Search Results - "Bitar, Rawad"
-
1
Multiple Criss-Cross Insertion and Deletion Correcting Codes
Published in IEEE transactions on information theory (01-06-2022)“…This paper investigates the problem of correcting multiple criss-cross insertions and deletions in arrays. More precisely, we study the unique recovery of…”
Get full text
Journal Article -
2
Private and rateless adaptive coded matrix-vector multiplication
Published in EURASIP journal on wireless communications and networking (22-01-2021)“…Edge computing is emerging as a new paradigm to allow processing data near the edge of the network, where the data is typically generated and collected. This…”
Get full text
Journal Article -
3
Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes
Published in IEEE transactions on communications (01-08-2020)“…We consider the setting of a Master server, M , who possesses confidential data and wants to run intensive computations on it, as part of a machine learning…”
Get full text
Journal Article -
4
Adaptive Private Distributed Matrix Multiplication
Published in IEEE transactions on information theory (01-04-2022)“…We consider the problem of designing codes with flexible rate (referred to as rateless codes), for private distributed matrix-matrix multiplication. A master…”
Get full text
Journal Article -
5
Function-Correcting Codes
Published in IEEE transactions on information theory (01-09-2023)“…In this paper we study function-correcting codes , a new class of codes designed to protect the function evaluation of a message against errors. We show that…”
Get full text
Journal Article -
6
Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning
Published in IEEE journal on selected areas in information theory (01-05-2020)“…We consider distributed gradient descent in the presence of stragglers. Recent work on gradient coding and approximate gradient coding have shown how to add…”
Get full text
Journal Article -
7
Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off
Published in IEEE transactions on information forensics and security (2024)“…This work investigates the design of sparse secret sharing schemes that encode a sparse private matrix into sparse shares. This investigation is motivated by…”
Get full text
Journal Article -
8
Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads
Published in IEEE transactions on information theory (01-02-2018)“…We study the communication efficient secret sharing (CESS) problem. A classical threshold secret sharing scheme encodes a secret into <inline-formula>…”
Get full text
Journal Article -
9
Criss-Cross Insertion and Deletion Correcting Codes
Published in IEEE transactions on information theory (01-12-2021)“…This paper studies the problem of constructing codes correcting deletions in arrays. Under this model, it is assumed that an <inline-formula> <tex-math…”
Get full text
Journal Article -
10
Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound
Published in IEEE journal on selected areas in information theory (01-06-2022)“…We consider the problem of designing secure and private codes for distributed matrix-matrix multiplication. A master server owns two private matrices and hires…”
Get full text
Journal Article -
11
Codes for Private Distributed Computation with Applications to Machine Learning
Published 01-01-2020“…We consider the problem of private distributed computation. Our main interest in this problem stems from machine learning applications. A master node (referred…”
Get full text
Dissertation -
12
Network Coding With Myopic Adversaries
Published in IEEE journal on selected areas in information theory (01-12-2021)“…We consider the problem of reliable communication over a network containing a hidden myopic adversary who can eavesdrop on some <inline-formula> <tex-math…”
Get full text
Journal Article -
13
Adaptive Distributed Stochastic Gradient Descent for Minimizing Delay in the Presence of Stragglers
Published in ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-05-2020)“…We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on n workers each having a subset of the data…”
Get full text
Conference Proceeding -
14
Minimizing latency for secure distributed computing
Published in 2017 IEEE International Symposium on Information Theory (ISIT) (01-06-2017)“…We consider the setting of a master server who possesses confidential data (genomic, medical data, etc.) and wants to run intensive computations on it, as part…”
Get full text
Conference Proceeding -
15
Communication Efficient Secret Sharing in the Presence of Malicious Adversary
Published in 2020 IEEE International Symposium on Information Theory (ISIT) (01-06-2020)“…Consider the communication efficient secret sharing problem. A dealer wants to share a secret with n parties such that any k ≤ n parties can reconstruct the…”
Get full text
Conference Proceeding -
16
Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees
Published in 2022 IEEE International Symposium on Information Theory (ISIT) (26-06-2022)“…We consider the problem of designing a coding scheme that allows both sparsity and privacy for distributed matrix-vector multiplication. Perfect…”
Get full text
Conference Proceeding -
17
Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy
Published in 2021 IEEE International Symposium on Information Theory (ISIT) (12-07-2021)“…We study codes that can detect the exact number of deletions and insertions in concatenated binary strings. We construct optimal codes for the case of…”
Get full text
Conference Proceeding -
18
Information Theoretic Private Inference in Quantized Models
Published in 2022 IEEE International Symposium on Information Theory (ISIT) (26-06-2022)“…In a Private Inference scenario, a server holds a model (e.g., a neural network), a user holds data, and the user wishes to apply the model on her data. The…”
Get full text
Conference Proceeding -
19
Fast and Straggler-Tolerant Distributed SGD with Reduced Computation Load
Published 17-04-2023“…In distributed machine learning, a central node outsources computationally expensive calculations to external worker nodes. The properties of optimization…”
Get full text
Journal Article -
20
Communication Efficient Secret Sharing in the Presence of Malicious Adversary
Published 09-02-2020“…Consider the communication efficient secret sharing problem. A dealer wants to share a secret with $n$ parties such that any $k\leq n$ parties can reconstruct…”
Get full text
Journal Article