2024
A Q-learning-based downlink scheduling in 5G systems.
Wirel. Networks, November, 2024
Content-aware malicious webpage detection using convolutional neural network.
Multim. Tools Appl., January, 2024
Optimizing Computational Efficiency: In-Memory Computing with Dynamic Switching.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2024
Optimizing Computational Efficiency: A Novel Approach through XOR-logic Operation in In-Memory Computing.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2024
2023
A Deep Learning based Sustainable Energy Scheduling System.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
2021
Data Retention-Based Low Leakage Power TCAM for Network Packet Routing.
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Accuracy-Configurable Radix-4 Adder With a Dynamic Output Modification Scheme.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
A Fault Tolerant Mechanism for UE Authentication in 5G Networks.
Mob. Networks Appl., 2021
Secure LoRaWAN Root Key Update Scheme for IoT Environment.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
2020
A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2020
Low-power ternary content-addressable memory design based on a voltage self-controlled fin field-effect transistor segment.
Comput. Electr. Eng., 2020
Secure Session Key Generation Method for LoRaWAN Servers.
IEEE Access, 2020
Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks.
IEEE Access, 2020
IoT Device Power Management Based on PSM and EDRX Mechanisms.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
2019
E-ANDSF-Based Base Station Selection Scheme by Using MLP in Untrusted Environments.
IEEE Trans. Ind. Informatics, 2019
Low-Power AES Data Encryption Architecture for a LoRaWAN.
IEEE Access, 2019
LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
A LoRaWAN Based Energy Efficient Data Encryption Method.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
2018
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments.
IEEE Access, 2018
MIH-Based eNB Selection for Untrusted Networks.
Proceedings of the Wireless Internet - 11th EAI International Conference, 2018
Self-parameter Based Bilateral Session Key Exchange Method.
Proceedings of the Advances on Broadband and Wireless Computing, 2018
2017
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques.
IEEE Syst. J., 2017
Secure data-sharing using distributed environmental matching keys.
Pervasive Mob. Comput., 2017
A Light Weight Data Encryption Method for WSN Communication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
2016
Using fuzzy logic to reduce ping-pong handover effects in LTE networks.
Soft Comput., 2016
An ECC-based secure EMR transmission system with data leakage prevention scheme.
Int. J. Comput. Math., 2016
Data Encryption Method Using Environmental Secret Key with Server Assistance.
Intell. Autom. Soft Comput., 2016
Residence Energy Control System Based on Wireless Smart Socket and IoT.
IEEE Access, 2016
TTP Based High-Efficient Multi-Key Exchange Protocol.
IEEE Access, 2016
Cloud Encryption Using Distributed Environmental Keys.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Device Parameter based Secure User Authentication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
Secure Power Management Scheme for WSN.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
Power and Area Efficiency NoC Router Design for Application-Specific SoC by Using Buffer Merging and Resource Sharing.
ACM Trans. Design Autom. Electr. Syst., 2014
Automatic Charge Balancing Content Addressable Memory With Self-control Mechanism.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014
A Secure ECC-based Electronic Medical Record System.
J. Internet Serv. Inf. Secur., 2014
A Group File Encryption Method using Dynamic System Environment Key.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
2013
Low Leakage TCAM for IP Lookup Using Two-Side Self-Gating.
IEEE Trans. Circuits Syst. I Regul. Pap., 2013
A Fast Power Estimation Method for Content Addressable Memory by Using SystemC Simulation Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
A low power detection routing method for bufferless NoC.
Proceedings of the International Symposium on Quality Electronic Design, 2013
2011
Design of timing-error-resilient systolic arrays for matrix multiplication.
Proceedings of the International SoC Design Conference, 2011
A priority based output arbiter for NoC router.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
2010
Distinguishable error detection method for Network on Chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
A Takagi-Sugeno fuzzy-model-based modeling method.
Proceedings of the FUZZ-IEEE 2010, 2010
2009
LMI-based fuzzy control for a class of time-delay discrete fuzzy bilinear system.
Proceedings of the FUZZ-IEEE 2009, 2009
2008
A low power high performance design for JPEG Huffman decoder.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
2006
Low power scheduling method using multiple supply voltages.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
2005
Bipartitioning and encoding in low-power pipelined circuits.
ACM Trans. Design Autom. Electr. Syst., 2005
A low power scheduling method using dual V<sub>dd</sub> and dual V<sub>th</sub>.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
2003
State Reordering for Low Power Combinational Logic.
Proceedings of the Advances in Computer Systems Architecture, 2003
2001
A bipartition-codec architecture to reduce power in pipelinedcircuits.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2001
Synthesis of partition-codec architecture for low power and small area circuit design.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001
An entropy-based algorithm to reduce area overhead for bipartition-codec architecture.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001
2000
An effective output-oriented algorithm for low power multipartition architecture.
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000