Search Results for author: Ehsan Saboori

Found 8 papers, 0 papers with code

QGen: On the Ability to Generalize in Quantization Aware Training

no code implementations17 Apr 2024 MohammadHossein AskariHemmat, Ahmadreza Jeddi, Reyhane Askari Hemmat, Ivan Lazarevich, Alexander Hoffman, Sudhakar Sah, Ehsan Saboori, Yvon Savaria, Jean-Pierre David

In this work, we investigate the generalization properties of quantized neural networks, a characteristic that has received little attention despite its implications on model performance.

Quantization

DeepliteRT: Computer Vision at the Edge

no code implementations19 Sep 2023 Saad Ashfaq, Alexander Hoffman, Saptarshi Mitra, Sudhakar Sah, MohammadHossein AskariHemmat, Ehsan Saboori

The proliferation of edge devices has unlocked unprecedented opportunities for deep learning model deployment in computer vision applications.

Quantization

DeepGEMM: Accelerated Ultra Low-Precision Inference on CPU Architectures using Lookup Tables

no code implementations18 Apr 2023 Darshan C. Ganji, Saad Ashfaq, Ehsan Saboori, Sudhakar Sah, Saptarshi Mitra, MohammadHossein AskariHemmat, Alexander Hoffman, Ahmed Hassanien, Mathieu Léonardon

A lot of recent progress has been made in ultra low-bit quantization, promising significant improvements in latency, memory footprint and energy consumption on edge devices.

Quantization

QReg: On Regularization Effects of Quantization

no code implementations24 Jun 2022 MohammadHossein AskariHemmat, Reyhane Askari Hemmat, Alex Hoffman, Ivan Lazarevich, Ehsan Saboori, Olivier Mastropietro, Yvon Savaria, Jean-Pierre David

To confirm our analytical study, we performed an extensive list of experiments summarized in this paper in which we show that the regularization effects of quantization can be seen in various vision tasks and models, over various datasets.

Quantization

Fast Feature Reduction in intrusion detection datasets

no code implementations1 Apr 2013 Shafigh Parsazad, Ehsan Saboori, Amin Allahyar

In the most intrusion detection systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network.

feature selection Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.