
Optimal Adaptive Strategies for Sequential Quantum Hypothesis Testing
We consider sequential hypothesis testing between two quantum states usi...
read it

AdversariallyTrained Nonnegative Matrix Factorization
We consider an adversariallytrained version of the nonnegative matrix f...
read it

CIFS: Improving Adversarial Robustness of CNNs via Channelwise Importancebased Feature Selection
We investigate the adversarial robustness of CNNs from the perspective o...
read it

SGA: A Robust Algorithm for Partial Recovery of TreeStructured Graphical Models with Noisy Samples
We consider learning Ising tree models when the observations from the no...
read it

An Interpretable Intensive Care Unit Mortality Risk Calculator
Mortality risk is a major concern to patients have just been discharged ...
read it

State Masking Over a TwoState Compound Channel
We consider fundamental limits for communicating over a compound channel...
read it

RiskConstrained Thompson Sampling for CVaR Bandits
The multiarmed bandit (MAB) problem is a ubiquitous decisionmaking pro...
read it

Probabilistic Sequential Shrinking: A Best Arm Identification Algorithm for Stochastic Bandits with Corruptions
We consider a best arm identification (BAI) problem for stochastic bandi...
read it

On the Error Exponent of Approximate Sufficient Statistics for Mary Hypothesis Testing
Consider the problem of detecting one of M i.i.d. Gaussian signals corru...
read it

Covert Identification over BinaryInput Memoryless Channels
This paper considers the covert identification problem in which a sender...
read it

Positive Semidefinite Matrix Factorization: A Connection with Phase Retrieval and Affine Rank Minimization
Positive semidefinite matrix factorization (PSDMF) expresses each entry ...
read it

ThirdOrder Asymptotics of VariableLength Compression Allowing Errors
This study investigates the fundamental limits of variablelength compre...
read it

MC2G: An Efficient Algorithm for Matrix Completion with Social and Item Similarity Graphs
We consider a discretevalued matrix completion problem for recommender ...
read it

Exact Asymptotics for Learning TreeStructured Graphical Models with Side Information: Noiseless and Noisy Samples
Given side information that an Ising treestructured graphical model is ...
read it

Optimal Resolution of ChangePoint Detection with Empirically Observed Statistics and Erasures
This paper revisits the offline changepoint detection problem from a st...
read it

Asymptotic Expansions of Smooth Rényi Entropies and Their Applications
This study considers the unconditional smooth Rényi entropy, the smooth ...
read it

Thompson Sampling Algorithms for MeanVariance Bandits
The multiarmed bandit (MAB) problem is a classical learning task that e...
read it

Tight Regret Bounds for Noisy Optimization of a Brownian Motion
We consider the problem of Bayesian optimization of a onedimensional Br...
read it

Best Arm Identification for Cascading Bandits in the Fixed Confidence Setting
We design and analyze CascadeBAI, an algorithm for finding the best set ...
read it

SecondOrder Asymptotics of Sequential Hypothesis Testing
We consider the classical sequential binary hypothesis testing problem i...
read it

Community Detection and Matrix Completion with TwoSided Graph SideInformation
We consider the problem of recovering communities of users and communiti...
read it

Sequential Classification with Empirically Observed Statistics
Motivated by realworld machine learning applications, we consider a sta...
read it

Economy Statistical Recurrent Units For Inferring Nonlinear Granger Causality
Granger causality is a widelyused criterion for analyzing interactions ...
read it

On the Capacity of Channels with Deletions and States
We consider the class of channels formed from the concatenation of a del...
read it

On the BeeIdentification Error Exponent with Absentee Bees
The "beeidentification problem" was formally defined by Tandon, Tan and...
read it

An Improved Linear Programming Bound on the Average Distance of a Binary Code
Ahlswede and Katona (1977) posed the following isodiametric problem in H...
read it

VariableLength Source Dispersions Differ under Maximum and Average Error Criteria
Variablelength compression without prefixfree constraints and with sid...
read it

On Robustness of Neural Ordinary Differential Equations
Neural ordinary differential equations (ODEs) have been attracting incre...
read it

Throughput Scaling of Covert Communication over Wireless Adhoc Networks
We consider the problem of covert communication over wireless adhoc netw...
read it

Covert Communication Over a Compound Channel
In this paper, we consider fundamental communication limits over a compo...
read it

Analysis of Optimization Algorithms via SumofSquares
In this work, we introduce a new framework for unifying and systematizin...
read it

Error Exponent Bounds for the BeeIdentification Problem
Consider the problem of identifying a massive number of bees, uniquely l...
read it

Bounds on the Average Distance and Distance Enumerator with Applications to NonInteractive Simulation
We leverage proof techniques in coding theory and Fourier analysis to de...
read it

Second and ThirdOrder Asymptotics of the ContinuousTime Poisson Channel
The paper derives the optimal second and thirdorder coding rates for t...
read it

SecondOrder Asymptotics of the ContinuousTime Poisson Channel
The paper derives the optimal secondorder coding rate for the continuou...
read it

A Ranking Model Motivated by Nonnegative Matrix Factorization with Applications to Tennis Tournaments
We propose a novel ranking model that combines the BradleyTerryLuce pr...
read it

Distributed Detection with Empirically Observed Statistics
We consider a binary distributed detection problem in which the distribu...
read it

Distributionally Robust and MultiObjective Nonnegative Matrix Factorization
Nonnegative matrix factorization (NMF) is a linear dimensionality reduct...
read it

Exact Channel Synthesis
We consider the exact channel synthesis problem, which is the problem of...
read it

Corrections to "Wyner's Common Information under Rényi Divergence Measures"
In this correspondence, we correct an erroneous argument in the proof of...
read it

Thompson Sampling for Cascading Bandits
We design and analyze TSCascade, a Thompson sampling algorithm for the ...
read it

On Exact and ∞Rényi Common Informations
Recently, two extensions of Wyner's common information — exact and Rényi...
read it

Asymptotically Optimal Codes Correcting FixedLength Duplication Errors in DNA Storage Systems
A (tandem) duplication of length k is an insertion of an exact copy of...
read it

Strong Converse for Hypothesis Testing Against Independence over a TwoHop Network
By proving a strong converse, we strengthen the weak converse result by ...
read it

Distributed Hypothesis Testing with Privacy Constraints
We revisit the distributed hypothesis testing (or hypothesis testing wit...
read it

SecondOrder Asymptotically Optimal Statistical Classification
Motivated by realworld machine learning applications, we analyze approx...
read it

Simulation of Random Variables under Rényi Divergence Measures of All Orders
The random variable simulation problem consists in using a kdimensional...
read it

The Optimal Compression Rate of VariabletoFixed Length Source Coding with a NonVanishing ExcessDistortion Probability
We consider the variabletofixed length lossy source coding (VFSC) prob...
read it

ErrorFree Communication Over StateDependent Channels with VariableLength Feedback
The zeroerror capacity of statedependent channels with noiseless feedb...
read it

Asymptotic Coupling and Its Applications in Information Theory
A coupling of two distributions P_X and P_Y is a joint distribution P_XY...
read it
Vincent Y. F. Tan
is this you? claim profile
Associate Professor of Electrical Engineering and Mathematics, National University of Singapore