Search Results for author: Antonia Wachter-Zeh

Found 15 papers, 2 papers with code

Self-Duplicating Random Walks for Resilient Decentralized Learning on Graphs

no code implementations16 Jul 2024 Maximilian Egger, Ghadir Ayache, Rawad Bitar, Antonia Wachter-Zeh, Salim El Rouayheb

We propose a decentralized algorithm called DECAFORK that can maintain the number of RWs in the graph around a desired value even in the presence of arbitrary RW failures.

Scalable and Reliable Over-the-Air Federated Edge Learning

no code implementations16 Jul 2024 Maximilian Egger, Christoph Hofmeister, Cem Kaya, Rawad Bitar, Antonia Wachter-Zeh

However, FEEL still suffers from a communication bottleneck due to the transmission of high-dimensional model updates from the clients to the federator.

Maximal-Capacity Discrete Memoryless Channel Identification

no code implementations18 Jan 2024 Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz, Nir Weinberger

Based on this capacity estimator, a gap-elimination algorithm termed BestChanID is proposed, which is oblivious to the capacity-achieving input distribution and is guaranteed to output the DMC with the largest capacity, with a desired confidence.

Private Aggregation in Hierarchical Wireless Federated Learning with Partial and Full Collusion

no code implementations25 Jun 2023 Maximilian Egger, Christoph Hofmeister, Antonia Wachter-Zeh, Rawad Bitar

Existing literature focuses on private aggregation schemes that tackle the privacy problem in federated learning in settings where all users are connected to each other and to the federator.

Federated Learning

FedGT: Identification of Malicious Clients in Federated Learning with Secure Aggregation

no code implementations9 May 2023 Marvin Xhemrishi, Johan Östman, Antonia Wachter-Zeh, Alexandre Graell i Amat

Specifically, the server learns the aggregated model of the clients in each group - vanilla federated learning and secure aggregation correspond to the extreme cases of FedGT with group size equal to one and the total number of clients, respectively.

Data Poisoning Federated Learning

Nested Gradient Codes for Straggler Mitigation in Distributed Machine Learning

no code implementations16 Dec 2022 Luis Maßny, Christoph Hofmeister, Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh

Since the number of stragglers in practice is random and unknown a priori, tolerating a fixed number of stragglers can yield a sub-optimal computation load and can result in higher latency.

Scheduling

Secure Over-the-Air Computation using Zero-Forced Artificial Noise

no code implementations8 Dec 2022 Luis Maßny, Antonia Wachter-Zeh

Over-the-air computation has the potential to increase the communication-efficiency of data-dependent distributed wireless systems, but is vulnerable to eavesdropping.

Cost-Efficient Distributed Learning via Combinatorial Multi-Armed Bandits

no code implementations16 Feb 2022 Maximilian Egger, Rawad Bitar, Antonia Wachter-Zeh, Deniz Gündüz

We consider the distributed SGD problem, where a main node distributes gradient calculations among $n$ workers.

Multi-Armed Bandits

Multiple Criss-Cross Insertion and Deletion Correcting Codes

no code implementations4 Feb 2021 Lorenz Welter, Rawad Bitar, Antonia Wachter-Zeh, Eitan Yaakobi

We show an equivalence between correcting $t$-criss-cross deletions and $t$-criss-cross insertions and show that a code correcting $t$-criss-cross insertions/deletions has redundancy at least $tn + t \log n - \log(t!)$.

Information Theory Information Theory

Decoding of Space-Symmetric Rank Errors

no code implementations4 Feb 2021 Thomas Jerkovits, Vladimir Sidorenko, Antonia Wachter-Zeh

This paper investigates the decoding of certain Gabidulin codes that were transmitted over a channel with space-symmetric errors.

Information Theory Information Theory

Efficient Decoding of Gabidulin Codes over Galois Rings

no code implementations3 Feb 2021 Sven Puchinger, Julian Renner, Antonia Wachter-Zeh, Jens Zumbrägel

The new method consists of two steps: (1) solving a syndrome-based key equation to obtain the annihilator polynomial of the error and therefore the column space of the error, (2) solving a key equation based on the received word in order to reconstruct the error vector.

Information Theory Information Theory

Adaptive Private Distributed Matrix Multiplication

no code implementations14 Jan 2021 Rawad Bitar, Marvin Xhemrishi, Antonia Wachter-Zeh

A master server owns two private matrices $\mathbf{A}$ and $\mathbf{B}$ and hires worker nodes to help computing their multiplication.

Information Theory Information Theory

On the Gap between Scalar and Vector Solutions of Generalized Combination Networks

no code implementations8 Jun 2020 Hedongliang Liu, Hengjia Wei, Sven Puchinger, Antonia Wachter-Zeh, Moshe Schwartz

We derive new upper and lower bounds on the maximum number of nodes in the middle layer, depending on the network parameters and the alphabet size.

Information Theory Networking and Internet Architecture Social and Information Networks Combinatorics Information Theory

Clustering-Correcting Codes

2 code implementations11 Mar 2019 Tal Shinkar, Eitan Yaakobi, Andreas Lenz, Antonia Wachter-Zeh

This family of codes is motivated by the special structure of data that is stored in DNA-based storage systems.

Information Theory Information Theory

Codes Correcting a Burst of Deletions or Insertions

1 code implementation22 Feb 2016 Clayton Schoeny, Antonia Wachter-Zeh, Ryan Gabrys, Eitan Yaakobi

In this paper we close on this gap and provide codes with redundancy at most $\log(n) + (b-1)\log(\log(n)) +b -\log(b)$.

Information Theory Information Theory

Cannot find the paper you are looking for? You can Submit a new open access paper.