{"title":"IEEE Transactions on Information Theory Publication Information","authors":"","doi":"10.1109/TIT.2024.3493733","DOIUrl":"https://doi.org/10.1109/TIT.2024.3493733","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"C2-C2"},"PeriodicalIF":2.2,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10767145","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142753905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2024.3493737","DOIUrl":"https://doi.org/10.1109/TIT.2024.3493737","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"C3-C3"},"PeriodicalIF":2.2,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10767126","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Computation by Large-Alphabet Formulas in the Presence of Noise","authors":"Andrew K. Tan;Matthew H. Ho;Isaac L. Chuang","doi":"10.1109/TIT.2024.3486278","DOIUrl":"https://doi.org/10.1109/TIT.2024.3486278","url":null,"abstract":"We present two new positive results for reliable computation using formulas over physical alphabets of size \u0000<inline-formula> <tex-math>$q gt 2$ </tex-math></inline-formula>\u0000. First, we show that for logical alphabets of size \u0000<inline-formula> <tex-math>$ell = q$ </tex-math></inline-formula>\u0000 the threshold for denoising using gates subject to q-ary symmetric noise with error probability \u0000<inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula>\u0000 is strictly larger than that for Boolean computation, and we show that reliable computation is possible as long as signals remain distinguishable, i.e. \u0000<inline-formula> <tex-math>$epsilon lt (q - 1) / q$ </tex-math></inline-formula>\u0000, in the limit of large fan-in \u0000<inline-formula> <tex-math>$k rightarrow infty $ </tex-math></inline-formula>\u0000. We also determine the point at which generalized majority gates with bounded fan-in fail, and show in particular that reliable computation is possible for \u0000<inline-formula> <tex-math>$epsilon lt (q - 1) / (q (q + 1))$ </tex-math></inline-formula>\u0000 in the case of q prime and fan-in \u0000<inline-formula> <tex-math>$k = 3$ </tex-math></inline-formula>\u0000. Secondly, we provide an example where \u0000<inline-formula> <tex-math>$ell lt q$ </tex-math></inline-formula>\u0000, showing that reliable Boolean computation, \u0000<inline-formula> <tex-math>$ell = 2$ </tex-math></inline-formula>\u0000, can be performed using 2-input ternary, \u0000<inline-formula> <tex-math>$q = 3$ </tex-math></inline-formula>\u0000, logic gates subject to symmetric ternary noise of strength \u0000<inline-formula> <tex-math>$varepsilon lt 1/6$ </tex-math></inline-formula>\u0000 by using the additional alphabet element for error signaling.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"9152-9164"},"PeriodicalIF":2.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity Results for the Wiretapped Oblivious Transfer","authors":"Tianyou Pei;Wei Kang;Nan Liu","doi":"10.1109/TIT.2024.3487218","DOIUrl":"https://doi.org/10.1109/TIT.2024.3487218","url":null,"abstract":"In this paper, we study the problem of the 1-of-2 string oblivious transfer (OT) between Alice and Bob in the presence of a passive eavesdropper Eve. The eavesdropper Eve is not allowed to get any information about the private data of Alice or Bob. When Alice and Bob are honest-but-curious users, we propose a protocol that satisfies 1-private (neither Alice nor Bob colludes with Eve) OT requirements for the binary erasure symmetric broadcast channel, in which the channel provides dependent erasure patterns to Bob and Eve. We find that when the erasure probabilities of the channel are within a certain range, the derived lower and upper bounds on the wiretapped OT capacity meet. Our results generalize and improve upon the results on 1-private wiretapped OT capacity by Mishra et al. Finally, we propose a protocol for a larger class of wiretapped channels and derive a lower bound on the wiretapped OT capacity.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"9102-9122"},"PeriodicalIF":2.2,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2024.3477754","DOIUrl":"https://doi.org/10.1109/TIT.2024.3477754","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"C3-C3"},"PeriodicalIF":2.2,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10736190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Transactions on Information Theory Publication Information","authors":"","doi":"10.1109/TIT.2024.3477756","DOIUrl":"https://doi.org/10.1109/TIT.2024.3477756","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"C2-C2"},"PeriodicalIF":2.2,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10736189","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Recursive Construction for Projective Reed-Muller Codes","authors":"Rodrigo San-José","doi":"10.1109/TIT.2024.3483998","DOIUrl":"https://doi.org/10.1109/TIT.2024.3483998","url":null,"abstract":"We give a recursive construction for projective Reed-Muller codes in terms of affine Reed-Muller codes and projective Reed-Muller codes in fewer variables. From this construction, we obtain the dimension of the subfield subcodes of projective Reed-Muller codes for some particular degrees that give codes with good parameters. Moreover, from this recursive construction we derive a lower bound for the generalized Hamming weights of projective Reed-Muller codes which is sharp in most of the cases we have checked.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"8511-8523"},"PeriodicalIF":2.2,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142753849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterizations of the Minimum Weights of LCD Codes of Large Dimensions","authors":"Makoto Araya;Masaaki Harada;Keita Ishizuka;Yuto Tanaka","doi":"10.1109/TIT.2024.3483218","DOIUrl":"https://doi.org/10.1109/TIT.2024.3483218","url":null,"abstract":"We give new characterizations of the largest minimum weights among LCD codes of large dimensions. Using the characterizations, we completely determine the largest minimum weights among binary LCD codes of length n and dimension \u0000<inline-formula> <tex-math>$n-6$ </tex-math></inline-formula>\u0000, ternary LCD codes of length n and dimension \u0000<inline-formula> <tex-math>$n-5$ </tex-math></inline-formula>\u0000 and quaternary Hermitian LCD codes of length n and dimension \u0000<inline-formula> <tex-math>$n-4$ </tex-math></inline-formula>\u0000 for arbitrary n. We also determine the largest minimum weights among binary LCD codes of length n and dimension \u0000<inline-formula> <tex-math>$n-7$ </tex-math></inline-formula>\u0000, ternary LCD codes of length n and dimension \u0000<inline-formula> <tex-math>$n-6$ </tex-math></inline-formula>\u0000 and quaternary Hermitian LCD codes of length n and dimension \u0000<inline-formula> <tex-math>$n-5$ </tex-math></inline-formula>\u0000 with only some exceptions n.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"8758-8769"},"PeriodicalIF":2.2,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Universality in Block Dependent Linear Models With Applications to Nonlinear Regression","authors":"Samriddha Lahiry;Pragya Sur","doi":"10.1109/TIT.2024.3481956","DOIUrl":"https://doi.org/10.1109/TIT.2024.3481956","url":null,"abstract":"Over the past decade, characterizing the precise asymptotic risk of regularized estimators in high-dimensional regression has emerged as a prominent research area. This literature focuses on the proportional asymptotics regime, where the number of features and samples diverge proportionally. Much of this work assumes i.i.d. Gaussian entries in the design. Concurrently, researchers have explored the universality of these findings, discovering that results based on the i.i.d. Gaussian assumption extend to other settings, including i.i.d. sub-Gaussian designs. However, universality results examining dependent covariates have predominanatly focused on correlation-based dependence or structured forms of dependence allowed by right-rotationally-invariant designs. In this paper, we challenge this limitation by investigating dependence structures beyond these established classes. We identify a class of designs characterized by a block dependence structure where results based on i.i.d. Gaussian designs persist. Formally, we establish that the optimal values of regularized empirical risk and the risk associated with convex regularized estimators, such as the Lasso and the ridge, converge to the same limit under block-dependent designs as for i.i.d. Gaussian entry designs. Our dependence structure differs significantly from correlation-based dependence and enables, for the first time, asymptotically exact risk characterization in prevalent high-dimensional nonlinear regression problems.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"8975-9000"},"PeriodicalIF":2.2,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Local Landscape of Phase Retrieval Under Limited Samples","authors":"Kaizhao Liu;Zihao Wang;Lei Wu","doi":"10.1109/TIT.2024.3481269","DOIUrl":"https://doi.org/10.1109/TIT.2024.3481269","url":null,"abstract":"We present a fine-grained analysis of the local landscape of phase retrieval under the regime of limited samples. Specifically, we aim to ascertain the minimal sample size required to guarantee a benign local landscape surrounding global minima in high dimensions. Let n and d denote the sample size and input dimension, respectively. We first explore the local convexity and establish that when \u0000<inline-formula> <tex-math>$n=o(dlog d)$ </tex-math></inline-formula>\u0000, for almost every fixed point in the local ball, the Hessian matrix has negative eigenvalues, provided d is sufficiently large. We next consider the one-point convexity and show that, as long as \u0000<inline-formula> <tex-math>$n=omega (d)$ </tex-math></inline-formula>\u0000, with high probability, the landscape is one-point strongly convex in the local annulus: \u0000<inline-formula> <tex-math>${win mathbb {R}^{d}: o_{d}({1})leqslant |w-w^{*}|leqslant c}$ </tex-math></inline-formula>\u0000, where \u0000<inline-formula> <tex-math>$w^{*}$ </tex-math></inline-formula>\u0000 is the ground truth and c is an absolute constant. This implies that gradient descent, initialized from any point in this domain, can converge to an \u0000<inline-formula> <tex-math>$o_{d}({1})$ </tex-math></inline-formula>\u0000-loss solution exponentially fast. Furthermore, we show that when \u0000<inline-formula> <tex-math>$n=o(dlog d)$ </tex-math></inline-formula>\u0000, there is a radius of \u0000<inline-formula> <tex-math>$widetilde {Theta } left ({{sqrt {1/d}}}right)$ </tex-math></inline-formula>\u0000 such that one-point convexity breaks down in the corresponding smaller local ball. This indicates an impossibility to establish a convergence to the exact \u0000<inline-formula> <tex-math>$w^{*}$ </tex-math></inline-formula>\u0000 for gradient descent under limited samples by relying solely on one-point convexity.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"9012-9035"},"PeriodicalIF":2.2,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}