关注
Weike Wang
Weike Wang
Shandong University of Science and Technology
在 sdust.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A security design for the detecting of buffer overflow attacks in IoT device
B Xu, W Wang, Q Hao, Z Zhang, P Du, T Xia, H Li, X Wang
IEEE Access 6, 72862-72869, 2018
332018
Hardware-enhanced protection for the runtime data security in embedded systems
W Wang, X Zhang, Q Hao, Z Zhang, B Xu, H Dong, T Xia, X Wang
Electronics 8 (1), 52, 2019
212019
An ultra-low complexity early stopping criterion for belief propagation polar code decoder
C Chen, X Zhang, Y Liu, W Wang, Q Zeng
IEEE Communications Letters 26 (4), 723-727, 2022
82022
Mcvp-noc: Many-core virtual platform with networks-on-chip support
D Zhang, X Zeng, Z Wang, W Wang, X Chen
2013 IEEE 10th International Conference on ASIC, 1-4, 2013
82013
An architectural-enhanced secure embedded system with a novel hybrid search scheme
W Wang, M Liu, P Du, Z Zhao, Y Tian, Q Hao, X Wang
2017 International Conference on Software Security and Assurance (ICSSA …, 2017
72017
Track fusion based on threshold factor classification algorithm in wireless sensor networks
X Wang, T Wang, S Chen, R Fan, Y Xu, W Wang, H Li, T Xia
International Journal of Communication Systems 30 (7), e3164, 2017
72017
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.
X Wang, W Wang, B Xu, P Du, L Li, M Liu
J. Univers. Comput. Sci. 24 (4), 515-536, 2018
62018
PAOA: A power and area optimization approach of Reed-Muller logic circuits
X Wang, M Li, Z He, W Wang, C Zhou, Z Zhao
2017 IEEE 60th International Midwest Symposium on Circuits and Systems …, 2017
52017
Hardware-assisted monitoring for code security in embedded system
X Wang, Q Shen, P Du, R Zhang, W Wang, L Li, B Xu, H Ji
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
52015
Polarity searching for MPRM logic circuit based on improved adaptive genetic algorithm
X Wang, R Zhang, W Wang, Z He, L Li, Q Shen, L Ruan, L Xiao
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
42015
A new ECC scalar multiplication algorithm with randomized power consumption
L Wang, W Wang, R Zhang, X Wang
2014 12th IEEE International Conference on Solid-State and Integrated …, 2014
42014
Securing embedded system from code reuse attacks: a lightweight scheme with hardware assistance
Z An, W Wang, W Li, S Li, D Zhang
Micromachines 14 (8), 1525, 2023
32023
Hardware-based protection for data security at run-time on embedded systems
X Wang, X Zhang, W Wang, P Du, Z Zhang, Y Tian, Q Hao, B Xu
IOP Conference Series: Materials Science and Engineering 466 (1), 012070, 2018
32018
Hardware-assisted integrity monitor based on lightweight hash function
P Du, X Wang, W Wang, L Li, T Xia, H Li
IEICE Electronics Express 15 (10), 20180107-20180107, 2018
32018
Hardware-assisted system for program execution security of SoC
X Wang, SS Pang, WK Wang, ZM Zhao, C Zhou, ZH He, XC Wang, Y Xu
ITM Web of Conferences 7, 03006, 2016
32016
Optimization of elliptic curve cryptography resisting power attack scalar multiplication algorithm in security system on chip
X Wang, L Wang, Y Bai, Z He, T Wang, B Xu, H Zhang, X Wang, C Zhou, ...
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
32015
Embedded system confidentiality protection by cryptographic engine implemented with composite field arithmetic
W Wang, X Wang, P Du, Y Tian, X Zhang, Q Hao, Z Zhang, B Xu
MATEC Web of Conferences 210, 02047, 2018
22018
Genetic circuit for the early warning of lung cancer using iBioSim
X Wang, XC Wang, JB Jiang, JJ Sun, SS Pang, HH He, WK Wang
ITM Web of Conferences 7, 09019, 2016
22016
A multi-level collaboration low-power design based on embedded system
X Wang, L Li, L Zhang, W Wang, R Zhang, Y Zhang, Q Shen
2015 28th IEEE International System-on-Chip Conference (SOCC), 186-190, 2015
22015
Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology
S Li, W Wang, W Li, D Zhang
IEEE Access 11, 133255-133280, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–20