123 results on '"Haifeng Qian"'
Search Results
2. Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection.
3. BASS: Batched Attention-optimized Speculative Sampling.
4. Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions.
5. Registered Functional Encryptions from Pairings.
6. Joint Beamforming Design for Secure Communications Over An IRS-Aided Untrusted Relay Network.
7. Bifurcated Attention for Single-Context Large-Batch Sampling.
8. Registered ABE via Predicate Encodings.
9. Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study.
10. Approximate Inference in Logical Credal Networks.
11. ReCode: Robustness Evaluation of Code Generation Models.
12. IRS-Aided Secure Communications over an Untrusted AF Relay System.
13. Verify Deep Learning Models Ownership via Preset Embedding.
14. MEW: Evading Ownership Detection Against Deep Learning Models.
15. Enhancing RUP security for the OCB mode.
16. Multi-lingual Evaluation of Code Generation Models.
17. Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models.
18. LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW.
19. Imitating Full-Duplex Secure Communication with Buffer-Aided Half-Duplex Relays.
20. Updatable All-But-One Dual Projective Hashing and Its Applications.
21. Logical Credal Networks.
22. PALOR: Poisoning Attacks Against Logistic Regression.
23. Beamforming Design for Intelligent Reflecting Surface Aided Multi-Antenna MU-MIMO Communications with Imperfect CSI.
24. Neural Belief Reasoner.
25. Efficient Bandwidth Allocation for URLLC in Frequency-Selective Fading Channels.
26. Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm.
27. Linear Scalability from Sharding and PoS.
28. Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network.
29. FinExpert: domain-specific test generation for FinTech systems.
30. An Encrypted Database with Enforced Access Control and Blockchain Validation.
31. CCA Secure Multi-recipient KEM from LPN.
32. Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor.
33. Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure Communications.
34. Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
35. Buffer-aided secure two-hop communications with adaptive link selection and on/off power control.
36. Collaboratively filtering malware infections: a tensor decomposition approach.
37. Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers.
38. Multi-resolution codebook design for two-stage precoding in FDD massive MIMO networks.
39. L2-Nonexpansive Neural Networks.
40. Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
41. You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users.
42. Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
43. Gate movement for timing improvement on row based Dual-VDD designs.
44. On the design of broadbeam for massive MIMO systems.
45. Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks.
46. I know where you are: Thwarting privacy protection in location-based social discovery services.
47. Broadbeam design for massive MIMO systems with uniform rectangular array.
48. A statistical methodology for noise sensor placement and full-chip voltage map generation.
49. Bridging high performance and low power in processor design.
50. A hybrid random walk algorithm for 3-D thermal analysis of integrated circuits.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.