Picture for Ramy E. Ali

Ramy E. Ali

All Rivers Run to the Sea: Private Learning with Asymmetric Flows

Add code
Dec 05, 2023
Viaarxiv icon

Secure Aggregation for Buffered Asynchronous Federated Learning

Add code
Oct 05, 2021
Figure 1 for Secure Aggregation for Buffered Asynchronous Federated Learning
Figure 2 for Secure Aggregation for Buffered Asynchronous Federated Learning
Viaarxiv icon

ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems

Add code
Sep 20, 2021
Figure 1 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Figure 2 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Figure 3 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Figure 4 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Viaarxiv icon

Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

Add code
Jul 27, 2021
Figure 1 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 2 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 3 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 4 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Viaarxiv icon

Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning

Add code
Jun 07, 2021
Figure 1 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Figure 2 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Figure 3 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Figure 4 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Viaarxiv icon

List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier

Add code
Jan 27, 2021
Figure 1 for List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier
Figure 2 for List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier
Viaarxiv icon

On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks

Add code
Nov 11, 2020
Figure 1 for On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks
Viaarxiv icon

Hierarchical Deep Double Q-Routing

Add code
Nov 20, 2019
Figure 1 for Hierarchical Deep Double Q-Routing
Figure 2 for Hierarchical Deep Double Q-Routing
Figure 3 for Hierarchical Deep Double Q-Routing
Figure 4 for Hierarchical Deep Double Q-Routing
Viaarxiv icon