IEEE Transactions on Information Theory

Papers
(The H4-Index of IEEE Transactions on Information Theory is 31. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
Robust Mean Estimation in High Dimensions: An Outlier-Fraction Agnostic and Efficient Algorithm294
Proceedings of the IEEE194
Table of Contents106
Table of Contents103
Error Exponents in the Bee Identification Problem101
Template Matching and Change Point Detection by M-Estimation90
The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields89
Almost-Reed–Muller Codes Achieve Constant Rates for Random Errors87
Random Periodic Sampling Patterns for Shift-Invariant Spaces70
Federated Best Arm Identification With Heterogeneous Clients65
Max-Linear Regression by Convex Programming64
On the Zero-Error Capacity of the Modulo-Additive Noise Channel With Help59
On Universal D-Semifaithful Coding for Memoryless Sources With Infinite Alphabets56
Fundamental Limits of Reference-Based Sequence Reordering54
Recoverable Systems48
Dimension-Free Noninteractive Simulation From Gaussian Sources47
Minimum Energy Analysis for Robust Gaussian Joint Source-Channel Coding With a Distortion-Noise Profile47
Information Rates Over Multi-View Channels46
IEEE Transactions on Information Theory Publication Information40
Grouping-Based Cyclic Scheduling Under Age of Correlated Information Constraints39
Sequence Pairs With Lowest Combined Autocorrelation and Crosscorrelation37
Lossy Quantum Source Coding With a Global Error Criterion Based on a Posterior Reference Map37
Discrete Signaling and Treating Interference as Noise for the Gaussian Interference Channel37
Communicating Over a Classical-Quantum MAC With State Information Distributed at the Senders36
IEEE Transactions on Information Theory Information for Authors35
Breaking and Improving a Lattice-Code-Based Cryptosystem by Li, Ling, Xing, and Yeo34
Structural Complexity of One-Dimensional Random Geometric Graphs33
Rigorous State Evolution Analysis for Approximate Message Passing With Side Information33
RQC Revisited and More Cryptanalysis for Rank-Based Cryptography32
Advancing the Idea of Probabilistic Neutral Bits: First Key Recovery Attack on 7.5 Round ChaCha32
A Locality-Based Lens for Coded Computation31
Fast Correlation Attacks on K2 Stream Cipher31
0.046828985214233