default search action
Wei Dai 0007
Person information
- affiliation: Microsoft Research, Redmond, WA, USA
- affiliation (PhD 2019): Worcester Polytechnic Institute, MA, USA
Other persons with the same name
- Wei Dai — disambiguation page
- Wei Dai 0001 — Imperial College London, Department of Electrical and Electronic Engineering, UK (and 2 more)
- Wei Dai 0002 — Agora.io, Inc. (and 1 more)
- Wei Dai 0003 — Petuum Inc., Pittsburgh, PA, USA (and 1 more)
- Wei Dai 0004 — China University of Mining Technology, School of Information and Electrical Engineering, Xuzhou, China (and 1 more)
- Wei Dai 0005 — Beihang University, School of Reliability and System Engineering, Beijing, China
- Wei Dai 0006 — New York University School of Medicine, NY, USA (and 1 more)
- Wei Dai 0008 — University of California, Santa Barbara, USA
- Wei Dai 0009 — Victoria University, Melbourne, Australia
- Wei Dai 0010 — University of California Irvine, Irvine, CA, USA
- Wei Dai 0011 — University of California, San Diego, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. SP 2024: 1122-1140 - [c14]Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans:
Combing for Credentials: Active Pattern Extraction from Smart Reply. SP 2024: 1443-1461 - [i21]Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, Bahattin Yildiz:
Security Guidelines for Implementing Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 463 (2024) - 2023
- [c13]Pardis Emami Naeini, Joseph Breda, Wei Dai, Tadayoshi Kohno, Kim Laine, Shwetak N. Patel, Franziska Roesner:
Understanding People's Concerns and Attitudes Toward Smart Cities. CHI 2023: 71:1-71:24 - [i20]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. CoRR abs/2301.02344 (2023) - [i19]Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine:
Does Prompt-Tuning Language Model Ensure Privacy? CoRR abs/2304.03472 (2023) - 2022
- [c12]Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. INDOCRYPT 2022: 26-51 - [i18]Bargav Jayaraman, Esha Ghosh, Huseyin A. Inan, Melissa Chase, Sambuddha Roy, Wei Dai:
Active Data Pattern Extraction Attacks on Generative Language Models. CoRR abs/2207.10802 (2022) - [i17]C. M. Downey, Wei Dai, Huseyin A. Inan, Kim Laine, Saurabh Naik, Tomasz Religa:
Planting and Mitigating Memorized Content in Predictive-Text Language Models. CoRR abs/2212.08619 (2022) - [i16]Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. IACR Cryptol. ePrint Arch. 2022: 1449 (2022) - 2021
- [c11]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. ACNS (1) 2021: 460-479 - [c10]Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi:
EVA Improved: Compiler and Extension Library for CKKS. WAHC@CCS 2021: 43-55 - [c9]Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg:
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication. CCS 2021: 1135-1150 - [i15]Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg:
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication. IACR Cryptol. ePrint Arch. 2021: 1116 (2021) - [i14]Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi:
EVA Improved: Compiler and Extension Library for CKKS. IACR Cryptol. ePrint Arch. 2021: 1505 (2021) - 2020
- [c8]M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai:
HEAX: An Architecture for Computing on Encrypted Data. ASPLOS 2020: 1295-1309 - [c7]Roshan Dathathri, Blagovesta Kostova, Olli Saarikivi, Wei Dai, Kim Laine, Madan Musuvathi:
EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation. PLDI 2020: 546-561 - [i13]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. IACR Cryptol. ePrint Arch. 2020: 15 (2020)
2010 – 2019
- 2019
- [c6]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. CCS 2019: 395-412 - [i12]M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai:
HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud. CoRR abs/1909.09731 (2019) - [i11]Roshan Dathathri, Blagovesta Kostova, Olli Saarikivi, Wei Dai, Kim Laine, Madanlal Musuvathi:
EVA: An Encrypted Vector Arithmetic Language and Compiler for Efficient Homomorphic Computation. CoRR abs/1912.11951 (2019) - [i10]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 524 (2019) - [i9]M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai:
HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud. IACR Cryptol. ePrint Arch. 2019: 1066 (2019) - 2018
- [j2]Wei Dai, William Whyte, Zhenfei Zhang:
Optimizing Polynomial Convolution for NTRUEncrypt. IEEE Trans. Computers 67(11): 1572-1583 (2018) - [j1]Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. IEEE Trans. Inf. Forensics Secur. 13(5): 1169-1184 (2018) - [c5]Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov:
Building Applications with Homomorphic Encryption. CCS 2018: 2160-2162 - [i8]Wei Dai, William Whyte, Zhenfei Zhang:
Optimizing polynomial convolution for NTRUEncrypt. IACR Cryptol. ePrint Arch. 2018: 229 (2018) - 2017
- [i7]Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. IACR Cryptol. ePrint Arch. 2017: 601 (2017) - 2016
- [c4]Wei Dai, Berk Sunar, John M. Schanck, William Whyte, Zhenfei Zhang:
NTRU modular lattice signature scheme on CUDA GPUs. HPCS 2016: 501-508 - [i6]Wei Dai, John M. Schanck, Berk Sunar, William Whyte, Zhenfei Zhang:
NTRU Modular Lattice Signature Scheme on CUDA GPUs. IACR Cryptol. ePrint Arch. 2016: 471 (2016) - [i5]Gizem S. Çetin, Wei Dai, Yarkin Doröz, William J. Martin, Berk Sunar:
Blind Web Search: How far are we from a privacy preserving search engine? IACR Cryptol. ePrint Arch. 2016: 801 (2016) - 2015
- [c3]Wei Dai, Berk Sunar:
cuHE: A Homomorphic Encryption Accelerator Library. BalkanCryptSec 2015: 169-186 - [c2]Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating SWHE Based PIRs Using GPUs. Financial Cryptography Workshops 2015: 160-171 - [i4]Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating SWHE based PIRs using GPUs. IACR Cryptol. ePrint Arch. 2015: 462 (2015) - [i3]Wei Dai, Berk Sunar:
cuHE: A Homomorphic Encryption Accelerator Library. IACR Cryptol. ePrint Arch. 2015: 818 (2015) - [i2]Gizem S. Çetin, Wei Dai, Yarkin Doröz, Berk Sunar:
Homomorphic Autocomplete. IACR Cryptol. ePrint Arch. 2015: 1194 (2015) - 2014
- [c1]Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating NTRU based homomorphic encryption using GPUs. HPEC 2014: 1-6 - [i1]Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating NTRU based Homomorphic Encryption using GPUs. IACR Cryptol. ePrint Arch. 2014: 389 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint