Picture for Miryung Kim

Miryung Kim

ConServe: Harvesting GPUs for Low-Latency and High-Throughput Large Language Model Serving

Add code
Oct 02, 2024
Viaarxiv icon

Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking

Add code
Apr 29, 2024
Figure 1 for Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking
Figure 2 for Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking
Figure 3 for Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking
Figure 4 for Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking
Viaarxiv icon

Sibylvariant Transformations for Robust Text Classification

Add code
May 10, 2022
Figure 1 for Sibylvariant Transformations for Robust Text Classification
Figure 2 for Sibylvariant Transformations for Robust Text Classification
Figure 3 for Sibylvariant Transformations for Robust Text Classification
Figure 4 for Sibylvariant Transformations for Robust Text Classification
Viaarxiv icon

Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads

Add code
May 25, 2021
Figure 1 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Figure 2 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Figure 3 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Figure 4 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Viaarxiv icon

An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models

Add code
Feb 06, 2020
Figure 1 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Figure 2 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Figure 3 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Figure 4 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Viaarxiv icon