{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T16:02:05Z","timestamp":1774886525322,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"Center for Science of Information, an National Science Foundation (NSF) Science and Technology Center","doi-asserted-by":"publisher","award":["CCF-09-39370"],"award-info":[{"award-number":["CCF-09-39370"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF CAREER Award","doi-asserted-by":"publisher","award":["CCF-12-53205"],"award-info":[{"award-number":["CCF-12-53205"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["IIS-1447879"],"award-info":[{"award-number":["IIS-1447879"]}]},{"name":"NSF","award":["CCF-1423088"],"award-info":[{"award-number":["CCF-1423088"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/tit.2015.2482978","type":"journal-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T18:42:43Z","timestamp":1443465763000},"page":"35-55","source":"Crossref","is-referenced-by-count":61,"title":["Dissipation of Information in Channels With Input Constraints"],"prefix":"10.1109","volume":"62","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2109-0979","authenticated-orcid":false,"given":"Yury","family":"Polyanskiy","sequence":"first","affiliation":[]},{"given":"Yihong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1137\/1115049"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1515\/9783110250329"},{"key":"ref33","author":"berger","year":"1971","journal-title":"Rate Distortion Theory A Mathematical Basis for Data Compression"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/0128010"},{"key":"ref31","author":"lehmann","year":"2006","journal-title":"Testing Statistical Hypotheses"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707067"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/18.669153"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2174959"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2007.1.239"},{"key":"ref34","first-page":"8","article-title":"Szemer&#x00E9;di&#x2019;s regularity lemma revisited","volume":"1","author":"tao","year":"2006","journal-title":"Contrib Discrete Math"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(94)90428-6"},{"key":"ref40","first-page":"43","article-title":"Probabilistic logics and the synthesis of reliable organisms from unreliable components","volume":"34","author":"von neumann","year":"1956","journal-title":"Automata Studies"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176995937"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0096511"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00440-003-0270-6"},{"key":"ref14","article-title":"On maximal correlation, hypercontractivity, and the data processing inequality studied by Erkip and Cover","author":"anantharam","year":"2013"},{"key":"ref15","article-title":"Strong data processing inequalities and $\\Phi $ -Sobolev inequalities for discrete channels","author":"raginsky","year":"2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620260"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2010.12.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1019487349"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"805","DOI":"10.14321\/realanalexch.29.2.0805","article-title":"A characterization of singular measures","volume":"29","author":"prokaj","year":"2004","journal-title":"Real Anal Exchange"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF00537520"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282918"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11122-005-0012-8"},{"key":"ref3","first-page":"1","article-title":"Strong data-processing of mutual information: Beyond Ahlswede and G&#x00E1;cs","author":"polyanskiy","year":"2015","journal-title":"Proc Inf Theory Appl Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/1101006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/18.370121"},{"key":"ref5","first-page":"229","article-title":"Information-type measures of difference of probability distributions and indirect observations","volume":"2","author":"csisz\u00e1r","year":"1967","journal-title":"Studia Sci Math Hungarica"},{"key":"ref8","author":"cohen","year":"1998","journal-title":"Comparisons of Stochastic Matrices with Applications in Information Theory Statistics Economics and Population"},{"key":"ref7","first-page":"52","article-title":"A maximal correlation coefficient (non-symmetric case)","volume":"121","author":"sarmanov","year":"1958","journal-title":"Dokl Akad Nauk SSSR"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620549"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(93)90331-H"},{"key":"ref1","first-page":"71","article-title":"The relation between block length and reliability for a cascade of AWGN links","author":"subramanian","year":"2012","journal-title":"Proc Int Z&#x00FC;rich Seminar Commun (IZS)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2977\/prims\/1195189812"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177700153"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/18.796377"},{"key":"ref22","article-title":"A simple proof of the Gaussian HWI inequality and extensions","author":"wu","year":"2011"},{"key":"ref21","author":"hiriart-urruty","year":"1996","journal-title":"Convex Analysis and Minimization Algorithms Fundamentals"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/18.75261"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1142\/5792","author":"barbour","year":"2005","journal-title":"An Introduction to Stein&#x2019;s Method"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/18.2628"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1006\/jfan.1999.3557"},{"key":"ref44","first-page":"164","article-title":"Better gates can make fault-tolerant computation impossible","volume":"17","author":"unger","year":"2010","journal-title":"Proc Electron Colloq Comput Complex (ECCC)"},{"key":"ref26","first-page":"48","article-title":"Almost independence and secrecy capacity","volume":"32","author":"csisz\u00e1r","year":"1996","journal-title":"Problemy Peredachi Inf"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.818405"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1107039"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7360961\/7279116.pdf?arnumber=7279116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:55:27Z","timestamp":1649444127000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7279116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":46,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tit.2015.2482978","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}