We consider a fully decentralized scenario in which no central trusted e...
We consider the low rank matrix completion problem over finite fields. T...
In this work, we propose methods for speeding up linear regression
distr...
In this paper, we leverage polar codes and the well-established channel
...
Reed-Muller (RM) codes achieve the capacity of general binary-input
memo...
We propose a collision recovery algorithm with the aid of machine learni...
We consider the problem of binary string reconstruction from the multise...
In this work, we propose a method for speeding up linear regression
dist...
Federated learning (FL) is an emerging privacy-preserving paradigm, wher...
This paper addresses the gradient coding and coded matrix multiplication...
Due to the surge of cloud-assisted AI services, the problem of designing...
Landmark codes underpin reliable physical layer communication, e.g.,
Ree...
Concatenating the state-of-the-art codes at moderate rates with repetiti...
We consider the problem of coded distributed computing where a large lin...
Reed-Muller (RM) codes are conjectured to achieve the capacity of any
bi...
We consider the problem of coded computing where a computational task is...
Models trained in machine learning processes may store information about...
In this paper, we study codes with sparse generator matrices. More
speci...
Constructing efficient low-rate error-correcting codes with low-complexi...
A distributed computing scenario is considered, where the computational ...
In this paper, we investigate covert communication over millimeter-wave
...
We consider the critical problem of distributed learning over data while...
In this paper, we present a low-complexity recursive approach for massiv...
In this paper we study codes with sparse generator matrices. More
specif...
A major hurdle in machine learning is scalability to massive datasets. O...
The problem of cell association is considered for cellular users present...
A novel framework for sharing common randomness and generating secret ke...
Cryptographic protocols are often implemented at upper layers of
communi...
We provide a precise framework to study subspace codes for non-coherent
...
In this paper, we investigate covert communication over millimeter-wave
...
We consider the problem of symmetric secret key generation in
quasi-stat...
This paper models the crowdsourced labeling/classification problem as a
...
We consider the problem of coded distributed computing where a large lin...
In this paper, we consider a relay-assisted uplink non-orthogonal multip...
Low-capacity scenarios have become increasingly important in the technol...
In this paper, we consider a relay-assisted uplink non-orthogonal multip...
Nonorthogonal multiple access (NOMA) is a promising technology to meet t...
A distributed secret sharing system is considered that consists of a dea...