Search Results for author: Guanhua Wang

Found 14 papers, 6 papers with code

Free Space Optical Communication for Inter-Satellite Link: Architecture, Potentials and Trends

no code implementations26 Oct 2023 Guanhua Wang, Fang Yang, Jian Song, Zhu Han

The sixth-generation (6G) network is expected to achieve global coverage based on the space-air-ground integrated network, and the latest satellite network will play an important role in it.

Scheduling

ZeRO++: Extremely Efficient Collective Communication for Giant Model Training

1 code implementation16 Jun 2023 Guanhua Wang, Heyang Qin, Sam Ade Jacobs, Connor Holmes, Samyam Rajbhandari, Olatunji Ruwase, Feng Yan, Lei Yang, Yuxiong He

Zero Redundancy Optimizer (ZeRO) has been used to train a wide range of large language models on massive GPUs clusters due to its ease of use, efficiency, and good scalability.

Quantization

Adaptive Sampling for Linear Sensing Systems via Langevin Dynamics

no code implementations27 Feb 2023 Guanhua Wang, Douglas C. Noll, Jeffrey A. Fessler

Adaptive or dynamic signal sampling in sensing systems can adapt subsequent sampling strategies based on acquired signals, thereby potentially improving image quality and speed.

Composing MPC with LQR and Neural Network for Amortized Efficiency and Stable Control

no code implementations14 Dec 2021 Fangyu Wu, Guanhua Wang, Siyuan Zhuang, Kehan Wang, Alexander Keimer, Ion Stoica, Alexandre Bayen

The proposed scheme does not require pre-computation and can improve the amortized running time of the composed MPC with a well-trained neural network.

Computational Efficiency Model Predictive Control

Efficient approximation of Jacobian matrices involving a non-uniform fast Fourier transform (NUFFT)

2 code implementations4 Nov 2021 Guanhua Wang, Jeffrey A. Fessler

In fact, we show that model-based image reconstruction (MBIR) methods with suitably optimized imaging parameters can perform nearly as well as CNN-based methods.

Image Reconstruction Stochastic Optimization

Blind Primed Supervised (BLIPS) Learning for MR Image Reconstruction

2 code implementations11 Apr 2021 Anish Lahiri, Guanhua Wang, Saiprasad Ravishankar, Jeffrey A. Fessler

We also compare the proposed method to alternative approaches for combining dictionary-based methods with supervised learning in MR image reconstruction.

Dictionary Learning Image Reconstruction

B-spline Parameterized Joint Optimization of Reconstruction and K-space Trajectories (BJORK) for Accelerated 2D MRI

2 code implementations27 Jan 2021 Guanhua Wang, Tianrui Luo, Jon-Fredrik Nielsen, Douglas C. Noll, Jeffrey A. Fessler

Though trained with neural network-based reconstruction, the proposed trajectory also leads to improved image quality with compressed sensing-based reconstruction.

Image Reconstruction

ResiliNet: Failure-Resilient Inference in Distributed Neural Networks

no code implementations18 Feb 2020 Ashkan Yousefpour, Brian Q. Nguyen, Siddartha Devic, Guanhua Wang, Aboudy Kreidieh, Hans Lobel, Alexandre M. Bayen, Jason P. Jue

Nevertheless, when a neural network is partitioned and distributed among physical nodes, failure of physical nodes causes the failure of the neural units that are placed on those nodes, which results in a significant performance drop.

Federated Learning

Blink: Fast and Generic Collectives for Distributed ML

no code implementations11 Oct 2019 Guanhua Wang, Shivaram Venkataraman, Amar Phanishayee, Jorgen Thelin, Nikhil Devanur, Ion Stoica

Model parameter synchronization across GPUs introduces high overheads for data-parallel training at scale.

Image Classification

KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution

1 code implementation2 Sep 2019 Guanhua Wang, Sudipta Chattopadhyay, Arnab Kumar Biswas, Tulika Mitra, Abhik Roychoudhury

Spectre attacks disclosed in early 2018 expose data leakage scenarios via cache side channels.

Cryptography and Security

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

no code implementations3 Jul 2019 Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar

Our analysis of the classification results suggests that Cyber threat relevant tweets on Twitter do not often include the CVE identifier of the related threats.

Binary Classification Classification +2

Task-GAN for Improved GAN based Image Restoration

no code implementations ICLR 2019 Jiahong Ouyang, Guanhua Wang, Enhao Gong, Kevin Chen, John Pauly and Greg Zaharchuk

Deep Learning (DL) algorithms based on Generative Adversarial Network (GAN) have demonstrated great potentials in computer vision tasks such as image restoration.

Generative Adversarial Network Hallucination +3

oo7: Low-overhead Defense against Spectre Attacks via Program Analysis

2 code implementations16 Jul 2018 Guanhua Wang, Sudipta Chattopadhyay, Ivan Gotovchits, Tulika Mitra, Abhik Roychoudhury

In this paper, we propose oo7, a static analysis approach that can mitigate Spectre attacks by detecting potentially vulnerable code snippets in program binaries and protecting them against the attack by patching them.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.