Search Results for author: Yonghui Xiao

Found 7 papers, 4 papers with code

Federated Pruning: Improving Neural Network Efficiency with Federated Learning

no code implementations14 Sep 2022 Rongmei Lin, Yonghui Xiao, Tien-Ju Yang, Ding Zhao, Li Xiong, Giovanni Motta, Françoise Beaufays

Automatic Speech Recognition models require large amount of speech data for training, and the collection of such data often leads to privacy concerns.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +2

Online Model Compression for Federated Learning with Large Models

no code implementations6 May 2022 Tien-Ju Yang, Yonghui Xiao, Giovanni Motta, Françoise Beaufays, Rajiv Mathews, Mingqing Chen

This paper addresses the challenges of training large neural network models under federated learning settings: high on-device memory usage and communication cost.

Federated Learning Model Compression +3

PGLP: Customizable and Rigorous Location Privacy through Policy Graph

3 code implementations4 May 2020 Yang Cao, Yonghui Xiao, Shun Takagi, Li Xiong, Masatoshi Yoshikawa, Yilin Shen, Jinfei Liu, Hongxia Jin, Xiaofeng Xu

Third, we design a private location trace release framework that pipelines the detection of location exposure, policy graph repair, and private trajectory release with customizable and rigorous location privacy.

Cryptography and Security Computers and Society

PANDA: Policy-aware Location Privacy for Epidemic Surveillance

3 code implementations1 May 2020 Yang Cao, Shun Takagi, Yonghui Xiao, Li Xiong, Masatoshi Yoshikawa

Our system has three primary functions for epidemic surveillance: location monitoring, epidemic analysis, and contact tracing.

Databases Cryptography and Security

Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations

2 code implementations29 Nov 2017 Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, Li Xiong

Our analysis reveals that, the event-level privacy loss of a DP mechanism may \textit{increase over time}.

Databases

Quantifying Differential Privacy under Temporal Correlations

2 code implementations24 Oct 2016 Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, Li Xiong

Our analysis reveals that the privacy leakage of a DP mechanism may accumulate and increase over time.

Databases Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.