Â鶹´«Ã½AV

A Code and Rate Equivalence Between Secure Network and Index Coding

Submitted by admin on Mon, 10/28/2024 - 01:24

Establishing code equivalences between index coding and network coding provides important insights for code design. Previous works showed an equivalence relation between any index-coding instance and a network-coding instance, for which a code for one instance can be translated to a code for the other instance with the same decoding-error performance. The equivalence also showed a surprising result that any network-coding instance can be mapped to an index-coding instance with a properly designed code translation.

Three Variants of Differential Privacy: Lossless Conversion and Applications

Submitted by admin on Mon, 10/28/2024 - 01:24

We consider three different variants of differential privacy (DP), namely approximate DP, Rényi DP (RDP), and hypothesis test DP. In the first part, we develop a machinery for optimally relating approximate DP to RDP based on the joint range of two $f$ -divergences that underlie the approximate DP and RDP. In particular, this enables us to derive the optimal approximate DP parameters of a mechanism that satisfies a given level of RDP.

Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning

Submitted by admin on Mon, 10/28/2024 - 01:24

Federated learning is a distributed framework for training machine learning models over the data residing at mobile devices, while protecting the privacy of individual users. A major bottleneck in scaling federated learning to a large number of users is the overhead of secure model aggregation across many users. In particular, the overhead of the state-of-the-art protocols for secure model aggregation grows quadratically with the number of users.