Picture for Wee-Keong Ng

Wee-Keong Ng

Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation

Add code
Jan 04, 2021
Figure 1 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 2 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 3 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 4 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Viaarxiv icon

Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition

Add code
Dec 11, 2018
Figure 1 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Figure 2 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Figure 3 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Figure 4 for Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Viaarxiv icon