no code implementations • 4 Jun 2020 • Islam Samy, Mohamed A. Attia, Ravi Tandon, Loukas Lazos
Such relaxation is relevant in applications where privacy can be traded for communication efficiency.
no code implementations • 16 Jan 2020 • Islam Samy, Mohamed A. Attia, Ravi Tandon, Loukas Lazos
To prevent such information leakage, the goal of classical PIR is to hide the identity of the content/message being accessed, which subsequently also hides the latent attributes.
no code implementations • 5 Jan 2018 • Mohamed A. Attia, Ravi Tandon
Data shuffling between distributed cluster of nodes is one of the critical steps in implementing large-scale learning algorithms.