Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
GASP codes for secure distributed matrix multiplication
RGL D'Oliveira, S El Rouayheb… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider the problem of secure distributed matrix multiplication (SDMM) in which a user
wishes to compute the product of two matrices with the assistance of honest but curious …
wishes to compute the product of two matrices with the assistance of honest but curious …
The capacity of private computation
We introduce the problem of private computation, comprised of N distributed and non-
colluding servers, K independent datasets, and a user who wants to compute a function of …
colluding servers, K independent datasets, and a user who wants to compute a function of …
X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers
The problem of X-secure T-private information retrieval from MDS coded storage is studied
in this paper, where the user wishes to privately retrieve one out of K independent messages …
in this paper, where the user wishes to privately retrieve one out of K independent messages …
Analog lagrange coded computing
M Soleymani, H Mahdavifar… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
A distributed computing scenario is considered, where the computational power of a set of
worker nodes is used to perform a certain computation task over a dataset that is dispersed …
worker nodes is used to perform a certain computation task over a dataset that is dispersed …
Privacy-preserving large language models (PPLLMs)
M Raeini - Available at SSRN 4512071, 2023 - papers.ssrn.com
Recently large language models (LLMs) have gained significant attention as they have
shown surprising signs of artificial general intelligence (AGI). Artificial intelligence and large …
shown surprising signs of artificial general intelligence (AGI). Artificial intelligence and large …
The asymptotic capacity of private search
The private search problem is introduced, where a dataset comprised of L iid records is
replicated across N non-colluding servers, and a user wishes to search for all records that …
replicated across N non-colluding servers, and a user wishes to search for all records that …
Coded Distributed computing for resilient, secure and private matrix-vector multiplication in edge-enabled metaverse
Metaverse is an immersive and photorealistic shared virtual world that requires efficient
rendering and processing of millions of virtual objects and scenes. This leads to the …
rendering and processing of millions of virtual objects and scenes. This leads to the …
Private coded matrix multiplication
In distributed computing system for the master-worker framework, an erasure code is able to
mitigate the effects of slow workers, also called stragglers. The distributed computing system …
mitigate the effects of slow workers, also called stragglers. The distributed computing system …
Privacy-aware berrut approximated coded computing for federated learning
XM Luaña, RPD Redondo, MF Veiga - arxiv preprint arxiv:2405.01704, 2024 - arxiv.org
Federated Learning (FL) is an interesting strategy that enables the collaborative training of
an AI model among different data owners without revealing their private datasets. Even so …
an AI model among different data owners without revealing their private datasets. Even so …
Sparsity and privacy in secret sharing: A fundamental trade-off
This work investigates the design of sparse secret sharing schemes that encode a sparse
private matrix into sparse shares. This investigation is motivated by distributed computing …
private matrix into sparse shares. This investigation is motivated by distributed computing …