
Optimal CommunicationComputation TradeOff in Heterogeneous Gradient Coding
Gradient coding allows a master node to derive the aggregate of the part...
read it

The Capacity Region of Distributed MultiUser Secret Sharing
In this paper, we study the problem of distributed multiuser secret sha...
read it

MultiParty Proof Generation in QAPbased zkSNARKs
Zeroknowledge succinct noninteractive argument of knowledge (zkSNARK) ...
read it

The Discrepancy Attack on Polysharded Blockchains
Sharding, i.e. splitting the miners or validators to form and run severa...
read it

BiasResistant Social News Aggregator Based on Blockchain
In today's world, social networks have become one of the primary sources...
read it

Berrut Approximated Coded Computing: Straggler Resistance Beyond Polynomial Computing
One of the major challenges in using distributed learning to train compl...
read it

Coded Secure MultiParty Computation for Massive Matrices with Adversarial Nodes
In this work, we consider the problem of secure multiparty computation ...
read it

Fundamental Limits of Distributed Encoding
In general coding theory, we often assume that error is observed in tran...
read it

A HybridOrder Distributed SGD Method for NonConvex Optimization to Balance Communication Overhead, Computational Complexity, and Convergence Rate
In this paper, we propose a method of distributed stochastic gradient de...
read it

Corella: A Private Multi Server Learning Approach based on Correlated Queries
The emerging applications of machine learning algorithms on mobile devic...
read it

BlockMarkchain: A Secure Decentralized Data Market with a Constant Load on the Blockchain
In this paper, we develop BlockMarkchain, as a secure data market place,...
read it

Secure Coded MultiParty Computation for Massive Matrix Operations
In this paper, we consider a secure multiparty computation problem (MPC...
read it

Private Sequential Function Computation
In this paper, we introduce the problem of private sequential function c...
read it

Interactive Verifiable Polynomial Evaluation
Cloud computing platforms have created the possibility for computational...
read it

Private Shotgun DNA Sequencing: A Structured Approach
Current techniques in sequencing a genome allow a service provider (e.g....
read it

Private Inner Product Retrieval for Distributed Machine Learning
In this paper, we argue that in many basic algorithms for machine learni...
read it

CloudAided Interference Management with CacheEnabled Edge Nodes and Users
This paper considers a cloudRAN architecture with cacheenabled multia...
read it

CodedSketch: A Coding Scheme for Distributed Computation of Approximated Matrix Multiplication
In this paper, we propose CodedSketch, as a distributed stragglerresist...
read it

CodedSketch: A Coding Scheme for Distributed Computation of Approximated Matrix Multiplications
In this paper, we propose CodedSketch, as a distributed stragglerresist...
read it

GenomeWide Association Studies: Information Theoretic Limits of Reliable Learning
In the problems of GenomeWide Association Study (GWAS), the objective i...
read it

KUser Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load TradeOff
In this paper, we consider multipleantenna Kuser interference channels...
read it

On the Identifiability of Finite Mixtures of Finite Product Measures
The problem of identifiability of finite mixtures of finite product meas...
read it

Optimum Transmission Delay for Function Computation in NFVbased Networks: the role of Network Coding and Redundant Computing
In this paper, we study the problem of delay minimization in NFVbased n...
read it

MultiMessage Private Information Retrieval with Private Side Information
We consider the problem of private information retrieval (PIR) where a s...
read it

Compressed Coded Distributed Computing
Communication overhead is one of the major performance bottlenecks in la...
read it

Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding
We consider the problem of massive matrix multiplication, which underlie...
read it

Private Function Retrieval
The widespread use of cloud computing services raises the question of ho...
read it

Coded Fourier Transform
We consider the problem of computing the Fourier transform of highdimen...
read it
Mohammad Ali MaddahAli
is this you? claim profile