Substitution boxes (S-boxes) play a significant role in ensuring the
res...
Large language models (LLMs) based on transformers have made significant...
Communication overhead is one of the major challenges in Federated
Learn...
With the emergence of privacy leaks in federated learning, secure aggreg...
In this paper, we construct a large family of projective linear codes ov...
DNN inference requires huge effort of system development and resource co...
This work investigates a system composed of multiple distributed servers...
In this paper, we consider a cooperative communication network where mul...
Coded distributed computing can alleviate the communication load by
leve...
Spectrally constrained sequences (SCSs) play an important role in modern...
In this paper, we consider how to partition the parity-check matrices (P...
In array signal processing, a fundamental problem is to design a sensor ...
In this paper, we study the boomerang spectrum of the power mapping
F(x)...
This paper studies the application of reconfigurable intelligent surface...
In radar sensing and communications, designing Doppler resilient sequenc...
In this paper, a new repair scheme for a modified construction of MDS co...
Cooperative repair model is an available technology to deal with multipl...
The problem of Multi-user Blind X-secure T-colluding Symmetric Private
I...
In this paper, an analytical framework for evaluating the performance of...
In this paper, we construct four families of linear codes over finite fi...
Let 𝔽_p^n be the finite field with p^n elements and
Tr(·) be the trace f...
For high-rate maximum distance separable (MDS) codes, most of them are
d...
In this paper, we investigate the power functions F(x)=x^d over the fini...
This paper investigates the problem of Secure Multi-party Batch Matrix
M...
The cloud computing technique, which was initially used to mitigate the
...
This paper investigates reducing sub-packetization of capacity-achieving...
Differential uniformity is a significant concept in cryptography as it
q...
We construct maximally recoverable codes (corresponding to partial MDS c...
We study the Singleton-type bound that provides an upper limit on the mi...
The problem of X-secure T-colluding symmetric Private Polynomial
Computa...
This paper focuses on mitigating the impact of stragglers in distributed...
Federated learning, as an emerging distributed training model of neural
...
In a distributed storage system, private information retrieval (PIR)
gua...
In the literature, all the known high-rate MDS codes with the optimal re...
The optimal storage-computation tradeoff is characterized for a
MapReduc...
For high-rate maximum distance separable (MDS) codes, most early
constru...
Locally repairable codes which are optimal with respect to the bound
pre...
Coded caching systems have been widely studied to reduce the data
transm...
Support recovery of sparse signals from noisy measurements with orthogon...
Renewable energy assisted heterogeneous networks can improve system capa...
The coded caching scheme is an efficient technique as a solution to redu...