Picture for Jong-Seon No

Jong-Seon No

Boosted Neural Decoders: Achieving Extreme Reliability of LDPC Codes for 6G Networks

Add code
May 22, 2024
Viaarxiv icon

CrossMPT: Cross-attention Message-Passing Transformer for Error Correcting Codes

Add code
May 02, 2024
Viaarxiv icon

Optimizing Layerwise Polynomial Approximation for Efficient Private Inference on Fully Homomorphic Encryption: A Dynamic Programming Approach

Add code
Oct 16, 2023
Viaarxiv icon

Boosting Learning for LDPC Codes to Improve the Error-Floor Performance

Add code
Oct 11, 2023
Viaarxiv icon

How to Mask in Error Correction Code Transformer: Systematic and Double Masking

Add code
Aug 25, 2023
Viaarxiv icon

Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network

Add code
Jun 14, 2021
Figure 1 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Figure 2 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Figure 3 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Figure 4 for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Viaarxiv icon

Weakly Private Information Retrieval Under Rényi Divergence

Add code
May 17, 2021
Figure 1 for Weakly Private Information Retrieval Under Rényi Divergence
Figure 2 for Weakly Private Information Retrieval Under Rényi Divergence
Figure 3 for Weakly Private Information Retrieval Under Rényi Divergence
Figure 4 for Weakly Private Information Retrieval Under Rényi Divergence
Viaarxiv icon

Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm

Add code
Mar 30, 2021
Figure 1 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Figure 2 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Figure 3 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Figure 4 for Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Viaarxiv icon