Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Private retrieval, computing, and learning: Recent progress and future challenges
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
Straggler mitigation in distributed matrix multiplication: Fundamental limits and optimal coding
We consider the problem of massive matrix multiplication, which underlies many data
analytic applications, in a large-scale distributed system comprising a group of worker …
analytic applications, in a large-scale distributed system comprising a group of worker …
Analog lagrange coded computing
A distributed computing scenario is considered, where the computational power of a set of
worker nodes is used to perform a certain computation task over a dataset that is dispersed …
worker nodes is used to perform a certain computation task over a dataset that is dispersed …
Privacy-preserving large language models (PPLLMs)
M Raeini - Available at SSRN 4512071, 2023 - papers.ssrn.com
Recently large language models (LLMs) have gained significant attention as they have
shown surprising signs of artificial general intelligence (AGI). Artificial intelligence and large …
shown surprising signs of artificial general intelligence (AGI). Artificial intelligence and large …
GCSA codes with noise alignment for secure coded multi-party batch matrix multiplication
A secure multi-party batch matrix multiplication problem (SMBMM) is considered, where the
goal is to allow a master to efficiently compute the pairwise products of two batches of …
goal is to allow a master to efficiently compute the pairwise products of two batches of …
Secure distributed matrix computation with discrete fourier transform
We consider the problem of secure distributed matrix computation (SDMC), where a user
queries a function of data matrices generated at distributed source nodes. We assume the …
queries a function of data matrices generated at distributed source nodes. We assume the …
Degree tables for secure distributed matrix multiplication
We consider the problem of secure distributed matrix multiplication (SDMM) in which a user
wishes to compute the product of two matrices with the assistance of honest but curious …
wishes to compute the product of two matrices with the assistance of honest but curious …
HerA scheme: Secure distributed matrix multiplication via Hermitian codes
RA Machado, GL Matthews… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We consider the problem of secure distributed matrix multiplication (SDMM), where a user
has two matrices and wishes to compute their product with the help of N honest but curious …
has two matrices and wishes to compute their product with the help of N honest but curious …
Straggler-and adversary-tolerant secure distributed matrix multiplication using polynomial codes
Large matrix multiplications commonly take place in large-scale machine-learning
applications. Often, the sheer size of these matrices prevent carrying out the multiplication at …
applications. Often, the sheer size of these matrices prevent carrying out the multiplication at …
Private and secure distributed matrix multiplication schemes for replicated or MDS-coded servers
In this paper, we study the problem of private and secure distributed matrix multiplication
(PSDMM), where a user having a private matrix and non-colluding servers sharing a library …
(PSDMM), where a user having a private matrix and non-colluding servers sharing a library …