSAIT.2021.3102967},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/KhalesiMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/KrishnanHK21,
  author       = {M. Nikhil Krishnan and
                  Erfan Hosseini and
                  Ashish Khisti},
  title        = {Coded Sequential Matrix Multiplication for Straggler Mitigation},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {830--844},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3104970},
  doi          = {10.1109/JSAIT.2021.3104970},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/KrishnanHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/KrishnanHK21a,
  author       = {M. Nikhil Krishnan and
                  Erfan Hosseini and
                  Ashish Khisti},
  title        = {Sequential Gradient Coding for Packet-Loss Networks},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {919--930},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3102853},
  doi          = {10.1109/JSAIT.2021.3102853},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/KrishnanHK21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/LalithaG21,
  author       = {Anusha Lalitha and
                  Andrea Goldsmith},
  title        = {Bayesian Algorithms for Decentralized Stochastic Bandits},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {564--583},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3080661},
  doi          = {10.1109/JSAIT.2021.3080661},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/LalithaG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/LanZ21,
  author       = {Guanghui Lan and
                  Yi Zhou},
  title        = {Asynchronous Decentralized Accelerated Stochastic Gradient Descent},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {802--811},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3080256},
  doi          = {10.1109/JSAIT.2021.3080256},
  timestamp    = {Sun, 19 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/LanZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/LiBJZ21,
  author       = {Sijie Li and
                  Rawad Bitar and
                  Sidharth Jaggi and
                  Yihan Zhang},
  title        = {Network Coding With Myopic Adversaries},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1108--1119},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126474},
  doi          = {10.1109/JSAIT.2021.3126474},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/LiBJZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/LinKRAY21,
  author       = {Hsuan{-}Yin Lin and
                  Siddhartha Kumar and
                  Eirik Rosnes and
                  Alexandre Graell i Amat and
                  Eitan Yaakobi},
  title        = {The Capacity of Single-Server Weakly-Private Information Retrieval},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {415--427},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3056327},
  doi          = {10.1109/JSAIT.2021.3056327},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/LinKRAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/LuJJ21,
  author       = {Yuxiang Lu and
                  Zhuqing Jia and
                  Syed Ali Jafar},
  title        = {Double Blind T-Private Information Retrieval},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {428--440},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053481},
  doi          = {10.1109/JSAIT.2021.3053481},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/LuJJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/MalakM21,
  author       = {Derya Malak and
                  Muriel M{\'{e}}dard},
  title        = {Function Load Balancing Over Networks},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {1041--1056},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3101762},
  doi          = {10.1109/JSAIT.2021.3101762},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/MalakM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/MitalKLG21,
  author       = {Nitish Mital and
                  Katina Kralevska and
                  Cong Ling and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Functional Broadcast Repair of Multiple Partial Failures in Wireless
                  Distributed Storage Systems},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1093--1107},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126588},
  doi          = {10.1109/JSAIT.2021.3126588},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/MitalKLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/MukherjeeG21,
  author       = {Manuj Mukherjee and
                  Ran Gelles},
  title        = {Multiparty Interactive Coding Over Networks of Intersecting Broadcast
                  Links},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1078--1092},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126422},
  doi          = {10.1109/JSAIT.2021.3126422},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/MukherjeeG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/NafeaY21,
  author       = {Mohamed S. Nafea and
                  Aylin Yener},
  title        = {Coded Caching in the Presence of a Wire and a Cache Tapping Adversary
                  of Type {II}},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {65--81},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054663},
  doi          = {10.1109/JSAIT.2021.3054663},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/NafeaY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/NikolakakisKSS21,
  author       = {Konstantinos E. Nikolakakis and
                  Dionysios S. Kalogerias and
                  Or Sheffet and
                  Anand D. Sarwate},
  title        = {Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and
                  a Differentially Private Scheme},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {534--548},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3081525},
  doi          = {10.1109/JSAIT.2021.3081525},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/NikolakakisKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/OngVKY21,
  author       = {Lawrence Ong and
                  Badri N. Vellambi and
                  J{\"{o}}rg Kliewer and
                  Phee Lep Yeoh},
  title        = {A Code and Rate Equivalence Between Secure Network and Index Coding},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {106--120},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054847},
  doi          = {10.1109/JSAIT.2021.3054847},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/OngVKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/PoorBGOSSY21,
  author       = {H. Vincent Poor and
                  Matthieu R. Bloch and
                  Onur G{\"{u}}nl{\"{u}} and
                  Fr{\'{e}}d{\'{e}}rique E. Oggier and
                  Lalitha Sankar and
                  Rafael F. Schaefer and
                  Aylin Yener},
  title        = {Editorial},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {3--4},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3060161},
  doi          = {10.1109/JSAIT.2021.3060161},
  timestamp    = {Mon, 12 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/PoorBGOSSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/PradhanHN21,
  author       = {Asit Kumar Pradhan and
                  Anoosheh Heidarzadeh and
                  Krishna R. Narayanan},
  title        = {Factored {LT} and Factored Raptor Codes for Large-Scale Distributed
                  Matrix Multiplication},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {893--906},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3103822},
  doi          = {10.1109/JSAIT.2021.3103822},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/PradhanHN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/QiuYYW21,
  author       = {Shuang Qiu and
                  Zhuoran Yang and
                  Jieping Ye and
                  Zhaoran Wang},
  title        = {On Finite-Time Convergence of Actor-Critic Algorithm},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {652--664},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3078754},
  doi          = {10.1109/JSAIT.2021.3078754},
  timestamp    = {Wed, 27 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/QiuYYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/RahimiM21,
  author       = {Ali Rahimi and
                  Mohammad Ali Maddah{-}Ali},
  title        = {Multi-Party Proof Generation in QAP-Based zk-SNARKs},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {931--941},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3102267},
  doi          = {10.1109/JSAIT.2021.3102267},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/RahimiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/RassouliG21,
  author       = {Borzoo Rassouli and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {On Perfect Privacy},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {177--191},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053432},
  doi          = {10.1109/JSAIT.2021.3053432},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/RassouliG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ReddyK21,
  author       = {Kota Srinivas Reddy and
                  Nikhil Karamchandani},
  title        = {Structured Index Coding Problem and Multi-Access Coded Caching},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1266--1281},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126663},
  doi          = {10.1109/JSAIT.2021.3126663},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/ReddyK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/RovatsosMV21,
  author       = {Georgios Rovatsos and
                  George V. Moustakides and
                  Venugopal V. Veeravalli},
  title        = {Quickest Detection of Moving Anomalies in Sensor Networks},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {762--773},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3076043},
  doi          = {10.1109/JSAIT.2021.3076043},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/RovatsosMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SahraeiMA21,
  author       = {Saeid Sahraei and
                  Mohammad Ali Maddah{-}Ali and
                  Amir Salman Avestimehr},
  title        = {Interactive Verifiable Polynomial Evaluation},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {317--325},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054865},
  doi          = {10.1109/JSAIT.2021.3054865},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SahraeiMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SargunK21,
  author       = {Deniz Sargun and
                  Can Emre Koksal},
  title        = {Robust Change Detection via Information Projection},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {774--783},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3077855},
  doi          = {10.1109/JSAIT.2021.3077855},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SargunK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SharififarAS21,
  author       = {Arman Sharififar and
                  Neda Aboutorab and
                  Parastoo Sadeghi},
  title        = {An Update-Based Maximum Column Distance Coding Scheme for Index Coding},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1282--1299},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3127146},
  doi          = {10.1109/JSAIT.2021.3127146},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/SharififarAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ShayovitzF21,
  author       = {Shachar Shayovitz and
                  Meir Feder},
  title        = {Universal Active Learning via Conditional Mutual Information Minimization},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {720--734},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3073842},
  doi          = {10.1109/JSAIT.2021.3073842},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ShayovitzF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ShekharGJ21,
  author       = {Shubhanshu Shekhar and
                  Mohammad Ghavamzadeh and
                  Tara Javidi},
  title        = {Active Learning for Classification With Abstention},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {705--719},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3081433},
  doi          = {10.1109/JSAIT.2021.3081433},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/ShekharGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ShiS21,
  author       = {Chengshuai Shi and
                  Cong Shen},
  title        = {On No-Sensing Adversarial Multi-Player Multi-Armed Bandits With Collision
                  Communications},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {515--533},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3076027},
  doi          = {10.1109/JSAIT.2021.3076027},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ShiS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ShinRR21,
  author       = {Jaehyeok Shin and
                  Aaditya Ramdas and
                  Alessandro Rinaldo},
  title        = {Nonparametric Iterated-Logarithm Extensions of the Sequential Generalized
                  Likelihood Ratio Test},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {691--704},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3081105},
  doi          = {10.1109/JSAIT.2021.3081105},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ShinRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ShiraniGE21,
  author       = {Farhad Shirani and
                  Siddharth Garg and
                  Elza Erkip},
  title        = {A Concentration of Measure Approach to Correlated Graph Matching},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {338--351},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3056280},
  doi          = {10.1109/JSAIT.2021.3056280},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ShiraniGE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ShkelP21,
  author       = {Yanina Y. Shkel and
                  H. Vincent Poor},
  title        = {A Compression Perspective on Secrecy Measures},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {163--176},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3055692},
  doi          = {10.1109/JSAIT.2021.3055692},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ShkelP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SinghDGD21,
  author       = {Navjot Singh and
                  Deepesh Data and
                  Jemin George and
                  Suhas N. Diggavi},
  title        = {SQuARM-SGD: Communication-Efficient Momentum {SGD} for Decentralized
                  Optimization},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {954--969},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3103920},
  doi          = {10.1109/JSAIT.2021.3103920},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SinghDGD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SoGA21,
  author       = {Jinhyun So and
                  Basak G{\"{u}}ler and
                  Amir Salman Avestimehr},
  title        = {CodedPrivateML: {A} Fast and Privacy-Preserving Framework for Distributed
                  Machine Learning},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {441--451},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053220},
  doi          = {10.1109/JSAIT.2021.3053220},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SoGA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SoGA21a,
  author       = {Jinhyun So and
                  Basak G{\"{u}}ler and
                  Amir Salman Avestimehr},
  title        = {Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure
                  Federated Learning},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {479--489},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3054610},
  doi          = {10.1109/JSAIT.2021.3054610},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SoGA21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SoleymaniAMA21,
  author       = {Mahdi Soleymani and
                  Ramy E. Ali and
                  Hessam Mahdavifar and
                  Amir Salman Avestimehr},
  title        = {List-Decodable Coded Computing: Breaking the Adversarial Toleration
                  Barrier},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {867--878},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3102956},
  doi          = {10.1109/JSAIT.2021.3102956},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SoleymaniAMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SoleymaniJM21,
  author       = {Mahdi Soleymani and
                  Mohammad Vahid Jamali and
                  Hessam Mahdavifar},
  title        = {Coded Computing via Binary Linear Codes: Designs and Performance Limits},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {3},
  pages        = {879--892},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3103772},
  doi          = {10.1109/JSAIT.2021.3103772},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SoleymaniJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SoleymaniMA21,
  author       = {Mahdi Soleymani and
                  Hessam Mahdavifar and
                  Amir Salman Avestimehr},
  title        = {Analog Lagrange Coded Computing},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {283--295},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3056377},
  doi          = {10.1109/JSAIT.2021.3056377},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SoleymaniMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/SongH21,
  author       = {Seunghoan Song and
                  Masahito Hayashi},
  title        = {Capacity of Quantum Symmetric Private Information Retrieval With Collusion
                  of All But One of Servers},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {380--390},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053537},
  doi          = {10.1109/JSAIT.2021.3053537},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/SongH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/TahmasbiB21,
  author       = {Mehrdad Tahmasbi and
                  Matthieu R. Bloch},
  title        = {On Covert Quantum Sensing and the Benefits of Entanglement},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {352--365},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3056640},
  doi          = {10.1109/JSAIT.2021.3056640},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/TahmasbiB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/TanX21,
  author       = {Vincent Y. F. Tan and
                  Yao Xie},
  title        = {Editorial},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {492--493},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3086220},
  doi          = {10.1109/JSAIT.2021.3086220},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/TanX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/Vahid21,
  author       = {Alireza Vahid},
  title        = {Topological Content Delivery With Feedback and Random Receiver Cache},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1180--1190},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126209},
  doi          = {10.1109/JSAIT.2021.3126209},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/Vahid21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/VahidLWL21,
  author       = {Alireza Vahid and
                  Shih{-}Chun Lin and
                  I{-}Hsiang Wang and
                  Yi{-}Chun Lai},
  title        = {Content Delivery Over Broadcast Erasure Channels With Distributed
                  Random Cache},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1191--1205},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126622},
  doi          = {10.1109/JSAIT.2021.3126622},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/VahidLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/VialS21,
  author       = {Daniel Vial and
                  Vijay G. Subramanian},
  title        = {Empirical Policy Evaluation With Supergraphs},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {641--651},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3073257},
  doi          = {10.1109/JSAIT.2021.3073257},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/VialS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/Wang21,
  author       = {Ligong Wang},
  title        = {Covert Communication Over the Poisson Channel},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {23--31},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053126},
  doi          = {10.1109/JSAIT.2021.3053126},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/Wang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/WangBU21,
  author       = {Zhusheng Wang and
                  Karim Banawan and
                  Sennur Ulukus},
  title        = {Multi-Party Private Set Intersection: An Information-Theoretic Approach},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {366--379},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3057597},
  doi          = {10.1109/JSAIT.2021.3057597},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/WangBU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/WangCHT21,
  author       = {Hui Wang and
                  Qingchun Chen and
                  Qin Huang and
                  Xiaohu Tang},
  title        = {Reliable Coded Caching Design Over Wireless Networks},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1224--1239},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126554},
  doi          = {10.1109/JSAIT.2021.3126554},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsait/WangCHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/XieX21,
  author       = {Liyan Xie and
                  Yao Xie},
  title        = {Sequential Change Detection by Optimal Weighted {\(\mathscr{l}\)}{\unicode{8322}}
                  Divergence},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {747--761},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3072960},
  doi          = {10.1109/JSAIT.2021.3072960},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/XieX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/XieZXV21,
  author       = {Liyan Xie and
                  Shaofeng Zou and
                  Yao Xie and
                  Venugopal V. Veeravalli},
  title        = {Sequential (Quickest) Change Detection: Classical Results and New
                  Directions},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {494--514},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3072962},
  doi          = {10.1109/JSAIT.2021.3072962},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/XieZXV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/YanT21,
  author       = {Qifa Yan and
                  Daniela Tuninetti},
  title        = {Fundamental Limits of Caching for Demand Privacy Against Colluding
                  Users},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {192--207},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053372},
  doi          = {10.1109/JSAIT.2021.3053372},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/YanT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/YangA21,
  author       = {Chien{-}Sheng Yang and
                  Amir Salman Avestimehr},
  title        = {Coded Computing for Secure Boolean Computations},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {326--337},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3055341},
  doi          = {10.1109/JSAIT.2021.3055341},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/YangA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/YinNZYYC21,
  author       = {Hoover H. F. Yin and
                  Ka Hei Ng and
                  Allen Z. Zhong and
                  Raymond W. Yeung and
                  Shenghao Yang and
                  Ian Y. Y. Chan},
  title        = {Intrablock Interleaving for Batched Network Coding With Blockwise
                  Adaptive Recoding},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1135--1149},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126647},
  doi          = {10.1109/JSAIT.2021.3126647},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/YinNZYYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/YinTNYWZ21,
  author       = {Hoover H. F. Yin and
                  Bin Tang and
                  Ka Hei Ng and
                  Shenghao Yang and
                  Xishi Wang and
                  Qiaoqiao Zhou},
  title        = {A Unified Adaptive Recoding Framework for Batched Network Coding},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {4},
  pages        = {1150--1164},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3126634},
  doi          = {10.1109/JSAIT.2021.3126634},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/YinTNYWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ZhangBWK21,
  author       = {Junyu Zhang and
                  Amrit Singh Bedi and
                  Mengdi Wang and
                  Alec Koppel},
  title        = {Cautious Reinforcement Learning via Distributional Risk in the Dual
                  Domain},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {2},
  pages        = {611--626},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3081108},
  doi          = {10.1109/JSAIT.2021.3081108},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ZhangBWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/ZhouVOS21,
  author       = {Linghui Zhou and
                  Minh Thanh Vu and
                  Tobias J. Oechtering and
                  Mikael Skoglund},
  title        = {Two-Stage Biometric Identification Systems Without Privacy Leakage},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {223--239},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3053368},
  doi          = {10.1109/JSAIT.2021.3053368},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/ZhouVOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics