{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:35:10Z","timestamp":1773930910531,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Technical University of Munich\u2014Institute for Advanced Studies by the German Excellence Initiative and European Union Seventh Framework Program","award":["291763"],"award-info":[{"award-number":["291763"]}]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","award":["WA 3907\/7-1"],"award-info":[{"award-number":["WA 3907\/7-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1109\/tit.2022.3143199","type":"journal-article","created":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T20:38:23Z","timestamp":1642192703000},"page":"2653-2673","source":"Crossref","is-referenced-by-count":17,"title":["Adaptive Private Distributed Matrix Multiplication"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4421-1024","authenticated-orcid":false,"given":"Rawad","family":"Bitar","sequence":"first","affiliation":[{"name":"Institute for Communications Engineering, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5341-9954","authenticated-orcid":false,"given":"Marvin","family":"Xhemrishi","sequence":"additional","affiliation":[{"name":"Institute for Communications Engineering, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5174-1947","authenticated-orcid":false,"given":"Antonia","family":"Wachter-Zeh","sequence":"additional","affiliation":[{"name":"Institute for Communications Engineering, Technical University of Munich, Munich, Germany"}]}],"member":"263","reference":[{"key":"ref1","first-page":"480","article-title":"Rateless codes for private distributed matrix-matrix multiplication","volume-title":"Proc. IEEE Int. Symp. Inf. Theory Appl. (ISITA)","author":"Bitar"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"ref3","first-page":"1223","article-title":"Large scale distributed deep networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"2012","author":"Dean"},{"key":"ref4","first-page":"185","article-title":"Effective straggler mitigation: Attack of the clones","volume-title":"Proc. 10th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Ananthanarayanan"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2289382"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"issue":"3","key":"ref7","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","article-title":"Least squares support vector machine classifiers","volume":"9","author":"Suykens","year":"1999","journal-title":"Neural Process. Lett."},{"key":"ref8","volume-title":"Linear Regression Analysis","volume":"329","author":"Seber","year":"2012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050237"},{"key":"ref10","first-page":"271","article-title":"LT codes","volume-title":"Proc. 43rd Annu. IEEE Symp. Found. Comput. Sci.","author":"Luby"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874390"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3103822"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3524298"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437549"},{"key":"ref15","article-title":"Coded sparse matrix multiplication","author":"Wang","year":"2018","journal-title":"arXiv:1802.03430"},{"key":"ref16","first-page":"4403","article-title":"Polynomial codes: An optimal design for high-dimensional coded matrix multiplication","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Yu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2756959"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2963864"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262882"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3050853"},{"key":"ref22","article-title":"Efficient replication for straggler mitigation in distributed computing","author":"Behrouzi-Far","year":"2020","journal-title":"arXiv:2006.02318"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174030"},{"key":"ref24","first-page":"5152","article-title":"Coded sparse matrix multiplication","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"Wang"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2877391"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2988506"},{"key":"ref27","article-title":"Private and rateless adaptive coded matrix-vector multiplication","author":"Bitar","year":"2019","journal-title":"arXiv:1909.12611"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2846601"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2975021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647313"},{"key":"ref31","article-title":"Rate-efficiency and straggler-robustness through partition in distributed two-sided secure matrix computation","author":"Kakar","year":"2018","journal-title":"arXiv:1810.13006"},{"key":"ref32","first-page":"1215","article-title":"Lagrange coded computing: Optimal design for resiliency, security, and privacy","volume-title":"Proc. 22nd Int. Conf. Artif. Intell. Statist. (AISTATS)","author":"Yu"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174167"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849252"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2972166"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3064827"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3158868"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174509"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162296"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848010"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ITW44776.2019.8989092"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/BF02127580"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2307\/1266548"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9737657\/09681896.pdf?arnumber=9681896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T22:23:09Z","timestamp":1705184589000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9681896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tit.2022.3143199","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4]]}}}