Search Results - "Bitar, Rawad"

Refine Results
  1. 1

    Multiple Criss-Cross Insertion and Deletion Correcting Codes by Welter, Lorenz, Bitar, Rawad, Wachter-Zeh, Antonia, Yaakobi, Eitan

    Published in IEEE transactions on information theory (01-06-2022)
    “…This paper investigates the problem of correcting multiple criss-cross insertions and deletions in arrays. More precisely, we study the unique recovery of…”
    Get full text
    Journal Article
  2. 2

    Private and rateless adaptive coded matrix-vector multiplication by Bitar, Rawad, Xing, Yuxuan, Keshtkarjahromi, Yasaman, Dasari, Venkat, El Rouayheb, Salim, Seferoglu, Hulya

    “…Edge computing is emerging as a new paradigm to allow processing data near the edge of the network, where the data is typically generated and collected. This…”
    Get full text
    Journal Article
  3. 3

    Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes by Bitar, Rawad, Parag, Parimal, El Rouayheb, Salim

    Published in IEEE transactions on communications (01-08-2020)
    “…We consider the setting of a Master server, M , who possesses confidential data and wants to run intensive computations on it, as part of a machine learning…”
    Get full text
    Journal Article
  4. 4

    Adaptive Private Distributed Matrix Multiplication by Bitar, Rawad, Xhemrishi, Marvin, Wachter-Zeh, Antonia

    Published in IEEE transactions on information theory (01-04-2022)
    “…We consider the problem of designing codes with flexible rate (referred to as rateless codes), for private distributed matrix-matrix multiplication. A master…”
    Get full text
    Journal Article
  5. 5

    Function-Correcting Codes by Lenz, Andreas, Bitar, Rawad, Wachter-Zeh, Antonia, Yaakobi, Eitan

    Published in IEEE transactions on information theory (01-09-2023)
    “…In this paper we study function-correcting codes , a new class of codes designed to protect the function evaluation of a message against errors. We show that…”
    Get full text
    Journal Article
  6. 6

    Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning by Bitar, Rawad, Wootters, Mary, El Rouayheb, Salim

    “…We consider distributed gradient descent in the presence of stragglers. Recent work on gradient coding and approximate gradient coding have shown how to add…”
    Get full text
    Journal Article
  7. 7

    Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off by Bitar, Rawad, Egger, Maximilian, Wachter-Zeh, Antonia, Xhemrishi, Marvin

    “…This work investigates the design of sparse secret sharing schemes that encode a sparse private matrix into sparse shares. This investigation is motivated by…”
    Get full text
    Journal Article
  8. 8

    Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads by Bitar, Rawad, Rouayheb, Salim El

    Published in IEEE transactions on information theory (01-02-2018)
    “…We study the communication efficient secret sharing (CESS) problem. A classical threshold secret sharing scheme encodes a secret into <inline-formula>…”
    Get full text
    Journal Article
  9. 9

    Criss-Cross Insertion and Deletion Correcting Codes by Bitar, Rawad, Welter, Lorenz, Smagloy, Ilia, Wachter-Zeh, Antonia, Yaakobi, Eitan

    Published in IEEE transactions on information theory (01-12-2021)
    “…This paper studies the problem of constructing codes correcting deletions in arrays. Under this model, it is assumed that an <inline-formula> <tex-math…”
    Get full text
    Journal Article
  10. 10

    Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound by Hofmeister, Christoph, Bitar, Rawad, Xhemrishi, Marvin, Wachter-Zeh, Antonia

    “…We consider the problem of designing secure and private codes for distributed matrix-matrix multiplication. A master server owns two private matrices and hires…”
    Get full text
    Journal Article
  11. 11

    Codes for Private Distributed Computation with Applications to Machine Learning by Bitar, Rawad

    Published 01-01-2020
    “…We consider the problem of private distributed computation. Our main interest in this problem stems from machine learning applications. A master node (referred…”
    Get full text
    Dissertation
  12. 12

    Network Coding With Myopic Adversaries by Li, Sijie, Bitar, Rawad, Jaggi, Sidharth, Zhang, Yihan

    “…We consider the problem of reliable communication over a network containing a hidden myopic adversary who can eavesdrop on some <inline-formula> <tex-math…”
    Get full text
    Journal Article
  13. 13

    Adaptive Distributed Stochastic Gradient Descent for Minimizing Delay in the Presence of Stragglers by Hanna, Serge Kas, Bitar, Rawad, Parag, Parimal, Dasari, Venkat, El Rouayheb, Salim

    “…We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on n workers each having a subset of the data…”
    Get full text
    Conference Proceeding
  14. 14

    Minimizing latency for secure distributed computing by Bitar, Rawad, Parag, Parimal, El Rouayheb, Salim

    “…We consider the setting of a master server who possesses confidential data (genomic, medical data, etc.) and wants to run intensive computations on it, as part…”
    Get full text
    Conference Proceeding
  15. 15

    Communication Efficient Secret Sharing in the Presence of Malicious Adversary by Bitar, Rawad, Jaggi, Sidharth

    “…Consider the communication efficient secret sharing problem. A dealer wants to share a secret with n parties such that any k ≤ n parties can reconstruct the…”
    Get full text
    Conference Proceeding
  16. 16

    Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees by Xhemrishi, Marvin, Bitar, Rawad, Wachter-Zeh, Antonia

    “…We consider the problem of designing a coding scheme that allows both sparsity and privacy for distributed matrix-vector multiplication. Perfect…”
    Get full text
    Conference Proceeding
  17. 17

    Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy by Hanna, Serge Kas, Bitar, Rawad

    “…We study codes that can detect the exact number of deletions and insertions in concatenated binary strings. We construct optimal codes for the case of…”
    Get full text
    Conference Proceeding
  18. 18

    Information Theoretic Private Inference in Quantized Models by Raviv, Netanel, Bitar, Rawad, Yaakobi, Eitan

    “…In a Private Inference scenario, a server holds a model (e.g., a neural network), a user holds data, and the user wishes to apply the model on her data. The…”
    Get full text
    Conference Proceeding
  19. 19

    Fast and Straggler-Tolerant Distributed SGD with Reduced Computation Load by Egger, Maximilian, Hanna, Serge Kas, Bitar, Rawad

    Published 17-04-2023
    “…In distributed machine learning, a central node outsources computationally expensive calculations to external worker nodes. The properties of optimization…”
    Get full text
    Journal Article
  20. 20

    Communication Efficient Secret Sharing in the Presence of Malicious Adversary by Bitar, Rawad, Jaggi, Sidharth

    Published 09-02-2020
    “…Consider the communication efficient secret sharing problem. A dealer wants to share a secret with $n$ parties such that any $k\leq n$ parties can reconstruct…”
    Get full text
    Journal Article