Sheng Wei

Orcid: 0000-0003-4943-3360

Affiliations:
  • Rutgers University, Piscataway, NJ, USA
  • University of Nebraska-Lincoln, Department of Computer Science and Engineering, , NE, USA (former)
  • University of California at Los Angeles, CA, USA (PhD 2013)


According to our database1, Sheng Wei authored at least 66 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Multimedia Mobile Cloud Computing Using Protective Perturbation.
CoRR, 2024

DM-TEE: Trusted Execution Environment for Disaggregated Memory.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

2023
Security-Preserving Live 3D Video Surveillance.
Proceedings of the 14th Conference on ACM Multimedia Systems, 2023

Power Efficient Mobile VTuber Live Streaming.
Proceedings of the ACM Multimedia Asia 2023, 2023

DF-TEE: Trusted Execution Environment for Disaggregated Multi-FPGA Cloud Systems.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2022
Power-efficient live virtual reality streaming using edge offloading.
Proceedings of the 32nd ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2022

Visual privacy protection in mobile image recognition using protective perturbation.
Proceedings of the MMSys '22: 13th ACM Multimedia Systems Conference, Athlone, Ireland, June 14, 2022

Privacy-preserving Reflection Rendering for Augmented Reality.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

2021
LiveObj: Object Semantics-based Viewport Prediction for Live Mobile Virtual Reality Streaming.
IEEE Trans. Vis. Comput. Graph., 2021

LiveROI: region of interest analysis for viewport prediction in live mobile virtual reality streaming.
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021

Fake Gradient: A Security and Privacy Protection Framework for DNN-based Image Classification.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

QoS-Aware Network Energy Optimization for Danmu Video Streaming in WiFi Networks.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Runtime Fault Injection Detection for FPGA-based DNN Execution Using Siamese Path Verification.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

SGX-FPGA: Trusted Execution Environment for CPU-FPGA Heterogeneous Architecture.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2020
LiveDeep: Online Viewport Prediction for Live Virtual Reality Streaming Using Lifelong Deep Learning.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2020

QuRate: power-efficient mobile immersive video streaming.
Proceedings of the 11th ACM Multimedia Systems Conference, 2020

AdaP-360: User-Adaptive Area-of-Focus Projections for Bandwidth-Efficient 360-Degree Video Streaming.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

VVSec: Securing Volumetric Video Streaming via Benign Use of Adversarial Perturbation.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020

2019
Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation.
IEEE Trans. Emerg. Top. Comput., 2019

Viewport Prediction for Live 360-Degree Mobile Video Streaming Using User-Content Hybrid Motion Tracking.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Virtual reality streaming at the edge: a power perspective: poster.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Runtime Hardware Security Verification Using Approximate Computing: A Case Study on Video Motion Detection.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

Exploring CNN-Based Viewport Prediction for Live Virtual Reality Streaming.
Proceedings of the 2019 IEEE International Conference on Artificial Intelligence and Virtual Reality, 2019

2018
EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security.
Proceedings of the Search-Based Software Engineering - 10th International Symposium, 2018

HISA: hardware isolation-based secure architecture for CPU-FPGA embedded systems.
Proceedings of the International Conference on Computer-Aided Design, 2018

TZSlicer: Security-aware dynamic program slicing for hardware isolation.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

PrinTracker: Fingerprinting 3D Printers using Commodity Scanners.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Power Evaluation of 360 VR Video Streaming on Head Mounted Display Devices.
Proceedings of the 27th Workshop on Network and Operating Systems Support for Digital Audio and Video, 2017

Towards the Security of Motion Detection-based Video Surveillance on IoT Devices.
Proceedings of the on Thematic Workshops of ACM Multimedia 2017, Mountain View, CA, USA, October 23, 2017

PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Evaluating and improving push based video streaming with HTTP/2.
Proceedings of the 26th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2016

Profiling energy consumption of DASH video streaming over 4G LTE networks.
Proceedings of the 8th International Workshop on Mobile Video, 2016

Two-way real time multimedia stream authentication using physical unclonable functions.
Proceedings of the 18th IEEE International Workshop on Multimedia Signal Processing, 2016

DASH2M: Exploring HTTP/2 for Internet Streaming to Mobile Devices.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Lightweight secure sensing using hardware isolation.
Proceedings of the 2016 IEEE SENSORS, Orlando, FL, USA, October 30 - November 3, 2016, 2016

2015
Power efficient mobile video streaming using HTTP/2 server push.
Proceedings of the 17th IEEE International Workshop on Multimedia Signal Processing, 2015

2014
Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry.
IEEE Trans. Very Large Scale Integr. Syst., 2014

Low Latency Live Video Streaming over HTTP 2.0.
Proceedings of the 24th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2014

Cost effective video streaming using server push over HTTP 2.0.
Proceedings of the IEEE 16th International Workshop on Multimedia Signal Processing, 2014

Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

2013
Consistency-based System Security Techniques.
PhD thesis, 2013

Quantitative Intellectual Property Protection Using Physical-Level Characterization.
IEEE Trans. Inf. Forensics Secur., 2013

Energy attacks and defense techniques for wireless systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Maximizing yield in Near-Threshold Computing under the presence of process variation.
Proceedings of the 2013 23rd International Workshop on Power and Timing Modeling, 2013

Designing a universal format for encrypted media.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Offline protected video playback on heterogeneous platforms.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Malicious circuitry detection using fast timing characterization via test points.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

Aging-based leakage energy reduction in FPGAs.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

Low power FPGA design using post-silicon device aging (abstract only).
Proceedings of the 2013 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2013

The undetectable and unprovable hardware trojan horse.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
Scalable Hardware Trojan Diagnosis.
IEEE Trans. Very Large Scale Integr. Syst., 2012

Gate Characterization Using Singular Value Decomposition: Foundations and Applications.
IEEE Trans. Inf. Forensics Secur., 2012

Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Provably complete hardware Trojan detection using test point insertion.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012

Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

2011
Malicious Circuitry Detection Using Thermal Conditioning.
IEEE Trans. Inf. Forensics Secur., 2011

Scalable consistency-based hardware trojan detection and diagnosis.
Proceedings of the 5th International Conference on Network and System Security, 2011

Low latency live video streaming using HTTP chunked encoding.
Proceedings of the IEEE 13th International Workshop on Multimedia Signal Processing (MMSP 2011), 2011

Robust passive hardware metering.
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011

Integrated circuit digital rights management techniques using physical level characterization.
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011

Integrated circuit security techniques using variable supply voltage.
Proceedings of the 48th Design Automation Conference, 2011

Differential public physically unclonable functions: architecture and applications.
Proceedings of the 48th Design Automation Conference, 2011

2010
Scalable segmentation-based malicious circuitry detection and diagnosis.
Proceedings of the 2010 International Conference on Computer-Aided Design, 2010

Gate-level characterization: foundations and hardware security applications.
Proceedings of the 47th Design Automation Conference, 2010

2006
An Interest Filtering Mechanism Based on LoI.
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006


  Loading...