Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MonoNN: Enabling a New Monolithic Optimization Space for Neural Network Inference Tasks on Modern GPU-Centric Architectures., , , , , , and . OSDI, page 989-1005. USENIX Association, (2024)Flash-LLM: Enabling Low-Cost and Highly-Efficient Large Generative Model Inference With Unstructured Sparsity., , , , , , , , and . Proc. VLDB Endow., 17 (2): 211-224 (2023)Shift-BNN: Highly-Efficient Probabilistic Bayesian Neural Network Training via Memory-Friendly Pattern Retrieving., , , , , and . MICRO, page 885-897. ACM, (2021)Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs., , , , , , , , , and 3 other author(s). USENIX ATC, page 699-713. USENIX Association, (2024)Flash-LLM: Enabling Cost-Effective and Highly-Efficient Large Generative Model Inference with Unstructured Sparsity., , , , , , , , and . CoRR, (2023)Continuous Authentication Technology Based on Device Driver Behavior., , , , , and . CSCWD, page 2806-2811. IEEE, (2024)Enabling Fast and Memory-Efficient Acceleration for Pattern Matching Workloads: The Lightweight Automata Processing Engine., , , , , and . IEEE Trans. Computers, 72 (4): 1011-1025 (April 2023)HyperKRP: A Kernel Runtime Security Architecture with A Tiny Hypervisor on Commodity Hardware., , , , and . GLOBECOM, page 1-6. IEEE, (2021)Desktop Virtualization Optimization Methods Based on IDV Architecture., , , and . CSCWD, page 2894-2899. IEEE, (2024)EI-XIDS: An explainable intrusion detection system based on integration framework., , , , and . CSCWD, page 2680-2685. IEEE, (2024)