{"id":"https://openalex.org/W4415368072","doi":"https://doi.org/10.1109/isit63088.2025.11195479","title":"Strong Converse Exponent for Remote Lossy Source Coding","display_name":"Strong Converse Exponent for Remote Lossy Source Coding","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415368072","doi":"https://doi.org/10.1109/isit63088.2025.11195479"},"language":"en","primary_location":{"id":"doi:10.1109/isit63088.2025.11195479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.tue.nl/ws/files/370274973/Strong_Converse_Exponent_for_Remote_Lossy_Source_Coding.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100403061","display_name":"Han Wu","orcid":"https://orcid.org/0000-0002-0534-9020"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Han Wu","raw_affiliation_strings":["Eindhoven University of Technology,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079654912","display_name":"Hamdi Joudeh","orcid":"https://orcid.org/0000-0002-7162-0325"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Hamdi Joudeh","raw_affiliation_strings":["Eindhoven University of Technology,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100403061"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33876837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.8489000201225281,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.8489000201225281,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.8468999862670898,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.8418999910354614,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.8515999913215637},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.8375999927520752},{"id":"https://openalex.org/keywords/exponent","display_name":"Exponent","score":0.7631000280380249},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.574400007724762},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5199999809265137},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5069000124931335},{"id":"https://openalex.org/keywords/exponential-function","display_name":"Exponential function","score":0.5055999755859375},{"id":"https://openalex.org/keywords/rate-distortion","display_name":"Rate distortion","score":0.5054000020027161},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.4291999936103821}],"concepts":[{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.8515999913215637},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.8375999927520752},{"id":"https://openalex.org/C2780388253","wikidata":"https://www.wikidata.org/wiki/Q5421508","display_name":"Exponent","level":2,"score":0.7631000280380249},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6367999911308289},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.574400007724762},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5199999809265137},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5069000124931335},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.5055999755859375},{"id":"https://openalex.org/C2982755384","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate distortion","level":3,"score":0.5054000020027161},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.4291999936103821},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4106999933719635},{"id":"https://openalex.org/C64185310","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate\u2013distortion theory","level":3,"score":0.40799999237060547},{"id":"https://openalex.org/C204591131","wikidata":"https://www.wikidata.org/wiki/Q5166461","display_name":"Converse theorem","level":3,"score":0.39660000801086426},{"id":"https://openalex.org/C2985998994","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Source model","level":2,"score":0.39070001244544983},{"id":"https://openalex.org/C130811719","wikidata":"https://www.wikidata.org/wiki/Q2645","display_name":"Shannon\u2013Fano coding","level":4,"score":0.36550000309944153},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.35249999165534973},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.34209999442100525},{"id":"https://openalex.org/C92224547","wikidata":"https://www.wikidata.org/wiki/Q1673216","display_name":"Probability of error","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C60603091","wikidata":"https://www.wikidata.org/wiki/Q2981616","display_name":"Variable-length code","level":3,"score":0.3122999966144562},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.301800012588501},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.28049999475479126},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.27639999985694885},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.275299996137619},{"id":"https://openalex.org/C75235859","wikidata":"https://www.wikidata.org/wiki/Q582659","display_name":"Exponential growth","level":2,"score":0.27379998564720154},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C180188523","wikidata":"https://www.wikidata.org/wiki/Q574576","display_name":"Exponential decay","level":2,"score":0.2628999948501587}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit63088.2025.11195479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/74d53aa4-2f14-48af-be22-87ad0896d5fa","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/74d53aa4-2f14-48af-be22-87ad0896d5fa","pdf_url":"https://pure.tue.nl/ws/files/370274973/Strong_Converse_Exponent_for_Remote_Lossy_Source_Coding.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wu, H & Joudeh, H 2025, Strong Converse Exponent for Remote Lossy Source Coding. in 2025 IEEE International Symposium on Information Theory, ISIT 2025., 11195479, Institute of Electrical and Electronics Engineers, 2025 IEEE International Symposium on Information Theory (ISIT), Ann Arbor, United States, 22/06/25. https://doi.org/10.1109/ISIT63088.2025.11195479","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/74d53aa4-2f14-48af-be22-87ad0896d5fa","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/74d53aa4-2f14-48af-be22-87ad0896d5fa","pdf_url":"https://pure.tue.nl/ws/files/370274973/Strong_Converse_Exponent_for_Remote_Lossy_Source_Coding.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wu, H & Joudeh, H 2025, Strong Converse Exponent for Remote Lossy Source Coding. in 2025 IEEE International Symposium on Information Theory, ISIT 2025., 11195479, Institute of Electrical and Electronics Engineers, 2025 IEEE International Symposium on Information Theory (ISIT), Ann Arbor, United States, 22/06/25. https://doi.org/10.1109/ISIT63088.2025.11195479","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415368072.pdf","grobid_xml":"https://content.openalex.org/works/W4415368072.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1646187488","https://openalex.org/W1987570312","https://openalex.org/W1990742913","https://openalex.org/W2000446566","https://openalex.org/W2015053044","https://openalex.org/W2021456951","https://openalex.org/W2052690615","https://openalex.org/W2068143054","https://openalex.org/W2095812090","https://openalex.org/W2114085948","https://openalex.org/W2121427778","https://openalex.org/W2135469284","https://openalex.org/W2145757529","https://openalex.org/W2522673337","https://openalex.org/W2604502223","https://openalex.org/W2799632698","https://openalex.org/W2803363575","https://openalex.org/W2948913663","https://openalex.org/W3003841403","https://openalex.org/W3022414928","https://openalex.org/W4302366875","https://openalex.org/W4386075152"],"related_works":[],"abstract_inverted_index":{"Past":[0],"works":[1],"on":[2,65],"remote":[3],"lossy":[4,66],"source":[5,67],"coding":[6,68],"studied":[7],"the":[8,14,29,57],"rate":[9],"under":[10],"average":[11],"distortion":[12,19,31],"and":[13,53,69],"error":[15],"exponent":[16,48],"of":[17],"excess":[18,30],"probability.":[20],"In":[21],"this":[22],"work,":[23],"we":[24,59],"look":[25],"into":[26],"how":[27],"fast":[28],"probability":[32],"converges":[33],"to":[34],"1":[35],"at":[36],"small":[37],"rates,":[38],"also":[39,60],"known":[40],"as":[41],"exponential":[42],"strong":[43],"converse.":[44],"We":[45],"characterize":[46],"its":[47],"by":[49],"establishing":[50],"matched":[51],"upper":[52],"lower":[54],"bounds.":[55],"From":[56],"exponent,":[58],"recover":[61],"two":[62],"previous":[63],"results":[64],"biometric":[70],"authentication.":[71]},"counts_by_year":[],"updated_date":"2026-04-24T08:23:43.765630","created_date":"2025-10-21T00:00:00"}
