Skip to main content

Showing 1–15 of 15 results for author: Kiani, S

Searching in archive cs. Search in all archives.
.
  1. Controlled privacy leakage propagation throughout overlapping grouped learning

    Authors: Shahrzad Kiani, Franziska Boenisch, Stark C. Draper

    Abstract: Federated Learning (FL) is the standard protocol for collaborative learning. In FL, multiple workers jointly train a shared model. They exchange model updates calculated on their data, while keeping the raw data itself local. Since workers naturally form groups based on common interests and privacy policies, we are motivated to extend standard FL to reflect a setting with multiple, potentially ove… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

    Comments: This paper was presented in part at the 2024 IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 2024, pp. 386-391, doi: 10.1109/ISIT57864.2024.10619521. The paper was published in the IEEE Journal on Selected Areas in Information Theory (JSAIT)

    Journal ref: IEEE Journal on Selected Areas in Information Theory (JSAIT), vol. 5, pp. 442-463, 2024

  2. arXiv:2502.18706  [pdf, other

    cs.LG cs.CR cs.DC

    Differentially Private Federated Learning With Time-Adaptive Privacy Spending

    Authors: Shahrzad Kiani, Nupur Kulkarni, Adam Dziedzic, Stark Draper, Franziska Boenisch

    Abstract: Federated learning (FL) with differential privacy (DP) provides a framework for collaborative machine learning, enabling clients to train a shared model while adhering to strict privacy constraints. The framework allows each client to have an individual privacy guarantee, e.g., by adding different amounts of noise to each client's model updates. One underlying assumption is that all clients spend… ▽ More

    Submitted 25 February, 2025; originally announced February 2025.

    Comments: International Conference on Learning Representations (ICLR), April 2025, Singapore

  3. Counterfactual Prediction Under Selective Confounding

    Authors: Sohaib Kiani, Jared Barton, Jon Sushinsky, Lynda Heimbach, Bo Luo

    Abstract: This research addresses the challenge of conducting interpretable causal inference between a binary treatment and its resulting outcome when not all confounders are known. Confounders are factors that have an influence on both the treatment and the outcome. We relax the requirement of knowing all confounders under desired treatment, which we refer to as Selective Confounding, to enable causal infe… ▽ More

    Submitted 21 October, 2023; originally announced October 2023.

    Journal ref: IOS Press Ebooks pp 1256-1263. Volume 372: ECAI'23 (2023)

  4. Hierarchical coded elastic computing

    Authors: Shahrzad Kiani, Tharindu Adikari, Stark C. Draper

    Abstract: Elasticity is offered by cloud service providers to exploit under-utilized computing resources. The low-cost elastic nodes can leave and join any time during the computation cycle. The possibility of elastic events occurring together with the problem of slow nodes, referred to as stragglers, increases the uncertainty of the system, leading to computation delay. Recent results have shown that coded… ▽ More

    Submitted 23 June, 2022; v1 submitted 19 June, 2022; originally announced June 2022.

    Journal ref: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), June 2021

  5. arXiv:2201.03486  [pdf, ps, other

    cs.DC cs.IT

    Successive Approximation Coding for Distributed Matrix Multiplication

    Authors: Shahrzad Kiani, Stark C. Draper

    Abstract: Coded distributed computing was recently introduced to mitigate the effect of stragglers on distributed computing. This paper combines ideas of approximate computing with coded computing to further accelerate computation. We propose successive approximation coding (SAC) techniques that realize a tradeoff between accuracy and speed, allowing the distributed computing system to produce approximation… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

  6. Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency

    Authors: Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo

    Abstract: In the evasion attacks against deep neural networks (DNN), the attacker generates adversarial instances that are visually indistinguishable from benign samples and sends them to the target DNN to trigger misclassifications. In this paper, we propose a novel multi-view adversarial image detector, namely Argos, based on a novel observation. That is, there exist two "souls" in an adversarial instance… ▽ More

    Submitted 11 October, 2021; v1 submitted 25 September, 2021; originally announced September 2021.

    Journal ref: Annual Computer Security Applications Conference (ACSAC '21), December 6--10, 2021, Virtual Event, USA

  7. Hierarchical Coded Matrix Multiplication

    Authors: Shahrzad Kiani, Nuwan Ferdinand, Stark C. Draper

    Abstract: In distributed computing systems slow working nodes, known as stragglers, can greatly extend finishing times. Coded computing is a technique that enables straggler-resistant computation. Most coded computing techniques presented to date provide robustness by ensuring that the time to finish depends only on a set of the fastest nodes. However, while stragglers do compute less work than non-straggle… ▽ More

    Submitted 30 January, 2021; v1 submitted 14 December, 2019; originally announced December 2019.

    Journal ref: IEEE Transactions on Information Theory, vol. 67, no. 2, pp. 726-754, Feb. 2021

  8. arXiv:1907.08819  [pdf, ps, other

    cs.IT

    Cuboid Partitioning for Hierarchical Coded Matrix Multiplication

    Authors: Shahrzad Kiani, Nuwan Ferdinand, Stark C. Draper

    Abstract: Coded matrix multiplication is a technique to enable straggler-resistant multiplication of large matrices in distributed computing systems. In this paper, we first present a conceptual framework to represent the division of work amongst processors in coded matrix multiplication as a cuboid partitioning problem. This framework allows us to unify existing methods and motivates new techniques. Buildi… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

  9. arXiv:1907.08818  [pdf, ps, other

    cs.IT cs.DC

    Hierarchical Coded Matrix Multiplication

    Authors: Shahrzad Kiani, Nuwan Ferdinand, Stark C. Draper

    Abstract: Slow working nodes, known as stragglers, can greatly reduce the speed of distributed computation. Coded matrix multiplication is a recently introduced technique that enables straggler-resistant distributed multiplication of large matrices. A key property is that the finishing time depends only on the work completed by a set of the fastest workers, while the work done by the slowest workers is igno… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

  10. arXiv:1806.10253  [pdf, ps, other

    cs.IT

    Exploitation of Stragglers in Coded Computation

    Authors: Shahrzad Kiani, Nuwan Ferdinand, Stark C. Draper

    Abstract: In cloud computing systems slow processing nodes, often referred to as "stragglers", can significantly extend the computation time. Recent results have shown that error correction coding can be used to reduce the effect of stragglers. In this work we introduce a scheme that, in addition to using error correction to distribute mixed jobs across nodes, is also able to exploit the work completed by a… ▽ More

    Submitted 26 June, 2018; originally announced June 2018.

    Journal ref: IEEE Int. Symp. Inf. Theory (ISIT) 2018

  11. Iterative method for simultaneous sparse approximation

    Authors: Sahar Sadrizadeh, Shahrzad Kiani, Mahdi Boloursaz, Farokh Marvasti

    Abstract: This paper studies the problem of Simultaneous Sparse Approximation (SSA). This problem arises in many applications which work with multiple signals maintaining some degree of dependency such as radar and sensor networks. In this paper, we introduce a new method towards joint recovery of several independent sparse signals with the same support. We provide an analytical discussion on the convergenc… ▽ More

    Submitted 3 April, 2023; v1 submitted 26 July, 2017; originally announced July 2017.

  12. Heart Rate Tracking using Wrist-Type Photoplethysmographic (PPG) Signals during Physical Exercise with Simultaneous Accelerometry

    Authors: Mahdi Boloursaz Mashhadi, Ehsan Asadi, Mohsen Eskandari, Shahrzad Kiani, Farrokh Marvasti

    Abstract: This paper considers the problem of casual heart rate tracking during intensive physical exercise using simultaneous 2 channel photoplethysmographic (PPG) and 3 dimensional (3D) acceleration signals recorded from wrist. This is a challenging problem because the PPG signals recorded from wrist during exercise are contaminated by strong Motion Artifacts (MAs). In this work, a novel algorithm is prop… ▽ More

    Submitted 12 September, 2016; v1 submitted 18 April, 2015; originally announced April 2015.

    Comments: Accepted for publication in IEEE Signal Processing Letters

  13. An Integrated e-science Analysis Base for Computation Neuroscience Experiments and Analysis

    Authors: Kamran Munir, Saad Liaquat Kiani, Khawar Hasham, Richard McClatchey, Andrew Branson, Jetendr Shamdasani, the N4U Consortium

    Abstract: Recent developments in data management and imaging technologies have significantly affected diagnostic and extrapolative research in the understanding of neurodegenerative diseases. However, the impact of these new technologies is largely dependent on the speed and reliability with which the medical data can be visualised, analysed and interpreted. The EUs neuGRID for Users (N4U) is a follow-on pr… ▽ More

    Submitted 24 February, 2014; originally announced February 2014.

    Comments: 8 pages & 4 figures

    Journal ref: Procedia - Social and Behavioral Sciences. Vol 73 pp 85-92 (2013) Elsevier Publishers

  14. arXiv:1202.5519  [pdf

    cs.DC

    Context-Aware Service Utilisation in the Clouds and Energy Conservation

    Authors: Saad Liaquat Kiani, Ashiq Anjum, Nick Antonopoulos, Michael Knappmeyer, Nigel Baker, Richard McClatchey

    Abstract: Ubiquitous computing environments are characterised by smart, interconnected artefacts embedded in our physical world that are projected to provide useful services to human inhabitants unobtrusively. Mobile devices are becoming the primary tools of human interaction with these embedded artefacts and utilisation of services available in smart computing environments such as clouds. Advancements in c… ▽ More

    Submitted 24 February, 2012; originally announced February 2012.

    Comments: 27 pages; 17 figures; 2 tables. Under review at the Journal of Ambient Intelligence and Humanized Computing. 2011

  15. arXiv:cs/0305062  [pdf

    cs.DC

    DIAMOnDS - DIstributed Agents for MObile & Dynamic Services

    Authors: Aamir Shafi, Umer Farooq, Saad Kiani, Maria Riaz, Anjum Shehzad, Arshad Ali, Iosif Legrand, Harvey Newman

    Abstract: Distributed Services Architecture with support for mobile agents between services, offer significantly improved communication and computational flexibility. The uses of agents allow execution of complex operations that involve large amounts of data to be processed effectively using distributed resources. The prototype system Distributed Agents for Mobile and Dynamic Services (DIAMOnDS), allows a… ▽ More

    Submitted 13 June, 2003; v1 submitted 30 May, 2003; originally announced May 2003.

    Comments: 7 pages, 4 figures, CHEP03, La Jolla, California, March 24-28, 2003

    ACM Class: C.2.4

    Journal ref: ECONFC0303241:THAT003,2003