Picture for Asaf Cidon

Asaf Cidon

Monitoring and Adapting ML Models on Mobile Devices

Add code
May 17, 2023
Figure 1 for Monitoring and Adapting ML Models on Mobile Devices
Figure 2 for Monitoring and Adapting ML Models on Mobile Devices
Figure 3 for Monitoring and Adapting ML Models on Mobile Devices
Figure 4 for Monitoring and Adapting ML Models on Mobile Devices
Viaarxiv icon

Packing Privacy Budget Efficiently

Add code
Dec 26, 2022
Figure 1 for Packing Privacy Budget Efficiently
Figure 2 for Packing Privacy Budget Efficiently
Figure 3 for Packing Privacy Budget Efficiently
Figure 4 for Packing Privacy Budget Efficiently
Viaarxiv icon

A Tale of Two Models: Constructing Evasive Attacks on Edge Models

Add code
Apr 22, 2022
Figure 1 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Figure 2 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Figure 3 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Figure 4 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Viaarxiv icon

Treehouse: A Case For Carbon-Aware Datacenter Software

Add code
Jan 06, 2022
Figure 1 for Treehouse: A Case For Carbon-Aware Datacenter Software
Figure 2 for Treehouse: A Case For Carbon-Aware Datacenter Software
Figure 3 for Treehouse: A Case For Carbon-Aware Datacenter Software
Figure 4 for Treehouse: A Case For Carbon-Aware Datacenter Software
Viaarxiv icon

Privacy Budget Scheduling

Add code
Jun 29, 2021
Figure 1 for Privacy Budget Scheduling
Figure 2 for Privacy Budget Scheduling
Figure 3 for Privacy Budget Scheduling
Figure 4 for Privacy Budget Scheduling
Viaarxiv icon

Characterizing and Taming Model Instability Across Edge Devices

Add code
Oct 18, 2020
Figure 1 for Characterizing and Taming Model Instability Across Edge Devices
Figure 2 for Characterizing and Taming Model Instability Across Edge Devices
Figure 3 for Characterizing and Taming Model Instability Across Edge Devices
Figure 4 for Characterizing and Taming Model Instability Across Edge Devices
Viaarxiv icon

Training Robust Tree Ensembles for Security

Add code
Dec 03, 2019
Figure 1 for Training Robust Tree Ensembles for Security
Figure 2 for Training Robust Tree Ensembles for Security
Figure 3 for Training Robust Tree Ensembles for Security
Figure 4 for Training Robust Tree Ensembles for Security
Viaarxiv icon

Bandana: Using Non-volatile Memory for Storing Deep Learning Models

Add code
Nov 15, 2018
Figure 1 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Figure 2 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Figure 3 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Figure 4 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Viaarxiv icon