Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

About me

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

awards

portfolio

publications

talks

Random-Sampling Based Techniques for Approximated Matrix Multiplication

Published:

One of the most common, but at the same time expensive operations in linear algebra, is multiplying two matrices. With the rapid development of machine learning and increases in data volume, performing fast matrix intensive multiplications has become a major challenge. Two different approaches to overcome this issue are 1) to approximate the product and 2) to perform the multiplication distributively. In this talk, I focuse on the first approach and summarize some random-sampling based techniques for the approximation of the matrix-matrix multiplication, such as the work by Mahoney et al., in SIAM J. Comput’ 2006. [Link] [Slide]

Successive approximated coded matrix multiplication

Published:

In this talk I describe some of our work on coded matrix multiplication when an approximate result will suffice. We are motivated by potential application in optimization and learning where an exact matric product is not required and one would prefer to get a lower-fidelity result faster. We are also motivated by developing rate-distorion analogs for coded computing and particularly by a recent JSAIT paper by Jeong et al. epsilon-coded-computing wherein the authors show that they can recover an intermediate, approximate, result half-way to exact recovery. In this talk I build on that prior work to show how to realize schemes in which there are multiple stages of recovery (more than one) en-route to exact recovery. In analog to successive refinement in rate distortion we terms this successive approximation coding. [Slides]

Controlled Privacy Leakage Propagation Throughout Overlapping Grouped Learning

Published:

In this talk, I described our framework for learning with group identities, where individuals may share data selectively within specific groups, such as contributing business data in their company group or personal genomic data in their family group. We designed the modeling and control of privacy leakage propagation across the potentially overlapping group structures.

Differentially Private Federated Learning with Time-Adaptive Privacy Spending

Published:

In this talk, I presented my two Ph.D. projects that explore privacy-preserving machine learning mechanisms to promote more equitable and private collaborative learning. In the first project, we introduced a framework for learning with group identities, allowing individuals to share data within specific groups, such as business data within a company group or personal genomic data within their family group. We modeled and controlled privacy leakage propagation across potentially overlapping group structures. In the second project, we proposed a novel time-adaptive privacy spending mechanism, enabling participants to preserve more privacy during certain training rounds. Together, these works offer new perspectives on how trust and privacy can be formalized and quantified in federated learning systems.

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.