Skip to main content

Showing 1–12 of 12 results for author: Elmahdy, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2511.20718  [pdf, ps, other

    cs.LG cs.AI cs.CL

    ST-PPO: Stabilized Off-Policy Proximal Policy Optimization for Multi-Turn Agents Training

    Authors: Chenliang Li, Adel Elmahdy, Alex Boyd, Zhongruo Wang, Alfredo Garcia, Parminder Bhatia, Taha Kass-Hout, Cao Xiao, Mingyi Hong

    Abstract: PPO has been widely adopted for training large language models (LLMs) at the token level in multi-turn dialogue and reasoning tasks. However, its performance is often unstable and prone to collapse. Through empirical analysis, we identify two main sources of instability in this setting: (1)~token-level importance sampling, which is misaligned with the natural granularity of multi-turn environments… ▽ More

    Submitted 25 November, 2025; originally announced November 2025.

  2. arXiv:2408.10536  [pdf, other

    cs.IR cs.CL

    Synergistic Approach for Simultaneous Optimization of Monolingual, Cross-lingual, and Multilingual Information Retrieval

    Authors: Adel Elmahdy, Sheng-Chieh Lin, Amin Ahmad

    Abstract: Information retrieval across different languages is an increasingly important challenge in natural language processing. Recent approaches based on multilingual pre-trained language models have achieved remarkable success, yet they often optimize for either monolingual, cross-lingual, or multilingual retrieval performance at the expense of others. This paper proposes a novel hybrid batch training s… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

    Comments: 15 pages, 2 figures, 13 tables

  3. arXiv:2306.13789  [pdf, other

    cs.CL cs.CR cs.LG

    Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models

    Authors: Adel Elmahdy, Ahmed Salem

    Abstract: Natural language processing (NLP) models have become increasingly popular in real-world applications, such as text classification. However, they are vulnerable to privacy attacks, including data reconstruction attacks that aim to extract the data used to train the model. Most previous studies on data reconstruction attacks have focused on LLM, while classification models were assumed to be more se… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: 17 pages, 6 figures, 4 tables

  4. arXiv:2206.04591  [pdf, other

    cs.CL cs.CR cs.LG

    Privacy Leakage in Text Classification: A Data Extraction Approach

    Authors: Adel Elmahdy, Huseyin A. Inan, Robert Sim

    Abstract: Recent work has demonstrated the successful extraction of training data from generative language models. However, it is not evident whether such extraction is feasible in text classification models since the training objective is to predict the class label as opposed to next-word prediction. This poses an interesting challenge and raises an important question regarding the privacy of training data… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

    Comments: 8 pages, 4 tables. Accepted at NAACL 2022 Workshop on Privacy in NLP (PrivateNLP)

  5. arXiv:2201.01728  [pdf, other

    stat.ML cs.IT cs.LG

    Matrix Completion with Hierarchical Graph Side Information

    Authors: Adel Elmahdy, Junhyung Ahn, Changho Suh, Soheil Mohajer

    Abstract: We consider a matrix completion problem that exploits social or item similarity graphs as side information. We develop a universal, parameter-free, and computationally efficient algorithm that starts with hierarchical graph clustering and then iteratively refines estimates both on graph clustering and matrix ratings. Under a hierarchical stochastic block model that well respects practically-releva… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: 53 pages, 3 figures, 1 table. Published in NeurIPS 2020. The first two authors contributed equally to this work. In this revision, achievability proof technique is updated and typos are corrected. arXiv admin note: substantial text overlap with arXiv:2109.05408

    Journal ref: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)

  6. arXiv:2201.00313  [pdf, other

    cs.IT cs.CR cs.DC cs.NI

    Secure Determinant Codes for Distributed Storage Systems

    Authors: Adel Elmahdy, Michelle Kleckler, Soheil Mohajer

    Abstract: The information-theoretic secure exact-repair regenerating codes for distributed storage systems (DSSs) with parameters $(n,k=d,d,\ell)$ are studied in this paper. We consider distributed storage systems with $n$ nodes, in which the original data can be recovered from any subset of $k=d$ nodes, and the content of any node can be retrieved from those of any $d$ helper nodes. Moreover, we consider t… ▽ More

    Submitted 29 December, 2022; v1 submitted 2 January, 2022; originally announced January 2022.

    Comments: 22 pages, 8 figures. The first two authors contributed equally to this work. Accepted for publication at IEEE Transactions on Information Theory

  7. arXiv:2109.05408  [pdf, other

    cs.IT cs.LG stat.ML

    On the Fundamental Limits of Matrix Completion: Leveraging Hierarchical Similarity Graphs

    Authors: Junhyung Ahn, Adel Elmahdy, Soheil Mohajer, Changho Suh

    Abstract: We study the matrix completion problem that leverages hierarchical similarity graphs as side information in the context of recommender systems. Under a hierarchical stochastic block model that well respects practically-relevant social graphs and a low-rank rating matrix model, we characterize the exact information-theoretic limit on the number of observed matrix entries (i.e., optimal sample compl… ▽ More

    Submitted 11 September, 2021; originally announced September 2021.

    Comments: The first two authors contributed equally to this work. A preliminary version of this work was presented at the 2020 Advances in Neural Information Processing Systems Conference (NeurIPS 2020)

  8. arXiv:1807.04255  [pdf, other

    cs.IT cs.DC cs.LG

    On the Fundamental Limits of Coded Data Shuffling for Distributed Machine Learning

    Authors: Adel Elmahdy, Soheil Mohajer

    Abstract: We consider the data shuffling problem in a distributed learning system, in which a master node is connected to a set of worker nodes, via a shared link, in order to communicate a set of files to the worker nodes. The master node has access to a database of files. In every shuffling iteration, each worker node processes a new subset of files, and has excess storage to partially cache the remaining… ▽ More

    Submitted 20 June, 2020; v1 submitted 11 July, 2018; originally announced July 2018.

    Comments: This work has been published in IEEE Transactions on Information Theory. A preliminary version of this work was presented at IEEE International Symposium on Information Theory (ISIT), Jun. 2018

    Journal ref: IEEE Transactions on Information Theory, vol. 66, no. 5, pp. 3098-3131, May 2020

  9. arXiv:1608.00209  [pdf, other

    cs.IT

    Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages

    Authors: Adel M. Elmahdy, Amr El-Keyi, Yahya Mohasseb, Tamer ElBatt, Mohammed Nafie, Karim G. Seddik, Tamer Khattab

    Abstract: In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is wh… ▽ More

    Submitted 31 July, 2016; originally announced August 2016.

  10. On Optimizing Cooperative Cognitive User Performance under Primary QoS Constraints

    Authors: Adel M. Elmahdy, Amr El-Keyi, Tamer ElBatt, Karim G. Seddik

    Abstract: We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint… ▽ More

    Submitted 31 March, 2016; originally announced March 2016.

    Comments: 7 pages, IEEE WCNC 2016

  11. On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer

    Authors: Adel M. Elmahdy, Amr El-Keyi, Tamer ElBatt, Karim G. Seddik

    Abstract: In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for… ▽ More

    Submitted 9 October, 2014; originally announced October 2014.

    Comments: 5 pages, IEEE PIMRC 2014

  12. Generalized Instantly Decodable Network Coding for Relay-Assisted Networks

    Authors: Adel M. Elmahdy, Sameh Sorour, Karim G. Seddik

    Abstract: In this paper, we investigate the problem of minimizing the frame completion delay for Instantly Decodable Network Coding (IDNC) in relay-assisted wireless multicast networks. We first propose a packet recovery algorithm in the single relay topology which employs generalized IDNC instead of strict IDNC previously proposed in the literature for the same relay-assisted topology. This use of generali… ▽ More

    Submitted 9 October, 2014; v1 submitted 5 November, 2013; originally announced November 2013.

    Comments: 5 pages, IEEE PIMRC 2013