Xiao Hu

ORCID: 0000-0001-7668-4689
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Coding theory and cryptography
  • Cryptography and Residue Arithmetic
  • Topic Modeling
  • Natural Language Processing Techniques
  • Cryptographic Implementations and Security
  • Quantum Computing Algorithms and Architecture
  • Advanced Neural Network Applications
  • Advanced Image and Video Retrieval Techniques
  • Photonic and Optical Devices
  • Quantum Information and Cryptography
  • Rough Sets and Fuzzy Logic
  • Image Retrieval and Classification Techniques
  • Advanced Text Analysis Techniques
  • Algorithms and Data Compression
  • Semiconductor Lasers and Optical Devices
  • Neural Networks and Applications
  • Language, Metaphor, and Cognition
  • Precipitation Measurement and Analysis
  • Text and Document Classification Technologies
  • Machine Learning and Algorithms
  • Numerical Methods and Algorithms
  • Meteorological Phenomena and Simulations
  • Multimodal Machine Learning Applications
  • Optical Network Technologies

Nanjing University
2020-2024

Hubei University of Technology
2024

Meteorological Bureau of Shenzhen Municipality
2022

Capital Normal University
2017-2018

Henan Agricultural University
2011

Silicon-based polarization-encoding quantum key distribution (QKD) has been widely studied, owing to its low cost and robustness. However, prior studies have utilized off-chip devices demodulate the states or perform polarization compensation, given difficulty of fabricating polarized independent components on chip. In this paper we propose a fully chip-based decoder for QKD. The chip realizes state analyzer compensates BB84 protocol without requiring additional hardware. It is based...

10.1016/j.chip.2023.100039 article EN cc-by Chip 2023-02-16

Simile is a special type of metaphor, where comparators such as like and are used to compare two objects. recognition recognize simile sentences extract components, i.e., the tenor vehicle. This paper presents study in Chinese. We construct an annotated corpus for this research, which consists 11.3k that contain comparator. propose neural network framework jointly optimizing three tasks: sentence classification, component extraction language modeling. The experimental results show based...

10.18653/v1/d18-1183 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2018-01-01

As the computation bottleneck in lattice-based cryptography (LBC), polynomial multiplication based on number theoretic transform (NTT) has been continuously studied for flexible hardware implementations with high area-efficiency. This paper presents an area-efficient and configurable NTT-based multiplier (AC-PM) incorporating algorithmic architectural level optimization techniques. For core operation of multiplication, two low-complexity fast modular algorithms are introduced loose...

10.1109/tcsi.2022.3218192 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2022-11-09

Recently, the National Institute of Standards and Technology (NIST) has identified first four quantum-resistant algorithms for post-quantum cryptography (PQC) standardization. CRYSTALS-Kyber (Kyber) is only public-key encryption key-establishment algorithm among them. In this article, we propose a reconfigurable, high-speed, area-efficient polynomial multiplication accelerator Kyber to facilitate its practical applications. The cornerstone butterfly unit (BU) structure, composed modular...

10.1109/tcad.2022.3230359 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2022-12-19

Number theoretic transform (NTT) is widely applied as a fundamental component of next-generation cryptosystems. This brief introduces novel high-low interactive memory access pattern for an out-of-place NTT design, which can be configurable in degree parallelism. To achieve high area efficiency, the proposed flexibly selected referring to design parameters. Then first time, we present quantitative analysis about relevance between parallelism and number computing cycles. More importantly, put...

10.1109/tcsii.2023.3260811 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2023-03-23

Since strong convective weather is closely related to heavy precipitation, the nowcasting of weather, especially based on radar data, plays an essential role in meteorological operations for disaster prevention and mitigation. The traditional optical flow method cross-correlation have a low forecast accuracy short leading time, while deep learning methods show remarkable advantages nowcasting. However, most current forecasting suffer from drawback that results become increasingly blurred as...

10.3390/atmos13081291 article EN cc-by Atmosphere 2022-08-14

Named entity recognition (NER) is particularly challenging for medical texts due to the high domain specificity, abundance of technical terms, and sparsity data in this field. In work, we propose a novel attention layer, called “ontology layer”, that enhances NER performance language model clinical text by utilizing an ontology consisting conceptual classes related target set. The proposed layer computes relevance between each input token then fuses encoded vectors class enhance explicit...

10.3390/app14010421 article EN cc-by Applied Sciences 2024-01-03

Abstract We investigated the optical feedback effects on static and dynamic characteristics of 1.3 μ m quantum-dot (QD) Fabry–Pérot laser under reflection from −40 dB up to −8 dB. The onset coherence collapse is determined as −14 electrical spectra. Although degradation in small signal modulation reported above this critical level, transmission operation with available eye diagram higher demonstrated. Under 10 Gb s −1 modulation, there no obvious regarding shape extinction ratio tolerance QD...

10.1088/1361-6463/ac9689 article EN cc-by Journal of Physics D Applied Physics 2022-09-30

Due to the rapid progress made in quantum computers, modern cryptography faces great challenges. Many digital signature schemes that have resistance computing are studied and standardized by several influential international organizations. The Leighton-Micali (LMS) protocol, one of hash-based schemes, is both Internet Engineering Task Force (IETF) National Institute Standards Technology (NIST) due its well-studied security relatively small size. However, heavy computation load high latency...

10.1109/tcsi.2022.3210016 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2022-10-03

Due to the rapid progress made in quantum computers, modern cryptography faces great challenges. Many new digital signature schemes that have resistance computing are being presented for Post-Quantum Cryptography (PQC) standardization. The Leighton-Micali (LMS), a kind of hash-based scheme, is selected as promising candidate PQC protocols by Internet Engineering Task Force (IETF) because its small private and public key sizes. However, low-efficiency generation forms bottleneck practical...

10.1109/iscas51556.2021.9401177 article EN 2022 IEEE International Symposium on Circuits and Systems (ISCAS) 2021-04-27

Recently, secure neural network (NN) inference, a combination of homomorphic encryption (HE) and NN, has attracted much attention. Nevertheless, large number computations, mainly brought by the HE scheme, form bottleneck in real-time applications. In this article, we present hardware accelerator on field-programmable gate array (FPGA) for convolution layer (HomConvL), which is most computation-intensive part HE-based inference. First, propose new HomConvL algorithm called packed rotations at...

10.1109/tvlsi.2022.3197895 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2022-08-23

Grammatical error diagnosis is an important task in natural language processing. This paper introduces our system at NLPTEA-2020 Task: Chinese Error Diagnosis (CGED). CGED aims to diagnose four types of grammatical errors which are missing words (M), redundant (R), bad word selection (S) and disordered (W). Our built on the model multi-layer bidirectional transformer encoder ResNet integrated into improve performance. We also explore two ensemble strategies including weighted averaging...

10.18653/v1/2020.nlptea-1.5 article EN 2020-01-01

The lattice-based cryptography (LBC) has been widely used recently in many compute-intensive applications, such as the post-quantum (PQC) and privacy-preserving deep learning, where main task for applications is to improve computational efficiency. modular multiplication operations, mainly involved number theoretic transform (NTT), comprise a large proportion of whole computations required by an LBC. This paper presents novel "decompose-and-reduce" algorithm (DARM), considering primes with...

10.1109/asap52443.2021.00033 article EN 2021-07-01

Recently, the secure neural network inference, an organic combination of homomorphic encryption (HE) and deep (DNN), has attracted much attention. Nevertheless, large number computations, brought by HE scheme, form bottleneck for real-time applications. A significant portion is permutation (Perm), which mainly made up theoretic transform (NTT). In this paper, first time, we propose efficient architecture Perm incorporating algorithmic transformations architectural level optimizations. First,...

10.1109/apccas50809.2020.9301698 article EN 2020-12-08

The homomorphic encryption over the torus (TFHE) is a promising fully (FHE) scheme that allows arbitrary computations with programmable bootstrapping (PBS) algorithm. However, PBS suffers from prohibitive computation complexity and latency, which hinders practical applications of TFHE. To address these challenges, we propose ALT, field-programmable gate array (FPGA) accelerator for exhibits high area efficiency low latency. Our approach involves modifying parameters algorithm to strike...

10.1109/tvlsi.2024.3353374 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2024-01-22

10.1109/tcsii.2024.3430954 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2024-07-18

Supersingular isogeny key encapsulation (SIKE) protocol is a promising candidate for the standard of post quantum cryptography (PQC), but it suffers from high computational complexity. Since modular multiplication takes up large proportion computations in SIKE protocol, accelerating this operation can efficiently speed entire protocol. In paper, we propose new algorithm, which achieve lower complexity than prior arts. The SIKE-friendly prime with form p = 2 <sup...

10.1109/isvlsi49217.2020.00068 article EN 2020-07-01

With the deepening of research on language modeling, automatic metaphor identification task has become a new challenge in field natural processing, especially machine translation. This paper is about simile, one kind most frequent metaphorical way daily life. More specifically, recognition sentences with obvious components. We divided this into two sub-tasks, first classifying containing word "like", and then labelling tagged components labels. In paper, we used Random Forest classifier...

10.1109/iscid.2017.206 article EN 2017-12-01

E-bussiness has grown rapidly in the last decade and massive amount of data on customer purchases, browsing pattern preferences been generated. Classification electronic plays a pivotal role to mine valuable information thus become one most important applications E-bussiness. Support Vector Machines are popular powerful machine learning techniques, they offer state-of-the-art performance. Rough set theory is formal mathematical tool deal with incomplete or imprecise its feature selection. In...

10.4028/www.scientific.net/amr.230-232.625 article EN Advanced materials research 2011-05-01

A novel median filter based manifold ranking approach for robust image annotation was presented in this paper. Firstly, we propose a similarity matching of to improve the robustness traditional label propagation with filter. Then refined affinity matrix applied propagation. Thus, pair-wise is updated scores using its neighbors space. Finally, proposed propagated labels from labeled images whole database. The experiments over Corel have shown that embedding space beneficial annotation.

10.4028/www.scientific.net/amr.225-226.1088 article EN Advanced materials research 2011-04-01

Graph based learning has been an active research topic in machine community as well many application areas including image annotation recently. In order to exploit the correlation between keywords and images, we proposed a novel method via graph semantic fusion estimate probability of being caption image, present new framework solve problem. The experiments over Corel images have shown that this approach outperforms other methods is effective for annotation.

10.4028/www.scientific.net/amr.179-180.685 article EN Advanced materials research 2011-01-01

We propose a fully chip-based decoder for polarization-encoding quantum key distribution. The chip realizes polarization state analyzer and compensates the BB84 protocol without requiring additional hardware.

10.1364/quantum.2023.qtu3a.33 article EN 2023-01-01

As a typical machine learning algorithm, convolutional neural network (CNN) has drawn great interests in academic research and industrial applications. However, traditional CPU can no longer meet the computation requirement of CNN due to CPU's sequential computing nature. Heterogeneous combines together with GPGPU or FPGAs form much more powerful platform. In this paper, we present our study on an implementation heterogeneous systems, it shows than 3x runtime speedup. Our systematically...

10.1109/asicon.2017.8252453 article EN 2021 IEEE 14th International Conference on ASIC (ASICON) 2017-10-01
Coming Soon ...