Palm: Scaling language modeling with pathways A Chowdhery, S Narang, J Devlin, M Bosma, G Mishra, A Roberts, ... Journal of Machine Learning Research 24 (240), 1-113, 2023 | 3831 | 2023 |
Gemini: a family of highly capable multimodal models G Team, R Anil, S Borgeaud, Y Wu, JB Alayrac, J Yu, R Soricut, ... arXiv preprint arXiv:2312.11805, 2023 | 843 | 2023 |
TrustVisor: Efficient TCB reduction and attestation JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig 2010 IEEE Symposium on Security and Privacy, 143-158, 2010 | 839 | 2010 |
ROPecker: A generic and practical approach for defending against ROP attack Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng Internet Society, 2014 | 402 | 2014 |
Glam: Efficient scaling of language models with mixture-of-experts N Du, Y Huang, AM Dai, S Tong, D Lepikhin, Y Xu, M Krikun, Y Zhou, ... International Conference on Machine Learning, 5547-5569, 2022 | 385 | 2022 |
Ten lessons from three generations shaped google’s tpuv4i: Industrial product NP Jouppi, DH Yoon, M Ashcraft, M Gottscho, TB Jablin, G Kurian, ... 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021 | 310 | 2021 |
Building verifiable trusted path on commodity x86 computers Z Zhou, VD Gligor, J Newsome, JM McCune 2012 IEEE symposium on security and privacy, 616-630, 2012 | 190 | 2012 |
Bigssl: Exploring the frontier of large-scale semi-supervised learning for automatic speech recognition Y Zhang, DS Park, W Han, J Qin, A Gulati, J Shor, A Jansen, Y Xu, ... IEEE Journal of Selected Topics in Signal Processing 16 (6), 1519-1532, 2022 | 155 | 2022 |
Tpu v4: An optically reconfigurable supercomputer for machine learning with hardware support for embeddings N Jouppi, G Kurian, S Li, P Ma, R Nagarajan, L Nai, N Patil, ... Proceedings of the 50th Annual International Symposium on Computer …, 2023 | 152 | 2023 |
Toju Duke, Lucas Dixon, Kun Zhang, Quoc V N Du, Y Huang, AM Dai, S Tong, D Lepikhin, Y Xu, M Krikun, Y Zhou, ... Le, Yonghui Wu, Zhifeng Chen, and Claire Cui, 2021 | 132 | 2021 |
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012 | 108 | 2012 |
Dancing with giants: Wimpy kernels for on-demand isolated i/o Z Zhou, M Yu, VD Gligor 2014 IEEE symposium on security and privacy, 308-323, 2014 | 87 | 2014 |
Palm: Scaling language modeling with pathways. arXiv 2022 A Chowdhery, S Narang, J Devlin, M Bosma, G Mishra, A Roberts, ... arXiv preprint arXiv:2204.02311 10, 2022 | 84 | 2022 |
Trusted display on untrusted commodity platforms M Yu, VD Gligor, Z Zhou Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 41 | 2015 |
Shortmac: efficient data-plane fault localization. X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague NDSS, 2012 | 37 | 2012 |
Scale mlperf-0.6 models on google tpu-v3 pods S Kumar, V Bitorff, D Chen, C Chou, B Hechtman, HJ Lee, N Kumar, ... arXiv preprint arXiv:1909.09756, 2019 | 36 | 2019 |
Network fault localization with small TCB X Zhang, Z Zhou, G Hasker, A Perrig, V Gligor 2011 19th IEEE International Conference on Network Protocols, 143-154, 2011 | 36 | 2011 |
Overlap communication with dependent computation via decomposition in large deep learning models S Wang, J Wei, A Sabne, A Davis, B Ilbeyi, B Hechtman, D Chen, ... Proceedings of the 28th ACM International Conference on Architectural …, 2022 | 30 | 2022 |
KISS:“key it simple and secure” corporate key management Z Zhou, J Han, YH Lin, A Perrig, V Gligor Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013 | 27 | 2013 |
MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set Z Zhou, Y Xue, J Liu, W Zhang, J Li Information and Communications Security: 9th International Conference, ICICS …, 2007 | 25 | 2007 |