Repair locality with multiple erasure tolerance A Wang, Z Zhang
IEEE Transactions on Information Theory 60 (11), 6979-6987, 2014
195 2014 Figstep: Jailbreaking large vision-language models via typographic visual prompts Y Gong, D Ran, J Liu, C Wang, T Cong, A Wang, S Duan, X Wang
arXiv preprint arXiv:2311.05608, 2023
117 2023 Achieving arbitrary locality and availability in binary codes A Wang, Z Zhang, M Liu
2015 IEEE International Symposium on Information Theory (ISIT), 1866-1870, 2015
95 2015 An integer programming-based bound for locally repairable codes A Wang, Z Zhang
IEEE Transactions on Information Theory 61 (10), 5280-5294, 2015
66 2015 Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage A Wang, Z Zhang
2013 Proceedings IEEE INFOCOM, 400-404, 2013
63 2013 Repair locality from a combinatorial perspective A Wang, Z Zhang
2014 IEEE International Symposium on Information Theory, 1972-1976, 2014
26 2014 Bounds for binary linear locally repairable codes via a sphere-packing approach A Wang, Z Zhang, D Lin
IEEE Transactions on Information Theory 65 (7), 4167-4179, 2019
23 2019 Two classes of (r, t)-locally repairable codes A Wang, Z Zhang, D Lin
2016 IEEE International Symposium on Information Theory (ISIT), 445-449, 2016
21 2016 Bounds and constructions for linear locally repairable codes over binary fields A Wang, Z Zhang, D Lin
2017 IEEE International Symposium on Information Theory (ISIT), 2033-2037, 2017
19 2017 Jailbreakeval: An integrated toolkit for evaluating jailbreak attempts against large language models D Ran, J Liu, Y Gong, J Zheng, X He, T Cong, A Wang
arXiv preprint arXiv:2406.09321, 2024
14 2024 Fast and accurate: efficient full-domain functional bootstrap and digit decomposition for homomorphic computation S Ma, T Huang, A Wang, Q Zhou, X Wang
Cryptology ePrint Archive, 2023
12 2023 Accelerating BGV Bootstrapping for Large p Using Null Polynomials over S Ma, T Huang, A Wang, X Wang
Annual International Conference on the Theory and Applications of …, 2024
10 2024 Lattice‐based cryptosystems in standardisation processes: A survey A Wang, D Xiao, Y Yu
IET Information Security 17 (2), 227-243, 2023
9 2023 Have you merged my model? on the robustness of large language model ip protection methods against model merging T Cong, D Ran, Z Liu, X He, J Liu, Y Gong, Q Li, A Wang, X Wang
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with …, 2023
7 2023 Exploring decryption failures of bike: New class of weak keys and key recovery attacks T Wang, A Wang, X Wang
Annual International Cryptology Conference, 70-100, 2023
7 2023 Mind the tweakey schedule: cryptanalysis on skinnye-64-256 L Qin, X Dong, A Wang, J Hua, X Wang
International Conference on the Theory and Application of Cryptology and …, 2022
4 2022 Scloud: Public key encryption and key encapsulation mechanism based on learning with errors Z Zheng, A Wang, H Fan, C Zhao, C Liu, X Zhang
Cryptology ePrint Archive, 2020
4 2020 Faster BGV Bootstrapping for Power-of-Two Cyclotomics Through Homomorphic NTT S Ma, T Huang, A Wang, X Wang
International Conference on the Theory and Application of Cryptology and …, 2025
3 2025 Cryptanalysis of rank-2 module-LIP with symplectic automorphisms H Luo, K Jiang, Y Pan, A Wang
International Conference on the Theory and Application of Cryptology and …, 2024
3 2024 Unbalanced private set union with reduced computation and communication C Zhang, Y Chen, W Liu, L Peng, M Hao, A Wang, X Wang
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
3 2024