2021
DOI: 10.48550/arxiv.2107.12958
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

Abstract: Stragglers, Byzantine workers, and data privacy are the main bottlenecks in distributed cloud computing. Several prior works proposed coded computing strategies to jointly address all three challenges. They require either a large number of workers, a significant communication cost or a significant computational complexity to tolerate malicious workers. Much of the overhead in prior schemes comes from the fact that they tightly couple coding for all three problems into a single framework. In this work, we propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…The disadvantage of [44] is the high computational complexity incurred by the master. Concurrently and independently of our work, the authors of [50] present a scheme to tolerate malicious workers in coded computing with low computational complexity. The ideas used in [50] are similar to the ideas used in this work.…”
Section: Introductionmentioning
confidence: 98%
See 4 more Smart Citations
“…The disadvantage of [44] is the high computational complexity incurred by the master. Concurrently and independently of our work, the authors of [50] present a scheme to tolerate malicious workers in coded computing with low computational complexity. The ideas used in [50] are similar to the ideas used in this work.…”
Section: Introductionmentioning
confidence: 98%
“…Concurrently and independently of our work, the authors of [50] present a scheme to tolerate malicious workers in coded computing with low computational complexity. The ideas used in [50] are similar to the ideas used in this work. However, [28], [41], [43], [44] and [50] consider security in settings where the workers are assumed to have similar resources.…”
Section: Introductionmentioning
confidence: 98%
See 3 more Smart Citations