Shiyu Shen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
A Second-Order Stationarity-Based Confidence Assessment Method for Temperature Forecast.
IEEE Geosci. Remote. Sens. Lett., 2025

2024
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IEEE Trans. Computers, December, 2024

Planning Service Protocols for Extra-Long Trains with Transfers.
Transp. Sci., 2024

High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature.
IEEE Trans. Parallel Distributed Syst., 2024

cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library.
IEEE Trans. Dependable Secur. Comput., 2024

Self-control: A Better Conditional Mechanism for Masked Autoregressive Model.
CoRR, 2024

Domain Generalization Guided by Large-Scale Pre-Trained Priors.
CoRR, 2024

2023
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things.
IEEE Trans. Computers, July, 2023

XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU.
IACR Cryptol. ePrint Arch., 2023

cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA.
IACR Cryptol. ePrint Arch., 2023

Bayesian Domain Invariant Learning via Posterior Generalization of Parameter Distributions.
CoRR, 2023

Be Bayesian by Attachments to Catch More Uncertainty.
CoRR, 2023

Poster Abstract: CNN-guardian: Secure Neural Network Inference Acceleration on Edge GPU.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023

2022
Compact and Flexible KEM From Ideal Lattice.
IEEE Trans. Inf. Theory, 2022

Identity-based authenticated encryption with identity confidentiality.
Theor. Comput. Sci., 2022

CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes.
IACR Cryptol. ePrint Arch., 2022

High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature.
CoRR, 2022

Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Convolutional Neural Network with a Learnable Spatial Activation Function for SAR Image Despeckling and Forest Image Analysis.
Remote. Sens., 2021

OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice.
CoRR, 2021

2020
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2018
Weakness Identification and Flow Analysis Based on Tor Network.
Proceedings of the 8th International Conference on Communication and Network Security, 2018


  Loading...