Alert button
Picture for Asaf Cidon

Asaf Cidon

Alert button

Monitoring and Adapting ML Models on Mobile Devices

May 17, 2023
Wei Hao, Zixi Wang, Lauren Hong, Lingxiao Li, Nader Karayanni, Chengzhi Mao, Junfeng Yang, Asaf Cidon

Figure 1 for Monitoring and Adapting ML Models on Mobile Devices
Figure 2 for Monitoring and Adapting ML Models on Mobile Devices
Figure 3 for Monitoring and Adapting ML Models on Mobile Devices
Figure 4 for Monitoring and Adapting ML Models on Mobile Devices
Viaarxiv icon

Packing Privacy Budget Efficiently

Dec 26, 2022
Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang

Figure 1 for Packing Privacy Budget Efficiently
Figure 2 for Packing Privacy Budget Efficiently
Figure 3 for Packing Privacy Budget Efficiently
Figure 4 for Packing Privacy Budget Efficiently
Viaarxiv icon

A Tale of Two Models: Constructing Evasive Attacks on Edge Models

Apr 22, 2022
Wei Hao, Aahil Awatramani, Jiayang Hu, Chengzhi Mao, Pin-Chun Chen, Eyal Cidon, Asaf Cidon, Junfeng Yang

Figure 1 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Figure 2 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Figure 3 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Figure 4 for A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Viaarxiv icon

Treehouse: A Case For Carbon-Aware Datacenter Software

Jan 06, 2022
Thomas Anderson, Adam Belay, Mosharaf Chowdhury, Asaf Cidon, Irene Zhang

Figure 1 for Treehouse: A Case For Carbon-Aware Datacenter Software
Figure 2 for Treehouse: A Case For Carbon-Aware Datacenter Software
Figure 3 for Treehouse: A Case For Carbon-Aware Datacenter Software
Figure 4 for Treehouse: A Case For Carbon-Aware Datacenter Software
Viaarxiv icon

Privacy Budget Scheduling

Jun 29, 2021
Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

Figure 1 for Privacy Budget Scheduling
Figure 2 for Privacy Budget Scheduling
Figure 3 for Privacy Budget Scheduling
Figure 4 for Privacy Budget Scheduling
Viaarxiv icon

Characterizing and Taming Model Instability Across Edge Devices

Oct 18, 2020
Eyal Cidon, Evgenya Pergament, Zain Asgar, Asaf Cidon, Sachin Katti

Figure 1 for Characterizing and Taming Model Instability Across Edge Devices
Figure 2 for Characterizing and Taming Model Instability Across Edge Devices
Figure 3 for Characterizing and Taming Model Instability Across Edge Devices
Figure 4 for Characterizing and Taming Model Instability Across Edge Devices
Viaarxiv icon

Training Robust Tree Ensembles for Security

Dec 03, 2019
Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana

Figure 1 for Training Robust Tree Ensembles for Security
Figure 2 for Training Robust Tree Ensembles for Security
Figure 3 for Training Robust Tree Ensembles for Security
Figure 4 for Training Robust Tree Ensembles for Security
Viaarxiv icon

Bandana: Using Non-volatile Memory for Storing Deep Learning Models

Nov 15, 2018
Assaf Eisenman, Maxim Naumov, Darryl Gardner, Misha Smelyanskiy, Sergey Pupyrev, Kim Hazelwood, Asaf Cidon, Sachin Katti

Figure 1 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Figure 2 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Figure 3 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Figure 4 for Bandana: Using Non-volatile Memory for Storing Deep Learning Models
Viaarxiv icon