Private retrieval, computing, and learning: Recent progress and future challenges
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
Advances and open problems in federated learning
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …
devices or whole organizations) collaboratively train a model under the orchestration of a …
The capacity of symmetric private information retrieval
Private information retrieval (PIR) is the problem of retrieving, as efficiently as possible, one
out of K messages from N non-communicating replicated databases (each holds all K …
out of K messages from N non-communicating replicated databases (each holds all K …
The capacity of cache aided private information retrieval
R Tandon - 2017 55th Annual Allerton Conference on …, 2017 - ieeexplore.ieee.org
The problem of cache enabled private information retrieval (PIR) is considered in which a
user wishes to privately retrieve one out of K messages, each of size L bits from N distributed …
user wishes to privately retrieve one out of K messages, each of size L bits from N distributed …
The Capacity of T-Private Information Retrieval With Private Side Information
We consider the problem of T-Private Information Retrieval with private side information
(TPIR-PSI). In this problem, N replicated databases store K independent messages, and a …
(TPIR-PSI). In this problem, N replicated databases store K independent messages, and a …
[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …
health, are generating big data that are widely distributed on the internet. IoT (Internet of …
Cross Subspace Alignment and the Asymptotic Capacity of -Secure -Private Information Retrieval
X-secure and T-private information retrieval (XSTPIR) is a form of private information
retrieval where data security is guaranteed against collusion among up to X servers and the …
retrieval where data security is guaranteed against collusion among up to X servers and the …
The capacity of private computation
We introduce the problem of private computation, comprised of N distributed and non-
colluding servers, K independent datasets, and a user who wants to compute a function of …
colluding servers, K independent datasets, and a user who wants to compute a function of …
A new method with swapping of peers and fogs to protect user privacy in IoT applications
M Yamin, AA Abi Sen - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is now serving as a vehicle to a huge number of applications,
resulting in innovative and smart solutions in many fields. While providing abundant benefits …
resulting in innovative and smart solutions in many fields. While providing abundant benefits …
Cache-aided private information retrieval with partially known uncoded prefetching: Fundamental limits
We consider the problem of private information retrieval from N non-colluding and replicated
databases, when the user is equipped with a cache that holds an uncoded fraction r of the …
databases, when the user is equipped with a cache that holds an uncoded fraction r of the …