Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Efficient error-correcting codes in the short blocklength regime
The design of block codes for short information blocks (eg, a thousand or less information
bits) is an open research problem that is gaining relevance thanks to emerging applications …
bits) is an open research problem that is gaining relevance thanks to emerging applications …
Wiretap channels: Nonasymptotic fundamental limits
This paper investigates the maximal secret communication rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New achievability and …
subject to reliability and secrecy constraints at a given blocklength. New achievability and …
Correlation detection and an operational interpretation of the Rényi mutual information
A variety of new measures of quantum Rényi mutual information and quantum Rényi
conditional entropy have recently been proposed, and some of their mathematical properties …
conditional entropy have recently been proposed, and some of their mathematical properties …
Arimoto–Rényi Conditional Entropy and Bayesian -Ary Hypothesis Testing
This paper gives upper and lower bounds on the minimum error probability of Bayesian M-
ary hypothesis testing in terms of the Arimoto-Rényi conditional entropy of an arbitrary order …
ary hypothesis testing in terms of the Arimoto-Rényi conditional entropy of an arbitrary order …
Finite-blocklength bounds for wiretap channels
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability
and secrecy constraints at a given blocklength. New achievability and converse bounds are …
and secrecy constraints at a given blocklength. New achievability and converse bounds are …
Saddlepoint approximation of the error probability of binary hypothesis testing
We propose a saddlepoint approximation of the error probability of a binary hypothesis test
between two iid distributions. The approximation is accurate, simple to compute, and yields …
between two iid distributions. The approximation is accurate, simple to compute, and yields …
On strong converse theorems for quantum hypothesis testing and channel coding
HC Cheng, L Gao - arxiv preprint arxiv:2403.13584, 2024 - arxiv.org
Strong converse theorems refer to the study of impossibility results in information theory. In
particular, Mosonyi and Ogawa established a one-shot strong converse bound for quantum …
particular, Mosonyi and Ogawa established a one-shot strong converse bound for quantum …
Error exponent of activated non-signaling assisted classical-quantum channel coding
We provide a tight asymptotic characterization of the error exponent for classical-quantum
channel coding assisted by activated non-signaling correlations. Namely, we find that the …
channel coding assisted by activated non-signaling correlations. Namely, we find that the …
Algorithmic aspects of optimal channel coding
A central question in information theory is to determine the maximum success probability
that can be achieved in sending a fixed number of messages over a noisy channel. This was …
that can be achieved in sending a fixed number of messages over a noisy channel. This was …
Asymptotic learning requirements for stealth attacks on linearized state estimation
Information-theoretic stealth attacks are data injection attacks that minimize the amount of
information acquired by the operator about the state variables, while simultaneously limiting …
information acquired by the operator about the state variables, while simultaneously limiting …