event
PhD Proposal by Jianming Tong
Primary tabs
Title: Efficient Reconfigurable Privacy-Preserving AI
Date: Tuesday, Oct 8, 2025
Time: 9:00 AM – 11:00 AM ET
Location: Remote
Zoom Meeting: https://gatech.zoom.us/my/jianming
Committee:
Dr. Tushar Krishna (Advisor) - ECE, Georgia Institute of Technology
Dr. Hyesoon Kim - CS, Georgia Institute of Technology
Dr. Moinuddin Qureshi - CS, Georgia Institute of Technology
Dr. G. Edward Suh - ECE, Cornell University / NVIDIA
Dr. Srini Devadas - EECS, Massachusetts Institute of Technology
Abstract:
The current trajectory of AI systems prioritizes computational performance at scale, often relegating data privacy to an afterthought. This approach is unsustainable. The imminent rise of personalized agents, embodied AI, and sensitive applications like healthcare transforms privacy from a mere compliance feature into a fundamental requirement for earning user trust and ensuring market viability. This creates a critical bottleneck for current systems: how do we secure AI of tomorrow using the non-private infrastructure we have today?
Modern large-scale privacy-preserving machine learning (PPML) systems often rely on a hardware-centric solution, designing Trusted Execution Environments (TEEs) for every system component (CPU, GPU, memory and communication etc.). It introduces disjointed development and maintenance costs. This thesis is to bring all levels of privacy protection to existing AI systems and understand principles of privacy protection for improving efficiency. This brings two benefits: (a) immediate augmentation of existing AI systems with all levels of privacy protection without hardware changes, and (b) guidance on the design of future reconfigurable AI systems that can adapt itself to efficiently serve both full-spectrum PPML and standard ML. My research enables it via full-stack optimizations on four pillars: (1) ML model architecture that isolates private assets into separate independent routes by design, controlling how much data requires protection, (2) Privacy preservation that leverages domain-specific knowledge to minimize the extra costs introduced by privacy guarantee, (3) Compilation that lowers high-precision modular cryptographic operators across privacy tiers into low-precision kernels efficient on today’s hardware, and (4) Hardware that reconfigures itself to efficiently process computation of various shapes and flexible memory reorganizations.
Groups
Status
- Workflow Status:Published
- Created By:Tatianna Richardson
- Created:10/01/2025
- Modified By:Tatianna Richardson
- Modified:10/01/2025
Categories
Keywords
Target Audience