Weike Wang

Orcid: 0000-0003-4964-917X

According to our database1, Weike Wang authored at least 26 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Establishment of Transmission Lines Model of Shielded Twisted-Pair Line.
IEICE Trans. Electron., March, 2023

Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology.
IEEE Access, 2023

2022
Certificateless anti-quantum ring signcryption for network coding.
Knowl. Based Syst., 2022

An Ultra-Low Complexity Early Stopping Criterion for Belief Propagation Polar Code Decoder.
IEEE Commun. Lett., 2022

Self-Heating characterization and modeling of 5nm technology node FinFETs.
Proceedings of the Device Research Conference, 2022

2021
Certificateless Network Coding Ring Signature Scheme.
Secur. Commun. Networks, 2021

Improved modeling of flicker noise including velocity saturation effect in FinFETs and experimental validation.
Microelectron. J., 2021

Distributed Adaptive Bipartite Time-Varying Formation Control for Heterogeneous Unknown Nonlinear Multi-Agent Systems.
IEEE Access, 2021

2019
Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.
J. Univers. Comput. Sci., 2018

Online learning based on a novel cost function for system power management.
IET Comput. Digit. Tech., 2018

Hardware-assisted integrity monitor based on lightweight hash function.
IEICE Electron. Express, 2018

A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device.
IEEE Access, 2018

An Optimized Method of Hardware Implementation for LHash in the Embedded System.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

2017
Track fusion based on threshold factor classification algorithm in wireless sensor networks.
Int. J. Commun. Syst., 2017

PAOA: A power and area optimization approach of reed-muller logic circuits.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017

An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
A Universal Hardware-Driven PVT and Layout-Aware Predictive Failure Analytics for SRAM.
IEEE Trans. Very Large Scale Integr. Syst., 2016

2015
Polarity Searching for MPRM Logic Circuit Based on Improved Adaptive Genetic Algorithm.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Hardware-Assisted Monitoring for Code Security in Embedded System.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

An Improved S-Box of Lightweight Hash Function SPOGENT.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A multi-level collaboration low-power design based on embedded system.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015

2013
MCVP-NoC: Many-Core Virtual Platform with Networks-on-Chip support.
Proceedings of the IEEE 10th International Conference on ASIC, 2013

2012
Viscous Conservation Laws with Boundary.
SIAM J. Math. Anal., 2012

2007
Pointwise convergence to a Maxwellian for a Broadwell model with a supersonic boundary.
Networks Heterog. Media, 2007


  Loading...