{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T06:00:14Z","timestamp":1763791214532,"version":"3.45.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,29]]},"DOI":"10.1109\/itw62417.2025.11240300","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:39:40Z","timestamp":1763750380000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Improved Lossless Compression based on Polar Codes"],"prefix":"10.1109","author":[{"given":"Ling","family":"Liu","sequence":"first","affiliation":[{"name":"Xidian University,Guangzhou Institute of Technology,Guangzhou,China"}]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[{"name":"Shenzhen University,College of Computer Science and Software Engineering,Shenzhen,China"}]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Xidian University,Guangzhou Institute of Technology,Guangzhou,China"}]},{"given":"Lulu","family":"Ding","sequence":"additional","affiliation":[{"name":"Shenzhen University,College of Computer Science and Software Engineering,Shenzhen,China"}]},{"given":"Zexuan","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shenzhen University,College of Computer Science and Software Engineering,Shenzhen,China"}]},{"given":"Baoming","family":"Bai","sequence":"additional","affiliation":[{"name":"Xidian University,Guangzhou Institute of Technology,Guangzhou,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TIT.2009.2021379"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIT.2011.2162275"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.2012.2201374"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2014.2378172"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.2014.2368555"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIT.2018.2878453"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ISIT.2010.5513561"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISIT.2010.5513567"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ISIT57864.2024.10619556"},{"key":"ref10","article-title":"Lossless data compression with polar codes","volume-title":"Master\u2019s thesis","author":"\u00c7ayc\u0131","year":"2013"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIT.2010.2040961"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/OJCOMS.2024.3390000"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ISIT.2011.6033904"},{"volume-title":"ICT-MobileSummit 2009 Conf. Proc","author":"Ar\u0131kan","article-title":"Performance of short polar codes under ML decoding","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/LCOMM.2008.080017"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ISIT.2009.5205860"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CIG.2010.5592698"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ISIT.2015.7282452"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.23919\/JCC.2023.02.015"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ISIT.2013.6620403"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TIT.2015.2410251"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ISIT.2009.5205856"},{"year":"2023","author":"Said","article-title":"Introduction to arithmetic coding\u2013theory and practice","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TIT.2013.2272694"},{"year":"2013","author":"Duda","article-title":"Asymmetric numeral systems: entropy coding combining speed of huffman coding with compression rate of arithmetic coding","key":"ref25"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ISIT.2012.6283642"}],"event":{"name":"2025 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2025,9,29]]},"location":"Sydney, Australia","end":{"date-parts":[[2025,10,3]]}},"container-title":["2025 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240243\/11240249\/11240300.pdf?arnumber=11240300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T05:55:41Z","timestamp":1763790941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/itw62417.2025.11240300","relation":{},"subject":[],"published":{"date-parts":[[2025,9,29]]}}}