Search Results - "Avestimehr, A. Salman"
-
1
Byzantine-Resilient Secure Federated Learning
Published in IEEE journal on selected areas in communications (01-07-2021)“…Secure federated learning is a privacy-preserving framework to improve machine learning models by training over large volumes of data collected by mobile…”
Get full text
Journal Article -
2
A Fundamental Tradeoff Between Computation and Communication in Distributed Computing
Published in IEEE transactions on information theory (01-01-2018)“…How can we optimally trade extra computing power to reduce the communication load in distributed computing? We answer this question by characterizing a…”
Get full text
Journal Article -
3
HeteroSAg: Secure Aggregation With Heterogeneous Quantization in Federated Learning
Published in IEEE transactions on communications (01-04-2022)“…Secure model aggregation across many users is a key component of federated learning systems. The state-of-the-art protocols for secure model aggregation, which…”
Get full text
Journal Article -
4
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Published in IEEE journal on selected areas in information theory (01-03-2021)“…Federated learning is a distributed framework for training machine learning models over the data residing at mobile devices, while protecting the privacy of…”
Get full text
Journal Article -
5
A Sampling Theory Perspective of Graph-Based Semi-Supervised Learning
Published in IEEE transactions on information theory (01-04-2019)“…Graph-based methods have been quite successful in solving unsupervised and semi-supervised learning problems, as they provide a means to capture the underlying…”
Get full text
Journal Article -
6
Communication-Aware Scheduling of Serial Tasks for Dispersed Computing
Published in IEEE/ACM transactions on networking (01-08-2019)“…There is a growing interest in the development of in-network dispersed computing paradigms that leverage the computing capabilities of heterogeneous resources…”
Get full text
Journal Article -
7
Cache-Aided Interference Management in Wireless Cellular Networks
Published in IEEE transactions on communications (01-05-2019)“…We consider the problem of interference management in wireless cellular networks with caches at both base stations and receivers, and we characterize the…”
Get full text
Journal Article -
8
An Approximation Algorithm for Optimal Clique Cover Delivery in Coded Caching
Published in IEEE transactions on communications (01-07-2019)“…Coded caching can significantly reduce the communication bandwidth requirement for satisfying users' demands by utilizing the multicasting gain among multiple…”
Get full text
Journal Article -
9
Outage Capacity of the Fading Relay Channel in the Low-SNR Regime
Published in IEEE transactions on information theory (01-04-2007)“…In slow-fading scenarios, cooperation between nodes can increase the amount of diversity for communication. We study the performance limit in such scenarios by…”
Get full text
Journal Article -
10
Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding
Published in IEEE transactions on information theory (01-03-2020)“…We consider the problem of massive matrix multiplication, which underlies many data analytic applications, in a large-scale distributed system comprising a…”
Get full text
Journal Article -
11
The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching
Published in IEEE transactions on information theory (01-02-2018)“…We consider a basic cache network, in which a single server is connected to multiple users via a shared bottleneck link. The server has a database of files…”
Get full text
Journal Article -
12
List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier
Published in IEEE journal on selected areas in information theory (01-09-2021)“…We consider the problem of coded computing, where a computational task is performed in a distributed fashion in the presence of adversarial workers. We propose…”
Get full text
Journal Article -
13
Characterizing the Rate-Memory Tradeoff in Cache Networks Within a Factor of 2
Published in IEEE transactions on information theory (01-01-2019)“…We consider a basic caching system, where a single server with a database of <inline-formula> <tex-math notation="LaTeX">N </tex-math></inline-formula> files…”
Get full text
Journal Article -
14
Interference management with mismatched partial channel state information
Published in EURASIP journal on wireless communications and networking (03-08-2017)“…We study the fundamental limits of communications over multi-layer wireless networks where each node has only limited knowledge of the channel state…”
Get full text
Journal Article -
15
Coded Computing for Resilient, Secure, and Privacy-Preserving Distributed Matrix Multiplication
Published in IEEE transactions on communications (01-01-2021)“…Coded computing is a new framework to address fundamental issues in large scale distributed computing, by injecting structured randomness and redundancy. We…”
Get full text
Journal Article -
16
Analog Lagrange Coded Computing
Published in IEEE journal on selected areas in information theory (01-03-2021)“…A distributed computing scenario is considered, where the computational power of a set of worker nodes is used to perform a certain computation task over a…”
Get full text
Journal Article -
17
A Scalable Framework for Wireless Distributed Computing
Published in IEEE/ACM transactions on networking (01-10-2017)“…We consider a wireless distributed computing system, in which multiple mobile users, connected wirelessly through an access point, collaborate to perform a…”
Get full text
Journal Article -
18
Analog Secret Sharing With Applications to Private Distributed Learning
Published in IEEE transactions on information forensics and security (2022)“…We consider the critical problems of distributed computing and learning over data while keeping it private from the computational servers. The state-of-the-art…”
Get full text
Journal Article -
19
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Published in IEEE journal on selected areas in information theory (01-03-2021)“…How to train a machine learning model while keeping the data private and secure? We present CodedPrivateML, a fast and scalable approach to this critical…”
Get full text
Journal Article -
20
Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing
Published in IEEE/ACM transactions on networking (01-06-2021)“…With recent advancements in edge computing capabilities, there has been a significant increase in utilizing the edge cloud for event-driven and time-sensitive…”
Get full text
Journal Article