| 2014 | 2014 IEEE Information Theory Workshop, ITW 2014, Hobart, Tasmania, Australia, November 2-5, 2014 |
| 2014 | A USRP implementation of wiretap lattice codes. Jinlong Lu, J. Harshan, Frédérique E. Oggier |
| 2014 | A code design framework for multi-rack distributed storage. Mohammad Ali Tebbi, Terence H. Chan, Chi Wan Sung |
| 2014 | A complete MacWilliams theorem for convolutional codes. Ching-Yi Lai, Min-Hsiu Hsieh, Hsiao-feng Lu |
| 2014 | A few meta-theorems in network information theory. Yu Xiang, Young-Han Kim |
| 2014 | A matrix completion approach to linear index coding problem. Homa Esfahanizadeh, Farshad Lahouti, Babak Hassibi |
| 2014 | A new construction of zero correlation zone sequences from generalized reed-muller codes. Zi Long Liu, Yong Liang Guan, Udaya Parampalli |
| 2014 | A new model of Client-Server Communications under information theoretic security. Mitsugu Iwamoto, Tsukasa Omino, Yuichi Komano, Kazuo Ohta |
| 2014 | A new multiple folded successive cancellation decoder for polar codes. Harish Vangala, Emanuele Viterbo, Yi Hong |
| 2014 | A new upperbound for the oblivious transfer capacity of discrete memoryless channels. K. Sankeerth Rao, Vinod M. Prabhakaran |
| 2014 | A recursive coding algorithm for two-unicast-Z networks. Weifei Zeng, Viveck R. Cadambe, Muriel Médard |
| 2014 | Achieving positive rates over AWGN channels with quantized feedback and linear processing. Stefan Farthofer, Andreas Winkelbauer, Gerald Matz |
| 2014 | Almost affine locally repairable codes and matroid theory. Thomas Westerbäck, Toni Ernvall, Camilla Hollanti |
| 2014 | An efficient code for Adversarial Wiretap channel. Pengwei Wang, Reihaneh Safavi-Naini |
| 2014 | An elementary completeness proof for secure two-party computation primitives. Ye Wang, Prakash Ishwar, Shantanu Rane |
| 2014 | An exploration of the role of principal inertia components in information theory. Flávio P. Calmon, Mayank Varia, Muriel Médard |
| 2014 | Arithmetic geometry of compute and forward. Maria Angeles Vázquez-Castro |
| 2014 | Can we measure the difficulty of an optimization problem? Tansu Alpcan, Tom Everitt, Marcus Hutter |
| 2014 | Capacity bounds for certain channels with states and the energy harvesting channel. Wei Mao, Babak Hassibi |
| 2014 | Capacity estimation of two-dimensional channels using Sequential Monte Carlo. Christian A. Naesseth, Fredrik Lindsten, Thomas B. Schön |
| 2014 | Capacity of the energy harvesting channel with energy arrival information at the receiver. Omur Ozel, Kaya Tutuncuoglu, Sennur Ulukus, Aylin Yener |
| 2014 | Codes for wireless wiretap channels. Jean-Claude Belfiore |
| 2014 | Coding for wiretap channels: Channel resolvability and semantic security. Andrew Thangaraj |
| 2014 | Coding schemes for a class of receiver message side information in AWGN broadcast channels. Behzad Asadi, Lawrence Ong, Sarah J. Johnson |
| 2014 | Compute-and-forward for discrete memoryless networks. Bobak Nazer, Michael Gastpar |
| 2014 | Concatenated permutation block codes for correcting single transposition errors. Reolyn Heymann, Jos H. Weber, Theo G. Swart, Hendrik C. Ferreira |
| 2014 | Construction and secrecy gain of a family of 5-modular lattices. Xiaolu Hou, Fuchun Lin, Frédérique E. Oggier |
| 2014 | Construction of random input-output codes with moderate block lengths. Ravi Motwani, Eitan Yaakobi |
| 2014 | Correlation between channel state and information source with empirical coordination constraint. Maël Le Treust |
| 2014 | Cyclic interference alignment and cancellation in 3-user X- networks with minimal backhaul. Henning Maier, Rudolf Mathar |
| 2014 | Decoding delay reduction in network coded cooperative systems with intermittent status update. Mohammad S. Karim, Neda Aboutorab, Ali A. Nasir, Parastoo Sadeghi |
| 2014 | Delay exponent of variable-length random binning for point-to-point transmission. Nan Zhang, Badri N. Vellambi, Khoa D. Nguyen |
| 2014 | Delay-exponent of bilayer anytime code. Md. Noor-A-Rahim, Khoa D. Nguyen, Gottfried Lechner |
| 2014 | Design of non-binary quasi-cyclic LDPC codes by absorbing set removal. Behzad Amiri, Jorge-Arturo Flores-Castro, Lara Dolecek |
| 2014 | Dirty interference cancellation for Gaussian broadcast channels. Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai |
| 2014 | Distributed decode-forward for broadcast. Sung Hoon Lim, Kwang Taik Kim, Young-Han Kim |
| 2014 | Distributed storage for data security. Annina Bracher, Eran Hof, Amos Lapidoth |
| 2014 | Effects of mobility on user energy consumption and total throughput in a massive MIMO system. Aris L. Moustakas, Luca Sanguinetti, Mérouane Debbah |
| 2014 | Efficient secret sharing schemes achieving optimal information rate. Yongge Wang, Yvo Desmedt |
| 2014 | Enabling the multi-user generalized degrees of freedom in the Gaussian cellular channel. Rick Fritschek, Gerhard Wunder |
| 2014 | Enhanced trellis coded multiple access (ETCMA). Alberto G. Perotti, Branislav M. Popovic |
| 2014 | Explicit constructions for type-1 QC-LDPC codes with girth at least ten. Juhua Wang, Guohua Zhang, Quan Zhou, Yang Yang, Rong Sun |
| 2014 | Feedback enhances the security of degraded broadcast channels with confidential messages and causal channel state information. Bin Dai, Zheng Ma |
| 2014 | Feedback systems using non-binary LDPC codes with a limited number of transmissions. Kasra Vakilinia, Adam R. Williamson, Sudarsan Vasista Srinivasan Ranganathan, Dariush Divsalar, Richard D. Wesel |
| 2014 | From LDPC to chunked network codes. Shenghao Yang, Bin Tang |
| 2014 | From ordinary AWGN codes to optimal MIMO wiretap schemes. Anatoly Khina, Yuval Kochman, Ashish Khisti |
| 2014 | From the Information Bottleneck to the Privacy Funnel. Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, Muriel Médard |
| 2014 | Fundamental limits of universal lossless one-to-one compression of parametric sources. Ahmad Beirami, Faramarz Fekri |
| 2014 | Generalized low-density (GLD) lattices. Joseph Jean Boutros, Nicola di Pietro, Nour Basha |
| 2014 | Gilbert-Varshamov-like lower bounds for deletion-correcting codes. Frederic Sala, Ryan Gabrys, Lara Dolecek |
| 2014 | Haplotype assembly: An information theoretic view. Hongbo Si, Haris Vikalo, Sriram Vishwanath |
| 2014 | How to design an efficient lattice coding scheme. Ram Zamir |
| 2014 | How to securely compute the modulo-two sum of binary sources. Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran |
| 2014 | Inferring the dynamic range of electrode current by using an information theoretic model of cochlear implant stimulation. Xiao Gao, David B. Grayden, Mark D. McDonnell |
| 2014 | Insertion and deletion errors with a forbidden symbol. Ankur A. Kulkarni |
| 2014 | Inter-session network coding for transmitting multiple layered streams over single-hop wireless networks. Mohammad Esmaeilzadeh, Neda Aboutorab |
| 2014 | Interactive code to correct and detect omniscient Byzantine adversaries. Zhiqing Xiao, Yunzhou Li, Ming Zhao, Jing Wang |
| 2014 | Is there a canonical network for network information theory? Michelle Effros, Michael Langberg |
| 2014 | Iterative list-decoding of Gabidulin codes via Gröbner based interpolation. Margreta Kuijper, Anna-Lena Trautmann |
| 2014 | Key capacity region for a cellular source model. Huishuai Zhang, Yingbin Liang, Lifeng Lai |
| 2014 | LT code design for inactivation decoding. Francisco Lázaro Blasco, Gianluigi Liva, Gerhard Bauch |
| 2014 | Lattices from codes for harnessing interference: An overview and generalizations. Yu-Chih Huang, Krishna R. Narayanan |
| 2014 | Linear programming bounds for robust locally repairable storage codes. Mohammad Ali Tebbi, Terence H. Chan, Chi Wan Sung |
| 2014 | Linearly-coupled fountain codes for network-coded multiple access. Shenghao Yang, Soung Chang Liew, Lizhao You, Yi Chen |
| 2014 | Local rank modulation for flash memories. Michal Horovitz, Tuvi Etzion |
| 2014 | Locality-preserving secure network coding. Xuan Guang, Jiyong Lu, Fang-Wei Fu |
| 2014 | Locally Repairable RapidRAID Systematic Codes - One simple convoluted way to get it all. Anwitaman Datta |
| 2014 | Locally repairable codes over a network. Quan Yu, Chi Wan Sung, Terence H. Chan |
| 2014 | Low-complexity channel resolvability codes for the symmetric multiple-access channel. Remi A. Chou, Matthieu R. Bloch, Jörg Kliewer |
| 2014 | Max-min fair wireless energy transfer for secure multiuser communication systems. Derrick Wing Kwan Ng, Robert Schober |
| 2014 | Message variance convergence condition for generalizations of LDLC lattices. Brian M. Kurkoski, Ricardo Antonio Parrao Hernandez |
| 2014 | Multi-dimensional and non-uniform constellation optimization via the special orthogonal group. David A. Karpuk, Camilla Hollanti |
| 2014 | Multicell coordinated scheduling with multiuser ZF beamforming: Policies and performance bounds. Min Li, Iain B. Collings, Stephen V. Hanly, Chunshan Liu, Phil Whiting |
| 2014 | Multiple description coding for the Compound Broadcast Channel. Meryem Benammar, Pablo Piantanida, Shlomo Shamai |
| 2014 | Non-uniform spatial coupling. Fanny Jardel, Joseph Jean Boutros |
| 2014 | On achievable degrees of freedom of 3-user MIMO interference channels. Lu Yang, Wei Zhang |
| 2014 | On capacity of the dirty paper channel with fading dirt in the strong fading regime. Stefano Rini, Shlomo Shamai |
| 2014 | On deterministic linear network coded broadcast and its relation to matroid theory. Mingchao Yu, Parastoo Sadeghi, Neda Aboutorab |
| 2014 | On feasibility of linear interference alignment with symbol extension for two-cell MIMO interfering multiple access channel. Edin Zhang, Chiachi Huang |
| 2014 | On generalized active attacks by causal adversaries in networks. Oliver Kosut, Li-Wei Kao |
| 2014 | On index coding and graph homomorphism. Javad B. Ebrahimi, Mahdi Jafari Siavoshani |
| 2014 | On measures of information theoretic security. Shuiyin Liu, Yi Hong, Emanuele Viterbo |
| 2014 | On the Ice-Wine problem: Recovering linear combination of codewords over the Gaussian Multiple Access Channel. Shahab Ghasemi-Goojani, Hamid Behroozi |
| 2014 | On the adaptive capacity region of fading MACs with distributed CSI. Sreejith Sreekumar, Sibi Raj B. Pillai, Bikash Kumar Dey |
| 2014 | On the capacity and the zero-error capacity of k-resilient AND anti-collusion codes. Hiroki Koga |
| 2014 | On the multiway relay channel with direct links. Anne Savard, Claudio Weidmann |
| 2014 | On the oblivious transfer capacity region of the binary erasure broadcast channel. Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi |
| 2014 | On the secrecy capacity region of the Wiretap Broadcast Channel. Meryem Benammar, Pablo Piantanida |
| 2014 | On the solvability of three-pair networks with common bottleneck links. Kai Cai, Guangyue Han |
| 2014 | On ℓp-norm computation over multiple-access channels. Steffen Limmer, Slawomir Stanczak |
| 2014 | Optimization of graph based codes for belief propagation decoding. Sachini Jayasooriya, Sarah J. Johnson, Lawrence Ong, Regina Berretta |
| 2014 | Performance of precoded integer-forcing for closed-loop MIMO multicast. Elad Domanovitz, Uri Erez |
| 2014 | Polarization as a novel architecture to boost the classical mismatched capacity of B-DMCs. Mine Alsan, Emre Telatar |
| 2014 | Posterior matching scheme for Gaussian multiple access channel with feedback. Lan V. Truong |
| 2014 | Quantum synchronizable codes from quadratic residue codes and their supercodes. Yixuan Xie, Jinhong Yuan, Yuichiro Fujiwara |
| 2014 | Quasi-primitive block-wise concatenated BCH codes for NAND flash memories. Daesung Kim, Jeongseok Ha |
| 2014 | Rank weight hierarchy of some classes of cyclic codes. Jérôme Ducoat, Frédérique E. Oggier |
| 2014 | Recent advances in joint wireless energy and information transfer. Suzhi Bi, Chin Keong Ho, Rui Zhang |
| 2014 | Reductions techniques for establishing equivalence between different classes of network and index coding problems. Alex Sprintson |
| 2014 | Relative generalized Hamming weights of one-point algebraic geometric codes. Olav Geil, Stefano Martin, Ryutaroh Matsumoto, Diego Ruano, Yuan Luo |
| 2014 | Reliable deniable communication with channel uncertainty. Pak Hou Che, Mayank Bakshi, Chung Chan, Sidharth Jaggi |
| 2014 | Reliable, deniable and hidable communication: A quick survey. Pak Hou Che, Swanand Kadhe, Mayank Bakshi, Chung Chan, Sidharth Jaggi, Alex Sprintson |
| 2014 | Repeated deletion channels. Bernhard Haeupler, Michael Mitzenmacher |
| 2014 | Revisiting the rate-distortion theory using smooth max Rényi divergence. Tomohiko Uyematsu, Tetsunao Matsuta |
| 2014 | Rényi entropy and quantization for densities. Christoph Bunte, Amos Lapidoth |
| 2014 | S-AMP: Approximate message passing for general matrix ensembles. Burak Çakmak, Ole Winther, Bernard H. Fleury |
| 2014 | Searching with measurement dependent noise. Yonatan Kaspi, Ofer Shayevitz, Tara Javidi |
| 2014 | Secrecy measures for broadcast channels with receiver side information: Joint vs individual. Ahmed S. Mansour, Rafael F. Schaefer, Holger Boche |
| 2014 | Secure communication of correlated sources over broadcast channels. Fei Lang, Zhixiang Deng, Bao-Yun Wang |
| 2014 | Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer. Mohamed S. Nafea, Aylin Yener |
| 2014 | Secure degrees of freedom region of the Gaussian interference channel with secrecy constraints. Jianwei Xie, Sennur Ulukus |
| 2014 | Sequential decoding of polar codes with arbitrary binary kernel. Vera Miloslavskaya, Peter Trifonov |
| 2014 | Set avoidance probabilities and bounds on the reliability of erasure coded storage systems. Antonio C. de A. Campello Jr., Vinay A. Vaishampayan |
| 2014 | Shaping low-density lattice codes using Voronoi integers. Nuwan S. Ferdinand, Brian M. Kurkoski, Behnaam Aazhang, Matti Latva-aho |
| 2014 | Sparse Bayesian learning approach for streaming signal recovery. Uditha L. Wijewardhana, Marian Codreanu |
| 2014 | Spatially-coupled counter braids. Eirik Rosnes |
| 2014 | State amplification and state masking for the binary energy harvesting channel. Kaya Tutuncuoglu, Omur Ozel, Aylin Yener, Sennur Ulukus |
| 2014 | Stochastic Complexity for tree models. Jun'ichi Takeuchi, Andrew R. Barron |
| 2014 | Strong coordination over a three-terminal relay network. Matthieu R. Bloch, Jörg Kliewer |
| 2014 | Successive cancellation permutation decoding of Reed-Solomon codes. Peter Trifonov |
| 2014 | Superposition lattice coding for Gaussian broadcast channel with confidential message. Li-Chia Choo, Cong Ling |
| 2014 | Switched local schedules for diamond networks. Siddhartha Brahma, Ayan Sengupta, Christina Fragouli |
| 2014 | Symmetric Degrees of Freedom of the MIMO 3-way channel with MT × MR antennas. Henning Maier, Anas Chaaban, Rudolf Mathar |
| 2014 | Syndrome decoding of symbol-pair codes. Masanori Hirotomo, Makoto Takita, Masakatu Morii |
| 2014 | The capacity of the Multiple Access Channel under distributed scheduling and MMSE decoding. Joseph Kampeas, Asaf Cohen, Omer Gurewitz |
| 2014 | The diversity multiplexing tradeoff of the half-duplex relay network. Sanjay Karmakar, Mahesh K. Varanasi |
| 2014 | The fundamental theorem of distributed storage systems revisited. Ping Hu, Kenneth W. Shum, Chi Wan Sung |
| 2014 | The multiple access channel with an untrusted relay. Ahmed A. Zewail, Aylin Yener |
| 2014 | The role of artificial noise in multi-antenna fading wiretap channels: Useful or harmful? Ramanan Subramanian, Ingmar Land |
| 2014 | The semantic secrecy rate of the lattice Gaussian coding for the Gaussian wiretap channel. Hamed Mirghasemi, Jean-Claude Belfiore |
| 2014 | Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs. Parth Pradhan, Parv Venkitasubramaniam |
| 2014 | Unitary precoding for integer-forcing MIMO linear receivers. Amin Sakzad, Emanuele Viterbo |
| 2014 | Universal polar decoding with channel knowledge at the encoder. Mine Alsan |
| 2014 | Unshared secret key cryptography: Achieving Shannon's ideal secrecy and perfect secrecy. Shuiyin Liu, Yi Hong, Emanuele Viterbo |
| 2014 | Using T-codes as locally decodable source codes. Ulrich Speidel, T. Aaron Gulliver, Ali Makhdoumi, Muriel Médard |
| 2014 | Variable-length lossy source code using a constrained-random-number generator. Jun Muramatsu |
| 2014 | Wireless-powered cooperative communications via a hybrid relay. He Chen, Xiangyun Zhou, Yonghui Li, Peng Wang, Branka Vucetic |