Skip to main content

Showing 1–50 of 50 results for author: Bitar, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.07026  [pdf, ps, other

    cs.LG stat.ML

    Efficient Machine Unlearning by Model Splitting and Core Sample Selection

    Authors: Maximilian Egger, Rawad Bitar, Rüdiger Urbanke

    Abstract: Machine unlearning is essential for meeting legal obligations such as the right to be forgotten, which requires the removal of specific data from machine learning models upon request. While several approaches to unlearning have been proposed, existing solutions often struggle with efficiency and, more critically, with the verification of unlearning - particularly in the case of weak unlearning gua… ▽ More

    Submitted 11 May, 2025; originally announced May 2025.

  2. arXiv:2505.07016  [pdf, ps, other

    cs.IT math.ST

    Multi-Terminal Remote Generation and Estimation Over a Broadcast Channel With Correlated Priors

    Authors: Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Nir Weinberger, Deniz Gündüz

    Abstract: We study the multi-terminal remote estimation problem under a rate constraint, in which the goal of the encoder is to help each decoder estimate a function over a certain distribution -- while the distribution is known only to the encoder, the function to be estimated is known only to the decoders, and can also be different for each decoder. The decoders can observe correlated samples from prior d… ▽ More

    Submitted 11 May, 2025; originally announced May 2025.

  3. arXiv:2505.07011  [pdf, ps, other

    cs.CR cs.DC cs.IT cs.LG stat.ML

    Source Anonymity for Private Random Walk Decentralized Learning

    Authors: Maximilian Egger, Svenja Lage, Rawad Bitar, Antonia Wachter-Zeh

    Abstract: This paper considers random walk-based decentralized learning, where at each iteration of the learning process, one user updates the model and sends it to a randomly chosen neighbor until a convergence criterion is met. Preserving data privacy is a central concern and open problem in decentralized learning. We propose a privacy-preserving algorithm based on public-key cryptography and anonymizatio… ▽ More

    Submitted 11 May, 2025; originally announced May 2025.

  4. arXiv:2504.21182  [pdf, other

    cs.CR cs.DC cs.IT cs.LG stat.ML

    Federated One-Shot Learning with Data Privacy and Objective-Hiding

    Authors: Maximilian Egger, Rüdiger Urbanke, Rawad Bitar

    Abstract: Privacy in federated learning is crucial, encompassing two key aspects: safeguarding the privacy of clients' data and maintaining the privacy of the federator's objective from the clients. While the first aspect has been extensively studied, the second has received much less attention. We present a novel approach that addresses both concerns simultaneously, drawing inspiration from techniques in… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

  5. arXiv:2502.00206  [pdf, other

    cs.LG cs.DC cs.IT stat.ML

    BICompFL: Stochastic Federated Learning with Bi-Directional Compression

    Authors: Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Nir Weinberger, Deniz Gündüz

    Abstract: We address the prominent communication bottleneck in federated learning (FL). We specifically consider stochastic FL, in which models or compressed model updates are specified by distributions rather than deterministic parameters. Stochastic FL offers a principled approach to compression, and has been shown to reduce the communication load under perfect downlink transmission from the federator to… ▽ More

    Submitted 31 January, 2025; originally announced February 2025.

  6. arXiv:2502.00193  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    Byzantine-Resilient Zero-Order Optimization for Communication-Efficient Heterogeneous Federated Learning

    Authors: Maximilian Egger, Mayank Bakshi, Rawad Bitar

    Abstract: We introduce CyBeR-0, a Byzantine-resilient federated zero-order optimization method that is robust under Byzantine attacks and provides significant savings in uplink and downlink communication costs. We introduce transformed robust aggregation to give convergence guarantees for general non-convex objectives under client data heterogeneity. Empirical evaluations for standard learning tasks and fin… ▽ More

    Submitted 31 January, 2025; originally announced February 2025.

  7. arXiv:2501.14313  [pdf, ps, other

    cs.IT

    Between Close Enough to Reveal and Far Enough to Protect: a New Privacy Region for Correlated Data

    Authors: Luis Maßny, Rawad Bitar, Fangwei Ye, Salim El Rouayheb

    Abstract: When users make personal privacy choices, correlation between their data can cause inadvertent leakage about users who do not want to share their data by other users sharing their data. As a solution, we consider local redaction mechanisms. As prior works proposed data-independent privatization mechanisms, we study the family of data-independent local redaction mechanisms and upper-bound their uti… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

  8. arXiv:2501.12371  [pdf, ps, other

    cs.IT

    CAT and DOG: Improved Codes for Private Distributed Matrix Multiplication

    Authors: Christoph Hofmeister, Rawad Bitar, Antonia Wachter-Zeh

    Abstract: We present novel constructions of polynomial codes for private distributed matrix multiplication (PDMM/SDMM) using outer product partitioning (OPP). We extend the degree table framework from the literature to cyclic-addition degree tables (CATs). By using roots of unity as evaluation points, we enable modulo-addition in the table. Based on CATs, we present an explicit construction, called CATx, th… ▽ More

    Submitted 1 March, 2025; v1 submitted 21 January, 2025; originally announced January 2025.

  9. arXiv:2407.11807  [pdf, other

    cs.IT cs.DC cs.LG

    Scalable and Reliable Over-the-Air Federated Edge Learning

    Authors: Maximilian Egger, Christoph Hofmeister, Cem Kaya, Rawad Bitar, Antonia Wachter-Zeh

    Abstract: Federated edge learning (FEEL) has emerged as a core paradigm for large-scale optimization. However, FEEL still suffers from a communication bottleneck due to the transmission of high-dimensional model updates from the clients to the federator. Over-the-air computation (AirComp) leverages the additive property of multiple-access channels by aggregating the clients' updates over the channel to save… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

  10. arXiv:2407.11762  [pdf, other

    cs.LG cs.DC cs.IT stat.AP

    Self-Regulating Random Walks for Resilient Decentralized Learning on Graphs

    Authors: Maximilian Egger, Rawad Bitar, Ghadir Ayache, Antonia Wachter-Zeh, Salim El Rouayheb

    Abstract: Consider the setting of multiple random walks (RWs) on a graph executing a certain computational task. For instance, in decentralized learning via RWs, a model is updated at each iteration based on the local data of the visited node and then passed to a randomly chosen neighbor. RWs can fail due to node or link failures. The goal is to maintain a desired number of RWs to ensure failure resilience.… ▽ More

    Submitted 10 February, 2025; v1 submitted 16 July, 2024; originally announced July 2024.

  11. arXiv:2407.01263  [pdf, other

    cs.IT

    Capacity-Maximizing Input Symbol Selection for Discrete Memoryless Channels

    Authors: Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz, Nir Weinberger

    Abstract: Motivated by communication systems with constrained complexity, we consider the problem of input symbol selection for discrete memoryless channels (DMCs). Given a DMC, the goal is to find a subset of its input alphabet, so that the optimal input distribution that is only supported on these symbols maximizes the capacity among all other subsets of the same size (or smaller). We observe that the res… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  12. arXiv:2406.14362  [pdf, ps, other

    cs.LG cs.AI

    Communication-Efficient Byzantine-Resilient Federated Zero-Order Optimization

    Authors: Afonso de Sá Delgado Neto, Maximilian Egger, Mayank Bakshi, Rawad Bitar

    Abstract: We introduce CYBER-0, the first zero-order optimization algorithm for memory-and-communication efficient Federated Learning, resilient to Byzantine faults. We show through extensive numerical experiments on the MNIST dataset and finetuning RoBERTa-Large that CYBER-0 outperforms state-of-the-art algorithms in terms of communication and memory efficiency while reaching similar accuracy. We provide t… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  13. arXiv:2405.19217  [pdf, other

    cs.IT cs.CR cs.DC cs.LG

    LoByITFL: Low Communication Secure and Private Federated Learning

    Authors: Yue Xia, Christoph Hofmeister, Maximilian Egger, Rawad Bitar

    Abstract: Federated Learning (FL) faces several challenges, such as the privacy of the clients data and security against Byzantine clients. Existing works treating privacy and security jointly make sacrifices on the privacy guarantee. In this work, we introduce LoByITFL, the first communication-efficient Information-Theoretic (IT) private and secure FL scheme that makes no sacrifices on the privacy guarante… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  14. arXiv:2405.08698  [pdf, other

    cs.IT cs.CR cs.DC cs.LG

    Byzantine-Resilient Secure Aggregation for Federated Learning Without Privacy Compromises

    Authors: Yue Xia, Christoph Hofmeister, Maximilian Egger, Rawad Bitar

    Abstract: Federated learning (FL) shows great promise in large scale machine learning, but brings new risks in terms of privacy and security. We propose ByITFL, a novel scheme for FL that provides resilience against Byzantine users while keeping the users' data private from the federator and private from other users. The scheme builds on the preexisting non-private FLTrust scheme, which tolerates malicious… ▽ More

    Submitted 8 July, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

  15. arXiv:2405.06098  [pdf, ps, other

    cs.IT

    Secure Storage using Maximally Recoverable Locally Repairable Codes

    Authors: Tim Janz, Hedongliang Liu, Rawad Bitar, Frank R. Kschischang

    Abstract: This paper considers data secrecy in distributed storage systems (DSSs) using maximally recoverable locally repairable codes (MR-LRCs). Conventional MR-LRCs are in general not secure against eavesdroppers who can observe the transmitted data during a global repair operation. This work enables nonzero secrecy dimension of DSSs encoded by MR-LRCs through a new repair framework. The key idea is to as… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  16. arXiv:2401.16915  [pdf, ps, other

    cs.IT cs.DC

    Interactive Byzantine-Resilient Gradient Coding for General Data Assignments

    Authors: Shreyas Jain, Luis Maßny, Christoph Hofmeister, Eitan Yaakobi, Rawad Bitar

    Abstract: We tackle the problem of Byzantine errors in distributed gradient descent within the Byzantine-resilient gradient coding framework. Our proposed solution can recover the exact full gradient in the presence of $s$ malicious workers with a data replication factor of only $s+1$. It generalizes previous solutions to any data assignment scheme that has a regular replication over all data samples. The s… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  17. arXiv:2401.15733  [pdf, ps, other

    cs.IT

    Achieving DNA Labeling Capacity with Minimum Labels through Extremal de Bruijn Subgraphs

    Authors: Christoph Hofmeister, Anina Gruica, Dganit Hanania, Rawad Bitar, Eitan Yaakobi

    Abstract: DNA labeling is a tool in molecular biology and biotechnology to visualize, detect, and study DNA at the molecular level. In this process, a DNA molecule is labeled by a set of specific patterns, referred to as labels, and is then imaged. The resulting image is modeled as an $(\ell+1)$-ary sequence, where $\ell$ is the number of labels, in which any non-zero symbol indicates the appearance of the… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

  18. arXiv:2401.10204  [pdf, ps, other

    cs.IT stat.ML

    Maximal-Capacity Discrete Memoryless Channel Identification

    Authors: Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz, Nir Weinberger

    Abstract: The problem of identifying the channel with the highest capacity among several discrete memoryless channels (DMCs) is considered. The problem is cast as a pure-exploration multi-armed bandit problem, which follows the practical use of training sequences to sense the communication channel statistics. A capacity estimator is proposed and tight confidence bounds on the estimator error are derived. Ba… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  19. arXiv:2401.02380  [pdf, other

    cs.IT

    Byzantine-Resilient Gradient Coding through Local Gradient Computations

    Authors: Christoph Hofmeister, Luis Maßny, Eitan Yaakobi, Rawad Bitar

    Abstract: We consider gradient coding in the presence of an adversary controlling so-called malicious workers trying to corrupt the computations. Previous works propose the use of MDS codes to treat the responses from malicious workers as errors and correct them using the error-correction properties of the code. This comes at the expense of increasing the replication, i.e., the number of workers each partia… ▽ More

    Submitted 5 January, 2024; v1 submitted 4 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2303.13231

  20. arXiv:2311.13686  [pdf, ps, other

    cs.IT

    Private Inference in Quantized Models

    Authors: Zirui Deng, Vinayak Ramkumar, Rawad Bitar, Netanel Raviv

    Abstract: A typical setup in many machine learning scenarios involves a server that holds a model and a user that possesses data, and the challenge is to perform inference while safeguarding the privacy of both parties. Private Inference has been extensively explored in recent years, mainly from a cryptographic standpoint via techniques like homomorphic encryption and multiparty computation. These approache… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  21. arXiv:2308.06413  [pdf, ps, other

    cs.CR cs.DC cs.IT

    Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off

    Authors: Rawad Bitar, Maximilian Egger, Antonia Wachter-Zeh, Marvin Xhemrishi

    Abstract: This work investigates the design of sparse secret sharing schemes that encode a sparse private matrix into sparse shares. This investigation is motivated by distributed computing, where the multiplication of sparse and private matrices is moved from a computationally weak main node to untrusted worker machines. Classical secret-sharing schemes produce dense shares. However, sparsity can help spee… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  22. arXiv:2306.15134  [pdf, ps, other

    cs.IT cs.DC

    Sparse and Private Distributed Matrix Multiplication with Straggler Tolerance

    Authors: Maximilian Egger, Marvin Xhemrishi, Antonia Wachter-Zeh, Rawad Bitar

    Abstract: This paper considers the problem of outsourcing the multiplication of two private and sparse matrices to untrusted workers. Secret sharing schemes can be used to tolerate stragglers and guarantee information-theoretic privacy of the matrices. However, traditional secret sharing schemes destroy all sparsity in the offloaded computational tasks. Since exploiting the sparse nature of matrices was sho… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  23. arXiv:2306.14088  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    Private Aggregation in Hierarchical Wireless Federated Learning with Partial and Full Collusion

    Authors: Maximilian Egger, Christoph Hofmeister, Antonia Wachter-Zeh, Rawad Bitar

    Abstract: In federated learning, a federator coordinates the training of a model, e.g., a neural network, on privately owned data held by several participating clients. The gradient descent algorithm, a well-known and popular iterative optimization procedure, is run to train the model. Every client computes partial gradients based on their local data and sends them to the federator, which aggregates the res… ▽ More

    Submitted 18 July, 2024; v1 submitted 24 June, 2023; originally announced June 2023.

  24. arXiv:2304.08589  [pdf, other

    cs.DC cs.IT cs.LG stat.ML

    Fast and Straggler-Tolerant Distributed SGD with Reduced Computation Load

    Authors: Maximilian Egger, Serge Kas Hanna, Rawad Bitar

    Abstract: In distributed machine learning, a central node outsources computationally expensive calculations to external worker nodes. The properties of optimization procedures like stochastic gradient descent (SGD) can be leveraged to mitigate the effect of unresponsive or slow workers called stragglers, that otherwise degrade the benefit of outsourcing the computation. This can be done by only waiting for… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  25. arXiv:2303.13231  [pdf, other

    cs.IT

    Trading Communication for Computation in Byzantine-Resilient Gradient Coding

    Authors: Christoph Hofmeister, Luis Maßny, Eitan Yaakobi, Rawad Bitar

    Abstract: We consider gradient coding in the presence of an adversary, controlling so-called malicious workers trying to corrupt the computations. Previous works propose the use of MDS codes to treat the inputs of the malicious workers as errors and correct them using the error-correction properties of the code. This comes at the expense of increasing the replication, i.e., the number of workers each partia… ▽ More

    Submitted 5 June, 2023; v1 submitted 23 March, 2023; originally announced March 2023.

  26. arXiv:2212.08580  [pdf, ps, other

    cs.IT stat.ML

    Nested Gradient Codes for Straggler Mitigation in Distributed Machine Learning

    Authors: Luis Maßny, Christoph Hofmeister, Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh

    Abstract: We consider distributed learning in the presence of slow and unresponsive worker nodes, referred to as stragglers. In order to mitigate the effect of stragglers, gradient coding redundantly assigns partial computations to the worker such that the overall result can be recovered from only the non-straggling workers. Gradient codes are designed to tolerate a fixed number of stragglers. Since the num… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

  27. arXiv:2208.05412  [pdf, ps, other

    cs.IT

    Equivalence of Insertion/Deletion Correcting Codes for $d$-dimensional Arrays

    Authors: Evagoras Stylianou, Lorenz Welter, Rawad Bitar, Antonia Wachter-Zeh, Eitan Yaakobi

    Abstract: We consider the problem of correcting insertion and deletion errors in the $d$-dimensional space. This problem is well understood for vectors (one-dimensional space) and was recently studied for arrays (two-dimensional space). For vectors and arrays, the problem is motivated by several practical applications such as DNA-based storage and racetrack memories. From a theoretical perspective, it is in… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: Accepted to IEEE International Symposium on Information Theory 2022

  28. arXiv:2208.03134  [pdf, other

    cs.LG cs.DC cs.IT

    Adaptive Stochastic Gradient Descent for Fast and Communication-Efficient Distributed Learning

    Authors: Serge Kas Hanna, Rawad Bitar, Parimal Parag, Venkat Dasari, Salim El Rouayheb

    Abstract: We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers, each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updatin… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2002.11005

  29. arXiv:2206.06676  [pdf, ps, other

    cs.IT

    Efficient Private Storage of Sparse Machine Learning Data

    Authors: Marvin Xhemrishi, Maximilian Egger, Rawad Bitar

    Abstract: We consider the problem of maintaining sparsity in private distributed storage of confidential machine learning data. In many applications, e.g., face recognition, the data used in machine learning algorithms is represented by sparse matrices which can be stored and processed efficiently. However, mechanisms maintaining perfect information-theoretic privacy require encoding the sparse matrices int… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: 6 pages, 2 figures, submitted to IEEE for possible publication

  30. arXiv:2203.01728  [pdf, ps, other

    cs.IT

    Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees

    Authors: Marvin Xhemrishi, Rawad Bitar, Antonia Wachter-Zeh

    Abstract: We consider the problem of designing a coding scheme that allows both sparsity and privacy for distributed matrix-vector multiplication. Perfect information-theoretic privacy requires encoding the input sparse matrices into matrices distributed uniformly at random from the considered alphabet; thus destroying the sparsity. Computing matrix-vector multiplication for sparse matrices is known to be f… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: 6 pages, 2 figures, submitted for review at ISIT 2022

  31. arXiv:2202.08302  [pdf, other

    cs.IT cs.DC cs.LG stat.ML

    Cost-Efficient Distributed Learning via Combinatorial Multi-Armed Bandits

    Authors: Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz

    Abstract: We consider the distributed SGD problem, where a main node distributes gradient calculations among $n$ workers. By assigning tasks to all the workers and waiting only for the $k$ fastest ones, the main node can trade-off the algorithm's error with its runtime by gradually increasing $k$ as the algorithm evolves. However, this strategy, referred to as adaptive $k$-sync, neglects the cost of unused… ▽ More

    Submitted 28 June, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

  32. arXiv:2108.05742  [pdf, ps, other

    cs.IT cs.DC

    Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound

    Authors: Christoph Hofmeister, Rawad Bitar, Marvin Xhemrishi, Antonia Wachter-Zeh

    Abstract: We consider the problem of designing secure and private codes for distributed matrix-matrix multiplication. A master server owns two private matrices and hires worker nodes to help compute their product. The matrices should remain information-theoretically private from the workers. Some of the workers are malicious and return corrupted results to the master. We design a framework for security agai… ▽ More

    Submitted 14 February, 2022; v1 submitted 12 August, 2021; originally announced August 2021.

  33. arXiv:2105.02298  [pdf, ps, other

    cs.IT

    Optimal Codes Correcting Localized Deletions

    Authors: Rawad Bitar, Serge Kas Hanna, Nikita Polyanskii, Ilya Vorobyev

    Abstract: We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletio… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: 10 pages, a full version of the paper accepted to 2021 IEEE ISIT

  34. arXiv:2105.00212  [pdf, ps, other

    cs.IT

    Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy

    Authors: Serge Kas Hanna, Rawad Bitar

    Abstract: We study codes that can detect the exact number of deletions and insertions in concatenated binary strings. We construct optimal codes for the case of detecting up to $\del$ deletions. We prove the optimality of these codes by deriving a converse result which shows that the redundancy of our codes is asymptotically optimal in $\del$ among all families of deletion detecting codes, and particularly… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

    Comments: Shorter version accepted in ISIT 2021

  35. arXiv:2102.09885  [pdf, other

    cs.IT

    Network Coding with Myopic Adversaries

    Authors: Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang

    Abstract: We consider the problem of reliable communication over a network containing a hidden {\it myopic} adversary who can eavesdrop on some $z_{ro}$ links, jam some $z_{wo}$ links, and do both on some $z_{rw}$ links. We provide the first information-theoretically tight characterization of the optimal rate of communication possible under all possible settings of the tuple $(z_{ro},z_{wo},z_{rw})$ by prov… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

    Comments: Extended version of IEEE ISIT submission. Short video explaining the result: https://cuhk.zoom.us/rec/play/ZL93f6ool7K0T48aoRy5FS_sjme9DjLRDvaQeDLsR7IfV2aQGWrJVbqTTJ12Fg9qpXXvWVM4twAmIH-W.I88Ef9sVrWNS4Eog?startTime=1612281070000&_x_zm_rtaid=qXNfoabtTQK94kBK0YE-6A.1613735660905.fd77db9ef1a673afd9cd4ac45303144d&_x_zm_rhtaid=338

  36. arXiv:2102.03094  [pdf, other

    cs.IT

    Function-Correcting Codes

    Authors: Andreas Lenz, Rawad Bitar, Antonia Wachter-Zeh, Eitan Yaakobi

    Abstract: In this paper we study function-correcting codes, a new class of codes designed to protect the function evaluation of a message against errors. We show that FCCs are equivalent to irregular-distance codes, i.e., codes that obey some given distance requirement between each pair of codewords. Using these connections, we study irregular-distance codes and derive general upper and lower bounds on thei… ▽ More

    Submitted 22 May, 2023; v1 submitted 5 February, 2021; originally announced February 2021.

    MSC Class: 94B60 ACM Class: E.4

  37. arXiv:2102.02727  [pdf, ps, other

    cs.IT

    Multiple Criss-Cross Insertion and Deletion Correcting Codes

    Authors: Lorenz Welter, Rawad Bitar, Antonia Wachter-Zeh, Eitan Yaakobi

    Abstract: This paper investigates the problem of correcting multiple criss-cross insertions and deletions in arrays. More precisely, we study the unique recovery of $n \times n$ arrays affected by $t$-criss-cross deletions defined as any combination of $t_r$ row and $t_c$ column deletions such that $t_r + t_c = t$ for a given $t$. We show an equivalence between correcting $t$-criss-cross deletions and $t$-c… ▽ More

    Submitted 15 November, 2021; v1 submitted 4 February, 2021; originally announced February 2021.

  38. arXiv:2101.05681  [pdf, ps, other

    cs.IT

    Adaptive Private Distributed Matrix Multiplication

    Authors: Rawad Bitar, Marvin Xhemrishi, Antonia Wachter-Zeh

    Abstract: We consider the problem of designing codes with flexible rate (referred to as rateless codes), for private distributed matrix-matrix multiplication. A master server owns two private matrices $\mathbf{A}$ and $\mathbf{B}$ and hires worker nodes to help computing their multiplication. The matrices should remain information-theoretically private from the workers. Codes with fixed rate require the mas… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: arXiv admin note: text overlap with arXiv:2004.12925

  39. arXiv:2004.14740  [pdf, ps, other

    cs.IT

    Criss-Cross Insertion and Deletion Correcting Codes

    Authors: Rawad Bitar, Lorenz Welter, Ilia Smagloy, Antonia Wachter-Zeh, Eitan Yaakobi

    Abstract: This paper studies the problem of constructing codes correcting deletions in arrays. Under this model, it is assumed that an $n\times n$ array can experience deletions of rows and columns. These deletion errors are referred to as $(t_r,t_c)$-criss-cross deletions if $t_r$ rows and $t_c$ columns are deleted, while a code correcting these deletion patterns is called a $(t_r,t_c)$-criss-cross deletio… ▽ More

    Submitted 1 June, 2021; v1 submitted 30 April, 2020; originally announced April 2020.

    Comments: Submitted to IEEE Transactions on Information Theory for possible publication. Several examples are added to help understand the concepts explained in the paper

  40. arXiv:2004.12925  [pdf, ps, other

    cs.IT cs.DC

    Rateless Codes for Private Distributed Matrix-Matrix Multiplication

    Authors: Rawad Bitar, Marvin Xhemrishi, Antonia Wachter-Zeh

    Abstract: We consider the problem of designing rateless coded private distributed matrix-matrix multiplication. A master server owns two private matrices $\mathbf{A}$ and $\mathbf{B}$ and wants to hire worker nodes to help compute the multiplication. The matrices should remain private from the workers, in an information-theoretic sense. This problem has been considered in the literature and codes with a pre… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

  41. Adaptive Distributed Stochastic Gradient Descent for Minimizing Delay in the Presence of Stragglers

    Authors: Serge Kas Hanna, Rawad Bitar, Parimal Parag, Venkat Dasari, Salim El Rouayheb

    Abstract: We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updating… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: Accepted to IEEE ICASSP 2020

    Report number: pp. 4262--4266, May 2020

    Journal ref: International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 4262--4266, May 2020

  42. arXiv:2002.03374  [pdf, other

    cs.IT

    Communication Efficient Secret Sharing in the Presence of Malicious Adversary

    Authors: Rawad Bitar, Sidharth Jaggi

    Abstract: Consider the communication efficient secret sharing problem. A dealer wants to share a secret with $n$ parties such that any $k\leq n$ parties can reconstruct the secret and any $z<k$ parties eavesdropping on their shares obtain no information about the secret. In addition, a legitimate user contacting any $d$, $k\leq d \leq n$, parties to decode the secret can do so by reading and downloading the… ▽ More

    Submitted 9 February, 2020; originally announced February 2020.

    Comments: Extended version of a paper submitted to ISIT 2020

  43. arXiv:1909.12611  [pdf, ps, other

    cs.IT

    Private and Rateless Adaptive Coded Matrix-Vector Multiplication

    Authors: Rawad Bitar, Yuxuan Xing, Yasaman Keshtkarjahromi, Venkat Dasari, Salim El Rouayheb, Hulya Seferoglu

    Abstract: Edge computing is emerging as a new paradigm to allow processing data near the edge of the network, where the data is typically generated and collected. This enables critical computations at the edge in applications such as Internet of Things (IoT), in which an increasing number of devices (sensors, cameras, health monitoring devices, etc.) collect data that needs to be processed through computati… ▽ More

    Submitted 27 September, 2019; originally announced September 2019.

    Comments: Presented in part in SPIE Defense + Commercial Sensing. Submitted to IEEE Forensics and Information security for possible publication

  44. arXiv:1908.05385  [pdf, ps, other

    cs.DC

    Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks

    Authors: Yasaman Keshtkarjahromi, Rawad Bitar, Venkat Dasari, Salim El Rouayheb, Hulya Seferoglu

    Abstract: Edge computing is emerging as a new paradigm to allow processing data at the edge of the network, where data is typically generated and collected, by exploiting multiple devices at the edge collectively. However, offloading tasks to other devices leaves the edge computing applications at the complete mercy of an attacker. One of the attacks, which is also the focus of this work, is Byzantine attac… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  45. arXiv:1905.05383  [pdf, other

    cs.IT

    Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning

    Authors: Rawad Bitar, Mary Wootters, Salim El Rouayheb

    Abstract: We consider distributed gradient descent in the presence of stragglers. Recent work on \em gradient coding \em and \em approximate gradient coding \em have shown how to add redundancy in distributed gradient descent to guarantee convergence even if some workers are \em stragglers\em---that is, slow or non-responsive. In this work we propose an approximate gradient coding scheme called \em Stochast… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

    Comments: Part of this work is submitted to IEEE Information Theory Workshop (ITW) for possible publication

  46. arXiv:1806.08825  [pdf, ps, other

    cs.IT

    Staircase-PIR: Universally Robust Private Information Retrieval

    Authors: Rawad Bitar, Salim El Rouayheb

    Abstract: We consider the problem of designing private information retrieval (PIR) schemes on data of $m$ files replicated on $n$ servers that can possibly collude. We focus on devising robust PIR schemes that can tolerate stragglers, i.e., slow or unresponsive servers. In many settings, the number of stragglers is not known a priori or may change with time. We define universally robust PIR as schemes that… ▽ More

    Submitted 5 September, 2018; v1 submitted 22 June, 2018; originally announced June 2018.

    Comments: Extended version of a paper accepted in IEEE Information Theory workshop 2018

  47. Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes

    Authors: Rawad Bitar, Parimal Parag, Salim El Rouayheb

    Abstract: We consider the setting of a Master server, M, who possesses confidential data (e.g., personal, genomic or medical data) and wants to run intensive computations on it, as part of a machine learning algorithm for example. The Master wants to distribute these computations to untrusted workers who have volunteered or are incentivized to help with this task. However, the data must be kept private and… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: Submitted to IEEE Transactions of Information Theory for possible publication

    Report number: Volume: 68, Issue: 8, Aug. 2020

    Journal ref: IEEE Transactions on Communications 2020

  48. Minimizing Latency for Secure Distributed Computing

    Authors: Rawad Bitar, Parimal Parag, Salim El Rouayheb

    Abstract: We consider the setting of a master server who possesses confidential data (genomic, medical data, etc.) and wants to run intensive computations on it, as part of a machine learning algorithm for example. The master wants to distribute these computations to untrusted workers who have volunteered or are incentivized to help with this task. However, the data must be kept private (in an information t… ▽ More

    Submitted 4 March, 2017; originally announced March 2017.

    Comments: Submitted to IEEE International Symposium on Information Theory (ISIT) 2017

    Report number: pp. 2900--2904, June 2017

    Journal ref: IEEE International Symposium on Information Theory (ISIT) 2017

  49. arXiv:1512.02990  [pdf, ps, other

    cs.IT

    Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads

    Authors: Rawad Bitar, Salim El Rouayheb

    Abstract: We study the communication efficient secret sharing (CESS) problem introduced by Huang, Langberg, Kliewer and Bruck. A classical threshold secret sharing scheme randomly encodes a secret into $n$ shares given to $n$ parties, such that any set of at least $t$, $t<n$, parties can reconstruct the secret, and any set of at most $z$, $z<t$, parties cannot obtain any information about the secret. Recent… ▽ More

    Submitted 3 November, 2016; v1 submitted 9 December, 2015; originally announced December 2015.

    Comments: Submitted to IEEE Transactions on Information Theory

  50. arXiv:1504.05999  [pdf, ps, other

    cs.IT

    Securing Data against Limited-Knowledge Adversaries in Distributed Storage Systems

    Authors: Rawad Bitar, Salim El Rouayheb

    Abstract: We study the problem of constructing secure regenerating codes that protect data integrity in distributed storage systems (DSS) in which some nodes may be compromised by a malicious adversary. The adversary can corrupt the data stored on and transmitted by the nodes under its control. The "damage" incurred by the actions of the adversary depends on how much information it knows about the data in t… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: 5 pages, accepted for ISIT 2015