default search action
Anyu Wang 0001
Person information
- affiliation: Tsinghua University, Institute for Advanced Study, Beijing, China
- affiliation (PhD 2015): Chinese Academy of Sciences, Key Laboratory of Mathematics Mechanization, Beijing, China
Other persons with the same name
- Anyu Wang — disambiguation page
- Anyu Wang 0002 — Fudan University, School of Management, Shanghai, China
- Anyu Wang 0004 — Guangdong OPPO Mobile Telecommunications Corp. Ltd., China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 592-616 (2024) - [c12]Tairong Huang, Shihe Ma, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. ACISP (1) 2024: 217-237 - [c11]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials over $\mathbb {Z}_{p^e}$. EUROCRYPT (2) 2024: 403-432 - [c10]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. LAMPS@CCS 2024: 69-76 - [i22]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. CoRR abs/2404.05188 (2024) - [i21]Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang:
JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models. CoRR abs/2406.09321 (2024) - [i20]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. CoRR abs/2409.11646 (2024) - [i19]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤpe. IACR Cryptol. ePrint Arch. 2024: 115 (2024) - [i18]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT. IACR Cryptol. ePrint Arch. 2024: 164 (2024) - [i17]Tairong Huang, Shihe Ma, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 171 (2024) - [i16]Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang:
Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms. IACR Cryptol. ePrint Arch. 2024: 1173 (2024) - [i15]Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, Xiaoyun Wang:
Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure. IACR Cryptol. ePrint Arch. 2024: 1306 (2024) - [i14]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. IACR Cryptol. ePrint Arch. 2024: 1403 (2024) - 2023
- [j5]Anyu Wang, Dianyan Xiao, Yang Yu:
Lattice-based cryptosystems in standardisation processes: A survey. IET Inf. Secur. 17(2): 227-243 (2023) - [c9]Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. ASIACRYPT (4) 2023: 167-200 - [c8]Tianrui Wang, Anyu Wang, Xiaoyun Wang:
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. CRYPTO (3) 2023: 70-100 - [i13]Yichen Gong, Delong Ran, Jinyuan Liu, Conglei Wang, Tianshuo Cong, Anyu Wang, Sisi Duan, Xiaoyun Wang:
FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts. CoRR abs/2311.05608 (2023) - [i12]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Cryptol. ePrint Arch. 2023: 645 (2023) - [i11]Tianrui Wang, Anyu Wang, Xiaoyun Wang:
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. IACR Cryptol. ePrint Arch. 2023: 659 (2023) - [i10]Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:
Exploiting the Symmetry of ℤn: Randomization and the Automorphism Problem. IACR Cryptol. ePrint Arch. 2023: 1735 (2023) - 2022
- [j4]Xue Zhang, Zhongxiang Zheng, Anyu Wang:
A Refinement of Key Mismatch Attack on NewHope. Comput. J. 65(8): 2209-2220 (2022) - [c7]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. ASIACRYPT (1) 2022: 287-317 - [i9]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. IACR Cryptol. ePrint Arch. 2022: 789 (2022) - 2021
- [c6]Chao Liu, Anyu Wang, Zhongxiang Zheng:
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE. ACISP 2021: 590-609 - [i8]Chao Liu, Anyu Wang, Zhongxiang Zheng:
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE. IACR Cryptol. ePrint Arch. 2021: 490 (2021) - 2020
- [i7]Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang:
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors. IACR Cryptol. ePrint Arch. 2020: 95 (2020)
2010 – 2019
- 2019
- [j3]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach. IEEE Trans. Inf. Theory 65(7): 4167-4179 (2019) - 2017
- [c5]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Bounds and constructions for linear locally repairable codes over binary fields. ISIT 2017: 2033-2037 - [i6]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Bounds and Constructions for Linear Locally Repairable Codes over Binary Fields. CoRR abs/1701.05989 (2017) - 2016
- [c4]Anyu Wang, Zhifang Zhang, Dongdai Lin:
Two classes of (r, t)-locally repairable codes. ISIT 2016: 445-449 - 2015
- [j2]Anyu Wang, Zhifang Zhang:
An Integer Programming-Based Bound for Locally Repairable Codes. IEEE Trans. Inf. Theory 61(10): 5280-5294 (2015) - [c3]Anyu Wang, Zhifang Zhang, Mulan Liu:
Achieving arbitrary locality and availability in binary codes. ISIT 2015: 1866-1870 - [i5]Anyu Wang, Zhifang Zhang:
Achieving Arbitrary Locality and Availability in Binary Codes. CoRR abs/1501.04264 (2015) - 2014
- [j1]Anyu Wang, Zhifang Zhang:
Repair Locality With Multiple Erasure Tolerance. IEEE Trans. Inf. Theory 60(11): 6979-6987 (2014) - [c2]Anyu Wang, Zhifang Zhang:
Repair locality from a combinatorial perspective. ISIT 2014: 1972-1976 - [i4]Anyu Wang, Zhifang Zhang:
Repair Locality From a Combinatorial Perspective. CoRR abs/1401.2607 (2014) - [i3]Anyu Wang, Zhifang Zhang:
An Integer Programming Based Bound for Locally Repairable Codes. CoRR abs/1409.0952 (2014) - 2013
- [c1]Anyu Wang, Zhifang Zhang:
Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage. INFOCOM 2013: 400-404 - [i2]Anyu Wang, Zhifang Zhang:
Repair Locality with Multiple Erasure Tolerance. CoRR abs/1306.4774 (2013) - 2012
- [i1]Anyu Wang, Zhifang Zhang:
Exact Cooperative Regenerating Codes with Minimum-Repair-Bandwidth for Distributed Storage. CoRR abs/1207.0879 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint