Picture for Ashish Khisti

Ashish Khisti

Random Cycle Coding: Lossless Compression of Cluster Assignments via Bits-Back Coding

Add code
Nov 30, 2024
Viaarxiv icon

Minimum Entropy Coupling with Bottleneck

Add code
Oct 29, 2024
Figure 1 for Minimum Entropy Coupling with Bottleneck
Figure 2 for Minimum Entropy Coupling with Bottleneck
Figure 3 for Minimum Entropy Coupling with Bottleneck
Figure 4 for Minimum Entropy Coupling with Bottleneck
Viaarxiv icon

Multi-Draft Speculative Sampling: Canonical Architectures and Theoretical Limits

Add code
Oct 23, 2024
Viaarxiv icon

Robust Federated Finetuning of Foundation Models via Alternating Minimization of LoRA

Add code
Sep 04, 2024
Figure 1 for Robust Federated Finetuning of Foundation Models via Alternating Minimization of LoRA
Figure 2 for Robust Federated Finetuning of Foundation Models via Alternating Minimization of LoRA
Figure 3 for Robust Federated Finetuning of Foundation Models via Alternating Minimization of LoRA
Figure 4 for Robust Federated Finetuning of Foundation Models via Alternating Minimization of LoRA
Viaarxiv icon

Rate-Distortion-Perception Tradeoff Based on the Conditional-Distribution Perception Measure

Add code
Jan 22, 2024
Viaarxiv icon

On the Choice of Perception Loss Function for Learned Video Compression

Add code
May 30, 2023
Figure 1 for On the Choice of Perception Loss Function for Learned Video Compression
Figure 2 for On the Choice of Perception Loss Function for Learned Video Compression
Figure 3 for On the Choice of Perception Loss Function for Learned Video Compression
Figure 4 for On the Choice of Perception Loss Function for Learned Video Compression
Viaarxiv icon

Random Edge Coding: One-Shot Bits-Back Coding of Large Labeled Graphs

Add code
May 16, 2023
Viaarxiv icon

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning

Add code
May 15, 2023
Viaarxiv icon

Sequential Gradient Coding For Straggler Mitigation

Add code
Nov 24, 2022
Viaarxiv icon

Variational Model Inversion Attacks

Add code
Jan 26, 2022
Figure 1 for Variational Model Inversion Attacks
Figure 2 for Variational Model Inversion Attacks
Figure 3 for Variational Model Inversion Attacks
Figure 4 for Variational Model Inversion Attacks
Viaarxiv icon