default search action
Shiyu Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IEEE Trans. Computers 73(12): 2817-2829 (2024) - [j7]Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library. IEEE Trans. Dependable Secur. Comput. 21(5): 4895-4906 (2024) - [j6]Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 19: 3581-3592 (2024) - [j5]Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. IEEE Trans. Parallel Distributed Syst. 35(11): 1964-1976 (2024) - [i12]Zongbin Wang, Bin Pan, Shiyu Shen, Tianyang Shi, Zhenwei Shi:
Domain Generalization Guided by Large-Scale Pre-Trained Priors. CoRR abs/2406.05628 (2024) - [i11]Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. IACR Cryptol. ePrint Arch. 2024: 1365 (2024) - 2023
- [j4]Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao:
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things. IEEE Trans. Computers 72(7): 1999-2010 (2023) - [c4]Qipeng Xie, Hao Yang, Linshan Jiang, Zhihe Zhao, Siyang Jiang, Shiyu Shen, Salabat Khan, Zhe Liu, Kaishun Wu:
Poster Abstract: CNN-guardian: Secure Neural Network Inference Acceleration on Edge GPU. SenSys 2023: 524-525 - [i10]Shiyu Shen, Bin Pan, Tianyang Shi, Tao Li, Zhenwei Shi:
Be Bayesian by Attachments to Catch More Uncertainty. CoRR abs/2310.13027 (2023) - [i9]Shiyu Shen, Bin Pan, Tianyang Shi, Tao Li, Zhenwei Shi:
Bayesian Domain Invariant Learning via Posterior Generalization of Parameter Distributions. CoRR abs/2310.16277 (2023) - [i8]Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU. IACR Cryptol. ePrint Arch. 2023: 49 (2023) - [i7]Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, Yunlei Zhao:
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1428 (2023) - [i6]Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IACR Cryptol. ePrint Arch. 2023: 1429 (2023) - [i5]Shiyu Shen, Hao Yang, Wenqian Li, Yunlei Zhao:
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA. IACR Cryptol. ePrint Arch. 2023: 1522 (2023) - 2022
- [j3]Shiyu Shen, Hongbing Wang, Yunlei Zhao:
Identity-based authenticated encryption with identity confidentiality. Theor. Comput. Sci. 901: 1-18 (2022) - [j2]Zhengzhong Jin, Shiyu Shen, Yunlei Zhao:
Compact and Flexible KEM From Ideal Lattice. IEEE Trans. Inf. Theory 68(6): 3829-3840 (2022) - [c3]Jieyu Zheng, Feng He, Shiyu Shen, Chenxi Xue, Yunlei Zhao:
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation. ACSAC 2022: 304-317 - [i4]Shiyu Shen, Hao Yang, Wangchen Dai, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. CoRR abs/2211.12265 (2022) - [i3]Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao:
CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes. IACR Cryptol. ePrint Arch. 2022: 633 (2022) - [i2]Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022: 1621 (2022) - 2021
- [j1]Hao Wang, Zhendong Ding, Xinyi Li, Shiyu Shen, Xiaodong Ye, Dan Zhang, Shi-Fei Tao:
Convolutional Neural Network with a Learnable Spatial Activation Function for SAR Image Despeckling and Forest Image Analysis. Remote. Sens. 13(17): 3444 (2021) - [i1]Shiyu Shen, Feng He, Zhichuang Liang, Yang Wang, Yunlei Zhao:
OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice. CoRR abs/2109.02893 (2021) - 2020
- [c2]Zhichuang Liang, Shiyu Shen, Yuantao Shi, Dongni Sun, Chongxuan Zhang, Guoyun Zhang, Yunlei Zhao, Zhixiang Zhao:
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications. Inscrypt 2020: 415-432
2010 – 2019
- 2018
- [c1]Shiyu Shen, Jianlin Gao, Aitian Wu:
Weakness Identification and Flow Analysis Based on Tor Network. ICCNS 2018: 90-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint