scispace - formally typeset
A

Abdellatif Zaidi

Researcher at Huawei

Publications -  17
Citations -  127

Abdellatif Zaidi is an academic researcher from Huawei. The author has contributed to research in topics: Decoding methods & Encoder. The author has an hindex of 5, co-authored 17 publications receiving 78 citations. Previous affiliations of Abdellatif Zaidi include Institut Gaspard Monge.

Papers
More filters
Journal ArticleDOI

On the Information Bottleneck Problems: Models, Connections, Applications and Information Theoretic Views.

TL;DR: This tutorial paper focuses on the variants of the bottleneck problem taking an information theoretic perspective and discusses practical methods to solve it, as well as its connection to coding and learning aspects.
Proceedings ArticleDOI

Hypothesis Testing Against Independence Under Gaussian Noise

TL;DR: An upper bound on the exponent-rates function is derived from a variant of the many-help one hypothesis testing against independence problem in which the source has finite differential entropy and the observation noises under the null hypothesis are Gaussian.
Proceedings ArticleDOI

Compute-remap-compress-and-forward for limited backhaul uplink multicell processing

TL;DR: A lattice-based coding scheme is proposed in which the BSs decode linear combinations of the transmitted messages, in the spirit of Compute-and-Forward (CoF), but differs from it essentially in that the decoded equations are remapped to linear combination of the channel input symbols.
Proceedings ArticleDOI

Partial compute-compress-and-forward for limited backhaul uplink multicell processing

TL;DR: A lattice based coding scheme is developed that generalizes both compute-and-forward and successive Wyner-Ziv coding for this model of transmission over a cloud radio access network and is shown to strictly outperform the best of the aforementioned two popular schemes.
Proceedings ArticleDOI

Secure lossy helper and Gray-Wyner problems

TL;DR: This work establishes single-letter characterizations of the optimal secure rate-distortion regions of both models and sheds important light on the role of the private link(s) for the transmission of the source S0 or for sharing a secret key that is then used to encrypt thesource S0 over the public link.