Repair locality with multiple erasure tolerance A Wang, Z Zhang IEEE Transactions on Information Theory 60 (11), 6979-6987, 2014 | 179 | 2014 |
Achieving arbitrary locality and availability in binary codes A Wang, Z Zhang, M Liu 2015 IEEE International Symposium on Information Theory (ISIT), 1866-1870, 2015 | 93 | 2015 |
An integer programming-based bound for locally repairable codes A Wang, Z Zhang IEEE Transactions on Information Theory 61 (10), 5280-5294, 2015 | 63 | 2015 |
Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage A Wang, Z Zhang 2013 Proceedings IEEE INFOCOM, 400-404, 2013 | 63 | 2013 |
Repair locality from a combinatorial perspective A Wang, Z Zhang 2014 IEEE International Symposium on Information Theory, 1972-1976, 2014 | 26 | 2014 |
Bounds for binary linear locally repairable codes via a sphere-packing approach A Wang, Z Zhang, D Lin IEEE Transactions on Information Theory 65 (7), 4167-4179, 2019 | 22 | 2019 |
Two classes of (r, t)-locally repairable codes A Wang, Z Zhang, D Lin 2016 IEEE International Symposium on Information Theory (ISIT), 445-449, 2016 | 21 | 2016 |
Bounds and constructions for linear locally repairable codes over binary fields A Wang, Z Zhang, D Lin 2017 IEEE International Symposium on Information Theory (ISIT), 2033-2037, 2017 | 19 | 2017 |
Figstep: Jailbreaking large vision-language models via typographic visual prompts Y Gong, D Ran, J Liu, C Wang, T Cong, A Wang, S Duan, X Wang arXiv preprint arXiv:2311.05608, 2023 | 14 | 2023 |
Lattice‐based cryptosystems in standardisation processes: A survey A Wang, D Xiao, Y Yu IET Information Security 17 (2), 227-243, 2023 | 4 | 2023 |
Fast and accurate: efficient full-domain functional bootstrap and digit decomposition for homomorphic computation S Ma, T Huang, A Wang, Q Zhou, X Wang Cryptology ePrint Archive, 2023 | 4 | 2023 |
Accelerating BGV Bootstrapping for Large p Using Null Polynomials over S Ma, T Huang, A Wang, X Wang Annual International Conference on the Theory and Applications of …, 2024 | 3 | 2024 |
Scloud: public key encryption and key encapsulation mechanism based on learning with errors Z Zheng, A Wang, H Fan, C Zhao, C Liu, X Zhang Cryptology ePrint Archive, 2020 | 3 | 2020 |
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT S Ma, T Huang, A Wang, X Wang Cryptology ePrint Archive, 2024 | 1 | 2024 |
Accelerating BGV Bootstrapping for Large Using Null Polynomials Over S Ma, T Huang, A Wang, X Wang Cryptology ePrint Archive, 2024 | 1 | 2024 |
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks T Wang, A Wang, X Wang Annual International Cryptology Conference, 70-100, 2023 | 1 | 2023 |
Mind the tweakey schedule: cryptanalysis on skinnye-64-256 L Qin, X Dong, A Wang, J Hua, X Wang International Conference on the Theory and Application of Cryptology and …, 2022 | 1 | 2022 |
A Refinement of Key Mismatch Attack on NewHope X Zhang, Z Zheng, A Wang The Computer Journal 65 (8), 2209-2220, 2022 | 1 | 2022 |
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging T Cong, D Ran, Z Liu, X He, J Liu, Y Gong, Q Li, A Wang, X Wang arXiv preprint arXiv:2404.05188, 2024 | | 2024 |
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption T Huang, S Ma, A Wang, XY Wang Cryptology ePrint Archive, 2024 | | 2024 |