Alert button
Picture for Ramy E. Ali

Ramy E. Ali

Alert button

All Rivers Run to the Sea: Private Learning with Asymmetric Flows

Add code
Bookmark button
Alert button
Dec 05, 2023
Yue Niu, Ramy E. Ali, Saurav Prakash, Salman Avestimehr

Figure 1 for All Rivers Run to the Sea: Private Learning with Asymmetric Flows
Figure 2 for All Rivers Run to the Sea: Private Learning with Asymmetric Flows
Figure 3 for All Rivers Run to the Sea: Private Learning with Asymmetric Flows
Figure 4 for All Rivers Run to the Sea: Private Learning with Asymmetric Flows
Viaarxiv icon

Secure Aggregation for Buffered Asynchronous Federated Learning

Add code
Bookmark button
Alert button
Oct 05, 2021
Jinhyun So, Ramy E. Ali, Başak Güler, A. Salman Avestimehr

Figure 1 for Secure Aggregation for Buffered Asynchronous Federated Learning
Figure 2 for Secure Aggregation for Buffered Asynchronous Federated Learning
Viaarxiv icon

ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems

Add code
Bookmark button
Alert button
Sep 20, 2021
Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

Figure 1 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Figure 2 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Figure 3 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Figure 4 for ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems
Viaarxiv icon

Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

Add code
Bookmark button
Alert button
Jul 27, 2021
Tingting Tang, Ramy E. Ali, Hanieh Hashemi, Tynan Gangwani, Salman Avestimehr, Murali Annavaram

Figure 1 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 2 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 3 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Figure 4 for Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Viaarxiv icon

Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning

Add code
Bookmark button
Alert button
Jun 07, 2021
Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr

Figure 1 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Figure 2 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Figure 3 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Figure 4 for Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Viaarxiv icon

List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier

Add code
Bookmark button
Alert button
Jan 27, 2021
Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

Figure 1 for List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier
Figure 2 for List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier
Viaarxiv icon

On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks

Add code
Bookmark button
Alert button
Nov 11, 2020
Ramy E. Ali, Jinhyun So, A. Salman Avestimehr

Figure 1 for On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks
Viaarxiv icon

Hierarchical Deep Double Q-Routing

Add code
Bookmark button
Alert button
Nov 20, 2019
Ramy E. Ali, Bilgehan Erman, Ejder Baştuğ, Bruce Cilli

Figure 1 for Hierarchical Deep Double Q-Routing
Figure 2 for Hierarchical Deep Double Q-Routing
Figure 3 for Hierarchical Deep Double Q-Routing
Figure 4 for Hierarchical Deep Double Q-Routing
Viaarxiv icon