Picture of Luis Maßny

M.Sc. Luis Maßny

Technical University of Munich

Associate Professorship of Coding and Cryptography (Prof. Wachter-Zeh)

Postal address

Postal:
Theresienstr. 90
80333 München

Biography

  • Doctoral researcher under the supervision of Prof. Antonia Wachter-Zeh and Dr. Rawad Bitar, Technical University of Munich, since September 2021.
  • M.Sc. Electrical Engineering, Information Technology, and Computer Engineering, RWTH Aachen University, 2020.
  • B.Sc. Electrical Engineering, Information Technology, and Computer Engineering, RWTH Aachen University, 2018.

Research Interests

  • Security, Privacy, and Robustness for Distributed Computing Systems
  • Wireless Communication and Signal Processing
  • Federated Learning
  • Coding Theory
  • Information Theory

Teaching

Theses

Available Theses

Access Cost of Code Conversion

Description

In large-scale distributed storage systems, data is stored on multiple servers. Erasure codes (mostly linear MDS codes) are used to protect the data against disk and server failures. Since the failure rates can change over time, it is beneficial to convert the code parameters (code length and code dimension) at a later point in time. This is called the code conversion problem.

Recent work has studied the access cost of the code conversion problem [1-3], which is the number of servers that needs to be accessed to perform the code conversion. The papers derive fundamental limits of the access cost and propose an achievable encoding scheme. The problem is first studied for the "merge regime" [1,2], and then generalized to other parameter regimes [3].

The goal of the seminar is to understand the code conversion problem, the fundamental limits on access cost, and how to construct suitable codes for different parameter regimes. The findings shall be presented in a written report and a scientific presentation.

 

[1] Maturana, Francisco, and K. V. Rashmi. "Convertible codes: new class of codes for efficient conversion of coded data in distributed storage." 11th Innovations in Theoretical Computer Science Conference (ITCS 2020). Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2020.

[2] F. Maturana and K. V. Rashmi, "Convertible Codes: Enabling Efficient Conversion of Coded Data in Distributed Storage," in IEEE Transactions on Information Theory, vol. 68, no. 7, pp. 4392-4407, July 2022, doi: 10.1109/TIT.2022.3155972.

[3] F. Maturana, V. S. C. Mukka and K. V. Rashmi, "Access-optimal Linear MDS Convertible Codes for All Parameters," 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 2020, pp. 577-582, doi: 10.1109/ISIT44484.2020.9173947.

 

 

Prerequisites

  • Coding theory (Channel coding course recommended)
  • Linear algebra

Contact

Luis Maßny (luis.massny@tum.de)

Supervisor:

Distributed Noise Generation for Secure Over-the-Air Computation with Applications in Federated Learning

Short Description:
Over-the-Air (OtA) computation is a promising approach with the potential to drastically reduce the communication overhead of wireless distributed data-processing systems (e.g. Federated Learning). Since this method, however, is prone to eavesdropping, artificial noise can be employed to secure the communication. An open problem however, is the distributed design of artifical noise among different users.

Description

Novel use cases for mobile communication networks include the aggregation of large amounts of data, which is stored in a distributed manner across network users. For instance, Federated Learning requires the aggregation of machine learning model updates from contributing users.

Over-the-Air (OtA) computation is an approach with the potential to drastically reduce the communication overhead of wireless distributed data-processing systems (e.g. Federated Learning). It exploits the multiple-access property and linearity of the wireless channel to compute sums of pre-processed data by the channel. This important property at the same time opens great opportunities for eavesdroppers to learn about the transmitted signal. If the legitimate receiver shall have exclusive access to the computation result, it is crucial to employ additional security measures.

Artificial noise can be employed to secure the communication. This noise is either generated by dedicated users jamming the communication [3], or by jointly designing the noise contribution of each user, [1][2]. The latter approach makes it possible to minimize the distortion at the legitimate receiver, but requires a centrally coordinated noise design. Therefore, an open problem is how to allow for the distributed design of artifical noise.

[1] Maßny, Luis, and Antonia Wachter-Zeh. "Secure Over-the-Air Computation using Zero-Forced Artificial Noise." arXiv preprint arXiv:2212.04288 (2022).
[2] Liao, Jialing, Zheng Chen, and Erik G. Larsson. "Over-the-Air Federated Learning with Privacy Protection via Correlated Additive Perturbations." arXiv preprint arXiv:2210.02235 (2022).
[3] Yan, Na, et al. "Toward Secure and Private Over-the-Air Federated Learning." arXiv preprint arXiv:2210.07669 (2022).

Prerequisites

- basic knowledge in statistics and estimation theory
- basic knowledge about linear wireless channels

Supervisor:

Publications

2022

  • Luis Maßny; Antonia Wachter-Zeh: Secure Over-the-Air Federated Learning. Munich Workshop on Coding and Cryptography, 2022 more…
  • Luis Maßny; Antonia Wachter-Zeh: Secure Over-the-Air Federated Learning. IEEE European School of Information Theory, 2022 more…
  • Luis Maßny; Christoph Hofmeister; Maximilian Egger; Rawad Bitar; Antonia Wachter-Zeh: Nested Gradient Codes for Straggler Mitigation in Distributed Machine Learning. TUM ICE Workshop Raitenhaslach, 2022 more…