


default search action
Jiayi Huang 0001
Person information
- unicode name: 黄嘉逸
- affiliation: Hong Kong University of Science and Technology (Guangzhou), China
- affiliation (2022 - 2023): Alibaba DAMO Academy, Beijing, China
- affiliation (2020 - 2022): University of California Santa Barbara, Department of Electrical and Computer Engineering, CA, USA
- affiliation (PhD 2020): Texas A&M University, College Station, TX, USA
Other persons with the same name
- Jiayi Huang — disambiguation page
- Jiayi Huang 0002 — Peking University, Center for Data Science, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j10]Ruiyang Ma
, Jiayi Huang
, Shijian Zhang
, Yuan Xie, Guojie Luo
:
NoCFuzzer: Automating NoC Verification in UVM. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 44(1): 371-384 (2025)
[j9]Weilin Cai
, Juyong Jiang, Fan Wang, Jing Tang
, Sunghun Kim, Jiayi Huang
:
A Survey on Mixture of Experts in Large Language Models. IEEE Trans. Knowl. Data Eng. 37(7): 3896-3915 (2025)
[c15]Weilin Cai
, Le Qin
, Jiayi Huang
:
MoC-System: Efficient Fault Tolerance for Sparse Mixture-of-Experts Model Training. ASPLOS (2) 2025: 655-671
[c14]Jiayi Huang, Yanhua Chen
, Zhe Wang, Christopher J. Hughes, Yufei Ding, Yuan Xie:
Push Multicast: A Speculative and Coherent Interconnect for Mitigating Manycore CPU Communication Bottleneck. HPCA 2025: 1541-1556
[c13]Weilin Cai, Juyong Jiang, Le Qin, Junwei Cui, Sunghun Kim, Jiayi Huang:
Shortcut-connected Expert Parallelism for Accelerating Mixture of Experts. ICML 2025
[c12]Le Qin
, Junwei Cui
, Weilin Cai
, Jiayi Huang
:
Chimera: Communication Fusion for Hybrid Parallelism in Large Language Models. ISCA 2025: 498-513
[c11]Guyue Huang
, Hao Li
, Le Qin
, Jiayi Huang
, Yangwook Kang
, Yufei Ding
, Yuan Xie
:
TRACI: Network Acceleration of Input-Dynamic Communication for Large-Scale Deep Learning Recommendation Model. ISCA 2025: 1880-1893
[i11]Shwai He, Weilin Cai, Jiayi Huang, Ang Li:
Capacity-Aware Inference: Mitigating the Straggler Effect in Mixture of Experts. CoRR abs/2503.05066 (2025)
[i10]Weilin Cai, Le Qin, Shwai He, Junwei Cui, Ang Li, Jiayi Huang:
DualSparse-MoE: Coordinating Tensor/Neuron-Level Sparsity with Expert Partition and Reconstruction. CoRR abs/2508.18376 (2025)- 2024
[j8]Luyi Li
, Jiayi Huang
, Lang Feng
, Zhongfeng Wang
:
Prefender: A Prefetching Defender Against Cache Side Channel Attacks as a Pretender. IEEE Trans. Computers 73(6): 1457-1471 (2024)
[c10]Ruiyang Ma, Huatao Zhao, Jiayi Huang, Shijian Zhang, Guojie Luo:
An Endeavor to Industrialize Hardware Fuzzing: Automating NoC Verification in UVM. DATE 2024: 1-2
[i9]Weilin Cai, Juyong Jiang, Le Qin, Junwei Cui, Sunghun Kim, Jiayi Huang:
Shortcut-connected Expert Parallelism for Accelerating Mixture-of-Experts. CoRR abs/2404.05019 (2024)
[i8]Weilin Cai, Juyong Jiang, Fan Wang, Jing Tang, Sunghun Kim, Jiayi Huang:
A Survey on Mixture of Experts. CoRR abs/2407.06204 (2024)
[i7]Weilin Cai, Le Qin, Jiayi Huang:
Partial Experts Checkpoint: Efficient Fault Tolerance for Sparse Mixture-of-Experts Model Training. CoRR abs/2408.04307 (2024)- 2023
[j7]Sungkeun Kim
, Farabi Mahmud
, Jiayi Huang
, Pritam Majumder
, Chia-Che Tsai
, Abdullah Muzahid
, Eun Jung Kim:
WHISTLE: CPU Abstractions for Hardware and Software Memory Safety Invariants. IEEE Trans. Computers 72(3): 811-825 (2023)
[c9]Chen Bai
, Jiayi Huang
, Xuechao Wei
, Yuzhe Ma
, Sicheng Li
, Hongzhong Zheng
, Bei Yu
, Yuan Xie
:
ArchExplorer: Microarchitecture Exploration Via Bottleneck Analysis. MICRO 2023: 268-282
[i6]Luyi Li, Jiayi Huang, Lang Feng, Zhongfeng Wang:
PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. CoRR abs/2307.06756 (2023)- 2022
[j6]Xinfeng Xie
, Peng Gu, Jiayi Huang
, Yufei Ding, Yuan Xie
:
MPU-Sim: A Simulator for In-DRAM Near-Bank Processing Architectures. IEEE Comput. Archit. Lett. 21(1): 1-4 (2022)
[j5]Lang Feng
, Jiayi Huang
, Luyi Li, Haochen Zhang, Zhongfeng Wang
:
RvDfi: A RISC-V Architecture With Security Enforcement by High Performance Complete Data-Flow Integrity. IEEE Trans. Computers 71(10): 2499-2512 (2022)
[j4]Lang Feng, Jiayi Huang
, Jeff Huang, Jiang Hu:
Toward Taming the Overhead Monster for Data-flow Integrity. ACM Trans. Design Autom. Electr. Syst. 27(3): 25:1-25:24 (2022)
[c8]Luyi Li, Jiayi Huang
, Lang Feng, Zhongfeng Wang:
PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. DATE 2022: 1509-1514- 2021
[j3]Jiayi Huang
, Pritam Majumder
, Sungkeun Kim
, Troy Fulton, Ramprakash Reddy Puli, Ki Hwan Yum
, Eun Jung Kim:
Computing En-Route for Near-Data Processing. IEEE Trans. Computers 70(6): 906-921 (2021)
[j2]Pritam Majumder
, Sungkeun Kim
, Jiayi Huang
, Ki Hwan Yum
, Eun Jung Kim:
Remote Control: A Simple Deadlock Avoidance Scheme for Modular Systems-on-Chip. IEEE Trans. Computers 70(11): 1928-1941 (2021)
[j1]Jiayi Huang
, Shilpa Bhosekar, Rahul Boyapati
, Ningyuan Wang, Byul Hur, Ki Hwan Yum
, Eun Jung Kim:
A Voting Approach for Adaptive Network-on-Chip Power-Gating. IEEE Trans. Computers 70(11): 1962-1975 (2021)
[c7]Jiayi Huang
, Pritam Majumder, Sungkeun Kim, Abdullah Muzahid, Ki Hwan Yum, Eun Jung Kim:
Communication Algorithm-Architecture Co-Design for Distributed Deep Learning. ISCA 2021: 181-194
[i5]Lang Feng, Jiayi Huang, Jeff Huang, Jiang Hu:
Toward Taming the Overhead Monster for Data-Flow Integrity. CoRR abs/2102.10031 (2021)
[i4]Pritam Majumder, Jiayi Huang, Sungkeun Kim, Abdullah Muzahid, Dylan Siegers, Chia-Che Tsai, Eun Jung Kim:
Continual Learning Approach for Improving the Data and Computation Mapping in Near-Memory Processing System. CoRR abs/2104.13671 (2021)
[i3]Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Pritam Majumder, Jiayi Huang, Chia-Che Tsai, Eun Jung Kim, Abdullah Muzahid:
Attacks of the Knights: Exploiting Non Uniform Cache Access Time. CoRR abs/2112.10028 (2021)- 2020
[c6]Sungkeun Kim, Farabi Mahmud
, Jiayi Huang
, Pritam Majumder, Neophytos Christou, Abdullah Muzahid, Chia-Che Tsai
, Eun Jung Kim:
ReViCe: Reusing Victim Cache to Prevent Speculative Cache Leakage. SecDev 2020: 96-107
2010 – 2019
- 2019
[c5]Jiayi Huang
, Ramprakash Reddy Puli, Pritam Majumder, Sungkeun Kim, Rahul Boyapati, Ki Hwan Yum, Eun Jung Kim:
Active-Routing: Compute on the Way for Near-Data Processing. HPCA 2019: 674-686
[i2]Jiayi Huang
, Md. Mostofa Ali Patwary, Gregory F. Diamos:
Coloring Big Graphs with AlphaGoZero. CoRR abs/1902.10162 (2019)
[i1]Pritam Majumder, Sungkeun Kim, Jiayi Huang, Ki Hwan Yum, Eun Jung Kim:
Remote Control: A Simple Deadlock Avoidance Scheme for Modular System on Chip. CoRR abs/1910.04882 (2019)- 2017
[c4]Kyung Hoon Kim, Rahul Boyapati, Jiayi Huang
, Yuho Jin, Ki Hwan Yum, Eun Jung Kim:
Packet coalescing exploiting data redundancy in GPGPU architectures. ICS 2017: 6:1-6:10
[c3]Rahul Boyapati, Jiayi Huang
, Ningyuan Wang, Kyung Hoon Kim, Ki Hwan Yum, Eun Jung Kim:
Fly-Over: A Light-Weight Distributed Power-Gating Mechanism for Energy-Efficient Networks-on-Chip. IPDPS 2017: 708-717
[c2]Rahul Boyapati, Jiayi Huang, Pritam Majumder, Ki Hwan Yum, Eun Jung Kim:
APPROX-NoC: A Data Approximation Framework for Network-On-Chip Architectures. ISCA 2017: 666-677- 2016
[c1]Rahul Boyapati, Jiayi Huang
, Ningyuan Wang, Kyung Hoon Kim, Ki Hwan Yum, Eun Jung Kim:
POSTER: Fly-Over: A Light-Weight Distributed Power-Gating Mechanism For Energy-Efficient Networks-on-Chip. PACT 2016: 413-414
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-17 01:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







