1 |
M. Aldridge, L. Baldassini, and O. Johnson, "Group Testing Algorithms: Bounds and Simulations," IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3671-3687, Jun. 2014.
DOI
|
2 |
W. H. Kautz and R. R. Singleton,"Nonrandom binary superimposed codes," IEEE Trans. Inf. Theory, vol. 10, pp. 363-377, 1964.
DOI
|
3 |
R.G. Gallager, "Low density parity check codes," IRE Transasction Information Theory, vol. IT-8, no. 1, pp. 21- 28, Jan. 1962.
DOI
|
4 |
H. Uehara and M. Jimbo, "A Positive Detecting Code and Its Decoding Algorithm for DNA Library Screening," IEEE Trans. Computational Biology and Bioinformatics, vol. 6, no. 4. pp. 652-666, Oct. 2009.
|
5 |
D. Malioutov and M. Malyutov, "Boolean compressed sensing: LP relaxation for group testing," IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3305-3308, March 2012.
|
6 |
C.M. Verdun et al., "Group Testing for SARS-CoV-2 Allows for Up to 10-Fold Efficiency Increase Across Realistic Scenarios and Testing Strategies," Frontiers in Public Health, 9:583377, Aug. 2021.
DOI
|
7 |
L. Mutesa, et al., "A pooled testing strategy for identifying SARS-CoV-2 at low prevalence," Nature 589, pp. 276-280, Oct. 2020.
DOI
|
8 |
D.-Z. Du and F.K. Hwang, Pooling Designs and Nonadaptive Group Testing: Important Tools for DNA Sequencing, World Scientific, 2006.
|
9 |
Accessed: https://www.worldometers.info/coronavirus/
|
10 |
R. Dorfman, "The Detection of Defective Members of Large Populations," The Annals of Mathematical Statistics, vol. 14, no. 4, pp. 436-440, Dec. 1943.
DOI
|
11 |
S. Cai, M. Jahangoshahi, M. Bakshi, and S. Jaggi, "Efficient algorithms for noisy group testing," IEEE Trans. Inf. Theory, vol. 63, no. 4, pp. 2113-2136, 2017.
DOI
|
12 |
M. B. Malyutov and P. S. Mateev, "Screening designs for non-symmetric response function," Mat. Zametki, vol. 29, pp. 109-127, 1980.
|
13 |
J. Scarlett and V. Cevher, "Limits on support recovery with probabilistic models: An information-theoretic framework," IEEE Trans. Inf. Theory, vol. 63, no. 1, pp. 593-620, 2017.
DOI
|
14 |
C.L. Chan, P.H. Che, S. Jaggi, and V. Saligrama, "Non-adaptive probabilistic group testing with noisy measurements: near-optimal bounds with efficient algorithms," 49th Annual Allerton Conference on Communication, Control, and Computing, pp. 1832-1839. Sep. 2011.
|
15 |
H. A. Inan, P. Kairouz, M. Wootters, and A. Ozgur, "On the optimality of the Kautz-Singleton construction in probabilistic group testing," IEEE Trans. Inf. Theory, vol. 65, no. 9, pp. 5592-5603, Sep. 2019.
DOI
|
16 |
S. Bondorf, B. Chen, J. Scarlett, H. Yu, and Y. Zhao, "Sublinear-time non-adaptive group testing with O(k log n) tests via bit-mixing coding," IEEE Trans. Inf. Theory, vol. 67, no. 3. pp. 1559-1570, 2021.
DOI
|
17 |
D.A. Mistry et al., "A systematic review of the sensitivity and specificity of lateral flow devices in the detection of SARS-CoV-2", BMC Infectious Diseases, 21:828, 2021.
DOI
|
18 |
M. Malyutov, "The separating property of random matrices," Math. Notes Acad. Sci. USSR, vol. 23, no. 1, pp. 84-91, 1978.
DOI
|
19 |
J.-T. Seong, "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19" Diagnostics 2020, 10(6), 396, Jun. 2020.
DOI
|
20 |
J.-T. Seong, "Group Testing Scheme for Effective Diagnosis of COVID-19," Journal of Korea Institute of Information, Electronics, and Communication Technology, vol. 14, no. 6. pp. 445-451, Dec. 2021.
DOI
|
21 |
M. Aldridge, "The capacity of Bernoulli nonadaptive group testing," IEEE Trans. Inf. Theory, vol. 63, no. 11, pp. 7142-7148, 2017.
DOI
|
22 |
A. G. Dyachkov and V. V. Rykov,"A survey of superimposed code theory," Problems of Control Information Theory, vol. 12, pp. 1-13, 1983.
|
23 |
D. Sejdinovic and O. Johnson, "Note on noisy group testing: Asymptotic bounds and belief propagation reconstruction," 48th Annual Allerton Conference on Communication, Control, and Computing, Sep. 2010.
|
24 |
K. Lee, R. Pedarsani, and K. Ramchandran, "SAFFRON: A fast, efficient, and robust framework for group testing based on sparse-graph codes," IEEE International Symposium on Information Theory (ISIT), July 2016.
|
25 |
M. T. Goodrich, M. J. Atallah, and R. Tamassia, "Indexing information for data forensics," Proceedings of the Third international conference on Applied Cryptography and Network Security, pp. 206 -221. 2005.
|