Hongjun He

Orcid: 0009-0005-5789-3879

According to our database1, Hongjun He authored at least 26 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
14 Gbit/s Visible Light Communications Transmission System based on InGaN/GaN Blue Light Laser Diodes.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Towards Efficient Control Flow Handling in Spatial Architecture via Architecting the Control Flow Plane.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

RMP-MEM: A HW/SW Reconfigurable Multi-Port Memory Architecture for Multi-PEA Oriented CGRA.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

CPE: An Energy-Efficient Edge-Device Training with Multi-dimensional Compression Mechanism.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

TPE: A High-Performance Edge-Device Inference with Multi-level Transformational Mechanism.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2023

Multi-Resolution Monocular Depth Map Fusion by Self-Supervised Gradient-Based Composition.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Wound Segmentation with Dynamic Illumination Correction and Dual-view Semantic Fusion.
CoRR, 2022

Analysis of Far-field Characteristics of RIS Based on an Equivalent Modeling and Simulation Method.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

2021
Multi-objective Optimization Regression Verification for Multi-core Cache Coherence Protocol.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
Binary surface smoothing for abnormal lung segmentation.
Comput. Graph., 2020

ConstBin: A Tool for Automatic Fixing of Unreproducible Builds.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

2019
Finite Time Synchronization for Fractional Order Sprott C Systems with Hidden Attractors.
Complex., 2019

2017
Winograd Algorithm for 3D Convolution Neural Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

2016
Defect Analysis and Risk Assessment of Mainstream File Access Control Policies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

2015
Ultra simple way to encrypt non-volatile main memory.
Secur. Commun. Networks, 2015

2013
Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems.
Future Gener. Comput. Syst., 2013

Novel Physically-Embedded Data Encryption for Embedded Device.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2011
Inter-Chip Authentication through I/O Character.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Incremental hash tree for disk authentication.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Efficient Encryption-Authentication of Shared Bus-Memory in SMP System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery.
Proceedings of the Advances in Information Security and Assurance, 2009

Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Secure Disk with Authenticated Encryption and IV Verification.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Efficiently Protect Memory through an Independent Counter Channel.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2006
An Efficient Way to Build Secure Disk.
Proceedings of the Information Security Practice and Experience, 2006


  Loading...