Alert button
Picture for Wee-Keong Ng

Wee-Keong Ng

Alert button

Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation

Jan 04, 2021
Jenn-Bing Ong, Wee-Keong Ng, Ivan Tjuawinata, Chao Li, Jielin Yang, Sai None Myne, Huaxiong Wang, Kwok-Yan Lam, C. -C. Jay Kuo

Figure 1 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 2 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 3 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 4 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Viaarxiv icon

Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition

Dec 11, 2018
Jenn-Bing Ong, Wee-Keong Ng, C. -C. Jay Kuo

Figure 1 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Figure 2 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Figure 3 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Figure 4 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Viaarxiv icon