Picture for Anit Kumar Sahu

Anit Kumar Sahu

FedBC: Calibrating Global and Local Models via Federated Learning Beyond Consensus

Add code
Jun 26, 2022
Figure 1 for FedBC: Calibrating Global and Local Models via Federated Learning Beyond Consensus
Figure 2 for FedBC: Calibrating Global and Local Models via Federated Learning Beyond Consensus
Figure 3 for FedBC: Calibrating Global and Local Models via Federated Learning Beyond Consensus
Figure 4 for FedBC: Calibrating Global and Local Models via Federated Learning Beyond Consensus
Viaarxiv icon

Self-Aware Personalized Federated Learning

Add code
Apr 17, 2022
Figure 1 for Self-Aware Personalized Federated Learning
Figure 2 for Self-Aware Personalized Federated Learning
Figure 3 for Self-Aware Personalized Federated Learning
Figure 4 for Self-Aware Personalized Federated Learning
Viaarxiv icon

Nonlinear gradient mappings and stochastic optimization: A general framework with applications to heavy-tail noise

Add code
Apr 06, 2022
Figure 1 for Nonlinear gradient mappings and stochastic optimization: A general framework with applications to heavy-tail noise
Figure 2 for Nonlinear gradient mappings and stochastic optimization: A general framework with applications to heavy-tail noise
Figure 3 for Nonlinear gradient mappings and stochastic optimization: A general framework with applications to heavy-tail noise
Viaarxiv icon

Federated Learning Challenges and Opportunities: An Outlook

Add code
Feb 01, 2022
Figure 1 for Federated Learning Challenges and Opportunities: An Outlook
Viaarxiv icon

Partial Model Averaging in Federated Learning: Performance Guarantees and Benefits

Add code
Jan 11, 2022
Figure 1 for Partial Model Averaging in Federated Learning: Performance Guarantees and Benefits
Figure 2 for Partial Model Averaging in Federated Learning: Performance Guarantees and Benefits
Figure 3 for Partial Model Averaging in Federated Learning: Performance Guarantees and Benefits
Figure 4 for Partial Model Averaging in Federated Learning: Performance Guarantees and Benefits
Viaarxiv icon

You Only Query Once: Effective Black Box Adversarial Attacks with Minimal Repeated Queries

Add code
Jan 29, 2021
Figure 1 for You Only Query Once: Effective Black Box Adversarial Attacks with Minimal Repeated Queries
Figure 2 for You Only Query Once: Effective Black Box Adversarial Attacks with Minimal Repeated Queries
Figure 3 for You Only Query Once: Effective Black Box Adversarial Attacks with Minimal Repeated Queries
Figure 4 for You Only Query Once: Effective Black Box Adversarial Attacks with Minimal Repeated Queries
Viaarxiv icon

Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks

Add code
Oct 08, 2020
Figure 1 for Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks
Figure 2 for Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks
Figure 3 for Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks
Figure 4 for Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks
Viaarxiv icon

Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes

Add code
Jul 13, 2020
Figure 1 for Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes
Figure 2 for Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes
Figure 3 for Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes
Figure 4 for Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes
Viaarxiv icon

FedDANE: A Federated Newton-Type Method

Add code
Jan 07, 2020
Figure 1 for FedDANE: A Federated Newton-Type Method
Figure 2 for FedDANE: A Federated Newton-Type Method
Figure 3 for FedDANE: A Federated Newton-Type Method
Figure 4 for FedDANE: A Federated Newton-Type Method
Viaarxiv icon

Black-box Adversarial Attacks with Bayesian Optimization

Add code
Sep 30, 2019
Figure 1 for Black-box Adversarial Attacks with Bayesian Optimization
Figure 2 for Black-box Adversarial Attacks with Bayesian Optimization
Figure 3 for Black-box Adversarial Attacks with Bayesian Optimization
Figure 4 for Black-box Adversarial Attacks with Bayesian Optimization
Viaarxiv icon