Joerg Kliewer
New Jersey Institute of Technology
H-index: 32
North America-United States
Top articles of Joerg Kliewer
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Uncoded Storage Coded Transmission Elastic Computing with Straggler Tolerance in Heterogeneous Systems | arXiv preprint arXiv:2401.12151 | Xi Zhong Joerg Kliewer Mingyue Ji | 2024/1/22 |
Secure distributed storage: Optimal trade-off between storage rate and privacy leakage | Rémi A Chou Jörg Kliewer | 2023/6/25 | |
Reldec: Reinforcement learning-based decoding of moderate length ldpc codes | IEEE Transactions on Communications | Salman Habib Allison Beemer Jörg Kliewer | 2023/7/18 |
Differentially-Private Collaborative Online Personalized Mean Estimation | Yauhen Yakimenka Chung-Wei Weng Hsuan-Yin Lin Eirik Rosnes Jörg Kliewer | 2023/6/25 | |
Decentralized Sparse Matrix Multiplication Under Byzantine Attacks | Sara Ghasvarianjahromi Yauhen Yakimenka Jörg Kliewer | 2023/12/4 | |
Matrix Multiplication with Straggler Tolerance in Coded Elastic Computing via Lagrange Code | Xi Zhong Jörg Kliewer Mingyue Ji | 2023/5/28 | |
FedDRO: Federated Compositional Optimization for Distributionally Robust Learning | arXiv preprint arXiv:2311.12652 | Prashant Khanduri Chengyin Li Rafi Ibn Sultan Yao Qiang Joerg Kliewer | 2023/11/21 |
Straggler-and adversary-tolerant secure distributed matrix multiplication using polynomial codes | Entropy | Eimear Byrne Oliver W Gnilke Jörg Kliewer | 2023/1/31 |
Proximal Compositional Optimization for Distributionally Robust Learning | Prashant Khanduri Chengyin Li Rafi Ibn Sultan Yao Qiang Joerg Kliewer | 2023/8/7 | |
Systems and Methods for Decoding of Graph-Based Channel Codes Via Reinforcement Learning | 2023/7/20 | ||
Straggler-resilient differentially-private decentralized learning | Yauhen Yakimenka Chung-Wei Weng Hsuan-Yin Lin Eirik Rosnes Jörg Kliewer | 2022/11/1 | |
When differential privacy implies syntactic privacy | IEEE Transactions on Information Forensics and Security | Emelie Ekenstedt Lawrence Ong Yucheng Liu Sarah Johnson Phee Lep Yeoh | 2022/5/25 |
Multi-message pliable private information retrieval | Sarah A Obead Jörg Kliewer | 2022/11/1 | |
Private polynomial function computation for noncolluding coded databases | IEEE Transactions on Information Forensics and Security | Sarah A Obead Hsuan-Yin Lin Eirik Rosnes Jörg Kliewer | 2022/4/14 |
Keyless authentication for awgn channels | IEEE Transactions on Information Theory | Eric Graves Allison Beemer Jörg Kliewer Oliver Kosut L Yu Paul | 2022/9/12 |
Private linear computation for noncolluding coded databases | IEEE Journal on Selected Areas in Communications | Sarah A Obead Hsuan-Yin Lin Eirik Rosnes Jörg Kliewer | 2022/1/12 |
Generative adversarial user privacy in lossy single-server information retrieval | IEEE Transactions on Information Forensics and Security | Chung-Wei Weng Yauhen Yakimenka Hsuan-Yin Lin Eirik Rosnes Jörg Kliewer | 2022/8/31 |
Optimal rate-distortion-leakage tradeoff for single-server information retrieval | IEEE Journal on Selected Areas in Communications | Yauhen Yakimenka Hsuan-Yin Lin Eirik Rosnes Jörg Kliewer | 2022/1/12 |
Function computation without secure links: Information and leakage rates | Rémi A Chou Jörg Kliewer | 2022/6/26 | |
Information leakage in index coding with sensitive and nonsensitive messages | IEEE Journal on Selected Areas in Information Theory | Yucheng Liu Lawrence Ong Parastoo Sadeghi Sarah Johnson Joerg Kliewer | 2022/12 |