Alert button
Picture for Hanieh Hashemi

Hanieh Hashemi

Alert button

Differentially Private Heavy Hitter Detection using Federated Analytics

Add code
Bookmark button
Alert button
Jul 21, 2023
Karan Chadha, Junye Chen, John Duchi, Vitaly Feldman, Hanieh Hashemi, Omid Javidbakht, Audra McMillan, Kunal Talwar

Figure 1 for Differentially Private Heavy Hitter Detection using Federated Analytics
Figure 2 for Differentially Private Heavy Hitter Detection using Federated Analytics
Figure 3 for Differentially Private Heavy Hitter Detection using Federated Analytics
Figure 4 for Differentially Private Heavy Hitter Detection using Federated Analytics
Viaarxiv icon

Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems

Add code
Bookmark button
Alert button
Dec 12, 2022
Hanieh Hashemi, Wenjie Xiong, Liu Ke, Kiwan Maeng, Murali Annavaram, G. Edward Suh, Hsien-Hsin S. Lee

Figure 1 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 2 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 3 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 4 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Viaarxiv icon

DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware

Add code
Bookmark button
Alert button
Jun 30, 2022
Hanieh Hashemi, Yongqin Wang, Murali Annavaram

Figure 1 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Figure 2 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Figure 3 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Figure 4 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Viaarxiv icon

Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings

Add code
Bookmark button
Alert button
Dec 26, 2021
Tiantian Feng, Hanieh Hashemi, Rajat Hebbar, Murali Annavaram, Shrikanth S. Narayanan

Figure 1 for Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings
Figure 2 for Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings
Figure 3 for Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings
Figure 4 for Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings
Viaarxiv icon

Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

Add code
Bookmark button
Alert button
Jul 27, 2021
Tingting Tang, Ramy E. Ali, Hanieh Hashemi, Tynan Gangwani, Salman Avestimehr, Murali Annavaram

Figure 1 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 2 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 3 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 4 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Viaarxiv icon

Byzantine-Robust and Privacy-Preserving Framework for FedML

Add code
Bookmark button
Alert button
May 05, 2021
Hanieh Hashemi, Yongqin Wang, Chuan Guo, Murali Annavaram

Figure 1 for Byzantine-Robust and Privacy-Preserving Framework for FedML
Figure 2 for Byzantine-Robust and Privacy-Preserving Framework for FedML
Figure 3 for Byzantine-Robust and Privacy-Preserving Framework for FedML
Viaarxiv icon

Privacy and Integrity Preserving Training Using Trusted Hardware

Add code
Bookmark button
Alert button
May 01, 2021
Hanieh Hashemi, Yongqin Wang, Murali Annavaram

Figure 1 for Privacy and Integrity Preserving Training Using Trusted Hardware
Figure 2 for Privacy and Integrity Preserving Training Using Trusted Hardware
Figure 3 for Privacy and Integrity Preserving Training Using Trusted Hardware
Figure 4 for Privacy and Integrity Preserving Training Using Trusted Hardware
Viaarxiv icon