Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles by
Wen-jie Lu
BASSET: Bandpass-Adaptive Single-pulse SEarch Toolkit -- Optimized Sub-Band Pulse Search Strategies for Faint Narrow-Band FRBs
10 January 2025 by
Jia-Hao Cao
and
others
Instrumentation and Methods for Astrophysics
Nimbus: Secure and Efficient Two-Party Inference for Transformers
24 November 2024 by
Zhengyi Li
and
others
Cryptography and Security
,
Artificial Intelligence
CoPriv: Network/Protocol Co-Optimization for Communication-Efficient Private Inference
3 November 2023 by
Wenxuan Zeng
and
others
Cryptography and Security
BumbleBee: Secure Two-party Inference Framework for Large Transformers
30 October 2023 by
Wen-jie Lu
and
others
Cryptography and Security
,
Cryptographic Protocols
PUMA: Secure Inference of LLaMA-7B in Five Minutes
26 September 2023 by
Ye Dong
and
others
Cryptography and Security
CipherGPT: Secure Two-Party GPT Inference
4 August 2023 by
Xiaoyang Hou
and
others
Cryptography and Security
,
Cryptographic Protocols
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree
11 April 2023 by
Wen-jie Lu
and
others
Cryptography and Security
,
Cryptographic Protocols
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
23 March 2022 by
Zhicong Huang
and
others
Cryptography and Security
,
Cryptology
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
26 December 2020 by
Wen-jie Lu
and
others
Cryptography and Security
,
Cryptology
Hedgehog pathway activation through conformational blockade of the Patched sterol conduit
2 November 2020 by
Yipin Zhang
and
others
at
Stanford University
Biophysics
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
29 February 2020 by
Cheng Hong
and
others
Cryptography and Security
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
12 February 2020 by
Cheng Hong
and
others
Cryptography and Security
,
Cryptology
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
15 November 2018 by
Cheng Hong
and
others
Cryptography and Security
,
Cryptographic Protocols
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
27 December 2016 by
Wen-jie Lu
and
others
Cryptography and Security
,
Cryptographic Protocols