Pub Date : 2025-12-08DOI: 10.1109/TIT.2025.3641166
Aytijhya Saha;Aaditya Ramdas
We propose an e-value based framework for testing arbitrary composite nulls against composite alternatives, when an $epsilon $ fraction of the data can be arbitrarily corrupted. Our tests are inherently sequential, being valid at arbitrary data-dependent stopping times, but they are new even for fixed sample sizes, giving type-I error control without any regularity conditions. We first prove that least favourable distribution (LFD) pairs, when they exist, yield optimal e-values for testing arbitrary composite nulls against composite alternatives. Then we show that if an LFD pair exists for some composite null and alternative, then the LFDs of Huber’s $epsilon $ -contamination or total variation (TV) neighborhoods around that specific pair form the optimal LFD pair for the corresponding robustified composite hypotheses. Furthermore, where LFDs do not exist, we develop new robust composite tests for general settings. Our test statistics are a nonnegative supermartingale under the (robust) null, even under a sequentially adaptive (non-i.i.d.) contamination model where the conditional distribution of each observation given the past data lies within an $epsilon $ TV ball of some distribution in the original composite null. When LFDs exist, our supermartingale grows to infinity exponentially fast under any distribution in the ($epsilon $ TV-corruption of the) alternative at the optimal rate. When LFDs do not exist, we provide an asymptotic growth rate analysis, showing that as $epsilon to 0$ , the exponent converges to the corresponding Kullback–Leibler divergence, recovering the classical optimal non-robust rate. Simulations validate the theory and demonstrate reasonable practical performance.
{"title":"Huber-Robust Likelihood Ratio Tests for Composite Nulls and Alternatives","authors":"Aytijhya Saha;Aaditya Ramdas","doi":"10.1109/TIT.2025.3641166","DOIUrl":"https://doi.org/10.1109/TIT.2025.3641166","url":null,"abstract":"We propose an e-value based framework for testing arbitrary composite nulls against composite alternatives, when an <inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula> fraction of the data can be arbitrarily corrupted. Our tests are inherently sequential, being valid at arbitrary data-dependent stopping times, but they are new even for fixed sample sizes, giving type-I error control without any regularity conditions. We first prove that least favourable distribution (LFD) pairs, when they exist, yield optimal e-values for testing arbitrary composite nulls against composite alternatives. Then we show that if an LFD pair exists for some composite null and alternative, then the LFDs of Huber’s <inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula>-contamination or total variation (TV) neighborhoods around that specific pair form the optimal LFD pair for the corresponding robustified composite hypotheses. Furthermore, where LFDs do not exist, we develop new robust composite tests for general settings. Our test statistics are a nonnegative supermartingale under the (robust) null, even under a sequentially adaptive (non-i.i.d.) contamination model where the conditional distribution of each observation given the past data lies within an <inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula> TV ball of some distribution in the original composite null. When LFDs exist, our supermartingale grows to infinity exponentially fast under any distribution in the (<inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula> TV-corruption of the) alternative at the optimal rate. When LFDs do not exist, we provide an asymptotic growth rate analysis, showing that as <inline-formula> <tex-math>$epsilon to 0$ </tex-math></inline-formula>, the exponent converges to the corresponding Kullback–Leibler divergence, recovering the classical optimal non-robust rate. Simulations validate the theory and demonstrate reasonable practical performance.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"501-520"},"PeriodicalIF":2.9,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-08DOI: 10.1109/TIT.2025.3641527
Rémi A. Chou
Information-theoretically secure Symmetric Private Information Retrieval (SPIR) from a single server is known to be infeasible over noiseless channels. Known solutions to overcome this infeasibility involve additional resources such as database replication, shared randomness, or noisy channels. In this paper, we propose an alternative approach for achieving SPIR with information-theoretic security guarantees, without relying on shared randomness, noisy channels, or data replication. Specifically, we demonstrate that it is sufficient to use a noiseless binary adder multiple-access channel, where inputs are controlled by two non-colluding servers and the output is observed by the client, alongside a public noiseless communication channel between the client and the servers. Furthermore, in this setting, we characterize the optimal file rates, i.e., the file lengths normalized by the number of channel uses, that can be transferred.
{"title":"Dual-Source SPIR Over a Noiseless MAC Without Data Replication or Shared Randomness","authors":"Rémi A. Chou","doi":"10.1109/TIT.2025.3641527","DOIUrl":"https://doi.org/10.1109/TIT.2025.3641527","url":null,"abstract":"Information-theoretically secure Symmetric Private Information Retrieval (SPIR) from a single server is known to be infeasible over noiseless channels. Known solutions to overcome this infeasibility involve additional resources such as database replication, shared randomness, or noisy channels. In this paper, we propose an alternative approach for achieving SPIR with information-theoretic security guarantees, without relying on shared randomness, noisy channels, or data replication. Specifically, we demonstrate that it is sufficient to use a noiseless binary adder multiple-access channel, where inputs are controlled by two non-colluding servers and the output is observed by the client, alongside a public noiseless communication channel between the client and the servers. Furthermore, in this setting, we characterize the optimal file rates, i.e., the file lengths normalized by the number of channel uses, that can be transferred.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1364-1377"},"PeriodicalIF":2.9,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-05DOI: 10.1109/TIT.2025.3637800
Tingting Tong;Sihuang Hu
The error coefficient of a linear code, defined as the number of its minimum weight codewords, is a key performance metric to evaluate codes with a given length, dimension, and minimum distance. In this paper, we propose novel approaches, different from existing methods, to produce three new families of binary optimal linear codes with the smallest possible error coefficients. These codes are known as asymptotic frame error rate (AFER)-optimal codes, achieving the best known performance in the additive white Gaussian noise channel and under maximum-likelihood decoding. In particular, we solve a conjecture originally proposed by Li et al. (2025).
{"title":"Three New Families of Binary AFER-Optimal Linear Codes","authors":"Tingting Tong;Sihuang Hu","doi":"10.1109/TIT.2025.3637800","DOIUrl":"https://doi.org/10.1109/TIT.2025.3637800","url":null,"abstract":"The error coefficient of a linear code, defined as the number of its minimum weight codewords, is a key performance metric to evaluate codes with a given length, dimension, and minimum distance. In this paper, we propose novel approaches, different from existing methods, to produce three new families of binary optimal linear codes with the smallest possible error coefficients. These codes are known as asymptotic frame error rate (AFER)-optimal codes, achieving the best known performance in the additive white Gaussian noise channel and under maximum-likelihood decoding. In particular, we solve a conjecture originally proposed by Li et al. (2025).","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"374-382"},"PeriodicalIF":2.9,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-04DOI: 10.1109/TIT.2025.3640111
Buji Xu;Junhong Nie;Xiaoming Sun
Quantum oracles are widely adopted in problems, like query oracle in Grover’s algorithm, cipher in quantum cryptanalytic and data encoder in quantum machine learning. Notably, the bit-flip oracle, capable of flipping the state based on a given classical function, emerges as a fundamental component in the design and construction of quantum algorithms. Devising methods to optimally implement the bit-flip oracle essentially translates to the efficient synthesis of reversible functions. Prior research has primarily focused on the qubit model, leaving the higher dimensional systems, i.e. qudit model, largely unexplored. By allowing more than two computational bases, qudit model can fully utilize the multi-level nature of the underlying physical mechanism. We propose a method to synthesize even permutations in $A_{d^{n}}$ using $Theta (d)~(n - 1)$ -qudit sub-circuits, which achieve asymptotic optimality in the count of sub-circuits. Moreover, we introduce a technique for synthesizing reversible functions employing $Oleft ({{ n d^{n} }}right)$ two-qudit gates and only a single ancilla. This is asymptotically tight in terms of d and asymptotically almost tight in terms of n.
量子预言机被广泛应用于问题中,如Grover算法中的查询预言机,量子密码分析中的密码,量子机器学习中的数据编码器。值得注意的是,比特翻转预言机能够根据给定的经典函数翻转状态,成为量子算法设计和构建的基本组成部分。设计方法来最佳地实现位翻转oracle本质上转化为可逆函数的有效合成。先前的研究主要集中在量子位模型上,而对更高维度的系统,即量子位模型,基本上没有进行探索。通过允许两个以上的计算基,qudit模型可以充分利用底层物理机制的多层次特性。提出了一种利用$Theta (d)~(n - 1)$ -qudit子电路合成$A_{d^{n}}$中偶排列的方法,该方法在子电路的数量上达到渐近最优性。此外,我们还介绍了一种利用$Oleft ({{ n d^{n} }}right)$双量子位门和单个辅助器件合成可逆函数的技术。它对于d是渐近紧的对于n也是渐近紧的。
{"title":"Almost Optimal Synthesis of Reversible Function in Qudit Model","authors":"Buji Xu;Junhong Nie;Xiaoming Sun","doi":"10.1109/TIT.2025.3640111","DOIUrl":"https://doi.org/10.1109/TIT.2025.3640111","url":null,"abstract":"Quantum oracles are widely adopted in problems, like query oracle in Grover’s algorithm, cipher in quantum cryptanalytic and data encoder in quantum machine learning. Notably, the bit-flip oracle, capable of flipping the state based on a given classical function, emerges as a fundamental component in the design and construction of quantum algorithms. Devising methods to optimally implement the bit-flip oracle essentially translates to the efficient synthesis of reversible functions. Prior research has primarily focused on the qubit model, leaving the higher dimensional systems, i.e. qudit model, largely unexplored. By allowing more than two computational bases, qudit model can fully utilize the multi-level nature of the underlying physical mechanism. We propose a method to synthesize even permutations in <inline-formula> <tex-math>$A_{d^{n}}$ </tex-math></inline-formula> using <inline-formula> <tex-math>$Theta (d)~(n - 1)$ </tex-math></inline-formula>-qudit sub-circuits, which achieve asymptotic optimality in the count of sub-circuits. Moreover, we introduce a technique for synthesizing reversible functions employing <inline-formula> <tex-math>$Oleft ({{ n d^{n} }}right)$ </tex-math></inline-formula> two-qudit gates and only a single ancilla. This is asymptotically tight in terms of <italic>d</i> and asymptotically almost tight in terms of <italic>n</i>.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1201-1211"},"PeriodicalIF":2.9,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-03DOI: 10.1109/TIT.2025.3639922
Steffen Grünewälder;Azadeh Khaleghi
We propose methods to estimate the $beta $ -mixing coefficients of a real-valued geometrically ergodic Markov process from a single sample-path $X_{0},X_{1}, {dots },X_{n-1}$ . Under standard smoothness conditions on the densities, namely, that the joint density of the pair $(X_{0},X_{m})$ for each m lies in a Besov space $B^{s}_{1,infty }(mathbb {R}^{2})$ for some known $sgt 0$ , we obtain a rate of convergence of order $mathcal {O}(log (n) n^{-[s]/(2[s]+2)})$ for the expected error of our estimator in this case; we use $[s]$ to denote the integer part of the decomposition $s=[s]+{s}$ of $s in (0,infty)$ into an integer term and a strictly positive remainder term ${s} in (0,1$ ]. We complement this result with a high-probability bound on the estimation error, and further obtain analogues of these bounds in the case where the state-space is finite. Naturally no density assumptions are required in this setting; the expected error rate is shown to be of order $mathcal {O}(log (n) n^{-1/2})$ . The theoretical results are complemented with empirical evaluations.
我们提出了从单个样本路径$X_{0},X_{1}, {dots },X_{n-1}$估计实值几何遍历马尔可夫过程的$beta $ -混合系数的方法。在密度的标准平滑条件下,即对于某个已知的$sgt 0$,对于每个m的对的联合密度$(X_{0},X_{m})$在Besov空间$B^{s}_{1,infty }(mathbb {R}^{2})$中,我们得到了在这种情况下估计器的期望误差的收敛率为$mathcal {O}(log (n) n^{-[s]/(2[s]+2)})$阶;我们使用$[s]$来表示分解$s=[s]+{s}$的整数部分,将$s in (0,infty)$分解为整数项和严格正余数项${s} in (0,1$]。我们用估计误差的高概率界来补充这个结果,并进一步在状态空间有限的情况下得到这些界的类似物。当然,在这种设置中不需要密度假设;预期错误率显示为$mathcal {O}(log (n) n^{-1/2})$级。理论结果与实证评价相辅相成。
{"title":"Estimating the Mixing Coefficients of Geometrically Ergodic Markov Processes","authors":"Steffen Grünewälder;Azadeh Khaleghi","doi":"10.1109/TIT.2025.3639922","DOIUrl":"https://doi.org/10.1109/TIT.2025.3639922","url":null,"abstract":"We propose methods to estimate the <inline-formula> <tex-math>$beta $ </tex-math></inline-formula>-mixing coefficients of a real-valued geometrically ergodic Markov process from a single sample-path <inline-formula> <tex-math>$X_{0},X_{1}, {dots },X_{n-1}$ </tex-math></inline-formula>. Under standard smoothness conditions on the densities, namely, that the joint density of the pair <inline-formula> <tex-math>$(X_{0},X_{m})$ </tex-math></inline-formula> for each <italic>m</i> lies in a Besov space <inline-formula> <tex-math>$B^{s}_{1,infty }(mathbb {R}^{2})$ </tex-math></inline-formula> for some known <inline-formula> <tex-math>$sgt 0$ </tex-math></inline-formula>, we obtain a rate of convergence of order <inline-formula> <tex-math>$mathcal {O}(log (n) n^{-[s]/(2[s]+2)})$ </tex-math></inline-formula> for the expected error of our estimator in this case; we use <inline-formula> <tex-math>$[s]$ </tex-math></inline-formula> to denote the integer part of the decomposition <inline-formula> <tex-math>$s=[s]+{s}$ </tex-math></inline-formula> of <inline-formula> <tex-math>$s in (0,infty)$ </tex-math></inline-formula> into an integer term and a <italic>strictly positive</i> remainder term <inline-formula> <tex-math>${s} in (0,1$ </tex-math></inline-formula>]. We complement this result with a high-probability bound on the estimation error, and further obtain analogues of these bounds in the case where the state-space is finite. Naturally no density assumptions are required in this setting; the expected error rate is shown to be of order <inline-formula> <tex-math>$mathcal {O}(log (n) n^{-1/2})$ </tex-math></inline-formula>. The theoretical results are complemented with empirical evaluations.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1305-1318"},"PeriodicalIF":2.9,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-02DOI: 10.1109/TIT.2025.3639289
Han Fang;Nan Liu;Wei Kang
We consider the secure coded caching problem proposed by Ravindrakumar et al. where no user can obtain information about files other than the one requested. We first propose three new schemes for 1) the general case with arbitrary N files and K users; 2) cache size $ M=1$ , $N=2$ files and arbitrary K users; and 3) worst-case delivery rate $ R=1 $ , arbitrary N files and K users, respectively. Then we derive some new converse results for 1) the general case with arbitrary N files and K users; 2) cache size $M=1$ with arbitrary N files and K users; 3) worst-case delivery rate $R=1$ with arbitrary N files and K users; and 4) cache size $M in left [{{1, frac {K}{K-1}}}right]$ with $N=2$ files and arbitrary K users. As a result, we obtain 1) the two exact end-points for the optimal memory-rate tradeoff curve for arbitrary number of users and files; 2) a segment of the optimal memory-rate tradeoff curve, where $M in left [{{1, frac {K}{K-1}}}right]$ , for the case of $N=2$ files and arbitrary number of users; and 3) a multiplicative-gap-10 result, i.e., we show that the proposed achievable schemes achieve a ratio less than 10 with respect to the cut-set bound.
我们考虑Ravindrakumar等人提出的安全编码缓存问题,其中用户无法获取除请求文件以外的文件信息。我们首先针对1)任意N个文件和K个用户的一般情况提出了三种新方案;2)缓存大小$ M=1$、$N=2$文件和任意K用户;最差投递率$ R=1 $,任意N个文件和K个用户。然后,我们为1)任意N个文件和K个用户的一般情况导出了一些新的相反结果;2)任意N个文件和K个用户的缓存大小$M=1$;3)任意N个文件、K个用户的最坏投递率$R=1$;4)缓存大小$M in left [{{1, frac {K}{K-1}}}right]$与$N=2$文件和任意K用户。结果,我们得到1)任意数量的用户和文件的最优内存率权衡曲线的两个确切的端点;2)一段最优内存率权衡曲线,其中$M in left [{{1, frac {K}{K-1}}}right]$,对于$N=2$文件和任意数量的用户;3)一个乘法-gap-10的结果,即我们证明了所提出的可实现方案相对于切集界的比率小于10。
{"title":"Secure Coded Caching: Exact End-Points and Tighter Bounds","authors":"Han Fang;Nan Liu;Wei Kang","doi":"10.1109/TIT.2025.3639289","DOIUrl":"https://doi.org/10.1109/TIT.2025.3639289","url":null,"abstract":"We consider the secure coded caching problem proposed by Ravindrakumar et al. where no user can obtain information about files other than the one requested. We first propose three new schemes for 1) the general case with arbitrary <italic>N</i> files and <italic>K</i> users; 2) cache size <inline-formula> <tex-math>$ M=1$ </tex-math></inline-formula>, <inline-formula> <tex-math>$N=2$ </tex-math></inline-formula> files and arbitrary <italic>K</i> users; and 3) worst-case delivery rate <inline-formula> <tex-math>$ R=1 $ </tex-math></inline-formula>, arbitrary <italic>N</i> files and <italic>K</i> users, respectively. Then we derive some new converse results for 1) the general case with arbitrary <italic>N</i> files and <italic>K</i> users; 2) cache size <inline-formula> <tex-math>$M=1$ </tex-math></inline-formula> with arbitrary <italic>N</i> files and <italic>K</i> users; 3) worst-case delivery rate <inline-formula> <tex-math>$R=1$ </tex-math></inline-formula> with arbitrary <italic>N</i> files and <italic>K</i> users; and 4) cache size <inline-formula> <tex-math>$M in left [{{1, frac {K}{K-1}}}right]$ </tex-math></inline-formula> with <inline-formula> <tex-math>$N=2$ </tex-math></inline-formula> files and arbitrary <italic>K</i> users. As a result, we obtain 1) the two exact end-points for the optimal memory-rate tradeoff curve for arbitrary number of users and files; 2) a segment of the optimal memory-rate tradeoff curve, where <inline-formula> <tex-math>$M in left [{{1, frac {K}{K-1}}}right]$ </tex-math></inline-formula>, for the case of <inline-formula> <tex-math>$N=2$ </tex-math></inline-formula> files and arbitrary number of users; and 3) a multiplicative-gap-10 result, i.e., we show that the proposed achievable schemes achieve a ratio less than 10 with respect to the cut-set bound.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"636-663"},"PeriodicalIF":2.9,"publicationDate":"2025-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-01DOI: 10.1109/TIT.2025.3639191
Yuefeng Han;Likai Chen;Wei Biao Wu
High-dimensional vector autoregressive (VAR) models have numerous applications in fields such as econometrics, biology, climatology, among others. While prior research has mainly focused on linear VAR models, these approaches can be restrictive in practice. To address this, we introduce a high-dimensional non-parametric sparse additive model, providing a more flexible framework. Our method employs basis expansions to construct high-dimensional nonlinear VAR models. We derive convergence rates and model selection consistency for least squared estimators, considering dependence measures of the processes, error moment conditions, sparsity, and basis expansions. Our theory significantly extends prior linear VAR models by incorporating both non-Gaussianity and non-linearity. As a key contribution, we derive sharp Bernstein-type inequalities for tail probabilities in both non-sub-Gaussian linear and nonlinear VAR processes, which match the classical Bernstein inequality for independent random variables. Additionally, we present numerical experiments that support our theoretical findings and demonstrate the advantages of the nonlinear VAR model for a gene expression time series dataset.
{"title":"Estimation of High-Dimensional Nonlinear Vector Autoregressive Models","authors":"Yuefeng Han;Likai Chen;Wei Biao Wu","doi":"10.1109/TIT.2025.3639191","DOIUrl":"https://doi.org/10.1109/TIT.2025.3639191","url":null,"abstract":"High-dimensional vector autoregressive (VAR) models have numerous applications in fields such as econometrics, biology, climatology, among others. While prior research has mainly focused on linear VAR models, these approaches can be restrictive in practice. To address this, we introduce a high-dimensional non-parametric sparse additive model, providing a more flexible framework. Our method employs basis expansions to construct high-dimensional nonlinear VAR models. We derive convergence rates and model selection consistency for least squared estimators, considering dependence measures of the processes, error moment conditions, sparsity, and basis expansions. Our theory significantly extends prior linear VAR models by incorporating both non-Gaussianity and non-linearity. As a key contribution, we derive sharp Bernstein-type inequalities for tail probabilities in both non-sub-Gaussian linear and nonlinear VAR processes, which match the classical Bernstein inequality for independent random variables. Additionally, we present numerical experiments that support our theoretical findings and demonstrate the advantages of the nonlinear VAR model for a gene expression time series dataset.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"521-541"},"PeriodicalIF":2.9,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monooxygenase DBH like 1 knockdown suppresses the proliferation and xenograft tumor growth of osteosarcoma cells via inducing apoptosis.","authors":"Xingwen Han, Jingjing He, Zhan Wang, Zhongtian Bai, Wenji Wang, Xun Li","doi":"10.23736/S0031-0808.19.03717-0","DOIUrl":"10.23736/S0031-0808.19.03717-0","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"61 1","pages":"259-260"},"PeriodicalIF":2.9,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84891139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An analytical framework integrating performance characterization and coding theory is proposed to mitigate sneak path (SP) interference in resistive random-access memory (ReRAM) crossbar arrays. The core innovation is identified in the mathematical decomposition of ReRAM’s non-ergodic data-dependent channel into multiple stationary memoryless subchannels. Through information-theoretic analysis, an approximate finite-length characterization of the theoretical lower bound for decoding word error probability (WEP) is established. This is achieved by systematically analyzing the SP occurrence rate in constrained array geometries combined with comprehensive evaluation of both mutual information and dispersion metrics across the decomposed channel components. Building upon this decomposition paradigm, a systematic code construction methodology is developed using density evolution principles for sparse-graph code design. The designed codes not only exhibit capacity-approaching decoding thresholds but also yield word error rate simulation results that are close to the derived WEP bound under practical crossbar configurations.
{"title":"Performance Analysis and Code Design for Resistive Random-Access Memory Using Channel Decomposition Approach","authors":"Guanghui Song;Meiru Gao;Ying Li;Bin Dai;Kui Cai;Lin Zhou","doi":"10.1109/TIT.2025.3638148","DOIUrl":"https://doi.org/10.1109/TIT.2025.3638148","url":null,"abstract":"An analytical framework integrating performance characterization and coding theory is proposed to mitigate sneak path (SP) interference in resistive random-access memory (ReRAM) crossbar arrays. The core innovation is identified in the mathematical decomposition of ReRAM’s non-ergodic data-dependent channel into multiple stationary memoryless subchannels. Through information-theoretic analysis, an approximate finite-length characterization of the theoretical lower bound for decoding word error probability (WEP) is established. This is achieved by systematically analyzing the SP occurrence rate in constrained array geometries combined with comprehensive evaluation of both mutual information and dispersion metrics across the decomposed channel components. Building upon this decomposition paradigm, a systematic code construction methodology is developed using density evolution principles for sparse-graph code design. The designed codes not only exhibit capacity-approaching decoding thresholds but also yield word error rate simulation results that are close to the derived WEP bound under practical crossbar configurations.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"358-373"},"PeriodicalIF":2.9,"publicationDate":"2025-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-26DOI: 10.1109/TIT.2025.3637364
Sara Saeidian;Leonhard Grosse;Parastoo Sadeghi;Mikael Skoglund;Tobias J. Oechtering
This paper explores the implications of guaranteeing privacy by imposing a lower bound on the information density between the private and the public data. We introduce a novel and operationally meaningful privacy measure called pointwise maximal cost (PMC) and demonstrate that imposing an upper bound on PMC is equivalent to enforcing a lower bound on the information density. PMC quantifies the information leakage about a secret to adversaries who aim to minimize non-negative cost functions after observing the outcome of a privacy mechanism. When restricted to finite alphabets, PMC can equivalently be defined as the information leakage to adversaries aiming to minimize the probability of incorrectly guessing randomized functions of the secret. We study the properties of PMC and apply it to standard privacy mechanisms to demonstrate its practical relevance. Through a detailed examination, we connect PMC with other privacy measures that impose upper or lower bounds on the information density. These are pointwise maximal leakage (PML), local differential privacy (LDP), and (asymmetric) local information privacy. In particular, we show that a mechanism satisfies LDP if and only if it has both bounded PMC and bounded PML. Overall, our work fills a conceptual and operational gap in the taxonomy of privacy measures, bridges existing disconnects between different frameworks, and offers insights for selecting a suitable notion of privacy in a given application.
{"title":"Information Density Bounds for Privacy","authors":"Sara Saeidian;Leonhard Grosse;Parastoo Sadeghi;Mikael Skoglund;Tobias J. Oechtering","doi":"10.1109/TIT.2025.3637364","DOIUrl":"https://doi.org/10.1109/TIT.2025.3637364","url":null,"abstract":"This paper explores the implications of guaranteeing privacy by imposing a lower bound on the information density between the private and the public data. We introduce a novel and operationally meaningful privacy measure called <italic>pointwise maximal cost</i> (PMC) and demonstrate that imposing an upper bound on PMC is equivalent to enforcing a lower bound on the information density. PMC quantifies the information leakage about a secret to adversaries who aim to minimize non-negative cost functions after observing the outcome of a privacy mechanism. When restricted to finite alphabets, PMC can equivalently be defined as the information leakage to adversaries aiming to minimize the probability of incorrectly guessing randomized functions of the secret. We study the properties of PMC and apply it to standard privacy mechanisms to demonstrate its practical relevance. Through a detailed examination, we connect PMC with other privacy measures that impose upper or lower bounds on the information density. These are pointwise maximal leakage (PML), local differential privacy (LDP), and (asymmetric) local information privacy. In particular, we show that a mechanism satisfies LDP if and only if it has both bounded PMC and bounded PML. Overall, our work fills a conceptual and operational gap in the taxonomy of privacy measures, bridges existing disconnects between different frameworks, and offers insights for selecting a suitable notion of privacy in a given application.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"610-635"},"PeriodicalIF":2.9,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11269864","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}