Skip to main content

Showing 1–6 of 6 results for author: Wagh, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.11925  [pdf, other

    cs.RO

    Haptic-ACT: Bridging Human Intuition with Compliant Robotic Manipulation via Immersive VR

    Authors: Kelin Li, Shubham M Wagh, Nitish Sharma, Saksham Bhadani, Wei Chen, Chang Liu, Petar Kormushev

    Abstract: Robotic manipulation is essential for the widespread adoption of robots in industrial and home settings and has long been a focus within the robotics community. Advances in artificial intelligence have introduced promising learning-based methods to address this challenge, with imitation learning emerging as particularly effective. However, efficiently acquiring high-quality demonstrations remains… ▽ More

    Submitted 1 March, 2025; v1 submitted 18 September, 2024; originally announced September 2024.

    Comments: This work has been submitted to the IEEE for possible publication

  2. arXiv:2004.08887  [pdf, other

    cs.CR

    DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications

    Authors: Sameer Wagh, Xi He, Ashwin Machanavajjhala, Prateek Mittal

    Abstract: Differential privacy (DP) has arisen as the state-of-the-art metric for quantifying individual privacy when sensitive data are analyzed, and it is starting to see practical deployment in organizations such as the US Census Bureau, Apple, Google, etc. There are two popular models for deploying differential privacy - standard differential privacy (SDP), where a trusted server aggregates all the data… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  3. arXiv:2004.02229  [pdf, other

    cs.CR cs.LG

    FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning

    Authors: Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin

    Abstract: We propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models. Falcon presents four main advantages - (i) It is highly expressive with support for high capacity networks such as VGG16 (ii) it supports batch normalization which is important for training complex networks such as AlexNet (iii) Falcon guarantees security with abort agai… ▽ More

    Submitted 7 September, 2020; v1 submitted 5 April, 2020; originally announced April 2020.

    Comments: Revised version, contains some more experiments and fixes minor typos in the paper

  4. arXiv:2003.04247  [pdf, other

    cs.CR cs.LG stat.ML

    Towards Probabilistic Verification of Machine Unlearning

    Authors: David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal

    Abstract: The right to be forgotten, also known as the right to erasure, is the right of individuals to have their data erased from an entity storing it. The status of this long held notion was legally solidified recently by the General Data Protection Regulation (GDPR) in the European Union. Consequently, there is a need for mechanisms whereby users can verify if service providers comply with their deletio… ▽ More

    Submitted 1 December, 2020; v1 submitted 9 March, 2020; originally announced March 2020.

    Comments: code is available at https://github.com/inspire-group/unlearning-verification

  5. arXiv:1712.07882  [pdf, other

    cs.CR

    The Pyramid Scheme: Oblivious RAM for Trusted Processors

    Authors: Manuel Costa, Lawrence Esswood, Olga Ohrimenko, Felix Schuster, Sameer Wagh

    Abstract: Modern processors, e.g., Intel SGX, allow applications to isolate secret code and data in encrypted memory regions called enclaves. While encryption effectively hides the contents of memory, the sequence of address references issued by the secret code leaks information. This is a serious problem because these leaks can easily break the confidentiality guarantees of enclaves. In this paper, we ex… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

  6. arXiv:1601.03378  [pdf, other

    cs.CR

    Differentially Private Oblivious RAM

    Authors: Sameer Wagh, Paul Cuff, Prateek Mittal

    Abstract: In this work, we investigate if statistical privacy can enhance the performance of ORAM mechanisms while providing rigorous privacy guarantees. We propose a formal and rigorous framework for developing ORAM protocols with statistical security viz., a differentially private ORAM (DP-ORAM). We present Root ORAM, a family of DP-ORAMs that provide a tunable, multi-dimensional trade-off between the des… ▽ More

    Submitted 15 July, 2018; v1 submitted 13 January, 2016; originally announced January 2016.