ITW'2025 logo
IEEE

Program

Monday, September 29

Monday, September 29 9:00 - 12:30

Tut01: Tutorial 1

Why Deep Neural Networks Extract Informative Feature: An Information Geometric View
Shao-Lun Huang (Tsinghua University Shenzhen Institute) and Lizhong Zheng (MIT)
Room 3
  • 09:00-10:30: Part 1
  • 10:30-11:00: COFFEE BREAK
  • 11:00-12:30: Part 2

Monday, September 29 9:00 - 12:30

Tut02: Tutorial 2

Information Theory in Molecular Communication: Channel Modeling and Analysis
Christian Deppe (TU Braunschweig), Johannes Rosenberger (TU München), and Marcel Mross (TU Braunschweig)
Room 2
  • 09:00-10:30: Part 1
  • 10:30-11:00: COFFEE BREAK
  • 11:00-12:30: Part 2

Monday, September 29 12:30 - 14:00

LUNCH (provided)

Monday, September 29 14:00 - 17:30

Tut03: Tutorial 3

Advances of Lattice Coding for Post-Quantum Cryptography
Shanxiang Lyu (Jinan University) and Ling Liu (Guangzhou Institute, Xidian University)
Room 3
  • 14:00-15:30: Part 1
  • 15:30-16:00: COFFEE BREAK
  • 16:00-17:30: Part 2

Monday, September 29 14:00 - 17:30

Tut04: Tutorial 4

Nanopore DNA sequencing: Coding and Information Theory
Adrian Vidal (Monash University, University of the Philippines Diliman), Brendon McBain (Monash University), and Emanuele Viterbo (Monash University)
Room 2
  • 14:00-15:30: Part 1
  • 15:30-16:00: COFFEE BREAK
  • 16:00-17:30: Part 2

Monday, September 29 18:00 - 20:00

Welcome Reception

The reception is included in the registration, and will be held at the Zeta Bar, Hilton Hotel, Sydney.

Tuesday, September 30

Tuesday, September 30 8:30 - 9:30

P1: Plenary: Wireless

Surprises in Network Information Theory
Professor Wei Yu
Rooms 3-4-5

Tuesday, September 30 9:40 - 12:50

TM1: Coding for 6G

Rooms 3-4-5
Chair: Yi Hong (Monash University, Australia)
9:40 Improved Successive Cancellation Decoding of Polar Codes Through Perturbing A Posteriori LLRs
Zhongjun Yang and Li Chen (Sun Yat-sen University, China); Kangjian Qin (Huawei Technologies, Co., Ltd., China); Xianbin Wang and Huazi Zhang (Huawei Technologies, Co. Ltd., China)
10:00 Rate-Matching Deep Polar Codes via Extension
Geon Choi and Namyoon Lee (POSTECH, Korea (South))
10:20 PAC Codes Meet CRC-Polar Codes
Xinyi Gu (University of New South Wales, Australia & UNSW, Australia); Mohammad Rowshan and Jinhong Yuan (University of New South Wales, Australia)
10:40 Bounds and Constructions of High-Memory Spatially-Coupled Codes
Lei Huang (Shandong University, China)
11:00 COFFEE BREAK
11:30 SCL^2 Decoding of eBCH Based U-UV Codes
Jingyu Lin and Li Chen (Sun Yat-sen University, China); Huazi Zhang (Huawei Technologies, Co. Ltd., China)
11:50 Polar Code Design for MIMO-OFDM with Channel Sparsity
Rongchi Xu and Tongzhou Yu (Xidian University, China); Shuangyang Li (Technical University of Berlin, Germany); Xiaoyan Zhu and Baoming Bai (Xidian University, China)
12:10 Half Spatially Coupled Turbo-Like Codes
Xiaowei Wu (Technology and Engineering Center for Space Utilization Chinese Academy of Sciences, China); Lei Yang (University of Chinese Academy of Sciences, China); Min Qiu and Chong Han (Shanghai Jiao Tong University, China); Jinhong Yuan (University of New South Wales, Australia)
12:30 On the Convergence Speed of Spatially Coupled LDPC Ensembles Under Window Decoding
QingQing Peng, Dongxu Chang and Guanghui Wang (Shandong University, China); Guiying Yan (Chinese Academy of Sciences, China)

Tuesday, September 30 9:40 - 12:50

TM2: Combinatorics and Information Theory

Room 1
Chair: Yoshinari Takeishi (Kyushu University, Japan)
9:40 Optimal tables for asymmetric numeral systems
Raphael S. Steiner and Mirko De Vita (Huawei Research Center Zurich, Switzerland); Endri Bezati (Huawei, Switzerland & EPFL, Switzerland)
10:00 Entropy Vectors on a Four-dimensional Face of \(Gamma_3\)
Robert Lewis, Sina Eghbal and Badri N Vellambi (University of Cincinnati, USA); Satyajit Thakor (Indian Institute of Technology Mandi, India)
10:20 On the Intersections of \(q\)-ary Hamming Balls
Ville Junnila, Tero K Laihonen, Tuomo Lehtilä and Pavan Padavu Devaraj (University of Turku, Finland)
10:40 Understanding the Ratio of the Partition Sum to its Bethe Approximation via Double Covers
Pascal Vontobel (The Chinese University of Hong Kong, Hong Kong)
11:00 COFFEE BREAK
11:30 Group Testing under Correlation: Leveraging Inference for High Infection Scenarios
MohammadHesam NikpeySalekde, Dominic Olaguera-Delogu, Saswati Sarkar and Shirin Saeedi Bidokhti (University of Pennsylvania, USA)
11:50 The Labeled Coupon Collector Problem
Andrew Tan (University of California, San Diego & CMRR STAR, USA); Oriel Limor (Technion - Israel Institute of Technology, Israel); Daniella Bar-Lev (University of California, San Diego, USA); Ryan Gabrys (Naval Information Warfare Center Pacific, USA); Zohar Yakhini (Reichman University, Israel); Paul H. Siegel (University of California, San Diego, USA)
12:10 Single-Letter Mismatched Decoding Rates with Memory for the Gilbert-Elliott Channel
Yutong Han (Technical University of Munich, Germany); Albert Guillén i Fàbregas (University of Cambridge, United Kingdom (Great Britain) & Universitat Politècnica de Catalunya, Spain)

Tuesday, September 30 9:40 - 12:50

TM3: Network Information Theory

Room 2
Chair: Oliver Kosut (Arizona State University, USA)
9:40 Uniquely-Decodable Coding for Network Function Computation
Xuan Guang and Jihang Yang (Nankai University, China); Ruze Zhang (The Chinese University of Hong Kong, Hong Kong)
10:00 Towards a Compositional Theory of Channels that Preserve Functions
Johannes Rosenberger (Technical University of Munich, Germany); Holger Boche (Technical University Munich, Germany); Juan A. Cabrera (Technische Universität Dresden, Germany); Christian Deppe (Technical University of Braunschweig, Germany)
10:20 Rate Region of Semantic-Aware Quadratic Gaussian Two-Terminal Source Coding Problem
Haoyu Sun, Yinfei Xu, Chunguo Li and Tao Guo (Southeast University, China); Wenyi Zhang (University of Science and Technology of China, China)
10:40 Optimal Feedback Schemes for Dirty Paper Channels With State Estimation at the Receiver
Dengfeng Xia, Han Deng and Haonan Zhang (Southwest Jiaotong University, China); Fan Cheng (East China Normal University, China); Bin Dai (Southwest Jiaotong University, China); Liuguo Yin (Tsinghua University, China)
11:00 COFFEE BREAK
11:30 Capacity-Key Tradeoff in Covert Communication
Abdelaziz Bounhar (Télécom Paris, France); Mireille Sarkiss (Telecom SudParis, France); Michele Wigger (Telecom Paris, France)
11:50 Secure Broadcasting under Unreliable Cooperation
Abdalla Ibrahim (Technische Universität München, Germany); Johannes Rosenberger (Technical University of Munich, Germany); Holger Boche (Technical University Munich, Germany); Christian Deppe (Technical University of Braunschweig, Germany)
12:10 A Dichotomy for Distributed Detection With Limited Communication
Abdelaziz Bounhar (Télécom Paris, France); Mireille Sarkiss (Telecom SudParis, France); Michele Wigger (Telecom Paris, France)

Tuesday, September 30 12:50 - 14:10

LUNCH (provided)

Tuesday, September 30 14:10 - 17:20

TA1: Wireless Communication and Networks

Rooms 3-4-5
Chair: Matthieu R. Bloch (Georgia Institute of Technology, USA)
14:10 A New Soft-Decision Decoding for Extended BCH Codes Based on Reed-Muller Decomposition
Leilei Yu, Jiasheng Yuan and Yunghsiang Sam Han (University of Electronic Science and Technology of China, China); Qi Cheng (Anhui Agricultural University, China); Chao Chen (Xidian University, China)
14:30 Downlink Cell-Free MIMO using Distributed Integer-forcing
Xinzhe Qiu (BUAA, China); Tao Yang (Beihang University, China)
14:50 Discrete Age Analysis of Ber/G/1/1 Queues: Exact Expressions and Optimization
Han Xu (The Chinese University of Hong Kong, Hong Kong); Jixiang Zhang (Wuxi Taihu University, China); Haoyu Sun (Southeast University, China); Daming Cao (Nanjing University of Information Science and Technology, China); Yinfei Xu (Southeast University, China)
15:10 On Design and Analysis of Asynchronous Repetition Slotted ALOHA for Massive Access
Xu Li (Beihang University & Pengcheng Laboratory, China); Tao Yang (Beihang University, China); Xiaojun Yuan (University of Electronic Science and Technology of China, China); Rong Ke Liu (Beihang University, China); Fan Jiang (Pengcheng Laboratory, China)
15:30 COFFEE BREAK
16:00 Coding for Quasi-Static Fading Channel with Imperfect CSI at the Transmitter and Quantized Feedback
Yuhan Yang, Mei Han and Haonan Zhang (Southwest Jiaotong University, China); Haoheng Yuan (Kunming University of Science and Technology, China); Fan Cheng (East China Normal University, China); Bin Dai (Southwest Jiaotong University, China)
16:20 Structured Estimators: A New Perspective on Information Freshness
Sahan Liyanaarachchi and Sennur Ulukus (University of Maryland, USA); Nail Akar (Bilkent University, Turkey)
16:40 Achievable Rates for State-Dependent Discrete Memoryless Channels Under Coded Sensing
Omkar Mujumdar (University of Notre Dame, USA); Wenyi Zhang (University of Science and Technology of China, China); J. Nicholas Laneman (University of Notre Dame, USA)

Tuesday, September 30 14:10 - 17:20

TA2: Source Coding

Room 1
Chair: Zitan Chen (CUHK-Shenzhen, China)
14:10 RDD Function: A Tradeoff Between Rate and Distortion-in-Distortion
Lingyi Chen and Haoran Tang (Tsinghua University, China); Shitong Wu (Tsinghua University, China & Huawei Technologies Co. Ltd., China); Jiakun Liu (University of Science and Technology of China, China); Huihui Wu (Ningbo Institute of Digital Twin, China); Wenyi Zhang (University of Science and Technology of China, China); Hao Wu (Tsinghua University, China)
14:30 Estimating Rate-Distortion Functions Using the Energy-Based Model
Shitong Wu (Tsinghua University, China & Huawei Technologies Co. Ltd., China); Sicheng Xu and Lingyi Chen (Tsinghua University, China); Huihui Wu (Ningbo Institute of Digital Twin, China); Wenyi Zhang (University of Science and Technology of China, China)
14:50 Universal Rate-Distortion-Classification Representations for Lossy Compression
Nam Nguyen (Oregon State University, USA); Thuan Nguyen (East Tennessee State University, USA); Thinh Nguyen (Oregon State, USA); Bella Bose (Oregon State University, USA)
15:10 Improved Lossless Compression based on Polar Codes
Ling Liu (Xidian University, China); Jin Wang (ShenZhen University, China); Chao Chen (Xidian University, China); Lulu Ding (ShenZhen University, China); Zexuan Zhu (Shenzhen University, China); Baoming Bai (Xidian University, China)
15:30 Coffee break
16:00 Non-Asymptotic Achievable Rate-Distortion Region for Indirect Wyner-Ziv Source Coding
Jiahui Wei (University of Granada, Spain); Philippe Mary (Univ Rennes, INSA, CNRS, IETR, France); Elsa Dupraz (IMT Atlantique, France)
16:20 Round-Preserving Asymptotic Compression of Prior-Free Interactive Protocols
Gurleen Padda and Dave Touchette (Université de Sherbrooke, Canada)
16:40 Fundamental Limits on Overflow Probability for Variable-Length Codes with Codeword Cost: A Smooth Renyi Entropy Approach
Ryo Nomura (Waseda University, Japan)
17:00 On Distributionally Robust Lossy Source Coding
Giuseppe Serra (EURECOM, France & Sorbonne Université, France); Photios A. Stavrou (EURECOM, France); Marios Kountouris (University of Granada, Spain & EURECOM, France)

Tuesday, September 30 14:10 - 17:20

TA3: Privacy

Room 2
Chair: Boulat A. Bash (University of Arizona, USA)
14:10 An Information Geometric Approach to Local Information Privacy with Applications to Max-lift and Local Differential Privacy
Amirreza Zamani (KTH Royal Institute of Technology, Sweden); Parastoo Sadeghi (University of New South Wales, Australia); Mikael Skoglund (KTH Royal Institute of Technology, Sweden)
14:30 Necessity of Block Designs for Optimal Locally Private Distribution Estimation
Abigail Gentle (The University of Sydney, Australia)
14:50 Between Close Enough to Reveal and Far Enough to Protect: a New Privacy Region for Correlated Data
Luis Maßny and Rawad Bitar (Technical University of Munich, Germany); Fangwei Ye (Nanjing University of Aeronautics and Astronautics, China); Salim El Rouayheb (Rutgers University, USA)
15:10 Optimizing Privacy-Utility Trade-off in Decentralized Learning with Generalized Correlated Noise
Angelo Rodio, Zheng Chen and Erik G. Larsson (Linköping University, Sweden)
15:30 Coffee break
16:00 Reveal-or-Obscure: A Differentially Private Sampling Algorithm for Discrete Distributions
Naima Tasnim, Atefeh Gilani, Lalitha Sankar and Oliver Kosut (Arizona State University, USA)
16:20 Source Anonymity for Private Random Walk Decentralized Learning
Maximilian Egger (Technical University of Munich, Germany); Svenja Lage (German Aerospace Center (DLR), Germany); Rawad Bitar (Technical University of Munich, Germany); Antonia Wachter-Zeh (Technical University of Munich (TUM), Germany)
16:40 Perfectly-Private Analog Secure Aggregation in Federated Learning
Delio Jaramillo-Velez (Chalmers University of Technology, Sweden); Charul Rajput (IIIT Hyderabad, India); Ragnar Freij-Hollanti and Camilla Hollanti (Aalto University, Finland); Alexandre Graell i Amat (Chalmers University of Technology, Sweden)
17:00 Efficient Machine Unlearning by Model Splitting and Core Sample Selection
Maximilian Egger and Rawad Bitar (Technical University of Munich, Germany); Ruediger L Urbanke (EPFL, Switzerland)

Wednesday, October 1

Wednesday, October 1 8:30 - 9:30

P2: Plenary: Quantum

Non-additivity of quantum channel capacity
Professor Debbie Leung
Rooms 3-4-5

Wednesday, October 1 9:40 - 12:50

WM1: Quantum 1

Rooms 3-4-5
Chair: Biao Chen (Syracuse University, USA)
9:40 A Simple Derivation of The Refined Sphere-Packing Bound for Classical-Quantum Channels
Bo-An Shi and Hao-Chung Cheng (National Taiwan University, Taiwan)
10:00 On the Error Exponent Distribution of Code Ensembles over Classical-Quantum Channels
Giuseppe Cocco and Javier R. Fonollosa (Universitat Politècnica de Catalunya, Spain)
10:20 Bounds in the Projective Unitary Group with Respect to Global Phase Invariant Distance
Bhanu Pratap Yadav, Mahdi Bayanifar and Olav Tirkkonen (Aalto University, Finland)
10:40 On two-point rational AG codes with Hermitian hull dimension lower bounded
Lin Sok (Nanyang Technological University, Singapore); San Ling (NTU, Singapore)
11:00 COFFEE BREAK
11:30 Interpolation of Quantum Polar Codes and Quantum Reed-Muller Codes
Keita Hidaka (The University of Tokyo, Japan); Dina Abdelhadi and Ruediger L Urbanke (EPFL, Switzerland)
11:50 Data Transmission over a Bosonic Arbitrarily Varying Quantum Channel
Janis Nötzel (Technische Universität München, Germany); Florian Seitz (Technical University of Munich, Germany)
12:10 On the Interference Channel with Entangled Transmitters
Hadi Aghaee (Technische Universität Braunschweig, Germany); Christian Deppe (Technical University of Braunschweig, Germany)
12:30 A General Construction of the Transfer Matrices of $(k, N+t)$-Sum Boxes
Martianus Frederic Ezerman (Nanyang Technological University, Singapore); Gaojun Luo (Nanjing University of Aeronautics and Astronautics, China); Jihao Fan (Nanjing University of Science and Technology, China); Meng Cao (Beijing Institute of Mathematical Sciences and Applications, China)

Wednesday, October 1 9:40 - 12:50

WM2: Communication Theory

Room 1
Chair: Luca Barletta (Politecnico di Milano, Italy)
9:40 The Second-Order Coding Rate of Identification via Simple-Dispersion DMCs with Feedback
Marcel A. Mross, Christian Deppe and Eduard A Jorswieck (Technische Universität Braunschweig, Germany)
10:00 Global and Efficient Local Optimization for Movable Antenna Enabled ISAC
Lebin Chen, Ming-Min Zhao, Min Li, Ming Lei and Minjian Zhao (Zhejiang University, China); Rui Zhang (National University of Singapore, Singapore)
10:20 Information Freshness in Dynamic Gossip Networks
Arunabh Srivastava, Thomas Jacob Maranzatto and Sennur Ulukus (University of Maryland, USA)
10:40 Rate-Reliability Region of Sequential Beam Alignment and Communication
Sidong Guo and Matthieu R. Bloch (Georgia Institute of Technology, USA)
11:00 COFFEE BREAK
11:30 Communication via Sensing
Mohammad Kazemi (Imperial College London, United Kingdom (Great Britain)); Tolga M Duman (Bilkent University, Turkey); Deniz Gündüz (Imperial College London, United Kingdom (Great Britain))
11:50 On Universal Decoding over Discrete Additive Channels by Noise Guessing
Henrique K. Miyamoto (Université Paris-Saclay, France); Sheng Yang (CentraleSupelec, France)
12:10 Characterization of Deletion/Substitution Channel Capacity for Small Deletion and Substitution Probabilities
Mohammad Kazemi (Imperial College London, United Kingdom (Great Britain)); Tolga M Duman (Bilkent University, Turkey)

Wednesday, October 1 9:40 - 12:50

WM3: Coding Theory for Biology and DNA Storage

Room 2
Chair: Emanuele Viterbo (Monash University, Australia)
9:40 Correcting Errors in Composite DNA: Channel Model and Code Design
Chen Wang (Technion, Israel); Thanh Tuan Nguyen and Kui Cai (Singapore University of Technology and Design, Singapore); Yiwei Zhang (Shandong University, China)
10:00 On Levenshtein's Reconstruction Problem for Channels with Unique Insertion Error Patterns
Ville Junnila, Tero K Laihonen, Tuomo Lehtilä and Pavan Padavu Devaraj (University of Turku, Finland)
10:20 A Converse For the Capacity of the Shotgun Sequencing Channel with Erasures
Mohammed Ihsan Ali (IIIT Hyderabad, India); Hrishi Narayanan (Technical University of Munich (TUM), Germany); Prasad Krishnan (IIIT Hyderabad, India)
10:40 Identification over Affine Poisson Channels: Application to Molecular Mixture Communication Systems
Mohammad Javad Salariseddigh and Heinz Koeppl (Technical University of Darmstadt, Germany); Holger Boche (Technical University Munich, Germany); Vahid Jamali (Technical University of Darmstadt, Germany)
11:00 COFFEE BREAK
11:30 On Achievable Rates Over Noisy Nanopore Channels
V. Arvind Rameshwar (IIT Madras, India); Nir Weinberger (Technion, Israel)
11:50 Two-deletion correcting codes for nanopore sequencing
Huiling Xie (The Chinese University of Hong Kong, Shenzhen, China); Zitan Chen (CUHK-Shenzhen, China)

Wednesday, October 1 12:50 - 14:10

LUNCH (provided)

Thursday, October 2

Thursday, October 2 8:30 - 9:30

P3: Plenary: Information Theory and AI

Towards improving LLM English perplexity
Professor Alon Orlitsky
Rooms 3-4-5

Over the past decade there has been a significant effort to improve Large Language Models (LLMs) performance. The fundamental aspect of training LLMs is next-word prediction over a large corpus as measured by the resulting perplexity. Models with lower perplexity consistently improve performance across a variety of downstream tasks including reasoning, coding, and question-answering. In this talk we review existing perplexity-reduction approaches, and show how information-theoretic, syntactical, statistical, and diversification-based techniques may help further reduce the LLM perplexity for the common WikiText-103 benchmark.

Thursday, October 2 9:40 - 12:50

ThM1: Information Theory in ML

Rooms 3-4-5
Chair: Jingge Zhu (University of Melbourne, Australia)
9:40 The Bandit Channel
Raymond Zhang (CentraleSupélec, Université Paris-Saclay, CNRS, France & Laboratoire des Signaux et Systèmes, France); Richard Combes (Laboratoire des Signaux et Systèmes, CentraleSupélec, Université Paris-Saclay, France); Sheng Yang (CentraleSupelec, France)
10:00 Information-Theoretic Minimax Regret Upper Bounds for Reinforcement Learning Problems
Raghav Bongole (KTH Royal Institute of Technology, Sweden); Amaury Gouverneur (KTH, Sweden); Tobias J. Oechtering and Mikael Skoglund (KTH Royal Institute of Technology, Sweden)
10:20 Incomplete Multiview Learning via Wyner Common Information
Abd Al-Rahman Odeh, Teng-Hui Huang and Hesham El Gamal (University of Sydney, Australia)
10:40 A DPI-PAC-Bayesian Framework for Generalization Bounds
Muhan Guan (University of Melbourne); Farhad Farokhi and Jingge Zhu (University of Melbourne, Australia)
11:00 COFFEE BREAK
11:30 The Role of Rank in Mismatched Low-Rank Symmetric Matrix Estimation
Panpan Niu, YuHao Liu, Teng Fu, Jie Fan, Chaowen Deng and Zhongyi Huang (Tsinghua University, China)
11:50 Generalized Dual Discriminator GANs
Naga Chandana Penukonda and Tejas Srivastava (IIIT Hyderabad, India); Gowtham R. Kurri (International Institute of Information Technology, Hyderabad, India); V. Lalitha (IIIT Hyderabad, India)
12:10 Dynamical Linear Reward Systems under Competitive Horizon Criteria
Mor Nahum (The Hebrew University of Jerusalem, Israel); Oron Sabag (Hebrew University of Jerusalem, Israel); Michael Langberg (State University of New York at Buffalo, USA)
12:30 A Decoder with Reinforcement Learning Feedback
Milad Taghipour and Bane Vasic (University of Arizona, USA)

Thursday, October 2 9:40 - 12:50

ThM2: Security 1

Room 1
Chair: Amirreza Zamani (KTH Royal Institute of Technology, Sweden)
9:40 Private Aggregation for Byzantine-Resilient Heterogeneous Federated Learning
Maximilian Egger and Rawad Bitar (Technical University of Munich, Germany)
10:00 Collusion-Resilient Hierarchical Secure Aggregation with Heterogeneous Security Constraints
Zhou Li (Guangxi University, China); Xiang Zhang (Technical University of Berlin, Germany); Jiawen Lv (Guangxi University, China); Jihao Fan (School of Computer Science and Engineering, Southeast University & Nanjing Institute of Technology, China); Haiqiang Chen (Guangxi University, China); Giuseppe Caire (Technische Universität Berlin, Germany)
10:20 Covert Computation over Gaussian Multiple-Access Channel with Feedback
Sheng Su, Yuhan Yang and Han Deng (Southwest Jiaotong University, China); Fan Cheng (East China Normal University, China); Bin Dai (Southwest Jiaotong University, China); Liuguo Yin (Tsinghua University, China)
10:40 Capacity Region for Covert Secret Key Generation over Multiple Access Channels
Yingxin Zhang (Beihang University, China); Lin Zhou (Southern University of Science and Technology, China); Qiaosheng Zhang (Shanghai Artificial Intelligence Laboratory, China)
11:00 COFFEE BREAK
11:30 Secret key generation and Storage based on QPUF
Kumar Nilesh (Technical University of Munich, Germany); Christian Deppe (Technical University of Braunschweig, Germany); Holger Boche (Technical University Munich, Germany)
11:50 An Efficient Hybrid Key Exchange Mechanism
Benjamin D Kim (University of Illinois Urbana-Champaign); Vipindev Adat Vasudevan (Massachusetts Institute of Technology, USA); Alejandro Cohen (Technion, Israel); Rafael D'Oliveira (Clemson University, USA); Thomas Stahlbuhk (MIT Lincoln Laboratory, USA); Muriel Médard (MIT, USA)
12:10 A Monoid Ring Approach to Color Visual Cryptography
Maximilian Reif and Jens Zumbrägel (University of Passau, Germany)
12:30 On the Size of a Share for Non-perfect Secret Sharing Schemes
Maki Yoshida (National Institute of Information and Communications Technology, Japan)

Thursday, October 2 9:40 - 12:50

ThM3: Quantum 2

Room 2
Chair: Mahdi Bayanifar (Aalto University, Finland)
9:40 Towards Quantum Universal Hypothesis Testing
Arick Grootveld, Haodong Yang, Biao Chen, Venkata Gandikota and Jason Pollack (Syracuse University, USA)
10:00 Quickest Change-point Detection With Continuous-Variable Quantum States
Tiju Cherian John (BITS Pilani K K Birla Goa Campus, India); Christos Gagatsos and Boulat A. Bash (University of Arizona, USA)
10:20 An Efficient Alternating Minimization Algorithm for Computing Quantum Rate-Distortion Function
Lingyi Chen and Deheng Yuan (Tsinghua University, China); Wenyi Zhang (University of Science and Technology of China, China); Hao Wu (Tsinghua University, China); Huihui Wu (Ningbo Institute of Digital Twin, China)
10:40 Empirical Coordination of Quantum Correlations
Husein Natur and Uzi Pereg (Technion, Israel)
11:00 COFFEE BREAK
11:30 A Fast Parallel Decoder for LDPC Codes Suitable for Burst Errors in QKD Reconciliation
Duarte C Mateus (INESC-ID / FCUL University of Lisbon, Portugal); Ricardo Jorge Fernandes Chaves (IST - TULisbon/INESC-ID, Portugal)
11:50 On Finite-Blocklength Noisy Classical-Quantum Channel Coding With Amplitude Damping Errors
Tamás Havas (Simula UiB, Norway & University of Bergen, Norway); Hsuan-Yin Lin and Eirik Rosnes (Simula UiB, Norway); Ching-Yi Lai (National Yang Ming Chiao Tung University, Taiwan)
12:10 Entanglement-Assisted Coding for Arbitrary Linear Computations Over a Quantum MAC
Lei Hu, Mohamed Nomeir, Alptug Aytekin, Yu Shi, Sennur Ulukus and Saikat Guha (University of Maryland, USA)
12:30 An Improved Decimation Technique for Erasure Decoding of Quantum LDPC Codes
Gayathri R, Shobhit Bhatnagar and Abhinav Vaishya (Indian Institute of Science, India); P Vijay Kumar (Indian Institute of Science, Bengaluru, India)

Thursday, October 2 12:50 - 14:10

LUNCH (provided)

Thursday, October 2 14:10 - 17:20

ThA1: Compressed Sensing and Statistics

Rooms 3-4-5
Chair: Tara Javidi (UCSD, USA)
14:10 Optimal Non-Adaptive Group Testing with One-Sided Error Guarantees
Daniel McMorrow and Jonathan Scarlett (National University of Singapore, Singapore)
14:30 Minimax Data Sanitization with Distortion Constraint and Adversarial Inference
Amirarsalan Moatazedian and Yauhen Yakimenka (New Jersey Institute of Technology, USA); Remi A Chou (University of Texas at Arlington, USA); Joerg Kliewer (New Jersey Institute of Technology, USA)
14:50 Efficient Algorithm for Sparse Fourier Transform of Generalized \(q\)-ary Functions
Darin Tsui, Kunal Talreja and Amirali Aghazadeh (Georgia Institute of Technology, USA)
15:10 Noisy Bilinear Low-Rank Matrix Sketching
Wenbin Wang, Xindi Ping, Cheng Cheng and Ziping Zhao (ShanghaiTech University, China)
15:30 COFFEE BREAK
16:00 Polynomial Representation of Entropic Structures in Markov chain
Shihan Huang and Laigang Guo (Beijing Normal University, China)
16:20 Typicality with Feedback
Thomas Sturma (Télécom Paris, France); Michele Wigger (Telecom Paris, France)

Thursday, October 2 14:10 - 17:20

ThA2: Coding Theory 1

Room 1
Chair: Jinhong Yuan (University of New South Wales, Australia)
14:10 BiD Codes: Algebraic Codes from 3 x 3 Kernel
Anirudh Dash (Indian Institute of Technology, Hyderabad (IITH), India); K. R. Nandakishore (IIT Hyderabad, India); Lakshmi Prasad Natarajan (Indian Institute of Technology Hyderabad, India); Prasad Krishnan (IIIT Hyderabad, India)
14:30 On the Derivative Structure of Euclidean Geometry Codes
Jialong Leng, Chao Chen, Ling Liu, Baoming Bai and Xiaotian Wang (Xidian University, China)
14:50 Perturbed Derivative Decoding Based on Ordered Statistics for Cyclic Codes
Qin Huang and Shuyan Yu (Beihang University, China)
15:10 Efficient Construction of MRD Codes Based on Circular-Shift Operations
Zhe Zhai, Sheng Jin and Qifu T Sun (University of Science and Technology Beijing, China); Zongpeng Li (Tsinghua University, China)
15:30 COFFEE BREAK
16:00 Improving Smoothness in Huffman Coding: Canonical and Pre-allocated Variations
Haoxuan Luo and Farzad Farnoud (University of Virginia, USA)
16:20 Grid-like Error-Correcting Codes for Matrix Multiplication with Better Correcting Capability
Hao Shi, Zhengyi Jiang and Zhongyi Huang (Tsinghua University, China); Bo Bai (Huawei Technologies Co., Ltd., Hong Kong); Gong Zhang (Huawei Technologies Co., Ltd., China); Hanxu Hou (Huawei Technology Limited Company, Hong Kong)
16:40 Non-Binary Polar Coded Quantization for Lossy Source Coding
Wenwen Zheng (BeiHang University, China); Tianbo Zhang and Tao Yang (Beihang University, China)

Thursday, October 2 14:10 - 17:20

ThA3: Networks

Room 2
Chair: Ming-Min Zhao (Zhejiang University, China)
14:10 Secrecy and Privacy in Multi-Access Coded Caching with Combinatorial Topology
Mallikharjuna Chinnapadamala and B. Sundar Rajan (Indian Institute of Science, India)
14:30 On Hierarchical Coded Caching with Offline Users
Rashid Ummer N T (Indian Institute of Science, India); Charul Rajput (IIIT Hyderabad, India); B. Sundar Rajan (Indian Institute of Science, India)
14:50 Strong Converse for Distributed Source Encryption under Standard Mutual Information
Yasutada Oohama and Bagus Santoso (The University of Electro-Communications, Japan)
15:10 Meta-Transfer Learning-based Few-Shot Data Detection for Resistive Memory Channels
Zhen Mei and Minghui Ju (Nanjing University of Science and Technology, China); Kui Cai (Singapore University of Technology and Design, Singapore); Guanghui Song (Xidian University, China); Xingwei Zhong (ST Engineering, Singapore); Long Shi (Nanjing University of Science and Technology, China); Thanh Tuan Nguyen (Singapore University of Technology and Design, Singapore)
15:30 COFFEE BREAK
16:00 Latency-Optimal File Assignment in Geo-Distributed Storage with Preferential Demands
Srivathsa Acharya (Indian Institute of Science, India); P Vijay Kumar (Indian Institute of Science, Bengaluru, India); Viveck Cadambe (Georgia Institute of Technology, USA)
16:20 New Construction of Matrix Representation of Finite Fields and Its Application to Linear Codes
Sheng Jin, Zhe Zhai and Qifu T Sun (University of Science and Technology Beijing, China); Zongpeng Li (Tsinghua University, China)
16:40 Communication-Constrained Private Decentralized Online Personalized Mean Estimation
Yauhen Yakimenka (New Jersey Institute of Technology, USA); Hsuan-Yin Lin and Eirik Rosnes (Simula UiB, Norway); Joerg Kliewer (New Jersey Institute of Technology, USA)
17:00 Learning to Write on Dirty Paper
Ezgi Ozyilkan, Oguzhan Kubilay Ulger and Elza Erkip (New York University, USA)

Thursday, October 2 18:30 - 21:30

Banquet

The banquet dinner is included in the registration, and will be held at the Stateroom, Hilton Hotel, Sydney.

Friday, October 3

Friday, October 3 8:30 - 9:30

P4: Plenary: Coding

Algebra Remains a Cradle for Improving Codes
Professor Li Chen
Rooms 3-4-5

Friday, October 3 9:40 - 12:50

FM1: Coding for Communication and Storage

Rooms 3-4-5
Chair: Joerg Kliewer (New Jersey Institute of Technology, USA)
9:40 Robust Dynamic Coded Distributed Storage with Partially Storage Constrained Servers
Chen Zhao, Haobo Jia and Zhuqing Jia (Beijing University of Posts and Telecommunications, China)
10:00 Asymptotically Optimal Repair of Reed-Solomon Codes with Small Sub-Packetization under Rack-Aware Model
Ke Wang (IEIT SYSTEMS Co. Ltd., China); Zhongyan Liu (Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing, China); Rengang Li (Inspur Electronic Information Industry Co, China); Yaqian Zhao and Yaqiang Zhang (Inspur (Beijing) Electronic Information Industry Co., Ltd., China)
10:20 Minimum Distance Decoding for Reed-Muller Codes using Projection-Aggregation
Bin Zhang and Qin Huang (Beihang University, China)
10:40 Improved Coded Caching Scheme for Multi-User Information Retrieval System
Junyi Wang and Quan Zang (Guilin University of Electronic Technology, China); Jinyu Wang (Guangxi Normal University, Guilin, China); Minquan Cheng (Guangxi Normal University, China)
11:00 COFFEE BREAK
11:30 Error Correcting Codes for Segmented Burst-Deletion Channels
Yajuan Liu and Tolga M Duman (Bilkent University, Turkey)
11:50 On Plotkin Bound for Function-Correcting Codes for b-Symbol Read Channels
Sachin Sampath H (Indian Institute of Science, Bengaluru, India); B. Sundar Rajan (Indian Institute of Science, India)
12:10 Constructions of Binary Cooperative MSR Codes with Optimal Access Bandwidth
Lei Li and Junfeng Zhang (JD.com, China); Xinchun Yu (Zhejiang Gongshang University, China); Yaqian Zhang (Beijing University of Posts and Telecommunications, China); Yuan Luo (Shanghai Jiao Tong University, China)
12:30 A Matrix Completion Approach for the Construction of MDP Convolutional Codes
Sakshi Dang (Indian Institute of Technology Bombay, India); Julia Lieb (TU Ilmenau, Germany); Okko Makkonen (QMill, Finland); Pedro Soto (Virginia Tech, USA); Alex Sprintson (George Mason University, USA & Texas A&M University, USA)

Friday, October 3 9:40 - 12:50

FM2: Detection, Estimation, and Testing

Room 1
Chair: Chetan Gohil (University of Sydney, Australia)
9:40 Approximate Hypothesis Testing
Nicolas Le Gouic (Institut Polytechnique de Paris, France); Robert Graczyk (unknown); Stefan M. Moser (ETH Zurich, Switzerland & National Yang Ming Chiao Tung University (NYCU), Taiwan)
10:00 Secure Best Arm Identification In the Presence of a Copycat
Asaf Cohen (Ben-Gurion University of the Negev, Israel); Onur Günlü (Technische Universität Dortmund, Germany & Linköping University, Sweden)
10:20 Estimation Error: Distribution and Pointwise Limits
Luca Barletta (Politecnico di Milano, Italy); Alex Dytso (Qualcomm Inc., USA); Shlomo (Shitz) Shamai (The Technion, Israel)
10:40 Estimating Mixture Distributions via Stochastic Mirror Descent
Mohammadreza Ahmadypour (University of California San Diego, USA); Tara Javidi (UCSD, USA)
11:00 COFFEE BREAK
11:30 A Dual Optimization View to Empirical Risk Minimization with f-Divergence Regularization
Francisco Daunas and Iñaki Esnaola (University of Sheffield, United Kingdom (Great Britain)); Samir Perlaza (INRIA, France)
11:50 The Conditional Regret-Capacity Theorem for Batch Universal Prediction
Marco Bondaschi and Michael Gastpar (EPFL, Switzerland)

Friday, October 3 9:40 - 12:50

FM3: Security 2

Room 2
Chair: Bin Dai (Southwest Jiaotong University, China)
9:40 \(\alpha\)-leakage Interpretation of Sibson Mutual Information and R\'{e}nyi Capacity
Ni Ding (University of Auckland, New Zealand); Farhad Farokhi (University of Melbourne, Australia); Tao Guo, Yinfei Xu and Xiang Zhang (Southeast University, China)
10:00 Data Availability Attacks: Targeted Sampling for 2-D Reed-Solomon Codes in Blockchain Systems
Sonali Madisetti and Lev Tauz (University of California, Los Angeles, USA); Lara Dolecek (UCLA, USA)
10:20 On Securing Berrut Approximated Coded Computing Through Discrete Cosine Transforms
Rimpi Borah and J Harshan (Indian Institute of Technology Delhi, India)
10:40 Covert Entanglement Generation and Secrecy
Ohad Kimelfeld (Technion, Israel); Boulat A. Bash (University of Arizona, USA); Uzi Pereg (Technion, Israel)
11:00 COFFEE BREAK
11:30 Optimal Rate Region for Lazy Secret Sharing
Tao Guo and Xiaoyu Zhao (Southeast University, China); Deheng Yuan (Tsinghua University, China); Laigang Guo (Beijing Normal University, China); Yinfei Xu (Southeast University, China)
11:50 Byzantine-Resilient Distributed Computation via Task Replication and Local Computations
Aayush Rajesh (Stanford University, USA); Nikhil Karamchandani (Indian Institute of Technology Bombay, India); Vinod M Prabhakaran (Tata Institute of Fundamental Research, India)
12:10 FORTA: Byzantine-Resilient FL Aggregation via DFT-Guided Krum
Usayd Shahul and J Harshan (Indian Institute of Technology Delhi, India)

Friday, October 3 12:50 - 14:10

LUNCH (provided)

Friday, October 3 14:10 - 15:30

FA1: Shannon Theory

Rooms 3-4-5
Chair: Angelo Rodio (Linköping University, Sweden)
14:10 Class-Based Expurgation Attains Csiszár's Expurgated Source-Channel Exponent
Seyed AmirPouya Moeini (University of Cambridge, United Kingdom (Great Britain)); Albert Guillén i Fàbregas (University of Cambridge, United Kingdom (Great Britain) & Universitat Politècnica de Catalunya, Spain)
14:30 Resolution Limits of Non-Adaptive 20 Questions Estimation for Tracking Multiple Moving Targets
Chunsong Sun (Beihang University, China); Lin Zhou (Southern University of Science and Technology, China); Jingjing Wang (Beihang University, China); Weijie Yuan (Southern University of Science and Technology, China); Chunxiao Jiang (Tsinghua University, Beijing, China); Alfred Hero III (University of Michigan, USA)
14:50 Remote Channel Synthesis
Yassine Hamdi and Deniz Gündüz (Imperial College London, United Kingdom (Great Britain))
15:10 Dual-Domain Exponent of Maximum Mutual Information Decoding
Seyed AmirPouya Moeini (University of Cambridge, United Kingdom (Great Britain)); Albert Guillén i Fàbregas (University of Cambridge, United Kingdom (Great Britain) & Universitat Politècnica de Catalunya, Spain)

Friday, October 3 14:10 - 15:30

FA2: Emerging Topics in Information Theory

Room 1
Chair: Michael Gastpar (EPFL, Switzerland)
14:10 Cross Mutual Information
Chetan Gohil, Oliver M Cliff, James M Shine and Ben D Fulcher (University of Sydney, Australia); Joseph T Lizier (The University of Sydney, Australia)
14:30 Context-Aware Search and Retrieval Over Erasure Channels
Sara Ghasvarianjahromi (New Jersey Institute of Technonlgy, USA); Yauhen Yakimenka and Joerg Kliewer (New Jersey Institute of Technology, USA)
14:50 Generalized Theta Series of a Lattice
Maiara F. Bollauf (University of Tartu, Estonia); Hsuan-Yin Lin (Simula UiB, Norway)
15:10 Integrating Viterbi-Like Algorithms with Neural Networks for Resynchronizing Permutation Codes
Hui Zhang and Yeow Meng Chee (National University of Singapore, Singapore)

Friday, October 3 14:10 - 15:30

FA3: Coding Theory 2

Room 2
Chair: Alex Sprintson (George Mason University, USA & Texas A&M University, USA)
14:10 From One-Dimensional Codes to Two-Dimensional Codes: A Universal Framework for the Bounded-Weight Constraint
Viet Hai Le (Singapore University of Technology and Design, Singapore); Thanh Phong Pham (Nanyang Technological University, Singapore); Thanh Tuan Nguyen and Kui Cai (Singapore University of Technology and Design, Singapore); Kees A. Schouhamer Immink (Turing Machines Inc., The Netherlands)
14:30 Permutation Reconstructions for Deletion Channels
Shuche Wang (National University of Singapore, Singapore); Yeow Meng Chee (Singapore University of Technology and Design, Singapore); Van Khu Vu (VinUniversity, Vietnam)
14:50 Function-Correcting Codes for Locally Bounded Functions
Charul Rajput (IIIT Hyderabad, India); B. Sundar Rajan (Indian Institute of Science, India); Ragnar Freij-Hollanti and Camilla Hollanti (Aalto University, Finland)
15:10 Efficient Computation of Marton's Error Exponent via Constraint Decoupling
Jiachuan Ye (Tsinghua University, China); Shitong Wu (Tsinghua University, China & Huawei Technologies Co. Ltd., China); Lingyi Chen (Tsinghua University, China); Wenyi Zhang (University of Science and Technology of China, China); Huihui Wu (Ningbo Institute of Digital Twin, China); Hao Wu (Tsinghua University, China)