Alert button
Picture for Jingwen Leng

Jingwen Leng

Alert button

Block-Skim: Efficient Question Answering for Transformer

Dec 16, 2021
Yue Guan, Zhengyi Li, Jingwen Leng, Zhouhan Lin, Minyi Guo, Yuhao Zhu

Figure 1 for Block-Skim: Efficient Question Answering for Transformer
Figure 2 for Block-Skim: Efficient Question Answering for Transformer
Figure 3 for Block-Skim: Efficient Question Answering for Transformer
Figure 4 for Block-Skim: Efficient Question Answering for Transformer
Viaarxiv icon

Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection

Sep 08, 2021
Shulai Zhang, Zirui Li, Quan Chen, Wenli Zheng, Jingwen Leng, Minyi Guo

Figure 1 for Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection
Figure 2 for Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection
Figure 3 for Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection
Figure 4 for Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection
Viaarxiv icon

Dual-side Sparse Tensor Core

May 20, 2021
Yang Wang, Chen Zhang, Zhiqiang Xie, Cong Guo, Yunxin Liu, Jingwen Leng

Figure 1 for Dual-side Sparse Tensor Core
Figure 2 for Dual-side Sparse Tensor Core
Figure 3 for Dual-side Sparse Tensor Core
Figure 4 for Dual-side Sparse Tensor Core
Viaarxiv icon

How Far Does BERT Look At:Distance-based Clustering and Analysis of BERT$'$s Attention

Nov 03, 2020
Yue Guan, Jingwen Leng, Chao Li, Quan Chen, Minyi Guo

Figure 1 for How Far Does BERT Look At:Distance-based Clustering and Analysis of BERT$'$s Attention
Figure 2 for How Far Does BERT Look At:Distance-based Clustering and Analysis of BERT$'$s Attention
Figure 3 for How Far Does BERT Look At:Distance-based Clustering and Analysis of BERT$'$s Attention
Figure 4 for How Far Does BERT Look At:Distance-based Clustering and Analysis of BERT$'$s Attention
Viaarxiv icon

Architectural Implications of Graph Neural Networks

Sep 02, 2020
Zhihui Zhang, Jingwen Leng, Lingxiao Ma, Youshan Miao, Chao Li, Minyi Guo

Figure 1 for Architectural Implications of Graph Neural Networks
Figure 2 for Architectural Implications of Graph Neural Networks
Figure 3 for Architectural Implications of Graph Neural Networks
Figure 4 for Architectural Implications of Graph Neural Networks
Viaarxiv icon

Accelerating Sparse DNN Models without Hardware-Support via Tile-Wise Sparsity

Aug 29, 2020
Cong Guo, Bo Yang Hsueh, Jingwen Leng, Yuxian Qiu, Yue Guan, Zehuan Wang, Xiaoying Jia, Xipeng Li, Minyi Guo, Yuhao Zhu

Figure 1 for Accelerating Sparse DNN Models without Hardware-Support via Tile-Wise Sparsity
Figure 2 for Accelerating Sparse DNN Models without Hardware-Support via Tile-Wise Sparsity
Figure 3 for Accelerating Sparse DNN Models without Hardware-Support via Tile-Wise Sparsity
Figure 4 for Accelerating Sparse DNN Models without Hardware-Support via Tile-Wise Sparsity
Viaarxiv icon

Balancing Efficiency and Flexibility for DNN Acceleration via Temporal GPU-Systolic Array Integration

Feb 18, 2020
Cong Guo, Yangjie Zhou, Jingwen Leng, Yuhao Zhu, Zidong Du, Quan Chen, Chao Li, Minyi Guo, Bin Yao

Figure 1 for Balancing Efficiency and Flexibility for DNN Acceleration via Temporal GPU-Systolic Array Integration
Figure 2 for Balancing Efficiency and Flexibility for DNN Acceleration via Temporal GPU-Systolic Array Integration
Figure 3 for Balancing Efficiency and Flexibility for DNN Acceleration via Temporal GPU-Systolic Array Integration
Figure 4 for Balancing Efficiency and Flexibility for DNN Acceleration via Temporal GPU-Systolic Array Integration
Viaarxiv icon

Adversarial Defense Through Network Profiling Based Path Extraction

May 09, 2019
Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu

Figure 1 for Adversarial Defense Through Network Profiling Based Path Extraction
Figure 2 for Adversarial Defense Through Network Profiling Based Path Extraction
Figure 3 for Adversarial Defense Through Network Profiling Based Path Extraction
Figure 4 for Adversarial Defense Through Network Profiling Based Path Extraction
Viaarxiv icon