Skip to main content

Showing 1–25 of 25 results for author: Ezzeldin, Y H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.01289  [pdf, other

    cs.LG

    Federated Orthogonal Training: Mitigating Global Catastrophic Forgetting in Continual Federated Learning

    Authors: Yavuz Faruk Bakman, Duygu Nur Yaldiz, Yahya H. Ezzeldin, Salman Avestimehr

    Abstract: Federated Learning (FL) has gained significant attraction due to its ability to enable privacy-preserving training over decentralized data. Current literature in FL mostly focuses on single-task learning. However, over time, new tasks may appear in the clients and the global model should learn these tasks without forgetting previous tasks. This real-world scenario is known as Continual Federated L… ▽ More

    Submitted 16 October, 2023; v1 submitted 3 September, 2023; originally announced September 2023.

  2. arXiv:2308.06522  [pdf, other

    cs.LG cs.AI

    SLoRA: Federated Parameter Efficient Fine-Tuning of Language Models

    Authors: Sara Babakniya, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Qingfeng Liu, Kee-Bong Song, Mostafa El-Khamy, Salman Avestimehr

    Abstract: Transfer learning via fine-tuning pre-trained transformer models has gained significant success in delivering state-of-the-art results across various NLP tasks. In the absence of centralized data, Federated Learning (FL) can benefit from distributed and private data of the FL edge clients for fine-tuning. However, due to the limited communication, computation, and storage capabilities of edge devi… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

  3. arXiv:2303.14868  [pdf, other

    cs.LG cs.CR cs.CV

    The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning

    Authors: Joshua C. Zhao, Ahmed Roushdy Elkordy, Atul Sharma, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi

    Abstract: Secure aggregation promises a heightened level of privacy in federated learning, maintaining that a server only has access to a decrypted aggregate update. Within this setting, linear layer leakage methods are the only data reconstruction attacks able to scale and achieve a high leakage rate regardless of the number of clients or batch size. This is done through increasing the size of an injected… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

    Comments: Accepted to CVPR 2023

  4. arXiv:2303.12233  [pdf, other

    cs.LG cs.CR

    LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation

    Authors: Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi

    Abstract: Federated learning was introduced to enable machine learning over large decentralized datasets while promising privacy by eliminating the need for data sharing. Despite this, prior work has shown that shared gradients often contain private information and attackers can gain knowledge either through malicious modification of the architecture and parameters or by using optimization to approximate us… ▽ More

    Submitted 25 September, 2023; v1 submitted 21 March, 2023; originally announced March 2023.

    Comments: To appear in the IEEE Symposium on Security & Privacy (S&P) 2024

  5. arXiv:2302.01326  [pdf, other

    cs.LG cs.CR

    Federated Analytics: A survey

    Authors: Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Shanshan Han, Shantanu Sharma, Chaoyang He, Sharad Mehrotra, Salman Avestimehr

    Abstract: Federated analytics (FA) is a privacy-preserving framework for computing data analytics over multiple remote parties (e.g., mobile devices) or silo-ed institutional entities (e.g., hospitals, banks) without sharing the data among parties. Motivated by the practical use cases of federated analytics, we follow a systematic discussion on federated analytics in this article. In particular, we discuss… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

    Comments: To appear in APSIPA Transactions on Signal and Information Processing, Volume 12, Issue 1

    Journal ref: APSIPA Transactions on Signal and Information Processing, Volume 12, Issue 1, 2023

  6. arXiv:2208.02304  [pdf, other

    cs.LG cs.CR cs.IT

    How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?

    Authors: Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr

    Abstract: Federated learning (FL) has attracted growing interest for enabling privacy-preserving machine learning on data stored at multiple users while avoiding moving the data off-device. However, while data never leaves users' devices, privacy still cannot be guaranteed since significant computations on users' training data are shared in the form of trained local models. These local models have recently… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023

  7. arXiv:2110.00857  [pdf, other

    cs.LG cs.CY

    FairFed: Enabling Group Fairness in Federated Learning

    Authors: Yahya H. Ezzeldin, Shen Yan, Chaoyang He, Emilio Ferrara, Salman Avestimehr

    Abstract: Training ML models which are fair across different demographic groups is of critical importance due to the increased integration of ML in crucial decision-making scenarios such as healthcare and recruitment. Federated learning has been viewed as a promising solution for collaboratively training machine learning models among multiple parties while maintaining the privacy of their local data. Howeve… ▽ More

    Submitted 23 November, 2022; v1 submitted 2 October, 2021; originally announced October 2021.

    Comments: Accepted to appeat at AAAI 2023

  8. arXiv:2108.00548  [pdf, other

    cs.IT cs.LG

    A Reinforcement Learning Approach for Scheduling in mmWave Networks

    Authors: Mine Gokce Dogan, Yahya H. Ezzeldin, Christina Fragouli, Addison W. Bohannon

    Abstract: We consider a source that wishes to communicate with a destination at a desired rate, over a mmWave network where links are subject to blockage and nodes to failure (e.g., in a hostile military environment). To achieve resilience to link and node failures, we here explore a state-of-the-art Soft Actor-Critic (SAC) deep reinforcement learning algorithm, that adapts the information flow through the… ▽ More

    Submitted 1 August, 2021; originally announced August 2021.

  9. arXiv:2102.01174  [pdf, other

    cs.IT

    On optimal relay placement in directional networks

    Authors: Mine Gokce Dogan, Yahya H. Ezzeldin, Christina Fragouli

    Abstract: In this paper, we study the problem of optimal topology design in wireless networks equipped with highly-directional transmission antennas. We use the 1-2-1 network model to characterize the optimal placement of two relays that assist the communication between a source-destination pair. We analytically show that under some conditions on the distance between the source-destination pair, the optimal… ▽ More

    Submitted 6 February, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

  10. arXiv:2012.07913  [pdf, other

    cs.LG

    Quantizing data for distributed learning

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Christina Fragouli, Suhas Diggavi

    Abstract: We consider machine learning applications that train a model by leveraging data distributed over a trusted network, where communication constraints can create a performance bottleneck. A number of recent approaches propose to overcome this bottleneck through compression of gradient updates. However, as models become larger, so does the size of the gradient updates. In this paper, we propose an alt… ▽ More

    Submitted 8 September, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  11. arXiv:2005.06655  [pdf, ps, other

    cs.IT

    Gaussian 1-2-1 Networks with Imperfect Beamforming

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: In this work, we study bounds on the capacity of full-duplex Gaussian 1-2-1 networks with imperfect beamforming. In particular, different from the ideal 1-2-1 network model introduced in [1], in this model beamforming patterns result in side-lobe leakage that cannot be perfectly suppressed. The 1-2-1 network model captures the directivity of mmWave network communications, where nodes communicate b… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

  12. arXiv:1911.00216  [pdf, other

    cs.LG cs.IT stat.ML

    On Distributed Quantization for Classification

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Tara Sadjadpour, Christina Fragouli, Suhas Diggavi

    Abstract: We consider the problem of distributed feature quantization, where the goal is to enable a pretrained classifier at a central node to carry out its classification on features that are gathered from distributed nodes through communication constrained channels. We propose the design of distributed quantization schemes specifically tailored to the classification task: unlike quantization schemes that… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  13. arXiv:1901.02933  [pdf, other

    cs.IT

    Polynomial-time Capacity Calculation and Scheduling for Half-Duplex 1-2-1 Networks

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: This paper studies the 1-2-1 half-duplex network model, where two half-duplex nodes can communicate only if they point `beams' at each other; otherwise, no signal can be exchanged or interference can be generated. The main result of this paper is the design of two polynomial-time algorithms that: (i) compute the approximate capacity of the 1-2-1 half-duplex network and, (ii) find the network sched… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  14. Secure Communication over 1-2-1 Networks

    Authors: Gaurav Kumar Agarwal, Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli

    Abstract: This paper starts by assuming a 1-2-1 network, the abstracted noiseless model of mmWave networks that was shown to closely approximate the Gaussian capacity in [1], and studies secure communication. First, the secure capacity is derived for 1-2-1 networks where a source is connected to a destination through a network of unit capacity links. Then, lower and upper bounds on the secure capacity are d… ▽ More

    Submitted 12 January, 2018; v1 submitted 9 January, 2018; originally announced January 2018.

    Comments: Submitted for ISIT 2018

  15. Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: This paper proposes a new model for wireless relay networks referred to as "1-2-1 network", where two nodes can communicate only if they point "beams" at each other, while if they do not point beams at each other, no signal can be exchanged or interference can be generated. This model is motivated by millimeter wave communications where, due to the high path loss, a link between two nodes can exis… ▽ More

    Submitted 17 June, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

  16. arXiv:1711.01007  [pdf, other

    cs.IT

    Wireless Network Simplification: The Performance of Routing

    Authors: Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli

    Abstract: Consider a wireless Gaussian network where a source wishes to communicate with a destination with the help of N full-duplex relay nodes. Most practical systems today route information from the source to the destination using the best path that connects them. In this paper, we show that routing can in the worst case result in an unbounded gap from the network capacity - or reversely, physical layer… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

  17. Half-Duplex Routing is NP-hard

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti

    Abstract: Routing is a widespread approach to transfer information from a source node to a destination node in many deployed wireless ad-hoc networks. Today's implemented routing algorithms seek to efficiently find the path/route with the largest Full-Duplex (FD) capacity, which is given by the minimum among the point-to-point link capacities in the path. Such an approach may be suboptimal if then the nodes… ▽ More

    Submitted 10 August, 2017; originally announced August 2017.

  18. arXiv:1705.08966  [pdf, other

    cs.IT

    Communication vs Distributed Computation: an alternative trade-off curve

    Authors: Yahya H. Ezzeldin, Mohammed Karmoose, Christina Fragouli

    Abstract: In this paper, we revisit the communication vs. distributed computing trade-off, studied within the framework of MapReduce in [1]. An implicit assumption in the aforementioned work is that each server performs all possible computations on all the files stored in its memory. Our starting observation is that, if servers can compute only the intermediate values they need, then storage constraints do… ▽ More

    Submitted 24 May, 2017; originally announced May 2017.

  19. Efficiently Finding Simple Schedules in Gaussian Half-Duplex Relay Line Networks

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti

    Abstract: The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N +1 active states, that is sufficient for approximate (i.e., up to a con… ▽ More

    Submitted 21 June, 2017; v1 submitted 16 January, 2017; originally announced January 2017.

    Comments: A short version of this paper was submitted to ISIT 2017

  20. arXiv:1612.02062  [pdf, other

    cs.NI

    Consistency in the face of change: an adaptive approach to physical layer cooperation

    Authors: Ayan Sengupta, Yahya H. Ezzeldin, Siddhartha Brahma, Christina Fragouli, Suhas Diggavi

    Abstract: Most existing works on physical-layer (PHY) cooperation (beyond routing) focus on how to best use a given, static relay network--while wireless networks are anything but static. In this paper, we pose a different set of questions: given that we have multiple devices within range, which relay(s) do we use for PHY cooperation, to maintain a consistent target performance? How can we efficiently adapt… ▽ More

    Submitted 6 December, 2016; originally announced December 2016.

  21. arXiv:1607.01441  [pdf, ps, other

    cs.IT

    Network Simplification in Half-Duplex: Building on Submodularity

    Authors: Martina Cardone, Yahya H. Ezzeldin, Christina Fragouli, Daniela Tuninetti

    Abstract: This paper explores the {\it network simplification} problem in the context of Gaussian Half-Duplex (HD) diamond networks. Specifically, given an $N$-relay diamond network, this problem seeks to derive fundamental guarantees on the capacity of the best $k$-relay subnetwork, as a function of the full network capacity. The main focus of this work is on the case when $k=N-1$ relays are selected out o… ▽ More

    Submitted 7 July, 2017; v1 submitted 5 July, 2016; originally announced July 2016.

  22. arXiv:1601.05784  [pdf, ps, other

    cs.IT

    A Note on Antenna Selection in Gaussian MIMO Channels: Capacity Guarantees and Bounds

    Authors: Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli

    Abstract: We consider the problem of selecting $k_t \times k_r$ antennas from a Gaussian MIMO channel with $n_t \times n_r$ antennas, where $k_t \leq n_t$ and $k_r \leq n_r$. We prove the following two results that hold universally, in the sense that they do not depend on the channel coefficients: (i) The capacity of the best $k_t \times k_r$ subchannel is always lower bounded by a fraction… ▽ More

    Submitted 16 August, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

  23. Wireless Network Simplification : Beyond Diamond Networks

    Authors: Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli

    Abstract: We consider an arbitrary layered Gaussian relay network with $L$ layers of $N$ relays each, from which we select subnetworks with $K$ relays per layer. We prove that: (i) For arbitrary $L, N$ and $K = 1$, there always exists a subnetwork that approximately achieves $\frac{2}{(L-1)N + 4}$ $\left(\mbox{resp.}\frac{2}{LN+2}\right)$ of the network capacity for odd $L$ (resp. even $L$), (ii) For… ▽ More

    Submitted 26 January, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

  24. Pseudo-Lattice Treatment for Subspace Aligned Interference Signals

    Authors: Yahya H. Ezzeldin, Karim G. Seddik

    Abstract: For multi-input multi-output (MIMO) K-user interference networks, we propose the use of a channel transformation technique for joint detection of the useful and interference signals in an interference alignment scenario. We coin our detection technique as "pseudo-lattice treatment" and show that applying our technique, we can alleviate limitations facing Lattice Interference Alignment (L-IA). We s… ▽ More

    Submitted 23 July, 2013; originally announced July 2013.

  25. arXiv:1307.6033  [pdf, other

    cs.IT cs.NI math.OC

    Sparse Reconstruction-based Detection of Spatial Dimension Holes in Cognitive Radio Networks

    Authors: Yahya H. Ezzeldin, Radwa A. Sultan, Karim G. Seddik

    Abstract: In this paper, we investigate a spectrum sensing algorithm for detecting spatial dimension holes in Multiple Inputs Multiple Outputs (MIMO) transmissions for OFDM systems using Compressive Sensing (CS) tools. This extends the energy detector to allow for detecting transmission opportunities even if the band is already energy filled. We show that the task described above is not performed efficientl… ▽ More

    Submitted 23 July, 2013; originally announced July 2013.

    Comments: accepted for PIMRC 2013