Picture for Niraj K. Jha

Niraj K. Jha

Princeton University, Princeton, USA

EdgeTran: Co-designing Transformers for Efficient Inference on Mobile Edge Platforms

Add code
Mar 24, 2023
Viaarxiv icon

AccelTran: A Sparsity-Aware Accelerator for Dynamic Inference with Transformers

Add code
Feb 28, 2023
Viaarxiv icon

CODEBench: A Neural Architecture and Hardware Accelerator Co-Design Framework

Add code
Dec 07, 2022
Viaarxiv icon

CTRL: Clustering Training Losses for Label Error Detection

Add code
Aug 17, 2022
Figure 1 for CTRL: Clustering Training Losses for Label Error Detection
Figure 2 for CTRL: Clustering Training Losses for Label Error Detection
Figure 3 for CTRL: Clustering Training Losses for Label Error Detection
Figure 4 for CTRL: Clustering Training Losses for Label Error Detection
Viaarxiv icon

SCouT: Synthetic Counterfactuals via Spatiotemporal Transformers for Actionable Healthcare

Add code
Jul 09, 2022
Figure 1 for SCouT: Synthetic Counterfactuals via Spatiotemporal Transformers for Actionable Healthcare
Figure 2 for SCouT: Synthetic Counterfactuals via Spatiotemporal Transformers for Actionable Healthcare
Figure 3 for SCouT: Synthetic Counterfactuals via Spatiotemporal Transformers for Actionable Healthcare
Figure 4 for SCouT: Synthetic Counterfactuals via Spatiotemporal Transformers for Actionable Healthcare
Viaarxiv icon

FlexiBERT: Are Current Transformer Architectures too Homogeneous and Rigid?

Add code
May 23, 2022
Figure 1 for FlexiBERT: Are Current Transformer Architectures too Homogeneous and Rigid?
Figure 2 for FlexiBERT: Are Current Transformer Architectures too Homogeneous and Rigid?
Figure 3 for FlexiBERT: Are Current Transformer Architectures too Homogeneous and Rigid?
Figure 4 for FlexiBERT: Are Current Transformer Architectures too Homogeneous and Rigid?
Viaarxiv icon

Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

Add code
Aug 07, 2021
Figure 1 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Figure 2 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Figure 3 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Figure 4 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Viaarxiv icon

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Add code
May 31, 2021
Figure 1 for GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security
Figure 2 for GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security
Figure 3 for GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security
Figure 4 for GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security
Viaarxiv icon

Fast Design Space Exploration of Nonlinear Systems: Part I

Add code
Apr 11, 2021
Figure 1 for Fast Design Space Exploration of Nonlinear Systems: Part I
Figure 2 for Fast Design Space Exploration of Nonlinear Systems: Part I
Figure 3 for Fast Design Space Exploration of Nonlinear Systems: Part I
Figure 4 for Fast Design Space Exploration of Nonlinear Systems: Part I
Viaarxiv icon

Fast Design Space Exploration of Nonlinear Systems: Part II

Add code
Apr 08, 2021
Figure 1 for Fast Design Space Exploration of Nonlinear Systems: Part II
Figure 2 for Fast Design Space Exploration of Nonlinear Systems: Part II
Figure 3 for Fast Design Space Exploration of Nonlinear Systems: Part II
Figure 4 for Fast Design Space Exploration of Nonlinear Systems: Part II
Viaarxiv icon