Large AI models (e.g., Dall-E, GPT4) have electrified the scientific,
te...
Byzantine-fault-tolerant (BFT) protocols underlie a variety of decentral...
Peer-to-peer (P2P) networks underlie a variety of decentralized paradigm...
Motivation: Detection of structural variants (SV) from the alignment of
...
Currently there exist many blockchains with weak trust guarantees, limit...
Proof of Work (PoW) blockchains are susceptible to adversarial majority
...
Bitcoin is the most secure blockchain in the world, supported by the imm...
Resource-based consensus is the backbone of permissionless distributed l...
Bitcoin is the most secure blockchain in the world, supported by the imm...
The success of blockchains has sparked interest in large-scale deploymen...
Several emerging PoW blockchain protocols rely on a "parallel-chain"
arc...
A popular method in practice offloads computation and storage in blockch...
Longest-chain protocols such as the one invented by Nakamoto for Bitcoin...
An important feature of Proof-of-Work (PoW) blockchains is full dynamic
...
Byzantine fault-tolerant (BFT) protocols allow a group of replicas to co...
We respond to [1] which claimed that "Modulo-SK scheme outperforms Deepc...
A key performance metric in blockchains is the latency between when a
tr...
Nakamoto invented the longest chain protocol, and claimed its security b...
Propelled by the growth of large-scale blockchain deployments, much rece...
Estimation of information theoretic quantities such as mutual informatio...
Designing codes that combat the noise in a communication medium has rema...
The Nakamoto longest chain protocol has served Bitcoin well in its decad...
In this paper, we propose coded Merkle tree (CMT), a novel hash accumula...
Federated Learning (FL) refers to learning a high quality global model b...
Deep learning classifiers are known to be vulnerable to adversarial exam...
We introduce an information-theoretic framework, named Coded State Machi...
Gating is a key feature in modern neural networks including LSTMs, GRUs ...
Conditional Mutual Information (CMI) is a measure of conditional depende...
Deep neural networks are vulnerable against adversarial examples. In thi...
Present-day communication systems routinely use codes that approach the
...
Designing channel codes under low latency constraints is one of the most...
Information theoretic quantities play an important role in various setti...
Transaction throughput, confirmation latency and confirmation reliabilit...
Today's blockchains do not scale in a meaningful sense. As more nodes jo...
Generative Adversarial networks (GANs) have obtained remarkable success ...
The design of codes for communicating reliably over a statistically well...
Given independent samples generated from the joint distribution
p(x,y,z)...
Coding theory is a central discipline underpinning wireline and wireless...
Mixture-of-Experts (MoE) is a widely popular neural network architecture...
The conditional mutual information I(X;Y|Z) measures the average informa...
Discovering a correlation from one variable to another variable is of
fu...
We consider the setting where a collection of time series, modeled as ra...
We conduct an axiomatic study of the problem of estimating the strength ...