
-
Privacy Amplification for Federated Learning via User Sampling and Wireless Aggregation
In this paper, we study the problem of federated learning over a wireles...
read it
-
Topological Interference Management with Confidential Messages
The topological interference management (TIM) problem refers to the stud...
read it
-
Adversarial Filters for Secure Modulation Classification
Modulation Classification (MC) refers to the problem of classifying the ...
read it
-
Asymmetric Leaky Private Information Retrieval
Information-theoretic formulations of the private information retrieval ...
read it
-
Wireless Federated Learning with Local Differential Privacy
In this paper, we study the problem of federated learning (FL) over a wi...
read it
-
Communication Efficient Federated Learning over Multiple Access Channels
In this work, we study the problem of federated learning (FL), where dis...
read it
-
Latent-variable Private Information Retrieval
In many applications, content accessed by users (movies, videos, news ar...
read it
-
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation
In this paper, we study local information privacy (LIP), and design LIP ...
read it
-
Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI
In this work, we consider a Fog Radio Access Network (F-RAN) system with...
read it
-
On the Upload versus Download Cost for Secure and Private Matrix Multiplication
In this paper, we study the problem of secure and private distributed ma...
read it
-
Random Sampling for Distributed Coded Matrix Multiplication
Matrix multiplication is a fundamental building block for large scale co...
read it
-
On the Capacity of Secure Distributed Matrix Multiplication
Matrix multiplication is one of the key operations in various engineerin...
read it
-
The Capacity of Private Information Retrieval from Uncoded Storage Constrained Databases
Private information retrieval (PIR) allows a user to retrieve a desired ...
read it
-
Context-aware Data Aggregation with Localized Information Privacy
In this paper, localized information privacy (LIP) is proposed, as a new...
read it
-
On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT
In this paper, the K-user interference channel with confidential message...
read it
-
Near Optimal Coded Data Shuffling for Distributed Learning
Data shuffling between distributed cluster of nodes is one of the critic...
read it
-
Online Edge Caching and Wireless Delivery in Fog-Aided Networks with Dynamic Content Popularity
Fog Radio Access Network (F-RAN) architectures can leverage both cloud p...
read it
-
Combating Computational Heterogeneity in Large-Scale Distributed Computing via Work Exchange
Owing to data-intensive large-scale applications, distributed computatio...
read it
-
Private Information Retrieval from Storage Constrained Databases -- Coded Caching meets PIR
Private information retrieval (PIR) allows a user to retrieve a desired ...
read it
-
Hierarchical Quickest Change Detection via Surrogates
Change detection (CD) in time series data is a critical problem as it re...
read it