Folgen
Anyu Wang
Anyu Wang
Institute for Advanced Study, Tsinghua University,
Bestätigte E-Mail-Adresse bei mail.tsinghua.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Repair locality with multiple erasure tolerance
A Wang, Z Zhang
IEEE Transactions on Information Theory 60 (11), 6979-6987, 2014
1792014
Achieving arbitrary locality and availability in binary codes
A Wang, Z Zhang, M Liu
2015 IEEE International Symposium on Information Theory (ISIT), 1866-1870, 2015
932015
An integer programming-based bound for locally repairable codes
A Wang, Z Zhang
IEEE Transactions on Information Theory 61 (10), 5280-5294, 2015
632015
Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage
A Wang, Z Zhang
2013 Proceedings IEEE INFOCOM, 400-404, 2013
632013
Repair locality from a combinatorial perspective
A Wang, Z Zhang
2014 IEEE International Symposium on Information Theory, 1972-1976, 2014
262014
Bounds for binary linear locally repairable codes via a sphere-packing approach
A Wang, Z Zhang, D Lin
IEEE Transactions on Information Theory 65 (7), 4167-4179, 2019
222019
Two classes of (r, t)-locally repairable codes
A Wang, Z Zhang, D Lin
2016 IEEE International Symposium on Information Theory (ISIT), 445-449, 2016
212016
Bounds and constructions for linear locally repairable codes over binary fields
A Wang, Z Zhang, D Lin
2017 IEEE International Symposium on Information Theory (ISIT), 2033-2037, 2017
192017
Figstep: Jailbreaking large vision-language models via typographic visual prompts
Y Gong, D Ran, J Liu, C Wang, T Cong, A Wang, S Duan, X Wang
arXiv preprint arXiv:2311.05608, 2023
132023
Fast and accurate: efficient full-domain functional bootstrap and digit decomposition for homomorphic computation
S Ma, T Huang, A Wang, Q Zhou, X Wang
Cryptology ePrint Archive, 2023
32023
Scloud: public key encryption and key encapsulation mechanism based on learning with errors
Z Zheng, A Wang, H Fan, C Zhao, C Liu, X Zhang
Cryptology ePrint Archive, 2020
32020
Lattice‐based cryptosystems in standardisation processes: A survey
A Wang, D Xiao, Y Yu
IET Information Security 17 (2), 227-243, 2023
22023
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT
S Ma, T Huang, A Wang, X Wang
Cryptology ePrint Archive, 2024
12024
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
T Wang, A Wang, X Wang
Annual International Cryptology Conference, 70-100, 2023
12023
Mind the tweakey schedule: cryptanalysis on skinnye-64-256
L Qin, X Dong, A Wang, J Hua, X Wang
International Conference on the Theory and Application of Cryptology and …, 2022
12022
A Refinement of Key Mismatch Attack on NewHope
X Zhang, Z Zheng, A Wang
The Computer Journal 65 (8), 2209-2220, 2022
12022
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging
T Cong, D Ran, Z Liu, X He, J Liu, Y Gong, Q Li, A Wang, X Wang
arXiv preprint arXiv:2404.05188, 2024
2024
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption
T Huang, S Ma, A Wang, XY Wang
Cryptology ePrint Archive, 2024
2024
Accelerating BGV Bootstrapping for Large Using Null Polynomials Over
S Ma, T Huang, A Wang, X Wang
Cryptology ePrint Archive, 2024
2024
Exploiting the Symmetry of : Randomization and the Automorphism Problem
K Jiang, A Wang, H Luo, G Liu, Y Yu, X Wang
International Conference on the Theory and Application of Cryptology and …, 2023
2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20