Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HyperRouter: Towards Efficient Training and Inference of Sparse Mixture of Experts., , , , , , , , , and . CoRR, (2023)CompeteSMoE - Effective Training of Sparse Mixture of Experts via Competition., , , , , , , , , and 1 other author(s). CoRR, (2024)Online Harassment in Majority Contexts: Examining Harms and Remedies across Countries., , , , , , , , and . CHI, page 485:1-485:16. ACM, (2023)A Generalized Autorec Framework Applying Content-based Information for Resolving Data Sparsity Problem., , , , and . SoICT, page 181-188. ACM, (2023)Risc-V Random Test Generator., , , and . ACOMP, page 150-155. IEEE, (2021)Encrypted Set Intersection Protocol for Outsourced Datasets., , , , and . IC2E, page 135-140. IEEE Computer Society, (2014)Detection of Control Points for Warping Map Images., , , and . Intell. Autom. Soft Comput., 7 (3): 205-217 (2001)Cloud-enabled data sharing model., , , and . ISI, page 1-6. IEEE, (2012)Privacy-preserving approach for sharing and processing intrusion alert data., and . ISSNIP, page 1-6. IEEE, (2015)Privacy preserving query processing on outsourced data via secure multiparty computation. Nanyang Technological University, Singapore, (2018)