{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:27:09Z","timestamp":1758266829602,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/itw.2018.8613331","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:39:34Z","timestamp":1547771974000},"page":"1-5","source":"Crossref","is-referenced-by-count":16,"title":["What Can Machine Learning Teach Us about Communications?"],"prefix":"10.1109","author":[{"given":"Mengke","family":"Lian","sequence":"first","affiliation":[]},{"given":"Christian","family":"Hager","sequence":"additional","affiliation":[]},{"given":"Henry D.","family":"Pfister","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Learned belief- propagation decoding with damping and redundant parity-check matrices","author":"lian","year":"2019","journal-title":"2018 to be submitted to ISIT"},{"key":"ref11","first-page":"447","article-title":"Generating code representations suitable for belief propagation decoding","volume":"40","author":"yedidia","year":"2002","journal-title":"Proc Annual Allerton Conf on Commun Control and Comp"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261947"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.07.070621"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.01.070468"},{"journal-title":"Nonlinear Fiber Optics","year":"2006","author":"agrawal","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1364\/OE.18.017075"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1364\/OE.19.009453"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2014.2331086"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2008.2010871"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2017.7926071"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NORTHC.1995.485019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2788405"},{"key":"ref8","first-page":"125","article-title":"Iterative decoding of multi- step majority logic decodable codes","author":"fossorier","year":"2003","journal-title":"Proc Int Symp on Turbo Codes & Iterative Inform Proc"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437530"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2008.927791"},{"key":"ref9","first-page":"399","article-title":"Learning fast approximations of sparse coding","author":"gregor","year":"2010","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852251"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1364\/OE.17.008815"},{"key":"ref22","first-page":"1","article-title":"Nonlinear Interference Mitigation via Deep Neural Networks","author":"hager","year":"2018","journal-title":"The Optical Fiber Communication Conference and Exposition (OFC)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2017.W1G.4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ECOC.2018.8535430"},{"key":"ref23","article-title":"Deep learning of the nonlinear Schr&#x00F6;dinger equation in fiberoptic communications","author":"h\u00e4ger","year":"2018","journal-title":"Proc IEEE Int Symp Information Theory (ISIT) Vail CO"},{"key":"ref25","article-title":"Wideband time-domain digital backpropagation via subband processing and deep learning","author":"h\u00e4ger","year":"2018","journal-title":"Proc European Conf Optical Communication (ECOC)"}],"event":{"name":"2018 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2018,11,25]]},"location":"Guangzhou","end":{"date-parts":[[2018,11,29]]}},"container-title":["2018 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598908\/8613300\/08613331.pdf?arnumber=8613331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:27:19Z","timestamp":1643243239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8613331\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/itw.2018.8613331","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}