Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Machine Learning With Fully Homomorphic Encryption for Deep Neural Network., , , , , , , , , and 1 other author(s). IEEE Access, (2022)Compiler-Assisted Semantic-Aware Encryption for Efficient and Secure Serverless Computing., , , , , and . IEEE Internet Things J., 8 (7): 5645-5656 (2021)AxFTL: Exploiting Error Tolerance for Extending Lifetime of NAND Flash Storage., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (11): 3239-3249 (2020)Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm., , and . CoRR, (2021)Learning a family of motor skills from a single motion clip., , , and . ACM Trans. Graph., 40 (4): 93:1-93:13 (2021)Artificial intelligence-assisted auto-optical inspection toward the stain detection of an organic light-emitting diode panel at the backplane fabrication step., , , , and . Displays, (September 2023)ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption., , , , and . USENIX Security Symposium, page 4697-4714. USENIX Association, (2023)High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization., , , , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 551-580. Springer, (2022)Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem., , and . IEEE Commun. Lett., 21 (5): 971-974 (2017)Large Graph Processing Based on Remote Memory System., , , , , and . HPCC, page 533-537. IEEE, (2010)