Follow
Wen Wang
Title
Cited by
Cited by
Year
Bert for joint intent classification and slot filling
Q Chen, Z Zhuo, W Wang
arXiv preprint arXiv:1902.10909, 2019
7102019
Round 1 Classic McEliece: Conservative Code-Based Cryptography
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
NIST PQC Standardization Process - 1st Round, 2017, 2017
212*2017
Classic mceliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
National Institute of Standards and Technology, Tech. Rep, 2020
942020
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes
W Wang, J Szefer, R Niederhagen
International Conference on Post-Quantum Cryptography (PQCrypto), 2018, 2018
922018
Align, mask and select: A simple method for incorporating commonsense knowledge into language representation models
ZX Ye, Q Chen, W Wang, ZH Ling
arXiv preprint arXiv:1908.06725, 2019
822019
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen
Selected Areas in Cryptography (SAC), 2019, 2019
772019
Lauragpt: Listen, attend, understand, and regenerate audio with gpt
Z Du, J Wang, Q Chen, Y Chu, Z Gao, Z Li, K Hu, X Zhou, J Xu, Z Ma, ...
arXiv preprint arXiv:2310.04673, 2023
742023
Does Participatory Budgeting Improve the Legitimacy of the Local Government?: A Comparative Case Study of Two Cities in China (参与式预算是否能提高地方政府的合法性?: 中国两个城 …
Y Wu, W Wang
Australian Journal of Public Administration 71 (2), 122-135, 2012
692012
Classic McEliece: conservative code-based cryptography
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
672022
MDERank: A masked document embedding rank approach for unsupervised keyphrase extraction
L Zhang, Q Chen, W Wang, C Deng, SL Zhang, B Li, W Wang, X Cao
arXiv preprint arXiv:2110.06651, 2021
622021
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
W Wang, J Szefer, R Niederhage
Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017, 2017
532017
Controllable time-delay transformer for real-time punctuation prediction and disfluency detection
Q Chen, M Chen, B Li, W Wang
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
472020
Parameterized Hardware Accelerators for Lattice-based Cryptography and Their Application to the HW/SW Co-design of qTesla
W Wang, S Tian, B Jungk, N Bindel, P Longa, J Szefer
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES …, 2020
442020
The rationalization of public budgeting in China: a reflection on participatory budgeting in Wuxi
Y Wu, W Wang
Public Finance and Management 11 (3), 262-283, 2011
432011
Classic mceliece
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
392017
Scalable and conflict-free NTT hardware accelerator design: Methodology, proof, and implementation
J Mu, Y Ren, W Wang, Y Hu, S Chen, CH Chang, J Fan, J Ye, Y Cao, H Li, ...
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022
332022
Complete and improved FPGA implementation of classic McEliece
PJ Chen, T Chou, S Deshpande, N Lahr, R Niederhagen, J Szefer, ...
Cryptology ePrint Archive, 2022
312022
Optimized Polynomial Multiplier over Commutative Rings on FPGAs: A Case Study on BIKE
J Hu, W Wang, RCC Cheung, H Wang
International Conference on Field-Programmable Technology (ICFPT), 2019, 231-234, 2019
282019
The Cost to Break SIKE: A Comparative Hardware-based Analysis with AES and SHA-3
P Longa, W Wang, J Szefer
Annual International Cryptology Conference (CRYPTO), 2021, 402-431, 2021
262021
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS
P Mohan, W Wang, B Jungk, R Niederhagen, J Szefer, K Mai
IEEE 38th International Conference on Computer Design (ICCD), 2020, 656-662, 2020
242020
The system can't perform the operation now. Try again later.
Articles 1–20