Bert for joint intent classification and slot filling Q Chen, Z Zhuo, W Wang arXiv preprint arXiv:1902.10909, 2019 | 710 | 2019 |
Round 1 Classic McEliece: Conservative Code-Based Cryptography DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... NIST PQC Standardization Process - 1st Round, 2017, 2017 | 212* | 2017 |
Classic mceliece MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ... National Institute of Standards and Technology, Tech. Rep, 2020 | 94 | 2020 |
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes W Wang, J Szefer, R Niederhagen International Conference on Post-Quantum Cryptography (PQCrypto), 2018, 2018 | 92 | 2018 |
Align, mask and select: A simple method for incorporating commonsense knowledge into language representation models ZX Ye, Q Chen, W Wang, ZH Ling arXiv preprint arXiv:1908.06725, 2019 | 82 | 2019 |
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen Selected Areas in Cryptography (SAC), 2019, 2019 | 77 | 2019 |
Lauragpt: Listen, attend, understand, and regenerate audio with gpt Z Du, J Wang, Q Chen, Y Chu, Z Gao, Z Li, K Hu, X Zhou, J Xu, Z Ma, ... arXiv preprint arXiv:2310.04673, 2023 | 74 | 2023 |
Does Participatory Budgeting Improve the Legitimacy of the Local Government?: A Comparative Case Study of Two Cities in China (参与式预算是否能提高地方政府的合法性?: 中国两个城 … Y Wu, W Wang Australian Journal of Public Administration 71 (2), 122-135, 2012 | 69 | 2012 |
Classic McEliece: conservative code-based cryptography MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ... | 67 | 2022 |
MDERank: A masked document embedding rank approach for unsupervised keyphrase extraction L Zhang, Q Chen, W Wang, C Deng, SL Zhang, B Li, W Wang, X Cao arXiv preprint arXiv:2110.06651, 2021 | 62 | 2021 |
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes W Wang, J Szefer, R Niederhage Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017, 2017 | 53 | 2017 |
Controllable time-delay transformer for real-time punctuation prediction and disfluency detection Q Chen, M Chen, B Li, W Wang ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 47 | 2020 |
Parameterized Hardware Accelerators for Lattice-based Cryptography and Their Application to the HW/SW Co-design of qTesla W Wang, S Tian, B Jungk, N Bindel, P Longa, J Szefer IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES …, 2020 | 44 | 2020 |
The rationalization of public budgeting in China: a reflection on participatory budgeting in Wuxi Y Wu, W Wang Public Finance and Management 11 (3), 262-283, 2011 | 43 | 2011 |
Classic mceliece DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... | 39 | 2017 |
Scalable and conflict-free NTT hardware accelerator design: Methodology, proof, and implementation J Mu, Y Ren, W Wang, Y Hu, S Chen, CH Chang, J Fan, J Ye, Y Cao, H Li, ... IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022 | 33 | 2022 |
Complete and improved FPGA implementation of classic McEliece PJ Chen, T Chou, S Deshpande, N Lahr, R Niederhagen, J Szefer, ... Cryptology ePrint Archive, 2022 | 31 | 2022 |
Optimized Polynomial Multiplier over Commutative Rings on FPGAs: A Case Study on BIKE J Hu, W Wang, RCC Cheung, H Wang International Conference on Field-Programmable Technology (ICFPT), 2019, 231-234, 2019 | 28 | 2019 |
The Cost to Break SIKE: A Comparative Hardware-based Analysis with AES and SHA-3 P Longa, W Wang, J Szefer Annual International Cryptology Conference (CRYPTO), 2021, 402-431, 2021 | 26 | 2021 |
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS P Mohan, W Wang, B Jungk, R Niederhagen, J Szefer, K Mai IEEE 38th International Conference on Computer Design (ICCD), 2020, 656-662, 2020 | 24 | 2020 |