Skip to main content

Showing 1–8 of 8 results for author: Yona, Y

.
  1. arXiv:2011.06223  [pdf, other

    cs.DC cs.LG stat.ML

    Coded Computing for Low-Latency Federated Learning over Wireless Edge Networks

    Authors: Saurav Prakash, Sagar Dhakal, Mustafa Akdeniz, Yair Yona, Shilpa Talwar, Salman Avestimehr, Nageen Himayat

    Abstract: Federated learning enables training a global model from data located at the client nodes, without data sharing and moving client data to a centralized server. Performance of federated learning in a multi-access edge computing (MEC) network suffers from slow convergence due to heterogeneity and stochastic fluctuations in compute power and communication link qualities across clients. We propose a no… ▽ More

    Submitted 9 May, 2021; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: Final version to appear in the first issue of the IEEE JSAC Series on Machine Learning for Communications and Networks

  2. Coded Federated Learning

    Authors: Sagar Dhakal, Saurav Prakash, Yair Yona, Shilpa Talwar, Nageen Himayat

    Abstract: Federated learning is a method of training a global model from decentralized data distributed across client devices. Here, model parameters are computed locally by each client device and exchanged with a central server, which aggregates the local models for a global view, without requiring sharing of training data. The convergence performance of federated learning is severely impacted in heterogen… ▽ More

    Submitted 22 December, 2020; v1 submitted 21 February, 2020; originally announced February 2020.

    Comments: Presented at the Wireless Edge Intelligence Workshop, IEEE GLOBECOM 2019

  3. arXiv:1808.01516  [pdf, other

    cs.CR

    Implementation and Analysis of Stable PUFs Using Gate Oxide Breakdown

    Authors: Wei-Che Wang, Yair Yona, Yizhang Wu, Suhas Diggavi, Puneet Gupta

    Abstract: We implement and analyze highly stable PUFs using two random gate oxide breakdown mechanisms: plasma induced breakdown and voltage stressed breakdown. These gate oxide breakdown PUFs can be easily implemented in commercial silicon processes, and they are highly stable. We fabricated bit generation units for the stable PUFs on 99 testchips with 65nm CMOS bulk technology. Measurement results show th… ▽ More

    Submitted 4 August, 2018; originally announced August 2018.

  4. arXiv:1701.05637  [pdf, other

    cs.CR

    Design and Analysis of Stability-Guaranteed PUFs

    Authors: Wei-Che Wang, Yair Yona, Suhas Diggavi, Puneet Gupta

    Abstract: The lack of stability is one of the major limitations that constrains PUF from being put in widespread practical use. In this paper, we propose a weak PUF and a strong PUF that are both completely stable with 0% intra-distance. These PUFs are called Locally Enhanced Defectivity (LED)PUF. The source of randomness of a LEDPUF is extracted from locally enhance defectivity without affecting other part… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

  5. arXiv:1608.02132  [pdf, ps, other

    cs.CR cs.IT

    Password Cracking: The Effect of Hash Function Bias on the Average Guesswork

    Authors: Yair Yona, Suhas Diggavi

    Abstract: Modern authentication systems store hashed values of passwords of users using cryptographic hash functions. Therefore, to crack a password an attacker needs to guess a hash function input that is mapped to the hashed value, as opposed to the password itself. We call a hash function that maps the same number of inputs to each bin, as \textbf{unbiased}. However, cryptographic hash functions in use h… ▽ More

    Submitted 27 November, 2019; v1 submitted 6 August, 2016; originally announced August 2016.

  6. arXiv:1605.02062  [pdf, other

    cs.CR

    Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks

    Authors: Yasser Shoukry, Paul Martin, Yair Yona, Suhas Diggavi, Mani Srivastava

    Abstract: Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms for these sensors focus on data encryption and other post-processing techniques, but the sensors themselves often remain vulnerable to attacks in the physical/analog domain. If an adversary manipulates a physical/analog… ▽ More

    Submitted 12 May, 2016; v1 submitted 6 May, 2016; originally announced May 2016.

    Comments: Shorter version appeared in ACM ACM Conference on Computer and Communications (CCS) 2015

  7. arXiv:1212.6074  [pdf, ps, other

    cs.IT

    On the Diversity-Multiplexing Tradeoff of Unconstrained Multiple-Access Channels

    Authors: Yair Yona, Meir Feder

    Abstract: In this work the optimal diversity-multiplexing tradeoff (DMT) is investigated for the multiple-input multiple-output fading multiple-access channels with no power constraints (infinite constellations). For K users (K>1), M transmit antennas for each user, and N receive antennas, infinite constellations in general and lattices in particular are shown to attain the optimal DMT of finite constellati… ▽ More

    Submitted 20 May, 2015; v1 submitted 25 December, 2012; originally announced December 2012.

  8. arXiv:1102.2935  [pdf, ps, other

    cs.IT

    Fundamental Limits of Infinite Constellations in MIMO Fading Channels

    Authors: Yair Yona, Meir Feder

    Abstract: The fundamental and natural connection between the infinite constellation (IC) dimension and the best diversity order it can achieve is investigated in this paper. In the first part of this work we develop an upper bound on the diversity order of IC's for any dimension and any number of transmit and receive antennas. By choosing the right dimensions, we prove in the second part of this work that I… ▽ More

    Submitted 14 May, 2013; v1 submitted 14 February, 2011; originally announced February 2011.