no code implementations • 12 May 2023 • Wei Hao, Zixi Wang, Lauren Hong, Lingxiao Li, Nader Karayanni, Chengzhi Mao, Junfeng Yang, Asaf Cidon
ML models are increasingly being pushed to mobile devices, for low-latency inference and offline operation.
1 code implementation • 26 Dec 2022 • Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang
This DP budget can be regarded as a new type of compute resource in workloads of multiple ML models training on user data.
1 code implementation • 22 Apr 2022 • Wei Hao, Aahil Awatramani, Jiayang Hu, Chengzhi Mao, Pin-Chun Chen, Eyal Cidon, Asaf Cidon, Junfeng Yang
In this paper, we introduce a new evasive attack, DIVA, that exploits these differences in edge adaptation, by adding adversarial noise to input data that maximizes the output difference between the original and adapted model.
no code implementations • 6 Jan 2022 • Thomas Anderson, Adam Belay, Mosharaf Chowdhury, Asaf Cidon, Irene Zhang
The end of Dennard scaling and the slowing of Moore's Law has put the energy use of datacenters on an unsustainable path.
2 code implementations • 29 Jun 2021 • Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer
We describe PrivateKube, an extension to the popular Kubernetes datacenter orchestrator that adds privacy as a new type of resource to be managed alongside other traditional compute resources, such as CPU, GPU, and memory.
1 code implementation • 25 Feb 2021 • Yu Jian Wu, Hongyi Wang, Yuhong Zhong, Asaf Cidon, Ryan Stutsman, Amy Tai, Junfeng Yang
The overhead of the kernel storage path accounts for half of the access latency for new NVMe storage devices.
Operating Systems Databases
no code implementations • 18 Oct 2020 • Eyal Cidon, Evgenya Pergament, Zain Asgar, Asaf Cidon, Sachin Katti
We characterize different sources for instability, and show that differences in compression formats and image signal processing account for significant instability in object classification models.
2 code implementations • 3 Dec 2019 • Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana
There are various costs for attackers to manipulate the features of security classifiers.
no code implementations • 14 Nov 2018 • Assaf Eisenman, Maxim Naumov, Darryl Gardner, Misha Smelyanskiy, Sergey Pupyrev, Kim Hazelwood, Asaf Cidon, Sachin Katti
Typical large-scale recommender systems use deep learning models that are stored on a large amount of DRAM.