Information bottleneck (IB) is a paradigm to extract information in one
...
We propose a hybrid joint source-channel coding (JSCC) scheme, in which ...
We consider the symmetric difference of two graphs on the same vertex se...
Recent advances in machine learning-aided lossy compression are incorpor...
The Blahut-Arimoto (BA) algorithm has played a fundamental role in the
n...
The nascent field of Rate-Distortion-Perception (RDP) theory is seeing a...
Sparse regression codes (SPARCs) are a promising coding scheme that can
...
Maintaining the freshness of information in the Internet of Things (IoT)...
In this paper, we propose a new framework named Communication Optimal
Tr...
As a special class of array codes, (n,k,m) piggybacking codes are MDS co...
The systematic study of alternating minimization problems was initiated ...
Körner introduced the notion of graph entropy in 1973 as the minimal cod...
Mismatch capacity characterizes the highest information rate for a chann...
Wireless network capacity can be regarded as the most important performa...
We consider the semantic rate-distortion problem motivated by task-orien...
Pre-training over mixtured multi-task, multi-domain, and multi-modal dat...
By moving to millimeter wave (mmWave) frequencies, base stations (BSs) w...
Piggybacking codes are a special class of MDS array codes that can achie...
We consider a problem of coding for computing, where the decoder wishes ...
Wireless network capacity is one of the most important performance metri...
In this paper, we study a concatenate coding scheme based on sparse
regr...
The sixth generation (6G) era is envisioned to be a fully intelligent an...
We propose a simple and fast method for providing a high quality solutio...
The accelerated convergence of digital and real-world lifestyles has imp...
Rate adaption of deep image compression in a single model will become on...
Due to the flexibility and low operational cost, dispatching unmanned ae...
In this paper, we generally formulate the dynamics prediction problem of...
Due to the malicious attacks in wireless networks, physical layer securi...
Fog radio access network (Fog-RAN), which pushes the caching and computi...
Unmanned aerial vehicle (UAV)-aided data collection is a new and promisi...