default search action
Song Bian 0001
Person information
- affiliation: Beihang University, Beijing, China
- affiliation (PhD 2019): Kyoto University, Department of Communications and Computer Engineering, Japan
Other persons with the same name
- Song Bian 0002 — University of Wisconsin, Madison, WI, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, Song Bian:
AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(7): 1971-1983 (2024) - [c35]Kotaro Matsuoka, Song Bian, Takashi Sato:
HOGE: Homomorphic Gate on An FPGA. ASPDAC 2024: 325-332 - [c34]Jianan Mu, Husheng Han, Shangyi Shi, Jing Ye, Zizhen Liu, Shengwen Liang, Meng Li, Mingzhe Zhang, Song Bian, Xing Hu, Huawei Li, Xiaowei Li:
Alchemist: A Unified Accelerator Architecture for Cross-Scheme Fully Homomorphic Encryption. DAC 2024: 26:1-26:6 - [c33]Yuntao Wei, Xueyan Wang, Song Bian, Yicheng Huang, Weisheng Zhao, Yier Jin:
PPGNN: Fast and Accurate Privacy-Preserving Graph Neural Network Inference via Parallel and Pipelined Arithmetic-and-Logic FHE Accelerator. DAC 2024: 273:1-273:6 - [c32]Zhenyu Guan, Yongqing Zhu, Yicheng Huang, Luchang Lei, Xueyan Wang, Hongyang Jia, Yi Chen, Bo Zhang, Jin Dong, Song Bian:
ESC-NTT: An Elastic, Seamless and Compact Architecture for Multi-Parameter NTT Acceleration. DATE 2024: 1-6 - [c31]Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. NDSS 2024 - [c30]Masaki Waga, Kotaro Matsuoka, Takashi Suwa, Naoki Matsumoto, Ryotaro Banno, Song Bian, Kohei Suenaga:
Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption. RV 2024: 59-69 - [i16]Lin Ding, Song Bian, Penggao He, Yan Xu, Gang Qu, Jiliang Zhang:
APACHE: A Processing-Near-Memory Architecture for Multi-Scheme Fully Homomorphic Encryption. CoRR abs/2404.15819 (2024) - [i15]Masaki Waga, Kotaro Matsuoka, Takashi Suwa, Naoki Matsumoto, Ryotaro Banno, Song Bian, Kohei Suenaga:
Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption. CoRR abs/2405.16767 (2024) - [i14]Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan:
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 1064 (2024) - [i13]Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, Song Bian:
AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation. IACR Cryptol. ePrint Arch. 2024: 1250 (2024) - 2023
- [j11]Zhenyu Guan, Lixin Zhang, Bohan Huang, Bihe Zhao, Song Bian:
Adaptive hyperparameter optimization for black-box adversarial attack. Int. J. Inf. Sec. 22(6): 1765-1779 (2023) - [c29]Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. CCS 2023: 2930-2944 - [c28]Lin Ding, Song Bian, Jiliang Zhang:
PIMA-LPN: Processing-in-memory Acceleration for Efficient LPN-based Post-Quantum Cryptography. DAC 2023: 1-6 - [c27]Yuntao Wei, Xueyan Wang, Song Bian, Weisheng Zhao, Yier Jin:
THE-V: Verifiable Privacy-Preserving Neural Network via Trusted Homomorphic Execution. ICCAD 2023: 1-9 - [c26]Sizhe Zhang, Dongning Ma, Song Bian, Lei Yang, Xun Jiao:
On Hyperdimensional Computing-based Federated Learning: A Case Study. IJCNN 2023: 1-8 - [i12]Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. IACR Cryptol. ePrint Arch. 2023: 1445 (2023) - [i11]Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1446 (2023) - 2022
- [j10]Dur-e-Shahwar Kundi, Ayesha Khalid, Song Bian, Chenghua Wang, Máire O'Neill, Weiqiang Liu:
AxRLWE: A Multilevel Approximate Ring-LWE Co-Processor for Lightweight IoT Applications. IEEE Internet Things J. 9(13): 10492-10501 (2022) - [j9]Xuanle Ren, Le Su, Zhen Gu, Sheng Wang, Feifei Li, Yuan Xie, Song Bian, Chao Li, Fan Zhang:
HEDA: Multi-Attribute Unbounded Aggregation over Homomorphically Encrypted Database. Proc. VLDB Endow. 16(4): 601-614 (2022) - [j8]Tianchen Wang, Jiawei Zhang, Jinjun Xiong, Song Bian, Zheyu Yan, Meiping Huang, Jian Zhuang, Takashi Sato, Xiaowei Xu, Yiyu Shi:
VisualNet: An End-to-End Human Visual System Inspired Framework to Reduce Inference Latency of Deep Neural Networks. IEEE Trans. Computers 71(11): 2717-2727 (2022) - [j7]Shumpei Morita, Song Bian, Michihiro Shintani, Takashi Sato:
Efficient Analysis for Mitigation of Workload-Dependent Aging Degradation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(12): 5515-5525 (2022) - [c25]Ryotaro Banno, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga, Kohei Suenaga:
Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption. CAV (1) 2022: 447-468 - [p1]Dur-e-Shahwar Kundi, Ayesha Khalid, Song Bian, Weiqiang Liu:
Approximate Computing for Cryptography. Approximate Computing 2022: 313-331 - [i10]Ryotaro Banno, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga, Kohei Suenaga:
Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption. CoRR abs/2206.03582 (2022) - 2021
- [j6]Song Bian, Dur-e-Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato:
APAS: Application-Specific Accelerators for RLWE-Based Homomorphic Linear Transformations. IEEE Trans. Inf. Forensics Secur. 16: 4663-4678 (2021) - [c24]Kotaro Matsuoka, Yusuke Hoshizuki, Takashi Sato, Song Bian:
Towards Better Standard Cell Library: Optimizing Compound Logic Gates for TFHE. WAHC@CCS 2021: 63-68 - [c23]Song Bian, Weiwen Jiang, Takashi Sato:
Privacy-Preserving Medical Image Segmentation via Hybrid Trusted Execution Environment. DAC 2021: 1347-1350 - [c22]Tatsuki Ono, Song Bian, Takashi Sato:
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs. ISCAS 2021: 1-5 - [c21]Takashi Sato, Yuki Tanaka, Song Bian:
Clonable PUF: on the Design of PUFs That Share Equivalent Responses. ISCAS 2021: 1-5 - [c20]Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian:
Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE. USENIX Security Symposium 2021: 4007-4024 - [i9]Tatsuki Ono, Song Bian, Takashi Sato:
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs. IACR Cryptol. ePrint Arch. 2021: 198 (2021) - [i8]Takashi Sato, Yuki Tanaka, Song Bian:
Clonable PUF: On the Design of PUFs That Share Equivalent Responses. IACR Cryptol. ePrint Arch. 2021: 341 (2021) - [i7]Song Bian, Dur-e-Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato:
APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations. IACR Cryptol. ePrint Arch. 2021: 1284 (2021) - 2020
- [c19]Yuki Kume, Song Bian, Takashi Sato:
A Tuning-Free Hardware Reservoir Based on MOSFET Crossbar Array for Practical Echo State Network Implementation. ASP-DAC 2020: 458-463 - [c18]Song Bian, Tianchen Wang, Masayuki Hiromoto, Yiyu Shi, Takashi Sato:
ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition. CVPR 2020: 9400-9409 - [c17]Akira Dan, Riu Shimizu, Takeshi Nishikawa, Song Bian, Takashi Sato:
Clustering Approach for Solving Traveling Salesman Problems via Ising Model Based Solver. DAC 2020: 1-6 - [c16]Song Bian, Weiwen Jiang, Qing Lu, Yiyu Shi, Takashi Sato:
NASS: Optimizing Secure Inference via Neural Architecture Search. ECAI 2020: 1746-1753 - [c15]Dur-e-Shahwar Kundi, Song Bian, Ayesha Khalid, Chenghua Wang, Máire O'Neill, Weiqiang Liu:
AxMM: Area and Power Efficient Approximate Modular Multiplier for R-LWE Cryptosystem. ISCAS 2020: 1-5 - [c14]Song Bian, Xiaowei Xu, Weiwen Jiang, Yiyu Shi, Takashi Sato:
BUNET: Blind Medical Image Segmentation Based on Secure UNET. MICCAI (2) 2020: 612-622 - [c13]Qian Lou, Song Bian, Lei Jiang:
AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference. NeurIPS 2020 - [i6]Song Bian, Weiwen Jiang, Qing Lu, Yiyu Shi, Takashi Sato:
NASS: Optimizing Secure Inference via Neural Architecture Search. CoRR abs/2001.11854 (2020) - [i5]Song Bian, Tianchen Wang, Masayuki Hiromoto, Yiyu Shi, Takashi Sato:
ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition. CoRR abs/2003.05328 (2020) - [i4]Qian Lou, Song Bian, Lei Jiang:
AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference. CoRR abs/2006.04219 (2020) - [i3]Song Bian, Xiaowei Xu, Weiwen Jiang, Yiyu Shi, Takashi Sato:
BUNET: Blind Medical Image Segmentation Based on Secure UNET. CoRR abs/2007.06855 (2020) - [i2]Kenta Nagura, Song Bian, Takashi Sato:
FedNNNN: Norm-Normalized Neural Network Aggregation for Fast and Accurate Federated Learning. CoRR abs/2008.04538 (2020) - [i1]Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian:
Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE. CoRR abs/2010.09410 (2020)
2010 – 2019
- 2019
- [b1]Song Bian:
Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques. Kyoto University, Japan, 2019 - [j5]Song Bian, Masayuki Hiromoto, Takashi Sato:
Hardware-Accelerated Secured Naïve Bayesian Filter Based on Partially Homomorphic Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(2): 430-439 (2019) - [c12]Song Bian, Masayuki Hiromoto, Takashi Sato:
Towards practical homomorphic email filtering: a hardware-accelerated secure naïve bayesian filter. ASP-DAC 2019: 621-626 - [c11]Song Bian, Masayuki Hiromoto, Takashi Sato:
Filianore: Better Multiplier Architectures for LWE-based Post-Quantum Key Exchange. DAC 2019: 113 - [c10]Song Bian, Masayuki Hiromoto, Takashi Sato:
DArL: Dynamic Parameter Adjustment for LWE-based Secure Inference. DATE 2019: 1739-1744 - 2018
- [j4]Yuki Tanaka, Song Bian, Masayuki Hiromoto, Takashi Sato:
Coin Flipping PUF: A Novel PUF With Improved Resistance Against Machine Learning Attacks. IEEE Trans. Circuits Syst. II Express Briefs 65-II(5): 602-606 (2018) - [c9]Shumpei Morita, Song Bian, Michihiro Shintani, Masayuki Hiromoto, Takashi Sato:
Efficient worst-case timing analysis of critical-path delay under workload-dependent aging degradation. ASP-DAC 2018: 631-636 - [c8]Song Bian, Masayuki Hiromoto, Takashi Sato:
DWE: decrypting learning with errors with errors. DAC 2018: 3:1-3:6 - [c7]Zuitoku Shin, Shumpei Morita, Song Bian, Michihiro Shintani, Masayuki Hiromoto, Takashi Sato:
A study on NBTI-induced delay degradation considering stress frequency dependence. ISQED 2018: 251-256 - 2017
- [j3]Shumpei Morita, Song Bian, Michihiro Shintani, Masayuki Hiromoto, Takashi Sato:
Utilization of Path-Clustering in Efficient Stress-Control Gate Replacement for NBTI Mitigation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(7): 1464-1472 (2017) - [j2]Song Bian, Shumpei Morita, Michihiro Shintani, Hiromitsu Awano, Masayuki Hiromoto, Takashi Sato:
Identification and Application of Invariant Critical Paths under NBTI Degradation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2797-2806 (2017) - [c6]Song Bian, Michihiro Shintani, Masayuki Hiromoto, Takashi Sato:
LSTA: Learning-Based Static Timing Analysis for High-Dimensional Correlated On-Chip Variations. DAC 2017: 66:1-66:6 - [c5]Song Bian, Masayuki Hiromoto, Takashi Sato:
SCAM: Secured content addressable memory based on homomorphic encryption. DATE 2017: 984-989 - [c4]Shumpei Morita, Song Bian, Michihiro Shintani, Masayuki Hiromoto, Takashi Sato:
Comparative study of path selection and objective function in replacing NBTI mitigation logic. ISQED 2017: 426-431 - 2016
- [j1]Song Bian, Michihiro Shintani, Masayuki Hiromoto, Takashi Sato:
Fast Estimation of NBTI-Induced Delay Degradation Based on Signal Probability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(7): 1400-1409 (2016) - [c3]Song Bian, Michihiro Shintani, Zheng Wang, Masayuki Hiromoto, Anupam Chattopadhyay, Takashi Sato:
Runtime NBTI Mitigation for Processor Lifespan Extension via Selective Node Control. ATS 2016: 234-239 - [c2]Song Bian, Michihiro Shintani, Shumpei Morita, Hiromitsu Awano, Masayuki Hiromoto, Takashi Sato:
Workload-Aware Worst Path Analysis of Processor-Scale NBTI Degradation. ACM Great Lakes Symposium on VLSI 2016: 203-208 - [c1]Song Bian, Michihiro Shintani, Shumpei Morita, Masayuki Hiromoto, Takashi Sato:
Nonlinear delay-table approach for full-chip NBTI degradation prediction. ISQED 2016: 307-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint