CSpace

Browse/Search Results:  1-10 of 39 Help

Selected(0)Clear Items/Page:    Sort:
On the Probability of Generating a Primitive Matrix 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 页码: 17
Authors:  Chen, Jingwei;  Feng, Yong;  Liu, Yang;  Wu, Wenyuan
Favorite  |  View/Download:194/0  |  Submit date:2024/04/07
Integer matrix  matrix completion  probabilistic algorithm  unimodular matrix  
Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing 期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 卷号: 15, 期号: 12, 页码: 4345-4363
Authors:  Bai, Yanan;  Feng, Yong;  Wul, Wenyuan
Favorite  |  View/Download:80/0  |  Submit date:2022/08/22
Privacy Preservation  Convolutional Neural Networks  Homomorphic Encryption  Mobile Cloud Computing  Deep Learning  
cuSCNN: A Secure and Batch-Processing Framework for Privacy-Preserving Convolutional Neural Network Prediction on GPU 期刊论文
FRONTIERS IN COMPUTATIONAL NEUROSCIENCE, 2021, 卷号: 15, 页码: 13
Authors:  Bai, Yanan;  Liu, Quanliang;  Wu, Wenyuan;  Feng, Yong
Favorite  |  View/Download:63/0  |  Submit date:2022/08/22
privacy-preserving  convolutional neural network  homomorphic encryption  GPU computation  deep learning  cloud computing  
Numerical roadmap of smooth bounded real algebraic surface 期刊论文
COMPUTER AIDED GEOMETRIC DESIGN, 2020, 卷号: 79, 页码: 16
Authors:  Chen, Changbo;  Wu, Wenyuan;  Feng, Yong
Favorite  |  View/Download:92/0  |  Submit date:2020/08/24
Roadmap  Silhouette  Critical point  Connectivity  
Visualizing Planar and Space Implicit Real Algebraic Curves with Singularities 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2020, 页码: 23
Authors:  Chen, Changbo;  Wu, Wenyuan;  Feng, Yong
Favorite  |  View/Download:96/0  |  Submit date:2020/08/24
Continuation method  critical point method  real algebraic curve  singularity  
seIMC: A GSW-Based Secure and Efficient Integer Matrix Computation Scheme With Implementation 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 98383-98394
Authors:  Bai, Yanan;  Shi, Xiaoyu;  Wu, Wenyuan;  Chen, Jingwei;  Feng, Yong
Favorite  |  View/Download:109/0  |  Submit date:2020/08/24
Encryption  Data privacy  Cloud computing  Lattices  Machine learning  Computational efficiency  Homomorphic encryption  matrix computation  machine learning  GSW encryption scheme  big data  privacy protection  
On ranking functions for single-path linear-constraint loops 期刊论文
INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2019, 页码: 12
Authors:  Li, Yi;  Wu, Wenyuan;  Feng, Yong
Favorite  |  View/Download:87/0  |  Submit date:2020/08/24
Software reliability  Program termination  Linear ranking functions  Farkas' lemma  
THE PSLQ ALGORITHM FOR EMPIRICAL DATA 期刊论文
MATHEMATICS OF COMPUTATION, 2019, 卷号: 88, 期号: 317, 页码: 1479-1501
Authors:  Feng, Yong;  Chen, Jingwei;  Wu, Wenyuan
Adobe PDF(321Kb)  |  Favorite  |  View/Download:253/0  |  Submit date:2019/03/01
Integer relation  PSLQ  empirical data  
A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE 期刊论文
SOFT COMPUTING, 2019, 卷号: 23, 期号: 5, 页码: 1735-1744
Authors:  Wang, Huiyong;  Feng, Yong;  Ding, Yong;  Tang, Shijie
Adobe PDF(545Kb)  |  Favorite  |  View/Download:156/0  |  Submit date:2019/03/25
LWE  FHE  Key homomorphism  SMC  
Detection of Ranking Functions of Polynomial Loop Programs 期刊论文
Ruan Jian Xue Bao/Journal of Software, 2019, 卷号: 30, 期号: 11, 页码: 3243-3258
Authors:  Li, Yi;  Feng, Yong
Favorite  |  View/Download:118/0  |  Submit date:2020/02/18