Private retrieval, computing, and learning: Recent progress and future challenges

S Ulukus, S Avestimehr, M Gastpar… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …

Advances and open problems in federated learning

P Kairouz, HB McMahan, B Avent… - … and trends® in …, 2021 - nowpublishers.com
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …

The capacity of symmetric private information retrieval

H Sun, SA Jafar - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
Private information retrieval (PIR) is the problem of retrieving, as efficiently as possible, one
out of K messages from N non-communicating replicated databases (each holds all K …

The capacity of cache aided private information retrieval

R Tandon - 2017 55th Annual Allerton Conference on …, 2017 - ieeexplore.ieee.org
The problem of cache enabled private information retrieval (PIR) is considered in which a
user wishes to privately retrieve one out of K messages, each of size L bits from N distributed …

The Capacity of T-Private Information Retrieval With Private Side Information

Z Chen, Z Wang, SA Jafar - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We consider the problem of T-Private Information Retrieval with private side information
(TPIR-PSI). In this problem, N replicated databases store K independent messages, and a …

[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions

A Yao, G Li, X Li, F Jiang, J Xu, X Liu - Array, 2023 - Elsevier
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …

Cross Subspace Alignment and the Asymptotic Capacity of -Secure -Private Information Retrieval

Z Jia, H Sun, SA Jafar - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
X-secure and T-private information retrieval (XSTPIR) is a form of private information
retrieval where data security is guaranteed against collusion among up to X servers and the …

The capacity of private computation

H Sun, SA Jafar - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
We introduce the problem of private computation, comprised of N distributed and non-
colluding servers, K independent datasets, and a user who wants to compute a function of …

A new method with swapping of peers and fogs to protect user privacy in IoT applications

M Yamin, AA Abi Sen - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is now serving as a vehicle to a huge number of applications,
resulting in innovative and smart solutions in many fields. While providing abundant benefits …

Cache-aided private information retrieval with partially known uncoded prefetching: Fundamental limits

YP Wei, K Banawan, S Ulukus - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
We consider the problem of private information retrieval from N non-colluding and replicated
databases, when the user is equipped with a cache that holds an uncoded fraction r of the …