![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/jsait/jsait2.bht:"
@article{DBLP:journals/jsait/AcharyaCFST21, author = {Jayadev Acharya and Cl{\'{e}}ment L. Canonne and Cody Freitag and Ziteng Sun and Himanshu Tyagi}, title = {Inference Under Information Constraints {III:} Local Privacy Constraints}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {253--267}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053569}, doi = {10.1109/JSAIT.2021.3053569}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/AcharyaCFST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/AdikariD21, author = {Tharindu B. Adikari and Stark C. Draper}, title = {Compressing Gradients by Exploiting Temporal Correlation in Momentum-SGD}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {970--986}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3103494}, doi = {10.1109/JSAIT.2021.3103494}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/AdikariD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/AkbayWZ21, author = {Abdullah Basar Akbay and Weina Wang and Junshan Zhang}, title = {Impact of Social Learning on Privacy-Preserving Data Collection}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {268--282}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053545}, doi = {10.1109/JSAIT.2021.3053545}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/AkbayWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/Al-LawatiAD21, author = {Haider Al{-}Lawati and Tharindu Adikari and Stark C. Draper}, title = {Asynchronous Delayed Optimization With Time-Varying Minibatches}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {784--801}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3079856}, doi = {10.1109/JSAIT.2021.3079856}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/Al-LawatiAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/AldaghriM21, author = {Nasser Aldaghri and Hessam Mahdavifar}, title = {Threshold-Secure Coding With Shared Key}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {95--105}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053020}, doi = {10.1109/JSAIT.2021.3053020}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/AldaghriM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/AsoodehLCKS21, author = {Shahab Asoodeh and Jiachun Liao and Fl{\'{a}}vio P. Calmon and Oliver Kosut and Lalitha Sankar}, title = {Three Variants of Differential Privacy: Lossless Conversion and Applications}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {208--222}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054692}, doi = {10.1109/JSAIT.2021.3054692}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/AsoodehLCKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/AwanS21, author = {Zohaib Hassan Awan and Aydin Sezgin}, title = {Secure {MISO} Broadcast Channel: An Interplay Between {CSIT} and Network Topology}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {121--138}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3052845}, doi = {10.1109/JSAIT.2021.3052845}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/AwanS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/AyacheR21, author = {Ghadir Ayache and Salim El Rouayheb}, title = {Private Weighted Random Walk Stochastic Gradient Descent}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {452--463}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3052975}, doi = {10.1109/JSAIT.2021.3052975}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/AyacheR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/BagariaBKT21, author = {Vivek Kumar Bagaria and Tavor Z. Baharav and Govinda M. Kamath and David N. C. Tse}, title = {Bandit-Based Monte Carlo Optimization for Nearest Neighbors}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {599--610}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3076447}, doi = {10.1109/JSAIT.2021.3076447}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/BagariaBKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/BendaryAK21, author = {Ahmed S. Bendary and Amr Abdelaziz and Can Emre Koksal}, title = {Achieving Positive Covert Capacity Over {MIMO} {AWGN} Channels}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {149--162}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053862}, doi = {10.1109/JSAIT.2021.3053862}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/BendaryAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/BistritzBLB21, author = {Ilai Bistritz and Tavor Z. Baharav and Amir Leshem and Nicholas Bambos}, title = {One for All and All for One: Distributed Learning of Fair Allocations With Multi-Player Bandits}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {584--598}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3073065}, doi = {10.1109/JSAIT.2021.3073065}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/BistritzBLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/BlochGYOPSS21, author = {Matthieu R. Bloch and Onur G{\"{u}}nl{\"{u}} and Aylin Yener and Fr{\'{e}}d{\'{e}}rique E. Oggier and H. Vincent Poor and Lalitha Sankar and Rafael F. Schaefer}, title = {An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {5--22}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3062755}, doi = {10.1109/JSAIT.2021.3062755}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/BlochGYOPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ChangB21, author = {Meng{-}Che Chang and Matthieu R. Bloch}, title = {Evasive Active Hypothesis Testing}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {735--746}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3074156}, doi = {10.1109/JSAIT.2021.3074156}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ChangB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ChenJWJ21, author = {Zhen Chen and Zhuqing Jia and Zhiying Wang and Syed Ali Jafar}, title = {{GCSA} Codes With Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {306--316}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3052934}, doi = {10.1109/JSAIT.2021.3052934}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ChenJWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/CohenCH21, author = {Michael K. Cohen and Elliot Catt and Marcus Hutter}, title = {Curiosity Killed or Incapacitated the Cat and the Asymptotically Optimal Agent}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {665--677}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3079722}, doi = {10.1109/JSAIT.2021.3079722}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/CohenCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/CohenDSM21, author = {Alejandro Cohen and Rafael G. L. D'Oliveira and Salman Salamatian and Muriel M{\'{e}}dard}, title = {Network Coding-Based Post-Quantum Cryptography}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {49--64}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054598}, doi = {10.1109/JSAIT.2021.3054598}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/CohenDSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/CohenTEM21, author = {Alejandro Cohen and Guillaume Thiran and Homa Esfahanizadeh and Muriel M{\'{e}}dard}, title = {Stream Distributed Coded Computing}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {1025--1040}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3102279}, doi = {10.1109/JSAIT.2021.3102279}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/CohenTEM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/CohenVH21, author = {Michael K. Cohen and Badri N. Vellambi and Marcus Hutter}, title = {Intelligence and Unambitiousness Using Algorithmic Information Theory}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {678--690}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3073844}, doi = {10.1109/JSAIT.2021.3073844}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/CohenVH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/DOliveiraRHK21, author = {Rafael G. L. D'Oliveira and Salim El Rouayheb and Daniel Heinlein and David A. Karpuk}, title = {Degree Tables for Secure Distributed Matrix Multiplication}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {907--918}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3102882}, doi = {10.1109/JSAIT.2021.3102882}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/DOliveiraRHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/DOliveiraSMS21, author = {Rafael G. L. D'Oliveira and Salman Salamatian and Muriel M{\'{e}}dard and Parastoo Sadeghi}, title = {Low Influence, Utility, and Independence in Differential Privacy: {A} Curious Case of {(3} 2)}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {240--252}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3056359}, doi = {10.1109/JSAIT.2021.3056359}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/DOliveiraSMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/DongJCYY21, author = {Yanyan Dong and Sheng Jin and Yanzuo Chen and Shenghao Yang and Hoover H. F. Yin}, title = {Utility Maximization for Multihop Wireless Networks Employing {BATS} Codes}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1120--1134}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126426}, doi = {10.1109/JSAIT.2021.3126426}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/DongJCYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/DuttaWJ21, author = {Sanghamitra Dutta and Jianyu Wang and Gauri Joshi}, title = {Slow and Stale Gradients Can Win the Race}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {1012--1024}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3103770}, doi = {10.1109/JSAIT.2021.3103770}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/DuttaWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ErkipGIKMMS21, author = {Elza Erkip and Deniz G{\"{u}}nd{\"{u}}z and Stratis Ioannidis and J{\"{o}}rg Kliewer and Derya Malak and Muriel M{\'{e}}dard and R. Srikant}, title = {{JSAIT} Editorial for the Special Issue on "Beyond Errors and Erasures: Coding for Data Management and Delivery in Networks"}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1075--1077}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3133120}, doi = {10.1109/JSAIT.2021.3133120}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/ErkipGIKMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/FadlallahOKCWG21, author = {Yasser Fadlallah and Othmane Oubejja and Sarah Kamel and Philippe Ciblat and Mich{\`{e}}le A. Wigger and Jean{-}Marie Gorce}, title = {Cache-Aided Polar Coding: From Theory to Implementation}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1206--1223}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3128232}, doi = {10.1109/JSAIT.2021.3128232}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/FadlallahOKCWG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GhoshKN21, author = {Suman Ghosh and Prasad Krishnan and Lakshmi Prasad Natarajan}, title = {Blind Updates in Coded Caching}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1253--1265}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126603}, doi = {10.1109/JSAIT.2021.3126603}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/GhoshKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GhoshMKMR21, author = {Avishek Ghosh and Raj Kumar Maity and Swanand Kadhe and Arya Mazumdar and Kannan Ramchandran}, title = {Communication-Efficient and Byzantine-Robust Distributed Learning With Error Feedback}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {942--953}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3105076}, doi = {10.1109/JSAIT.2021.3105076}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GhoshMKMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GhourchianSOS21, author = {Hamid Ghourchian and Photios A. Stavrou and Tobias J. Oechtering and Mikael Skoglund}, title = {Secure Block Source Coding With Sequential Encoding}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {32--48}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053629}, doi = {10.1109/JSAIT.2021.3053629}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GhourchianSOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GirgisDDKS21, author = {Antonious M. Girgis and Deepesh Data and Suhas N. Diggavi and Peter Kairouz and Ananda Theertha Suresh}, title = {Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {464--478}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3056102}, doi = {10.1109/JSAIT.2021.3056102}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GirgisDDKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GlasgowW21, author = {Margalit Glasgow and Mary Wootters}, title = {Approximate Gradient Coding With Optimal Decoding}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {855--866}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3100110}, doi = {10.1109/JSAIT.2021.3100110}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GlasgowW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GroverCUDAS21, author = {Pulkit Grover and Viveck R. Cadambe and Sennur Ulukus and Stark C. Draper and Salman Avestimehr and Osvaldo Simeone}, title = {Guest Editorial for Special Issue on Coded Computing}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {813}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3108024}, doi = {10.1109/JSAIT.2021.3108024}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GroverCUDAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GunluS21, author = {Onur G{\"{u}}nl{\"{u}} and Rafael F. Schaefer}, title = {Controllable Key Agreement With Correlated Noise}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {82--94}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054035}, doi = {10.1109/JSAIT.2021.3054035}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GunluS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GuoZT21, author = {Tao Guo and Ruida Zhou and Chao Tian}, title = {New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {403--414}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053217}, doi = {10.1109/JSAIT.2021.3053217}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GuoZT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/GuptaJY21, author = {Samarth Gupta and Gauri Joshi and Osman Yagan}, title = {Best-Arm Identification in Correlated Multi-Armed Bandits}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {549--563}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3082028}, doi = {10.1109/JSAIT.2021.3082028}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/GuptaJY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/HabibBK21, author = {Salman Habib and Allison Beemer and J{\"{o}}rg Kliewer}, title = {Belief Propagation Decoding of Short Graph-Based Channel Codes via Reinforcement Learning}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {627--640}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3073834}, doi = {10.1109/JSAIT.2021.3073834}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/HabibBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/HaghifamKKZTA21, author = {Mahdi Haghifam and M. Nikhil Krishnan and Ashish Khisti and Xiaoqing Zhu and Wai{-}Tian Tan and John G. Apostolopoulos}, title = {On Streaming Codes With Unequal Error Protection}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1165--1179}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126687}, doi = {10.1109/JSAIT.2021.3126687}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/HaghifamKKZTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/HannaEFD21, author = {Osama A. Hanna and Yahya H. Ezzeldin and Christina Fragouli and Suhas N. Diggavi}, title = {Quantization of Distributed Data for Learning}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {987--1001}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3105359}, doi = {10.1109/JSAIT.2021.3105359}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/HannaEFD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/HasirciogluGG21, author = {Burak Hasircioglu and Jes{\'{u}}s G{\'{o}}mez{-}Vilardeb{\'{o}} and Deniz G{\"{u}}nd{\"{u}}z}, title = {Bivariate Polynomial Coding for Efficient Distributed Matrix Multiplication}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {814--829}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3105365}, doi = {10.1109/JSAIT.2021.3105365}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/HasirciogluGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/HayashiC21, author = {Masahito Hayashi and Ning Cai}, title = {Secure Non-Linear Network Code Over a One-Hop Relay Network}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {296--305}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053697}, doi = {10.1109/JSAIT.2021.3053697}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/HayashiC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/HayashiWV21, author = {Masahito Hayashi and Tadashi Wadayama and {\'{A}}ngeles V{\'{a}}zquez{-}Castro}, title = {Secure Computation-and-Forward With Linear Codes}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {139--148}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054581}, doi = {10.1109/JSAIT.2021.3054581}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/HayashiWV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/HellstromD21, author = {Fredrik Hellstr{\"{o}}m and Giuseppe Durisi}, title = {Corrections to "Generalization Bounds via Information Density and Conditional Information Density"}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {1072--1073}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3088240}, doi = {10.1109/JSAIT.2021.3088240}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/HellstromD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/IbrahimZY21, author = {Abdelrahman M. Ibrahim and Ahmed A. Zewail and Aylin Yener}, title = {Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1240--1252}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3127435}, doi = {10.1109/JSAIT.2021.3127435}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/IbrahimZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/Jahani-NezhadM21, author = {Tayyebeh Jahani{-}Nezhad and Mohammad Ali Maddah{-}Ali}, title = {Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {1002--1011}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3085676}, doi = {10.1109/JSAIT.2021.3085676}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/Jahani-NezhadM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/JeongDCC21, author = {Haewon Jeong and Ateet Devulapalli and Viveck R. Cadambe and Fl{\'{a}}vio P. Calmon}, title = {{\unicode{1013}}-Approximate Coded Matrix Multiplication Is Nearly Twice as Efficient as Exact Multiplication}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {845--854}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3099811}, doi = {10.1109/JSAIT.2021.3099811}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/JeongDCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/KadheHSK21, author = {Swanand Kadhe and Anoosheh Heidarzadeh and Alex Sprintson and Onur Ozan Koyluoglu}, title = {Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {391--402}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053579}, doi = {10.1109/JSAIT.2021.3053579}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/KadheHSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/KhalesiMM21, author = {Ali Khalesi and Mahtab Mirmohseni and Mohammad Ali Maddah{-}Ali}, title = {The Capacity Region of Distributed Multi-User Secret Sharing}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {1057--1071}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3102967}, doi = {10.1109/JSAIT.2021.3102967}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/KhalesiMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/KrishnanHK21, author = {M. Nikhil Krishnan and Erfan Hosseini and Ashish Khisti}, title = {Coded Sequential Matrix Multiplication for Straggler Mitigation}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {830--844}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3104970}, doi = {10.1109/JSAIT.2021.3104970}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/KrishnanHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/KrishnanHK21a, author = {M. Nikhil Krishnan and Erfan Hosseini and Ashish Khisti}, title = {Sequential Gradient Coding for Packet-Loss Networks}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {919--930}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3102853}, doi = {10.1109/JSAIT.2021.3102853}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/KrishnanHK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/LalithaG21, author = {Anusha Lalitha and Andrea Goldsmith}, title = {Bayesian Algorithms for Decentralized Stochastic Bandits}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {564--583}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3080661}, doi = {10.1109/JSAIT.2021.3080661}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/LalithaG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/LanZ21, author = {Guanghui Lan and Yi Zhou}, title = {Asynchronous Decentralized Accelerated Stochastic Gradient Descent}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {802--811}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3080256}, doi = {10.1109/JSAIT.2021.3080256}, timestamp = {Sun, 19 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/LanZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/LiBJZ21, author = {Sijie Li and Rawad Bitar and Sidharth Jaggi and Yihan Zhang}, title = {Network Coding With Myopic Adversaries}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1108--1119}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126474}, doi = {10.1109/JSAIT.2021.3126474}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/LiBJZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/LinKRAY21, author = {Hsuan{-}Yin Lin and Siddhartha Kumar and Eirik Rosnes and Alexandre Graell i Amat and Eitan Yaakobi}, title = {The Capacity of Single-Server Weakly-Private Information Retrieval}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {415--427}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3056327}, doi = {10.1109/JSAIT.2021.3056327}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/LinKRAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/LuJJ21, author = {Yuxiang Lu and Zhuqing Jia and Syed Ali Jafar}, title = {Double Blind T-Private Information Retrieval}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {428--440}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053481}, doi = {10.1109/JSAIT.2021.3053481}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/LuJJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/MalakM21, author = {Derya Malak and Muriel M{\'{e}}dard}, title = {Function Load Balancing Over Networks}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {1041--1056}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3101762}, doi = {10.1109/JSAIT.2021.3101762}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/MalakM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/MitalKLG21, author = {Nitish Mital and Katina Kralevska and Cong Ling and Deniz G{\"{u}}nd{\"{u}}z}, title = {Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1093--1107}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126588}, doi = {10.1109/JSAIT.2021.3126588}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/MitalKLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/MukherjeeG21, author = {Manuj Mukherjee and Ran Gelles}, title = {Multiparty Interactive Coding Over Networks of Intersecting Broadcast Links}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1078--1092}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126422}, doi = {10.1109/JSAIT.2021.3126422}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/MukherjeeG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/NafeaY21, author = {Mohamed S. Nafea and Aylin Yener}, title = {Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type {II}}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {65--81}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054663}, doi = {10.1109/JSAIT.2021.3054663}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/NafeaY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/NikolakakisKSS21, author = {Konstantinos E. Nikolakakis and Dionysios S. Kalogerias and Or Sheffet and Anand D. Sarwate}, title = {Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {534--548}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3081525}, doi = {10.1109/JSAIT.2021.3081525}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/NikolakakisKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/OngVKY21, author = {Lawrence Ong and Badri N. Vellambi and J{\"{o}}rg Kliewer and Phee Lep Yeoh}, title = {A Code and Rate Equivalence Between Secure Network and Index Coding}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {106--120}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054847}, doi = {10.1109/JSAIT.2021.3054847}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/OngVKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/PoorBGOSSY21, author = {H. Vincent Poor and Matthieu R. Bloch and Onur G{\"{u}}nl{\"{u}} and Fr{\'{e}}d{\'{e}}rique E. Oggier and Lalitha Sankar and Rafael F. Schaefer and Aylin Yener}, title = {Editorial}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {3--4}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3060161}, doi = {10.1109/JSAIT.2021.3060161}, timestamp = {Mon, 12 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/PoorBGOSSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/PradhanHN21, author = {Asit Kumar Pradhan and Anoosheh Heidarzadeh and Krishna R. Narayanan}, title = {Factored {LT} and Factored Raptor Codes for Large-Scale Distributed Matrix Multiplication}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {893--906}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3103822}, doi = {10.1109/JSAIT.2021.3103822}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/PradhanHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/QiuYYW21, author = {Shuang Qiu and Zhuoran Yang and Jieping Ye and Zhaoran Wang}, title = {On Finite-Time Convergence of Actor-Critic Algorithm}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {652--664}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3078754}, doi = {10.1109/JSAIT.2021.3078754}, timestamp = {Wed, 27 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/QiuYYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/RahimiM21, author = {Ali Rahimi and Mohammad Ali Maddah{-}Ali}, title = {Multi-Party Proof Generation in QAP-Based zk-SNARKs}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {931--941}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3102267}, doi = {10.1109/JSAIT.2021.3102267}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/RahimiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/RassouliG21, author = {Borzoo Rassouli and Deniz G{\"{u}}nd{\"{u}}z}, title = {On Perfect Privacy}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {177--191}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053432}, doi = {10.1109/JSAIT.2021.3053432}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/RassouliG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ReddyK21, author = {Kota Srinivas Reddy and Nikhil Karamchandani}, title = {Structured Index Coding Problem and Multi-Access Coded Caching}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1266--1281}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126663}, doi = {10.1109/JSAIT.2021.3126663}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/ReddyK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/RovatsosMV21, author = {Georgios Rovatsos and George V. Moustakides and Venugopal V. Veeravalli}, title = {Quickest Detection of Moving Anomalies in Sensor Networks}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {762--773}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3076043}, doi = {10.1109/JSAIT.2021.3076043}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/RovatsosMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SahraeiMA21, author = {Saeid Sahraei and Mohammad Ali Maddah{-}Ali and Amir Salman Avestimehr}, title = {Interactive Verifiable Polynomial Evaluation}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {317--325}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054865}, doi = {10.1109/JSAIT.2021.3054865}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SahraeiMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SargunK21, author = {Deniz Sargun and Can Emre Koksal}, title = {Robust Change Detection via Information Projection}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {774--783}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3077855}, doi = {10.1109/JSAIT.2021.3077855}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SargunK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SharififarAS21, author = {Arman Sharififar and Neda Aboutorab and Parastoo Sadeghi}, title = {An Update-Based Maximum Column Distance Coding Scheme for Index Coding}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1282--1299}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3127146}, doi = {10.1109/JSAIT.2021.3127146}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/SharififarAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ShayovitzF21, author = {Shachar Shayovitz and Meir Feder}, title = {Universal Active Learning via Conditional Mutual Information Minimization}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {720--734}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3073842}, doi = {10.1109/JSAIT.2021.3073842}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ShayovitzF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ShekharGJ21, author = {Shubhanshu Shekhar and Mohammad Ghavamzadeh and Tara Javidi}, title = {Active Learning for Classification With Abstention}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {705--719}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3081433}, doi = {10.1109/JSAIT.2021.3081433}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/ShekharGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ShiS21, author = {Chengshuai Shi and Cong Shen}, title = {On No-Sensing Adversarial Multi-Player Multi-Armed Bandits With Collision Communications}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {515--533}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3076027}, doi = {10.1109/JSAIT.2021.3076027}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ShiS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ShinRR21, author = {Jaehyeok Shin and Aaditya Ramdas and Alessandro Rinaldo}, title = {Nonparametric Iterated-Logarithm Extensions of the Sequential Generalized Likelihood Ratio Test}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {691--704}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3081105}, doi = {10.1109/JSAIT.2021.3081105}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ShinRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ShiraniGE21, author = {Farhad Shirani and Siddharth Garg and Elza Erkip}, title = {A Concentration of Measure Approach to Correlated Graph Matching}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {338--351}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3056280}, doi = {10.1109/JSAIT.2021.3056280}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ShiraniGE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ShkelP21, author = {Yanina Y. Shkel and H. Vincent Poor}, title = {A Compression Perspective on Secrecy Measures}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {163--176}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3055692}, doi = {10.1109/JSAIT.2021.3055692}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ShkelP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SinghDGD21, author = {Navjot Singh and Deepesh Data and Jemin George and Suhas N. Diggavi}, title = {SQuARM-SGD: Communication-Efficient Momentum {SGD} for Decentralized Optimization}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {954--969}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3103920}, doi = {10.1109/JSAIT.2021.3103920}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SinghDGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SoGA21, author = {Jinhyun So and Basak G{\"{u}}ler and Amir Salman Avestimehr}, title = {CodedPrivateML: {A} Fast and Privacy-Preserving Framework for Distributed Machine Learning}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {441--451}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053220}, doi = {10.1109/JSAIT.2021.3053220}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SoGA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SoGA21a, author = {Jinhyun So and Basak G{\"{u}}ler and Amir Salman Avestimehr}, title = {Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {479--489}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3054610}, doi = {10.1109/JSAIT.2021.3054610}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SoGA21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SoleymaniAMA21, author = {Mahdi Soleymani and Ramy E. Ali and Hessam Mahdavifar and Amir Salman Avestimehr}, title = {List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {867--878}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3102956}, doi = {10.1109/JSAIT.2021.3102956}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SoleymaniAMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SoleymaniJM21, author = {Mahdi Soleymani and Mohammad Vahid Jamali and Hessam Mahdavifar}, title = {Coded Computing via Binary Linear Codes: Designs and Performance Limits}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {3}, pages = {879--892}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3103772}, doi = {10.1109/JSAIT.2021.3103772}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SoleymaniJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SoleymaniMA21, author = {Mahdi Soleymani and Hessam Mahdavifar and Amir Salman Avestimehr}, title = {Analog Lagrange Coded Computing}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {283--295}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3056377}, doi = {10.1109/JSAIT.2021.3056377}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SoleymaniMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/SongH21, author = {Seunghoan Song and Masahito Hayashi}, title = {Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {380--390}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053537}, doi = {10.1109/JSAIT.2021.3053537}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/SongH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/TahmasbiB21, author = {Mehrdad Tahmasbi and Matthieu R. Bloch}, title = {On Covert Quantum Sensing and the Benefits of Entanglement}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {352--365}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3056640}, doi = {10.1109/JSAIT.2021.3056640}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/TahmasbiB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/TanX21, author = {Vincent Y. F. Tan and Yao Xie}, title = {Editorial}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {492--493}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3086220}, doi = {10.1109/JSAIT.2021.3086220}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/TanX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/Vahid21, author = {Alireza Vahid}, title = {Topological Content Delivery With Feedback and Random Receiver Cache}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1180--1190}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126209}, doi = {10.1109/JSAIT.2021.3126209}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/Vahid21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/VahidLWL21, author = {Alireza Vahid and Shih{-}Chun Lin and I{-}Hsiang Wang and Yi{-}Chun Lai}, title = {Content Delivery Over Broadcast Erasure Channels With Distributed Random Cache}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1191--1205}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126622}, doi = {10.1109/JSAIT.2021.3126622}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/VahidLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/VialS21, author = {Daniel Vial and Vijay G. Subramanian}, title = {Empirical Policy Evaluation With Supergraphs}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {641--651}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3073257}, doi = {10.1109/JSAIT.2021.3073257}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/VialS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/Wang21, author = {Ligong Wang}, title = {Covert Communication Over the Poisson Channel}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {23--31}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053126}, doi = {10.1109/JSAIT.2021.3053126}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/WangBU21, author = {Zhusheng Wang and Karim Banawan and Sennur Ulukus}, title = {Multi-Party Private Set Intersection: An Information-Theoretic Approach}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {366--379}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3057597}, doi = {10.1109/JSAIT.2021.3057597}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/WangBU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/WangCHT21, author = {Hui Wang and Qingchun Chen and Qin Huang and Xiaohu Tang}, title = {Reliable Coded Caching Design Over Wireless Networks}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1224--1239}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126554}, doi = {10.1109/JSAIT.2021.3126554}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsait/WangCHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/XieX21, author = {Liyan Xie and Yao Xie}, title = {Sequential Change Detection by Optimal Weighted {\(\mathscr{l}\)}{\unicode{8322}} Divergence}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {747--761}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3072960}, doi = {10.1109/JSAIT.2021.3072960}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/XieX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/XieZXV21, author = {Liyan Xie and Shaofeng Zou and Yao Xie and Venugopal V. Veeravalli}, title = {Sequential (Quickest) Change Detection: Classical Results and New Directions}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {494--514}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3072962}, doi = {10.1109/JSAIT.2021.3072962}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/XieZXV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/YanT21, author = {Qifa Yan and Daniela Tuninetti}, title = {Fundamental Limits of Caching for Demand Privacy Against Colluding Users}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {192--207}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053372}, doi = {10.1109/JSAIT.2021.3053372}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/YanT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/YangA21, author = {Chien{-}Sheng Yang and Amir Salman Avestimehr}, title = {Coded Computing for Secure Boolean Computations}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {326--337}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3055341}, doi = {10.1109/JSAIT.2021.3055341}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/YangA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/YinNZYYC21, author = {Hoover H. F. Yin and Ka Hei Ng and Allen Z. Zhong and Raymond W. Yeung and Shenghao Yang and Ian Y. Y. Chan}, title = {Intrablock Interleaving for Batched Network Coding With Blockwise Adaptive Recoding}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1135--1149}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126647}, doi = {10.1109/JSAIT.2021.3126647}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/YinNZYYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/YinTNYWZ21, author = {Hoover H. F. Yin and Bin Tang and Ka Hei Ng and Shenghao Yang and Xishi Wang and Qiaoqiao Zhou}, title = {A Unified Adaptive Recoding Framework for Batched Network Coding}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {4}, pages = {1150--1164}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3126634}, doi = {10.1109/JSAIT.2021.3126634}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/YinTNYWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ZhangBWK21, author = {Junyu Zhang and Amrit Singh Bedi and Mengdi Wang and Alec Koppel}, title = {Cautious Reinforcement Learning via Distributional Risk in the Dual Domain}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {2}, pages = {611--626}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3081108}, doi = {10.1109/JSAIT.2021.3081108}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ZhangBWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/ZhouVOS21, author = {Linghui Zhou and Minh Thanh Vu and Tobias J. Oechtering and Mikael Skoglund}, title = {Two-Stage Biometric Identification Systems Without Privacy Leakage}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {223--239}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3053368}, doi = {10.1109/JSAIT.2021.3053368}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/ZhouVOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.