Zongwei Zhou
Zongwei Zhou
Software Engineer at Google (Ph.D. from Carnegie Mellon University)
Verified email at - Homepage
Cited by
Cited by
Palm: Scaling language modeling with pathways
A Chowdhery, S Narang, J Devlin, M Bosma, G Mishra, A Roberts, ...
Journal of Machine Learning Research 24 (240), 1-113, 2023
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
Gemini: a family of highly capable multimodal models
G Team, R Anil, S Borgeaud, Y Wu, JB Alayrac, J Yu, R Soricut, ...
arXiv preprint arXiv:2312.11805, 2023
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
Glam: Efficient scaling of language models with mixture-of-experts
N Du, Y Huang, AM Dai, S Tong, D Lepikhin, Y Xu, M Krikun, Y Zhou, ...
International Conference on Machine Learning, 5547-5569, 2022
Ten lessons from three generations shaped google’s tpuv4i: Industrial product
NP Jouppi, DH Yoon, M Ashcraft, M Gottscho, TB Jablin, G Kurian, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
Bigssl: Exploring the frontier of large-scale semi-supervised learning for automatic speech recognition
Y Zhang, DS Park, W Han, J Qin, A Gulati, J Shor, A Jansen, Y Xu, ...
IEEE Journal of Selected Topics in Signal Processing 16 (6), 1519-1532, 2022
Tpu v4: An optically reconfigurable supercomputer for machine learning with hardware support for embeddings
N Jouppi, G Kurian, S Li, P Ma, R Nagarajan, L Nai, N Patil, ...
Proceedings of the 50th Annual International Symposium on Computer …, 2023
Toju Duke, Lucas Dixon, Kun Zhang, Quoc V
N Du, Y Huang, AM Dai, S Tong, D Lepikhin, Y Xu, M Krikun, Y Zhou, ...
Le, Yonghui Wu, Zhifeng Chen, and Claire Cui, 2021
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
Dancing with giants: Wimpy kernels for on-demand isolated i/o
Z Zhou, M Yu, VD Gligor
2014 IEEE symposium on security and privacy, 308-323, 2014
Palm: Scaling language modeling with pathways. arXiv 2022
A Chowdhery, S Narang, J Devlin, M Bosma, G Mishra, A Roberts, ...
arXiv preprint arXiv:2204.02311 10, 2022
Trusted display on untrusted commodity platforms
M Yu, VD Gligor, Z Zhou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Shortmac: efficient data-plane fault localization.
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
NDSS, 2012
Scale mlperf-0.6 models on google tpu-v3 pods
S Kumar, V Bitorff, D Chen, C Chou, B Hechtman, HJ Lee, N Kumar, ...
arXiv preprint arXiv:1909.09756, 2019
Network fault localization with small TCB
X Zhang, Z Zhou, G Hasker, A Perrig, V Gligor
2011 19th IEEE International Conference on Network Protocols, 143-154, 2011
KISS:“key it simple and secure” corporate key management
Z Zhou, J Han, YH Lin, A Perrig, V Gligor
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
Overlap communication with dependent computation via decomposition in large deep learning models
S Wang, J Wei, A Sabne, A Davis, B Ilbeyi, B Hechtman, D Chen, ...
Proceedings of the 28th ACM International Conference on Architectural …, 2022
MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set
Z Zhou, Y Xue, J Liu, W Zhang, J Li
Information and Communications Security: 9th International Conference, ICICS …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20