Skip to main content

Showing 1–34 of 34 results for author: Ersoy, O

.
  1. arXiv:2506.10911  [pdf, ps, other

    cs.LG

    NoLoCo: No-all-reduce Low Communication Training Method for Large Models

    Authors: Jari Kolehmainen, Nikolay Blagoev, John Donaghy, Oğuzhan Ersoy, Christopher Nies

    Abstract: Training large language models is generally done via optimization methods on clusters containing tens of thousands of accelerators, communicating over a high-bandwidth interconnect. Scaling up these clusters is expensive and can become impractical, imposing limits on the size of models that can be trained. Several recent studies have proposed training methods that are less communication intensive,… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

  2. arXiv:2502.19913  [pdf, other

    cs.LG cs.DC

    SkipPipe: Partial and Reordered Pipelining Framework for Training LLMs in Heterogeneous Networks

    Authors: Nikolay Blagoev, Lydia Yiyu Chen, Oğuzhan Ersoy

    Abstract: Data and pipeline parallelism are ubiquitous for training of Large Language Models (LLM) on distributed nodes. Driven by the need for cost-effective training, recent work explores efficient communication arrangement for end to end training. Motivated by LLM's resistance to layer skipping and layer reordering, in this paper, we explore stage (several consecutive layers) skipping in pipeline trainin… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

  3. arXiv:2502.19405  [pdf, other

    cs.LG

    Verde: Verification via Refereed Delegation for Machine Learning Programs

    Authors: Arasu Arun, Adam St. Arnaud, Alexey Titov, Brian Wilcox, Viktor Kolobaric, Marc Brinkmann, Oguzhan Ersoy, Ben Fielding, Joseph Bonneau

    Abstract: Machine learning programs, such as those performing inference, fine-tuning, and training of LLMs, are commonly delegated to untrusted compute providers. To provide correctness guarantees for the client, we propose adapting the cryptographic notion of refereed delegation to the machine learning setting. This approach enables a computationally limited client to delegate a program to multiple untrust… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

  4. arXiv:2502.19385  [pdf, other

    cs.LG cs.DC

    HDEE: Heterogeneous Domain Expert Ensemble

    Authors: Oğuzhan Ersoy, Jari Kolehmainen, Gabriel Passamani Andrade

    Abstract: Training dense LLMs requires enormous amounts of data and centralized compute, which introduces fundamental bottlenecks and ever-growing costs for large models. Several studies aim to reduce this dependency on centralization by reducing the communication overhead of training dense models. Taking this idea of reducing communication overhead to a natural extreme, by training embarrassingly paralleli… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

  5. arXiv:2405.00407  [pdf, other

    eess.SP

    Compressive Sensing Imaging Using Caustic Lens Mask Generated by Periodic Perturbation in a Ripple Tank

    Authors: Doğan Tunca Arık, Asaf Behzat Şahin, Özgün Ersoy

    Abstract: Terahertz imaging shows significant potential across diverse fields, yet the cost-effectiveness of multi-pixel imaging equipment remains an obstacle for many researchers. To tackle this issue, the utilization of single-pixel imaging arises as a lower-cost option, however, the data collection process necessary for reconstructing images is time-consuming. Compressive Sensing offers a promising solut… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 6 Pages, 3 Figures, 1 Table

  6. arXiv:2404.17970  [pdf, other

    cs.CR cs.AI

    Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness

    Authors: Ali Reza Ghavamipour, Benjamin Zi Hao Zhao, Oguzhan Ersoy, Fatih Turkmen

    Abstract: Decentralized machine learning (DL) has been receiving an increasing interest recently due to the elimination of a single point of failure, present in Federated learning setting. Yet, it is threatened by the looming threat of Byzantine clients who intentionally disrupt the learning process by broadcasting arbitrary model updates to other clients, seeking to degrade the performance of the global mo… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  7. arXiv:2304.08650  [pdf, other

    cs.NI eess.SP

    UAV-based Maritime Communications: Relaying to Enhance the Link Quality

    Authors: Abdullah Taha Çağan, Görkem Berkay Koç, Handan Yakın, Berk Çiloğlu, Muhammad Zeeshan Ashgar, Özgün Ersoy, Jyri Hämäläinen, Metin Öztürk

    Abstract: Providing a stable connectivity in maritime communications is of utmost importance to unleash the full potential of smart ports. Nonetheless, due to the crowded nature of harbor environments, it is likely that some ships are shadowed by others, resulting in reduced received power that subsequently diminishes their data rates-even threatens basic connectivity requirements. Given that uncrewed aeria… ▽ More

    Submitted 6 June, 2024; v1 submitted 17 April, 2023; originally announced April 2023.

  8. arXiv:2302.09578  [pdf, other

    cs.CR cs.AI

    On Feasibility of Server-side Backdoor Attacks on Split Learning

    Authors: Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek

    Abstract: Split learning is a collaborative learning design that allows several participants (clients) to train a shared model while keeping their datasets private. Recent studies demonstrate that collaborative learning models, specifically federated learning, are vulnerable to security and privacy attacks such as model inference and backdoor attacks. Backdoor attacks are a group of poisoning attacks in whi… ▽ More

    Submitted 26 May, 2023; v1 submitted 19 February, 2023; originally announced February 2023.

  9. arXiv:2302.06279  [pdf, other

    cs.CR cs.CV cs.LG

    Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data

    Authors: Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta

    Abstract: Deep neural networks (DNNs) have demonstrated remarkable performance across various tasks, including image and speech recognition. However, maximizing the effectiveness of DNNs requires meticulous optimization of numerous hyperparameters and network parameters through training. Moreover, high-performance DNNs entail many parameters, which consume significant energy during training. In order to ove… ▽ More

    Submitted 5 February, 2024; v1 submitted 13 February, 2023; originally announced February 2023.

    Comments: To appear in Network and Distributed System Security (NDSS) Symposium 2024

    Journal ref: NDSS Symposium 2024

  10. arXiv:2302.00747  [pdf, other

    cs.LG

    Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks

    Authors: Xiaoyun Xu, Oguzhan Ersoy, Stjepan Picek

    Abstract: Deep learning models achieve excellent performance in numerous machine learning tasks. Yet, they suffer from security-related issues such as adversarial examples and poisoning (backdoor) attacks. A deep learning model may be poisoned by training with backdoored data or by modifying inner network parameters. Then, a backdoored model performs as expected when receiving a clean input, but it misclass… ▽ More

    Submitted 24 August, 2023; v1 submitted 1 February, 2023; originally announced February 2023.

  11. arXiv:2207.11615  [pdf, other

    cs.CR cs.DC

    SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony

    Authors: Oğuzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kimble, Stefanie Roos

    Abstract: Payment channel networks (PCNs) enhance the scalability of blockchains by allowing parties to conduct transactions off-chain, i.e, without broadcasting every transaction to all blockchain participants. To conduct transactions, a sender and a receiver can either establish a direct payment channel with a funding blockchain transaction or leverage existing channels in a multi-hop payment. The securit… ▽ More

    Submitted 4 August, 2022; v1 submitted 23 July, 2022; originally announced July 2022.

    Comments: Preprint of a paper accepted at the ACM conference on Advances in Financial Technologies (AFT 2022)

  12. arXiv:2203.08689  [pdf, other

    cs.CR

    Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning

    Authors: Gorka Abad, Servio Paguada, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta

    Abstract: Federated Learning (FL) enables collaborative training of Deep Learning (DL) models where the data is retained locally. Like DL, FL has severe security weaknesses that the attackers can exploit, e.g., model inversion and backdoor attacks. Model inversion attacks reconstruct the data from the training datasets, whereas backdoors misclassify only classes containing specific properties, e.g., a pixel… ▽ More

    Submitted 28 February, 2023; v1 submitted 16 March, 2022; originally announced March 2022.

  13. arXiv:2110.11024  [pdf, other

    cs.LG cs.CR

    Watermarking Graph Neural Networks based on Backdoor Attacks

    Authors: Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek

    Abstract: Graph Neural Networks (GNNs) have achieved promising performance in various real-world applications. Building a powerful GNN model is not a trivial task, as it requires a large amount of training data, powerful computing resources, and human expertise in fine-tuning the model. Moreover, with the development of adversarial attacks, e.g., model stealing attacks, GNNs raise challenges to model authen… ▽ More

    Submitted 13 November, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: 18 pages, 9 figures

    MSC Class: 68T07

  14. arXiv:2012.09861  [pdf

    cs.DC math.OC

    Parallel Implementation of Distributed Global Optimization (DGO)

    Authors: Homayoun Valafar, Okan K. Ersoy, Farmaraz Valafar

    Abstract: Parallel implementations of distributed global optimization (DGO) [13] on MP-1 and NCUBE parallel computers revealed an approximate O(n) increase in the performance of this algorithm. Therefore, the implementation of the DGO on parallel processors can remedy the only draw back of this algorithm which is the O(n2) of execution time as the number of the dimensions increase. The speed up factor of th… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 6 pages published in pdpa 98. arXiv admin note: text overlap with arXiv:2012.09252

    Journal ref: Parallel and Distributed Processing Techniques and Applications, July 13-16, 1998

  15. Distributed Global Optimization (DGO)

    Authors: Homayoun Valafar, Okan K. Ersoy, Faramarz Valafar

    Abstract: A new technique of global optimization and its applications in particular to neural networks are presented. The algorithm is also compared to other global optimization algorithms such as Gradient descent (GD), Monte Carlo (MC), Genetic Algorithm (GA) and other commercial packages. This new optimization technique proved itself worthy of further study after observing its accuracy of convergence, spe… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 7 pages

    Journal ref: Proceedings of International Conference on Neural Networks (ICNN'96) June 1996

  16. arXiv:2012.01241  [pdf, other

    eess.IV cs.CV

    Channel Attention Networks for Robust MR Fingerprinting Matching

    Authors: Refik Soyak, Ebru Navruz, Eda Ozgu Ersoy, Gastao Cruz, Claudia Prieto, Andrew P. King, Devrim Unay, Ilkay Oksuz

    Abstract: Magnetic Resonance Fingerprinting (MRF) enables simultaneous mapping of multiple tissue parameters such as T1 and T2 relaxation times. The working principle of MRF relies on varying acquisition parameters pseudo-randomly, so that each tissue generates its unique signal evolution during scanning. Even though MRF provides faster scanning, it has disadvantages such as erroneous and slow generation of… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

  17. arXiv:2008.02067  [pdf

    cs.NE cs.LG

    Parallel, Self Organizing, Consensus Neural Networks

    Authors: Homayoun Valafar, Faramarz Valafar, Okan Ersoy

    Abstract: A new neural network architecture (PSCNN) is developed to improve performance and speed of such networks. The architecture has all the advantages of the previous models such as self-organization and possesses some other superior characteristics such as input parallelism and decision making based on consensus. Due to the properties of this network, it was studied with respect to implementation on a… ▽ More

    Submitted 30 July, 2020; originally announced August 2020.

    Comments: 4 pages

    Journal ref: Published in IEEE-IJCNN 1999 1225-1228

  18. arXiv:2004.02988  [pdf, other

    cs.LG cs.AI stat.ML

    Probabilistic Diagnostic Tests for Degradation Problems in Supervised Learning

    Authors: Gustavo A. Valencia-Zapata, Carolina Gonzalez-Canas, Michael G. Zentner, Okan Ersoy, Gerhard Klimeck

    Abstract: Several studies point out different causes of performance degradation in supervised machine learning. Problems such as class imbalance, overlapping, small-disjuncts, noisy labels, and sparseness limit accuracy in classification algorithms. Even though a number of approaches either in the form of a methodology or an algorithm try to minimize performance degradation, they have been isolated efforts… ▽ More

    Submitted 15 April, 2020; v1 submitted 6 April, 2020; originally announced April 2020.

  19. arXiv:1911.08803  [pdf, other

    cs.DC cs.CR

    How to profit from payments channels

    Authors: Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin

    Abstract: Payment channel networks like Bitcoin's Lightning network are an auspicious approach for realizing high transaction throughput and almost-instant confirmations in blockchain networks. However, the ability to successfully make payments in such networks relies on the willingness of participants to lock collateral in the network. In Lightning, the key financial incentive is to lock collateral are sma… ▽ More

    Submitted 25 November, 2019; v1 submitted 20 November, 2019; originally announced November 2019.

    Comments: Financial Cryptography and Data Security (FC) 2020

    Report number: 02: A typo in one of the authors name is corrected

  20. arXiv:1812.01222  [pdf, other

    cs.CV cs.LG stat.ML

    Ladder Networks for Semi-Supervised Hyperspectral Image Classification

    Authors: Julian Büchel, Okan Ersoy

    Abstract: We used the Ladder Network [Rasmus et al. (2015)] to perform Hyperspectral Image Classification in a semi-supervised setting. The Ladder Network distinguishes itself from other semi-supervised methods by jointly optimizing a supervised and unsupervised cost. In many settings this has proven to be more successful than other semi-supervised techniques, such as pretraining using unlabeled data. We fu… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

    Comments: Technical Report, 5 pages, 8 figures

    MSC Class: 68T10

  21. arXiv:1712.07564  [pdf, other

    cs.CR

    Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms

    Authors: Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk

    Abstract: Existing permissionless blockchain solutions rely on peer-to-peer propagation mechanisms, where nodes in a network transfer transaction they received to their neighbors. Unfortunately, there is no explicit incentive for such transaction propagation. Therefore, existing propagation mechanisms will not be sustainable in a fully decentralized blockchain with rational nodes. In this work, we formally… ▽ More

    Submitted 14 June, 2018; v1 submitted 20 December, 2017; originally announced December 2017.

    Comments: 2018 Crypto Valley Conference on Blockchain Technology

  22. arXiv:1709.01439  [pdf

    cs.LG stat.ML

    A Statistical Approach to Increase Classification Accuracy in Supervised Learning Algorithms

    Authors: Gustavo A Valencia-Zapata, Daniel Mejia, Gerhard Klimeck, Michael Zentner, Okan Ersoy

    Abstract: Probabilistic mixture models have been widely used for different machine learning and pattern recognition tasks such as clustering, dimensionality reduction, and classification. In this paper, we focus on trying to solve the most common challenges related to supervised learning algorithms by using mixture probability distribution functions. With this modeling strategy, we identify sub-labels and g… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

    Comments: 7 pages, 9 figures, IPSI BgD Transactions

    Journal ref: PSI BGD TRANSACTIONS ON INTERNET RESEARCH 13.2 (2017)

  23. arXiv:1611.01411  [pdf, other

    math.GM

    A collocation method based on extended cubic B-splines for numerical solutions of the Klein-Gordon equation

    Authors: Alper Korkmaz, Ozlem Ersoy, Idiris Dag

    Abstract: A generalization of classical cubic B-spline functions with a parameter is used as basis in the collocation method. Some initial boundary value problems constructed on the nonlinear Klein-gordon equation are solved by the proposed method for extension various parameters. The coupled system derived as a result of the reduction of the time order of the equation is integrated in time by the Crank-Nic… ▽ More

    Submitted 15 October, 2016; originally announced November 2016.

    Comments: 17 pages, 5 figures

  24. arXiv:1607.00166  [pdf, ps, other

    math.NA

    Numerical investigation of the solutions of Schrodinger equation with exponential cubic B-spline finite element method

    Authors: Ozlem Ersoy, Idris Dag, Ali Sahin

    Abstract: In this paper, we investigate the numerical solutions of the cubic nonlinear Schrodinger equation via the exponential B-spline collocation method. Crank-Nicolson formulas are used for time discretization of the target equation. A linearization technique is also employed for the numerical purpose. Four numerical examples related to single soliton, collision of two solitons that move in opposite dir… ▽ More

    Submitted 1 July, 2016; originally announced July 2016.

    Comments: 16 pages, 18 Figures

    MSC Class: 41A15; 65M60; 65M70; 65N35

  25. arXiv:1605.09712  [pdf, other

    cond-mat.stat-mech math.NA nlin.PS

    Motion of Patterns Modeled by the Gray-Scott Autocatalysis System in One Dimension

    Authors: Alper Korkmaz, Ozlem Ersoy, Idiris Dag

    Abstract: Occupation of an interval by self-replicating initial pulses is studied numerically. Two different approximates in different categories are proposed for the numerical solutions of some initial-boundary value problems. The sinc differential quadrature combined with third-fourth order implicit Rosenbrock and exponential B-spline collocation methods are setup to obtain the numerical solutions of the… ▽ More

    Submitted 16 May, 2016; originally announced May 2016.

    Comments: 23 pages, 11 figures (including sub figures)

    Journal ref: MATCH Communications in Mathematical and in Computer Chemistry, 77(2), 507-526 (2017)

  26. arXiv:1605.07988  [pdf, ps, other

    cs.CR

    Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem

    Authors: Oguzhan Ersoy, Kamer Kaya, Kerem Kaskaloglu

    Abstract: A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain natural setting of the threshold values on compartments. We then propose a secure scheme that works for all threshold settings. In this scheme, we… ▽ More

    Submitted 25 May, 2016; originally announced May 2016.

  27. Solitary wave simulations of the Boussinesq Systems

    Authors: Ozlem Ersoy, Idiris Dag, Alper Korkmaz

    Abstract: In the study, the collocation method based on exponential cubic B-spline functions is proposed to solve one dimensional Boussinesq systems numerically. Two initial boundary value problems for Regularized and Classical Boussinesq systems modeling motion of traveling waves are considered. The accuracy of the method is validated by measuring the error between the numerical and analytical solutions. T… ▽ More

    Submitted 16 May, 2016; originally announced May 2016.

    Comments: 13 pages, 4 figures

  28. arXiv:1604.06864  [pdf, ps, other

    math.NA

    The Numerical Approach to the Fisher's Equation via Trigonometric Cubic B-spline Collocation Method

    Authors: Ozlem Ersoy, Idris Dag

    Abstract: In this study, we set up a numerical technique to get approximate solutions of Fisher's equation which is one of the most important model equation in population biology. We integrate the equation fully by using combination of the trigonometric cubic B-spline functions for space variable and Crank-Nicolson for the time integration. Numerical results have been presented to show the accuracy of the c… ▽ More

    Submitted 23 April, 2016; originally announced April 2016.

  29. arXiv:1604.04419  [pdf, ps, other

    math.NA

    A Trigonometric Cubic B-spline Finite Element Method for Solving the Nonlinear Coupled Burger Equation

    Authors: Ozlem Ersoy, Idris Dag

    Abstract: The coupled Burgers equation is solved by way of the trigonometric B-spline collocation method. The unknown of the coupled Burgers equation is integrated in time by aid of the Crank-Nicolson method. Resulting time-integrated coupled Burgers equation is discretized using the trigonometric cubic B-spline collocation method. Fully-integrated couupled Burgers equation which is a system of nonlinear al… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

    Comments: 18 pages. arXiv admin note: substantial text overlap with arXiv:1503.00456

  30. arXiv:1604.04418  [pdf, ps, other

    math.NA

    The Exponential Cubic B-spline Algorithm for Burgers's Equation

    Authors: Ozlem Ersoy, Idris Dag, Nihat Adar

    Abstract: The exponential cubic B-spline functions are used to set up the collocation method for finding solutions of the Burgers's equation. The effect of the exponential cubic B-splines in the collocation method is sought by studying four text problems.

    Submitted 15 April, 2016; originally announced April 2016.

    Comments: 22 pages, 19 Figures and 8 Tables

  31. arXiv:1503.09151   

    physics.optics

    Spectroscopic super-resolution fluorescence cell imaging using ultra-small Ge quantum dots

    Authors: Mingying Song, Ali Karatutlu, Osman Ersoy, Yun Zhou, Yongxin Yang, Yuanpeng Zhang, William R. Little, Ann P. Wheeler, Andrei V. Sapelkin

    Abstract: In single molecule localisation super-resolution microscopy the need for repeated image capture limits the imaging speed, while the size of fluorescence probes limits the possible theoretical localisation resolution. Here, we demonstrated a spectral imaging based super-resolution approach by separating the overlapping diffraction spots into several detectors during a single scanning period and tak… ▽ More

    Submitted 9 April, 2015; v1 submitted 31 March, 2015; originally announced March 2015.

    Comments: This paper has been withdrawn by the authors due to an author dispute. This paper will not be replaced or revised

  32. arXiv:1503.00456  [pdf, ps, other

    math.NA

    An Exponential Cubic B-spline Finite Element Method for Solving the Nonlinear Coupled Burger Equation

    Authors: Ozlem Ersoy, Idiris Dag

    Abstract: The exponential cubic B-spline functions together with Crank Nicolson are used to solve numerically the nonlinear coupled Burgers' equation using collocation method. This method has been tested by three different problems. The proposed scheme is compared with some existing methods. We have noticed that proposed scheme produced a highly accurate results.

    Submitted 2 March, 2015; originally announced March 2015.

    Comments: 16 pages 19 figures

  33. arXiv:1407.5434  [pdf, ps, other

    math.NA

    The Trigonometric Cubic B-spline Algorithm for Burgers' Equation

    Authors: I. Dag, O. Ersoy, O. Kacmaz

    Abstract: The cubic Trigonometric B-spline(CTB) functions are used to set up the collocation method for finding solutions of the Burgers' equation. The effect of the CTB in the collocation method is sought by studying two text problems. The Burgers' equation is fully-discretized using the Crank-Nicholson method for the time discretizion and CTB function for discretizion of spatial variable. Numerical exampl… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: 13 pages, 8 figures

    MSC Class: 65M60; 65M70

  34. arXiv:1211.6675  [pdf, other

    cs.CV cs.CE stat.ML

    Nonlinear Dynamic Field Embedding: On Hyperspectral Scene Visualization

    Authors: Dalton Lunga 'and' Okan Ersoy

    Abstract: Graph embedding techniques are useful to characterize spectral signature relations for hyperspectral images. However, such images consists of disjoint classes due to spatial details that are often ignored by existing graph computing tools. Robust parameter estimation is a challenge for kernel functions that compute such graphs. Finding a corresponding high quality coordinate system to map signatur… ▽ More

    Submitted 28 November, 2012; originally announced November 2012.

    Comments: 49 pages, 18 figures

    Report number: TR-ECE-12-14