1 code implementation • 19 Mar 2024 • Xueshuo Xie, Haoxu Wang, Zhaolong Jian, Tao Li, Wei Wang, Zhiwei Xu, Guiling Wang
We design a memory-efficient management method to support memory-demanding inference in TEEs.
1 code implementation • 25 Nov 2023 • Zhenning Shi, Haoshuai Zheng, Chen Xu, Changsheng Dong, Bin Pan, Xueshuo Xie, Along He, Tao Li, Huazhu Fu
We propose Resfusion, a general framework that incorporates the residual term into the diffusion forward process, starting the reverse process directly from the noisy degraded images.
no code implementations • 5 Jul 2019 • Xueshuo Xie, Zhi Wang, Xuhang Xiao, Lei Yang, Shenwei Huang, Tao Li
In this paper, we use blockchain to prevent logs from being tampered with and propose a pvalue-guided anomaly detection approach.
Cryptography and Security