Publications by Topic

Private and Secure Coded Computing

  1. N. Raviv, R.Bitar and E. Yaakobi, Information Theoretic Private Inference in Quantized Models, IEEE International Symposium on Information Theory (ISIT), 2022.

  2. M. Xhemrishi, R. Bitar and A. Wachter-Zeh, Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees, IEEE International Symposium on Information Theory (ISIT), 2022.

  3. C. Hofmeister, R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound, IEEE Journal on Selected Areas in Information Theory (JSAIT), Vol. 3, No. 2, June 2022. (arXiv:2108.05742)

  4. R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Adaptive Private Distributed Matrix Multiplication, IEEE Transactions on Information Theory, Vol. 68, No. 4, April 2022. (arXiv:2004.12925)

  5. C. Hofmeister, R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound, Twelfth International Workshop on Coding and Cryptography (WCC), March 2022.

  6. R. Bitar, Y. Xing, Y. Keshtkarjahromi, V. Dasari, S. El Rouayheb, and H. Seferoglu, Private and Rateless Adaptive Coded Computation at the Edge, EURASIP Journal on Wireless Communications and Networking, Vol.1, January 2021. (arXiv:1909.12611)

  7. R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Fountain Codes for Private Distributed Matrix-Matrix Multiplication, IEEE International Symposium on Information Theory and its Applications (ISITA), 2020.

  8. R. Bitar, P. Parag and S. El Rouayheb, Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes, IEEE Transactions on Communication, Vol. 68, No. 8, August 2020. (arXiv:1802.02640)

  9. Y. Keshtkarjahromi, R. Bitar, V. Dasari, S. El Rouayheb, and H. Seferoglu, Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks, preprint, arXiv:1908.05385, 2020.

  10. Y. Keshtkarjahromi, R. Bitar, V. Dasari, S. El Rouayheb, and H. Seferoglu, Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks, IEEE Global Communication Conference (GLOBECOM), Waikoloa, 2019

  11. R. Bitar, Y. Xing, Y. Keshtkarjahromi, V. Dasari, S. El Rouayheb, and H. Seferoglu, PRAC: Private and Rateless Adaptive Coded Computation at the Edge, SPIE Defense + Commercial Sensing, Baltimore, 2019.

  12. E. Klarlund, R. Bitar and S. El Rouayheb, Search Efficient Blockchain-Based Immutable Logging And Querying, submitted to BMC Medical Genomics, 2018.

  13. R. Bitar, P. Parag and S. El Rouayheb, Minimizing Latency for Secure Distributed Computing, IEEE International Symposium on Information Theory (ISIT), Aachen, 2017.

  14. R. Bitar, Codes for Private Distributed Computation with Applications to Machine Learning, Rutgers University school of graduate studies electronic theses and dissertations, 2020.

Distributed Stochastic Gradient Descent

  1. M. Egger, R. Bitar, A. Wachter-Zeh and D. Gündüz, Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits, preprint, arXiv:2202.08302, 2022.

  2. M. Egger, R. Bitar, A. Wachter-Zeh and D. Gündüz, Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits, IEEE International Symposium on Information Theory (ISIT), 2022.

  3. S. Kas Hanna, R. Bitar, P. Parag, V. Dasari and S. El Rouayheb, Adaptive Stochastic Gradient Descent for Fast and Communication-Efficient Distributed Learning, preprint, arXiv:2208.03134, 2022.

  4. S. Kas Hanna, R. Bitar, P. Parag, V. Dasari and S. El Rouayheb, Adaptive Distributed Stochastic Gradient Descent for Minimizing Delay in the Presence of Stragglers, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Barcelona, 2020.

  5. R. Bitar, M. Wootters and S. El Rouayheb, Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning, IEEE Journal on Selected Areas in Information Theory,, Vol.1, No. 1, May 2020. (arXiv:1905.05383)

  6. R. Bitar, M. Wootters and S. El Rouayheb, Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning, IEEE Information Theory Workshop (ITW), 2019.

Privacy and Security in Distributed Storage

  1. M. Xhemrishi, M. Egger and R. Bitar, Efficient Private Storage of Sparse Machine Learning Data, IEEE Information Theory Workshop (ITW), invited paper, 2022.

  2. R. Bitar and S. Jaggi, Communication Efficient Secret Sharing in the Presence of Malicious Adversary, preprint, arXiv:2002.03374, 2020.

  3. R. Bitar and S. Jaggi, Communication Efficient Secret Sharing in the Presence of Malicious Adversary, IEEE International Symposium on Information Theory (ISIT), 2020.

  4. R. Bitar and S. El Rouayheb, Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads, IEEE Transactions on Information Theory, Vol. 64, No. 2, February 2018. (arXiv:1512.02990)

  5. R. Bitar and S. El Rouayheb, Staircase-PIR: Universally Robust Private Information Retrieval, IEEE Information Theory Workshop (ITW), Guangzhou, 2018.

  6. R. Bitar and S. El Rouayheb, Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads, IEEE International Symposium on Information Theory (ISIT), Barcelona, 2016.

  7. R. Bitar and S. El Rouayheb, Securing data against Limited-Knowledge Adversaries in Distributed Storage Systems, IEEE International Symposium on Information Theory (ISIT), Hong Kong, 2015.

Insertion/Deletion-Correcting Codes

  1. L. Welter, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Multiple Criss-Cross Deletion and Insertion Correcting Codes, IEEE Transactions on Information Theory, Vol. 68, No. 6, June, 2022. (arXiv:2102.02727)

  2. E. Stylianou, L. Welter, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Equivalence of Insertion/Deletion Correcting Codes for d-dimensional Arrays, IEEE International Symposium on Information Theory (ISIT), 2022.

  3. S. Kas Hanna and R. Bitar, Codes for Detecting Deletions and Insertions in Concatenated Strings, preprint, arXiv:2105.00212, 2021.

  4. S. Kas Hanna and R. Bitar, Codes for Detecting Deletions and Insertions in Concatenated Strings, IEEE International Symposium on Information Theory (ISIT), 2021.

  5. R. Bitar, S. Kas Hanna, N. Polyanskii and I. Vorobyev, Optimal Codes Correcting Localized Deletions, IEEE International Symposium on Information Theory (ISIT), 2021.

  6. L. Welter, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Multiple Criss-Cross Deletion-Correcting Codes, IEEE International Symposium on Information Theory (ISIT), 2021.

  7. R. Bitar, L. Welter, I. Smagloy, A. Wachter-Zeh and E. Yaakobi, Criss-Cross Insertion and Deletion Correcting Codes, IEEE Transactions on Information Theory, Vol.67, No.12, December 2021. (arXiv:2004.14740)

  8. R. Bitar, I. Smagloy, L. Welter, A. Wachter-Zeh and E. Yaakobi, Criss-Cross Deletion Correcting Codes, IEEE International Symposium on Information Theory and its Applications (ISITA), 2020.

Function-Correcting Codes

  1. A. Lenz, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Function-Correcting Codes, submitted to IEEE Transactions on Information Theory, 2022.

  2. A. Lenz, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Function-Correcting Codes, IEEE International Symposium on Information Theory (ISIT), 2021.

Private and Secure Network Coding

  1. S. Li, R. Bitar, S. Jaggi and Y. Zhang, Network Coding with Myopic Adversaries, IEEE Journal on Selected Areas in Information Theory (JSAIT), Vol. 2, No. 4, December 2021. (arXiv:2102.09885).

  2. S. Li, R. Bitar, S. Jaggi and Y. Zhang, Network Coding with Myopic Adversaries, IEEE International Symposium on Information Theory (ISIT), 2021.