Invited Papers

Boundaries between Information Theory and Data Science, Biology and Signal Processing

Best Arm Identification for Both Stochastic and Adversarial Multi-armed Bandits

  • Cong Shen (University of Science and Technology of China, P.R. China)
  • Hantao Zhang (University of Science and Technology of China, P.R. China)

Coding for Memories

Content-Aware Error Correction and Detection for Memory Resilience

  • Lara Dolecek (University of California, Los Angeles, USA)

Frontiers of Coding Theory and Practice

Binary Linear Codes with Optimal Scaling: Polar Codes with Large Kernels

  • Hamed Hassani (University of Pennsylvania, USA)
  • Arman Fazeli (University of California, San Diego, USA)
  • Marco Mondelli (Stanford University, USA)
  • Alexander Vardy (University of California San Diego, USA)

C 3LES: Codes for Coded Computation that Leverage Stragglers

  • Anindya Bijoy Das (Iowa State University, USA)
  • Li Tang (Iowa State University, USA)
  • Aditya Ramamoorthy (Iowa State University, USA)

Capacity of Locally Recoverable Codes

  • Arya Mazumdar (University of Massachusetts Amherst, USA)

Capacity-achieving Sparse Regression Codes Via Spatial Coupling

  • Cynthia Rush (Columbia University, USA)
  • Kuan Hsieh (University of Cambridge, United Kingdom (Great Britain))
  • Ramji Venkataramanan (University of Cambridge, United Kingdom (Great Britain))

Coding for Private and Secure Multiparty Computing

  • Qian Yu (University of Southern California, USA)
  • Netanel Raviv (California Institute of Technology, USA)
  • Salman Avestimehr (University of Southern California, USA)

Geometric Shaping: Low-density Coding of Gaussian-like Constellations

  • Joseph Jean Boutros (Texas A&M University, USA)
  • Uri Erez (Tel Aviv University, Israel)
  • Johannes Van Wonterghem (Ghent University, Belgium)
  • Gilles Zémor (Université de Bordeaux, France)

Sub-linear Time Stochastic Threshold Group Testing via Sparse-Graph Codes

  • Ramtin Pedarsani (University of California, Santa Barbara, USA)

What Can Machine Learning Teach Us about Communications?

  • Mengke Lian (Duke University, USA)
  • Christian Häger (Chalmers University of Technology, Sweden & Duke University, USA)
  • Henry D Pfister (Duke University, USA)

Information Theory and its Applications

Fronthaul Data Reduction in Massive MIMO Aided C-RAN via Two-timescale Hybrid Compression

  • An Liu (Zhejiang University, P.R. China)
  • Xihan Chen (Zhejiang University, P.R. China)
  • Wei Yu (University of Toronto, Canada)
  • Vincent Lau (Hong Kong University of Science and Technology, Hong Kong)
  • Minjian Zhao (Zhejiang University, P.R. China)

Staircase-PIR: Universally Robust Private Information Retrieval

  • Rawad Bitar (Rutgers University, USA)
  • Salim El Rouayheb (Rutgers University, USA)

Network Coding and Distributed Storage

Optimum Linear Codes with Support Constraints over Small Fields

  • Babak Hassibi (California Institute of Technology, USA)
  • Hikmet Yildiz (California Institute of Technology, USA)

Placement Delivery Array and Its Applications

  • Xiaohu Tang (Southwest Jiaotong University, P.R. China)

Recommender Systems over Wireless: Challenges and Opportunities

  • Linqi Song (City University of Hong Kong, Hong Kong)
  • Christina Fragouli (University of California, Los Angeles, USA)
  • Devavrat Shah (Massachusetts Institute of Technology, USA)

Network Information Theory

Capacity Limits of Full-Duplex Cellular Network

  • Kaiming Shen (University of Toronto, Canada)
  • Reza K. Farsani (University of Waterloo, Canada)
  • Wei Yu (University of Toronto, Canada)

On the Capacity Region for Secure Index Coding

  • Yuxin Liu (The Australian National University, Australia)
  • Badri N Vellambi (University of Cincinnati, USA)
  • Young-Han Kim (University of California, San Diego, USA)
  • Parastoo Sadeghi (The Australian National University, Australia)

Secure Physical Layer Network Coding Versus Secure Network Coding

  • Masahito Hayashi (Nagoya University, Japan)