{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:02:18Z","timestamp":1729645338082,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/ciss.2017.7926162","type":"proceedings-article","created":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T16:34:28Z","timestamp":1494866068000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Polar coding for achieving the capacity of marginal channels in nonbinary-input setting"],"prefix":"10.1109","author":[{"given":"Amirsina","family":"Torfi","sequence":"first","affiliation":[]},{"given":"Sobhan","family":"Soleymani","sequence":"additional","affiliation":[]},{"given":"Seyed Mehdi","family":"Iranmanesh","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Kazemi","sequence":"additional","affiliation":[]},{"given":"Rouzbeh A.","family":"Shirvani","sequence":"additional","affiliation":[]},{"given":"Vahid T.","family":"Vakili","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901143"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162275"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592878"},{"key":"ref14","first-page":"64286443","article-title":"Polar Coding for Secure Transmission and Key Agreement","volume":"57","author":"ozan koyluoglu","year":"2011","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref15","first-page":"625627","article-title":"On a special class of wire-tap channels","volume":"it 23","author":"leung-yan-cheong","year":"1977","journal-title":"IEEE Trans Inf Theory"},{"key":"ref16","article-title":"Learning using privileged information: Similarity control and knowledge transfer","author":"vapnik","year":"0","journal-title":"Journal of Machine Learning Research16 (2015) 2023&#x2013;2049"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.166"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.107"},{"journal-title":"Polar codes for channel and source coding","year":"2009","author":"korada","key":"ref19"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","article-title":"Information-theoretic key agreement: From weak to strong secrecy for free","volume":"1807","author":"maurer","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2694-0_27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref8","first-page":"21352157","article-title":"Wiretap channel II","volume":"63","author":"ozarow","year":"1984","journal-title":"Bell Lab Tech J"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205583"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592770"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205856"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351487"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.08.100875"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2282305"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205860"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864443"}],"event":{"name":"2017 51st Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2017,3,22]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2017,3,24]]}},"container-title":["2017 51st Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7917217\/7926061\/07926162.pdf?arnumber=7926162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T13:37:20Z","timestamp":1569332240000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7926162\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ciss.2017.7926162","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}