Google Scholar

DBLP

Journals

  1. C. Wang and N.Raviv, “Breaking Blockchain’s Communication Barrier with Coded Computation,” to appear in IEEE Journal on Selected Areas in Information Theory, 2022.
  2. S. Jain, B. Mazaheri, N. Raviv, and J. Bruck. “Glioblastoma signature in the DNA of blood-derived cells,” PloS one 16, no. 9 (2021): e0256831.
  3. J. Sima, N. Raviv, and J. Bruck, “On coding over sliced information,” IEEE Transactions on Information Theory, vol. 67, no. 5, pp. 2793-2807, 2021.
  4. N. Raviv, I. Tamo, R. Tandon, A. G. Dimakis, “Gradient coding from cyclic MDS codes and expander graphs,” IEEE Transactions on Information Theory, vol. 66, no. 12, pp. 7475-7489, 2020.
  5. N. Raviv, M. Schwartz, R. Cohen, and Y. Cassuto, “Hierarchical Erasure Correction of Linear Codes“, Finite Fields and Their Applications, 68 (2020): 101743.
  6. N. Raviv, I. Tamo, and E. Yaakobi, “Private information retrieval in graph-based replication systems,” Transactions on Information Theory, vol. 66, no. 6, pp. 3590-3602, 2020.
  7. J. Sima, N. Raviv, and J. Bruck, “Two deletion correcting codes from indicator vectors,” IEEE Transactions on Information Theory, vol. 66, no. 4, pp. 2375-2391, 2019.
  8. N. Raviv and D. A. Karpuk, “Private Polynomial Computation from Lagrange Encoding“, Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 553-563, 2019.
  9. R. Cohen, N. Raviv, and Y. Cassuto, “LDPC codes over the q-ary Multi-Bit channel,” arXiv:1706.09146 [cs.IT], 2017. To appear in Transactions on Information Theory.
  10. N. Raviv, M. Schwartz, and E. Yaakobi,  “Rank modulation codes for DNA storage with shotgun sequencing,” IEEE Transactions on Information Theory, vol. 64, no. 12, pp. 1–15, 2018.
  11. N. Raviv, “Asymptotically optimal regenerating codes over any field,” IEEE Transactions on Information Theory, vol. 64, no. 11, pp. 7178-7187, 2018.
  12. Ron. M. Roth, N. Raviv, and I. Tamo, “Constructions of Sidon spaces with applications to coding,” IEEE Transactions on Information Theory, vol. 64, no. 6, pp. 4412-4422, 2018.
  13. N. Raviv, E. Yaakobi, and M. Médard, “Coding for locality in reconstructing permutations,” Designs, Codes and Cryptography, vol. 86, no. 2, pp. 387-418, 2017.
  14. N. Raviv, N. Silberstein, and T. Etzion, “Construction of high rate minimum storage regenerating codes over small fields,” IEEE Transactions on Information Theory, vol. 63, no. 4, pp. 2015-2038, 2017.
  15. N. Raviv and A. Wachter-Zeh, “Some Gabidulin codes cannot be list decoded efficiently at any radius,” IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 1605-1615, 2016.
  16. E. Ben-Sasson, T. Etzion, A. Gabizon, and N. Raviv, “Subspace polynomials and cyclic subspace codes,” IEEE Transactions on Information Theory, vol. 62, no. 3, pp. 1157-1165, 2016.
  17. T. Etzion and N. Raviv, “Equidistant codes in the Grassmannian,” Discrete Applied Mathematics, vol. 186, pp. 87-97, 2015.

Conference Proceedings

  1. X. Zuo, A. Jiang, N. Raviv, and P. H. Siegel, “Symbolic Regression for Data Storage with Side Information, (invited paper), Information Theory Workshop (ITW), 2022.
  2. C. Wang and N. Raviv, “Breaking Blockchain’s Communication Barrier with Coded Computation,” Information Theory Workshop (ITW), 2022.
  3. C. Wang and N. Raviv, “All-to-all Encode in Synchronous Systems,” Information Theory Workshop (ITW), 2022.
  4. N. Raviv, R. Bitar, and E. Yaakobi, “Information Theoretic Private Inference in Quantized Models,” International Symposium on Information Theory (ISIT), 2022.
  5. N. Raviv and Z. Goldfeld, “Perfect Subset Privacy for Data Sharing and Learning,” International Symposium on Information Theory (ISIT), 2022.
  6. N. Raviv, A. Kelley, M. Guo, and E. Vorobeychik, “Enhancing Robustness of Neural Networks through Fourier Stabilization,” International Conference on Machine Learning (ICML), 2021.
  7. C. Wang and N. Raviv, “Low Latency Cross-Shard Transactions in Coded Blockchain,” IEEE International Symposium on Information Theory (ISIT), pp. 2678-2683, 2021.
  8. N. Raviv, B. Langton, and I. Tamo, “Multivariate public key cryptosystem from Sidon spaces”, Public-Key Cryptography (PKC), pp. 242-265, 2021.
  9. N. Raviv, “Robust Neural Computation from Error Correcting Codes” (invited paper), IEEE Information Theory Workshop, (ITW), 2020.
  10. H. Yildiz, N. Raviv, and B. Hassibi, “Support Constrained Generator Matrices of Gabidulin Codes in Characteristic Zero,” International Symposium on Information Theory (ISIT), 2020.
  11. N. Raviv, S. Jain, P. Upadhyaya, J. Bruck, and A. Jiang, “CodNN – Robust Neural Networks From Coded Classification,” International Symposium on Information Theory (ISIT), 2020.
  12. J. Sima, N. Raviv, J. Bruck, “Robust Indexing — Optimal Codes for DNA Storage,” International Symposium on Information Theory (ISIT), 2020.
  13. N. Raviv, S. Jain, and J. Bruck, “What is the value of data? On mathematical methods for data quality estimation,” International Symposium on Information Theory (ISIT), 2020.
  14. N. Raviv, P. Upadhyaya, S. Jain, J. Bruck, and A. Jiang, “Coded Deep Neural Networks for Robust Neural Computation,” Annual Non-volatile Memories Workshop (NVMW), 2020.
  15. J. Sima, N. Raviv, and J. Bruck, “On coding over sliced information,” International Symposium on Information Theory (ISIT), 2019.
  16. N. Raviv and D. A. Karpuk, “Private polynomial computation from Lagrange encoding,” International Symposium on Information Theory (ISIT), 2019.
  17. N. Raviv, Q. Yu, J. Bruck, and S. Avestimehr, “Download and access tradeoffs in Lagrange coded computing,” International Symposium on Information Theory (ISIT), 2019.
  18. Q. Yu, S. Li, N. Raviv, S. M. M. Kalan, M. Soltanolkotabi, S. Avestimehr, “Lagrange Coded Computing: Optimal design for resiliency, security, and privacy“, The International Conference on Artificial Intelligence and Statistics (AISTATS), 2019.
  19. Q. Yu, S. Li, N. Raviv, S. M. M. Kalan, M. Soltanolkotabi, S. Avestimehr, “Lagrange Coded Computing: Optimal design for resiliency, security, and privacy,” Systems for Machine Learning Workshop (SYSML) at Advances in Neural Information Processing Systems (NIPS), 2018.
  20. Q. Yu, N. Raviv, and S. Avestimehr, “Coding for private and secure multiparty computing” (invited paper), Information Theory Workshop (ITW), 2018.
  21. N. Raviv, I. Tamo, R. Tandon, A. G. Dimakis, “Gradient coding from cyclic MDS codes and expander graphs,” International Conference on Machine Learning (ICML), 2018.
  22. J. Sima, N. Raviv, and J. Bruck, “Two deletion correcting codes from indicator vectors,” International Symposium on Information Theory (ISIT), 2018.
  23. N. Raviv and I. Tamo, “Private information retrieval in graph-based replication systems,” International Symposium on Information Theory (ISIT), 2018.
  24. N. Raviv, Y. Cassuto, R. Cohen, and M. Schwartz, “Erasure correction of scalar codes in the presence of stragglers,” International Symposium on Information Theory (ISIT), 2018.
  25. S. Jain, N. Raviv, and J. Bruck, “Attaining the 2nd Chargaff Rule by Tandem Duplications,” International Symposium on Information Theory (ISIT), 2018.
  26. N. Raviv, E. Yaakobi, and M. Schwartz, “Rank modulation codes for DNA storage,” International Symposium on Information Theory (ISIT), pp. 3125-3129, 2017.
  27. N. Raviv and I. Tamo, “Cyclic subspace codes and Sidon spaces,” International Symposium on Information Theory (ISIT), pp. 784-788, 2017.
  28. N. Raviv, “Asymptotically optimal regenerating codes over any field,” International Symposium on Information Theory (ISIT), pp. 1416-1420, 2017.
  29. N. Raviv, E. Yaakobi, and M. Médard, “Coding for locality in reconstructing permutations,” International Symposium on Information Theory (ISIT), pp. 450-454 , 2016.
  30. N. Raviv, N. Silberstein, and T. Etzion, “Construction of high rate MSR codes over small fields,” International Symposium on Information Theory (ISIT), pp. 61-65, 2016.
  31. E. Ben-Sasson, T. Etzion, A. Gabizon, and N. Raviv, “Subspace polynomials and cyclic subspace codes,” International Symposium on Information Theory (ISIT), pp. 586-590, 2015.
  32. N. Raviv and T. Etzion, “Distributed storage systems based on intersecting subspace codes,” International Symposium on Information Theory (ISIT), pp. 1462-1466, 2015.
  33. N. Raviv and A. Wachter-Zeh, “Some Gabidulin codes cannot be List decoded efficiently any radius,” International Symposium on Information Theory (ISIT), pp. 6-10, 2015.

Working papers

  1. C. Wang and N. Raviv, “All-to-all Encode in Synchronous Systems,” arXiv:2205.05183 [cs.DC], 2022.