FB LinkEdIn Instagram

Research

People

Professor
Photo of Ariel Orda
e-mail
Network routing, survivability, QoS provisioning, wireless networks, the application of game theory to computer and power networks, blokchains, the application of machine learning to network protocols.
Professor
Photo of Assaf Schuster
+972-48294330
e-mail
Distributed and Scalable Deep Learning; Deep Learning for Personal Medicine; Randomness in Deep Learning; Analytics of Rapid Data Streams; Complex Event Processing (CEP); Internet of Things and Smart Systems; Privacy Preserving; Cyber Security; Cloud Management
Associate Professor
Photo of Aviv Tamar
e-mail
My research focuses on AI and machine learning, with an emphasis on robotics applications. My long term goal is to bring robots into human-centered domains such as homes and hospitals. Towards this goal, some fundamental questions need to be solved, such as how can machines learn models of their environments that are useful for performing tasks, and how to learn behavior from interaction in an interpretable and safe manner. Most of my work falls under the framework of reinforcement learning, and its connections to representation learning and planning.
Visiting Professor
Photo of Chaim Baskin
e-mail
Deep Neural Network representation learning, Machine Learning, Computer Vision, Geometric Deep learning, Algorithms for efficient training and inference of Deep Neural Networks.
Lecturer
Photo of Dana Drachsler Cohen
e-mail
" Safety guarantees to deep learning by leveraging formal methods, such as analysis and synthesis."
Professor
Photo of Danny Raz
+972-48294938
e-mail
The theory and applications of efficient network and system management, in particular, concentrating on cloud resource management, NFV, SDN, TE, and network aware services.
Professor
Photo of Dov Dori
+972-48294409
e-mail
Conceptual Modeling, Systems Eng. and Modeling, Systems Architecture, Enterprise Systems Modeling; Object-Process Methodology; Ontologies; Software Development Methodologies, Semantic Web; Systems Biology, Robotics.
Associate Professor
Photo of Eitan Yaakobi
+972-48294952
e-mail
Information and coding theory with applications to non-volatile memories, associative memories, data storage and retrieval, distributed storage, privacy, and DNA storage.
Professor
Photo of Isaac Keslassy
+972-48295738
e-mail
Using machine learning in datacenter networks and high-performance routers, e.g., for congestion control, flow classification, and buffer management.
Assistant Professor
Photo of Kfir Yehuda Levy
+972-48294749
e-mail
Machine Learning and Optimization.
Associate Professor
Photo of Nir Ailon
+972-48294842
e-mail
Machine Learning and Statistics, Combinatorial Optimization and Approximation Algorithms, Algorithmic Dimension Reduction and Applications, Complexity.
Assistant Professor
Photo of Ori Plonsky
972-48294436
e-mail
Predicting human decision making; Mining behavioral data; behavioral economics; behavioral decision making; human learning processes; behavioral mechanism design; behavioral public policy.
Professor
Photo of Rann Smorodinsky
+972-48294422
e-mail
Game theory, Economic theory, Privacy.
Associate Professor
Photo of Reshef Meir
+972-48294434
e-mail
I am interested in understanding and mitigating the negative effects of strategic behavior. Mainly by people interacting via large systems, e.g. congestion in networks or biased group decisions.
Associate Professor
Photo of Ronen Talmon
+972-48294750
e-mail
Geometry-based Data Analysis & Modeling; Signal Processing; Applied Harmonic Analysis; Diffusion Geometry; Biomedical Signal Processing; Computational Neuroscience.
Professor
Photo of Roy Friedman
+972-4-8294264
e-mail
Caching, network monitoring, stream processing, reliable distributed systems, high-availability and fault-tolerance, blockchains, cloud computing, wireless mobile ad hoc network
Assistant Professor
Photo of Sarah Keren
e-mail
Multi-agent AI, multi-robot systems, collaborative AI, multi-agent environment design, integrated task and motion planning for robotics, and multi-agent reinforcement learning.
Associate Professor
Photo of Shahar Kvatinsky
+972-778871502
e-mail
Performing logic using memory cells to build the memristive memory processing unit (mMPU), mixed-signal circuits, RF circuits, neuromorphic computing, cytomorphic systems, deep learning accelerators, internet-of-things, and hardware security.
Associate Professor
Photo of Shoham Sabach
+972-48294442
e-mail
Continuous Optimization: Theory and Algorithms, development and analysis of Optimization Methods for large-scale optimization problems, Applications of Optimization Methods in Machine/Deep Learning.
Associate Professor
Photo of Vadim Indelman
+972-48293815
e-mail
The intersection of probabilistic perception and inference, learning, and planning under uncertainty, both for single and distributed multi-agent autonomous systems.
Associate Professor
Photo of Yael Yaniv
+972-48294124
e-mail
Automatic diseases classification, Cell Biophysics, Heart rate variability analysis, Mobile health devices, Prediction and detection of atrial and ventricular fibrillation, Sinoatrial node cell activity.
Assistant Professor
Photo of Yaniv Romano
+972-48294959
e-mail
Research centers around the theory and practice of statistical inference and machine learning, focusing on the reliability, robustness, and interpretability of modern data-driven algorithms.
Assistant Professor
Photo of Yonatan Belinkov
+97248294958
e-mail
Natural language processing; machine learning for language understanding and generation; neural network representations; interpretability and robustness of machine learning models.
Associate Professor
Photo of Yossi Keshet
e-mail
Keshet's research concerns both machine learning and the computational study of human speech and language. His work on speech and language concentrates on speech processing, automatic speech recognition, speaker recognition, automating laboratory phonology, and pathological speech. His research on machine learning focuses on core machine learning and deep learning algorithms, specifically, that capture the structure of complex tasks, such as automatic speech recognition. But also - how to make them reliable and trustworthy.
Associate Professor
Photo of Yuval Cassuto
+972-48294642
e-mail
Storage devices, systems; Reliable data distribution in networks; Coding theory, Data compression.

Projects

Design For Collaboration (DFC)
The focus is on recognizing and analyzing the challenges that arise when autonomous agents with different capabilities need to interact and collaborate on unknown tasks, on providing methods for the automated design of these environments to promote collaboration, and on specifying guarantees regarding the quality of the design s... more

Design For Collaboration (DFC)

The focus is on recognizing and analyzing the challenges that arise when autonomous agents with different capabilities need to interact and collaborate on unknown tasks, on providing methods for the automated design of these environments to promote collaboration, and on specifying guarantees regarding the quality of the design solutions produced by our suggested methods. This research combines data-driven approaches with symbolic AI techniques and involves both theoretical work and evaluations on multi-agent reinforcement learning settings and on multi robot systems.

Market of Information and Skills for Multi Agent AI and Multi Robot Teams
Promoting multi-agent collaboration via dynamic markets of information and skills in which AI agents and robots trade their physical capabilities and their ability to acquire new information. The value of these traded commodities is dynamically computed based on the agents' objectives, sensors and actuation capabilities as well ... more

Market of Information and Skills for Multi Agent AI and Multi Robot Teams

Promoting multi-agent collaboration via dynamic markets of information and skills in which AI agents and robots trade their physical capabilities and their ability to acquire new information. The value of these traded commodities is dynamically computed based on the agents’ objectives, sensors and actuation capabilities as well as their ability to communicate with each other and ask for assistance. This framework maximizes performance and team resilience, without relying on a centralized controller.

Task and Team Aware Motion Planning for Robotics (TATAM)
Most current approaches to robotic planning separate the low-level planning of basic behaviors and the high-level search for a sequence of behaviors that will accomplish a task. However, in complex settings such as packing, personal assistance, and cooking, this dichotomous view becomes inefficient, especially in environments sh... more

Task and Team Aware Motion Planning for Robotics (TATAM)

Most current approaches to robotic planning separate the low-level planning of basic behaviors and the high-level search for a sequence of behaviors that will accomplish a task. However, in complex settings such as packing, personal assistance, and cooking, this dichotomous view becomes inefficient, especially in environments shared by multiple autonomous agents. We therefore offer new ways for integrating task-level considerations when planning the robot’s movement, and for propagating motion-planning considerations into task planning.

Use user behavior to improve automatic database schema matching
Database schema matching is a challenging task that call for improvement for several decades. Automatic algorithms fail to provide reliable enough results. We use human matching to overcome algorithm failures and vice versa. We refer to human and algorithmic matchers as imperfect matchers with different strengths and weaknesses.... more

Use user behavior to improve automatic database schema matching

Database schema matching is a challenging task that call for improvement for several decades. Automatic algorithms fail to provide reliable enough results. We use human matching to overcome algorithm failures and vice versa. We refer to human and algorithmic matchers as imperfect matchers with different strengths and weaknesses. We use insights from cognitive research to predict human matchers behavior and identify those who can do better than others. We then merge their responses with algorithmic outcomes and get better results.

Massive Parallelization of Deep Learning
Improvements in training speed are needed to develop the next generation of deep learning models. To perform such a massive amount of computation in a reasonable time, it is parallelized across multiple GPU cores. Perhaps the most popular parallelization method is to use a large batch of data in each iteration of SGD, so the gra... more

Massive Parallelization of Deep Learning

Improvements in training speed are needed to develop the next generation of deep learning models. To perform such a massive amount of computation in a reasonable time, it is parallelized across multiple GPU cores. Perhaps the most popular parallelization method is to use a large batch of data in each iteration of SGD, so the gradient computation can be performed in parallel on multiple workers. We aim to enable massive parallelization without performance degradation, as commonly observed.

Resource efficient deep learning
We aim to improve the resource efficiency of deep learning (e.g., energy, bandwidth) for training and inference. Our focus is decreasing the numerical precision of the neural network model is a simple and effective way to improve their resource efficiency. Nearly all recent deep learning related hardware relies heavily on lower ... more

Resource efficient deep learning

We aim to improve the resource efficiency of deep learning (e.g., energy, bandwidth) for training and inference. Our focus is decreasing the numerical precision of the neural network model is a simple and effective way to improve their resource efficiency. Nearly all recent deep learning related hardware relies heavily on lower precision math. The benefits are a reduction in the memory required to store the neural network, a reduction in chip area, and a drastic improvement in energy efficiency.

Understanding and controlling the implicit bias in deep learning
Significant research efforts are being invested in improving Deep Neural Networks (DNNs) via various modifications. However, such modifications often cause an unexplained degradation in the generalization performance DNNs to unseen data. Recent findings suggest that this degradation is caused by changes to the hidden algorithmi... more

Understanding and controlling the implicit bias in deep learning

Significant research efforts are being invested in improving Deep Neural Networks (DNNs) via various modifications. However, such modifications often cause an unexplained degradation in the generalization performance DNNs to unseen data. Recent findings suggest that this degradation is caused by changes to the hidden algorithmic bias of the training algorithm and model. This bias determines which solution is selected from all solutions which fit the data. We aim to understand and control this algorithmic bias.

Function-Correcting Codes
Motivated by applications in machine learning and archival storage, we introduce function-correcting codes (FCCs), a new class of codes to protect a function evaluation of the data against errors. We show that FCCs are equivalent to irregular-distance codes, i.e., codes that obey some given distance requirement between each pair... more

Function-Correcting Codes

Motivated by applications in machine learning and archival storage, we introduce function-correcting codes (FCCs), a new class of codes to protect a function evaluation of the data against errors. We show that FCCs are equivalent to irregular-distance codes, i.e., codes that obey some given distance requirement between each pair of codewords. Using these connections, we study these codes and derive general upper and lower bounds on their optimal redundancy. Since these bounds depend on the specific function, we provide simplified, suboptimal bounds that are easier to evaluate.

Weakly Private Information Retrieval
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. While existing protocols strictly impose that no information is leaked on the file's identity, this project initiates the study of the tradeoffs that... more

Weakly Private Information Retrieval

Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. While existing protocols strictly impose that no information is leaked on the file’s identity, this project initiates the study of the tradeoffs that can be achieved by relaxing the requirement of perfect privacy. We propose to study this problem when the database is either replicated or is stored distributively over several servers, and when it is simply stored by a single server.

Weakly Private Information Retrieval
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. While existing protocols strictly impose that no information is leaked on the file's identity, this project initiates the study of the tradeoffs that... more

Weakly Private Information Retrieval

Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. While existing protocols strictly impose that no information is leaked on the file’s identity, this project initiates the study of the tradeoffs that can be achieved by relaxing the requirement of perfect privacy. We propose to study this problem when the database is either replicated or is stored distributively over several servers, and when it is simply stored by a single server.

Distributed Storage and Computation through Coded Sharding
When a distributed storage system is used by decentralized applications (for example: blockchains), accessing individual shards of large data units, new features are needed that are not offered by existing distributed storage systems. In particular, coding the data with standard erasure codes does not allow adequate access perfo... more

Distributed Storage and Computation through Coded Sharding

When a distributed storage system is used by decentralized applications (for example: blockchains), accessing individual shards of large data units, new features are needed that are not offered by existing distributed storage systems. In particular, coding the data with standard erasure codes does not allow adequate access performance. We develop erasure codes specifically addressing efficient recovery and access in decentralized applications.

Reliability of Machine Learning in Distributed Systems
The common use of AI today is that data is provided to some central computing facility (in the cloud), where the learning tasks (training and inference) are performed. The main issues with this practice are high communication cost and compromised data privacy. Moving part of the learning tasks to the edges mitigates these issues... more

Reliability of Machine Learning in Distributed Systems

The common use of AI today is that data is provided to some central computing facility (in the cloud), where the learning tasks (training and inference) are performed. The main issues with this practice are high communication cost and compromised data privacy. Moving part of the learning tasks to the edges mitigates these issues. The key question is how to aggregate multiple unreliable outputs from the edge to one reliable learning output, where unreliability is manifested in: missing inputs (stragglers), wrong inputs, and malicious inputs.

Certified Robustness of Modern Machine Learning
Develop methodologies that provide provably robust predictions in a challenging setting where the train and test distribution differ, e.g., due to adversarial attacks.
Online POMDP and BSP Planning via Simplification
We develop a fundamentally novel paradigm that seeks to find a simplification of a given POMDP problem, which is computationally easier, while at the same time providing performance guarantees, and ideally, similar levels of performance as the original decision making problem. Based on this conceptually novel paradigm, we devel... more

Online POMDP and BSP Planning via Simplification

We develop a fundamentally novel paradigm that seeks to find a simplification of a given POMDP problem, which is computationally easier, while at the same time providing performance guarantees, and ideally, similar levels of performance as the original decision making problem.
Based on this conceptually novel paradigm, we develop approaches that simplify the decision making problem, for example, by resorting to belief simplification or reward function simplification.

Autonomous Semantic Perception under Uncertainty
We develop approaches for autonomous semantic perception addressing key challenges such as: classification aliasing for certain relative viewpoints between object & camera, localization uncertainty, and epistemic uncertainty of the classifier. Specifically, approaches for computationally efficient probabilistic inference and... more

Autonomous Semantic Perception under Uncertainty

We develop approaches for autonomous semantic perception addressing key challenges such as: classification aliasing for certain relative viewpoints between object & camera, localization uncertainty, and epistemic uncertainty of the classifier. Specifically, approaches for computationally efficient probabilistic inference and decision making, are developed, in the context of semantic perception and SLAM. A key component here is a learned viewpoint-dependent classifier model.

Online and bandit optimization
In this project we study how to make decisions in an unknown environment in an online setting.
People:
Nir Ailon
Large matrix approximation for acceleration of deep networks
In this work we apply matrix approximation theory to reduce the cost of training and deploying of dense layers in deep networks.
People:
Nir Ailon