{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:31:34Z","timestamp":1770834694370,"version":"3.50.1"},"reference-count":473,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"JSPS\/KAKENHI","award":["JP21H04873"],"award-info":[{"award-number":["JP21H04873"]}]},{"name":"MIC\/FORWARD","award":["JPMI240710001"],"award-info":[{"award-number":["JPMI240710001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcoms.2024.3472094","type":"journal-article","created":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T17:33:23Z","timestamp":1727804003000},"page":"6443-6481","source":"Crossref","is-referenced-by-count":20,"title":["Recent Advances in Deep Learning for Channel Coding: A Survey"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9583-8129","authenticated-orcid":false,"given":"Toshiki","family":"Matsumine","sequence":"first","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University, Yokohama, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9303-5250","authenticated-orcid":false,"given":"Hideki","family":"Ochiai","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Osaka University, Osaka, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.895188"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1993.397441"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800418"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921208"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957648"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.3010270"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3031234"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900516"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900476"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900411"},{"key":"ref16","article-title":"White paper on broadband connectivity in 6G","author":"Rajatheva","year":"2020","journal-title":"arXiv:2004.14247"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900333"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010896"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015289"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2976703"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981745"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900488"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3061701"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3057679"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3124812"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053486"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3071496"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3063686"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000208"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3173031"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3249835"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3243918"},{"key":"ref35","article-title":"Next generation advanced transceiver technologies for 6G","author":"You","year":"2024","journal-title":"arXiv:2403.16458"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MBITS.2023.3322974"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MBITS.2023.3322978"},{"key":"ref38","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","volume-title":"Proc. 12th USENIX Symp. Oper. Syst. Design Implement. (OSDI)","author":"Abadi"},{"key":"ref39","first-page":"1","article-title":"Torch7: A Matlab-like environment for machine learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS) Workshop Big Learn.","author":"Collobert"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.2019.8782524"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8233654"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933969"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS47522.2019.9020494"},{"key":"ref46","volume-title":"White Paper on Machine Learning in 6G Wireless Communication Networks","author":"Samad","year":"2020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2020.3000103"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3058353"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12669"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3326399"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3382973"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3390000"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3412192"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/26.486609"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1999.765550"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(00)00030-X"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2881442"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2784180"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1900027"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800447"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900093"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3017020"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000243"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000516"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3210648"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3333342"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2022CEI0002"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3300664"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3384500"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3425314"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3363639"},{"key":"ref73","article-title":"Sionna: An open-source library for next-generation physical layer research","author":"Hoydis","year":"2022","journal-title":"arXiv:2203.11854"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3071210"},{"key":"ref75","article-title":"Semantic communications: Principles and challenges","author":"Qin","year":"2021","journal-title":"arXiv:2201.01389"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3221119"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3223224"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.101.2100269"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3223408"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3269848"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302159"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3243065"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3381967"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.119.030501"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aa955a"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2948612"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.22331\/q-2019-12-16-215"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.91.045002"},{"key":"ref89","article-title":"Decoding algorithms for surface codes","author":"iOlius","year":"2023","journal-title":"arXiv:2307.14989"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.107.010101"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1404.7828"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.038"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1561\/2000000039"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3234150"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8030292"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100379"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-019-09344-w"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.21236\/ada164453"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.111"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104425"},{"key":"ref104","first-page":"3","article-title":"Rectifier nonlinearities improve neural network acoustic models","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","volume":"30","author":"Maas"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref106","first-page":"1139","article-title":"On the importance of initialization and momentum in deep learning","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Sutskever"},{"key":"ref107","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"Duchi","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref108","article-title":"ADADELTA: An adaptive learning rate method","author":"Zeiler","year":"2012","journal-title":"arXiv:1212.5701"},{"key":"ref109","first-page":"2013","article-title":"Incorporating Nesterov momentum into adam","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Dozat"},{"key":"ref110","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref111","article-title":"An overview of gradient descent optimization algorithms","author":"Ruder","year":"2016","journal-title":"arXiv:1609.04747"},{"key":"ref112","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref115","article-title":"Deep reinforcement learning: An overview","author":"Li","year":"2017","journal-title":"arXiv:1701.07274"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7784-8_10"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1561\/2200000086"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3062045"},{"key":"ref123","article-title":"Multi-task learning with deep neural networks: A survey","author":"Crawshaw","year":"2020","journal-title":"arXiv:2009.09796"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3070203"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2787646"},{"key":"ref126","article-title":"Meta-learning: A survey","author":"Vanschoren","year":"2018","journal-title":"arXiv:1810.03548"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3079209"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1561\/2000000115"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3069908"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01611-x"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0277(93)90058-4"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084827"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.3390\/computers12080151"},{"key":"ref136","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Krizhevsky"},{"key":"ref137","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2016.2584107"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2898944"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3054520"},{"key":"ref144","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Sutskever"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01199"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1801.01078"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09838-1"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2868322"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"ref153","article-title":"How powerful are graph neural networks?","author":"Xu","year":"2018","journal-title":"arXiv:1810.00826"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.01.001"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1609.02907"},{"key":"ref157","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107","year":"2017","journal-title":"arXiv:1710.10903"},{"key":"ref158","article-title":"Geometric deep learning: Grids, groups, graphs, geodesics, and gauges","author":"Bronstein","year":"2021","journal-title":"arXiv:2104.13478"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref160","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"33","author":"Brown"},{"key":"ref161","article-title":"LLaMA: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv:2302.13971"},{"issue":"240","key":"ref162","first-page":"1","article-title":"PaLM: Scaling language modeling with pathways","volume":"24","author":"Chowdhery","year":"2023","journal-title":"J. Mach. Learn. Res."},{"key":"ref163","article-title":"Gemini: A family of highly capable multimodal models","author":"Team","year":"2023","journal-title":"arXiv:2312.11805"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2022.10.001"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/3505244"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3152247"},{"key":"ref167","article-title":"An image is worth 16 \u00d7 16 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref168","first-page":"28492","article-title":"Robust speech recognition via large-scale weak supervision","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Radford"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.008.2200157"},{"key":"ref170","article-title":"On the design fundamentals of diffusion models: A survey","author":"Chang","year":"2023","journal-title":"arXiv:2306.04542"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3626235"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3361474"},{"key":"ref173","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"33","author":"Ho"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2024.3474570"},{"key":"ref175","article-title":"Denoising diffusion probabilistic models for hardware-impaired communications","author":"Letafati","year":"2023","journal-title":"arXiv:2309.08568"},{"key":"ref176","article-title":"Probabilistic constellation shaping with denoising diffusion probabilistic models: A novel approach","author":"Letafati","year":"2023","journal-title":"arXiv:2309.08688"},{"key":"ref177","first-page":"1","article-title":"Learning end-to-end channel coding with diffusion models","volume-title":"Proc. 26th Int. ITG Workshop Smart Antennas 13th Conf. Sys., Commun., Coding (WSA SCC)","author":"Kim"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3379244"},{"key":"ref179","article-title":"Beyond deep reinforcement learning: A tutorial on generative diffusion models in network optimization","author":"Du","year":"2023","journal-title":"arXiv:2308.05384"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2300364"},{"key":"ref181","article-title":"WiGenAI: The symphony of wireless and generative AI via diffusion models","author":"Letafati","year":"2023","journal-title":"arXiv:2310.07312"},{"key":"ref182","article-title":"Generative AI for physical layer communications: A survey","author":"Van Huynh","year":"2023","journal-title":"arXiv:2312.05594"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3438379"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937588"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008601"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619122"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919804"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2951403"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC49272.2021.9594059"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3305523"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3341838"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3114118"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619466"},{"key":"ref194","article-title":"DeepPolar: Inventing nonlinear large-kernel polar codes via deep learning","author":"Hebbar","year":"2024","journal-title":"arXiv:2402.08864"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771578"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/18.910578"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.090428"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/26.957394"},{"key":"ref199","article-title":"Design of capacity-approaching low-density parity-check codes using recurrent neural networks","author":"Nisioti","year":"2020","journal-title":"arXiv:2001.01249"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2272694"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.081512.110872"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3030057"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3227280"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2410251"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014004"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3120274"},{"key":"ref207","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3331532"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541293"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541295"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254146"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2889667"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2967127"},{"key":"ref214","first-page":"1","article-title":"Actor-critic algorithms","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"12","author":"Konda"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2080990"},{"key":"ref216","article-title":"From sequential decoding to channel polarization and back again","author":"Ar\u0131kan","year":"2019","journal-title":"arXiv:1908.09594"},{"key":"ref217","article-title":"A monte-carlo based construction of polarization-adjusted convolutional (PAC) codes","author":"Moradi","year":"2021","journal-title":"arXiv:2106.08118"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874390"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2422697"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845185"},{"key":"ref222","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Mnih"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E96.B.2807"},{"key":"ref224","article-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015","journal-title":"arXiv:1509.02971"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops57953.2023.10283769"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3273413"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2997683"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417600"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2017.7926071"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390279"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014156"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2022.3222961"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422289"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2018.8710159"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3000345"},{"key":"ref236","first-page":"38695","article-title":"Error correction code transformer","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"35","author":"Choukroun"},{"key":"ref237","article-title":"Denoising diffusion error correction codes","author":"Choukroun","year":"2022","journal-title":"arXiv:2209.13533"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437530"},{"key":"ref239","article-title":"Iterative error decimation for syndrome-based neural network decoders","author":"Kamassury","year":"2020","journal-title":"arXiv:2012.00089"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps58843.2023.10465120"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2018.8555891"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815537"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.3390\/e22050496"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Fall60731.2023.10333739"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919799"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW49093.2021.9420004"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2018.8617843"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/NORCHIP.2019.8906946"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00053"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST54814.2022.9837752"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF51394.2020.9443470"},{"issue":"1","key":"ref252","first-page":"79","article-title":"perm2vec: Graph permutation selection for decoding of error correction codes using self-attention","volume":"39","author":"Raviv","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i12.29230"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3129080"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3243869"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2020.3021405"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2023.3282804"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148786"},{"key":"ref259","first-page":"1","article-title":"Communication algorithms via deep learning","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Kim"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348707"},{"key":"ref261","article-title":"How to mask in error correction code Transformer: Systematic and double masking","author":"Park","year":"2023","journal-title":"arXiv:2308.08128"},{"key":"ref262","first-page":"1","article-title":"A foundation model for error correction codes","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Choukroun"},{"key":"ref263","article-title":"On the opportunities and risks of foundation models","author":"Bommasani","year":"2021","journal-title":"arXiv:2108.07258"},{"key":"ref264","volume-title":"The Theory of Error-Correcting Codes","volume":"16","author":"MacWilliams","year":"1977"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.07.070621"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/NORTHC.1995.485019"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/26.705396"},{"key":"ref268","article-title":"To prune, or not to prune: Exploring the efficacy of pruning for model compression","author":"Zhu","year":"2017","journal-title":"arXiv:1710.01878"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/18.412683"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2850772"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852251"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2788405"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006751"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS.2018.8598384"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Fall60731.2023.10333372"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/OJCAS.2024.3363043"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869374"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2024.3404110"},{"key":"ref280","article-title":"Convolutional neural network-aided bit-flipping for belief propagation decoding of polar codes","author":"Teng","year":"2019","journal-title":"arXiv:1911.01704"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3040897"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413808"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF51394.2020.9443504"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3001162"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2974199"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849215"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2022TAP0002"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348007"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174337"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3073834"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3296621"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645388"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2020.2992593"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2022.3197974"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683778"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/ICEENG49683.2022.9781872"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013364"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2985678"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3341081"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613331"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849419"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145237"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2022.3212438"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3078488"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2022.3207506"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3252907"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3344127"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041392"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414407"},{"key":"ref310","first-page":"685","article-title":"Neural enhanced belief propagation on factor graphs","volume-title":"Proc. Int. Conf. Artif. Intell. Statist. (AISTATS)","author":"Satorras"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278711"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279074"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2024.3361388"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF56349.2022.10051944"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3125578"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950766"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/26.768759"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2005.852852"},{"key":"ref319","article-title":"Deep unfolding: Model-based inspiration of novel deep architectures","author":"Hershey","year":"2014","journal-title":"arXiv:1409.2574"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3247480"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3108129"},{"key":"ref322","article-title":"RNN decoding of linear block codes","author":"Nachmani","year":"2017","journal-title":"arXiv:1702.07560"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3113610"},{"issue":"180","key":"ref324","first-page":"109","article-title":"Adjusted mim-sum decoder","volume":"20","author":"Richardson","year":"2018","journal-title":"Patent"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2006.1692544"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2304660"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4594965"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS.2017.8109997"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645372"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437581"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761399"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2020.2995962"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891951"},{"key":"ref334","first-page":"2329","article-title":"Hyper-graph-network decoders for block codes","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Nachmani"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10862-8"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054607"},{"key":"ref337","article-title":"Autoregressive belief propagation for decoding block codes","author":"Nachmani","year":"2021","journal-title":"arXiv:2103.11780"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645128"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2955724"},{"key":"ref340","article-title":"Active learning literature survey","author":"Settles","year":"1648"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9173971"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"ref343","article-title":"CRC-aided learned ensembles of belief-propagation polar decoders","author":"Raviv","year":"2023","journal-title":"arXiv:2301.06060"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447608"},{"key":"ref345","article-title":"Boosting learning for LDPC codes to improve the error-floor performance","author":"Kwak","year":"2023","journal-title":"arXiv:2310.07194"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261947"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557244"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.2002.1181948"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858979"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2281372"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1561\/2400000003"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377158"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647308"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205860"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC57237.2023.10273515"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.21428\/bf6fb269.1f033948"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.1109\/72.80236"},{"key":"ref360","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding","author":"Han","year":"2015","journal-title":"arXiv:1510.00149"},{"key":"ref361","article-title":"Rethinking the value of network pruning","author":"Liu","year":"2018","journal-title":"arXiv:1810.05270"},{"key":"ref362","first-page":"129","article-title":"What is the state of neural network pruning?","volume-title":"Proc. Mach. Learn. Syst.","author":"Blalock"},{"issue":"241","key":"ref363","first-page":"1","article-title":"Sparsity in deep learning: Pruning and growth for efficient inference and training in neural networks","volume":"22","author":"Hoefler","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref364","article-title":"A white paper on neural network quantization","author":"Nagel","year":"2021","journal-title":"arXiv:2106.08295"},{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1201\/9781003162810-13"},{"key":"ref366","article-title":"Joint quantizer optimization based on neural quantizer for sum-product decoder","author":"Wadayama","year":"2018","journal-title":"arXiv:1804.06002"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008635"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971526"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2018.8503199"},{"key":"ref370","article-title":"Estimating or propagating gradients through stochastic neurons for conditional computation","author":"Bengio","year":"2013","journal-title":"arXiv:1308.3432"},{"key":"ref371","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01210"},{"key":"ref372","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511111"},{"key":"ref373","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC49272.2021.9594227"},{"key":"ref374","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3343387"},{"key":"ref375","doi-asserted-by":"publisher","DOI":"10.1137\/090752286"},{"key":"ref376","article-title":"Tensor ring decomposition","author":"Zhao","year":"2016","journal-title":"arXiv:1606.05535"},{"key":"ref377","article-title":"Binary quantization using belief propagation with decimation over factor graphs of LDGM codes","author":"Filler","year":"2007","journal-title":"arXiv:0710.0192"},{"key":"ref378","volume-title":"Foundations of Machine Learning","author":"Mohri","year":"2018"},{"key":"ref379","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2994770"},{"key":"ref380","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.128"},{"key":"ref381","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3391836"},{"key":"ref382","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2756959"},{"key":"ref383","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2010.2042041"},{"key":"ref384","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.060911.100065"},{"key":"ref385","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.122.200501"},{"key":"ref386","doi-asserted-by":"publisher","DOI":"10.26421\/QIC8.10-8"},{"key":"ref387","article-title":"Graph neural networks for enhanced decoding of quantum LDPC codes","author":"Gong","year":"2023","journal-title":"arXiv:2310.17758"},{"key":"ref388","doi-asserted-by":"publisher","DOI":"10.1109\/ITW55543.2023.10161656"},{"key":"ref389","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254811"},{"key":"ref390","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2018.8780605"},{"key":"ref391","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445986"},{"key":"ref392","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815542"},{"key":"ref393","first-page":"12823","article-title":"CRISP: Curriculum based sequential neural decoders for polar code family","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Hebbar"},{"key":"ref394","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2019.8904878"},{"key":"ref395","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9128875"},{"key":"ref396","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS47522.2019.9020513"},{"key":"ref397","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-020-01599-y"},{"key":"ref398","doi-asserted-by":"publisher","DOI":"10.3390\/e23020171"},{"key":"ref399","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500904"},{"key":"ref400","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9048899"},{"key":"ref401","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140151"},{"key":"ref402","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053222"},{"key":"ref403","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685277"},{"key":"ref404","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3326330"},{"key":"ref405","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3349450"},{"key":"ref406","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2023.01.013"},{"key":"ref407","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2946358"},{"key":"ref408","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2504299"},{"key":"ref409","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2014.7094848"},{"key":"ref410","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2793887"},{"key":"ref411","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3023582"},{"key":"ref412","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.101811.111480"},{"key":"ref413","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2619324"},{"key":"ref414","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2740204"},{"key":"ref415","doi-asserted-by":"publisher","DOI":"10.1038\/nature20101"},{"key":"ref416","doi-asserted-by":"publisher","DOI":"10.1109\/ITW44776.2019.8989330"},{"key":"ref417","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348117"},{"key":"ref418","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815400"},{"key":"ref419","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3010964"},{"key":"ref420","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834589"},{"key":"ref421","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"ref422","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1999.767900"},{"key":"ref423","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC.2012.6325210"},{"key":"ref424","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055186"},{"key":"ref425","first-page":"1771","article-title":"Cyclically equivariant neural decoders for cyclic codes","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Chen"},{"key":"ref426","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834337"},{"key":"ref427","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"},{"key":"ref428","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205184"},{"key":"ref429","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2901469"},{"key":"ref430","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3374699"},{"key":"ref431","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8312"},{"key":"ref432","article-title":"Metrics for explainable AI: Challenges and prospects","author":"Hoffman","year":"2018","journal-title":"arXiv:1812.04608"},{"key":"ref433","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref434","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"ref435","doi-asserted-by":"publisher","DOI":"10.3390\/e23010018"},{"key":"ref436","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref437","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10088-y"},{"key":"ref438","doi-asserted-by":"publisher","DOI":"10.1145\/3561048"},{"key":"ref439","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3308446"},{"key":"ref440","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000050"},{"key":"ref441","article-title":"Applications of explainable AI for 6G: Technical aspects, use cases, and research challenges","author":"Wang","year":"2021","journal-title":"arXiv:2112.04698"},{"key":"ref442","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3386872"},{"key":"ref443","doi-asserted-by":"publisher","DOI":"10.1145\/3381831"},{"key":"ref444","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1355"},{"key":"ref445","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3148714"},{"key":"ref446","first-page":"795","article-title":"Sustainable AI: Environmental implications, challenges and opportunities","volume-title":"Proc. Mach. Learn. Syst.","author":"Wu"},{"key":"ref447","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3315272"},{"key":"ref448","doi-asserted-by":"publisher","DOI":"10.1145\/3578938"},{"key":"ref449","article-title":"The principles of data-centric AI (DCAI)","author":"Jarrahi","year":"2022","journal-title":"arXiv:2211.14611"},{"key":"ref450","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977653.ch106"},{"key":"ref451","article-title":"Data-centric artificial intelligence: A survey","author":"Zha","year":"2023","journal-title":"arXiv:2303.10158"},{"key":"ref452","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2882385"},{"key":"ref453","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849710"},{"key":"ref454","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3185287"},{"key":"ref455","article-title":"Quantum search algorithm for binary constant weight codes","author":"Yukiyoshi","year":"2022","journal-title":"arXiv:2211.04637"},{"key":"ref456","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.012.2000770"},{"key":"ref457","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3311204"},{"key":"ref458","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-08-06-79"},{"key":"ref459","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms5213"},{"key":"ref460","article-title":"A quantum approximate optimization algorithm","author":"Farhi","year":"2014","journal-title":"arXiv:1411.4028"},{"key":"ref461","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.94.015004"},{"key":"ref462","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-021-00348-9"},{"key":"ref463","doi-asserted-by":"publisher","DOI":"10.1080\/00107514.2014.964942"},{"key":"ref464","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aab859"},{"key":"ref465","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909490"},{"key":"ref466","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-22539-9"},{"key":"ref467","doi-asserted-by":"publisher","DOI":"10.1561\/2000000118"},{"key":"ref468","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3309268"},{"key":"ref469","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-021-00084-1"},{"key":"ref470","doi-asserted-by":"publisher","DOI":"10.1007\/s42484-020-00012-y"},{"key":"ref471","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aa8072"},{"key":"ref472","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.012324"},{"key":"ref473","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.040502"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10362961\/10702508.pdf?arnumber=10702508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T17:35:38Z","timestamp":1729272938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10702508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":473,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3472094","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}