Search Results for author: Ramy E. Ali

Found 10 papers, 0 papers with code

Hierarchical Deep Double Q-Routing

no code implementations9 Oct 2019 Ramy E. Ali, Bilgehan Erman, Ejder Baştuğ, Bruce Cilli

This paper explores a deep reinforcement learning approach applied to the packet routing problem with high-dimensional constraints instigated by dynamic and autonomous communication networks.

Consistency Analysis of Replication-Based Probabilistic Key-Value Stores

no code implementations14 Feb 2020 Ramy E. Ali

Partial quorum systems are widely used in distributed key-value stores due to their latency benefits at the expense of providing weaker consistency guarantees.

On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks

no code implementations11 Nov 2020 Ramy E. Ali, Jinhyun So, A. Salman Avestimehr

In this work, we empirically show that the square function is not the best degree-2 polynomial that can replace the ReLU function even when restricting the polynomials to have integer coefficients.

Privacy Preserving

List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier

no code implementations27 Jan 2021 Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

We further propose folded Lagrange coded computing (FLCC) to incorporate the developed techniques into a specific coded computing setting.

Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning

no code implementations7 Jun 2021 Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr

In fact, we show that the conventional random user selection strategies in FL lead to leaking users' individual models within number of rounds that is linear in the number of users.

Fairness Federated Learning

ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems

no code implementations20 Sep 2021 Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

While this learning-based approach is more resource-efficient than replication, it is tailored to the specific model hosted by the cloud and is particularly suitable for a small number of queries (typically less than four) and tolerating very few (mostly one) number of stragglers.

LightSecAgg: a Lightweight and Versatile Design for Secure Aggregation in Federated Learning

no code implementations29 Sep 2021 Jinhyun So, Chaoyang He, Chien-Sheng Yang, Songze Li, Qian Yu, Ramy E. Ali, Basak Guler, Salman Avestimehr

We also demonstrate that, unlike existing schemes, LightSecAgg can be applied to secure aggregation in the asynchronous FL setting.

Federated Learning

Secure Aggregation for Buffered Asynchronous Federated Learning

no code implementations5 Oct 2021 Jinhyun So, Ramy E. Ali, Başak Güler, A. Salman Avestimehr

A buffered asynchronous training protocol known as FedBuff has been proposed recently which bridges the gap between synchronous and asynchronous training to mitigate stragglers and to also ensure privacy simultaneously.

Federated Learning

All Rivers Run to the Sea: Private Learning with Asymmetric Flows

no code implementations5 Dec 2023 Yue Niu, Ramy E. Ali, Saurav Prakash, Salman Avestimehr

The main part flows into a small model while the residuals are offloaded to a large model.

Quantization

Cannot find the paper you are looking for? You can Submit a new open access paper.