2024
A High-Performance Transparent Memory Data Encryption and Authentication Scheme Based on Ascon Cipher.
IEEE Trans. Very Large Scale Integr. Syst., May, 2024
2023
Fast Area Optimization Approach for XNOR/OR-based Fixed Polarity Reed-Muller Logic Circuits based on Multi-strategy Wolf Pack Algorithm.
ACM Trans. Design Autom. Electr. Syst., 2023
Power Optimization for Mixed Polarity Reed-Muller Circuits Based on Multilevel Adaptive Memetic Algorithm.
Int. J. Intell. Syst., 2023
2022
A More Accurate and Robust Binary Ring-LWE Decryption Scheme and Its Hardware Implementation for IoT Devices.
IEEE Trans. Very Large Scale Integr. Syst., 2022
An Efficient Power Optimization Approach for Fixed Polarity Reed-Muller Logic Circuits Based on Metaheuristic Optimization Algorithm.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
Ring-ExpLWE: A High-Performance and Lightweight Post-Quantum Encryption Scheme for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022
Area and power optimization approach for mixed polarity Reed-Muller logic circuits based on multi-strategy bacterial foraging algorithm.
Appl. Soft Comput., 2022
2021
Delay optimization for ternary fixed polarity Reed-Muller circuits based on multilevel adaptive quantum genetic algorithm.
Int. J. Intell. Syst., 2021
Minimization for ternary fixed polarity Reed-Muller expressions based on ternary quantum shuffled frog leaping algorithm.
Appl. Soft Comput., 2021
Area optimization for MPRM logic circuits based on improved multiple disturbances fireworks algorithm.
Appl. Math. Comput., 2021
2020
An M-Cache-Based Security Monitoring and Fault Recovery Architecture for Embedded Processor.
IEEE Trans. Very Large Scale Integr. Syst., 2020
Target localization and tracking based on improved Bayesian enhanced least-squares algorithm in wireless sensor networks.
Comput. Networks, 2020
2019
A Novel Measurement Data Classification Algorithm Based on SVM for Tracking Closely Spaced Targets.
IEEE Trans. Instrum. Meas., 2019
A LS-SVM based Measurement Points Classification Algorithm for Adjacent Targets in WSNs.
Sensors, 2019
EDOA: an efficient delay optimization approach for mixed-polarity Reed-Muller logic circuits under the unit delay model.
Frontiers Comput. Sci., 2019
Fast Minimization of Fixed Polarity Reed-Muller Expressions.
IEEE Access, 2019
A Polarity Optimization Algorithm Taking Into Account Polarity Conversion Sequence.
IEEE Access, 2019
Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
2018
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.
J. Univers. Comput. Sci., 2018
Online learning based on a novel cost function for system power management.
IET Comput. Digit. Tech., 2018
Hardware-assisted integrity monitor based on lightweight hash function.
IEICE Electron. Express, 2018
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device.
IEEE Access, 2018
An Optimized Method of Hardware Implementation for LHash in the Embedded System.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018
2017
A Power and Area Optimization Approach of Mixed Polarity Reed-Muller Expression for Incompletely Specified Boolean Functions.
J. Comput. Sci. Technol., 2017
Track fusion based on threshold factor classification algorithm in wireless sensor networks.
Int. J. Commun. Syst., 2017
An efficient and fast polarity optimization approach for mixed polarity Reed-Muller logic circuits.
Frontiers Comput. Sci., 2017
An Efficient Polarity Optimization Approach for Fixed Polarity Reed-Muller Logic Circuits Based on Novel Binary Differential Evolution Algorithm.
,
,
,
,
,
,
,
,
,
,
Proceedings of the Network and Parallel Computing, 2017
PAOA: A power and area optimization approach of reed-muller logic circuits.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme.
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
EMA-FPRMs: An efficient minimization algorithm for fixed polarity Reed-Muller expressions.
Proceedings of the 2016 International Conference on Field-Programmable Technology, 2016
2015
Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits.
Comput. J., 2015
Polarity Searching for MPRM Logic Circuit Based on Improved Adaptive Genetic Algorithm.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Hardware-Assisted Monitoring for Code Security in Embedded System.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
An Improved S-Box of Lightweight Hash Function SPOGENT.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Threshold Factor Track Classification Algorithm Based on Target Motion Model.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Optimization of best polarity searching for mixed polarity reed-muller logic circuit.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015
A multi-level collaboration low-power design based on embedded system.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015
2014
Communication and monitor of breast cancer signal in the pulse-output genetic circuit network.
Sci. China Inf. Sci., 2014
2013
A Temperature Insensitive Ring Oscillator for Low Power RF Communications.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
A GPU-Accelerated Large-Scale Music Similarity Retrieval Method.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
A Design of Security Module to Protect Program Execution in Embedded System.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Pulse-Output Monitor Genetic Circuit of Breast Cancer Testing.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Iterative Threshold Selection for TOA Estimation of IR-UWB System.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Probabilistic Modeling during Power Estimation for Mixed Polarity Reed-Muller Logic Circuits.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Metadata-Intensive I/O Performance Optimization by Merging Read/Write Requests.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
CloudDVMM: Distributed Virtual Machine Monitor for Cloud Computing.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
A Novel Alternative Exponent-Weighted Fuzzy C-Means Algorithm.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013