Alert button
Picture for Jong-Seon No

Jong-Seon No

Alert button

Optimizing Layerwise Polynomial Approximation for Efficient Private Inference on Fully Homomorphic Encryption: A Dynamic Programming Approach

Add code
Bookmark button
Alert button
Oct 16, 2023
Junghyun Lee, Eunsang Lee, Young-Sik Kim, Yongwoo Lee, Joon-Woo Lee, Yongjune Kim, Jong-Seon No

Viaarxiv icon

Boosting Learning for LDPC Codes to Improve the Error-Floor Performance

Add code
Bookmark button
Alert button
Oct 11, 2023
Hee-Youl Kwak, Dae-Young Yun, Yongjune Kim, Sang-Hyo Kim, Jong-Seon No

Figure 1 for Boosting Learning for LDPC Codes to Improve the Error-Floor Performance
Figure 2 for Boosting Learning for LDPC Codes to Improve the Error-Floor Performance
Figure 3 for Boosting Learning for LDPC Codes to Improve the Error-Floor Performance
Figure 4 for Boosting Learning for LDPC Codes to Improve the Error-Floor Performance
Viaarxiv icon

How to Mask in Error Correction Code Transformer: Systematic and Double Masking

Add code
Bookmark button
Alert button
Aug 25, 2023
Seong-Joon Park, Hee-Youl Kwak, Sang-Hyo Kim, Sunghwan Kim, Yongjune Kim, Jong-Seon No

Figure 1 for How to Mask in Error Correction Code Transformer: Systematic and Double Masking
Figure 2 for How to Mask in Error Correction Code Transformer: Systematic and Double Masking
Figure 3 for How to Mask in Error Correction Code Transformer: Systematic and Double Masking
Figure 4 for How to Mask in Error Correction Code Transformer: Systematic and Double Masking
Viaarxiv icon

Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network

Add code
Bookmark button
Alert button
Jun 14, 2021
Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No

Figure 1 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Figure 2 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Figure 3 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Figure 4 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Viaarxiv icon

Weakly Private Information Retrieval Under Rényi Divergence

Add code
Bookmark button
Alert button
May 17, 2021
Jun-Woo Tak, Sang-Hyo Kim, Yongjune Kim, Jong-Seon No

Figure 1 for Weakly Private Information Retrieval Under Rényi Divergence
Figure 2 for Weakly Private Information Retrieval Under Rényi Divergence
Figure 3 for Weakly Private Information Retrieval Under Rényi Divergence
Figure 4 for Weakly Private Information Retrieval Under Rényi Divergence
Viaarxiv icon

Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm

Add code
Bookmark button
Alert button
Mar 30, 2021
Seong-Joon Park, Yongwoo Lee, Jong-Seon No

Figure 1 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Figure 2 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Figure 3 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Figure 4 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Viaarxiv icon