2022 IEEE International Symposium on Information Theory (ISIT)


Book Description

IEEE International Symposium on Information Theory (ISIT) is the premier international conference dedicated to the advancement of information theory and related areas It brings together an international community of researchers and practitioners each year in the field of information theory to present and discuss new research results and perspectives on future developments relevant to all areas of information theory, including big data analytics, source and channel coding, communication theory and systems, cryptography and security, detection and estimation, emerging applications, networks, network coding information theory, signal processing, and statistical machine learning







Information Theory, Mathematical Optimization, and Their Crossroads in 6G System Design


Book Description

This book provides a broad understanding of the fundamental tools and methods from information theory and mathematical programming, as well as specific applications in 6G and beyond system designs. The contents focus on not only both theories but also their intersection in 6G. Motivations are from the multitude of new developments which will arise once 6G systems integrate new communication networks with AIoT (Artificial Intelligence plus Internet of Things). Design issues such as the intermittent connectivity, low latency, federated learning, IoT security, etc., are covered. This monograph provides a thorough picture of new results from information and optimization theories, as well as how their dialogues work to solve aforementioned 6G design issues.




Next Generation Multiple Access


Book Description

Highly comprehensive resource investigating how next-generation multiple access (NGMA) relates to unrestricted global connection, business requirements, and sustainable wireless networks Next Generation Multiple Access is a comprehensive, state-of-the-art, and approachable guide to the fundamentals and applications of next-generation multiple access (NGMA) schemes, guiding the future development of industries, government requirements, and military utilization of multiple access systems for wireless communication systems and providing various application scenarios to fit practical case studies. The scope and depth of this book are balanced for both beginners to advanced users. Additional references are provided for readers who wish to learn more details about certain subjects. Applications of NGMA outside of communications, including data and computing assisted by machine learning, protocol designs, and others, are also covered. Written by four leading experts in the field, Next Generation Multiple Access includes information on: Foundation and application scenarios for non-orthogonal multiple access (NOMA) systems, including modulation, detection, power allocation, and resource management NOMA’s interaction with alternate applications such as satellite communication systems, terrestrial-satellite communication systems, and integrated sensing Collision resolution, compressed sensing aided massive access, latency management, deep learning enabled massive access, and energy harvesting Holographic-pattern division multiple access, over-the-air transmission, multi-dimensional multiple access, sparse signal detection, and federated meta-learning assisted resource management Next Generation Multiple Access is an essential reference for those who are interested in discovering practical solutions using NGMA technology, including researchers, engineers, and graduate students in the disciplines of information engineering, telecommunications engineering, and computer engineering.




Analytic Information Theory


Book Description

Aimed at graduate students and researchers interested in information theory and the analysis of algorithms, this book explores problems of information and learning theory, demonstrating how to use tools from analytic combinatorics to discover and analyze precise behavior of source codes.




Sampling, Approximation, and Signal Analysis


Book Description

During his long and distinguished career, J. Rowland Higgins (1935-2020) made a substantial impact on many mathematical fields through his work on sampling theory, his deep knowledge of its history, and his service to the community. This volume is a tribute to his work and legacy, featuring chapters written by distinguished mathematicians that explore cutting-edge research in sampling, approximation, signal analysis, and other related areas. An introductory chapter provides a biography of Higgins that explores his rich and unique life, along with a bibliography of his papers; a brief history of the SampTA meetings – of which he was a Founding Member – is also included. The remaining articles are grouped into four sections – classical sampling, theoretical extensions, frame theory, and applications of sampling theory – and explore Higgins’ contributions to these areas, as well as some of the latest developments.




Age of Information


Book Description

A comprehensive treatment of Age of Information, this cutting-edge text includes detailed exposition and real-world applications.




Advances in Artificial Intelligence and Security


Book Description

The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security.




Internet of Things Vulnerabilities and Recovery Strategies


Book Description

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to: Data Routing Data Integrity Device Supervision IoT Integration Information Storage IoT Performance The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.




Public-key Cryptography -- PKC 2024


Book Description

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15-17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.