{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T04:11:31Z","timestamp":1768709491355,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640384","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"616-630","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["LazyDP: Co-Designing Algorithm-Software for Scalable Training of Differentially Private Recommendation Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4778-0729","authenticated-orcid":false,"given":"Juntaek","family":"Lim","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4020-8995","authenticated-orcid":false,"given":"Youngeun","family":"Kwon","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2343-586X","authenticated-orcid":false,"given":"Ranggi","family":"Hwang","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0321-8406","authenticated-orcid":false,"given":"Kiwan","family":"Maeng","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6409-9888","authenticated-orcid":false,"given":"Edward","family":"Suh","sequence":"additional","affiliation":[{"name":"FAIR at Meta, Cambridge, United States of America"},{"name":"Cornell University, Ithaca, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3303-8681","authenticated-orcid":false,"given":"Minsoo","family":"Rhu","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Li Zhang. Deep Learning with Differential Privacy. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS)","author":"Abadi Martin","year":"2016","unstructured":"Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. Deep Learning with Differential Privacy. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016."},{"key":"e_1_3_2_1_2_1","volume-title":"Large-Scale Differentially Private BERT. In arxiv.org","author":"Anil Rohan","year":"2021","unstructured":"Rohan Anil, Badih Ghazi, Vineet Gupta, Ravi Kumar, and Pasin Manurangsi. Large-Scale Differentially Private BERT. In arxiv.org, 2021."},{"key":"e_1_3_2_1_3_1","volume-title":"Learning with Privacy at Scale. https:\/\/docs-assets.developer.apple.com\/ml-research\/papers\/learning-with-privacy-at-scale.pdf","year":"2017","unstructured":"Apple. Learning with Privacy at Scale. https:\/\/docs-assets.developer.apple.com\/ml-research\/papers\/learning-with-privacy-at-scale.pdf, 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"Bhattacharya and Sudarshan Lamkhede. Augmenting Netflix Search with In-Session Adapted Recommendations. In Proceedings of the ACM Conference on Recommender Systems (RECSYS)","author":"Moumita","year":"2022","unstructured":"Moumita Bhattacharya and Sudarshan Lamkhede. Augmenting Netflix Search with In-Session Adapted Recommendations. In Proceedings of the ACM Conference on Recommender Systems (RECSYS), 2022."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.openmp.org\/wp-content\/uploads\/OpenMP-4.5-1115-CPP-web.pdf","author":"Architecture Review Board MP","year":"2015","unstructured":"OpenMP Architecture Review Board. OpenMP 4.5 API C\/C++ Syntax Reference Guide. https:\/\/www.openmp.org\/wp-content\/uploads\/OpenMP-4.5-1115-CPP-web.pdf, 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy Considerations in Large Language Models. https:\/\/ai.googleblog.com\/2020\/12\/privacy-considerations-in-large.html","author":"Carlini Nicholas","year":"2020","unstructured":"Nicholas Carlini. Privacy Considerations in Large Language Models. https:\/\/ai.googleblog.com\/2020\/12\/privacy-considerations-in-large.html, 2020."},{"key":"e_1_3_2_1_7_1","volume-title":"Extracting Training Data from Diffusion Models. In arxiv.org","author":"Carlini Nicholas","year":"2023","unstructured":"Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tram\u00e8r, Borja Balle, Daphne Ippolito, and Eric Wallace. Extracting Training Data from Diffusion Models. In arxiv.org, 2023."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tram\u00e8r, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom B. Brown, Dawn Song, \u00dalfar Erlingsson, Alina Oprea, and Colin Raffel. Extracting Training Data from Large Language Models. In Proceedings of the USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_9_1","volume-title":"Hemal Shah. Wide & Deep Learning for Recommender Systems. In Proceedings of the 1st Workshop on Deep Learning for Recommender Systems","author":"Cheng Heng-Tze","year":"2016","unstructured":"Heng-Tze Cheng, Levent Koc, Jeremiah Harmsen, Tal Shaked, Tushar Chandra, Hrishi Aradhye, Glen Anderson, Greg Corrado, Wei Chai, Mustafa Ispir, Rohan Anil, Zakaria Haque, Lichan Hong, Vihan Jain, Xiaobing Liu, and Hemal Shah. Wide & Deep Learning for Recommender Systems. In Proceedings of the 1st Workshop on Deep Learning for Recommender Systems, 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"Nicolas Papernot. Label-Only Membership Inference Attacks. In Proceedings of the International Conference on Machine Learning (ICML)","author":"Choquette-Choo Christopher A.","year":"2021","unstructured":"Christopher A. Choquette-Choo, Florian Tram\u00e8r, Nicholas Carlini, and Nicolas Papernot. Label-Only Membership Inference Attacks. In Proceedings of the International Conference on Machine Learning (ICML), 2021."},{"key":"e_1_3_2_1_11_1","volume-title":"Emre Sargin. Deep Neural Networks for YouTube Recommendations. In Proceedings of the ACM Conference on Recommender Systems (RECSYS)","author":"Covington Paul","year":"2016","unstructured":"Paul Covington, Jay Adams, and Emre Sargin. Deep Neural Networks for YouTube Recommendations. In Proceedings of the ACM Conference on Recommender Systems (RECSYS), 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"Unlocking High-Accuracy Differentially Private Image Classification through Scale. In arxiv.org","author":"De Soham","year":"2022","unstructured":"Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, and Borja Balle. Unlocking High-Accuracy Differentially Private Image Classification through Scale. In arxiv.org, 2022."},{"key":"e_1_3_2_1_13_1","volume-title":"Amer Sinha, Avinash Varadarajan, and Chiyuan Zhang. Private Ad Modeling with DP-SGD. In arxiv.org","author":"Denison Carson","year":"2022","unstructured":"Carson Denison, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, and Chiyuan Zhang. Private Ad Modeling with DP-SGD. In arxiv.org, 2022."},{"key":"e_1_3_2_1_14_1","volume-title":"Thomas Drake. Preserving Privacy in Analyses of Textual Data. In Proceedings of the International Conference on Web Search and Data Mining","author":"Diethe Tom","year":"2020","unstructured":"Tom Diethe, Oluwaseyi Feyisetan, Borja Balle, and Thomas Drake. Preserving Privacy in Analyses of Textual Data. In Proceedings of the International Conference on Web Search and Data Mining, 2020."},{"key":"e_1_3_2_1_15_1","volume-title":"Automata","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork. Differential Privacy. In Automata, Languages and Programming, 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_3_2_1_17_1","volume-title":"Found. Trends Theor. Comput. Sci.","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. The Algorithmic Foundations of Differential Privacy. In Found. Trends Theor. Comput. Sci., 2014."},{"key":"e_1_3_2_1_18_1","volume":"200","author":"Eisenberg Bennett","unstructured":"Bennett Eisenberg and Rosemary Sullivan. Why Is the Sum of Independent Normal Random Variables Normal? In Mathematics Magazine, 2008.","journal-title":"Mathematics Magazine"},{"key":"e_1_3_2_1_19_1","volume-title":"Xiaodong He. A Multi-View Deep Learning Approach for Cross Domain User Modeling in Recommendation Systems. In Proceedings of the International Conference on World Wide Web (WWW)","author":"Elkahky Ali Mamdouh","year":"2015","unstructured":"Ali Mamdouh Elkahky, Yang Song, and Xiaodong He. A Multi-View Deep Learning Approach for Cross Domain User Modeling in Recommendation Systems. In Proceedings of the International Conference on World Wide Web (WWW), 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"Accelerating Facebook's Infrastructure with Application-specific Hardware. https:\/\/code.fb.com\/data-center-engineering\/accelerating-infrastructure\/","year":"2019","unstructured":"Facebook. Accelerating Facebook's Infrastructure with Application-specific Hardware. https:\/\/code.fb.com\/data-center-engineering\/accelerating-infrastructure\/, 2019."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00056"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_23_1","volume-title":"Thomas Ristenpart. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In Proceedings of the USENIX Security Symposium","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon M. Lin, David Page, and Thomas Ristenpart. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In Proceedings of the USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"Tom Goldstein. Plug-In Inversion: Model-Agnostic Inversion for Vision with Data Augmentations. In Proceedings of the International Conference on Machine Learning (ICML)","author":"Ghiasi Amin","year":"2022","unstructured":"Amin Ghiasi, Hamid Kazemi, Steven Reich, Chen Zhu, Micah Goldblum, and Tom Goldstein. Plug-In Inversion: Model-Agnostic Inversion for Vision with Data Augmentations. In Proceedings of the International Conference on Machine Learning (ICML), 2022."},{"key":"e_1_3_2_1_25_1","volume-title":"Stefano Soatto. Mixed Differential Privacy in Computer Vision. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Golatkar Aditya","year":"2022","unstructured":"Aditya Golatkar, Alessandro Achille, Yu-Xiang Wang, Aaron Roth, Michael Kearns, and Stefano Soatto. Mixed Differential Privacy in Computer Vision. In Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR), 2022."},{"key":"e_1_3_2_1_26_1","volume-title":"Carole-Jean Wu. DeepRecSys: A System for Optimizing End-To-End At-Scale Neural Recommendation Inference. In Proceedings of the International Symposium on Computer Architecture (ISCA)","author":"Gupta Udit","year":"2020","unstructured":"Udit Gupta, Samuel Hsia, Vikram Saraph, Xiaodong Wang, Brandon Reagen, Gu-Yeon Wei, Hsien-Hsin S Lee, David Brooks, and Carole-Jean Wu. DeepRecSys: A System for Optimizing End-To-End At-Scale Neural Recommendation Inference. In Proceedings of the International Symposium on Computer Architecture (ISCA), 2020."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00047"},{"key":"e_1_3_2_1_28_1","volume-title":"Michal Irani. Reconstructing Training Data From Trained Neural Networks. In Proceedings of the International Conference on Neural Information Processing Systems (NIPS)","author":"Haim Niv","year":"2022","unstructured":"Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, and Michal Irani. Reconstructing Training Data From Trained Neural Networks. In Proceedings of the International Conference on Neural Information Processing Systems (NIPS), 2022."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-emnlp.102"},{"key":"e_1_3_2_1_30_1","volume-title":"Intel oneAPI Threading Building Blocks. https:\/\/software.intel.com\/en-us\/tbb","year":"2023","unstructured":"Intel. Intel oneAPI Threading Building Blocks. https:\/\/software.intel.com\/en-us\/tbb, 2023."},{"key":"e_1_3_2_1_31_1","volume-title":"Intel Performance Counter Monitor (Intel PCM). https:\/\/github.com\/intel\/pcm","year":"2023","unstructured":"Intel. Intel Performance Counter Monitor (Intel PCM). https:\/\/github.com\/intel\/pcm, 2023."},{"key":"e_1_3_2_1_32_1","volume-title":"Intrinsics for Intel Advanced Vector Extensions 2 (Intel AVX2). https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/cpp-compiler\/developer-guide-reference\/2021-10\/intrinsics-for-avx2.html","year":"2023","unstructured":"Intel. Intrinsics for Intel Advanced Vector Extensions 2 (Intel AVX2). https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/cpp-compiler\/developer-guide-reference\/2021-10\/intrinsics-for-avx2.html, 2023."},{"key":"e_1_3_2_1_33_1","volume-title":"Criteo Display Advertising Challenge. https:\/\/www.kaggle.com\/c\/criteo-display-ad-challenge","year":"2014","unstructured":"Kaggle. Criteo Display Advertising Challenge. https:\/\/www.kaggle.com\/c\/criteo-display-ad-challenge, 2014."},{"key":"e_1_3_2_1_34_1","volume-title":"Won Woo Ro. SPACE: Locality-aware Processing in Heterogeneous Memory for Personalized Recommendations. In Proceedings of the International Symposium on Computer Architecture (ISCA)","author":"Kal Hongju","year":"2021","unstructured":"Hongju Kal, Seokmin Lee, Gun Ko, and Won Woo Ro. SPACE: Locality-aware Processing in Heterogeneous Memory for Personalized Recommendations. In Proceedings of the International Symposium on Computer Architecture (ISCA), 2021."},{"key":"e_1_3_2_1_35_1","volume-title":"RecNMP: Accelerating Personalized Recommendation with Near-Memory Processing. In Proceedings of the International Symposium on Computer Architecture (ISCA)","author":"Ke Liu","year":"2020","unstructured":"Liu Ke, Udit Gupta, Carole-Jean Wu, Benjamin Youngjae Cho, Mark Hempstead, Brandon Reagen, Xuan Zhang, David Brooks, Vikas Chandra, Utku Diril, et al. RecNMP: Accelerating Personalized Recommendation with Near-Memory Processing. In Proceedings of the International Symposium on Computer Architecture (ISCA), 2020."},{"key":"e_1_3_2_1_36_1","volume-title":"Toward Training at ImageNet Scale with Differential Privacy. In arxiv.org","author":"Kurakin Alexey","year":"2022","unstructured":"Alexey Kurakin, Shuang Song, Steve Chien, Roxana Geambasu, Andreas Terzis, and Abhradeep Thakurta. Toward Training at ImageNet Scale with Differential Privacy. In arxiv.org, 2022."},{"key":"e_1_3_2_1_37_1","volume-title":"Minsoo Rhu. Tensor Casting: Co-Designing Algorithm-Architecture for Personalized Recommendation Training. In Proceedings of the International Symposium on High-Performance Computer Architecture (HPCA)","author":"Kwon Youngeun","year":"2021","unstructured":"Youngeun Kwon, Yunjae Lee, and Minsoo Rhu. Tensor Casting: Co-Designing Algorithm-Architecture for Personalized Recommendation Training. In Proceedings of the International Symposium on High-Performance Computer Architecture (HPCA), 2021."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527386"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0008"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Yejin Lee Seong Hoon Seo Hyunji Choi Hyoung Uk Sul Soosung Kim Jae W Lee and Tae Jun Ham. MERCI: Efficient Embedding Reduction on Commodity Hardware Via Sub-query Memoization. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operation Systems (ASPLOS) 2021.","DOI":"10.1145\/3445814.3446717"},{"key":"e_1_3_2_1_42_1","volume-title":"Tatsunori Hashimoto. Large Language Models Can Be Strong Differentially Private Learners. In Proceedings of the International Conference on Learning Representations (ICLR)","author":"Li Xuechen","year":"2022","unstructured":"Xuechen Li, Florian Tramer, Percy Liang, and Tatsunori Hashimoto. Large Language Models Can Be Strong Differentially Private Learners. In Proceedings of the International Conference on Learning Representations (ICLR), 2022."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267840"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS)","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS), 2017."},{"key":"e_1_3_2_1_45_1","volume-title":"MLPerf v2.1 Training Benchmarks. https:\/\/mlcommons.org\/en\/training-normal-21\/","year":"2022","unstructured":"MLCommons. MLPerf v2.1 Training Benchmarks. https:\/\/mlcommons.org\/en\/training-normal-21\/, 2022."},{"key":"e_1_3_2_1_46_1","volume-title":"Vijay Rao. Software-Hardware Co-Design for Fast and Scalable Training of Deep Learning Recommendation Models. In Proceedings of the International Symposium on Computer Architecture (ISCA)","author":"Mudigere Dheevatsa","year":"2022","unstructured":"Dheevatsa Mudigere, Yuchen Hao, Jianyu Huang, Zhihao Jia, Andrew Tulloch, Srinivas Sridharan, Xing Liu, Mustafa Ozdal, Jade Nie, Jongsoo Park, Liang Luo, Jie (Amy) Yang, Leon Gao, Dmytro Ivchenko, Aarti Basant, Yuxi Hu, Jiyan Yang, Ehsan K. Ardestani, Xiaodong Wang, Rakesh Komuravelli, Ching-Hsiang Chu, Serhat Yilmaz, Huayu Li, Jiyuan Qian, Zhuobo Feng, Yinbin Ma, Junjie Yang, Ellie Wen, Hong Li, Lin Yang, Chonglin Sun, Whitney Zhao, Dimitry Melts, Krishna Dhulipala, KR Kishore, Tyler Graf, Assaf Eisenman, Kiran Kumar Matam, Adi Gangidi, Guoqiang Jerry Chen, Manoj Krishnan, Avinash Nayak, Krishnakumar Nair, Bharath Muthiah, Mahmoud khorashadi, Pallab Bhattacharya, Petr Lapukhov, Maxim Naumov, Ajit Mathews, Lin Qiao, Mikhail Smelyanskiy, Bill Jia, and Vijay Rao. Software-Hardware Co-Design for Fast and Scalable Training of Deep Learning Recommendation Models. In Proceedings of the International Symposium on Computer Architecture (ISCA), 2022."},{"key":"e_1_3_2_1_47_1","volume-title":"Distributed Training of Large-scale Deep Learning Recommendation Models. In arxiv.org","author":"Mudigere Dheevatsa","year":"2021","unstructured":"Dheevatsa Mudigere, Yuchen Hao, Jianyu Huang, Andrew Tulloch, Srinivas Sridharan, Xing Liu, Mustafa Ozdal, Jade Nie, Jongsoo Park, Liang Luo, et al. High-performance, Distributed Training of Large-scale Deep Learning Recommendation Models. In arxiv.org, 2021."},{"key":"e_1_3_2_1_48_1","volume-title":"Scalable Extraction of Training Data from (Production) Language Models. In arxiv.org","author":"Nasr Milad","year":"2023","unstructured":"Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A. Feder Cooper, Daphne Ippolito, Christopher A. Choquette-Choo, Eric Wallace, Florian Tram\u00e8r, and Katherine Lee. Scalable Extraction of Training Data from (Production) Language Models. In arxiv.org, 2023."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_50_1","volume-title":"Nicholas Carlini. Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning. In IEEE Symposium on Security and Privacy (SP)","author":"Nasr Milad","year":"2021","unstructured":"Milad Nasr, Shuang Song, Abhradeep Thakurta, Nicolas Papernot, and Nicholas Carlini. Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning. In IEEE Symposium on Security and Privacy (SP), 2021."},{"key":"e_1_3_2_1_51_1","unstructured":"Maxim Naumov Dheevatsa Mudigere Hao-Jun Michael Shi Jianyu Huang Narayanan Sundaraman Jongsoo Park Xiaodong Wang Udit Gupta Carole-Jean Wu Alisson G. Azzolini Dmytro Dzhulgakov Andrey Mallevich Ilia Cherniavskii Yinghai Lu Raghuraman Krishnamoorthi Ansha Yu Volodymyr Kondratenko Stephanie Pereira Xianjie Chen Wenlin Chen Vijay Rao Bill Jia Liang Xiong and Misha Smelyanskiy. Deep Learning Recommendation Model for Personalization and Recommendation Systems. In arxiv.org 2019."},{"key":"e_1_3_2_1_52_1","volume-title":"Devora Berlowitz. EANA: Reducing Privacy Risk on Large-Scale Recommendation Models. In Proceedings of the ACM Conference on Recommender Systems (RECSYS)","author":"Ning Lin","year":"2022","unstructured":"Lin Ning, Steve Chien, Shuang Song, Mei Chen, Yunqi Xue, and Devora Berlowitz. EANA: Reducing Privacy Risk on Large-Scale Recommendation Models. In Proceedings of the ACM Conference on Recommender Systems (RECSYS), 2022."},{"key":"e_1_3_2_1_53_1","volume-title":"System Management Interface SMI. https:\/\/developer.nvidia.com\/nvidia-system-management-interface","author":"NVIDIA.","year":"2016","unstructured":"NVIDIA. System Management Interface SMI. https:\/\/developer.nvidia.com\/nvidia-system-management-interface, 2016."},{"key":"e_1_3_2_1_54_1","volume-title":"Minsoo Rhu. DiVa: An Accelerator for Differentially Private Machine Learning. In Proceedings of the International Symposium on Microarchitecture (MICRO)","author":"Park Beomsik","year":"2022","unstructured":"Beomsik Park, Ranggi Hwang, Dongho Yoon, Yoonhyuk Choi, and Minsoo Rhu. DiVa: An Accelerator for Differentially Private Machine Learning. In Proceedings of the International Symposium on Microarchitecture (MICRO), 2022."},{"key":"e_1_3_2_1_55_1","volume-title":"Sergei Vassilvitskii. Training Text-to-Text Transformers with Privacy Guarantees. In Proceedings of the Fourth Workshop on Privacy in Natural Language Processing","author":"Ponomareva Natalia","year":"2022","unstructured":"Natalia Ponomareva, Jasmijn Bastings, and Sergei Vassilvitskii. Training Text-to-Text Transformers with Privacy Guarantees. In Proceedings of the Fourth Workshop on Privacy in Natural Language Processing, 2022."},{"key":"e_1_3_2_1_56_1","volume-title":"http:\/\/pytorch.org","year":"2022","unstructured":"PyTorch. http:\/\/pytorch.org, 2022."},{"key":"e_1_3_2_1_57_1","volume-title":"Murali Annavaram. LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables. In Proceedings of the International Symposium on Computer Architecture (ISCA)","author":"Rajat Rachit","year":"2023","unstructured":"Rachit Rajat, Yongqin Wang, and Murali Annavaram. LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables. In Proceedings of the International Symposium on Computer Architecture (ISCA), 2023."},{"key":"e_1_3_2_1_58_1","volume-title":"Peter Richt\u00e1rik. Scaling Distributed Machine Learning with In-Network Aggregation. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Sapio Amedeo","year":"2021","unstructured":"Amedeo Sapio, Marco Canini, Chen-Yu Ho, Jacob Nelson, Panos Kalnis, Changhoon Kim, Arvind Krishnamurthy, Masoud Moshref, Dan Ports, and Peter Richt\u00e1rik. Scaling Distributed Machine Learning with In-Network Aggregation. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2021."},{"key":"e_1_3_2_1_59_1","volume-title":"Applied Federated Learning: Architectural Design for Robust and Efficient Learning in Privacy Aware Settings. In arxiv.org","author":"Stojkovic Branislav","year":"2022","unstructured":"Branislav Stojkovic, Jonathan Woodbridge, Zhihan Fang, Jerry Cai, Andrey Petrov, Sathya Iyer, Daoyu Huang, Patrick Yau, Arvind Kumar, Hitesh Jawa, and Anamita Guha. Applied Federated Learning: Architectural Design for Robust and Efficient Learning in Privacy Aware Settings. In arxiv.org, 2022."},{"key":"e_1_3_2_1_60_1","volume-title":"Kristian Kersting. Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. In Proceedings of the International Conference on Machine Learning (ICML)","author":"Struppek Lukas","year":"2022","unstructured":"Lukas Struppek, Dominik Hintersdorf, Antonio De Almeida Correia, Antonia Adler, and Kristian Kersting. Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. In Proceedings of the International Conference on Machine Learning (ICML), 2022."},{"key":"e_1_3_2_1_61_1","volume-title":"Alexandre Sablayrolles. On the Importance of Difficulty Calibration in Membership Inference Attacks. In Proceedings of the International Conference on Learning Representations (ICLR)","author":"Watson Lauren","year":"2022","unstructured":"Lauren Watson, Chuan Guo, Graham Cormode, and Alexandre Sablayrolles. On the Importance of Difficulty Calibration in Membership Inference Attacks. In Proceedings of the International Conference on Learning Representations (ICLR), 2022."},{"key":"e_1_3_2_1_62_1","volume-title":"Box-Muller Transform. https:\/\/en.wikipedia.org\/wiki\/Box-Muller_transform","year":"2023","unstructured":"Wikipedia. Box-Muller Transform. https:\/\/en.wikipedia.org\/wiki\/Box-Muller_transform, 2023."},{"key":"e_1_3_2_1_63_1","volume-title":"EH Chi. Factorized Deep Retrieval and Distributed TensorFlow Serving. In Proceedings of Conference on Machine Learning and Systems (MLSys)","author":"Yi Xinyang","year":"2018","unstructured":"Xinyang Yi, Yi-Fan Chen, Sukriti Ramesh, Vinu Rajashekhar, Lichan Hong, Noah Fiedel, Nandini Seshadri, Lukasz Heldt, Xiang Wu, and EH Chi. Factorized Deep Retrieval and Distributed TensorFlow Serving. In Proceedings of Conference on Machine Learning and Systems (MLSys), 2018."},{"key":"e_1_3_2_1_64_1","volume-title":"Xing Liu. TT-Rec: Tensor Train Compression for Deep Learning Recommendation Models. In Proceedings of Conference on Machine Learning and Systems (MLSys)","author":"Yin Chunxing","year":"2021","unstructured":"Chunxing Yin, Bilge Acun, Carole-Jean Wu, and Xing Liu. TT-Rec: Tensor Train Compression for Deep Learning Recommendation Models. In Proceedings of Conference on Machine Learning and Systems (MLSys), 2021."},{"key":"e_1_3_2_1_65_1","volume-title":"Opacus: User-Friendly Differential Privacy Library in PyTorch. In arxiv.org","author":"Yousefpour Ashkan","year":"2021","unstructured":"Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, Graham Cormode, and Ilya Mironov. Opacus: User-Friendly Differential Privacy Library in PyTorch. In arxiv.org, 2021."},{"key":"e_1_3_2_1_66_1","volume-title":"Huishuai Zhang. Differentially Private Fine-tuning of Language Models. In Proceedings of the International Conference on Learning Representations (ICLR)","author":"Yu Da","year":"2022","unstructured":"Da Yu, Saurabh Naik, Arturs Backurs, Sivakanth Gopi, Huseyin A Inan, Gautam Kamath, Janardhan Kulkarni, Yin Tat Lee, Andre Manoel, Lukas Wutschitz, Sergey Yekhanin, and Huishuai Zhang. Differentially Private Fine-tuning of Language Models. In Proceedings of the International Conference on Learning Representations (ICLR), 2022."},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the ACM International Conference on Information and Knowledge Management","author":"Zhao Weijie","year":"2019","unstructured":"Weijie Zhao, Jingyuan Zhang, Deping Xie, Yulei Qian, Ronglai Jia, and Ping Li. AIBox: CTR Prediction Model Training on a Single Node. In Proceedings of the ACM International Conference on Information and Knowledge Management, 2019."}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640384","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:41Z","timestamp":1750291421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":67,"alternative-id":["10.1145\/3620665.3640384","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640384","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}