CSpace
(本次检索基于用户作品认领结果)

浏览/检索结果: 共70条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
On the Probability of Generating a Primitive Matrix 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 页码: 17
作者:  Chen, Jingwei;  Feng, Yong;  Liu, Yang;  Wu, Wenyuan
收藏  |  浏览/下载:183/0  |  提交时间:2024/04/07
Integer matrix  matrix completion  probabilistic algorithm  unimodular matrix  
Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing 期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 卷号: 15, 期号: 12, 页码: 4345-4363
作者:  Bai, Yanan;  Feng, Yong;  Wul, Wenyuan
收藏  |  浏览/下载:74/0  |  提交时间:2022/08/22
Privacy Preservation  Convolutional Neural Networks  Homomorphic Encryption  Mobile Cloud Computing  Deep Learning  
cuSCNN: A Secure and Batch-Processing Framework for Privacy-Preserving Convolutional Neural Network Prediction on GPU 期刊论文
FRONTIERS IN COMPUTATIONAL NEUROSCIENCE, 2021, 卷号: 15, 页码: 13
作者:  Bai, Yanan;  Liu, Quanliang;  Wu, Wenyuan;  Feng, Yong
收藏  |  浏览/下载:59/0  |  提交时间:2022/08/22
privacy-preserving  convolutional neural network  homomorphic encryption  GPU computation  deep learning  cloud computing  
Numerical roadmap of smooth bounded real algebraic surface 期刊论文
COMPUTER AIDED GEOMETRIC DESIGN, 2020, 卷号: 79, 页码: 16
作者:  Chen, Changbo;  Wu, Wenyuan;  Feng, Yong
收藏  |  浏览/下载:88/0  |  提交时间:2020/08/24
Roadmap  Silhouette  Critical point  Connectivity  
Visualizing Planar and Space Implicit Real Algebraic Curves with Singularities 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2020, 页码: 23
作者:  Chen, Changbo;  Wu, Wenyuan;  Feng, Yong
收藏  |  浏览/下载:92/0  |  提交时间:2020/08/24
Continuation method  critical point method  real algebraic curve  singularity  
基于LWE问题的发送方可否认公钥加密方案 期刊论文
工程科学与技术, 2020, 卷号: 052, 期号: 002, 页码: 192
作者:  吴文渊;  郑嘉彤;  冯勇
收藏  |  浏览/下载:52/0  |  提交时间:2020/12/01
抗量子攻击  可否认加密  公钥加密  模糊集  
seIMC: A GSW-Based Secure and Efficient Integer Matrix Computation Scheme With Implementation 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 98383-98394
作者:  Bai, Yanan;  Shi, Xiaoyu;  Wu, Wenyuan;  Chen, Jingwei;  Feng, Yong
收藏  |  浏览/下载:104/0  |  提交时间:2020/08/24
Encryption  Data privacy  Cloud computing  Lattices  Machine learning  Computational efficiency  Homomorphic encryption  matrix computation  machine learning  GSW encryption scheme  big data  privacy protection  
On ranking functions for single-path linear-constraint loops 期刊论文
INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2019, 页码: 12
作者:  Li, Yi;  Wu, Wenyuan;  Feng, Yong
收藏  |  浏览/下载:82/0  |  提交时间:2020/08/24
Software reliability  Program termination  Linear ranking functions  Farkas' lemma  
THE PSLQ ALGORITHM FOR EMPIRICAL DATA 期刊论文
MATHEMATICS OF COMPUTATION, 2019, 卷号: 88, 期号: 317, 页码: 1479-1501
作者:  Feng, Yong;  Chen, Jingwei;  Wu, Wenyuan
Adobe PDF(321Kb)  |  收藏  |  浏览/下载:247/0  |  提交时间:2019/03/01
Integer relation  PSLQ  empirical data  
A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE 期刊论文
SOFT COMPUTING, 2019, 卷号: 23, 期号: 5, 页码: 1735-1744
作者:  Wang, Huiyong;  Feng, Yong;  Ding, Yong;  Tang, Shijie
Adobe PDF(545Kb)  |  收藏  |  浏览/下载:153/0  |  提交时间:2019/03/25
LWE  FHE  Key homomorphism  SMC