Follow
Rawad Bitar
Title
Cited by
Cited by
Year
Minimizing latency for secure distributed computing
R Bitar, P Parag, S El Rouayheb
2017 IEEE International Symposium on Information Theory (ISIT), 2900-2904, 2017
742017
Stochastic gradient coding for straggler mitigation in distributed learning
R Bitar, M Wootters, S El Rouayheb
IEEE Journal on Selected Areas in Information Theory 1 (1), 277-291, 2020
462020
Minimizing latency for secure coded computing using secret sharing via staircase codes
R Bitar, P Parag, S El Rouayheb
IEEE Transactions on Communications 68 (8), 4609-4619, 2020
442020
Staircase codes for secret sharing with optimal communication and read overheads
R Bitar, S El Rouayheb
IEEE Transactions on Information Theory 64 (2), 933-943, 2017
442017
Private and rateless adaptive coded matrix-vector multiplication
R Bitar, Y Xing, Y Keshtkarjahromi, V Dasari, S El Rouayheb, H Seferoglu
EURASIP Journal on Wireless Communications and Networking 2021 (1), 1-25, 2021
272021
Staircase-PIR: Universally robust private information retrieval
R Bitar, S El Rouayheb
2018 IEEE Information Theory Workshop (ITW), 1-5, 2018
222018
Adaptive private distributed matrix multiplication
R Bitar, M Xhemrishi, A Wachter-Zeh
IEEE Transactions on Information Theory 68 (4), 2653-2673, 2022
122022
Adaptive distributed stochastic gradient descent for minimizing delay in the presence of stragglers
SK Hanna, R Bitar, P Parag, V Dasari, S El Rouayheb
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
92020
PRAC: private and rateless adaptive coded computation at the edge
R Bitar, Y Xing, Y Keshtkarjahromi, V Dasari, S El Rouayheb, H Seferoglu
Disruptive Technologies in Information Sciences II 11013, 144-153, 2019
92019
Securing data against limited-knowledge adversaries in distributed storage systems
R Bitar, S El Rouayheb
2015 IEEE International Symposium on Information Theory (ISIT), 2847-2851, 2015
72015
Fountain Codes for Private Distributed Matrix-Matrix Multiplication
R Bitar, M Xhemrishi, A Wachter-Zeh
2020 International Symposium on Information Theory and Its Applications …, 2020
52020
Criss-cross deletion correcting codes
R Bitar, I Smagloy, L Welter, A Wachter-Zeh, E Yaakobi
2020 International Symposium on Information Theory and Its Applications …, 2020
52020
Communication efficient secret sharing in the presence of malicious adversary
R Bitar, S Jaggi
2020 IEEE International Symposium on Information Theory (ISIT), 548-553, 2020
52020
Secure coded cooperative computation at the heterogeneous edge against byzantine attacks
Y Keshtkarjahromi, R Bitar, V Dasari, S El Rouayheb, H Seferoglu
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
52019
Multiple criss-cross deletion-correcting codes
L Welter, R Bitar, A Wachter-Zeh, E Yaakobi
2021 IEEE International Symposium on Information Theory (ISIT), 2798-2803, 2021
42021
Secure private and adaptive matrix multiplication beyond the singleton bound
C Hofmeister, R Bitar, M Xhemrishi, A Wachter-Zeh
IEEE Journal on Selected Areas in Information Theory, 2022
32022
Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees
M Xhemrishi, R Bitar, A Wachter-Zeh
arXiv preprint arXiv:2203.01728, 2022
32022
Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits
M Egger, R Bitar, A Wachter-Zeh, D Gündüz
arXiv preprint arXiv:2202.08302, 2022
32022
Multiple criss-cross insertion and deletion correcting codes
L Welter, R Bitar, A Wachter-Zeh, E Yaakobi
IEEE Transactions on Information Theory 68 (6), 3767-3779, 2022
32022
Criss-cross insertion and deletion correcting codes
R Bitar, L Welter, I Smagloy, A Wachter-Zeh, E Yaakobi
IEEE Transactions on Information Theory 67 (12), 7999-8015, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20