2 code implementations • 26 Feb 2024 • Zhihang Yuan, Yuzhang Shang, Yang Zhou, Zhen Dong, Zhe Zhou, Chenhao Xue, Bingzhe Wu, Zhikai Li, Qingyi Gu, Yong Jae Lee, Yan Yan, Beidi Chen, Guangyu Sun, Kurt Keutzer
Our survey stands out from traditional literature reviews by not only summarizing the current state of research but also by introducing a framework based on roofline model for systematic analysis of LLM inference techniques.
1 code implementation • 11 Dec 2021 • Jiacen Xu, Zhe Zhou, Boyuan Feng, Yufei Ding, Zhou Li
As such, we present a comparative study of PCSS robustness.
no code implementations • 1 Nov 2021 • Zhe Zhou, Cong Li, Xuechao Wei, Xiaoyang Wang, Guangyu Sun
However, to realize efficient GNN training is challenging, especially on large graphs.
no code implementations • 18 Oct 2021 • Zhe Zhou, Junlin Liu, Zhenyu Gu, Guangyu Sun
To enable such an algorithm with lower latency and better energy efficiency, we also propose an Energon co-processor architecture.
no code implementations • 13 Apr 2021 • Zhe Zhou, Bizhao Shi, Zhe Zhang, Yijin Guan, Guangyu Sun, Guojie Luo
At the hardware design level, we propose a pipelined CirCore architecture, which supports efficient block-circulant matrices computation.
no code implementations • 13 Mar 2018 • Zhe Zhou, Di Tang, Xiao-Feng Wang, Weili Han, Xiangyu Liu, Kehuan Zhang
We propose a kind of brand new attack against face recognition systems, which is realized by illuminating the subject using infrared according to the adversarial examples worked out by our algorithm, thus face recognition systems can be bypassed or misled while simultaneously the infrared perturbations cannot be observed by raw eyes.
Cryptography and Security
no code implementations • 6 Jan 2018 • Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang
The overall accuracy of our liveness detection system is 98. 8\%, and its robustness was evaluated in different scenarios.