Squeezed polynomial codes: Communication-efficient coded computation in straggler-exploiting distributed matrix multiplication S Hong, H Yang, J Lee IEEE Access 8, 190516-190528, 2020 | 12 | 2020 |
Hierarchical group testing for byzantine attack identification in distributed matrix multiplication S Hong, H Yang, J Lee IEEE Journal on Selected Areas in Communications 40 (3), 1013-1029, 2022 | 11 | 2022 |
Chebyshev polynomial codes: Task entanglement-based coding for distributed matrix multiplication S Hong, H Yang, Y Yoon, T Cho, J Lee International Conference on Machine Learning, 4319-4327, 2021 | 9 | 2021 |
Private and secure coded computation in straggler-exploiting distributed matrix multiplication H Yang, S Hong, J Lee 2021 IEEE International Symposium on Information Theory (ISIT), 2137-2142, 2021 | 4 | 2021 |
Byzantine attack identification in distributed matrix multiplication via locally testable codes S Hong, H Yang, J Lee 2022 IEEE International Symposium on Information Theory (ISIT), 560-565, 2022 | 2 | 2022 |
Straggler-exploiting fully private distributed matrix multiplication with chebyshev polynomials S Hong, H Yang, Y Yoon, J Lee IEEE Transactions on Communications 71 (3), 1579-1594, 2023 | 1 | 2023 |
Securely Straggler-Exploiting Coded Computation for Distributed Matrix Multiplication H Yang, S Hong, J Lee IEEE Access 9, 167374-167388, 2021 | 1 | 2021 |
Group-wise Verifiable Coded Computing under Byzantine Attacks and Stragglers S Hong, H Yang, Y Yoon, J Lee IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
GBMix: Enhancing Fairness by Group-Balanced Mixup S Hong, Y Yoon, H Joo, J Lee IEEE Access, 2024 | | 2024 |
Group-wise Verifiable Distributed Computing for Machine Learning under Adversarial Attacks S Hong, H Yang, Y Yoon, J Lee | | 2022 |