Weike Wang
Orcid: 0000-0003-4964-917X
According to our database1,
Weike Wang
authored at least 26 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEICE Trans. Electron., March, 2023
Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology.
IEEE Access, 2023
2022
Knowl. Based Syst., 2022
An Ultra-Low Complexity Early Stopping Criterion for Belief Propagation Polar Code Decoder.
IEEE Commun. Lett., 2022
Proceedings of the Device Research Conference, 2022
2021
Improved modeling of flicker noise including velocity saturation effect in FinFETs and experimental validation.
Microelectron. J., 2021
Distributed Adaptive Bipartite Time-Varying Formation Control for Heterogeneous Unknown Nonlinear Multi-Agent Systems.
IEEE Access, 2021
2019
Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
2018
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.
J. Univers. Comput. Sci., 2018
IET Comput. Digit. Tech., 2018
IEICE Electron. Express, 2018
IEEE Access, 2018
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018
2017
Track fusion based on threshold factor classification algorithm in wireless sensor networks.
Int. J. Commun. Syst., 2017
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
A Universal Hardware-Driven PVT and Layout-Aware Predictive Failure Analytics for SRAM.
IEEE Trans. Very Large Scale Integr. Syst., 2016
2015
Polarity Searching for MPRM Logic Circuit Based on Improved Adaptive Genetic Algorithm.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015
2013
Proceedings of the IEEE 10th International Conference on ASIC, 2013
2012
2007
Pointwise convergence to a Maxwellian for a Broadwell model with a supersonic boundary.
Networks Heterog. Media, 2007