Search Results - Computing methodologies Machine learning

Refine Results
  1. 1

    Muffin: A Framework Toward Multi-Dimension AI Fairness by Uniting Off-the-Shelf Models by Sheng, Yi, Yang, Junhuan, Yang, Lei, Shi, Yiyu, Hu, Jingtong, Jiang, Weiwen

    Published: United States IEEE 01.07.2023
    “…Model fairness (a.k.a., bias) has become one of the most critical problems in a wide range of AI applications. An unfair model in autonomous driving may cause…”
    Get full text
    Conference Proceeding Journal Article
  2. 2

    PrefixRL: Optimization of Parallel Prefix Circuits using Deep Reinforcement Learning by Roy, Rajarshi, Raiman, Jonathan, Kant, Neel, Elkin, Ilyas, Kirby, Robert, Siu, Michael, Oberman, Stuart, Godil, Saad, Catanzaro, Bryan

    Published: IEEE 05.12.2021
    “…In this work, we present a reinforcement learning (RL) based approach to designing parallel prefix circuits such as adders or priority encoders that are fundamental to high-performance digital design…”
    Get full text
    Conference Proceeding
  3. 3

    Code Difference Guided Adversarial Example Generation for Deep Code Models by Tian, Zhao, Chen, Junjie, Jin, Zhi

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Adversarial examples are important to test and enhance the robustness of deep code models. As source code is discrete and has to strictly stick to complex…”
    Get full text
    Conference Proceeding
  4. 4

    Softermax: Hardware/Software Co-Design of an Efficient Softmax for Transformers by Stevens, Jacob R., Venkatesan, Rangharajan, Dai, Steve, Khailany, Brucek, Raghunathan, Anand

    Published: IEEE 05.12.2021
    “…Transformers have transformed the field of natural language processing. Their superior performance is largely attributed to the use of stacked "self-attention"…”
    Get full text
    Conference Proceeding
  5. 5

    Enabling On-Device Self-Supervised Contrastive Learning with Selective Data Contrast by Wu, Yawen, Wang, Zhepeng, Zeng, Dewen, Shi, Yiyu, Hu, Jingtong

    Published: IEEE 05.12.2021
    “… Contrastive learning has demonstrated its great potential in learning from unlabeled data. However, the online input data are usually none independent and identically distributed (non-iid…”
    Get full text
    Conference Proceeding
  6. 6

    Toward Individual Fairness Testing with Data Validity by Kitamura, Takashi, Amasaki, Sousuke, Inoue, Jun, Isobe, Yoshinao, Toda, Takahisa

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…Individual fairness testing (Ift) is a framework to find discriminatory instances within a given classifier. In this paper, we show our idea of a Ift…”
    Get full text
    Conference Proceeding
  7. 7

    DistHD: A Learner-Aware Dynamic Encoding Method for Hyperdimensional Classification by Wang, Junyao, Huang, Sitao, Imani, Mohsen

    Published: IEEE 09.07.2023
    “… Many applications exploit machine learning methodology to dissect collected data, and edge computing was introduced to enhance the efficiency and scalability in resource-constrained computing environments…”
    Get full text
    Conference Proceeding
  8. 8

    PreSto: An In-Storage Data Preprocessing System for Training Recommendation Models by Lee, Yunjae, Kim, Hyeseong, Rhu, Minsoo

    Published: IEEE 29.06.2024
    “…Training recommendation systems (RecSys) faces several challenges as it requires the "data preprocessing" stage to preprocess an ample amount of raw data and…”
    Get full text
    Conference Proceeding
  9. 9

    Making Fair ML Software using Trustworthy Explanation by Chakraborty, Joymallya, Peng, Kewen, Menzies, Tim

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…Machine learning software is being used in many applications (finance, hiring, admissions, criminal justice…”
    Get full text
    Conference Proceeding
  10. 10

    Code Prediction by Feeding Trees to Transformers by Kim, Seohyun, Zhao, Jinman, Tian, Yuchi, Chandra, Satish

    ISBN: 1665402962, 9781665402965
    ISSN: 1558-1225
    Published: IEEE 01.05.2021
    “… This is where the strength of the underlying machine learning system that produces a ranked order of potential completions comes into play…”
    Get full text
    Conference Proceeding
  11. 11

    CAE-DFKD: Bridging the Transferability Gap in Data-Free Knowledge Distillation by Zhang, Zherui, Wang, Changwei, Xu, Rongtao, Xu, Wenhao, Xu, Shibiao, Zhang, Yu, Zhou, Jie, Guo, Li

    Published: IEEE 22.06.2025
    “…Data-Free Knowledge Distillation (DFKD) enables the knowledge transfer from the given pre-trained teacher network to the target student model without access to…”
    Get full text
    Conference Proceeding
  12. 12

    UniGenCoder: Merging SEQ2SEQ and SEQ2TREE Paradigms for Unified Code Generation by Shao, Liangying, Yan, Yanfu, Poshyvanyk, Denys, Su, Jinsong

    ISSN: 2832-7632
    Published: IEEE 27.04.2025
    “…Deep learning-based code generation has completely transformed the way developers write programs today…”
    Get full text
    Conference Proceeding
  13. 13

    DARL: Distributed Reconfigurable Accelerator for Hyperdimensional Reinforcement Learning by Chen, Hanning, Issa, Mariam, Ni, Yang, Imani, Mohsen

    ISSN: 1558-2434
    Published: ACM 29.10.2022
    “…) has been introduced as a promising solution for lightweight and efficient machine learning, particularly…”
    Get full text
    Conference Proceeding
  14. 14

    The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models by Zhout, Xin, Kim, Kisub, Xu, Bowen, Liu, Jiakun, Han, DongGyun, Lo, David

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Learning-based techniques, especially advanced Large Language Models (LLMs) for code, have gained considerable popularity in various software engineering (SE) tasks…”
    Get full text
    Conference Proceeding
  15. 15

    Fast Adversarial Training with Dynamic Batch-level Attack Control by Jung, Jaewon, Song, Jaeyong, Jang, Hongsun, Lee, Hyeyoon, Choi, Kanghyun, Park, Noseong, Lee, Jinho

    Published: IEEE 09.07.2023
    “…Despite the fact that adversarial training provides an effective protection against adversarial attacks, it suffers from a huge computational overhead. To…”
    Get full text
    Conference Proceeding
  16. 16

    Fairquant: Certifying and Quantifying Fairness of Deep Neural Networks by Kim, Brian Hyeongseok, Wang, Jingbo, Wang, Chao

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…We propose a method for formally certifying and quantifying individual fairness of deep neural networks (DNN). Individual fairness guarantees that any two…”
    Get full text
    Conference Proceeding
  17. 17

    Shoggoth: Towards Efficient Edge-Cloud Collaborative Real-Time Video Inference via Adaptive Online Learning by Wang, Liang, Lu, Kai, Zhang, Nan, Qu, Xiaoyang, Wang, Jianzong, Wan, Jiguang, Li, Guokuan, Xiao, Jing

    Published: IEEE 09.07.2023
    “… At the edge, we design adaptive training using small batches to adapt models under limited computing power, and adaptive sampling of training frames for robustness and reducing bandwidth…”
    Get full text
    Conference Proceeding
  18. 18

    Robust Tickets Can Transfer Better: Drawing More Transferable Subnetworks in Transfer Learning by Fu, Yonggan, Yuan, Ye, Wu, Shang, Yuan, Jiayi, Lin, Yingyan Celine

    Published: IEEE 09.07.2023
    “…Transfer learning leverages feature representations of deep neural networks (DNNs) pretrained on source tasks with rich data to empower effective finetuning on downstream tasks…”
    Get full text
    Conference Proceeding
  19. 19

    MMDFL: Multi-Model-based Decentralized Federated Learning for Resource-Constrained AIoT Systems by Yan, Dengke, Yang, Yanxin, Hu, Ming, Fu, Xin, Chen, Mingsong

    Published: IEEE 22.06.2025
    “…) applications adopt Federated Learning (FL) to enable collaborative learning without compromising the privacy of devices…”
    Get full text
    Conference Proceeding
  20. 20

    Iterative Generation of Adversarial Example for Deep Code Models by Huang, Li, Sun, Weifeng, Yan, Meng

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Deep code models are vulnerable to adversarial attacks, making it possible for semantically identical inputs to trigger different responses. Current black-box…”
    Get full text
    Conference Proceeding