Author of the publication

Optimizing Layerwise Polynomial Approximation for Efficient Private Inference on Fully Homomorphic Encryption: A Dynamic Programming Approach.

, , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AxFTL: Exploiting Error Tolerance for Extending Lifetime of NAND Flash Storage., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (11): 3239-3249 (2020)Large Graph Processing Based on Remote Memory System., , , , , and . HPCC, page 533-537. IEEE, (2010)A RESTful Approach to the Management of Cloud Infrastructure., , , , , , and . IEEE CLOUD, page 139-142. IEEE Computer Society, (2009)High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization., , , , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 551-580. Springer, (2022)ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption., , , , and . USENIX Security Symposium, page 4697-4714. USENIX Association, (2023)Learning a family of motor skills from a single motion clip., , , and . ACM Trans. Graph., 40 (4): 93:1-93:13 (2021)Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem., , and . IEEE Commun. Lett., 21 (5): 971-974 (2017)DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption., , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)HECATE: Performance-Aware Scale Optimization for Homomorphic Encryption Compiler., , , , , , , and . CGO, page 193-204. IEEE, (2022)Adaptive Graph Convolution Module for Salient Object Detection., , , and . ICIP, page 1395-1399. IEEE, (2023)