Skip to main content

Showing 1–4 of 4 results for author: Aldaghri, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.15252  [pdf, other

    cs.LG cs.AI cs.CR

    Federated Learning with Heterogeneous Differential Privacy

    Authors: Nasser Aldaghri, Hessam Mahdavifar, Ahmad Beirami

    Abstract: Federated learning (FL) takes a first step towards privacy-preserving machine learning by training models while keeping client data local. Models trained using FL may still leak private client information through model updates during training. Differential privacy (DP) may be employed on model updates to provide privacy guarantees within FL, typically at the cost of degraded performance of the fin… ▽ More

    Submitted 14 January, 2023; v1 submitted 28 October, 2021; originally announced October 2021.

  2. arXiv:2012.15721  [pdf, other

    cs.LG cs.AI cs.CR cs.IT

    Coded Machine Unlearning

    Authors: Nasser Aldaghri, Hessam Mahdavifar, Ahmad Beirami

    Abstract: There are applications that may require removing the trace of a sample from the system, e.g., a user requests their data to be deleted, or corrupted data is discovered. Simply removing a sample from storage units does not necessarily remove its entire trace since downstream machine learning models may store some information about the samples used to train them. A sample can be perfectly unlearned… ▽ More

    Submitted 15 June, 2021; v1 submitted 31 December, 2020; originally announced December 2020.

    Comments: Accepted for publication in IEEE Access

  3. Threshold-Secure Coding with Shared Key

    Authors: Nasser Aldaghri, Hessam Mahdavifar

    Abstract: Cryptographic protocols are often implemented at upper layers of communication networks, while error-correcting codes are employed at the physical layer. In this paper, we consider utilizing readily-available physical layer functions, such as encoders and decoders, together with shared keys to provide a threshold-type security scheme. To this end, we first consider a scenario where the effect of t… ▽ More

    Submitted 17 January, 2021; v1 submitted 29 September, 2019; originally announced September 2019.

  4. Physical Layer Secret Key Generation in Static Environments

    Authors: Nasser Aldaghri, Hessam Mahdavifar

    Abstract: Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use such keys for encryption and decryption. In general, the secret key rate highly depends on the coherence time of the channel. In particular, a straightforward method of generating secret keys in static environments resu… ▽ More

    Submitted 13 February, 2020; v1 submitted 9 August, 2019; originally announced August 2019.