2025 Asia Pacific Workshop on Data Science and Information Theory
Technical Program
Home / Technical Program

,


Technical Program

All times listed in Local Time in China

Day 1

Monday, Oct. 20

Day 2

Tuesday, Oct. 21

Day 3

Wednesday, Oct. 22

Day 4

Thursday, Oct. 23

f21ab43aa59091eddcc079d32609c40f.png

e901c469d3e5dd833c8498519e40f945.png

· Day 1 - Monday, Oct. 20

8:00-18:00

Registration Desk

1F, Lobby

8:30-9:30

Tutorial 1: Semantic Information Theory: Rate-distortion Approaches

Wenyi Zhang, Professor, University of Science and Technology of China

B1, Meeting Room Ⅱ

9:30-10:00

Coffee Break

B1, Banquet Hall Corridor

10:00-11:00

Session 1

Invited Talk 1: If Rand()%10 is Bad, How to Use TRNG Efficiently?

Hsin-Po Wang, Assistant Professor, National Taiwan University

Invited Talk 2: Forget BIT, It' s All about TOKEN!-Towards the Mathematical Theory of Semantic

Bo Bai, Director of Theory Lab, Chief Scientist of Information Theory, Huawei Technologies Co., Ltd.

Learning-based Joint Geometric-ProbabiIistic Shaping for DigitaI Semantic Communication

Wei Liu, University of Science and Technology of China; Shuo Shao,University of Shanghai for Science and Technology; Wenyi Zhang,University of Science and Technology of China

B1, Meeting Room Ⅱ

11:00-11:30

Coffee Break

B1, Banquet Hall Corridor

11:30-12:30

Session 2

Invited Talk 3: On the Fundamental Limits of Generative Communication

Jun Chen,Professor,McMaster University

Quickest Change Detection of Network Structure in Forest Ising ModeIs

Frank Lin, Academia Sinica; I-Hsiang Wang, National Taiwan University

Invited Talk 4: On Short Linear Codes with Nearly Optimal Asymptotic Frame Error Rate

Wai Ho MOW,Associate Dean of Engineering (Undergraduate Studies), Professor,The Hong Kong University of Science and Technology

B1, Meeting Room Ⅱ

12:30-15:00

Lunch Event: Huawei Event

B1, Meeting Room Ⅱ

15:00-16:00

Session 3

Unbounded MuIti-Letter MarginaI Gain for Bistatic Integrated Sensing and Communication

Xinjie Yuan, Tsinghua Shenzhen International Graduate School, Tsinghua University; Tianren Peng, Tsinghua Shenzhen International Graduate School, Tsinghua University; Haohao Fu, Tsinghua Shenzhen International Graduate School, Tsinghua University; Shao-Lun Huang, Tsinghua Shenzhen International Graduate School, Tsinghua University

MuIti-Ietter AnaIysis of MarginaI Rate-Fisher Information Tradeoff: Unbounded Gain

Xinjie Yuan, Tsinghua Shenzhen International Graduate School, Tsinghua University; Tianren Peng, Tsinghua Shenzhen International Graduate School, Tsinghua University;Haohao Fu, Tsinghua Shenzhen International Graduate School, Tsinghua University; Shao-Lun Huang, Tsinghua Shenzhen International Graduate School, Tsinghua University 

Unbounded Computing Gain for Joint Coding over Reversed Combination Networks

Xiufang Sun, Nankai University; Shanshan Li, Nankai University; Delong Li, Nankai University; Xuan Guang; Nankai University

B1, Meeting Room Ⅱ

18:00-20:00

Welcome Reception

B1, Meeting Room Ⅱ

· Day 2 - Tuesday, Oct. 21

8:00-18:00

Registration Desk

1F, Lobby

8:30-9:30

Tutorial 2: Information-theoretic Cryptography

Shun Watanabe,Associate Professor,Tokyo University of Agriculture and Technology

B1, Meeting Room Ⅱ

9:30-10:00

Coffee Break

B1, Banquet Hall Corridor

10:00-11:00

Session 4

Invited Talk 5: Byzantine Distributed Function Computation

Vinod Prabhakaran, Associate Professor,Tata Institute of Fundamental Research, India 

Invited Talk 6: Information-theoretic Security, Revisited

Mitsugu Iwamoto,Professor,University of Electro-Communications

Chaos-Based Cryptography Using DuaI-channeI Switching

Chien-Shu Hsieh, Chinese Culture University; Chang-Ming Wu, Chung Yuan Christian University

B1, Meeting Room Ⅱ

11:00-11:30

Coffee Break

B1, Banquet Hall Corridor

11:30-12:30

Session 5

Invited Talk 7: On the Source Model Key Agreement Problem

Amin Gohari, Vice-Chancellor Associate Professor, The Chinese University of Hong Kong

Invited Talk 8: Differential Privacy over Affine Manifolds

Guodong Shi, Associate Professor, The University of Sydney

Bounds for IndividuaI Keys in Vector Linear Secure Aggregation

Zhou Li, Guangxi University; Wenting Shi,Guangxi Beitou Xinchuang Technology Investment Group Company Limited;Haiqiang Chen, Guangxi University; Jihao Fan, Southeast University


B1, Meeting Room Ⅱ

12:30-15:00

Lunch Event: Meet with IT Leadership

B1, Meeting Room Ⅱ

15:00-16:00

Session 6

DistributionaI Information Embedding: A Framework for MuIti-bit Watermarking

Haiyun He, Cornell University; Yepeng Liu, University of California, Santa Barbara; Ziqiao Wang,Tongji University; Yongyi Mao, University of Ottawa; Yuheng Bu,University of Florida

A Privacy-Preserving Network-Coded Federated Learning System

Jieyi Deng, Sun Yat-sen University; Congduan Li, Sun Yat-sen University

Invited Talk 9: A Deep Learning Approach to the Rate-Distortion Bounds of Image Compression

Dong Liu, Professor, The University of Science and Technology of China

B1, Meeting Room Ⅱ

18:00-20:30

Banquet

B1, Meeting Room Ⅲ&Ⅳ

· Day 3 - Wednesday, Oct. 22

8:00-18:00

Registration Desk

1F, Lobby

9:00-10:00

Session 7

Invited Talk 10: CrossMPT: Cross-attention Message-passing Transformer for Error Correcting Codes

Yongjune Kim, Associate Professor,Pohang University of Science and Technology

Invited Talk 11: Rate-distortion Theory for Multi-user Semantic Compression

Tao Guo, Associate Professor, Southeast University

Cross-Domain Logistic Loss Based Siamese Network for VisuaI Tracking

Zhuoyang Li, Beijing University of Posts and Telecommunications;Xinhao Ji, Peking University; Wangyining Lu, Beijing University of Posts and Telecommunications; Ping Wang, Beijing University of Posts and Telecommunications; Chenyuan Sun, Beijing University of Posts and Telecommunications; Shuo Chang,Beijing University of Posts and Telecommunications 

B1, Meeting Room Ⅱ

10:00-10:30

Coffee Break

B1, Banquet Hall Corridor

10:30-11:30

Session 8

* Invited Talk 12: Semantic Information Theory and Method 

Kai Niu, Professor, Beijing University of Posts and Telecommunications

( Kai Niu, Beijing University of Posts and Telecommunications; Zijian Liang, Beijing University of Posts and Telecommunications; Ping Zhang, WTI-BUPT )

Sharp Rényi--Entropic Isoperimetric InequaIities with AppIications to Rényi-Entropy Power InequaIities

Hao Wu, Xi'an Jiaotong University; Lei Yu, Nankai University

A Note on ChanneI ResoIvabiIity Rate with SubcIass of f -divergences

Ryo Nomura,Waseda University; Hideki Yagi,University of Electro-Communications

B1, Meeting Room Ⅱ

14:00-18:00

Excursion

TBA

· Day 4 - Thursday, Oct. 23

8:00-18:00

Registration Desk

1F, Lobby

8:30-9:30

Tutorial 3: ChanneI Coding beyond 5G

Huazi Zhang, Research Engineer, Huawei Technologies Co., Ltd.

B1, Meeting Room Ⅱ

9:30-10:00

Coffee Break

B1, Banquet Hall Corridor

10:00-11:00

Session 9

Invited Talk 13: Research on Hardware-Friendly LDPC Code

Xiaohu Tang, Professor,Southwest Jiaotong University

Invited Talk 14: Decomposition and Combination: Way to Near-Optimal Decoding

Qin Huang, Professor, Beihang University

MatmuI-Based WAVA impIementation for TaiIbiting ConvoIutionaI Codes 

Tingyi Wu, Huawei Technologies Co., Ltd.

B1, Meeting Room Ⅱ

11:00-11:30

Coffee Break

B1, Banquet Hall Corridor

11:30-12:30

Session 10

Invited Talk 15: Improving the Performance of Polar Codes using Feedback

Ling Liu, Associate Professor, Xidian University (Guangzhou)

Enhancing QECC Measurements With CIassicaI PoIar Codes: Insights From Toric Codes

Jifan Liang, Sun Yat-sen University; Qianfan Wang, Sun Yat-sen University; Lvzhou Li, Sun Yat-sen University; Baodian Wei, Sun Yat-sen University; Xiao Ma, Sun Yat-sen University   

A Maximum-LikeIihood Decoding of BCH Codes

Qianfan Wang, Sun Yat-sen University; Yiwen Wang, Sun Yat-sen University; Jifan Liang, Sun Yat-sen University; Linqi Song, City University of Hong Kong; Xiao Ma, Sun Yat-sen University

B1, Meeting Room Ⅱ

12:30-15:00

Lunch Event: Meet with IT Leadership

B1, Meeting Room Ⅱ

15:00-16:00

Session 11

OverIapped Arithmetic Code is a Many-to-Many Mapping for Nonuniform Sources

Yong Fang, Chang'an University

Computing Gaussian Mixture Inputs for ChanneIs With Additive Gaussian Mixture Noises

Yanan Dou, Xidian University; Xueyan Niu, Theory Lab, Huawei Technologies; Bo Bai, Huawei Technologies Co., Ltd.; Wei Han, Huawei Technologies Co., Ltd.; Yanlin Geng, Xidian University

Asymptotic AnaIysis for OptimaI Source Weights in MuIti-Source Transfer Learning

Qingyue Zhang, Tsinghua Shenzhen International Graduate School, Tsinghua University; Chang Chu,Tsinghua Shenzhen International Graduate School, Tsinghua University; Haohao Fu,Tsinghua Shenzhen International Graduate School, Tsinghua University; Tianren Peng,Tsinghua Shenzhen International Graduate School, Tsinghua University; Shao-Lun Huang, Tsinghua Shenzhen International Graduate School, Tsinghua University

B1, Meeting Room Ⅱ