Skip to main content

Showing 1–5 of 5 results for author: Schlegel, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.08909  [pdf, other

    cs.LG cs.CR cs.IT

    CodedPaddedFL and CodedSecAgg: Straggler Mitigation and Secure Aggregation in Federated Learning

    Authors: Reent Schlegel, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We present two novel federated learning (FL) schemes that mitigate the effect of straggling devices by introducing redundancy on the devices' data across the network. Compared to other schemes in the literature, which deal with stragglers or device dropouts by ignoring their contribution, the proposed schemes do not suffer from the client drift problem. The first scheme, CodedPaddedFL, mitigates t… ▽ More

    Submitted 3 June, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

    Comments: 14 pages, 7 figures, this work has been submitted to the IEEE for possible publication

  2. arXiv:2110.03545  [pdf, other

    cs.IT

    Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference

    Authors: Reent Schlegel, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We consider a mobile edge computing scenario where a number of devices want to perform a linear inference $\boldsymbol{W}\boldsymbol{x}$ on some local data $\boldsymbol{x}$ given a network-side matrix $\boldsymbol{W}$. The computation is performed at the network edge over a number of edge servers. We propose a coding scheme that provides information-theoretic privacy against $z$ colluding (honest-… ▽ More

    Submitted 15 February, 2022; v1 submitted 7 October, 2021; originally announced October 2021.

    Comments: 12 pages, 6 figures, published in the Journal on Selected Areas in Communications

  3. arXiv:2109.15226  [pdf, other

    cs.LG cs.IT

    Coding for Straggler Mitigation in Federated Learning

    Authors: Siddhartha Kumar, Reent Schlegel, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We present a novel coded federated learning (FL) scheme for linear regression that mitigates the effect of straggling devices while retaining the privacy level of conventional FL. The proposed scheme combines one-time padding to preserve privacy and gradient codes to yield resiliency against stragglers and consists of two phases. In the first phase, the devices share a one-time padded version of t… ▽ More

    Submitted 15 February, 2022; v1 submitted 30 September, 2021; originally announced September 2021.

    Comments: 6 pages, 3 figures, published at the IEEE International Conference on Communications 2022

  4. arXiv:2005.08593  [pdf, other

    cs.IT

    Private Edge Computing for Linear Inference Based on Secret Sharing

    Authors: Reent Schlegel, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat

    Abstract: We consider an edge computing scenario where users want to perform a linear computation on local, private data and a network-wide, public matrix. Users offload computations to edge servers located at the edge of the network, but do not want the servers, or any other party with access to the wireless links, to gain any information about their data. We provide a scheme that guarantees information-th… ▽ More

    Submitted 19 October, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: 6 pages, 4 figures, to be published in the Proceedings of the 2020 IEEE Global Communications Conference (IEEE GLOBECOM), reviewers' comments are addressed, results remain unchanged

  5. ReDS: A Framework for Reputation-Enhanced DHTs

    Authors: Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew Wright

    Abstract: Distributed Hash Tables (DHTs) such as Chord and Kademlia offer an efficient solution for locating resources in peer-to-peer networks. Unfortunately, malicious nodes along a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using a combination of redundancy and diversity in the paths taken by redundan… ▽ More

    Submitted 21 September, 2012; originally announced September 2012.

    Journal ref: IEEE TPDS Special Issue on Trust, Security, and Privacy, Feb. 2014, Vol. 5, Issue 2