2020 Iran Workshop on Communication and Information Theory (IWCIT)最新文献

筛选
英文 中文
IWCIT 2020 Copyright Page IWCIT 2020版权页面
2020 Iran Workshop on Communication and Information Theory (IWCIT) Pub Date : 2020-05-01 DOI: 10.1109/iwcit50667.2020.9163462
{"title":"IWCIT 2020 Copyright Page","authors":"","doi":"10.1109/iwcit50667.2020.9163462","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163462","url":null,"abstract":"","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131947688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi Variable-layer Neural Networks for Decoding Linear Codes 线性码译码的多变量层神经网络
2020 Iran Workshop on Communication and Information Theory (IWCIT) Pub Date : 2020-05-01 DOI: 10.1109/iwcit50667.2020.9163473
Samira Malek, Saber Salehkaleybar, A. Amini
{"title":"Multi Variable-layer Neural Networks for Decoding Linear Codes","authors":"Samira Malek, Saber Salehkaleybar, A. Amini","doi":"10.1109/iwcit50667.2020.9163473","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163473","url":null,"abstract":"The belief propagation algorithm is a state of the art decoding technique for a variety of linear codes such as LDPC codes. The iterative structure of this algorithm is reminiscent of a neural network with multiple layers. Indeed, this similarity has been recently exploited to improve the decoding performance by tuning the weights of the equivalent neural network. In this paper, we introduce a new network architecture by increasing the number of variable-node layers, while keeping the check-node layers unchanged. The changes are applied in a manner that the decoding performance of the network becomes independent of the transmitted codeword; hence, a training stage with only the all-zero codeword shall be sufficient. Simulation results on a number of well-studied linear codes, besides an improvement in the decoding performance, indicate that the new architecture is also simpler than some of the existing decoding networks.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115515418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IWCIT 2020 Cover Page IWCIT 2020封面
2020 Iran Workshop on Communication and Information Theory (IWCIT) Pub Date : 2020-05-01 DOI: 10.1109/iwcit50667.2020.9163532
{"title":"IWCIT 2020 Cover Page","authors":"","doi":"10.1109/iwcit50667.2020.9163532","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163532","url":null,"abstract":"","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes 具有对抗节点的海量矩阵的编码安全多方计算
2020 Iran Workshop on Communication and Information Theory (IWCIT) Pub Date : 2020-04-10 DOI: 10.1109/IWCIT50667.2020.9163533
Seyed Reza Hoseini Najarkolaei, M. Maddah-ali, M. Aref
{"title":"Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes","authors":"Seyed Reza Hoseini Najarkolaei, M. Maddah-ali, M. Aref","doi":"10.1109/IWCIT50667.2020.9163533","DOIUrl":"https://doi.org/10.1109/IWCIT50667.2020.9163533","url":null,"abstract":"In this work1, we consider the problem of secure multi-party computation (MPC), consisting of F sources, each has access to a large private matrix, N processing nodes or workers, and one master. The master is interested in the result of a polynomial function of the input matrices. Each source sends a randomized functions of its matrix, called as its share, to each server. The workers process their shares in interaction with each other, and send some results to the master such that it can derive the final results. There are several constraints: (1) each worker has a constraint on its storage, such that it can store equivalent of $displaystyle frac{1}{m}$ fraction of size of each input matrices from each source, information about the private inputs or can do malicious actions to make the final result incorrect. The objective is to design an MPC scheme with the minimum number of the workers, called recovery threshold, such that the final result is correct, servers learn no information about the input matrices, and the master learns nothing beyond the final result. In this paper, we propose an MPC scheme that achieves the recovery threshold of 3t+2m-1 workers, which is order-wise less than the recovery threshold of the conventional methods. The main challenge is to manage the errors propagated through the network by the adversarial nodes when the workers interact with each other in each round.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128996797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信