Coded computing has proved to be useful in distributed computing. We hav...
In this paper, we propose an efficient secure aggregation scheme for
fed...
We study a K-user coded-caching broadcast problem in a joint source-chan...
Payment channel networks (PCNs) are a promising technology to improve th...
Bitcoin is the most secure blockchain in the world, supported by the imm...
We propose SwiftAgg+, a novel secure aggregation protocol for federated
...
In attribute-based access control, users with certain verified attribute...
We propose SwiftAgg, a novel secure aggregation protocol for federated
l...
Gradient coding allows a master node to derive the aggregate of the part...
In this paper, we study the problem of distributed multi-user secret sha...
Zero-knowledge succinct non-interactive argument of knowledge (zkSNARK)
...
Sharding, i.e. splitting the miners or validators to form and run severa...
In today's world, social networks have become one of the primary sources...
One of the major challenges in using distributed learning to train
compl...
In this work, we consider the problem of secure multi-party computation
...
In general coding theory, we often assume that error is observed in
tran...
In this paper, we propose a method of distributed stochastic gradient de...
The emerging applications of machine learning algorithms on mobile devic...
In this paper, we develop BlockMarkchain, as a secure data market place,...
In this paper, we consider a secure multi-party computation problem (MPC...
In this paper, we introduce the problem of private sequential function
c...
Cloud computing platforms have created the possibility for computational...
Current techniques in sequencing a genome allow a service provider (e.g....
In this paper, we argue that in many basic algorithms for machine learni...
This paper considers a cloud-RAN architecture with cache-enabled
multi-a...
In this paper, we propose CodedSketch, as a distributed straggler-resist...
In this paper, we propose CodedSketch, as a distributed straggler-resist...
In the problems of Genome-Wide Association Study (GWAS), the objective i...
In this paper, we consider multiple-antenna K-user interference channels...
The problem of identifiability of finite mixtures of finite product meas...
In this paper, we study the problem of delay minimization in NFV-based
n...
We consider the problem of private information retrieval (PIR) where a s...
Communication overhead is one of the major performance bottlenecks in
la...
We consider the problem of massive matrix multiplication, which underlie...
The widespread use of cloud computing services raises the question of ho...
We consider the problem of computing the Fourier transform of
high-dimen...