Alert button
Picture for Fan Mo

Fan Mo

Alert button

Centaur: Federated Learning for Constrained Edge Devices

Add code
Bookmark button
Alert button
Nov 12, 2022
Fan Mo, Mohammad Malekzadeh, Soumyajit Chatterjee, Fahim Kawsar, Akhil Mathur

Figure 1 for Centaur: Federated Learning for Constrained Edge Devices
Figure 2 for Centaur: Federated Learning for Constrained Edge Devices
Figure 3 for Centaur: Federated Learning for Constrained Edge Devices
Figure 4 for Centaur: Federated Learning for Constrained Edge Devices
Viaarxiv icon

SoK: Machine Learning with Confidential Computing

Add code
Bookmark button
Alert button
Aug 22, 2022
Fan Mo, Zahra Tarkhani, Hamed Haddadi

Figure 1 for SoK: Machine Learning with Confidential Computing
Figure 2 for SoK: Machine Learning with Confidential Computing
Figure 3 for SoK: Machine Learning with Confidential Computing
Figure 4 for SoK: Machine Learning with Confidential Computing
Viaarxiv icon

Towards Battery-Free Machine Learning and Inference in Underwater Environments

Add code
Bookmark button
Alert button
Feb 16, 2022
Yuchen Zhao, Sayed Saad Afzal, Waleed Akbar, Osvy Rodriguez, Fan Mo, David Boyle, Fadel Adib, Hamed Haddadi

Figure 1 for Towards Battery-Free Machine Learning and Inference in Underwater Environments
Figure 2 for Towards Battery-Free Machine Learning and Inference in Underwater Environments
Figure 3 for Towards Battery-Free Machine Learning and Inference in Underwater Environments
Figure 4 for Towards Battery-Free Machine Learning and Inference in Underwater Environments
Viaarxiv icon

Quantifying Information Leakage from Gradients

Add code
Bookmark button
Alert button
May 28, 2021
Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou

Figure 1 for Quantifying Information Leakage from Gradients
Figure 2 for Quantifying Information Leakage from Gradients
Figure 3 for Quantifying Information Leakage from Gradients
Figure 4 for Quantifying Information Leakage from Gradients
Viaarxiv icon

PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments

Add code
Bookmark button
Alert button
Apr 29, 2021
Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis

Figure 1 for PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments
Figure 2 for PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments
Figure 3 for PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments
Figure 4 for PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments
Viaarxiv icon

Layer-wise Characterization of Latent Information Leakage in Federated Learning

Add code
Bookmark button
Alert button
Oct 17, 2020
Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou

Figure 1 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 2 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 3 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 4 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Viaarxiv icon

DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

Add code
Bookmark button
Alert button
Apr 12, 2020
Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi

Figure 1 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 2 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 3 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 4 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Viaarxiv icon

Towards Characterizing and Limiting Information Exposure in DNN Layers

Add code
Bookmark button
Alert button
Jul 13, 2019
Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi

Figure 1 for Towards Characterizing and Limiting Information Exposure in DNN Layers
Figure 2 for Towards Characterizing and Limiting Information Exposure in DNN Layers
Figure 3 for Towards Characterizing and Limiting Information Exposure in DNN Layers
Figure 4 for Towards Characterizing and Limiting Information Exposure in DNN Layers
Viaarxiv icon

Weight-importance sparse training in keyword spotting

Add code
Bookmark button
Alert button
Jul 09, 2018
Sihao Xue, Zhenyi Ying, Fan Mo, Min Wang, Jue Sun

Figure 1 for Weight-importance sparse training in keyword spotting
Figure 2 for Weight-importance sparse training in keyword spotting
Figure 3 for Weight-importance sparse training in keyword spotting
Figure 4 for Weight-importance sparse training in keyword spotting
Viaarxiv icon