Alert button
Picture for G. Edward Suh

G. Edward Suh

Alert button

LazyDP: Co-Designing Algorithm-Software for Scalable Training of Differentially Private Recommendation Models

Add code
Bookmark button
Alert button
Apr 12, 2024
Juntaek Lim, Youngeun Kwon, Ranggi Hwang, Kiwan Maeng, G. Edward Suh, Minsoo Rhu

Viaarxiv icon

Approximating ReLU on a Reduced Ring for Efficient MPC-based Private Inference

Add code
Bookmark button
Alert button
Sep 09, 2023
Kiwan Maeng, G. Edward Suh

Figure 1 for Approximating ReLU on a Reduced Ring for Efficient MPC-based Private Inference
Figure 2 for Approximating ReLU on a Reduced Ring for Efficient MPC-based Private Inference
Figure 3 for Approximating ReLU on a Reduced Ring for Efficient MPC-based Private Inference
Figure 4 for Approximating ReLU on a Reduced Ring for Efficient MPC-based Private Inference
Viaarxiv icon

Information Flow Control in Machine Learning through Modular Model Architecture

Add code
Bookmark button
Alert button
Jun 05, 2023
Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh

Figure 1 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 2 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 3 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 4 for Information Flow Control in Machine Learning through Modular Model Architecture
Viaarxiv icon

Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information

Add code
Bookmark button
Alert button
May 06, 2023
Kiwan Maeng, Chuan Guo, Sanjay Kariyappa, G. Edward Suh

Figure 1 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Figure 2 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Figure 3 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Figure 4 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Viaarxiv icon

Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems

Add code
Bookmark button
Alert button
Dec 12, 2022
Hanieh Hashemi, Wenjie Xiong, Liu Ke, Kiwan Maeng, Murali Annavaram, G. Edward Suh, Hsien-Hsin S. Lee

Figure 1 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 2 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 3 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 4 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Viaarxiv icon

Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis

Add code
Bookmark button
Alert button
Sep 12, 2022
Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee

Figure 1 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 2 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 3 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 4 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Viaarxiv icon

Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization

Add code
Bookmark button
Alert button
May 05, 2022
Mulong Luo, G. Edward Suh

Figure 1 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Figure 2 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Figure 3 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Figure 4 for Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization
Viaarxiv icon

Structured Pruning is All You Need for Pruning CNNs at Initialization

Add code
Bookmark button
Alert button
Mar 04, 2022
Yaohui Cai, Weizhe Hua, Hongzheng Chen, G. Edward Suh, Christopher De Sa, Zhiru Zhang

Figure 1 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Figure 2 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Figure 3 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Figure 4 for Structured Pruning is All You Need for Pruning CNNs at Initialization
Viaarxiv icon

BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining

Add code
Bookmark button
Alert button
Sep 29, 2021
Weizhe Hua, Yichi Zhang, Chuan Guo, Zhiru Zhang, G. Edward Suh

Figure 1 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Figure 2 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Figure 3 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Figure 4 for BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining
Viaarxiv icon

GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning

Add code
Bookmark button
Alert button
Aug 26, 2020
Weizhe Hua, Muhammad Umar, Zhiru Zhang, G. Edward Suh

Figure 1 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Figure 2 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Figure 3 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Figure 4 for GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning
Viaarxiv icon