Search Results for author: Ramy E. Ali

Found 6 papers, 0 papers with code

Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

no code implementations27 Jul 2021 Tingting Tang, Ramy E. Ali, Hanieh Hashemi, Tynan Gangwani, Salman Avestimehr, Murali Annavaram

Much of the overhead in prior schemes comes from the fact that they tightly couple coding for all three problems into a single framework.

Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning

no code implementations7 Jun 2021 Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr

In fact, we empirically show that the conventional random user selection strategies for federated learning lead to leaking users' individual models within number of rounds linear in the number of users.

Fairness Federated Learning

List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier

no code implementations27 Jan 2021 Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

We further propose folded Lagrange coded computing, referred to as folded LCC or FLCC, to incorporate the developed techniques into a specific coded computing setting.

On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks

no code implementations11 Nov 2020 Ramy E. Ali, Jinhyun So, A. Salman Avestimehr

In this work, we empirically show that the square function is not the best degree-$2$ polynomial that can replace the ReLU function even when restricting the polynomials to have integer coefficients.

Consistency Analysis of Replication-Based Probabilistic Key-Value Stores

no code implementations14 Feb 2020 Ramy E. Ali

Partial quorum systems are widely used in distributed key-value stores due to their latency benefits at the expense of providing weaker consistency guarantees.

Hierarchical Deep Double Q-Routing

no code implementations9 Oct 2019 Ramy E. Ali, Bilgehan Erman, Ejder Baştuğ, Bruce Cilli

This paper explores a deep reinforcement learning approach applied to the packet routing problem with high-dimensional constraints instigated by dynamic and autonomous communication networks.

Cannot find the paper you are looking for? You can Submit a new open access paper.