Xiaowei Li

According to our database1, Xiaowei Li authored at least 42 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An Adaptive and Secure Holographic Image Watermarking Scheme.
Entropy, 2019

Scan Chain Based Attacks and Countermeasures: A Survey.
IEEE Access, 2019

EEG-Based Mild Depressive Detection Using Differential Evolution.
IEEE Access, 2019

Leveraging Memory PUFs and PIM-based encryption to secure edge deep learning systems.
Proceedings of the 37th IEEE VLSI Test Symposium, 2019

Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

Systolic Cube: A Spatial 3D CNN Accelerator Architecture for Low Power Video Analysis.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

A None-Sparse Inference Accelerator that Distills and Reuses the Computation Redundancy in CNNs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

ShuntFlow: An Efficient and Scalable Dataflow Accelerator Architecture for Streaming Applications.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

JCallGraph: Tracing Microservices in Very Large Scale Container Cloud Platforms.
Proceedings of the Cloud Computing - CLOUD 2019, 2019

2018
LMDet: A "Naturalness" Statistical Method for Hardware Trojan Detection.
IEEE Trans. VLSI Syst., 2018

AdaFlow: Aggressive Convolutional Neural Networks Approximation by Leveraging the Input Variability.
J. Low Power Electronics, 2018

Optimizing Memory Efficiency for Deep Convolutional Neural Network Accelerators.
J. Low Power Electronics, 2018

Facial expression awareness based on multi-scale permutation entropy of EEG.
IJDMB, 2018

Natural Scene Text Detection Based on Deep Supervised Fully Convolutional Network.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

See and Think: Disentangling Semantic Scene Completion.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Hardware Trojan Detection Based on Signal Correlation.
Proceedings of the 27th IEEE Asian Test Symposium, 2018

Bias PUF based Secure Scan Chain Design.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Nash Equilibrium of an Energy Saving Strategy with Dual Rate Transmission in Wireless Regional Area Network.
Wireless Communications and Mobile Computing, 2017

Innovative practices session 10C formal verification practices in industry.
Proceedings of the 35th IEEE VLSI Test Symposium, 2017

Fast Background Removal Method for 3D Multi-channel Deep Tissue Fluorescence Imaging.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2017, 2017

An Enhanced Transportation Mode Detection Method Based on GPS Data.
Proceedings of the Data Science, 2017

On Evaluating and Constraining Assertions Using Conflicts in Absent Scenarios.
Proceedings of the 26th IEEE Asian Test Symposium, 2017

2016
Chaotic image encryption using pseudo-random masks and pixel mapping.
Signal Processing, 2016

One-round Secure Key Exchange Protocol With Strong Forward Secrecy.
TIIS, 2016

Monitoring fatigue cracks of a metal structure using an eddy current sensor.
EURASIP J. Wireless Comm. and Networking, 2016

2015
Optimization of Chemical Fungicide Combinations Targeting the Maize Fungal Pathogen, Bipolaris maydis: A Systematic Quantitative Approach.
IEEE Trans. Biomed. Engineering, 2015

A privacy preserving authentication scheme for roaming services in global mobility networks.
Security and Communication Networks, 2015

Multi-objective optimization of urban bus network using cumulative prospect theory.
J. Systems Science & Complexity, 2015

Genetic Algorithm for Multiple Bus Line Coordination on Urban Arterial.
Comp. Int. and Neurosc., 2015

A highly accurate protein structural class prediction approach using auto cross covariance transformation and recursive feature elimination.
Computational Biology and Chemistry, 2015

MOST: a software environment for constraint-based metabolic modeling and strain design.
Bioinformatics, 2015

2014
Power Cable Fault Recognition Based on an Annealed Chaotic Competitive Learning Network.
Algorithms, 2014

2013
A new certificateless authenticated key agreement protocol for SIP with different KGCs.
Security and Communication Networks, 2013

A simple and robust anonymous two-factor authenticated key exchange protocol.
Security and Communication Networks, 2013

A New Roaming Authentication Framework For Wireless Communication.
TIIS, 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
TIIS, 2013

IDPKC-to-TPKC Construction of Multi-receiver Signcryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An approach for secure-communication between XEN virtual machines.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2010
Adaptive pf scheduling algorithm in LTE cellular system.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

2009
Towards affective learning with an EEG feedback approach.
Proceedings of the first ACM international workshop on Multimedia technologies for distance learning, 2009

2008
Cooperation Radio Resource Management and Adaptive Vertical Handover in Heterogeneous Wireless Networks.
Proceedings of the Fourth International Conference on Natural Computation, 2008


  Loading...