Repair locality with multiple erasure tolerance A Wang, Z Zhang
IEEE Transactions on Information Theory 60 (11), 6979-6987, 2014
179 2014 Achieving arbitrary locality and availability in binary codes A Wang, Z Zhang, M Liu
2015 IEEE International Symposium on Information Theory (ISIT), 1866-1870, 2015
93 2015 An integer programming-based bound for locally repairable codes A Wang, Z Zhang
IEEE Transactions on Information Theory 61 (10), 5280-5294, 2015
63 2015 Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage A Wang, Z Zhang
2013 Proceedings IEEE INFOCOM, 400-404, 2013
63 2013 Repair locality from a combinatorial perspective A Wang, Z Zhang
2014 IEEE International Symposium on Information Theory, 1972-1976, 2014
26 2014 Bounds for binary linear locally repairable codes via a sphere-packing approach A Wang, Z Zhang, D Lin
IEEE Transactions on Information Theory 65 (7), 4167-4179, 2019
22 2019 Two classes of (r, t)-locally repairable codes A Wang, Z Zhang, D Lin
2016 IEEE International Symposium on Information Theory (ISIT), 445-449, 2016
21 2016 Bounds and constructions for linear locally repairable codes over binary fields A Wang, Z Zhang, D Lin
2017 IEEE International Symposium on Information Theory (ISIT), 2033-2037, 2017
19 2017 Figstep: Jailbreaking large vision-language models via typographic visual prompts Y Gong, D Ran, J Liu, C Wang, T Cong, A Wang, S Duan, X Wang
arXiv preprint arXiv:2311.05608, 2023
13 2023 Fast and accurate: efficient full-domain functional bootstrap and digit decomposition for homomorphic computation S Ma, T Huang, A Wang, Q Zhou, X Wang
Cryptology ePrint Archive, 2023
3 2023 Scloud: public key encryption and key encapsulation mechanism based on learning with errors Z Zheng, A Wang, H Fan, C Zhao, C Liu, X Zhang
Cryptology ePrint Archive, 2020
3 2020 Lattice‐based cryptosystems in standardisation processes: A survey A Wang, D Xiao, Y Yu
IET Information Security 17 (2), 227-243, 2023
2 2023 Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT S Ma, T Huang, A Wang, X Wang
Cryptology ePrint Archive, 2024
1 2024 Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks T Wang, A Wang, X Wang
Annual International Cryptology Conference, 70-100, 2023
1 2023 Mind the tweakey schedule: cryptanalysis on skinnye-64-256 L Qin, X Dong, A Wang, J Hua, X Wang
International Conference on the Theory and Application of Cryptology and …, 2022
1 2022 A Refinement of Key Mismatch Attack on NewHope X Zhang, Z Zheng, A Wang
The Computer Journal 65 (8), 2209-2220, 2022
1 2022 Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging T Cong, D Ran, Z Liu, X He, J Liu, Y Gong, Q Li, A Wang, X Wang
arXiv preprint arXiv:2404.05188, 2024
2024 Approximate Methods for the Computation of Step Functions in Homomorphic Encryption T Huang, S Ma, A Wang, XY Wang
Cryptology ePrint Archive, 2024
2024 Accelerating BGV Bootstrapping for Large Using Null Polynomials Over S Ma, T Huang, A Wang, X Wang
Cryptology ePrint Archive, 2024
2024 Exploiting the Symmetry of : Randomization and the Automorphism Problem K Jiang, A Wang, H Luo, G Liu, Y Yu, X Wang
International Conference on the Theory and Application of Cryptology and …, 2023
2023