IEEE Transactions on Information Theory

Papers
(The median citation count of IEEE Transactions on Information Theory is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
IEEE Transactions on Information Theory information for authors183
Table of Contents161
Table of Contents107
Table of Contents88
Table of contents87
Introducing IEEE Collabratec79
TechRxiv: Share Your Preprint Research with the World!76
IEEE Transactions on Information Theory information for authors74
IEEE Transactions on Information Theory Information for Authors71
IEEE Transactions on Information Theory publication information71
Universal tester for multiple independence testing and classical-quantum arbitrarily varying multiple access channel62
Optimal Short-Term Forecast for Locally Stationary Functional Time Series58
IEEE Transactions on Information Theory Publication Information55
On the Price of Decentralization in Decentralized Detection55
On Restless Linear Bandits54
Erratum to: “From Classical to Quantum: Uniform Continuity Bounds on Entropies in Infinite Dimensions”51
Table of Contents50
IEEE Transactions on Information Theory Publication Information48
IEEE Transactions on Information Theory publication information47
IEEE Transactions on Information Theory publication information41
IEEE Transactions on Information Theory publication information41
IEEE Transactions on Information Theory publication information41
IEEE Transactions on Information Theory information for authors41
Sequential Classification With Empirically Observed Statistics41
On the Capacity Regions of Cloud Radio Access Networks With Limited Orthogonal Fronthaul40
IEEE Transactions on Information Theory publication information40
Proceedings of the IEEE38
Table of Contents38
Table of contents38
IEEE Transactions on Information Theory publication information37
Table of contents37
Table of Contents35
IEEE Transactions on Information Theory publication information35
Tight Exponential Strong Converse for Source Coding Problem With Encoded Side Information33
Divergence Maximizing Linear Projection for Supervised Dimension Reduction32
IEEE Transactions on Information Theory publication information31
IEEE Transactions on Information Theory information for authors30
Table of Contents30
IEEE Transactions on Information Theory information for authors29
Universal Polarization for Processes With Memory28
General Form of Almost Instantaneous Fixed-to-Variable-Length Codes28
IEEE Transactions on Information Theory information for authors28
Explicit Rate-Optimal Streaming Codes With Smaller Field Size27
Canonical Conditions for K/2 Degrees of Freedom27
Polynomial Time Key-Recovery Attack on High Rate Random Alternant Codes27
Equivalence of Three Classical Algorithms With Quantum Side Information: Privacy Amplification, Error Correction, and Data Compression27
Lossy Quantum Source Coding With a Global Error Criterion Based on a Posterior Reference Map27
Federated Best Arm Identification With Heterogeneous Clients27
Asymptotic Behavior and Typicality Properties of Runlength-Limited Sequences27
Epsilon-Nets, Unitary Designs, and Random Quantum Circuits26
On the Fundamental Limits of Matrix Completion: Leveraging Hierarchical Similarity Graphs26
Finite-State Channels With Feedback and State Known at the Encoder26
RQC Revisited and More Cryptanalysis for Rank-Based Cryptography25
The Extended Codes of a Family of Reversible MDS Cyclic codes25
Sum-of-Squares Proofs of Logarithmic Sobolev Inequalities on Finite Markov Chains25
On Lossy Compression of Directed Graphs25
Optimal Second-Order Rates for Quantum Soft Covering and Privacy Amplification24
Monotonicity of the Trace–Inverse of Covariance Submatrices and Two-Sided Prediction24
Scaling Laws for Gaussian Random Many-Access Channels23
Coding Constructions for Efficient Oblivious Transfer From Noisy Channels23
Permutation Capacity Region of Adder Multiple-Access Channels23
Variations on a Theme by Massey23
Analog Subspace Coding: A New Approach to Coding for Non-Coherent Wireless Networks23
A Gröbner-Bases Approach to Syndrome-Based Fast Chase Decoding of Reed–Solomon Codes23
Capacity-Approaching Constrained Codes With Error Correction for DNA-Based Data Storage22
Bounds on k-Uniform Quantum States22
Optimal Sampling and Scheduling for Timely Status Updates in Multi-Source Networks22
Analysis of KNN Density Estimation22
Fundamental Limits of Cache-Aided MIMO Wireless Networks22
Communicating over a Classical-Quantum MAC with State Information Distributed at the Senders22
Tradeoff Between Diversity and Multiplexing Gains in Block Fading Optical Wireless Channels21
Concentration Bounds for Plug-In Estimator of Directed Information21
Explicit Constructions of Two-Dimensional Reed-Solomon Codes in High Insertion and Deletion Noise Regime21
Learning Maximum Margin Channel Decoders21
Fundamental Limits of Wireless Caching Under Mixed Cacheable and Uncacheable Traffic21
Several Families of Binary Minimal Linear Codes From Two-to-One Functions21
Detecting an Odd Restless Markov Arm With a Trembling Hand21
On Coding Over Sliced Information21
Robust Mean Estimation in High Dimensions: An Outlier-Fraction Agnostic and Efficient Algorithm20
Online Versus Offline Rate in Streaming Codes for Variable-Size Messages20
A Generic Transformation to Enable Optimal Repair/Access MDS Array Codes With Multiple Repair Degrees20
Small-d MSR Codes With Optimal Access, Optimal Sub-Packetization, and Linear Field Size20
On Single Server Private Information Retrieval With Private Coded Side Information20
Capacity of Noisy Permutation Channels20
Fast Syndrome-Based Chase Decoding of Binary BCH Codes Through Wu List Decoding20
Covering Grassmannian Codes: Bounds and Constructions20
Insertion and Deletion Correction in Polymer-Based Data Storage20
On the Minimum Node Degree and k-Connectivity in Inhomogeneous Random K-Out Graphs20
The Inverse Problem of Positive Autoconvolution20
What is the Largest Sparsity Pattern That Can Be Recovered by 1-Norm Minimization?20
Distributed Sketching for Randomized Optimization: Exact Characterization, Concentration, and Lower Bounds20
Cumulative Residual and Relative Cumulative Residual Fisher Information and Their Properties20
Multi-Marginal Optimal Transport and Probabilistic Graphical Models19
Moderate Deviation Expansion for Fully Quantum Tasks19
New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes19
New Constant Dimension Subspace Codes From the Mixed Dimension Construction19
Optimal Additive Quaternary Codes of Low Dimension18
Universal Densities Exist for Every Finite Reference Measure18
Asymmetric Leaky Private Information Retrieval18
Exploring Quantum Average-Case Distances: Proofs, Properties, and Examples18
Twisted Goppa Codes With an Efficient Decoding Algorithm and Quasi-Cyclic Properties18
On the Capacity of Communication Channels With Memory and Sampled Additive Cyclostationary Gaussian Noise18
Commitment Capacity of Classical-Quantum Channels18
Modulated Sparse Superposition Codes for the Complex AWGN Channel18
Comments on “Generalized Box-Müller Method for Generating q-Gaussian Random Deviates”18
f-Divergences and Their Applications in Lossy Compression and Bounding Generalization Error18
Nearly Minimax-Optimal Regret for Linearly Parameterized Bandits18
Adaptive Social Learning17
Reverse Euclidean and Gaussian Isoperimetric Inequalities for Parallel Sets With Applications17
Quantum CDMA Communication Systems17
WildWood: A New Random Forest Algorithm17
Asymptotic Divergences and Strong Dichotomy17
Optimal Change-Point Detection With Training Sequences in the Large and Moderate Deviations Regimes17
The Broadcast Channel With Degraded Message Sets and Unreliable Conference17
Variable-Length Constrained Coding and Kraft Conditions: The Parity-Preserving Case17
Rack-Aware MSR Codes With Error Correction Capability for Multiple Erasure Tolerance16
Byzantine-Resilient High-Dimensional Federated Learning16
Fast Correlation Attacks on K2 Stream Cipher16
Gray–Wyner and Mutual Information Regions for Doubly Symmetric Binary Sources and Gaussian Sources16
Bounds and Constructions of Parent Identifying Schemes via the Algorithmic Version of the Lovász Local Lemma16
Construction of MDS Euclidean Self-Dual Codes via Two Subsets16
Communication Complexity of Distributed High Dimensional Correlation Testing16
Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification16
Capacity-Achieving Spatially Coupled Sparse Superposition Codes With AMP Decoding16
On Hierarchies of Balanced Sequences16
Secret Key Generation From Vector Gaussian Sources With Public and Private Communications16
Compute-and-Forward in Large Relaying Systems: Limitations and Asymptotically Optimal Scheduling16
Smoothing Codes and Lattices: Systematic Study and New Bounds16
Covert Communication Over Adversarially Jammed Channels16
Provable Identifiability of Two-Layer ReLU Neural Networks via LASSO Regularization16
Asymptotic Performance of Thompson Sampling for Batched Multi-Armed Bandits16
Covert Identification Over Binary-Input Discrete Memoryless Channels16
Finite Sample Improvement of Akaike’s Information Criterion16
Error Exponents in the Bee Identification Problem16
Sharp Variance-Entropy Comparison for Nonnegative Gaussian Quadratic Forms15
A Polynomial Time Algorithm for Constructing Optimal Binary AIFV-2 Codes15
Bayesian Two-Stage Sequential Change Diagnosis via Sensor Arrays15
Discrete Signaling and Treating Interference as Noise for the Gaussian Interference Channel15
Vector Gaussian Successive Refinement With Degraded Side Information15
Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction15
Computer Classification of Linear Codes15
Nonparametric Mixture MLEs Under Gaussian-Smoothed Optimal Transport Distance15
Template Matching and Change Point Detection by M-Estimation15
A Signal-Space Distance Measure for Nondispersive Optical Fiber15
On Communication for Distributed Babai Point Computation15
Quadratic Secret Sharing and Conditional Disclosure of Secrets15
Comments on “Analytical Algorithm for Capacities of Classical and Classical-Quantum Channels”15
Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions15
Asymptotic Optimality in Byzantine Distributed Quickest Change Detection15
Polar Lattices for Lossy Compression15
Replica Analysis of the Linear Model With Markov or Hidden Markov Signal Priors15
Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers15
Uplink-Downlink Duality Between Multiple-Access and Broadcast Channels With Compressing Relays15
A Few Interactions Improve Distributed Nonparametric Estimation, Optimally14
Orthogonal Approximate Message-Passing for Spatially Coupled Linear Models14
Two Applications of Coset Cardinality Spectrum of Distributed Arithmetic Coding14
Existence and Size of the Giant Component in Inhomogeneous Random K-Out Graphs14
Deterministic Identification Over Channels With Power Constraints14
Service Rate Region: A New Aspect of Coded Distributed System Design14
The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields14
A Construction of Maximally Recoverable Codes With Order-Optimal Field Size14
Construction of Protograph-Based LDPC Codes With Chordless Short Cycles14
Almost-Reed–Muller Codes Achieve Constant Rates for Random Errors14
On Lattice Tilings of n by Limited Magnitude Error Balls B(n, 2, 1, 1)14
State-Dependent DMC With a Causal Helper14
The Semiring of Dichotomies and Asymptotic Relative Submajorization14
An Analysis of Transformed Unadjusted Langevin Algorithm for Heavy-Tailed Sampling14
Random Periodic Sampling Patterns for Shift-Invariant Spaces14
Coding for Sequence Reconstruction for Single Edits14
Algorithms for Constructing Balanced Plateaued Functions With Maximal Algebraic Degrees14
Lifted Reed-Solomon Codes and Lifted Multiplicity Codes13
The q-Ary Antiprimitive BCH Codes13
Classification of Binary Combinatorial Metrics Which Admit MacWilliam’s Extension Theorem13
On Universal D-Semifaithful Coding for Memoryless Sources With Infinite Alphabets13
New Lower Bounds for the Minimum Distance of Cyclic Codes and Applications to Locally Repairable Codes13
Sparse Nonnegative Tensor Factorization and Completion With Noisy Observations13
Individually Conditional Individual Mutual Information Bound on Generalization Error13
Fidelity-Based Smooth Min-Relative Entropy: Properties and Applications13
Empirical Risk Minimization With Relative Entropy Regularization13
Self-Dual Convolutional Codes13
Sparse Group Lasso: Optimal Sample Complexity, Convergence Rate, and Statistical Inference13
Zero-Error Distributed Compression of Binary Arithmetic Sum13
The Secrecy Capacity of the Wiretap Channel With Additive Noise and Rate-Limited Help13
Private Index Coding13
Graphs of Joint Types, Noninteractive Simulation, and Stronger Hypercontractivity13
On the Similarity Between von Neumann Graph Entropy and Structural Information: Interpretation, Computation, and Applications13
Max-Linear Regression by Convex Programming13
Entanglement Dynamics From Random Product States: Deviation From Maximal Entanglement13
Reverse Information Projections and Optimal E-Statistics13
Scalable Multi-Round Multi-Party Privacy-Preserving Neural Network Training13
Information-Theoretic Characterizations of Generalization Error for the Gibbs Algorithm13
Lipschitz Bandits With Batched Feedback13
Ideal-Theoretic Explanation of Capacity-Achieving Decoding13
Distributed Secret Sharing Over a Public Channel From Correlated Random Variables13
Signal-to-Noise Ratio Aware Minimaxity and Higher-Order Asymptotics13
Shared Information for a Markov Chain on a Tree13
Quaternary Codes and Their Binary Images13
On Decoding Binary Quasi-Reversible BCH Codes12
The Plotkin-Type Bound on the Generalized Symbol-Pair Weight and Symbol-Pair Equiweight Codes12
Analysis of the Error-Correcting Radius of a Renormalization Decoder for Kitaev’s Toric Code12
The Quantum Multiple-Access Channel With Cribbing Encoders12
Binary Sequences With a Low Correlation via Cyclotomic Function Fields12
Corrections to “Concentration Properties of Random Codes”12
On the Zero-Error Capacity of the Modulo-Additive Noise Channel With Help12
Fundamental Limits of Demand-Private Coded Caching12
Recoverable Systems12
Cache-Aided Matrix Multiplication Retrieval12
Bounds and Constructions for Generalized Batch Codes12
Adaptive Private Distributed Matrix Multiplication12
Advancing the Idea of Probabilistic Neutral Bits: First Key Recovery Attack on 7.5 Round ChaCha12
Privacy-Preserving Average Consensus: Fundamental Analysis and a Generic Framework Design12
Thomson’s Multitaper Method Revisited12
Biprojective Almost Perfect Nonlinear Functions12
Dimension-Free Noninteractive Simulation From Gaussian Sources12
On Rank Energy Statistics via Optimal Transport: Continuity, Convergence, and Change Point Detection12
Algebraic Geometry Codes in the Sum–Rank Metric12
Bent Partitions and LP-Packings12
On the Duals of Generalized Bent Functions11
The BCH Family of Storage Codes on Triangle-Free Graphs and Its Relation to R(3,t)11
Macroscopic Analysis of Vector Approximate Message Passing in a Model-Mismatched Setting11
Corrections to “Optimal Streaming Erasure Codes Over the Three-Node Relay Network”11
The Secret Arithmetic of Patterns: A General Method for Designing Constrained Codes Based on Lexicographic Indexing11
The Feedback Capacity of Noisy Output Is the STate (NOST) Channels11
The Gaussian Multiple Access Wiretap Channel With Selfish Transmitters: A Coalitional Game Theory Perspective11
Fundamental Limits of Reference-Based Sequence Reordering11
Information Rates of the Noisy Nanopore Channel11
Joint Beam Allocation and Scheduling for mmWave Cellular Networks11
SDP Achieves Exact Minimax Optimality in Phase Synchronization11
Competitive Advantage of Huffman and Shannon-Fano Codes11
Tsallis and Rényi Deformations Linked via a New λ-Duality11
Active Learning via Predictive Normalized Maximum Likelihood Minimization11
Quantum Pufferfish Privacy: A Flexible Privacy Framework for Quantum Systems11
Sum-GDoF of Symmetric Multi-Hop Interference Channel Under Finite Precision CSIT Using Aligned-Images Sum-Set Inequalities11
A Faster Software Implementation of SQIsign11
Multiple-Layer Integrated Interleaved Codes: A Class of Hierarchical Locally Recoverable Codes11
Constructing New APN Functions Through Relative Trace Functions10
Sequence Pairs With Lowest Combined Autocorrelation and Crosscorrelation10
Generalized Nearest Neighbor Decoding10
Source Coding for Synthesizing Correlated Randomness10
Spherical Codes With Prescribed Signed Permutation Automorphisms Inside Shells of Low-Dimensional Integer Lattices10
Kernel Stein Discrepancy on Lie Groups: Theory and Applications10
Combinatorial Constructions of Optimal Quaternary Additive Codes10
Reliable Simulation of Quantum Channels: The Error Exponent10
Minimum Energy Analysis for Robust Gaussian Joint Source-Channel Coding With a Distortion-Noise Profile10
Double Multilevel Constructions for Constant Dimension Codes10
Bayes-Optimal Estimation in Generalized Linear Models via Spatial Coupling10
Duality Between Source Coding With Quantum Side Information and Classical-Quantum Channel Coding10
Unifying the Brascamp-Lieb Inequality and the Entropy Power Inequality10
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free10
Covariance-Based Activity Detection in Cooperative Multi-Cell Massive MIMO: Scaling Law and Efficient Algorithms10
0.067761898040771