IEEE Transactions on Information Theory

Papers
(The H4-Index of IEEE Transactions on Information Theory is 31. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Template Matching and Change Point Detection by M-Estimation349
Federated Best Arm Identification With Heterogeneous Clients227
Max-Linear Regression by Convex Programming118
On the Zero-Error Capacity of the Modulo-Additive Noise Channel With Help117
On Universal D-Semifaithful Coding for Memoryless Sources With Infinite Alphabets105
Dimension-Free Noninteractive Simulation From Gaussian Sources103
Minimum Energy Analysis for Robust Gaussian Joint Source-Channel Coding With a Distortion-Noise Profile102
IEEE Transactions on Information Theory Publication Information72
Table of Contents67
Table of Contents58
Robust Mean Estimation in High Dimensions: An Outlier-Fraction Agnostic and Efficient Algorithm57
Communicating Over a Classical-Quantum MAC With State Information Distributed at the Senders57
Grouping-Based Cyclic Scheduling Under Age of Correlated Information Constraints52
Sequence Pairs With Lowest Combined Autocorrelation and Crosscorrelation48
Exact Recovery in the General Hypergraph Stochastic Block Model44
Recoverable Systems41
Fundamental Limits of Reference-Based Sequence Reordering40
IEEE Transactions on Information Theory Information for Authors38
Lossy Quantum Source Coding With a Global Error Criterion Based on a Posterior Reference Map38
Breaking and Improving a Lattice-Code-Based Cryptosystem by Li, Ling, Xing, and Yeo37
Improved Decoding Algorithms for MDS and Almost-MDS Codes From Twisted GRS Codes36
Hypercontractivity for Quantum Erasure Channels via Variable Multipartite Log-Sobolev Inequality34
RQC Revisited and More Cryptanalysis for Rank-Based Cryptography34
A Locality-Based Lens for Coded Computation34
Rigorous State Evolution Analysis for Approximate Message Passing With Side Information34
Fast Correlation Attacks on K2 Stream Cipher33
Information Rates Over Multi-View Channels33
Structural Complexity of One-Dimensional Random Geometric Graphs33
Asymptotic Errors for Teacher-Student Convex Generalized Linear Models (Or: How to Prove Kabashima’s Replica Formula)33
Random Periodic Sampling Patterns for Shift-Invariant Spaces31
Tsallis and Rényi Deformations Linked via a New λ-Duality31
Minimal Binary Linear Codes From Vectorial Boolean Functions31
Advancing the Idea of Probabilistic Neutral Bits: First Key Recovery Attack on 7.5 Round ChaCha31
0.19693684577942