Monday, May 21
| Mr. Hengjie Yang | A Convolutional-Code-Specific Redesign of the 3GPP 8, 12, and 16-bit CRC Codes | ||||||||
| Kenneth S. Palacio-Baus | Error Exponents for Two-Way AWGN Channels at Zero-Rate | ||||||||
| Ardhendu Tripathy | Zero-error function computation on a directed acyclic network | ||||||||
| Ahmad Golmohammadi | Joint Source-Channel Coding with Concatenated Spatially Coupled LDPC Codes | ||||||||
| Zhen Chen | The Asymptotic Capacity of Private Search | ||||||||
| Ahmed A. Zewail | A wiretap channel with a cache | ||||||||
| Ramy E. Ali | Multi-version Coding with Side Information | ||||||||
| Hassan Zivari-Fard | Two-Transmitter Two-Receiver with Confidential Messages | ||||||||
| PINAR SEN | Optimal Achievable Rate Region for Computation with Homologous Codes | ||||||||
| Amir Asadi | Generalization bounds with mutual information | ||||||||
| Andrew Nemec | Hybrid Codes | ||||||||
| Michelle Facina | Accurate Log-Normal Approximation to the Signal-to-Interference Ratio in Massive MIMO Systems | ||||||||
| Navid (Esmaeil) Karimi | Fast Localization of Multiple Users in Mm-Wave Cells | ||||||||
| Nazanin Takbiri | A Unified Framework for IoT privacy | ||||||||
| Vamsi | A coupled compressive sensing for unsourced multiple access | ||||||||
| Fatima Ahsan | Reducing Latency in LTE RACH, by the size of Texas | ||||||||
| Sung-En Chiu | Sequential Search for mmWave Initial Access | ||||||||
| Dennis Ogbe | Transcoding: A New Strategy for Relay Channels | ||||||||
| Yahya Ezzeldin | Capacity Results for mmWave Relay Networks | ||||||||
| Ramin Soltani | Covert communication over packet channels | ||||||||
| Keerthi Arumugam | Covert communication over relay channel | ||||||||
| Joe Young | Information Theoretic Analysis of Neural Recordings | ||||||||
| Abbas Khalili | On MIMO Channel Capacity with Output Quantization Constraints | ||||||||
| Ke Li | Privacy Against Matching under Anonymization and Obfuscation in the Gaussian Case | ||||||||
| Md Atiqul Islam | A Comprehensive Self-interference Model for Single-antenna Full-duplex Communication Systems | ||||||||
Tuesday, May 22
| Roberto Machado | Metrics that respect the support |
| Narayanan | Synthesis of Logical Operators for Quantum Computers using Stabilizer Codes |
| Anusha Lalitha | Active Learning for Real-time Tracking of Dynamic Targets |
| Mehrdad | Quantum Covert Key Generation |
| Jack Wang | QG-Net: A Data-Driven Question Generation Model for Educational Content |
| Alireza | Training Probabilistic Spiking Neural Networks with First-to-spike Decoding |
| Marwen Zorgui | Distributed storage: Coding and Algorithms |
| Jingbo Liu | Rejection Sampling and Noncausal Sampling Under Moment Constraints |
| Vipul Gupta | A More Practical Matrix Multiplication for the Cloud |
| Nadia Kazemi | Achievable Service Rates in Coded Distributed Storage |
| Bharadwaj Satchidanandan | Securable and Unsecurable Subspaces of a Linear Stochastic System |
| Semih Yagli | Exact Soft-Covering Exponent |
| Michal Yemini | Hidden Markov Bandits with Linear Rewards |
| Sudha Yellapantula | Analysis of brain dynamics in a language task using information theoretic graphs |
| Yugandhar | On the optimality of the greedy policy for the sequential scalar measurement problem in signal-plus-noise models. |
| Angie Forero | Nonlinear Adaptive Estimation by Kernel Parallel Hyperslab Projection Along Affine Subspaces with kernel least mean square-Surprise Criterion Algorithm |
| Nicholas Woolsey | Practical Device-To-Device (D2D) Wireless Caching Networks |
| Xiang Zhang | On Reducing the Packetization Complexity of Cache-aided Interference Management |
| Abdelrahman Ibrahim | Device-to-Device Coded Caching with Heterogeneous Cache Sizes |
| Arun | The Trade-off between Privacy and Fidelity via Ehrhart Theory |
| LEI ZHENG | Coded Caching Scheme Design with Directional Antenna Coverage |
| Negar Erfanian | Extracting Qualitative Information from Dynamics of Epileptic Data as an Approach for Seizure Prediction |
| Mohamed Nafea | The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II |
| Srilakshmi Pattabiraman | Leveraging the Greed in Social Learning |
| Nirmal Shende | Point Process Entropy |
