Search Results for author: Tayyebeh Jahani-Nezhad

Found 5 papers, 0 papers with code

ByzSecAgg: A Byzantine-Resistant Secure Aggregation Scheme for Federated Learning Based on Coded Computing and Vector Commitment

no code implementations20 Feb 2023 Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Giuseppe Caire

In this paper, we propose ByzSecAgg, an efficient secure aggregation scheme for federated learning that is protected against Byzantine attacks and privacy leakages.

Federated Learning Outlier Detection

SwiftAgg+: Achieving Asymptotically Optimal Communication Loads in Secure Aggregation for Federated Learning

no code implementations24 Mar 2022 Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Songze Li, Giuseppe Caire

We propose SwiftAgg+, a novel secure aggregation protocol for federated learning systems, where a central server aggregates local models of $N \in \mathbb{N}$ distributed users, each of size $L \in \mathbb{N}$, trained on their local data, in a privacy-preserving manner.

Federated Learning Privacy Preserving

SwiftAgg: Communication-Efficient and Dropout-Resistant Secure Aggregation for Federated Learning with Worst-Case Security Guarantees

no code implementations8 Feb 2022 Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Songze Li, Giuseppe Caire

We propose SwiftAgg, a novel secure aggregation protocol for federated learning systems, where a central server aggregates local models of $N$ distributed users, each of size $L$, trained on their local data, in a privacy-preserving manner.

Federated Learning Privacy Preserving

Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding

no code implementations2 Mar 2021 Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali

Gradient coding allows a master node to derive the aggregate of the partial gradients, calculated by some worker nodes over the local data sets, with minimum communication cost, and in the presence of stragglers.

Berrut Approximated Coded Computing: Straggler Resistance Beyond Polynomial Computing

no code implementations17 Sep 2020 Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali

In this technique, coding is used across data sets, and computation is done over coded data, such that the results of an arbitrary subset of worker nodes with a certain size are enough to recover the final results.

Cannot find the paper you are looking for? You can Submit a new open access paper.