Gang Qu
Citeras av
Citeras av
Exposure in wireless ad-hoc sensor networks
S Meguerdichian, F Koushanfar, G Qu, M Potkonjak
Proceedings of the 7th annual international conference on Mobile computing …, 2001
Power optimization of variable-voltage core-based systems
I Hong, D Kirovski, G Qu, M Potkonjak, MB Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1999
Power Optimization of Variable Voltage Core-Based Systems
MS I. Hong, D. Kirovski, G. Qu, M. Potkonjak
ACM/IEEE Design Automation Conference Proceedings, 176-181, 1998
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
A survey on recent advances in vehicular network security, trust, and privacy
Z Lu, G Qu, Z Liu
IEEE Transactions on Intelligent Transportation Systems 20 (2), 760-776, 2018
Minimal and maximal exposure path algorithms for wireless embedded sensor networks
G Veltri, Q Huang, G Qu, M Potkonjak
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
A privacy-preserving trust model based on blockchain for VANETs
Z Lu, W Liu, Q Wang, G Qu, Z Liu
Ieee Access 6, 45655-45664, 2018
Synthesis techniques for low-power hard real-time systems on variable voltage processors
I Hong, G Qu, M Potkonjak, MB Srivastavas
Proceedings 19th IEEE Real-Time Systems Symposium (Cat. No. 98CB36279), 178-187, 1998
Exposure in wireless sensor networks: Theory and practical solutions
S Megerian, F Koushanfar, G Qu, G Veltri, M Potkonjak
Wireless Networks 8 (5), 443-454, 2002
BARS: A blockchain-based anonymous reputation system for trust management in VANETs
Z Lu, Q Wang, G Qu, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Temperature-aware cooperative ring oscillator PUF
CE Yin, G Qu
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 36-42, 2009
A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing
J Zhang, Y Lin, Y Lyu, G Qu
IEEE Transactions on Information Forensics and Security 10 (6), 1137-1150, 2015
Analysis of watermarking techniques for graph coloring problem
G Qu, M Potkonjak
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided …, 1998
Global identification of peptidase specificity by multiplex substrate profiling
AJ O'donoghue, A Eroy-Reveles, GM Knudsen, J Ingram, M Zhou, ...
Nature methods 9 (11), 1095-1100, 2012
Hardware metering
F Koushanfar, G Qu
Proceedings of the 38th annual design automation conference, 490-493, 2001
Function-level power estimation methodology for microprocessors
G Qu, N Kawabe, K Usami, M Potkonjak
Proceedings of the 37th Annual Design Automation Conference, 810-813, 2000
LISA: Maximizing RO PUF's secret extraction
CED Yin, G Qu
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
Effective iterative techniques for fingerprinting design IP
AE Caldwell, HJ Choi, AB Kahng, S Mantik, M Potkonjak, G Qu, JL Wong
Proceedings of the 36th annual ACM/IEEE Design Automation Conference, 843-848, 1999
What is the limit of energy saving by dynamic voltage scaling?
G Qu
IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE …, 2001
Intellectual property protection in VLSI designs: theory and practice
G Qu, M Potkonjak
Springer Science & Business Media, 2007
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20