https://arxiv.org/api/0nFPvWC2Z1bDxqs5ko9pZFldnN42026-03-20T10:45:07Z535211515http://arxiv.org/abs/2603.18318v1Efficient Soft-Output Guessing for Enhanced Quantum Tanner Code Decoding2026-03-18T22:00:57ZWe introduce a generalized low-density parity-check decoding framework for quantum Tanner codes utilizing soft-output guessing random additive noise decoding (SOGRAND). By soft-output decoding entire component codes, we mitigate trapping sets and cycles, resulting in improved convergence. SOGRAND, combined with ordered statistic decoding (OSD) post-processing, outperforms the standard belief propagation plus OSD baseline by up to three orders of magnitude in logical error rate, providing a way forward for scalable decoding of the emerging class of Tanner-code-based quantum codes.2026-03-18T22:00:57ZLukas RappMuriel MédardEugene TangKen R. Duffyhttp://arxiv.org/abs/2602.02469v2Age-Aware Edge-Blind Federated Learning via Over-the-Air Aggregation2026-03-18T21:16:51ZWe study federated learning (FL) over wireless fading channels where multiple devices simultaneously send their model updates. We propose an efficient age-aware edge-blind over-the-air FL approach that does not require channel state information (CSI) at the devices. Instead, the parameter server (PS) uses multiple antennas and applies maximum-ratio combining (MRC) based on its estimated sum of the channel gains to detect the parameter updates. A key challenge is that the number of orthogonal subcarriers is limited; thus, transmitting many parameters requires multiple Orthogonal Frequency Division Multiplexing (OFDM) symbols, which increases latency. To address this, the PS selects only a small subset of model coordinates each round using AgeTop-k, which first picks the largest-magnitude entries and then chooses the k coordinates with the longest waiting times since they were last selected. This ensures that all selected parameters fit into a single OFDM symbol, reducing latency. We provide a convergence bound that highlights the advantages of using a higher number of antenna array elements and demonstrates a key trade-off: increasing k decreases compression error at the cost of increasing the effect of channel noise. Experimental results show that (i) more PS antennas greatly improve accuracy and convergence speed; (ii) AgeTop-k outperforms random selection under relatively good channel conditions; and (iii) the optimum k depends on the channel, with smaller k being better in noisy settings.2026-02-02T18:50:51ZTo appear in IEEE ICC 2026Ahmed M. ElshazlyAhmed Arafahttp://arxiv.org/abs/2603.18254v1Computation-Utility-Privacy Tradeoffs in Bayesian Estimation2026-03-18T20:20:58ZBayesian methods lie at the heart of modern data science and provide a powerful scaffolding for estimation in data-constrained settings and principled quantification and propagation of uncertainty. Yet in many real-world use cases where these methods are deployed, there is a natural need to preserve the privacy of the individuals whose data is being scrutinized. While a number of works have attempted to approach the problem of differentially private Bayesian estimation through either reasoning about the inherent privacy of the posterior distribution or privatizing off-the-shelf Bayesian methods, these works generally do not come with rigorous utility guarantees beyond low-dimensional settings. In fact, even for the prototypical tasks of Gaussian mean estimation and linear regression, it was unknown how close one could get to the Bayes-optimal error with a private algorithm, even in the simplest case where the unknown parameter comes from a Gaussian prior. In this work, we give the first efficient algorithms for both of these problems that achieve mean-squared error $(1+o(1))\mathrm{OPT}$ and additionally show that both tasks exhibit an intriguing computational-statistical gap. For Bayesian mean estimation, we prove that the excess risk achieved by our method is optimal among all efficient algorithms within the low-degree framework, yet is provably worse than what is achievable by an exponential-time algorithm. For linear regression, we prove a qualitatively similar lower bound. Our algorithms draw upon the privacy-to-robustness framework of arXiv:2212.05015, but with the curious twist that to achieve private Bayes-optimal estimation, we need to design sum-of-squares-based robust estimators for inherently non-robust objects like the empirical mean and OLS estimator. Along the way we also add to the sum-of-squares toolkit a new kind of constraint based on short-flat decompositions.2026-03-18T20:20:58ZTo appear at STOC 2026Sitan ChenJingqiu DingMahbod MajidWalter McKelviehttp://arxiv.org/abs/2603.18243v1Why Eight Percent of Benford Sequences Never Converge2026-03-18T19:59:56ZWe study multi-digit correlations in Benford sequences b^n for integer bases 2 <= b <= 1000, measuring dependence via conditional mutual information (CMI). A resonance ratio derived from the continued fraction expansion of log_10(b) classifies bases into convergent and persistent regimes (Theorem 3.13): among 996 bases surveyed, 84 (8.4%) exhibit persistent correlations at sample depth N = 10,000, and extended computation to N = 200,000 confirms 53 (5.3%) as genuinely persistent. We prove that CMI deviation is bounded by the distribution error (Theorem 3.4); exhaustive computation across 2,988 test cases confirms that the effective scaling is quadratic, yielding a two-sided rate beta = 2 for bounded-type bases (conditional on a computationally verified Hessian positivity condition). The observed effective exponent across 774 convergent bases is beta_eff = 1.72 +/- 0.19, consistent with finite-sample corrections to the asymptotic rate. We conjecture that the persistence rate converges to 1/12, a prediction grounded in the Gauss-Kuzmin distribution of partial quotients. For persistent bases, the convergence threshold N_epsilon exceeds 10^6 at standard precision, rendering the asymptotic limit observationally irrelevant within our computational scope.2026-03-18T19:59:56Z35 pages, 5 figures; 35-page Supplementary Information (ancillary file); code at https://github.com/machyman/hyman2026eightJames M. Hymanhttp://arxiv.org/abs/2603.18240v1Achievable DoF Bounds for Cache-Aided Asymmetric MIMO Communications2026-03-18T19:47:32ZThis is an extended journal version of the conference paper published in ISIT 2025; submitted to IEEE Transactions on Communications (TCOM). Integrating coded caching (CC) into multiple-input multiple-output (MIMO) communications significantly enhances the achievable degrees of freedom (DoF). This paper investigates a practical cache-aided asymmetric MIMO configuration with cache ratio $γ$, where a server with $L$ transmit antennas communicates with $K$ users. The users are partitioned into $J$ groups, and each user in group $j$ has $G_j$ receive antennas. We propose four content-aware MIMO-CC strategies: \emph{min-$G$} enforces symmetry using the smallest antenna count among users; \emph{Grouping} maximizes intra-subset spatial multiplexing gain at the expense of some global caching gain; \emph{Super-grouping} aggregates users into optimized \emph{min-$G$}-based super-sets with identical effective receive multiplexing gains before applying \emph{Grouping} across them; and \emph{Phantom} redistributes spatial resources assuming ``phantom'' antennas at the users to bridge the performance gains of \emph{min-$G$} and \emph{Grouping}. We develop these asymmetric strategies under three reference symmetric CC placement-delivery policies with guaranteed linear decodability: a DoF-optimal policy achieving the optimal single-shot DoF, and two closed-form policies, namely combinatorial and linear cyclic low-complexity constructions, with the cyclic policy attaining DoF performance close to the others in many operating regimes. Analytical and numerical results demonstrate significant DoF improvements across various system configurations, and that policy-strategy combinations offer flexible trade-offs between DoF and subpacketization complexity.2026-03-18T19:47:32ZExtended journal version; submitted to IEEE Transactions on Communications (TCOM). An earlier conference version was published in ISIT 2025 (DOI: 10.1109/ISIT63088.2025.11195683)Mohammad NaseriTehraniMohammadJavad SalehiAntti Töllihttp://arxiv.org/abs/2603.18231v1Iterative Decoding of Stabilizer Codes under Radiation-Induced Correlated Noise2026-03-18T19:33:29ZFault-tolerant quantum computation demands extremely low logical error rates, yet superconducting qubit arrays are subject to radiation-induced correlated noise arising from cosmic-ray muon-generated quasiparticles. The quasiparticle density is unknown and time-varying, resulting in a mismatch between the true noise statistics and the priors assumed by standard decoders, and consequently, degraded logical performance. We formalize joint noise sensing and decoding using syndrome measurements by modeling the QP density as a latent variable, which governs correlation in physical errors and syndrome measurements. Starting from a variational expectation--maximization approach, we derive an iterative algorithm that alternates between QP density estimation and syndrome-based decoding under the updated noise model. Simulations of surface-code and bivariate bicycle quantum memory under radiation-induced correlated noise demonstrate a measurable reduction in logical error probability relative to baseline decoding with a uniform prior. Beyond improved decoding performance, the inferred QP density provides diagnostic information relevant to device characterization, shielding, and chip design. These results indicate that integrating physical noise estimation into decoding can mitigate correlated noise effects and relax effective error-rate requirements for fault-tolerant quantum computation.2026-03-18T19:33:29Z14 pages, 14 figures, 2 tables, 2 algorithmsAnuj K. NayakPaul G. BaityPeter J. LoveNicholas JeonByung-Jun YoonAdolfy HoisieLav R. Varshneyhttp://arxiv.org/abs/2509.25722v2Transformer-Based Rate Prediction for Multi-Band Cellular Handsets2026-03-18T18:21:26ZCellular wireless systems are facing a proliferation of frequency bands over a wide spectrum, particularly with the expansion into FR3. These bands must be supported in user equipment (UE) handsets with multiple antennas in a constrained form factor. Rapid variations in channel quality across the bands from motion and hand blockage, limited field-of-view of antennas, and hardware and power-constrained measurement sparsity pose significant challenges to reliable multi-band channel tracking. This paper formulates the problem of predicting achievable rates across multiple antenna arrays and bands with sparse historical measurements. We propose a transformer-based neural architecture that takes asynchronous rate histories as input and outputs per-array rate predictions. Evaluated on ray-traced simulations in a dense urban micro-cellular setting with FR1 and FR3 arrays, our method demonstrates superior performance over baseline predictors, enabling more informed band selection under realistic mobility and hardware constraints.2025-09-30T03:29:42ZAccepted to IEEE ICC 2026 Workshop on Intelligent Movable and Reconfigurable Antennas for Future Wireless Communication and Sensing (WS02)Ruibin ChenHaozhe LeiHao GuoMarco MezzavillaHitesh PoddarTomoki YoshimuraSundeep Ranganhttp://arxiv.org/abs/2603.18136v1Towards sample-optimal learning of bosonic Gaussian quantum states2026-03-18T18:00:00ZContinuous-variable systems enable key quantum technologies in computation, communication, and sensing. Bosonic Gaussian states emerge naturally in various such applications, including gravitational-wave and dark-matter detection. A fundamental question is how to characterize an unknown bosonic Gaussian state from as few samples as possible. Despite decades-long exploration, the ultimate efficiency limit remains unclear. In this work, we study the necessary and sufficient number of copies to learn an $n$-mode Gaussian state, with energy less than $E$, to $\varepsilon$ trace distance with high probability. We prove a lower bound of $Ω(n^3/\varepsilon^2)$ for Gaussian measurements, matching the best known upper bound up to doubly-log energy dependence, and $Ω(n^2/\varepsilon^2)$ for arbitrary measurements. We further show an upper bound of $\widetilde{O}(n^2/\varepsilon^2)$ given that the Gaussian state is promised to be either pure or passive. Interestingly, while Gaussian measurements suffice for nearly optimal learning of pure Gaussian states, non-Gaussian measurements are provably required for optimal learning of passive Gaussian states. Finally, focusing on learning single-mode Gaussian states via non-entangling Gaussian measurements, we provide a nearly tight bound of $\widetildeΘ(E/\varepsilon^2)$ for any non-adaptive schemes, showing adaptivity is indispensable for nearly energy-independent scaling. As a byproduct, we establish sharp bounds on the trace distance between Gaussian states in terms of the total variation distance between their Wigner distributions, and obtain a nearly tight sample complexity bound for learning the Wigner distribution of any Gaussian state to $\varepsilon$ total variation distance. Our results greatly advance quantum learning theory in the bosonic regimes and have practical impact in quantum sensing and benchmarking applications.2026-03-18T18:00:00Z59 pages, 3 figures, 1 table. Comments welcomeSenrui ChenFrancesco Anna MeleMarco FanizzaAlfred LiZachary MannHsin-Yuan HuangYanbei ChenJohn Preskillhttp://arxiv.org/abs/2603.16275v2Rotatable Antenna-Enabled Mobile Edge Computing2026-03-18T13:58:27ZIn the evolving landscape of mobile edge computing (MEC), enhancing communication reliability and computation efficiency to support increasingly stringent low-latency services remains a fundamental challenge. Rotatable antenna (RA) is a promising technology that introduces new spatial degrees of freedom (DoFs) to tackle this challenge. In this letter, we investigate an RA-enabled MEC system where antenna boresight directions can be independently adjusted to proactively improve wireless channel conditions for latency-critical users. We aim to minimize the maximum computation latency by jointly optimizing the MEC server computing resource allocation, receive beamforming, and the deflection angles of all RAs. To address the resulting non-convex problem, we develop an efficient alternating optimization (AO) framework. Specifically, the optimal edge computing resource allocation is derived based on the Karush-Kuhn-Tucker (KKT) conditions. Given the computing resources, the receive beamforming is optimized using semidefinite relaxation (SDR) combined with a bisection search. Furthermore, the RA deflection angles are optimized via fractional programming (FP) and successive convex approximation (SCA). Simulation results verify that the proposed RA-enabled MEC scheme significantly reduces the maximum computation latency compared with conventional benchmark methods.2026-03-17T09:06:47ZSubmitted to IEEE Wireless Communications Letters on February 5, 2026Qiyao WangBeixiong ZhengXue XiongWeidong MeiChangsheng YouQingqing WuJie Tanghttp://arxiv.org/abs/2603.17703v1Independent Trivariate Bicycle Codes2026-03-18T13:22:40ZWe introduce six independent trivariate bicycle (ITB) codes, which extend the bivariate bicycle framework of Bravyi et al.\ to three cyclic dimensions. Using asymmetric polynomial pairs on three-dimensional tori, we construct four codes including a $[[140,6,14]]$ code with $kd^2/n = 8.40$. In the code-capacity setting, the $[[140,6,14]]$ code achieves a pseudothreshold of $8.0\%$ and $kd^2/n = 8.40$, exceeding the best multivariate bicycle code of Voss et al.\ ($7.9\%$, $kd^2/n = 2.67$). With circuit-level depolarizing noise, pseudothresholds reach $0.59\%$ for $[[140,6,14]]$ and $0.53\%$ for $[[84,6,10]]$. On the SI1000 superconducting noise model, the $[[140,6,14]]$ code achieves a per-round per-observable rate of $5.6 \times 10^{-5}$ at $p = 0.20\%$. We additionally present two self-dual codes with weight-8 stabilizers: $[[54,14,5]]$ ($kd^2/n = 6.48$) and $[[128,20,8]]$ ($kd^2/n = 10.0$). These results expand the design space of algebraic quantum LDPC codes and demonstrate that the third cyclic dimension yields competitive candidates for practical fault-tolerant implementations.2026-03-18T13:22:40ZAygul Azatovna Galimovahttp://arxiv.org/abs/2603.17702v1Cache-enabled Generative Joint Source-Channel Coding for Evolving Semantic Communications2026-03-18T13:22:31ZLearning-based semantic communication (SemCom) has recently emerged as a promising paradigm for improving the transmission efficiency of wireless networks. However, existing methods typically rely on extensive end-to-end training, which is both inflexible and computationally expensive in dynamic wireless environments. Moreover, they fail to exploit redundancy across multiple transmissions of semantically similar content, limiting overall efficiency. To overcome these limitations, we propose a channel-aware generative adversarial network (GAN) inversion-based joint source-channel coding (CAGI-JSCC) framework that enables training-free SemCom by leveraging a pre-trained SemanticStyleGAN model. By explicitly incorporating wireless channel characteristics into the GAN inversion process, CAGI-JSCC adapts to varying channel conditions without additional training. Furthermore, we introduce a cache-enabled dynamic codebook (CDC) that caches disentangled semantic components at both the transmitter and receiver, allowing the system to reuse previously transmitted content. This semantic-level caching can continuously reduce redundant transmissions as experience accumulates. Extensive experiments on image transmission demonstrate the effectiveness of the proposed framework. In particular, our system achieves comparable perceptual quality with an average bandwidth compression ratio (BCR) of 1/224, and as low as 1/1024 for a single image, significantly outperforming baselines with a BCR of 1/128.2026-03-18T13:22:31ZShunpu TangQianqian YangJihong ParkZhaoyang ZhangKaibin HuangDeniz Gunduzhttp://arxiv.org/abs/2412.01641v9Linearly Homomorphic Signature with Tight Security on Lattice2026-03-18T12:50:39ZConstructing cryptographic schemes with tight or almost-tight security has long been one of the central problems in theoretical cryptography. At ASIACRYPT 2016, Boyen and Li posed an open problem: whether it is possible to construct a homomorphic signature scheme with tight or almost-tight security under the Short Integer Solution (SIS) assumption in the standard model. In 2024, Chen achieved the first construction with almost-tight security under a weaker security model. To further achieve tight security in the standard model, this paper introduces a new security model whose security requirements are weaker than those of the standard adaptive model but stronger than the model adopted by Chen. Under this model, we construct a linearly homomorphic signature scheme with tight security.2024-12-02T15:51:57Z30pages, research articleHeng GuoFengxia LiuKun TianZhiyong Zhenghttp://arxiv.org/abs/2603.17665v1Physical Layer Security in Finite Blocklength Massive IoT with Randomly Located Eavesdroppers2026-03-18T12:32:10ZThis paper analyzes the physical layer security performance of massive uplink Internet of Things (IoT) networks operating under the finite blocklength (FBL) regime. IoT devices and base stations (BS) are modeled using a stochastic geometry approach, while an eavesdropper is placed at a random location around the transmitting device. This system model captures security risks common in dense IoT deployments. Analytical expressions for the secure success probability, secrecy outage probability and secrecy throughput are derived to characterize how stochastic interference, fading and eavesdropper spatial uncertainty interact with FBL constraints in short packet uplink transmissions. Numerical results illustrate key system behavior under different network and channel conditions.2026-03-18T12:32:10ZTijana DevajaMilica PetkovicSokol KostaDejan VukobratovicCedomir Stefanovichttp://arxiv.org/abs/2603.17636v1On the number of inequivalent linearized Reed-Solomon codes2026-03-18T11:58:32ZLinearized Reed-Solomon (LRS) codes form an important family of maximum sum-rank distance (MSRD) codes that generalize both Reed--Solomon codes and Gabidulin codes. In this paper we study the equivalence problem for LRS codes and determine the number of inequivalent codes within this family. Using the correspondence between sum-rank metric codes and systems of $\mathbb{F}_q$-subspaces, we analyze the stabilizer of the Gabidulin system and derive a characterization of equivalence between LRS codes. In particular, we prove that two LRS codes are equivalent if and only if the sets of norms that define the codes coincide up to multiplication by an element of $\mathbb{F}_q^\ast$. This description allows us to reduce the classification problem to the action of $\mathbb{F}_q^\ast$ on subsets of $\mathbb{F}_q^\ast$. As a consequence, we derive formulas for the number of inequivalent linearized Reed-Solomon codes and illustrate the results with explicit examples.2026-03-18T11:58:32ZJonathan MannaertMarta MessiaFerdinando Zullohttp://arxiv.org/abs/2507.03570v2From Street Form to Spatial Justice: Explaining Urban Exercise Inequality via a Triadic SHAP-Informed Framework2026-03-18T11:40:00ZUrban streets are essential everyday health infrastructure, yet their capacity to support physical activity is unevenly distributed. This study develops a theory-informed and explainable framework to diagnose street-level exercise deprivation by integrating Lefebvre's spatial triad with multi-source urban data and SHAP-based analysis. Using Shenzhen as a case study, we show that while conceived spatial attributes have the strongest overall influence on exercise intensity, local deprivation mechanisms vary substantially across contexts. We identify a seven-mode typology of deprivation and locate high-demand but low-support street segments as priority areas for intervention. The study offers both a theory-grounded analytical framework and a practical diagnostic tool for promoting spatial justice in everyday physical activity.2025-07-04T13:28:30Z41 pages, 4 tables and 15 figuresMinwei ZhaoGuosheng YangZhuoni ZhangFilip BiljeckiHanzhi ZuCai Wu