Picture for G. Edward Suh

G. Edward Suh

LazyDP: Co-Designing Algorithm-Software for Scalable Training of Differentially Private Recommendation Models

Add code
Apr 12, 2024
Viaarxiv icon

Approximating ReLU on a Reduced Ring for Efficient MPC-based Private Inference

Add code
Sep 09, 2023
Viaarxiv icon

Information Flow Control in Machine Learning through Modular Model Architecture

Add code
Jun 05, 2023
Viaarxiv icon

Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information

Add code
May 06, 2023
Viaarxiv icon

Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems

Add code
Dec 12, 2022
Viaarxiv icon

Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis

Add code
Sep 12, 2022
Figure 1 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 2 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 3 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 4 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Viaarxiv icon

Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization

Add code
May 05, 2022
Figure 1 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Figure 2 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Figure 3 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Figure 4 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Viaarxiv icon

Structured Pruning is All You Need for Pruning CNNs at Initialization

Add code
Mar 04, 2022
Figure 1 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Figure 2 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Figure 3 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Figure 4 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Viaarxiv icon

BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining

Add code
Sep 29, 2021
Figure 1 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Figure 2 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Figure 3 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Figure 4 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Viaarxiv icon

GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning

Add code
Aug 26, 2020
Figure 1 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Figure 2 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Figure 3 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Figure 4 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Viaarxiv icon